Operations | Monitoring | ITSM | DevOps | Cloud

Streamlining runtime diagnostics with on-demand profiling: Inside Roblox's observability stack

Each day, more than 70 million active users sign into Roblox to create, play, and interact with each other through virtual experiences. And regardless of what those experiences are, exactly — adopting a pet, completing an obstacle course, or fulfilling orders at a virtual pizza parlor — the Roblox observability team is dedicated to making them seamless.

What is a Checksum & How to Use One

Checksums play an important role in various fields, from data integrity verification to cyber security. They are essential tools for ensuring the accuracy and security of data transmission and storage. While exploring what a checksum is, you will discover its significant role in cyber security, how to use checksums effectively, and best practices for their implementation.

Scaling into the unknown: growing your company when there's no clear roadmap ahead

During a recent episode of ⁠The Debrief⁠, we spoke with Jeff Forde, Architect on the Platform Engineering team at Collectors, about building an incident management program at various stages of growth. In that episode, we called it growth from zero to one, one to two, and two to three. But what happens once you’ve scaled beyond three and answers to question you may have become that much harder to find.

CSM to ITSM Migration: A Panel Discussion #ITSM #ITSolutions

Three Ivanti customers at various stages of migration – Maxar's Allison Hull, Fareway Stores' Steve Clime, and Memorial Health Ohio's Barbara Munger – give their firsthand perspectives on a successful journey from Cherwell Service Management to Ivanti Neurons for ITSM. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

Software Change Impact Analysis: 3 Benefits of Knowing What Your Code Will Do Before You Merge

When’s the last time you did something without knowing how it could turn out? Surprises can add a little excitement to your day-to-day, but one place they’re not really welcome is in infrastructure code. That’s why we have change impact analysis, a method of predicting the effect one change can have on other parts of a system before you make it. Software change impact analysis, as you might imagine, assesses how changes to a piece of software can affect other parts of the same system.

WAN Management: Optimize User Experience and Maximize Cost Savings

For IT operations teams running modern networks, the work can be challenging and thankless. These teams don’t ever receive congratulatory messages from executives when a video conference operates flawlessly—they only hear complaints when those sessions are problematic.

Investigating Mysterious Kafka Broker I/O When Using Confluent Tiered Storage

Earlier this year, we upgraded from Confluent Platform 7.0.10 to 7.6.0. While the upgrade went smoothly, there was one thing that was different from previous upgrades: due to changes in the metadata format for Confluent’s Tiered Storage feature, all of our tiered storage metadata files had to be converted to a newer format.

Unleash superior workflow oversight for Power Automate Flows

Azure Power Automate is a cloud-based service provided by Microsoft that allows users to create automated workflows between their favourite apps and services to synchronize files, get notifications, collect data, and much more. With Azure Power Automate, users can seamlessly integrate various Microsoft and third-party applications, such as Microsoft 365, Dynamics 365, Salesforce, Twitter, and Dropbox, among others.