Operations | Monitoring | ITSM | DevOps | Cloud

What is ITSM? Learn in 5 Minutes with Simple Terms .

What is ITSM? In this beginner-friendly video series, we break down IT Service Management in the simplest terms possible so you can understand how it impacts businesses today. Whether you’re a student, IT professional, or business owner, you’ll learn the fundamentals of ITSM, its key processes like incident management, change management, and service request handling, and why it’s essential in 2025’s fast-paced digital world. By the end, you’ll know exactly how ITSM streamlines operations, reduces downtime, and improves service quality.

Puppet Enterprise Installations with the Administration Module (PEADM)

In this real-time walkthrough, learn how to install and upgrade Puppet Enterprise using the Puppet Enterprise Administration Module (PEADM). This module helps you with admin and maintenance tasks and really helps you ensure that installations are consistently executed each and every time. Follow along from configuration to execution as Tony Green runs a monolithic installation example and provides an overview of the resources and options available to you.

Charting the Course: Your IT Roadmap for 2026

You may be thinking to yourself, "We're only just over halfway through 2025, is it really time to start thinking about next year?" and the simple answer is yes. Unlike Halloween decorations in July or Christmas decorations in August, it's never too early to start thinking about your plans for the next year. By getting a jumpstart now, you can better plan for goals, initiatives, and the ever-elusive IT budget.

SharePoint Vulnerabilities and Security Updates

SharePoint Vulnerabilities and Security Updates SharePoint is currently facing vulnerabilities that are being actively exploited, leading to guidance from Microsoft and CISA. An attack chain known as Tool Shell is taking advantage of CVEs, revealing new security risks. On-prem software poses significant threats as attackers can decrypt it. Mitigation involves applying updates and improving threat detection. Additionally, Exchange Server has a security update addressing five vulnerabilities, and users must switch from EWS to Microsoft Graph by October 2026.

Why Alert Fatigue is a Major Challenge in Observability (2025 Survey Insights) | Grafana Labs

Over 1,200 engineers, leaders, and teams shared their biggest observability challenges in our third annual Observability Survey — and the results are in. In this video, Marc Chipouras (Head of Emerging Products, Grafana Labs) breaks down the top insights: Thanks for watching!

Elastic Powers GitHub's Seamless Developer Experience

David Tippet, Search Engineer at GitHub, shares how Elastic powers GitHub’s massive search platform and enables a seamless developer experience. He explains how GitHub balances AI-driven semantic search with traditional keyword search, ensuring accuracy for millions of diverse users, from engineers to security researchers.

AI-Driven Application Monitoring with Checkly and Claude Code

In this webinar, Stefan Judis (Developer Relations at Checkly) and Dan Giordano (VP of Marketing at Checkly) dive into how LLMs and AI tools can be used with application monitoring. You’ll see a live demos of integrating Claude Code, Playwright MCP, and Checkly’s Monitoring as Code. ⸻ Timestamps ⸻ Resources & Next Steps ⸻ Subscribe for more sessions on application reliability, testing, and AI-powered DevOps!