Operations | Monitoring | ITSM | DevOps | Cloud

Three Steps To Get Started With Database DevOps

Once you’ve committed to changing your culture in order to automate your database deployments, what’s next? You’ve already done the hard part, making the decision to shift the culture. Now, what’s involved is just lots of labor. There are three things you can do to begin your Database DevOps journey: Let’s discus these in detail. It’s important to understand, not just why these are your first three steps, but why they should occur in this precise order.

How To Avoid Complex Pricing And Lengthy Contracts With Your Global Internet Access

When it comes to your business’s global internet access, network speed, security and performance are paramount. Many enterprises use a premium internet service to meet the needs of their global operations. One option available to them, which we have covered extensively already on this blog, is to use dedicated internet access across a private MPLS network. The other is to use an IP transit service.

Enhance API security with Apigee and Cloud Armor

APIs are great tools since they provide developers a simplified way to consume data and functionality that resides in backend systems. However, they are targets for malicious attacks because they contain business-critical information. In this video, we demo how Google Cloud can help you better secure your APIs with Apigee and Cloud Armor. Watch to learn how these tools offer security at multiple levels for your APIs!

Kubernetes Master Class: Declarative Security with Rancher, KubeLinter, and StackRox

As companies adopt containers and Kubernetes to accelerate application development, they’re wrestling with securing this new attack surface. Fortunately, the declarative, immutable nature of Kubernetes environments provides inherent security opportunities, and Kubernetes itself offers a broad set of native controls. However, these protections are not enabled by default, and many organizations are learning both the infrastructure aspects and the security aspects of Kubernetes in parallel.

Running commands securely in containers with Amazon ECS Exec and Sysdig

Today, AWS announced the general availability of Amazon ECS Exec, a powerful feature to allow developers to run commands inside their ECS containers. Amazon Elastic Container Service (ECS) is a fully managed container orchestration service by Amazon Web Services. ECS allows you to organize and operate container resources on the AWS cloud, and allows you to mix Amazon EC2 and AWS Fargate workloads for high scalability.

Azure Management Talk: 8 easy steps to improve your security posture in Azure

You've deployed your application on Azure. Instantly hackers are targeting your public IP and the brute forcing of passwords and ports starts. What now? Should I deploy Azure Sentinel, or just enable Azure Security Center as a start? Join MVP and Microsoft RD Maarten Goet as he takes you through the 8 easy steps into improving your security posture on Azure. This is a demo heavy session no cloud engineer or developer should miss!

What Are Shared Services? (Your Guide For 2021)

What are shared services? How does a shared service business model work? In this article, we will be breaking down everything you need to know about shared services. Are you trying to build a request-centric operations model that places an emphasis on simplified customer experience? We will be exploring the key benefits of adopting a shared services model. There has never been a better time to start exploring the consolidation of business operations.

The Mattermost server repo surpasses 20,000 stars on GitHub

In March 2021, the Mattermost server repository officially surpassed 20,000 stars on GitHub, and we couldn’t be more excited! Huge thanks to our community for their incredible support of the Mattermost open source project and their belief in the power of secure workplace messaging solutions built for developers by developers.