Operations | Monitoring | ITSM | DevOps | Cloud

Introduction of the ansible-collection-icinga

Ansible is a commonly known tool to easily automate deployments in infrastructures, its configuration is based on YAML and is able to scale in big environments. Icinga 2 provides its own secure agent to monitor hosts, high available satellite zones and monitoring configuration. To manage this monitoring environment we introduce you to the ansible-collection-icinga, this collection can install Icinga 2 server, configure monitoring and deploy Icinga 2 agents in your infrastructure.

How to Identify Memory Leaks

You may not be familiar with thinking about the memory usage of your applications as a software developer. Memory is plentiful and usually relatively fast in today's development world. Likely, the programming language you're using doesn't require you to allocate or free memory on your own. However, this does not mean you are safe from memory leaks. Memory leaks can occur in any application written in any language. Sure, older or "near to the metal" languages like C or C++ have more of them.

The new Puppet TAM service unlocks your next level of success

It can be challenging for even the most experienced IT organizations to embrace the latest DevOps automation tools and then ensure they are implemented in the most optimal way across a hybrid IT estate. Infrastructure teams are faced with increasing deployment complexities, budget and staffing constraints, competing priorities, and the challenge of supporting expanding development teams, impacting their organizational goals and KPIs.

What is the Most Vulnerable Data My Company Holds?

Data security is on every priority list in 2022. With the frequency of breaches never higher, many businesses assess their situation and ask cybersecurity questions. With cybersecurity policy, everything boils down to risk. Ultimately, every decision-maker wants to know, “how likely are we to be attacked?” Many believe cybercriminals only target certain kinds of data. Sensitive information, high-value financial data, and medical records are all widely accepted to carry a high risk.

Top 5 Takeaways From GDC 2022

The Game Developers Conference (GDC) is a yearly event that brings together leading brands in the gaming industry to talk about trends in development and showcase new features and releases. One of the cool things about the conference is that it’s an excellent opportunity for gaming enthusiasts, aspiring game developers, and industry vendors to connect, network, learn and celebrate the achievements of the industry.

3 ways to align IT and OT asset management practices

Smart factory advancements in manufacturing mean more and more operational technology (OT) devices are connected to the network. Today, more than ever before, it’s possible to visualize and monitor OT asset health the way you monitor IT assets. It’s even possible to see the relationships and dependencies between manufacturing and OT assets. This reduces the risk that an OT-related patch or change will negatively impact the production environment.

Improve Performance in Your iOS Applications - Part 1

Since inception back in 2007, Apple and the iOS ecosystem has drastically improved with a plethora of changes and new features added (or removed) over time. At the same time, the size of the applications and the data has consistently grown. This has its own impact on the powerhouse in your hand - the iOS device. Developers strive to design the best experience, often compromising speed and performance.