I think we’ve all been there before – you log on to a server remotely via RDP, and do the needful – but don’t immediately log off. But then you get distracted by a phone call, an email, a chat, or a good old-fashioned physical interaction with another human being. So when it comes time clock out for the night, you shut down your computer or log off. Or maybe you’ve been working on a laptop and your VPN got interrupted.
In this blog post we use podtato-head to demonstrate how to load test kubernetes microservices and how Speedscale can help understand the relationships between them. No, that's not a typo, podtato-head is an example microservices app from the CNCF Technical Advisory Group for Application Delivery, along with instructions on how to deploy it in numerous different ways. There are more than 10 delivery examples, you will surely learn something by going through the project. We liked it so much we forked the repo to contribute our improvements.
This is Part 1 of a two-part series on Blameless Postmortems. Today, we'll discuss why blameless postmortems are so important and their implications for your team; the second part will go into detail on how to set them up as a process and make them successful. Somebody wise may have once told you that how we handle adversity shows our character. Being able to acknowledge and admit mistakes is the first step towards learning - it's a key part of success both in personal relationships and in large companies.
Operational resilience remains the top priority for those in financial services. From the U.S. Federal Reserve's study into "Sound Practices to Strengthen Operational Resilience" and "Principles of Operational Resilience" from the Basel Committee to the Bank of England's upcoming rule changes for financial organizations in the UK, the intent is to create financial services institutions that are geared towards managing digital disruption. The goal is that financial service businesses can continue providing mission-critical services in the event of disruptions such as IT glitches, outages, and cyber-attacks.
Do you love SecOps in theory, but just can't seem to make it work in practice? Or, maybe you've already implemented a security operations strategy to some degree within your organization, but struggle to make IT operations and security jive as seamlessly as you would like? Either way, there's a good chance that your troubles stem from one or more of the common barriers to SecOps strategies. This article explains why businesses often fail at implementing SecOps successfully and how they can work around the roadblocks.
Last year, during our Work Anywhere webinar, Forrester analyst Andrew Hewitt said that 51% of the technology teams focused on providing the right technology to enhance the employee experience. By 2021, the entire IT organization saw the need to support a flexible digital workplace with appropriate devices, wherever employees were located. According to computer economics, hardware such as PCs, laptops, and mobile devices age every four years. Therefore, device refresh becomes an important planning activity for support teams in keeping their knowledge workers productive and reducing the total cost of ownership (TCO).
The benefits of Apache Kafka monitoring services are widely appreciated across the industry. Organizations that rely heavily on Apache Kafka for their data streaming needs can derive great benefit from the use of Kafka monitoring services. By keeping track of various different key performance indicators (KPIs) related to Kafka, such as message throughput and latency, organizations can ensure that their Kafka-based data pipelines are running as smoothly and efficiently as possible.