Operations | Monitoring | ITSM | DevOps | Cloud

Understanding GPUs for AI success: Insights from our panel discussion

This blog is based on the webinar, “Panel Discussion: Understanding the importance of GPUs for AI success”, you can watch the full recording by clicking here! Last week, we hosted a panel discussion surrounding the importance of GPUs for AI success that featured Kunal Kushwaha (Field CTO), Ben Norris (AI Engineer), and Kendall Miller (Strategic Business Development).

Is your cloud data truly sovereign? The CLOUD Act & FISA 702 reality check

As UK public sector bodies, financial institutions, and enterprises accelerate cloud adoption, a pivotal question emerges: Who truly controls your data, and under which laws? With data breaches and regulatory scrutiny intensifying, storing data and workloads in a host country alone doesn't guarantee sovereignty. U.S.

From legacy to security: Ivanti Connect Secure

When I took on leading the Network Security Group (NSG) at Ivanti in October 2024, it was a bit like a homecoming for me. You see, I spent almost two decades overseeing the development of these products before moving on to other responsibilities at Ivanti. NSG is responsible for building and maintaining Ivanti Connect Secure, Policy Secure, and Neurons for ZTNA, among other solutions.

Throughput Upgrade (With Train Illustrations!)

URLs) receive spiky traffic:. The Healthchecks open-source project includes a fully functional, tested and type-annotated ping handler written in Python. On self-hosted Healthchecks instances, when you send an HTTP request to a ping URL, a Django view collects and validates information from the request, then uses Django ORM to update a Check object in the database and insert a Ping object in the database. This approach is good for tens to low hundreds of requests per second, depending on hardware.

Zero Trust Starts with Zero Blind Spots

Zero Trust is more than a buzzword in today’s cybersecurity playbook, it’s a strategic imperative. Federal agencies, defense operations, and civilian infrastructure providers are all under mounting pressure to deploy Zero Trust Architecture (ZTA) frameworks that are not only compliant but truly effective. But there’s a problem: Zero Trust can only succeed if it’s built on real-time, actionable insight. That means eliminating blind spots.

Taming Your Dynatrace Bill: How to Cut Observability Costs, Not Visibility

Dynatrace is a powerhouse for application performance monitoring and business analytics. But for many organizations, its power comes with a significant challenge: as applications scale across complex hybrid environments and diverse tech stacks, the sheer volume and variety of logs, metrics, and traces sent to the platform can explode, leading to staggering and unpredictable costs.

Seeing the Bigger Picture: Why Security Needs Depth, Not Just Products

A recent BBC article, “Weak password allowed hackers to sink a 158-year-old company,” outlined a serious security lapse. This case reinforces the message that we, at Teneo, advocate every day: true resilience comes from defense in depth, i.e. policy, product and process, not just tools at the edge. In a recent customer engagement, we discussed a transition from VPN to ZTNA. While ZTNA offers enhanced security including continual checking, improved segmentation and a minimized attack surface.

Lessons from Alaska's outage: Redundant resilient

Last Sunday, Alaska Airlines suffered a three-hour outage that led to more than 200 flight cancellations and disrupted 15,600 passengers. The culprit? “A critical piece of multi-redundant hardware at our data centers, manufactured by a third-party, experienced an unexpected failure. When that happened, it impacted several of our key systems that enable us to run various operations, necessitating the implementation of a ground stop to keep aircraft in position.”

AWS Summit NYC 2025: Laser-Focused on AI

If you’re unfamiliar with AWS Summits, these are conferences that occur on a yearly basis in different cities. The events are mostly used to announce new products and technologies. This year, the theme was AI, as evidenced by the keynote, a large majority of the talks, and a walk around the vendor floor. The keynote talk was hosted by Swami Sivasubramanian, VP of Agentic AI at AWS.

Build. Release. Run. Repeat. But Where's the Control?

In every engineering organization, from fintech unicorns to 20,000-seat global bank, delivery happens in a loop. Code gets built. Releases get pushed. Systems run 24/7. Then it all happens again. This cycle isn’t an opinionated lifecycle dreamed up by a consultant or vendor, it’s just the reality of software delivery today.