We recently ran a quick poll where we asked the audience, “When an IT incident occurs at your company, what TV show does it most resemble?” Twenty-three percent of respondents told us that CSI: Crime Scene Investigation resembled them the most. We needed to dig into that a little deeper. Let’s walk through the typical steps of figuring out the root cause, in CSI fashion: Photographs are critical in the world of CSI.
Hey, here’s some exciting news worth sharing near and far. Industry research firm IDC has positioned Ivanti in the Leaders category in its 2020 IDC MarketScape for Worldwide UEM Software report. This follows on the heels of Gartner placing Ivanti as a Leader in the Gartner Magic Quadrant for IT Service Management Tools in October 2020.
Two weeks ago, Icinga 2 Config Sync: Behind the Scenes explained how the config sync in Icinga 2 works and how you can look behind the scenes. Today, we will put our knowledge from that post to the test and try to manually replicate the config sync. The most important takeaways will be recapped in this post, but if you are interested and have the time, the other post is also worth a read.
With Elastic App Search, you can add scalable, relevant search experiences to all your apps and websites. It offers a host of search result personalization options out of the box, such as weights and boosts and curations. You could also add a these documents might interest you feature, which would surface additional content for users, similar to documents they’ve previously searched for. This post walks you through the process of creating this capability using the robust App Search APIs.
On October 22, 2020, Shipa launched a new web series called “Coffee & Containers.” C&C was conceived as a place for practitioners and IT leaders to learn and collaborate on all things microservices, cloud-native, containers, Kubernetes, etc. We were very proud to launch this series with Kelsey Hightower, Thought Leader and Developer Advocate at Google Cloud Platform, and Bruno Andrade, Founder and CEO of Shipa.io.
The modern enterprise network is akin to the transcontinental railroad system in the United States in the early 20th century: it was far-reaching and commerce depended upon the reliability of the rail service connecting crucial goods with Americans in every town and city. Likewise, networks today are intrinsic to commerce (and daily life) yet they are entangled and multi-layered.
Every organization that uses AWS has a set of user accounts that grant access to resources and data. The Identity and Access Management (IAM) service is the part of AWS that keeps track of all the users, groups, roles and policies that provide that access. Because it controls permissions for all other services, IAM is probably the single most important service in AWS to focus on from a security perspective.