Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Building confidence via automated container security scanning - Xavier Vello - DockerCon EU 2018

Container image security scanners are one of several tools we use in our development process to ensure the software that we ship to our customers is reliable and safe. In this talk, we’ll discuss our approach to continuous vulnerability monitoring (spoiler: it’s all automated), and how it increases our responsiveness while decreasing our operational cost.

Accelerating Incident Response With Real-Time Business Data at Wayfair

Like any good e-commerce company, Wayfair collects a significant amount of data to use for business intelligence. Until recently, the majority of this data was crunched off-hours in preparation for business use the next day. We also create a great deal of data about our applications and infrastructure in real time.

Volunteers, Not Conscripts: Fixing Out-Of-Hours On-Call at Intercom

Uptime matters. At Intercom, we believe that keeping our product online and working well at all times is critical to the success of our business. Out-of-hours on-call is inherently disruptive to your life as an engineer. You need to be ready to respond quickly and competently to an alert about something being broken.