Operations | Monitoring | ITSM | DevOps | Cloud

Optimizing IoT and edge with Ubuntu: secure, simplify, scale

From IoT to edge computing, Ubuntu helps you secure, simplify, and scale device deployments with confidence. In this session, Gabriel Aguiar Noury (Product Manager) and Tabish Khan (Sales Director IoT) from Canonical explore how Ubuntu streamlines the deployment, management, and maintenance of embedded systems, without compromising on reliability or security. Whether you’re building next-gen hardware or optimizing existing infrastructure, this talk offers practical insights and tools to help you succeed.

Why are AI Agents Superior to LLM #speedscale #apitesting #mocks #ai #agents #llm #developers

Matt LeRay explains the key difference: AI agents can perform multi-step processes to solve complex software tasks, unlike simple LLMs that mainly answer questions. Discover how agents go beyond chat to: What are your thoughts on AI agents in software development? Let us know in the comments below!

The State of Routing Security: Progress, Challenges, and Measurement

Kentik's Director of Internet Analysis, Doug Madory, explores the current landscape of BGP routing security. He discusses key progress made in Route Origin Validation (ROV), common pitfalls like AS-SET nesting, and ongoing challenges faced by the networking industry. With real-world examples and detailed traffic analysis from Kentik's extensive NetFlow data, Doug shares his insights and recommendations for NetOps professionals who want to improve their routing security practices. Watch this webinar replay to learn the latest methods for securing the global internet.

Why Software Observability is Key for Device Success

As devices become more software-driven, ensuring quality isn't just a good practice—it's essential. Discover why François Baldassari believes that observability is the secret weapon in navigating software complexity and avoiding major incidents. Explore how staying ahead in this evolving landscape can revolutionize edge computing.

Think Like a Query with Pablo Loaiza - Customer Brown Bag - April 24, 2025

Join us as we discuss how to approach real-world questions, translate them into queries, and refine them for maximum efficiency. Hands-on examples teach you how to filter effectively, compare historical data, correlate events, and troubleshoot common challenges.

Part 2: Solving the Top 10 Problems with Vulnerability Management

Once again, we're back with all the answers. Traditional vulnerability management comes with many pitfalls, and we're counting down the solutions to all the problems you might be running into. Ivanti's Chris Goettl and Robert Waters break down the back five on our list: a periodic approach to remediation, poor prioritization, lack of business context, overreliance on patch management, and poor metrics and reporting.

Why you need Internet Performance Monitoring (IPM)

A few decades ago, monitoring your application was simple—everything ran on-premises, and performance issues were easier to pinpoint. But today, applications are built on globally distributed services, running across internal and external systems in the cloud, all connected through the Internet. In a world where the Internet is now your network, traditional APM (Application Performance Monitoring) isn’t enough. It only focuses on code and infrastructure, leaving critical blind spots that impact performance, availability, and user experience.