As in any high-growth environment, expanding your suite of products and capabilities can contribute to a growing backlog of errors, and challenges prioritizing them… a scenario not lost on the team at Airtable, a connected apps platform that more than 300k organizations, including 80% of the Fortune 100, rely on to connect their teams, data, and workflows. To support organizations like Amazon and IBM, Airtable ships new features and updates through multiple deployments a week.
The leap to remote work happened nearly overnight with the pandemic, and it’s clear that hybrid work and digital dexterity is the way of the future. As a result of this shift in the way we work, companies have invested in new technologies to adapt to the growing remote world, with 69% of companies planning to increase their investment in digital tools even more in 2022. Additionally, over 90% of businesses strive to implement hybrid work environments.
The adoption and maturation of Kubernetes has been rapid, driven by organizations moving to cloud-native infrastructures to modernize and gain agility. The Kubernetes growth trajectory reached a climax in 2021 as The Cloud Native Computing Foundation (CNCF) declared it “the year Kubernetes crossed the chasm.” The CNCF Annual Survey 2021 found that 96% of organizations were using or evaluating Kubernetes.
It is difficult to define a single, solid maturity model for IT Operations. As moderator Jason Walker, BigPanda’s COO, said in our RESOLVE ’22 event Bit by bit, maturity models in “almost every other domain of IT” have not turned into a workable set of guideposts and indicators in the Ops domain. We welcomed Insurity’s Lead Cloud Operations Performance & Monitoring Admin, Ronnel Vergara, to take the stage and talk over this high-level topic at our event.
Encryption is key to protecting sensitive data. There are several methodologies using different cryptographic algorithms to convert plain text into cipher text. Navigating multiple methodologies and algorithms creates a complex, labour-intensive process for teams evaluating the cryptographic services offered within software components.