Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Top 10 apps to boost your productivity

Winter is rolling in (for those in the Northern Hemisphere at least). Long summer evenings are on hold for now. In these colder months, it can be difficult to get back into work and feel efficient. But whether you are feeling tired, unorganised, or demotivated, there may be an application here to help you refocus and re-energise. Here are a few that have given us the boost we needed to get back on track.

What is object storage?

Object storage has by far the most simplistic interface out there, with no need for complicated SCSI drivers, HBA drivers, multipathing tools, or volume managers embedded into your Operating System. All you need to do is point your application at an HTTP endpoint, and use a simple set of verbs to describe what you want to do with a piece of data. Do you want to PUT it somewhere for safekeeping? Do you want to GET it so that you can do some work with that piece of data?

CIS-Harden your Ubuntu in Google Cloud

CIS Benchmarks are best practices for the secure configuration of a target system. The Center for Internet Security, Inc. (CIS®) is the authority backing CIS Benchmarks. Ubuntu Pro is entitled to be CIS compliant and packaged with CIS toolings from Canonical. Let’s SSH into your Ubuntu Pro virtual machine. If you haven’t yet upgrade your Ubuntu LTS to Ubuntu Pro, please follow this tutorial.

Canonical Transforms Linux on Mac

November 9th London, UK: On the heels of Apple’s announcement of a new line of game-changing M1 MacBooks, Canonical is bringing fast and easy Linux to the M1 platform. Multipass, the quickest way to run Linux cross-platform, received an update last week allowing M1 users to run Ubuntu VMs with minimal set-up. Multipass can download and launch a virtual machine image with one command, and developers on M1 can now get running on Linux in as little as 20 seconds.

History of Open Source Identity Management (part 1)

Few computing concepts are as ubiquitous as identity and access management. There isn’t a single day that goes by without us being asked for credentials, passwords or pin codes. Yet very few know the origins and the evolution of the technologies behind them. This is the first of two blog posts where we will look at the history of open-source identity management. We will cover the main open-source protocols and standards that shaped it, from its origins to the modern days.

Five reasons to manage your IoT edge devices

The Internet of Things adoption is growing faster than ever before. As connected devices become more affordable, they find their place in many aspects of our lives. Users worldwide can benefit from a large ecosystem of IoT solutions. However, this rapid growth comes at a cost. Different IoT edge devices have different interfaces, speak different languages and many are not supported soon after manufacturing. Over time, this presents challenges not only to usability, but also to security and privacy.

Kubernetes Fully Managed: Overcoming CIOs challenges

Kubernetes is everywhere! In the public and private cloud, and from the enterprise to startups, the majority of IT executives around the world have explored Kubernetes, and how it has evolved the way many organisations are developing and deploying their applications. But what is scary about it, and how can organisations better leverage one of the greatest tools in the field while overcoming the biggest challenges facing CIOs when adopting Kubernetes?