Operations | Monitoring | ITSM | DevOps | Cloud

Why incident response automation is top-of-list for CISOs in 2020

When considering the state of critical incidents in 2019 – it’s no surprise that looking ahead to 2020, CISOs have one of the organization’s most challenging and stressful jobs. During the first half of the year alone 4.1 billion records were compromised, and the average cost of a data breach is now estimated at $3.92 million.

Configurable Ruby Modules: The Module Builder Pattern

In this post, we’ll explore how to create Ruby modules that are configurable by users of our code — a pattern that allows gem authors to add more flexibility to their libraries. Most Ruby developers are familiar with using modules to share behavior. After all, this is one of their main use cases, according to the documentation.

5 Useful Content Optimization Tools for SEO

When it comes to running a website, one of the hardest things to accomplish is a high SEO ranking. Understandably, this is also the most important thing in terms of your website’s success. In order to get your website out there for people to find, you need to impress Google and its algorithms. This goes beyond just picking a great design or publishing a nice written piece or two.

The Age of Service Mesh

You have built a massively successful system. The users just can't get enough and request new features. Your developers crank out new services on a regular basis. Your DevOps/SRE team configures and scale your Kubernetes cluster (or clusters). As the system becomes more complicated and sophisticated you realize that there are common themes that repeat across all your services.