Operations | Monitoring | ITSM | DevOps | Cloud

Monitor and Debug Laravel Applications with Sentry

Join me for a hands-on workshop where we'll debug real-world issues in a Laravel and React application using Sentry. We'll tackle three common production problems: You'll learn how to use Sentry's powerful tools including: Performance monitoring and tracing Error context enrichment Seer AI for root cause analysis Session Replay and Breadcrumbs By the end, you'll be equipped to debug complex issues in your own applications with confidence!

Coredump #007: AI, Open Source, & the Future of Embedded Development

In today's Coredump Session, we dive into a wide-ranging conversation about the intersection of AI, open source, and embedded systems with the teams from Memfault and Goliath. From the evolution of AI at the edge to the emerging role of large language models (LLMs) in firmware development, the panel explores where innovation is happening today — and where expectations still outpace reality. Listen in as they untangle the practical, the possible, and the hype shaping the future of IoT devices.

Application Debugging in Sentry with Flags, Tracing, and Seer

In this video, Cody takes you on a tour or fixing problems in the Unborked marketplace using Flags, Traces, and Seer! Sentry is all about giving you options when it comes to debugging - whether its using the dev toolbar to manage feature flags on the fly, using replays and tracing to dive deep into whats happening in your application, or even using Seer (in beta) to pull all the context from your application together - everything from traces, to errors, to stack traces and more - and give you a root cause of what went wrong, and pull a PR to fix it.

Achieve Full Visibility: How External Attack Surface Management (EASM) Reduces Risk

Achieve Full Visibility: How External Attack Surface Management (EASM) Reduces Risk Your organization’s attack surface is bigger than you think — and what you can’t see can hurt you. Many internet-facing assets go undetected by traditional tools, especially those without agents, leaving gaps in your security posture.

Windows 10 & Office Updates Product Marketing #shorts #patchmanagement #patchtuesday

Windows 10 & Office Updates Product Marketing Windows 10 updates reveal 87 vulnerabilities, including known exploited ones. Windows 11 also faces vulnerabilities, especially with Citrix. A specific issue with broker xe and Windows Defender is highlighted, with a fix anticipated. Server 2022 has three vulnerabilities, including Citrix. Office updates for 2016 and Android tackle critical vulnerabilities, stressing the need for regular updates. SharePoint server updates address five important vulnerabilities.

Is There Really ROI for Moving Your Voice Network to Cloud Native?

As an operations leader, you are constantly asked to do more with fewer resources. Join us on April 29th to learn how your peers are successfully leveraging cloud native and end-to-end automation to minimize manual labor and lower OpEx. Many of our customers have expressed their challenges in swiftly launching new services, maintaining compliance, or managing subscriber churn. How does one maintain business continuity in the face of expertise shortages and security concerns?

(Full Episode) IT Horror Stories: Confessions of an Adversary Ep5 S1

In this episode, Dr. Chase Cunningham, aka DrZeroTrust, joins us to shed light on what a horror story looks like from an adversarial perspective. In drawing on his extensive red teaming and NSA background, he explores why doing the basics and applying them intelligently does matter, why people should abandon the notion of perfect security, and what controls and practices organizations can adopt and follow to make it a bad day for bad actors.