Operations | Monitoring | ITSM | DevOps | Cloud

Cloud Sovereignty: Location, Access, and Jurisdiction

Cloud residency has moved from a technical preference to a board-level control question, as organisations are being asked to evidence who can access data, under which jurisdictions, and what happens when something goes wrong across borders. A Gartner survey of CIOs and IT leaders in Western Europe found that 61% expect geopolitical factors to increase their reliance on local or regional cloud providers, while also predicting that by 2030, more than 75% of enterprises outside the US will have a digital sovereignty strategy.

AI Coding Agents Break What Works

Your AI coding agent just made every test pass. Ship it, right? Not so fast. A growing class of AI-generated bugs doesn’t come from writing bad code. It comes from the AI changing working code to accommodate its own mistakes. This isn’t a theoretical risk. It’s happening now, in production codebases, and it’s harder to catch than any bug the AI might introduce from scratch.

DEX in IT Routine: How Digital Experience-Driven Decisions Elevate Operational Quality and Results

In a scenario where IT teams face growing pressure to deliver positive business outcomes, relying solely on technical metrics is no longer enough. During the webinar held on March 26, 2026, Leandro Silva and Bob Kruger spoke about how Digital Employee Experience (DEX) — a tangible discipline supported by specialized tools — transforms IT decision-making, resource prioritization, and strategic value delivery for organizations.

New Release of Delphi Data Access Components Adds Support for Latest IDEs, Databases, and Windows Arm64EC Target Platform

We are thrilled to announce a new release of our Delphi Data Access Components product line. This update delivers broader platform compatibility, enhanced security, and extended support for modern database technologies across multiple providers.

It's Time to Rethink Untrusted Code in Your Pipeline | Harness Blog

The catastrophic TeamPCP exploit in March 2026 demonstrated that "open execution" models, in which third-party code runs with full privileges, have made CI/CD pipelines a primary target for global credential harvesting. There are better architectures. On March 19th, the risks of running open execution pipelines — where what code runs in your CI/CD environment is largely uncontrolled — went from theoretical to catastrophic.

How to Scale Sandbox Environments with an Internal Developer Portal | Harness Blog

Here's a scenario that probably sounds familiar: a developer needs a sandbox environment to test something. They file a ticket. Then they wait. And wait. Maybe a day goes by, maybe three. Meanwhile, your platform team is buried in provisioning requests, and somewhere, someone has already spun up an unsanctioned workaround that bypasses every governance policy you've put in place. It's a lose-lose. Developers lose velocity, platform teams lose their sanity, and security gaps quietly multiply.

Logging in Next.js is hard (But it doesn't have to be)

A typical Next.js deployment can execute code in up to three different runtimes: Edge, Node.js, and the browser. You may already be capturing logs from server-side code, but if you are not capturing the full request from middleware through server rendering to the browser, you are missing a lot of debugging info when things go wrong. TL;DR: A typical Next.js deployment can run in up to three environments; Node, Edge, and the browser.

OVHcloud is now available on Aiven

At Aiven, we believe that you should have the freedom to deploy your data wherever your business needs it to be. Whether you are optimizing for performance, compliance, or regional proximity, our goal is to ensure that the underlying infrastructure supports your innovation without friction. Today, we are excited to expand those choices by officially announcing that OVHcloud is now available as a supported infrastructure provider for Aiven customers.

What is the Citrix License Activation Service (LAS)?

One of the hot topics from our recent Citrix-focused webinar was the Citrix License Activation Service (LAS). I had the chance to present alongside George Spiers— Citrix Expert and EUC Architect —and we walked through what LAS is, how it works, and what teams should be aware of.