Operations | Monitoring | ITSM | DevOps | Cloud

Departed M365 Users

When someone leaves your organization, the first step IT usually takes is to disable their Microsoft 365 account. But have you ever stopped to ask: The answer might surprise you. If you’re not actively managing this, Microsoft will automatically delete that data — often in as little as 30 days. This post explains exactly what gets deleted (and when), why this is a problem, and what you can do to protect that data — without paying for unnecessary licenses.

The Dos and Don'ts of Successful Software Rollouts

Launching new enterprise software is one of the most strategic—but risk-laden—internal initiatives any organization can undertake. Done right, it accelerates transformation, streamlines operations, and boosts employee productivity. Done wrong, it can paralyze teams, spike IT tickets, and erode employee trust in the tools they’re given and the teams that support them.

Elephant Flows: The Hidden Heavyweights of AI Data Center Networks

Elephant flows are no longer rare. They’re foundational to AI workloads. In today’s GPU-heavy data centers, long-lived, high-volume flows can distort ECMP, overflow buffers, and rack up unexpected cloud bills. Kentik helps you see and tame these elephants with real-time flow analytics, automated alerting, and predictive capacity planning.

The Hidden Cost of Downtime: Why IT Leaders Are Prioritizing Resilient Operations

No business sets out to tolerate downtime. And yet, across industries, unexpected service disruptions continue to drain revenue, erode customer trust, and expose operational fragility. For CIOs and IT leaders, the real concern isn’t if systems will break, it’s whether your team can outpace the fallout. Because in a crisis, speed isn’t just an advantage it’s survival.

How to Write Logs to a File in Go

When your Go application moves beyond development, you need structured logging that persists. Writing logs to files gives you the control and reliability that stdout can't match, especially when you're debugging production issues or need to meet compliance requirements. This blog walks through the practical approaches, from Go's standard library to structured logging with popular packages.

Logging in Docker Swarm: Visibility Across Distributed Services

Docker Swarm's logging model shifts from individual container logs to service-level aggregation. The docker service logs command batch-retrieves logs present at the time of execution, pulling data from all containers that belong to a service across your cluster. This approach gives you a unified view of distributed applications, but it comes with its patterns and considerations for effective observability.

Zero Ticket IT Process Automation: Beyond the Service Desk

Traditional IT process automation has always promised faster, more efficient operations. But for years, it’s been largely synonymous with service desk workflows: password resets, access requests, and the like. Those are important, no doubt. But limiting automation to the service desk is like only automating the assembly line in a factory while leaving the rest of the production floor manual.

Why Java Remains the GoTo for Enterprise Custom Software in 2025

For a business, customer enterprise software is a must-have for automating and streamlining business operations. It's the backbone of every business in 2025. Be it for scaling business applications or improving user experience, custom software eliminates the risk of manual errors in data records and gaining end-to-end visibility across an organization. This is where Java comes into the picture. For decades, businesses have been relying on Java for its ability to power enterprise-grade solutions, ensuring optimal performance.

Do You Know How Many IPs Your CIDR Block Really Has? Understanding Network Capacity and Allocation

Many people use CIDR blocks every day without knowing exactly how many IP addresses they actually have. A CIDR block like /24 gives exactly 256 possible IP addresses, while a /29 block gives 8, and each size gives a different number you can count on for planning. Not understanding this can leave networks overcrowded or wasteful, leading to problems later.