Operations | Monitoring | ITSM | DevOps | Cloud

Technology

The latest News and Information on APIs, Mobile, AI, Machine Learning, IoT, Open Source and more!

Find root causes in real time - Checkly Traces

At Checkly we’re always trying to help our users find and resolve issues 10x faster, and the OpenTelemetry project wants to enable more observability with open standards. I’m excited to share Checkly Traces, our new tracing solution built on OpenTelemetry, and how it can help you find the root cause of problems in real time.

Redefining incident management: the power and pitfalls of AI

Like it or not, AI is having a monumental impact on our lives. Most of the products we engage with today have AI features and functionality, aimed at assisting or completely replacing the actions normally taken by humans. When it comes to incidents, we’re firm believers of accelerating human actions, and believe the risk of over-automation far outweighs the benefits. In this live event we’ll dig a little deeper on why, as we cover the power and pitfalls of AI.

Setting the Record Straight: AI Does Not 'Exist to Harm or Take Over Things' (Like Some People Have Been Led to Believe)

I’ve been working with artificial intelligence (AI) for a long time, so I’m always curious to hear what new engineers think about its potential impact on our lives and the world at large. That’s why I recently sat down with Saliha Demir on our podcast.

Attention Researchers Looking for Ethical Solutions in Today's Modern World

Researchers in modern day Australia should be looking for ethical ways to conduct research on people, animals, in fact any living organism. Modern ethical research involving human beings is guided by principles designed to protect and respect participants throughout the research process. Here's an overview of the basics explaining what is ethics in research: By adhering to these principles, researchers aim to conduct studies that are ethically sound and respectful of the rights and well-being of human participants.
Sponsored Post

Improving Patch and Vulnerability Management with Proactive Security Analysis

Vulnerability management is the continuous process of identifying and addressing vulnerabilities in an organization's IT infrastructure, while patch management is the process of accessing, testing, and installing patches that fix bugs or address known security vulnerabilities in software applications. Vulnerability management and patch management are crucial SecOps processes that protect IT assets against cyber threats and prevent unauthorized access to secure systems. Effectiveness in patch management and vulnerability management depends on a proactive approach to cybersecurity where enterprise SecOps teams take steps to anticipate and prevent cyber attacks before they happen.

The MING Stack: What It Is and How It Works

The Internet of Things (IoT) is rapidly reshaping the world. From smart devices in our homes to connected sensors in industrial settings, the amount of data generated is rapidly increasing. But what use is this data if we can’t collect and analyze it in real-time to gain key insights? This is where the MING stack (which includes Mosquitto/MQTT, InfluxDB, Node-RED, and Grafana) comes in. This powerful combination of open-source tools is intended to simplify IoT data management.

Navigating Kafka: Challenges, Solutions, And The Future Of Real-Time Data Streaming

3). The complexities of real-time data streaming and auto-scaling in the cloud are no joke. But three are solutions to make it more simple and efficient. In this Data (R)evolution episode, Matan Mizrahi and Filip Yonov join us to discuss how Kafka effectively handles and optimizes data streams, the pursuit of standardized APIs, and the vital role of AI in optimizing complex systems. They also share how AI and open-source tools are transforming the landscape. Tune in to hear about the evolution of data streaming and the transformative impact of AI and cloud-native solutions.