Operations | Monitoring | ITSM | DevOps | Cloud

Co-Managed Services: Your Secret Sauce for Client Retention

Forget fighting tooth and nail for every new client. In the fiercely competitive world of managed services, the real magic lies in keeping and building on the ones you already have. That’s where co-managed services come in—a secret weapon that turns you from a hired gun into a trusted tech partner. In our last blog, we discussed how co-managed services can help organizations bridge the IT talent gap.

Troubleshooting Microsoft Teams & Internet Performance for Multi-Site Businesses with Obkio: Isothermic Case Study

If your enterprise operates manufacturing facilities and multiple store locations, you're well aware of the management and communication challenges that arise from poor application performance, such as Microsoft Teams, and the disruptions caused by Internet VPN issues for both employees and customers. This case study provides a clear path to establishing effective network performance monitoring and troubleshooting these network issues.

TeamLogic IT and NinjaOne Announce Groundbreaking Partnership

We are thrilled to announce a groundbreaking partnership between TeamLogic IT, a leader in managed IT services, and NinjaOne, an innovator in scalable IT management solutions. This collaboration marks a significant milestone in the IT industry, signifying a joint commitment to excellence and innovation.

How To Set Up Remote Desktop Gateway

The modern work environment is no longer confined to the traditional office space. Whether working from home, traveling, or in satellite offices, employees need seamless and secure access to internal network resources. Remote access solutions bridge the geographical gap, enabling users to connect to the corporate network from virtually anywhere.

IT Compliance: Definition, Standards, and Risks

The IT compliance landscape is changing as governments address rising data security risks. As a result, organizations must stay on top of their risk management and security procedures to ensure compliance with new laws and requirements. Aside from these general regulations, organizations operating in more tightly regulated industries need to be aware of additional compliance requirements. Regulations are tightening, while data security is becoming more challenging and complicated.

What is Kubernetes Pod QoS?

Container orchestration, Kubernetes has emerged as a leading platform for managing and deploying containerized applications. One fundamental concept that plays a crucial role in ensuring optimal performance is the Quality of Service (QoS). In the realm of Kubernetes, this concept is applied at the level of Pods, forming the backbone of resource management within the cluster.

Chaos engineering in an Azure environment: Confident enough to try it?

What could go wrong with your Azure environment? Netflix gave the world two beautiful gifts: a media streaming platform for the general public and a wonderful monkey for the tech community. Enough has been said about the media streaming part, so let's play (or work) with the monkey now. When Netflix let the world know about Chaos Monkey, the tech community took a minute to stand and applaud. Since then, it has been a standard to unleash intentional chaos just to see how robust our tech stacks really are.

The revolution in critical incident response at Dock: efficient integration and service improvement

In this article, we will explore how Dock is working to significantly enhance its response time to critical incidents, emphasizing effective integration between tools as key to success. We will address how we challenge the conventional approach by shifting the focus from Mean Time to Acknowledge (MTTA) to Mean Time to Combat (MTTC), a customized metric that measures the time between incident detection and effective communication involving professionals capable of resolving it.

How dependency discovery works in Gremlin

Modern applications are rarely created entirely from scratch. Instead, they rely on a framework of pre-existing applications and services, each adding specific features and functionality. These dependencies empower teams to build and deploy applications more efficiently, but they bring their own set of challenges. Tracking, managing, and updating these dependencies is difficult, especially in large, complex applications where dependencies are likely managed by different teams.

Testing logging code with Microsoft.Extensions.Logging and FakeLogger

Unit testing is most often used for testing business logic. But what if you want to ensure that your code logs important messages to your log store? In this post, I'll introduce you to FakeLogger and how it can be used to test logging code when using Microsoft.Extensions.Logging and the ILogger interface. So, let's start by discussing why to even unit-test logging code. Adding good logging to your code is an often forgotten or down-prioritized practice.