Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Build to scale with Aiven!

In this session, we will show how to leverage Aiven for Dragonfly and Aiven for AI. First, we’ll discuss how to increase your throughput and reduce memory usage by 25% compared to open-source Redis. Then explore scalability, efficiency, and advanced capabilities ideal for caching, gaming leaderboards, messaging, AI applications, and more. After that, we’ll jump into Aiven’s latest AI use cases and cover.

Effective Observability for MLOps Pipelines at Scale with Rishit Dagli

Join Rishit Dagli as he explores effective observability for ML pipelines at scale. Learn about the critical differences between observability and monitoring in ML applications, common challenges like distribution shifts, and feedback loops. Rishit demonstrates practical methods for logging and interpreting various metrics to maintain model performance and reliability.

How to Set Up User Feedback from Sentry

Sentry’s User Feedback gives your users an easy way to provide direct input on problems they encounter on your site – whether that be a frontend error, broken link, or misleading label – to help get context into a known error or catch an issue that can only be spotted in the UX. This simple widget can be customized to match your site’s look and feel and embedded non-intrusively. Learn how to set it up with this step-by-step demo.

Your BYOD Policy: Key Considerations, Daren Goeson, SVP Product Management, SUEM

See more insights into creating effective and secure BYOD policies in Ivanti’s research report: Secure Unified Endpoint Management. Daren Goeson, SVP Product Management, SUEM at Ivanti explores the essential factors organizations should consider when creating Bring Your Own Device (BYOD) policies and protocols. From use cases to data management, device compatibility to security implications, this video provides valuable insights to help organizations develop effective BYOD strategies.