Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Cloud Control Ep #29 Open Source Revolution How CNCF is Reshaping Cloud Infrastructure

In this episode, our host, Shon Harris, introduces Chris Aniszczyk, CTO of the Cloud Native Computing Foundation (CNCF) and a seasoned professional in the cloud industry, who explores his journey and experiences. With a wealth of knowledge and expertise, Chris sheds light on various aspects of cloud computing, from the evolution of cloud technology to the latest trends and innovations. This episode offers a comprehensive overview of the industry and provides valuable insights for both aspiring and seasoned professionals in the field.

All about Explore Logs for Grafana Loki (Loki Community Call October 2024)

In this Community Call, Senior Software Engineer Trevor Whitney talks to us all about Explore Logs for Grafana Loki, an open-source app for visualizing logs from Loki in Grafana without needing to learn and write LogQL queries. He is joined by Senior Developer Advocates Nicole van der Hoeven and Jay Clifford. Community Calls are monthly meetings that are open to everyone interested in the development of Loki. They are an opportunity for software engineers working on Loki to discuss new features as well as for open-source users of Loki to ask questions.

Datadog on OpenTelemetry

OpenTelemetry (OTel) is an open source, vendor-neutral observability framework that supplies APIs, SDKs, and tools to instrument, generate, collect, and export telemetry data (metrics, logs, traces and soon profiles). It has a vibrant ecosystem of components, integrations and vendors. In this episode, Juliano Costa will discuss OpenTelemetry with Felix Geisendörfer, Senior Staff Engineer on the Continuous Profiling team, and Pablo Baeyens, Software Engineer on the OpenTelemetry team.

What is the Cyber Resilience Act (CRA)? | Open Source Cybersecurity

Today, compliance is more important than ever before. As part of our #CybersecurityAwareness month series, we’re sharing essential insights on security compliance. Watch as Cédric Gégout, VP of Product Management at Canonical, breaks down the key aspects of the Cybersecurity Resilience Act (CRA), a new regulation set to take effect in 2027. In the video, you’ll learn what CRA is, how it classifies products, and what it means for your organization.

End-to-end Tracking of Azure Logic Apps consumption

In this video, Mike Stephenson demonstrates how to use a new feature in Turbo360's Business Activity Monitoring (BAM) to create a business process dashboard for Azure Logic App consumption. Learn how to easily integrate with Azure Monitor's diagnostic settings and create a friendly view of your transactions, empowering your users to see what's going on in your integration platform.

Transforming Developers: How Omid Givehchi Turns Code into Purpose!

Join Omid Givehchi, CTO of Susteco, as he shares invaluable insights from his extensive experience in corporate and startup environments at Civo Navigate Europe 2024. Discover how to involve and motivate developers with purpose, bringing their values and motivations beyond just coding. This transformative approach not only enhances the efficiency of development teams but also drives higher value toward business targets and goals. Omid discusses real-world applications of this methodology, highlighting successful strategies tested in various startups and corporations.

Why security needs to prioritize UX, Mike Riemer, Field CISO, Ivanti

Why security needs to prioritize UX, Mike Riemer, Field CISO, Ivanti Read the full report for more: ivanti.com/secure-experience Get expert advice on balancing security and employee experience in Ivanti’s research report: “Securing the Digital Employee Experience.”

Secure your stack with Canonical | Open Source Cybersecurity

Cybersecurity is an ongoing challenge for many enterprises, and safeguarding systems against evolving threats requires proactive, diligent security assessments and monitoring. Security and compliance is a challenge for organizations, with research showing that 84% of codebase contains at least one vulnerability and requires about 100 days on average to apply those fixes. In this video, Cédric Gégout, VP Product Management at Canonical, dives into the complexities of securing open source systems and company infrastructures, sharing insights from Canonical’s 20+ years of experience.