Operations | Monitoring | ITSM | DevOps | Cloud

Getting started with ElasticSearch dashboards

ElasticSearch is one of the IT and software industry’s most established platforms for storing and analyzing log data. As its name suggests it also has a powerful search and analytics engine based on the ElasticSearch Query language. ElasticSearch itself is essentially a backend store, so if you want to explore and analyze your data, you will need a visualization layer such as SquaredUp and our ElasticSearch PlugIn.

A New Era of Cooperation: How the UK-India Free Trade Deal Can Benefit India's Digital Economy

India’s digital economy is on a historic growth trajectory. According to the Digital Infrastructure Providers Association (DIPA), it’s projected to reach $1 trillion by the end of 2025, driven by rising internet penetration, data consumption, and cloud adoption.

Smart Ring Development (Part 2) Hardware Design

This series of articles discusses the development of a SOTA Open Smart Ring - a tiny wearable packed with electronics that fits on your (even the smallest) finger. We dive deep into what it means to develop such a product, its challenges, and ultimately, how to make it a manufacturable and usable piece.

Visibility Is the First Line of Defense: Operational Readiness in a Zero Trust World

As global cyber threats continue to evolve at unprecedented speed, the United States public sector faces growing pressure to enhance operational readiness. Agencies must now contend with adversaries who are not only well-funded but also increasingly sophisticated in their ability to exploit visibility gaps. In the face of this dynamic threat landscape, the Zero Trust Architecture (ZTA) model has become an essential security framework.

How We Made Our Queries 99.5% Faster

We cut log-query scanning from ~100% of data blocks to < 1% by reorganizing how logs are stored in ClickHouse. Instead of relying on bloom-filter skip indexes, they generate a deterministic “resource fingerprint” (hash of cluster + namespace + pod, etc.) for every log source and sort the table by this fingerprint in the primary-key ORDER BY clause. This packs logs from the same pod/service contiguously, letting ClickHouse’s sparse primary-key index skip irrelevant blocks.

Cloud Log Management: A Developer's Guide to Scalable Observability

As systems move to microservices, serverless, and multi-cloud setups, debugging gets harder. You’re no longer dealing with a single log file; you’re looking at logs from dozens of services, running across different environments. Traditional debugging methods like SSH-ing into servers or adding print statements don’t scale in these environments. Cloud log management tools help by collecting logs from all your services into one place.

What is Log Loss and Cross-Entropy

You're building a classification model, and your framework throws around terms like "log loss" and "cross-entropy loss." Are they the same thing? When should you use binary cross-entropy versus categorical cross-entropy? What about focal loss? This blog breaks down these loss functions with practical examples and real-world implementations.

OWASP CI/CD Part 9: Improper Artifact Integrity Validation

Improper artifact integrity validation is a critical vulnerability in CI/CD pipelines characterised by insufficient mechanisms to cryptographically verify the authenticity and integrity of code and build artifacts traversing the pipeline. When these controls are weak or absent, adversaries with access to any pipeline stage can inject malicious or tampered artifacts that appear legitimate, enabling undetected propagation through the pipeline and eventual deployment into production environments.