Operations | Monitoring | ITSM | DevOps | Cloud

Alloy Self-Service Assistant for Microsoft Teams

In recent years self-service has become an imperative for many businesses. Offering comprehensive self-service options like a customer knowledge base, chat, and community forums plays a huge role in the self-service success. And, maybe even more critically important is unifying those different support channels, so that requests are captured, processed, and responded to within a single system.

Building safe-by-default tools in our Go web application

At incident.io, we're acutely aware that we handle incredibly sensitive data on behalf of our customers. Moving fast and breaking things is all well and good, but keeping our customer data safe isn't something we can compromise on. We run incident.io as a multi-tenant application, which means we have a single database (and a single application).

5 Best Network Inventory Tools and Software

Keeping your technology organized can be challenging. As you add new devices and phase out old ones, tracking each change can feel insurmountable. However, monitoring these updates is vital for most organizations, making the right network inventory tools indispensable. Finding your best fit might be easier than you think. By understanding your network inventory management options, you can find the most effective software to support your unique IT infrastructure.

How the U.S. State Department Can Overcome the Trade-Offs of its Multi-Cloud Strategy

The U.S. State Department has a global workforce of 69,000 across more than 270 diplomatic missions. To support the work of its “untethered diplomats,” State’s Bureau of Information Resource Management uses a multi-cloud approach that provides cost-effective, flexible, and reliable access to cloud-based resources, allowing staff to seamlessly collaborate, free from the limitations of VPNs and corporate networks.

You've Achieved GDPR Compliance-Now What?

General Data Protection Regulation (GDPR). Most of us remember the months and weeks leading up to the deadline. We did whatever needed to be done to achieve compliance. Now it seems like a distant memory. And the pressure is mostly off. But in other ways, it was just the beginning. As you continue creating your day-to-day compliance strategy, you might find that the tactics that got you to the finish line were more short-term solutions that won’t necessarily stand long-term.

4 Ways To Ensure Reliability of Your Digital Services for GivingTuesday

In today’s digital economy, seconds matter. For mission-driven organizations, seconds can be a matter of life and death, and service reliability can make or break access to suicide and safety hotlines, disaster relief, time-critical health care, food assistance, and more. That’s where real-time digital operations comes in.

The Ultimate Combo: Artificial intelligence and data centers

For artificial intelligence to be devoted to scaring us to death through iconic movies like 2001 or Terminator is a thing of the past, today it has other, much more interesting and practical purposes. For example, crowning itself by playing a fundamental role in data processing and analysis. Yes, that’s her, the futuristic AI, increasingly faster, more efficient and, now, necessary to manage data centers.

Embracing invokedynamic to tame class loaders in Java agents

One of the nicest things about Byte Buddy is that it allows you to write a Java agent without manually having to deal with byte code. To instrument a method, agent authors can simply write the code they want to inject in pure Java. This makes writing Java agents much more accessible and avoids complicated on-boarding requirements.

Interview with Cybersecurity Specialist Babak Pasdar, CTO of Acreto

For our latest expert interview on our blog, we’ve welcomed Babak Pasdar to share his thoughts on the topic of cybersecurity and his journey as the CTO of Acreto. Babak Pasdar is a globally recognized innovator, cybersecurity expert, author, and entrepreneur best known for his multiple innovations in the area of cloud security.