Operations | Monitoring | ITSM | DevOps | Cloud

%term

Want to Improve Your Postal Service Operations? Be More Proactive with Your Mobile Device Management

Editor's Note: This conversation was first started by John Wyer in 2021. Steve Mulroy picked it up in 2024 and added some new perspectives and recommendations for your consideration. I know your mail carriers are probably using mobile devices for everything these days – or supposed to be, anyways. Yet, in speaking with them casually, they’ve expressed three concerns about their current mobile technology: 1. Outdated devices or software.

Driving sustainability and excellence: a FinOps story at Platform.sh

FinOps Professional Sumaira Nazir defines herself by her commitment to growth. With a master's degree in psychology and a background in both business analysis and project management, Sumaira’s passion for self-improvement means she’s always in pursuit of her next professional milestone. In fact, this love of learning is part of what drew her to Platform.sh.

How Visa Cross Border Solutions Reduces Outages by Testing System Resilience in Their SDLC

For global financial services companies, reliability must be built-in and validated before and after shipping to production. Resilience testing is crucial for verifying the reliability of your applications under real-world conditions. But ad-hoc testing and exploratory experiments aren't sufficient: you need to run automated, standardized tests at global scale.

Artificial intelligence in healthcare: transforming the practice of medicine

In this episode of the Azure On Air podcast, Mick Badran joins our host to discuss his journey in the integration space and how he's applying AI and integration in the healthcare industry. He dives into the challenges and opportunities of using AI in healthcare and also shares his experiences with building a healthcare startup and working with medical professionals to improve patient outcomes.

How to Identify Advanced Persistent Threats in Cybersecurity

Cyber threats are a major concern. Individuals, governments, and businesses all feel the impact. The emergence of advanced persistent threats is one of the most alarming forms of cyber espionage (APTs). These hacks are notable for their intricacy, tenacity, and broad penetration capabilities, whether they target a mobile or web application. APTs can harm the target network, including heightened geopolitical tensions, data theft, and protracted service interruptions.

Ubuntu Early Days | 20 Years of Ubuntu | Reflections from the Canonical team

In this video, the Canonical team reflects on 20 years of Ubuntu. Canonical attracts a diverse team of experts united by one mission: to amplify the impact of open source. Many of the original contributors and team members behind Ubuntu are still around, including our Founder and CEO. So what was it that attracted them to get involved in a project like Ubuntu?

Step into the Role of a Crime Scene InvestiGITor!

Join 'Chief Inspector Detective Cadell' in his session at Civo Navigate Europe 2024, where he unveils the secrets of Git through a hilarious crime scene investigation! As broken unit tests and mysterious bugs abound, you’ll learn how to become a revered investiGITor, mastering the essential skills to solve version control offenses like a pro. From safely removing sensitive information to pinpointing the exact commit that broke your code, this session covers it all.

Making serverless applications reliable and bug-free

Building applications using serverless technology on AWS—like AWS Lambda and Amazon API Gateway—can be incredibly powerful. You get to scale effortlessly and focus on writing code without worrying about managing servers. But as your application grows and spreads across hundreds or even thousands of cloud resources, keeping track of errors and fixing issues quickly becomes a big challenge.