Operations | Monitoring | ITSM | DevOps | Cloud

%term

How We Boosted Page Speed By 58% ...and how you can too!

Over the past couple of weeks we've been optimising the Downtime Monkey website to reduce page load time. We've had some excellent results: in the best case scenario we cut page load time by 58% and even in the worst case, the page load was still 9% faster. All of the changes that were made are straightforward and we've provided in-depth details of the optimisations so that you can apply them to your own website.

Spectre and Meltdown Vulnerabilities For GroundWork Users

Reports have recently surfaced about Spectre and Meltdown vulnerabilities in most modern computer systems. These so-called side-channel attacks can allow one program (e.g. a browser) to infer and even read data used by the CPU to execute another program… even a more privileged one. These vulnerabilities affect phones, ​tablets, ​desktops, servers, and cloud computing services.

Mattermost 4.6: Faster channels, enhanced 508 compliance

Happy New Year! We just shipped our January 2018 update and there’s a lot to be excited about. Mattermost 4.6 includes several web app performance improvements, including channels that switch faster than ever before. Plus faster loading of images, thanks to higher compression, and less memory used to manage channels, thanks to optimizations.

4 Atlassian tips to bring your service and development teams together

We’ve been hard at work for over 15 years building software to help you collaborate better. But if you work on an IT or customer support team, you know it takes more than the right software to build a culture of collaboration between your service teams and dev teams. You also need to have a set of best practices to help you use your collaboration tools to their fullest potential.

Visualizing Meltdown on AWS

On January 3, 2018, the Meltdown and Spectre CPU architecture flaws were announced to the world. Due to early leaks, the announcement was made roughly a week earlier than planned. These bugs are easily the largest vulnerabilities announced in the last decade and require a complete reassessment of microprocessor architectures, and how software and hardware interact.