Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

How to use Monitor Secrets to store API Keys and Bearer Tokens with OneUptime?

Welcome to our latest tutorial on OneUptime! In this video, we'll be exploring how to use Monitor Secrets to securely store your API Keys and Bearer Tokens. **Monitor Secrets** is a feature of OneUptime that allows you to securely store sensitive information like API keys and Bearer Tokens. This ensures that your critical data is kept safe while still being readily accessible for your monitoring needs.

Kentik Close-Up 01. PeeringDB

Welcome to the debut episode of Kentik Close-Up! Join Leon Adato and special guests Greg Villain and Lauren Basile as they dive deep into PeeringDB, the essential public address book for network interconnection. Discover how Kentik integrates PeeringDB to enhance network performance, reduce costs, and optimize connectivity. Learn the ins and outs of peering strategies, and see how Kentik's innovative solutions simplify complex network management tasks. Don’t miss this informative first episode of Kentik Close-Up!

Engineering Data Systems for the next 10 years of growth with Amit Kesarwani

Join Amit Kesarwani from Treeverse as he discusses the historical progression of machine learning and introduces lakeFS, an open-source platform providing Git-like data version control. This session covers the necessity of ML in business strategies today and how lakeFS aids in managing, versioning, and collaborating on data projects seamlessly.

Create Tickets and Incidents to the Right Team

Is your support ever in a situation to report an issue but don't know which team to add? Are you looking to create a ticket or incident in seconds? Do you want to convert slack messages into tickets? With pagerly, you can create a ticket or an incident to the right team with the right information in seconds.

Executive Summary Episode 6: AI + Human Insights: Partners in Cybersecurity, feat. Rob May

Ivanti’s latest research found that cybersecurity teams are largely positive about the role of AI in protecting against and opposing AI-powered attacks. Yet, despite this optimism, many security professionals lack the proper understanding and defense strategy to address the risks today’s AI threat landscape poses. How can cybersecurity teams prepare themselves to fend off sophisticated AI-powered attacks and leverage AI effectively in their security strategy?

VoIP and WAN Performance Monitoring and Troubleshooting with VoIP & Network Quality Manager

Tired of end-user complaints about VoIP call quality? Learn how SolarWinds VoIP & Network Quality Manager monitors WAN performance of your remote sites by tracking key edge-to-edge router and VoIP call paths to ensure call quality using Cisco IP SLA technology that can be used standalone or integrated seamlessly with Network Performance Monitor. VoIP & Network Quality Manager correlates call detail records (CDRs) with Cisco IP SLA Operations, and delivers VoIP call statistics for VoIP troubleshooting through a highly intuitive web interface that offers point-and-click simplicity and easy access to call performance statistics.