Operations | Monitoring | ITSM | DevOps | Cloud

Unlocking Edge AI: a collaborative reference architecture with NVIDIA

The world of edge AI is rapidly transforming how devices and data centers work together. Imagine healthcare tools powered by AI, or self-driving vehicles making real-time decisions. These advancements rely on bringing AI directly to edge devices. However, building a robust architecture for diverse edge environments presents significant hurdles. This blog introduces our new reference architecture, designed to simplify edge AI deployment.

Using CircleCI to test and deploy Python serverless functions on Microsoft Azure

Serverless computing simplifies app development by abstracting away server management. Azure Functions provides a robust platform for event-driven, on-demand code execution. In this tutorial, we’ll create and deploy a Python-based Azure Function—one that parses incoming JSON—using CircleCI. For a more granular and enable programmatic access to Azure resources, we’ll use service principal for secure authentication and the Azure CLI orb to streamline our CI/CD pipeline.

Proactive Monitoring: How DinoCloud Uses CloudWatch to Save Clients Money

At MetricFire, we love talking with engineers about their tech stacks, SRE challenges, and how they approach infrastructure monitoring. Recently, we had a great chat with Yoimer Roman from DinoCloud, a Latin American company that helps clients make smarter business decisions by leveraging AWS CloudWatch monitoring. Yoimer wears many hats: mentoring his team on all things AWS, designing custom cloud environments, and bridging the gap between technical challenges and non-technical stakeholders.

IT Governance Software: Best Options and Key Features to Look For

IT governance software helps organizations take control of their IT strategy by providing frameworks, automation, and monitoring tools to oversee IT operations. This software is the best ally for managing IT effectively: a proces that requires more than just keeping systems running — it involves aligning technology with business goals, addressing security risks, and meeting compliance standards.

Rethinking WhatsApp Alerts - A Data-Driven Approach

WhatsApp has become a major alerting channel for incident response teams. It's popular and for many, a great alternative to SMS. In our 2024 recap, we mentioned how Spike sent over 25,000 alerts on WhatsApp. It is now the 2nd most used alert channel for responders on Spike (rising from 4th spot in 2023). But... I will be the first one to admit – the WhatsApp alerts experience needed work to help responders react to incidents quicker!

What Your Mobile Devices and Favorite Jeans Might Have in Common

We can all agree that we need our mobile devices to be as secure as possible. No one wants to be hacked. No one wants to deal with the fallout of a breach. If you’re a small business owner, you could be out of business in six months because of how hard it is to recover from a single cybersecurity incident. If you’re in charge of a larger business, you might have to clean up the damage caused from leaked data for years.

Announcing HAProxy ALOHA 17.0

HAProxy ALOHA 17.0 is now available, delivering powerful new features that improve UDP load balancing, simplify network management, and enhance performance. With this release, we’re introducing the new UDP Module and extending network management to the Data Plane API, a new API-based approach to network configuration. The Network Management CLI is enhanced with exit status codes and contextual help.

DSC and STP Update

For over 15 years, Ribbon Communications and Cellusys have worked together to drive innovation in signaling solutions. Today, we’re excited to announce the next phase of our collaboration: Cellusys and Ribbon will be combining the strength of the Cellusys Signaling Firewall and Roaming platforms with the Ribbon DSC and STP though the purchase by Cellusys of a license of the source code to the Ribbon STP and DSC products.

Common database performance monitoring pitfalls and how to avoid them

Databases are fundamental to almost all applications, facilitating everything from financial dealings to social media engagements. Nonetheless, efficient database performance monitoring frequently resembles maneuvering through a labyrinth, with concealed traps that may result in diminished performance or expensive downtime. In this article, we will examine frequent mistakes in database monitoring and offer helpful advice to avoid them.