Operations | Monitoring | ITSM | DevOps | Cloud

Multiple API Keys Are Here - More Keys, Better Control, Stronger Security

Today we're rolling out a major upgrade to API Keys in Bindplane. You can now create up to 25 API keys per project, give each one a description, set an expiration date, and delete keys you no longer need. Under the hood, every key is now hashed with Argon2, the modern standard for credential storage. If you've been working around the old single-key limit by sharing one key across CI jobs, scripts, and teammates, this release is for you.

Snyk vulnerability compliance with kosli evaluate trail

Kosli recently released kosli evaluate trail, a command that evaluates selected attestations in a Kosli trail against a Rego policy file. We used it to build a complete and useful solution for tracking Snyk container vulnerabilities for cyber-dojo (an open-sourced browser based online tool for practising TDD which Kosli uses for demos). You’ll read about what we built, why we built it, how we tested it, and specifically.

A Developer's Guide to Aiven Apps

We recently announced the Limited Availability (LA) launch of Aiven Apps, which lets teams define, run, and scale production-ready, real-time applications using container and Compose-based workflows they already know. It provides a managed, stateless runtime that runs directly inside your data perimeter, letting you deploy applications alongside open-source data services like PostgreSQL and Apache Kafka.

Community Spotlight: A Native iOS App for Your InfluxDB Data

One of the things we love most about building an open source platform is seeing what the community creates with it, and independent developer Anton Havekes recently built something we just had to share. Anton put together Influx Dashboard, a native iOS app that connects to your InfluxDB instance and brings your time series data straight to your phone. We’re genuinely thrilled to see this kind of work come out of the community.

The 5 Hats We Wear During Code Review

If you are a software developer or engineer, you most likely have to do code review. At the bare minimum, you probably have had your pull requests reviewed. If you haven’t, then you are probably curious about how the rest of the world deals with the process. In general, we use code review to make sure we are shipping high quality code that does what it’s supposed to and is easy to maintain. That’s the goal, at least. In practice, code review can get messy.

Early Warning Signs Your Network Needs a Refresh

Is your network holding your business back? Learn the warning signs that tell you it’s time for an upgrade before it hits your bottom line. Most network failures don’t just happen overnight, but are the result of warning signs that went unnoticed or ignored. The “if it’s not broken, don’t fix it” mindset is one of the most common and costly mistakes in network management.

What is Network Attached Storage (NAS)? [2026 Guide]

Network Attached Storage (NAS) is a dedicated storage device connected to a network that allows multiple users and devices to store and access data from a central location. It is a popular method for extra data privacy, as everything is stored on the device you own and can’t be accessed by anyone, making it a popular alternative to Google Drive, OneDrive, and other big tech companies.

3 Best Executive Search Firms and Top Recruiters for 2026 Leadership Hires

Finding the right executive search partner is mission-critical. The leaders you hire over the next year will shape AI strategy, protect data, and guide growth through unpredictable markets. One mis-hire can drain momentum and erode investor confidence, while a well-matched leader can deliver years of outperformance.

How to Buy Instagram Followers Safely

Buying Instagram followers can help your page look more active. It can also help new people trust your profile faster. When someone lands on your page, they often look at your follower count first. A strong count can make your brand, page, or personal account look more known. But you still need to be careful. The goal is not just to grow a number. The goal is to grow in a clean and smart way. You want followers that match your page, support your image, and help your profile look better without making things feel odd.

Why Tech Businesses May Need Criminal Defense Representation

Running a technology firm brings unique hurdles that go far beyond standard business management. Founders often focus entirely on rapid scaling and innovative product design rather than hidden legal traps. A sudden investigation can disrupt standard operations overnight - often without any warning. Legal protection becomes necessary when automated software actions trigger unintended state or federal legal scrutiny.