Operations | Monitoring | ITSM | DevOps | Cloud

Proactive Monitoring vs. Reactive Monitoring

Monitoring is a fundamental pillar of modern software development. With the advent of modern software architectures like microservices, the demand for high-performance monitoring and alerting shifted from useful to mandatory. Combine this with an average outage cost of $5,600 per minute, and you’ve got a compelling case for investing in your monitoring capability.

Kubernetes Throttling Doesn't Have To Suck. Let Us Help!

In the Kubernetes (K8s) community, there is a huge misconception about CPU allocation and utilization. Even highly experienced SREs find themselves struggling with the way Kubernetes allocates CPU resources, leading to misconfigured CPU allocations and extremely negative outcomes. For starters, this results in significant quality degradation on important service components, introduced by behind-the-scenes CPU limiting (or throttling).

The MSP Provider's Guide to Getting Hired

In the years that I’ve worked with large technology vendors and an MSP provider, there were a few common denominators between the ones that were successful. Partners that were consistently at the top of the food chain were the ones consistently providing value to their customers in some area other than just one specific product or service that was being offered.

Website downtime: The one where Google Maps went down

March saw many of the big tech companies have technical issues with their products and services. But the biggest one was by far the colossal Google; Google Maps experienced the much dreaded website downtime impacting thousands of users across the globe. It was reported online that Google Maps had suffered a partial outage meaning that many couldn’t access the location tool, but why and more importantly, how?

Best Enterprise Password Managers According to IT Specialists

Even with advances in security practices and technologies, passwords continue to remain a weak point in an organization’s cyber security strategy. Strong passwords are still an essential part of security strategy for most organizations, and poor password hygiene can make their IT network vulnerable. According to the 2021 Verizon data breach investigation report, shared credentials and poor access management practices were among the top reasons for data breaches all over the globe.

Beyond Systems & Processes: ITIL Benefits to Individuals

The benefits of ITIL to a company or organization are widely discussed. This makes sense for the bigger picture, from the perspective of an organization. Smart organizations these days are adapting an ITIL framework to straighten out their IT service management and achieve business goals. However, it’s not so often you hear the question: what are the ITIL benefits to individuals?

How Important Is Visual Representation To A Business?

The visual identity of a business is something that can exist before even seeing the company name. The visual representation is vital for major companies so that customers can instantly recognize their presence, but tiny businesses need it even more to prosper. Here are some of the reasons why firms need to use visual representation.