Operations | Monitoring | ITSM | DevOps | Cloud

Exploring how PostgreSQL 18 conquered time with temporal constraints

Do you like working with time in your code? If yes, you’re likely one of the lucky ones who are blissfully unaware of how deep the rabbit hole goes. If you don’t like it, I have good news for you! Postgres can make working with time more enjoyable! The newly released temporal constraints let you easily maintain referential integrity across temporal relationships. That might seem simple, but it's kind of a big deal. Let’s explore it through an example.

What's New in InfluxDB 3.6: Ask AI, Simple Quick Start, and Smarter Automation

InfluxDB 3.6 is now available for both Core and Enterprise. This release introduces the 1.4 update to InfluxDB 3 Explorer, featuring the beta launch of Ask AI, along with new capabilities for simple startup and expanded functionality in the Processing Engine. InfluxDB 3 Core is free and open source, optimized for recent data, and licensed under MIT and Apache 2. InfluxDB 3 Enterprise extends Core with long-term data retention, clustering, fine-grained security, and management capabilities.

Cortex and Sonar Announce Partnership to Drive Code Quality and Security at Scale

At Cortex, our mission is to empower engineering organizations to ship reliable, secure, and efficient software, faster. Today, we’re thrilled to announce a formalized partnership with Sonar, the leader in code quality and security. For years, Sonar has been one of the most popular integrations in Cortex. Teams rely on Sonar’s deep code insights to identify vulnerabilities, ensure coverage, and raise the bar for clean, secure code.

Why we brought hardware-optimized GenAI inference to Ubuntu

On October 23rd, we announced the beta availability of silicon-optimized AI models in Ubuntu. Developers can locally install DeepSeek R1 and Qwen 2.5 VL with a single command, benefiting from maximized hardware performance and automated dependency management. Application developers can access the local API of a quantized generative AI (GenAI) model with runtime optimizations for efficient performance on their CPU, GPU, or NPU.

Tracking Aborted Queries and Memory Grants in Redgate Monitor

Redgate Monitor now surfaces two common SQL Server query issues that usually take manual work to uncover: cancelled or aborted queries and high memory-grant queries. You can now see both in the Query Executions view for each SQL Server instance, directly alongside server activity and alerts, so you can diagnose the cause much faster. Recently, Redgate Monitor introduced the Query Executions feature for SQL Server instances, using Extended Events to capture execution details for individual queries.

APM for Banks and Fintech: Ensuring Stability in High-Transaction Apps

The financial services industry is undergoing a major transformation. According to the McKinsey & Company 2025 Global Payments Report, digital payments continue to dominate, generating approximately $2.5 trillion in revenue from around $2.0 quadrillion in value flows across 3.6 trillion transactions worldwide. In another survey conducted by JP Morgan says that, more than 30 percent of financial professionals reported that faster payments are having a positive impact on their organizations in 2025.

Energy-Efficient Computing: How To Cut Costs and Scale Sustainably in 2026

With AI the centerpiece of technology and innovation today, energy efficient computing is quietly becoming one of the most urgent challenges. In this article, we will discuss what makes energy efficient computing relevant for your organization, especially when modern resource-intensive AI workloads play an important role in driving your business operations and services.

Observability 2025 Decoded: What the DZone Report Means for SLO-Driven Ops

DZone’s 2025 Intelligent Observability Trend Report captures a real inflection point: teams are shifting from “more data” to outcome-driven practices that improve resilience and accountability. The survey was gathered between August 28 and September 25, 2025, from a global pool of developers, architects, and IT professionals.

This Halloween, the Scariest Monsters Are in Your Network

In the spirit of Halloween, let's talk about monsters. Not the kind that hide under your bed, but the ones that live inside your network infrastructure. For those responsible for keeping the lights on, these creatures aren't fictional; they are a daily reality. Your environment can feel like an episode from the Real Ghostbusters, teeming with things that snarl, bite, and cause chaos at the worst possible moments. Forget silver bullets; trying to fight them one by one is a losing battle.