Operations | Monitoring | ITSM | DevOps | Cloud

New Release of Delphi Data Access Components Adds Support for Latest IDEs, Databases, and Windows Arm64EC Target Platform

We are thrilled to announce a new release of our Delphi Data Access Components product line. This update delivers broader platform compatibility, enhanced security, and extended support for modern database technologies across multiple providers.

It's Time to Rethink Untrusted Code in Your Pipeline | Harness Blog

The catastrophic TeamPCP exploit in March 2026 demonstrated that "open execution" models, in which third-party code runs with full privileges, have made CI/CD pipelines a primary target for global credential harvesting. There are better architectures. On March 19th, the risks of running open execution pipelines — where what code runs in your CI/CD environment is largely uncontrolled — went from theoretical to catastrophic.

How to Scale Sandbox Environments with an Internal Developer Portal | Harness Blog

Here's a scenario that probably sounds familiar: a developer needs a sandbox environment to test something. They file a ticket. Then they wait. And wait. Maybe a day goes by, maybe three. Meanwhile, your platform team is buried in provisioning requests, and somewhere, someone has already spun up an unsanctioned workaround that bypasses every governance policy you've put in place. It's a lose-lose. Developers lose velocity, platform teams lose their sanity, and security gaps quietly multiply.

Logging in Next.js is hard (But it doesn't have to be)

A typical Next.js deployment can execute code in up to three different runtimes: Edge, Node.js, and the browser. You may already be capturing logs from server-side code, but if you are not capturing the full request from middleware through server rendering to the browser, you are missing a lot of debugging info when things go wrong. TL;DR: A typical Next.js deployment can run in up to three environments; Node, Edge, and the browser.

OVHcloud is now available on Aiven

At Aiven, we believe that you should have the freedom to deploy your data wherever your business needs it to be. Whether you are optimizing for performance, compliance, or regional proximity, our goal is to ensure that the underlying infrastructure supports your innovation without friction. Today, we are excited to expand those choices by officially announcing that OVHcloud is now available as a supported infrastructure provider for Aiven customers.

What is the Citrix License Activation Service (LAS)?

One of the hot topics from our recent Citrix-focused webinar was the Citrix License Activation Service (LAS). I had the chance to present alongside George Spiers— Citrix Expert and EUC Architect —and we walked through what LAS is, how it works, and what teams should be aware of.

How to Harden Ubuntu SSH: From static keys to cloud identity

30 years after its introduction, Secure Shell (SSH) remains the ubiquitous gateway for administration, making it a primary target for brute force attacks and lateral movement within enterprise environments. For system administrators and security architects operating under the weight of regulatory frameworks like SOC2, HIPAA, and PCI-DSS, default SSH configurations are an “open door” that represents an unacceptable risk.

Simplify bare metal operations for sovereign clouds

The way enterprises are thinking about their infrastructure has changed. Digital sovereignty of all kinds – data sovereignty, operational sovereignty, and software sovereignty – have begun to dominate the infrastructure discussion. Today, these abstract terms have become practical concerns for platform teams.