Operations | Monitoring | ITSM | DevOps | Cloud

Connecting the World's Travel Trade with Kubernetes

When you book a hotel online or with a travel agent, you’ve probably got a wish list that has to do with the size of the room, view, location and amenities. You’re probably not thinking about the technology in the background that makes it all happen. That’s where Hotelbeds comes in. The business-to-business travel technology company operates a hotel distribution platform that travel agents, tour operators, airlines and loyalty programs use to book hotel rooms.

Graph Analytics Using Splunk and the Machine Learning Toolkit

Almost all data in Splunk can be turned into graphs, and that's possibly something you may not have considered before. In your network traffic data, a source IP connects to a destination IP with attributes like bytes in/out, packets, ports, and other properties. Users log into an interconnected stack of systems, services, devices and applications which are connected with each other. Transactions run from A to B to C and may describe a process that helps you analye user journeys and business processes in general.

5 minutes to onboard secure DevOps

Today, we are excited to announce a faster onboarding for Kubernetes visibility and security. With the SaaS-first approach and new enhancements to the Sysdig Secure DevOps Platform, you can get results after just a five-minute setup. This release includes a new guided onboarding process, out-of-the-box dashboards as part of curated essential workflows, and a new Sysdig Essentials tier.

3 Foundational Elements of Zero Trust You Can't Do Without

While the concept of zero-trust security has many IT organizations thinking in terms of identity, access, and cloud services, zero trust must run on a solid foundation. We should start by talking about the goals of zero-trust security. Zero trust involves creating an environment where each access request is first scrutinized to determine whether it should be allowed.

Automating your Feature Branch Repository Management with JFrog CLI

Feature branch workflows are used to isolate work done on a specific feature in a dedicated branch. This allows all development to be kept away from the team’s common codebase until completion. Essentially keeping the master safe from any risk until it is ready to be merged.

Ivanti Neurons for Healing: Shift All the Way Left to Self-Healing

If you are an IT professional, you are technical. You love technology. You love to dabble. You enjoy the thrill that comes from troubleshooting problems and finding a solution. But you probably don’t want to troubleshoot and fix problems all day. There are other interesting things to do. IT can be strategic in helping companies improve their top and bottom line. The complexity of IT continues to increase. The good news is that the need for talented IT staff also continues to grow.

Protect your Elasticsearch deployments against attacks like "meow bot" - for free

The issue of unsecured databases is growing. In 2019, 17 percent of all data breaches were caused by human error — twice as many as just a year before. And the IBM/Ponemon 2019 report found that the estimated probability of a company having repeated data breaches within two years grew by 31 percent between 2014 and 2019. Why is this happening?