Operations | Monitoring | ITSM | DevOps | Cloud

%term

A Taste of Observability - Embrace the Cloud With OpenTelemetry

Join Splunk Observability expert Kirk O'Quinn and Monster CICD Lead Graham Bucknell for a conversation on OpenTelemetry (OTel), a powerful open-source project that is transforming how we monitor and trace applications. In this informative session, we will delve into the world of Otel, exploring its history, its roadmap and we will discuss lessons, and success/failures of “Companies” journey to OpenTelemetry.

How to work with multiple data sources in Grafana dashboards: best practices to get started

Grafana dashboards enable you to visualize and correlate data from a wide range of sources. With a centralized view of your data, you can troubleshoot faster, make better decisions, and streamline monitoring. But for those of you ramping up with Grafana, you might have a few questions about how, exactly, to create these rich dashboards featuring data from disparate sources, or even how to incorporate multiple queries from a single source into your visualization.

Building Trust for Enhanced Customer Engagement

Building Trust for Enhanced Customer Engagement The Power of Trust: Discover why building trust with partners is essential for boosting customer engagement. Centralized Renewals Management: Learn how a centralized renewals team can effectively manage renewals and create tech refresh opportunities. Engaging All Customers: Explore why vendors excel with major clients but struggle with smaller customers, and how to bridge this gap.

How to Get Visibility of Your True Attack Surface

Mastering Your Attack Surface: A Deep Dive into ESM! Understanding Your Attack Surface: Explore the concept of an attack surface, including managed, third-party, and unknown assets. Learn about the challenges customers face in complex IT environments, from rising cyber threats to compliance requirements. The Rise of ESM Tools: Discover why the use of External Security Management (ESM) tools is growing due to increased cyber attack awareness. Implementing ESM.

Introducing AI-Enhanced Data Generation to Redgate Test Data Manager

We’re excited to reveal our latest effort towards simplifying and accelerating the test data management process: AI Synthetic Data Generation, part of Redgate Test Data Manager. Officially introduced in a session at the recent PASS Data Community Summit, the capability uses machine learning to rapidly generate realistic yet entirely synthetic data – all while maintaining data integrity and with data privacy built-in as priority.

Ivanti Announces Android 15 Readiness

At Ivanti, providing our customers with uninterrupted functionality and availability is important to us. So, we are pleased to announce that for the release of Android 15, our UEM products are ready for this update. That means our customers can enjoy a smooth transition to Google's latest Android release on Day Zero. This readiness for the new release is another example of how we continuously bring new functionalities to our products by working with customers and partners.

The Battle of AI: ChatGPT vs Gemini

We all know that AI is becoming as integral to our lives as the internet. Regardless of how you use it, whether for work or just for fun, it is a decent tool for getting information and ideas quickly. Whichever one you use, you can ask it for whatever you want without searching through dozens of web pages that are often filled with ads or data trackers. That being said, there are still privacy concerns regarding AI, so while we will look at ChatGPT vs.

Observability 2.0: Don't repeat sins of the past

If you are moving in the observability circles, chances are that you have heard the phrase “Observability 2.0,” which refers to how we need a new approach to observability. I am incredibly excited about the energy and discussion around a shift to “Observability 2.0,” as we now have a second chance to develop observability the way it was originally envisioned.

Our Plans for Open Source Puppet in 2025

In early 2025, Puppet will begin to ship any new binaries and packages developed by our team to a private, hardened, and controlled location. Our intention with this change is not to limit community access to Puppet source code, but to address the growing risk of vulnerabilities across all software applications today while continuing to provide the security, support, and stability our customers deserve.