Operations | Monitoring | ITSM | DevOps | Cloud

%term

How NeuVector Leverages eBPF to Improve Observability and Security

There’s been a lot of recent interest in eBPF (extended Berkeley Packet Filter) and its application for container security solutions. Let’s examine eBPF’s features and benefits and how NeuVector utilizes them to enhance its full-lifecycle container security solution.

How Do ITSM, BRM, Agile and Project Management Frameworks Work Together, With David Tomlinson

A central focus of any business or organization is to build and foster efficient management practices across their teams. This often entails leveraging various frameworks and methodologies tailored to the specific aspects of business operations. So, what do ITSM, BRM, Agile, and Project Management frameworks have in common? What sets them apart? Are there ultimately better frameworks than others? How do you choose the right one? How do you implement them successfully?

Rancher Live: The legal aspects of open source

Kubernetes and cloud-native technologies have become widely adopted in the last decade, making them ubiquitous. This has significantly contributed to the open-source movement and highlighted the importance of policymaking in the successful adoption and sustainability of the ecosystem. However, understanding and navigating the complex legal landscape on the path to production can be challenging, particularly for developers seeking to understand the ecosystem. That’s why, in this episode of Rancher Live, we will take a slight detour from talking tech to deconstructing some key policy issues associated with open-source software with OpenUK's CEO, Amanda Brock.

Mastering Citrix SD-WAN Monitoring for Maximum Network Efficiency and Visibility

As more and more companies seek to enhance their network infrastructure, the adoption of SD-WAN solutions has become increasingly common. These solutions offer promising benefits, from optimizing application performance to reducing costs associated with traditional WAN architectures. However, while many SD-WAN vendors tout monitoring capabilities, they often fall short of providing comprehensive network visibility and proactive monitoring. So, what's the missing link?

Design Details: On-call

On your bedside table sits a piece of software designed to wake you up. It loves bothering you when something goes wrong — and making it your responsibility to sort it out Meet the new incident.io On-call app. We designed it this way: to be as interruptive as possible. Whether you’re watching telly, at the gym, or as mentioned, fast asleep, it’ll get you. Got called even though you’re in silent mode? Great! We’ve done our job properly.

Strategies for Scaling Systems Reliably by Bob Lee

I was out there in sunny Austin this February, speaking at Civo Navigate 2024. The event was jam packed with amazing talks, and it was great meeting so many people with long and fascinating careers in engineering and Site Reliability. I had the privilege of meeting Bob Lee, who currently leads DevOps at Twingate — a cloud-based service that provides secured remote access, and poised to replace VPNs.

Containerization and DevOps Optimizing Deployment with Docker and Kubernetes

DevOps practices have revolutionized how teams build, test, deploy, and manage applications, enabling rapid delivery without compromising quality. Central to this paradigm shift are containerization technologies like Docker and orchestration platforms like Kubernetes. In this article, we’ll explore how containerization and DevOps intersect, and how leveraging Docker and Kubernetes can optimize deployment processes.

Insights Into Our Marketing Playbook

This week, Josh and Ben dive deep into the marketing strategy for their new product, Insights, in response to a listener question. They talk about what groups they are targeting first, some of the planned marketing tactics for reaching each group, and how they are building awareness within the Honeybadger app without annoying existing users.

5 Top Network Scanning Tools in 2024

Network device scanning effectively ensures connected devices and applications to your network perform as per the expected standards without any vulnerabilities. Regular network scanning allows you to gather data from the connected devices and applications to check their uptime and performance. It can also allow you to safeguard your network devices and applications from cyberattacks.