Operations | Monitoring | ITSM | DevOps | Cloud

Codemania 2019: What we learned from global tech leaders

For eight years, Codemania has brought developers and technology enthusiasts together in Auckland. This year, 500 developers arrived to network, share ideas, and solve problems with an impressive speaker lineup that included developers, authors, and global tech leaders. As the day unfolded, we learned how Apple appears to achieve the impossible with their short product development lifecycles.

NiCE VMware Management Pack 5.10 released

The NiCE VMware Management Pack delivers first-rate monitoring for your business critical, highly dynamical virtualized environments. Taming the beast of VMware service outages has never been easier. Leverage your existing investment, reduce costs, save time and build efficiencies that will last beyond your expectations.

An Elasticsearch Tutorial: Getting Started

Elasticsearch is the living heart of what is today’s the most popular log analytics platform — the ELK Stack (Elasticsearch, Logstash and Kibana). The role played by Elasticsearch is so central that it has become synonymous with the name of the stack itself. Used primarily for search and log analysis, Elasticsearch is today one of the most popular database systems available today.

Help desk training - Your need-to-know IT service desk scenarios explained

Join this year's ServiceDesk Plus Masterclass webinar series for both on-premises and cloud. Learn how ServiceDesk Plus can help solve everyday IT service desk problems and maximize your service desk productivity while ensuring a great service experience.

CVE-2019-9929 - internal authentication secrets leaked in logs

The CFEngine engineering team has recently discovered a severe security issue in the CFEngine Enterprise product. CFEngine is using some internal secrets for authentication to the Mission Portal API and the PostgreSQL database when running background maintenance tasks. These internal secrets are randomly generated during the installation process and stored in files which only the root user has access to.

Deploying a Private Docker Registry to Cycle

Secure access to your own private registry helps control who has access to your images. Compared to usage-based services such as Docker Hub and Quay, a Cycle hosted private registry only consumes the resources you give it access to, yielding a more cost-effective deployment. Let’s take a look at how simple it is to deploy a private Docker registry on Cycle.

Cost: A New Critical Metric for DevOps

DevOps is a very data-driven practice. After the right cultural changes take place within an organization to adopt DevOps, teams often rely heavily on monitoring, measurement, and continuous improvement to keep their projects on track. The best teams use KPIs to benchmark their performance and report up to management. However, there’s one metric your DevOps team might not be tracking: The cloud cost of their engineering decisions.