Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Charmed Kubeflow 1.9 enters general availability with new support for GenAI

Kubeflow 1.9. Kubeflow is a fully open source MLOps platform, part of the Cloud Native Computing Foundation (CNCF) as an incubation project. Canonical is one of the project’s official distributors, ensuring security maintenance of the container images, tight integration with the wider AI/ML ecosystem, and delivering enterprise support and managed services. The latest release offers new features related to GenAI, enabling organisations to run any new initiative in production.

Unlocking Business Insights with Telemetry Pipelines

Imagine running a large company where data-driven decisions give you a competitive edge. You use a lot of business intelligence tools that tap into vast amounts of data, such as sales figures, inventories, and expenses. This analysis tells you how your company is performing. However, it does not reveal how your "company infrastructure" is performing. This crucial information comes from your systems in the form of telemetry data, such as logs and events.

GitOps Secrets with Argo CD, Hashicorp Vault and the External Secret Operator

Teams adopting GitOps often ask how to use secrets with Argo CD. The official Argo CD page about secrets is unopinionated by design and simply lists a set of projects that can help you with secrets. We’ve seen several approaches to secret management. These include sealed secrets, the Argo CD Vault plugin, and the External Secret Operator. In this post, we showcase the External Secret Operator and Hashicorp Vault and focus on 2 important aspects.

Transforming IT Operations at a Large Public Sector Bank with HEAL

In today’s digital age, IT organizations face numerous challenges that can hinder their ability to provide seamless services. Common pain-points include frequent outages, unexplained end-user experiences, negative brand impact, unaccomplished business demands, and complex application environments. These issues are exacerbated by technology silos, an overload of alerts, inaccurate and prolonged root cause analyses, and inadequate current SRE/DevOps tools.

Kubernetes Security: The Essential Role of Guardrails

In today’s rapidly evolving technology landscape, Kubernetes has become essential for deploying and managing containerized applications. As organizations increasingly rely on Kubernetes to scale their operations, the need for robust guardrails becomes paramount. In this context, guardrails refer to the policies and mechanisms that ensure the safe and efficient operation of Kubernetes environments.

Comprehensive SharePoint Glossary

Welcome to the comprehensive SharePoint glossary. This resource is designed to help you understand the various terms and concepts associated with SharePoint, a powerful platform used for collaboration, document management, and business processes. Whether you are new to SharePoint or looking to deepen your existing knowledge, this glossary provides clear and detailed explanations to guide you through the complexities of the platform.

The Art of Member Engagement: Next-Level Management Techniques

Engaging members effectively is crucial for any organization. Whether you're managing a club, association, or online community, keeping members involved and motivated is essential for long-term success. This article will explore various techniques to enhance member engagement and ensure your community thrives.

Quantifying the Invisible: Strategies for Effective Cyber Risk Assessment

In today's digital age, businesses of all sizes face the growing threat of cyberattacks. These attacks can range from small data breaches to large-scale ransomware incidents that disrupt entire operations. Because of this, understanding and managing cyber risks is crucial. One of the most important ways to do this is through cyber risk assessment. But how do you measure something that's not always visible? This article will explore strategies for effective cyber risk assessment and help you understand how to protect your business from cyber threats.

Virtual Presence: Perfecting Your Video Interview Technique

In today's digital world, video interviews are becoming more common. Whether you're applying for a job, participating in a remote meeting, or just catching up with friends and family, knowing how to present yourself well on camera is important. This article will guide you through the best practices for video interviews, ensuring that you come across as confident and professional.

Virtual Adversaries: Testing Defense Strategies in Cyber Range Environments

In today's digital world, cybersecurity is more crucial than ever. Organizations must be ready to protect their data and systems from a variety of cyber threats. One effective way to prepare for these threats is by using cyber ranges, which are specialized environments for testing and improving security strategies. A key component of these environments is the use of virtual adversaries. In this article, we will explore what virtual adversaries are, how they help in testing defense strategies, and why they are important for enhancing cybersecurity.