Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

#024 - Kubernetes for Humans Podcast with Gabriele Bartolini [EDB]

A long-time open-source programmer and entrepreneur, Gabriele has a degree in Statistics from the University of Florence. After having consistently contributed to the growth of 2ndQuadrant and its members through nurturing a lean and DevOps culture, he is now leading the Cloud Native initiative at EDB.

Web 2 vs Web 3 | What It Means and Why It Matters

While Web 2 caters to the current internet generation, Web 3 is known as the semantic web. In this video, we explore these two concepts, their differences, and their possible applications. The Internet has progressed rapidly from the early days of Web 1, which included static texts and visuals, to the current version – Web 2. We are presently entering the Web 3 era, in which value and data will easily move across decentralized platforms with distributed ownership and control. But, what else does Web 3 feature? How is it different from Web 2?

Setting Up the Latest AWS Observability Solution

The tutorial demonstrates how easy it is to deploy the AWS Observability Solution using the CloudFormation template using the quick and new method. The CloudFormation template being used in this method sets up an automated collection of logs and metrics from AWS to the Sumo Logic service.

Monitor Complex User Flows with Checkly's Multistep Checks

Learn how Checkly's new multistep checks help you to decrease incident response times with synthetic monitoring. Use multistep checks to chain and manage multiple API requests, run custom code for response validation, and get accurate alerts when incidents occur. This video explains how to create a multistep check to monitor a RESTful API from scratch. Do you have questions? Join our vibrant Checkly community on Slack and explore further!

Detecting, Investigating, and Responding to Threats: Best Practices

In this webinar, we will explore tips, trends and best practices for quickly and accurately detecting and responding to an always-evolving array of bad actors. Don't miss the chance to explain why your solution can help strengthen defences and give IT managers some peace of mind in an increasingly scary threat landscape.