Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Live Kubernetes Debugging with the Elastic Stack

Your Kubernetes app is down. Your users start ranting on Twitter. Your boss is standing right behind you. What do you do? We are using the Elastic Stack in this demo with a special focus on its Kubernetes integration with metadata enrichment and autodiscovery in combination with APM / tracing, metrics, logs, and health checks.

Using the Beacon API

Users are so annoying! There they go, leaving the page before we can save the data to the API. Back in the old days, we would attach a `window.unload` handler and try to send an AJAX request, but this was slow and unreliable. Enter the Beacon API to give us a better way. The Beacon provides a reliable way to send a small amount of data *after* the page has been unloaded. It's not bound to the lifetime of the page and it doesn't slow down the user.

#ITConnections - Battle for Bandwidth

The load on cloud-based applications is at an all-time high, with people working from home accessing the same resources, simultaneously. Daytime Internet usage skyrocketed 34.4% between the regular working hours of 9AM-5PM as a result of remote work. A large portion of that online traffic accounted for video conferencing and collaboration tools. Microsoft saw a 34% increase usage of Teams while Skype reported 59 million daily active users and 4.3 million on Zoom.

How to Report on Home Worker Productivity and their Experience

Learn how Goliath can help you better document the end-user experience for your home workers using Citrix or VMware Horizon with end-user productivity and activity reports, experience reports tracking logon speeds and other KPIs and overall IT performance for host, VMs and storage.

IT Operations Strategies in an Economic Slowdown

IT leaders will need to rethink and readjust their business plans for 2020 during the Covid-19 pandemic. In a time of record unemployment and widespread remote workforces, businesses are having to adapt operations and marketplace strategies overnight. This interactive webinar will discuss results of a recent survey asking IT operations executives about technology priorities, budgets, and hiring plans needed to succeed in a volatile economic environment.

How to Implement Network Policy in Google GKE to Secure Your Cluster

By default, pods are non-isolated; they accept traffic from any source. The Google GKE solution to this security concern is Network Security Policy that lets developers control network access to their services. Google GKE comes configured with Network Security Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network security policy and a live demo implementing each use case.