Performance Monitoring in GraphQL
Enrique Fueyo Ramírez is the Co-founder and CTO of Lang.ai. Here’s a post on how him and his team at Lang.ai instrumented performance monitoring for GraphQL resolvers.
Enrique Fueyo Ramírez is the Co-founder and CTO of Lang.ai. Here’s a post on how him and his team at Lang.ai instrumented performance monitoring for GraphQL resolvers.
Welcome to the Civo update for August 2021. It's was a busy month, with the big news being the launch of Civo Academy: A full Kubernetes learning program consisting of over 50 videos created in-house by the team here at Civo. We also kicked off the Civo DevOps Bootcamp! The first few live stream installments have been a huge success, helping developers at any stage of their career learn more about DevOps fundamentals.
Many people are familiar with the stories of coal miners using canaries to detect carbon monoxide and other toxic gases as a warning system for when they should evacuate. Even though cybersecurity is far removed from coal mining, it has an equivalent “canary in the coal mine” that takes the form of indicators of compromise, or IoC for short. So why should an MSP be concerned with looking for IoCs?
A service desk is the focal point of an IT organization to render services, and the quality of its services determines the perception of being a valuable part of the organization. The ongoing transition of businesses to adopt cloud infrastructure has forced IT organizations to modernize their service desks, which include vendors adopting cloud capability and smart automation powered by AI.
Here are the articles, videos, and tools that we’ve been excited about this July and August. We hope you enjoy these links, and we look forward to hearing what you’ve been reading in the comments or on the Interrupt Slack.
Information Technology (IT) has moved through many clearly defined eras. I don’t feel the need to list them all, but the latest one clearly is the move from discrete computers to virtualized software-configured environments, that we all colloquially call “the cloud”. And with each technological generation, we have improved the methods we use to integrate discrete modules of technology, and increased the level of automation.
It has been a while since I have been excited to write about encrypted tunnels. It might be the sheer pain of troubleshooting old technologies, or countless hours of falling down the rabbit hole of a project’s source code, that always motivated me to pursue a better alternative (without much luck). However, I believe luck is finally on my side.