raygun

Useful tools to manage your application's secrets

When you build and deploy an application, chances are that you need to store some form of secrets. These are typically things like credentials for 3rd party systems and database credentials. As an ASP.NET Core developer, Microsoft provides you with an easy way to store secrets like these in your development environment, namely the Secret Manager.

Why I Invested in Opsani with Jocelyn Goldfein, Managing Director at Zetta Venture Partners

Based on her experience at companies like VMware and Facebook, Jocelyn knew that applying AI to infrastructure was an area of great opportunity. With Opsani, she found a perfect application of AI to a hard and important problem, with unique technology created by an incredible team.

Changing the Way People Deploy Applications in the Cloud with Ross Schibler, CEO of Opsani

Rather than guessing at how applications should be deployed in the cloud, Opsani uses AI to determine the optimum application, middleware, and resource settings. The business impact is huge: improved performance and user experience, greater efficiency, and lower costs lead to increased revenue and profit.
onedesk

How A Systems Design Company Uses OneDesk for Customer Communication & Ticketing

Technology is revolutionizing every aspect of our lives, and the health sector is not an exception. The industry is actively blending newer life-saving technologies on an ongoing basis. Research indicates that about 86% of healthcare service providers and related organizations are already using artificial intelligence, and the numbers continue to grow.

pagerduty

A DevOps-Principled Approach to Inclusion, Diversity, and Belonging

Many organizations are transitioning to DevOps, a software practice where developers both write and operate their code. This transition is often driven by digital transformation and the need to innovate faster while being always on, 24/7. But what does DevOps have to do with diversity, inclusion, and belonging?

sumologic

How to monitor NGINX logs

In part one of our introduction to NGINX “What is NGINX” , we went over the basic history of NGINX, the difference between Apache and NGINX, and why you would use NGINX over Apache in certain environments and web applications. Today we’ll be diving deeper into NGINX and going over topics such as web server performance, monitoring said performance, how to obtain and archive logs for deeper analysis, and how to even tell which web server you’re running on your environment.

zendesk

Upgrade your Suite: Introducing Suite Ready partners

Most companies understand the importance of implementing omnichannel support—however, despite efforts to provide customers with a seamless experience, 85% of organizations still have fragmented channels. This is especially problematic for businesses since a cultural shift is underway, driven by millennials who have little desire to get support over the phone, instead preferring text or messaging channels.

panopta

Monitoring Kubernetes with Panopta

Kubernetes, Google’s open-source container management platform, offers one of the most robust toolsets for facilitating container configuration and automation. However, the level of abstraction that is native to Kubernetes presents a lot of challenges to monitoring and, while the level of abstraction and auto-scaling Kubernetes offers is incredibly powerful, without proper monitoring, it can create even larger pain points for your team and customers.

sqreen

Security interview: David Scrobonia on making security practical at Segment

Recently, we sat down with David Scrobonia, Application Security Engineer at Segment, to discuss his approach to security and what he’s learned as far as security goes throughout his career. We wanted to share the great insights that came out of our conversation. I started at Segment about two years ago as a security engineer. At Segment, our security engineering team is responsible for a couple different security areas: cloud, application, and product.