Operations | Monitoring | ITSM | DevOps | Cloud

Proactively monitor Kerberos-authenticated web apps and APIs with Datadog Synthetics

When employee authentication fails or becomes unreliable, users can lose access to the critical systems they need. Authentication enables access to internal tools like HR applications, finance portals, and internal dashboards, so even short outages can interrupt day-to-day work, while persistent issues increase the risk of broader operational disruption.

Single-tenant vs. multi-tenant architecture with Grafana Cloud: A guide to choosing the right approach

Grafana Cloud’s flexibility is one of its greatest strengths, but the breadth of choices can sometimes be overwhelming. We see this a lot when it comes to selecting the right architectural approach, with organizations unsure of how many stacks they need to host their environment. Grafana Cloud provides robust features for managing tenancy, enabling organizations to effectively handle diverse teams and projects.

Making AI Costs Make Sense: A FinOps Guide To Tagging And Tracking AI Spend

AI is reshaping the cost landscape. As a positive person, I’m going to call this change exciting! FinOps teams are integrating AI into cloud platforms and incurring the spend that comes with it. As a FinOps strategist who has helped several companies optimize cloud spend across industries, it became evident that clarity around AI spend unlocks swift, smart decisions. That’s AI … optimized.

Bridging the Network Cost Gap: Why Operators Need Real-Time, Traffic-Based Cost Intelligence

Jezzibell Gilmore’s latest blog dives into the critical challenge network operators face: bridging the gap between massive traffic growth and understanding its actual cost. Learn why real-time, traffic-based cost intelligence is no longer optional for maintaining margins and driving revenue in today’s complex network landscape.

Canonical achieves IEC 62443-4-1 compliance in Industrial Automation and Control Systems

Canonical is proud to announce it has achieved compliance with IEC 62443-4-1 for cybersecurity in Industrial Automation and Control Systems (IACS). Building on Canonical’s existing ISO/SAE 21434 certification, this milestone expands Ubuntu’s leadership in securing critical infrastructure at the intersection of IT and operational technology (OT) environments.

Derdack Achieves ISO/IEC 27001:2022 Certification

Derdack attaches great importance to the confidentiality, availability and integrity of information. Therefore, Derdack has undergone a ISO27001:2022 audit and received a certification that Derdack has implemented and maintains an Information Security and Management System. ISO/IEC 27001:2022 is essential for organizations aiming to protect their information assets and comply with best practices in information security management.

From insight to impact: Key takeaways from our DORA webinar with Nathen Harvey

For most engineering leaders, getting a DORA dashboard up and running feels like a huge win. You can finally track performance, compare it to industry benchmarks, and report on your progress. But then a nagging question settles in: how do you actually make the numbers go up? That frustration points to a common gap between the dashboard and the daily engineering practices that drive those outcomes.

Automated BSoD (Blue Screen of Death) Monitoring and Troubleshooting

Yes, BSoDs are still cropping up in high-impact ways in 2025, from flawed Windows updates (especially 24H2 patches) to driver rollouts and heavily-threaded server environments. It remains essential for IT admins to track event reports, test updates in staging, enable rollback strategies, and be prepared with recovery mechanisms.