Operations | Monitoring | ITSM | DevOps | Cloud

%term

Observability to Generative AI: Journey in Evolving IT Operations

For those of us managing the ever-evolving IT infrastructure, the days of simple cause-and-effect relationships are long gone. A performance dip in one application might affect microservices, destabilizing the systems. Alerts – flood in, logs – pile up, and even the most sophisticated monitoring dashboards often leave asking: Where do we even begin?

Corbin Crutchley talks about working with teams and his career in general | Software is a Team Sport

In this first episode of the "Software is a Team Sport" mini-series, Corbin Crutchley, a Staff Software Engineer at Descript, shares his incredible career journey—from scripting as a system admin to leading teams at startups and corporations like Hilton. Topics Covered: Corbin also discusses his passion for writing technical books and impactful documentation to empower teams and developers. Tune in for expert advice, fascinating stories, and practical tips on fostering teamwork in the software industry!

Navigating high-traffic events with proactive incident management

In this episode of "Founder & Friends," Raygun co-founder & CEO JD Trask sits down with Birol Yildiz, co-founder & CEO of ilert, the incident management platform. We're excited to sit down with Birol and hear about his experience in the tech industry, including how ilert came to life with their mission to support teams during high-stakes moments.

Navigating the NIS2 Directive and How SolarWinds Can Help

In 2016, the European Union (EU) established the Network and Information Security (NIS) directive as its first comprehensive cybersecurity directive. Now, the EU is updating the directive in response to evolving cybersecurity challenges. Let’s break down NIS2 and discuss how SolarWinds solutions can help your organization improve its security incident-handling capabilities.

Feature Friday #38: Developing modules that take input

CFEngine build modules are great for quickly integrating 3rd party policy into your policy set. Module input (not to be confused with inputs in body common control or body file control which are the list of policy files to load) allows you to define values that apply for a particular module as it’s integrated into your policy set. Let’s take a look at a case of extending a module to support input.

Essential Guide to Building an Effective AIOps Strategy

We often hear about the many benefits AIOps (Artificial Intelligence for IT Operations) brings to businesses. But how can you develop an effective AIOps strategy? Where do you even start? What are the best practices or implementation challenges? These and many more questions must be answered before beginning your AIOps journey. In this guide, we will explore the steps for creating an effective AIOps strategy and discuss crucial components, obstacles, and best practices for successful implementation.

GenAI security with confidential computing

Watch to explore how to ensure data security and privacy in AI applications that employ Large Language Models (LLMs). As generative AI becomes increasingly vital for enterprises – especially in applications such as chatbots utilizing Retrieval-Augmented Generation (RAG) systems – ensuring the security and confidentiality of data within these frameworks is essential. During this webinar: We will introduce confidential computing as a method for safeguarding data, with a specific focus on its application within RAG systems for securing data during usage or processing;

Optimizing Database Performance with MurmurHash and Atatus Monitoring

Atatus database monitoring takes you to the next level by offering comprehensive tools to track query performance, uncover bottlenecks, and optimize database efficiency. A core feature of our database monitoring is query signatures, where we leverage MurmurHash to generate unique, consistent identifiers for normalized SQL queries. This enables efficient aggregation and analysis of query metrics, even for complex workloads.

A Simple Guide To AWS Lambda Pricing And Cost Management

AWS Lambda is an event-driven compute service, which means it executes tasks automatically when triggered by a compute event. This automation also means that your Lambda costs can quickly exceed your budget. That is especially true when you’re not familiar with AWS Lambda pricing. In this guide, we’ll discuss the AWS Lambda pricing model, including how billing works and how to optimize Lambda costs.