Operations | Monitoring | ITSM | DevOps | Cloud

Technology

The latest News and Information on APIs, Mobile, AI, Machine Learning, IoT, Open Source and more!

Understand the scope of user impact with Watchdog Impact Analysis

Watchdog is Datadog’s machine learning and AI engine, which leverages algorithms like anomaly detection to automatically surface performance issues in your infrastructure and applications. Without any manual setup or configuration, Watchdog generates a feed of Alerts—on anomalies such as latency spikes, elevated error rates, and network issues in cloud providers—to help you reduce your mean time to detection.

How Artificial Intelligence And Machine Learning Are Transforming The Future Of Renewable Energy

We use energy in many different ways in our lives, be it for lighting up our houses, running electronic appliances or as fuel in our vehicles. There are mainly two types of energy: renewable energy and non-renewable energy. Non-renewable energy includes fossil fuels like natural gas, petroleum and coal. However, these energy sources come from nature itself; it is impossible to renew them quickly. This means that these resources will become entirely exhausted in the upcoming years.

What are Webhooks and why do they matter to SCOM?

A Webhook is an API that delivers data from applications when an action or event occurs. When an event is triggered within the source site, it is seen by the Webhook, which collects the data and sends it to the desired application or URL in the form of an HTTP request. Webhooks are also instant, triggering the delivery of data in real-time, this makes them faster and easier to implement than other methods, like polling.

Linux made easy on RISC-V with Ubuntu

In the past decade, open-source and open standards have reshaped the world of technology and produced long-lasting results. With the open Instruction Set Architecture, the RISC-V consortium has extended open-source to the world of processor architecture. At Canonical, we believe in the power of open source to transform the world – that’s why we are committed to porting Ubuntu to RISC-V, combining the best open-source architecture with the best open-source operating system. Our mission? Further facilitating the adoption of novel computing architectures.

Splunk Mobile for Private Networks

Are you working in a secure environment and want to take advantage of Splunk Mobile and Connected Experiences? Welcome to Private Spacebridge, a version of Spacebridge that you can deploy and manage in your own Kubernetes cluster. Check out this video where Joe, our SR Spacebridge engineer, explains what Private Spacebridge is all about and how it works to get you securely routing mobile traffic through your environment.

Embedded systems: the advent of the Internet of Things - Part II

This is the second part of the two-part blog series covering embedded Linux systems and the challenges brought about by the proliferation of Internet of Things (IoT) devices. In Part I, we surveyed the embedded ecosystem and the role Linux plays within that space. This blog takes you on the next step in the journey, where we explore the most demanding challenges facing manufacturers of tightly embedded IoT devices.

Take your data to the cloud and chill - with Aiven!

Aiven’s fully managed data solutions take the pain out of cloud infra – everything is already set up for you. Just select the services and tools you need, pick a cloud provider and your storage needs, and you’re good to go. You can deploy a cluster in under 10 minutes. We offer rock solid, reliable, open source data infra – with no hidden costs. Pick and choose from Apache Kafka, Apache Cassandra, PostgreSQL, MySQL, OpenSearch, Redis, InfluxDB, M3 and Grafana in more than +100 regions around the world on AWS, GCP, Microsoft Azure, DigitalOcean, and UpCloud platforms.

Private 5G and Private LTE For Communication Service Providers

As we progress further into the next phases of the wireless evolution, we find that enterprises and consumers have an insatiable appetite for speed and new services. They are adopting the current 5th Generation (5G) mobile network as quickly as it becomes available. However, they require use cases with unprecedented mobility, security, low-latency and tighter integration between wireless and mission critical applications.