Operations | Monitoring | ITSM | DevOps | Cloud

July 2024

Securing and Configuring AI Environments: AI in Operations

The artificial intelligence (AI) revolution is here. If you’ve been following the meteoric rise of companies like NVIDIA, you understand that the AI revolution isn’t just a passing hype cycle. To train complex models like Large Language Models (LLMs), organizations are turning back the dial to private data centers and high-performance computing (HPC) infrastructure — which requires thousands of servers all working in harmony.

The Patch Management Process: A Full Overview (Plus the Steps Most Teams Miss)

A patch management process lays out the steps associated with updating software and hardware. Every patch management process shares a few core similarities, but with so many tools for managing patching in so many different kinds of setups, no two IT teams’ patch management processes look alike. What does your patch management process look like? Are you always ahead of the game and ready to patch on time, or are you usually behind schedule and not sure where you’re getting stuck?

What is GitOps? Examples, Use Cases, and More

This blog will be the first in a three-part blog series where we explore the benefits of the GitOps practice, how to get the most from GitOps, and how to measure and maintain success. Here is what you can expect from the series: Let’s start at the very beginning — what is GitOps? If you want to start to build a single source of truth for both your code and your infrastructure, if you want to ensure your deployments are automated and reliable, you’ll want to know GitOps.

VM Configuration: Using IaC to Stand Up Consistent Virtual Machines & Cut Down on Complexity

Configuring virtual machines (VMs) is an important task for any organization. Users across departments depend on sysadmins, engineers, and the rest of the IT ops and infrastructure teams to get VMs secured and ready to use, whether you’re spinning one up for a quick test, a new database server, or standing up a whole fleet of dev-ready machines. That need for variability AND consistency can also make VM configuration one of the most tedious sysadmin tasks, especially at enterprise scale.

Enhancing Security Best Practices: Lessons from Puppet's Proactive Approach to GitHub Repository Management

As a part of Perforce, we are committed to maintaining the highest standards of security for our products and our customers. Recently, we had the opportunity to further strengthen our security practices thanks to valuable input from an independent security researcher. This experience has not only reinforced our robust security protocols but also provided insights that we're eager to share with the wider tech community.