Operations | Monitoring | ITSM | DevOps | Cloud

WWDC 2025: What's new for enterprise device management

Apple’s WWDC 2025 delivered a wave of exciting updates for anyone involved in managing company devices. With improvements designed to simplify provisioning, strengthen app controls, and expand what Apple Business Manager can do, these changes are all about making life easier for IT teams irrespective of the industry. In this article, we’ll break down the key announcements and explore how they could reshape the way you manage your organization’s Apple devices.

Why Clarity Demands More Than Dashboards

Despite years of investment in observability stacks and AI dashboards, most IT organizations still struggle with one uncomfortable truth: they can’t identify root cause in real time, and they can’t explain how technical failures impact the business. Not in dollars. Not in user flows. Not in boardroom language. What’s worse, they often don’t realize what they’re missing.

Platform engineering with a product-management mindset

To really make an impact, platform engineering teams need to start thinking like product managers. That means deeply understanding their users, measuring outcomes instead of outputs, and tying everything they do to real business value. Organizations who care about total cost of ownership and fast time to value are adopting this mindset.

Engineering Excellence Summits Recap

The best engineering teams ship quality software quickly, but doing that consistently requires more than just speed. It requires careful attention to reliability, security, ease of maintenance, and developer experience. The Engineering Excellence Summits were designed to create a community of engineering leaders looking to connect with others facing similar challenges, share approaches that are working, and learn what “better” can look like.

Fewer Bindings, More Power: Rancher's RBAC Boost for Enhanced Performance and Scalability

Managing permissions in sprawling Kubernetes landscapes can often feel like untangling an ever-growing knot. As clusters and user bases expand, so does the intricate web of RoleBindings, impacting everything from UI responsiveness to the very stability of etcd. This complexity, if unaddressed, can become a significant hurdle to achieving scalability and maintaining optimal performance in Rancher. SUSE is committed to improving its container management platform.

Why We're Partnering with GuidePoint Security

As CEO of Observo AI, I've spent countless hours with CISOs and security leaders discussing their most pressing challenges. The conversations always circle back to the same fundamental problem: security teams are drowning in data they can't afford to ignore but can't afford to process. Today's announcement of our strategic partnership with GuidePoint Security represents more than just another vendor alliance.

When the Internet Blinked: What the June 12 Outage Teaches Us About Resilience

On June 12, 2025, the internet blinked. Email vanished, apps froze, and many of us lost contact with our digital coworkers (both AI and human). The world felt it instantly; businesses stalled, teams scrambled, and digital operations everywhere took a hit. Felt a little like deja vu. Does anyone remember July 19, 2024?

AI is now writing code at scale - but who's checking it?

As Generative AI (GenAI) reshapes the software development landscape, the risks and complexities around managing what gets built, where it comes from, and how it’s secured are growing just as fast. The Cloudsmith 2025 Artifact Management Report dives into this shift, offering critical insights into how teams are adapting their infrastructure and software supply chain security practices in response to the AI-generated code.

Access Logs: Format Specification and Practical Usage

Your server's been logging everything—it’s just easy to overlook until something breaks. Every incoming request, database call, or auth check ends up in your access logs. They’re not flashy, but they quietly document every interaction your system handles. For developers, they’re often the most reliable starting point when things go wrong. In this blog, we'll take a look at what an access log is, its format, types, and a few best practices.

Getting Started with Traceroute

“Traceroute? You mean the thing I can type at the command line? Why would I even want to set up a test for that?” This is, believe it or not, a comment we hear a lot at Catchpoint. At least from folks who are either new to tech, new to monitoring, or new to Catchpoint (or all three). It’s a common misconception. It’s also something I’m not going to spend a ton of time addressing here. This blog is not meant to convince you why traceroute is super useful (even though it is).