Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Facing the Future of SBOMs: Are You Ready to Overcome Their Biggest Challenges?

In this session at Navigate North America 24, Cortez Frazier Jr. from Fossa delves into the critical world of Software Bill of Materials (SBOMs). As regulatory demands increase and the call for software component transparency becomes louder, mastering SBOMs is essential. Cortez unpacks the complexities of creating, managing, and distributing SBOMs, offering actionable solutions to streamline the process.

Building an Internal Developer Platform for 20k Engineers on a Single Tenant with Will Stewart

Explore the world of Internal Developer Platforms (IDPs) with Will Stewart, co-founder of @northflank9144. Gain insights into developer experience, security, and scalability, drawing from Will's extensive expertise. Learn how IDPs empower engineering teams for enhanced productivity and innovation in modern software development environments. Dive into this comprehensive overview to unlock the potential of IDPs and optimize your organization's workflow.

NinjaOne Speedrun: From zero to fully functional IT in 60 minutes

Does the thought of switching to a new endpoint management solution make you go, “ugh!”? Worried about the time, effort, and frustration that will go into migration and implementation? Fear not! NinjaOne is easy to setup, implement, and use — 92% of customers say it takes them less than a month to fully implement NinjaOne (and 58% say it takes less than a week). Join this NinjaOne Speedrun webinar and conquer IT setup in 60 minutes flat. Our Field CTO Jeff Hunter will be your guide in this fast-paced session, showing you exactly how to.

What is an Anomaly? Avoiding False Positives in Watchdog Detected Anomalies

In 2018 Datadog released Watchdog to proactively detect anomalies on your observability data. But what defines an anomaly? How do you avoid false positives? At Datadog Summit London 2024, Nils Bunge, product manager at Datadog, shared the story of the creation of the first Datadog AI feature (Watchdog Alert), what we learned from it and how we applied those lessons to all the added AI functionalities across the years.

And What About my User Experience?

Monitoring backend signals has been standard practice for years, and tech companies have been alerting their SRE and software engineers when API endpoints are failing. But when you’re alerted about a backend issue, it’s often your end users who are directly affected. Shouldn’t we observe and alert on this user experience issues early on? As frontend monitoring is a newer practice, companies often struggle to identify signals that can help them pinpoint user frustrations or performance problems.

How to test your systems for scalability and redundancy with Fault Injection

Part of the Gremlin Office Hours series: A monthly deep dive with Gremlin experts. Do you know if your services can tolerate losing a node? What about an entire availability zone? Or a region?‍ Large-scale outages aren’t unheard of. When you’re running critical services, it’s vital that those services can keep running even if an AZ or region fails. In addition to failing over, these services also need to scale quickly so traffic shifts don’t overwhelm your systems. How do you prove that a service is both scalable and redundant? The answer is with Fault Injection.

Episode 3 | Ryan Cooke on CSPM, DSPM and Data Security in the Cloud

In this episode, the hosts and guest discuss the importance of data security posture management (DSPM) and its role in protecting sensitive data. They explore the evolution of the cybersecurity and data security market over the years, highlighting the challenges and advancements in securing data in cloud environments. The conversation also touches on the vendor landscape, the complexity of selecting security tools, and the need for organizations to invest in data security. The key takeaways include the overwhelming number of security tools available, the importance of aligning security goals with business risks, and the impact of regulations on data security.