Operations | Monitoring | ITSM | DevOps | Cloud

Interview with AI Specialist Dhonam Pemba

For our latest expert interview on our blog, we’ve welcomed Dhonam Pemba to share his thoughts on the topic of artificial intelligence (AI) and his journey behind founding KidX AI. Dhonam is a neural engineer by PhD, a former rocket scientist and a serial AI entrepreneur with one exit. He was CTO of the exited company, Kadho which was acquired by Roybi for its Voice AI technology. At Kadho Sports he was their Chief Scientist which had clients in MLB, USA Volleyball, NFL, NHL, NBA, and NCAA.

ChaosSearch Named "Most Likely to be the Next Boston Unicorn" in Startup Boston's Community Awards

This week, ChaosSearch announced some exciting news -- we're honored to have been named Most Likely to be the Next Boston Unicorn in Startup Boston’s first-ever Community Awards! The award celebrates companies that have made extraordinary achievements in the startup ecosystem in Boston, and represents grassroots recognition from tech entrepreneurs, employees, investors, journalists, and educators in the region.

Private Package Repositories Part 1: What's a package again?

Package repositories were never something I thought about as a developer unless something didn’t work. For example, if it was slow, wouldn’t connect, wouldn’t install, or was overly complicated to configure. Mostly I wanted something I barely noticed. Something simple and easy to use.

By 2030, e-Waste Will Reach 2.5 Million Metric Tons Unless We 'Sober Up'

Let’s admit something without shame: we love to use new technology. Maybe the latest smart phone, or a new lightweight laptop or tablet that makes it easier to work from anywhere, it’s all fair game. And when we are at our desk, we enjoy creating expansive workspaces with multiple monitors, a full-size keyboard, and other extras. When we look across our household, we might have duplicate, perhaps triplicate resources growing our technology real estate exponentially.

Model-driven observability: Embedded Alert Rules

This post is about alert rules. Operators should ensure a baseline of observability for the software they operate. In this blog post, we cover Prometheus alert rules, how they work and their gotchas, and discuss how Prometheus alert rules can be embedded in Juju charms and how Juju topology enables the scoping of embedded alert rules to avoid inaccuracies.

Sponsored Post

Kent RO sees 50% faster MTTR with Applications Manager

Kent RO is an Indian multinational healthcare product company and a leader in the reverse osmosis (RO) water purifier category. Founded in 1999, Kent RO pioneered and brought the revolutionary RO technology to India. With a vision to enhance the quality of everyday living, Kent RO has evolved as a market leader that provides technologically advanced healthcare products ranging from water purifiers, air purifiers, to water softeners.

Find the right person at the right time to fix the right issue with SCIM for Okta, Code Owners with GitHub, and more

If you know someone who actually likes managing work across projects, we’d love to meet this mythical being. Because we can’t imagine who enjoys hand-sifting through digital piles of notifications, prioritizing issues, then tracking down the right developer to assign the issue to. And once you’re done with that detective work, your engineer-of-the-hour may not even have access to the right tools to resolve the issue. Who’s got time for all this org chart spelunking?

UptimeRobot August 2021 Update: Configurable Timeout, support improvements and Plesk extension

We’ve been busy this summer and introduced two new features last month – longer intervals and a grace period for recurring jobs monitoring (Heartbeat monitors). There is some good news this month too, so let’s get right into it!

Authentication and Authorization for RESTful APIs: Steps to Getting Started

Why do APIs require authentication in the first place? Users don't always need keys for read-only APIs. However, most commercial APIs require permission via API keys or other ways. Users might make an unlimited number of API calls without needing to register if your API had no security. Allowing limitless requests would make it impossible to develop a business structure for your API. Furthermore, without authentication, it would be difficult to link requests to individual user data.