Operations | Monitoring | ITSM | DevOps | Cloud

DevOps

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Are you ready for DORA?

Not to be confused with the popular children’s TV character, DORA is a new EU regulation for the financial sector, which stands for the Digital Operational Resilience Act. DORA became law on 16 January 2023 and will start to apply from 17 January 2025, so it’s crucial that senior executives in the financial sector, such as Chief Risk Officers and Chief Information Security Officers, understand its implications and prepare for compliance from day one.

Why Multicloud Cost Optimization Is Harder Than It Looks, and How to Do It Right

If your business is like most businesses that use the cloud today, you've gone multicloud. Nine out of ten large companies have already adopted multiple clouds, and IT analysts expect that even more businesses will embrace multicloud architectures over the next several years.
Sponsored Post

5 ELK Stack Pros and Cons

Is your organization currently relying on an ELK cluster for log analytics in the cloud? While the ELK stack delivers on its major promises, it isn't the only search and analytics engine - and may not even be your best option for log management. As cloud data volumes grow, ELK monitoring can become too costly and complex to manage. Fast-growing organizations should consider innovative alternatives offering better performance at scale, superior cost economics, reduced complexity and enhanced data access in the cloud.

How to monitor your feature flags with LaunchDarkly and Grafana

Feature management is an emerging set of tools and techniques for developing and testing software based around feature flags. It’s intended to increase productivity and performance, as well as improve software quality. Of course, you’ll also need to keep tabs on all those feature flags, so it only makes sense to pair feature management with observability for a more holistic view of your software development cycles.

From Battlefield to Business: Applying the OODA Loop

In today's dynamic world of software development and system operations, making informed decisions and developing effective strategies rely heavily on data. The OODA loop, developed by military strategist John Boyd, consists of a recurring cycle: Observe, Orient, Decide and Act. This is then followed by a Feedback stage (not represented in the OODA acronym for some reason) before the cycle repeats itself, allowing for continuous optimization.

Finish code reviews faster with improved comment navigation

Whether you're the author of a pull request or a code reviewer, it's important to focus on what matters, while making sure you don't miss any important feedback from your teammates. This is especially true when you're making a return visit to a pull request, and you want to pay the most attention to any sections of the PR with unresolved comment threads.

What is Citrix ADC, and How Do You Use It to Streamline Network Operations

The rise of complex containerized software environments sees an increased need for reliable delivery solutions like application delivery controllers (ADCs). ADCs such as Citrix function as load-balancing intermediaries within a software delivery network. They are positioned between application and user servers where they manage traffic flow via various structured and centralized processes.

Monitoring Junos OS with Prometheus vs. Graphite

When you plan monitoring strategies, the first thing you need to consider is the characteristics of the target systems. Depending on the resources you want to monitor, you will have to apply different architectural designs such as data collection, metrics generation, visualization, refresh schedule, and more. When you want to monitor network systems, making these considerations will allow you to achieve the right monitoring solutions.

Azure Blob Storage Malware Scanning soon to be GA

On September 1, 2023, Microsoft’s Defender for Azure Blob Storage is set to introduce a groundbreaking feature: Malware Scanning. This highly-anticipated addition to the Defender suite brings real-time protection against malicious content, making it a vital component in fortifying your data security and safeguarding against the ever-evolving threat landscape.