Operations | Monitoring | ITSM | DevOps | Cloud

%term

The Role of Technology in Enhancing Incident Response Call Etiquette

The interconnectedness of today's business environment has significantly heightened the complexity of incident response (IR). The need for immediate action, precise communication, and real-time collaboration is more critical than ever. However, beyond the technical precision required in solving problems, there lies an often overlooked aspect of effective IR management: the etiquette of incident response calls.

Autoscaling in Cloud Computing

Autoscaling in cloud computing is the ability of a system to adjust its resources in response to changes in demand automatically. This guarantees that applications always have the resources they need to perform optimally, even during periods of high traffic. Autoscaling eliminates manual intervention, allowing your dev team time to focus on your product. All major cloud providers like AWS, Azure, and Google Cloud Platform offer robust autoscaling solutions with many features and capabilities.

Best Practices for Multi-Cloud Observability

If The Notorious BIG – the artist behind the iconic song "Mo Money Mo Problems" – had been an IT operations engineer, he might instead have labeled his hit "Mo Clouds Mo Problems." Why? Because the more clouds you have to manage and monitor, the more problems you're likely to run into.

Open Source Alternatives to Tracealyzer

Tracealyzer is a popular tool for visualizing and analyzing the execution of real-time systems, but its price tag can be a barrier for some developers. This guide explores powerful open-source alternatives that provide similar functionality for free, helping you choose the right tool for your embedded systems projects.

Understand how the Cyber Resilience Act will impact device manufacturers

The Cyber Resilience Act (CRA) is a European Union legislation that will enter into force in 2027. Its overall goal is to make devices safer by implementing more rigorous cybersecurity, documentation, and vulnerability reporting requirements for the IT industry. The CRA is especially relevant for device manufacturers, who will need to ensure devices are secure throughout the product lifecycle.

OpenFeature - A Guide to Open-Source Feature Flagging

Feature flags are crucial in modern software development, allowing teams to safely deploy and test new features. However, the absence of standardization has resulted in fragmentation and vendor lock-in. OpenFeature addresses this by offering an open specification for feature flagging, set to transform how developers manage and implement feature flags across various projects.

The Rise of Open Source Time Series Databases

Time series databases allow you to store and query metrics efficiently. For example, if you want to forecast load on your servers, or identify intermittent faults with your production services, time series databases can help. Besides infrastructure monitoring, time series databases have been invaluable in finance, IoT applications, manufacturing, and more. Many time series databases, including VictoriaMetrics, are open source.

Logic App Workspaces: A Comprehensive Overview

In this episode of Azure on Air podcast, Lex interviews Bill Chestnut, a seasoned MVP. Logic Apps Workspaces is a new feature in Azure that allows users to create and manage both Logic Apps and Functions in the same workspace, making it easier to share code and resources between the two. Bill discusses the challenges of writing code in Logic Apps and how Logic Apps Workspaces addresses these issues. He also shares his experiences with deploying Logic Apps and Functions using bicep scripts and Azure DevOps.

Investigating TCP timeouts at scale

At Mattermost, we’re on a quest to scale our application by one order of magnitude, from tens of thousands to hundreds of thousands of concurrently active users per installation. Scaling up is a complex effort involving expertise at several different levels. At its core, it’s a game of catching the next bottleneck — whether it’s application CPU usage, memory consumption, database throughput, networking, or any combination of the above (among other causes as well).