Operations | Monitoring | ITSM | DevOps | Cloud

%term

Synthetic monitoring for TFA-backed applications

Two-factor authentication (TFA, sometimes 2FA) is a crucial security measure that adds an extra layer of protection to your online account. It goes beyond the traditional password-based authentication by requiring a second form of verification. In TFA-backed applications, users are supposed to provide two forms of verification before gaining access to their accounts.

The Three Most Common Sales Mistakes MSPs Must Avoid

The theme I wish to explore in this year’s series of blog posts is how to be a better salesperson and how to build a better sales model. Each month I will explore a particular sales struggle that may be impacting your sales success and provide a few insights and actionable strategies that can be implemented to help you or members of your sales team overcome these challenges so that you can become more effective in your role.

An SRE's Most Important Skill? Communication

I wish someone had told me that I shouldn’t hop between frameworks. Just like learning four programming languages in your first year, in my experience spending time content switching as a beginner is wasted effort. If I’d spent a solid year learning how to deploy services on AWS, then when it was time to learn Azure, I’d see more similarities than differences and find it a lot easier to pick up a second public cloud.

Optimizing Kubernetes Infrastructure: Minimizing Idle Resources | DevOps Tutorial

Welcome to our comprehensive DevOps tutorial on optimizing Kubernetes infrastructure! In this video, we will delve into the challenges faced by DevOps professionals when managing complex and dynamic Kubernetes environments. Specifically, we'll focus on the issue of idle resources and provide you with four effective techniques to minimize them with Spot Ocean.

AI on Public Cloud with Open Source

AI is at the heart of a revolution in the technology space. Organisations from all industries are looking for ways to put AI to work. Once they have finalised use case assessment, their next question is typically related to the environment they will use to develop and deploy their AI initiatives. They often prefer the public clouds as an initial environment, because of the computing power and ability to scale as projects mature. In addition to the infrastructure, enterprises need software where they can develop and deploy the machine learning models.

How to combine POMs (Page Object Models) with Playwright Fixtures for better developer experience

Page object models (POM) are common to encapsulate test automation logic and improve code readability. Learn in this video how to combine POMs and Playwright fixtures for effective end-to-end testing and synthetic monitoring with an excellent developer experience. Got questions? Join the Checkly community Slack. And tune in next week for more on Playwright, Synthetic Monitoring, and API Monitoring. Happy testing!

How Incidents Foster Leadership

To become battle-tested, you need to go through battles, not just read books or mentor newcomers. Both are helpful but the stakes are low. On the other hand, high stake jobs, such as running a big project or managing a team, are hard to get when you lack experience. So how can we solve this dilemma? Enter incident response.

A Beginner's Guide to Setting Up Status Pages with Uptime.com

Imagine your website or service suddenly goes offline, and, somehow, you’re the last one in the loop. Not the best start to your day, wouldn’t you say? This is where the hero of our narrative steps into the spotlight: status pages. These powerful tools are more than just digital canaries in the coal mine; they are the beacon of transparency and trust for your users, signaling that you’re on top of things—even when things go topsy-turvy.