Operations | Monitoring | ITSM | DevOps | Cloud

%term

Icinga 2 API and debug console

Have you ever experienced configuration issues, such as notifications not being sent as expected or apply rules not matching all expected objects, probably due to an incorrectly set custom variable? Icinga 2 has several options to assist you in such situations. Last time, Julian demonstrated how to analyse such problems using the icinga2 object list command. Today I will show you how to interactively investigate your problem using the mighty Icinga 2 debug console.

Navigating User Experience, Performance & Security

In the ever-evolving digital landscape, where users expect lightning-fast, seamless experiences, a thoughtful balance needs to occur between creating a unique website experience and achieving optimal performance whilst tackling the mounting threats posed by cybercriminals. This predicament places website owners and developers at a crossroads: How can they achieve great user experience (UX) while upholding stringent security protocols with a well-performing website?

Detecting Cryptojacking with Progress Flowmon

In the ever-evolving landscape of cybersecurity threats, cryptojacking has emerged as a stealthy and financially motivated attack method. In attacks of this type, cybercriminals hijack servers (or endpoint devices) to use the computing resources to “mine” cryptocurrencies. They get a financial benefit from this activity when they sell the newly minted currencies.

Revolutionizing the Microsoft Teams Experience: Yorktel and Martello Join Forces

In a strategic move aimed at redefining the Microsoft Teams experience, Yorktel, a global managed services provider, announces its dynamic collaboration with Martello’s Vantage DX. This innovative partnership is not just about adding a solution but about Yorktel’s commitment to enhancing their existing offering through the power of Vantage DX.

Elevate Your IT Outage Experience : Avoid The "Are You Down Chaos".

In today's digital age, IT outages can throw your operations into chaos, leaving you and your team scrambling to determine if you're down. Don't let the "Are You Down Chaos" disrupt your workflow! 🔗 In this video, we explore effective strategies to elevate your IT outage experience and steer clear of the confusion. Learn from real-world experiences as we share stories of how others successfully navigated through the turbulence of IT downtime.

Advancing MLOps with JFrog and Qwak

Modern AI applications are having a dramatic impact on our industry, but there are still certain hurdles when it comes to bringing ML models to production. The process of building ML models is so complex and time-intensive that many data scientists still struggle to turn concepts into production-ready models. Bridging the gap between MLOps and DevSecOps workflows is key to streamlining this process.

Critical Automation: Anomaly Detection for Application Observability

There’s no debate — in our increasingly AI-driven, lean and data-heavy world, automating key tasks to increase effectiveness and efficiency is the ultimate name of the game. No matter what job you hold today, you’re likely being pushed to not only do more with less, but also perform your work with a tighter focus on specific outcomes and SLOs.