Operations | Monitoring | ITSM | DevOps | Cloud

Latest Blogs

The Words of the Birds - Leveraging AI to Detect Songbirds

When was the last time you had the chance to listen to some of the most beautiful concerts that nature can play for you? From simple chirps and tweets to complex bird songs composed into a sophisticated soundscape, you may wish you could decrypt and understand their daily conversation. “Hey, good morning, how are you today?”, you might hear in the early hours, sometimes so loudly that you are awakened from the chirping.

Complete Guide to Lambda Triggers and Design Patterns (Part 2)

This is part of a series of articles discussing strategies to implement serverless architectural design patterns. We continue to follow this literature review. Although we use AWS serverless services to illustrate concepts, they can be applied in different cloud providers. In the previous article (Part 1) we covered the Aggregator and Data Lake patterns. In today’s article, we’ll continue in the Orchestration & Aggregation category covering the Fan-in/Fan-out and Queue-based load leveling.

Microservices vs. Service Oriented Architecture (SOA)

Technology has a way of circling around to the same ideas over time, but with different approaches that learn from previous iterations. Service Oriented Architecture (SOA) and Microservices Architecture (MSA) are such evolutionary approaches. Where lessons learned made sense, they were reused; and where painful lessons were learned, new methods and ideas were introduced.

How to Incorporate Security Into Your company's SDLC

It’s been shown that if you follow a proven collection of practices for developing, designing, testing, implementing, and maintaining your software, you will produce a much higher quality product. Over the past few years, we have seen an increasing number of cases of attacks on the application layer. The Open Web Application Security Project, OWASP, estimates that around one-third of web applications contain security vulnerabilities.

How to tackle remote teams with these 5 interesting online tools

The Internet has enabled a level of collaboration like never before in history. With just a few mouse clicks, you can see other people on the other side of the world and work with them remotely on whatever you want. Remote work is becoming new normal in many organizations. Managing teams remotely sometimes even in different time zones, with poor communication, monitoring becomes complex, and team misalignment is paramount.

Common pitfall of addressing registry entries in 64-bit operating system

Accessing Windows registry (local or remote) is a typical way of gathering useful data. However, there’s a typical pitfall that can cause unexpected scripts or programs behavior. Namely, accessing registry values across different architectures (say, 64-bit entries from 32-bit applications).

Logging Best Practices Part 3: Text-based logs and structured logs

Isn’t all logging pretty much the same? Logs appear by default, like magic, without any further intervention by teams other than simply starting a system… right? While logging may seem like simple magic, there’s a lot to consider. Logs don’t just automatically appear for all levels of your architecture, and any logs that do automatically appear probably don’t have all of the details that you need to successfully understand what a system is doing.

Implement a preventive maintenance plan

Your worst nightmare: a failure, a breakdown or any other inconvenience that can disrupt the smooth running of your daily activities that happens at the worst possible time. When you need your equipment, its reliability is absolutely paramount. In the absence of proper and functioning equipment, you’re not only wasting time, but you’re also jeopardizing employee productivity and the reputation of your service, all while seeing an increasement of operational cost.

From Forms to Reforms: ITSM for a Simplified Employee Onboarding Process

As per research published by Hosting Advice, over 56% of employees who felt disengaged at work marked inadequate training as the key reason for it. Over 53% of employees felt that they would be able to perform better at their jobs if they received adequate training. And over 31% of respondents to the research survey stated that they had to quit their jobs less than six months after being hired. Olivia was one of those last set of employees at her first job out of graduate school.

How to Choose Monitoring Tools for DevOps and SRE

When developing for reliability or implementing resilient DevOps practices, the heart of your decision-making is data. Without carefully monitoring key metrics like uptime, network load, and resource usage, you’ll be blind to where to spend development efforts or refine operation practices. Fortunately, a wide variety of monitoring tools are available to help you collect and get visibility into this data.