Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Create an EKS Cluster with Ubuntu Pro Using eksctl

Setting up an EKS cluster with Ubuntu Pro has never been easier, thanks to eksctl. In this brief tutorial, we'll walk you through the simplest way to create an EKS cluster with Ubuntu Pro, using the latest version of eksctl. Why choose Ubuntu Pro? Ubuntu Pro on EKS provides enhanced security features tailored for your enterprise needs. From Kernel Livepatch, which keeps your kernel secure without requiring node reboots, to ESM-Apps, ensuring your containers run with fully supported open-source software from Ubuntu's repositories—all backed by Canonical's active security maintenance.

How to Automatically Remediate Incidents with Grafana IRM

Build automatic remediation workflows to preemptively resolve system issues and minimize downtime. With observability-native IRM, you can automate routine tasks, ensure consistent responses, and reduce the manual effort required to manage incidents. Grafana Cloud is the easiest way to get started with Grafana dashboards, metrics, logs, and traces. Our forever-free tier includes access to 10k metrics, 50GB logs, 50GB traces and more.

Welcome to a World of Possibility with Elastic

Activate a world of possibility with Search AI. Elastic powers AI to give you real-time, forward-thinking flexibility. When data turns into action, you don't have to wait for the world to turn. You can drive it's motion. With Elastic's search AI you can unleash the possibilities of your data. And transform your world.

How to Set up App Permissions Management Policy in AirDroid Business?

Welcome to this tutorial video, where we walk you through setting up an app permissions management policy in AirDroid Business. AirDroid Business is a mobile device management (MDM) solution that helps you manage all your Android and Windows devices effectively and securely.

What is the Cyber Resilience Act?

The Cyber Resilience Act is an upcoming European Union legislation that aims to implement more rigorous cybersecurity commitments, documentation, and vulnerability reporting requirements for the IT industry. The legislation would apply to developers, distributors, manufacturers and retailers of hardware, devices, software, applications, and other “products with digitally connected elements” sold within the EU. The requirements you need to meet depend on the CRA classification of products.

Resilience as the Foundation for Growth and Compliance in Financial Services

Discover how financial services leaders build digital resilience amid security threats and compliance challenges. Learn strategies to enhance your security posture, drive growth, and meet customer expectations in uncertain times. Featuring insights from IDC and Splunk experts.