Operations | Monitoring | ITSM | DevOps | Cloud

Our New CLI: How and Why We Made It

We are happy to announce our latest project at MetricFire: a brand-new CLI tool! Get ready to start monitoring your systems in one step - no need to modify any configuration files manually. Just run a terminal command, follow the prompts, and forward your system metrics to Hosted Graphite in minutes. In this article, we’ll share an overview of the Hosted Graphite CLI, why we’re making it, and how we’re making it.

Four Shades of Progressive Delivery

Progressive Delivery strategies like Blue/Green deployments, canary releases, feature flag rollouts, and feature delivery platforms help teams release safely, limit risk, and accelerate learning. Each approach builds toward sustainable, high-velocity software delivery by minimizing downtime and maximizing feedback. Combining these methods enables faster innovation with greater confidence and control. Last week we walked The Path To Progressive Delivery. This week, we go deeper.

Toronto Corporate Video Production: Captivate Your Audience with Professional Quality

Have you ever asked yourself how a top-notch corporate video can transform your business communications and boost your brand appeal? In this article, we explore how high-quality video production in Toronto helps businesses connect with their audience in a positive and friendly manner. This discussion covers various aspects of corporate video production, from the planning stages to the final edit, and explains how a professional approach can lead to impressive results that bring smiles to both clients and team members.

The Role of Facial Recognition Cameras in Modern Surveillance AI Technologies

Facial recognition cameras have rapidly emerged as one of the most advanced tools in modern surveillance AI technologies, transforming security measures across industries. These intelligent systems integrate artificial intelligence with real-time data processing to identify individuals with remarkable accuracy, enhancing law enforcement, border control, and corporate security. Surveillance systems that leverage facial recognition cameras provide unmatched capabilities in monitoring and streamlining identity verification, making them an indispensable asset in today's security landscape.

10 AWS Cost Monitoring Tools To Analyze And Save In 2025

AWS cost monitoring tools enable you to track your resource consumption and costs associated with running operations on the AWS platform. These tools vary in capabilities but typically offer customizable reporting, dashboarding, data analytics, built-in automation, and cost alerting. Keep in mind that AWS monitoring differs from AWS management in that monitoring provides usage and cost data without necessarily offering optimization tools.

AI Governance in 2025: A Full Perspective on Governance in Artificial Intelligence

In a world where artificial intelligence (AI) is leaping forward — growing at a CAGR of almost 36% from 2024 to 2030 — questions about governance and ethics with the use of AI are surfacing. As humans continue to develop AI systems, it is crucial to establish proper guidelines to ensure powerful technologies like generative AI and adaptive AI are used in a responsible manner.

Shorten your MTTR with Checkly Traces

We all know that Checkly is a ‘secret weapon’ for engineering teams who want to shorten their mean time to detection (MTTD). With Checkly, you can know within minutes if your service is unavailable for users, or acting unexpectedly. In this article we’ll talk about how Checkly traces can help you expand on the benefits of Checkly, adding insights that will help you diagnose root causes, and further reduce your mean time to resolution (MTTR) for outages and other incidents.

NIS2 Directive and Cybersecurity: Requirements, Risk Management, and Monitoring

The days when an antivirus and common sense were enough to guarantee an organization’s cybersecurity are long gone. Especially if you work in a critical sector. That’s why the NIS2 Directive (2022/2555) of the European Union establishes cybersecurity obligations for these key activities… and the consequences of non-compliance. These consequences are significant, so let’s analyze the regulation, when it applies, and how to implement it.

Why Super Bowl 2025 was a triumph for Internet Resilience

When you’re spending close to $8 million for a 30-second Super Bowl ad, the one thing you don’t want to leave to chance is your website—especially when millions of viewers, whether they came for the game, Kendrick Lamar, or to catch a glimpse of Taylor Swift in the stands, might head there right after the spot airs. Make no mistake: web performance is just as critical as the ad itself.

SCOM 2025 upgrade: In-place upgrade or side-by-side installation

SCOM 2025 upgrade: In-place upgrade or side-by-side installation SCOM 2025 was released last year, and now is the time to start planning your upgrade. But where do you begin? Upgrading can be a complicated process, and it is important to consider the different options to make the process as smooth as possible. When upgrading, you can choose between an in-place upgrade or a side-by-side installation, and each approach leads to different outcomes. The right path for you depends on several factors.