Operations | Monitoring | ITSM | DevOps | Cloud

Monitoring Database Performance and Security side-by-side | The Tony and Tonie Show

Tony and Tonie discuss a new article by Denny Cherry, who has delved into some of the security monitoring features in Redgate Monitor that allow it to provide 24x7 surveillance of performance and security data, across all monitored databases and servers.

Unlocking efficiency with CircleCI's new multi-repo project model

In a traditional CI/CD pipeline, the instructions for how your pipeline should run are stored in the same repository as your application code, creating a rigid 1:1 relationship between your pipeline and project code. This approach has benefits, like keeping pipeline logic close to the code it supports, but it also introduces challenges, especially for organizations managing multiple repositories or microservices.

The Four Big Questions of Cybersecurity | Security Insights, Ep. 47

Ivanti's Chris Goettl and Robert Waters take on four big questions facing cybersecurity teams today, namely: Listen in for those questions and, if you're listening closely, a few answers too. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best. Ivanti is IT for the way we work now. Integrated solutions for everything IT touches. So, employees can work better, anywhere, and everywhere.

Inside Perspectives: Database infrastructure - from your data center to the cloud

When I look back at my career in technology, I’m amazed at the rate of change, but also by just how much has remained the same. My first introductions to database technology were FoxPro, SQL Server 2000 and Oracle, and the applications that ran on top of them.

Getting it right with GenAI in financial services: Where to focus in 2025

I attended ElasticON recently where we spent the day with our NYC Elastic community, talking about the combined value of vector databases using retrieval augmented generation (RAG) to feed large language models (LLMs) for next-level generative AI (GenAI) results. Elastic’s CTO and Founder Shay Banon kicked off his keynote with an important message: GenAI is not magic.

FinOps IT Asset Management: A Strategic Approach

FinOps IT Asset Management(ITAM) is one of the modern trends in the IT field, which is gaining increasing popularity among organizations in order to manage their financial processes and technological tools. When the FinOps term appeared simultaneously with the ITAM term, it became clear that their integration would offer the following advantages: better control of costs, optimized resource management, and legal compliance.

An introduction to Kubernetes multi-tenancy

Have you ever needed to serve multiple customers with a single instance of your application but ran into challenges like isolating each customer's data and configuration? If you have, then you've encountered a multi-tenant architecture. In this blog post, we'll introduce the core concepts behind multi-tenancy and explore how it works. We'll then dive into how Kubernetes, the popular container orchestration platform, provides primitives that enable building multi-tenant architectures.

Feature Spotlight - Incident Insights

To help mitigate and resolve incidents even faster, our AI-powered incident insights provide immediate and actionable suggestions during the response process and provide additional context during post-incident reviews. From the Insights panel, you can easily review suggested resolvers and information about similar incidents that may help with the resolution process. To help further speed things up, when an insight is more likely to help resolve the incident, it's displayed as a popup in the Incident Console.

Comparing Azure NSG and VNet Flow Logs

Phil Gervasi compares Azure NSG Flow Logs and VNet Flow Logs, explaining the benefits VNet Flow Logs bring to network observability in Azure environments. Learn how VNet Flow Logs simplify network monitoring, improve traffic visibility, and address the limitations of NSG Flow Logs by capturing traffic at the virtual network level. Learn about VNet Flow Log applications—including traffic analysis, network optimization, and security enhancement—and how Kentik integrates with these logs for deeper insights and advanced analytics.