Operations | Monitoring | ITSM | DevOps | Cloud

Semantic Search Explained: Search with intent [Quick Question Ep. 3]

In this video, I’ll explain what semantic search is and how it’s different from traditional keyword search. I’ll walk you through the limitations of lexical search, what we mean by semantic intent, and how vector search plays a role under the hood. About Elastic Elastic, the Search AI Company, enables everyone to find the answers they need in real time, using all their data, at scale. Elastic’s solutions for search, observability, and security are built on the Elastic Search AI Platform — the development platform used by thousands of companies, including more than 50% of the Fortune 500.

GitKraken Desktop 11.3: This is either a brilliant or terrible idea

AI-powered commits? Rewriting your Git history? We know, it sounds unhinged. But in GitKraken Desktop 11.3, Commit Composer makes it possible to take messy WIP or past commits and turn them into a clean, logical story. In this video, we’ll show you how Commit Composer works, when to use it, and what it means for your workflow. What Commit Composer can do: Plus, we cover other new features in 11.3: Git Blog: gitkraken.com/blog.

AI-Driven Risk Analysis in Seconds #AI #itsm

IT changes can be challenging. Hidden risks, costly mistakes. In Alloy Navigator, you’ve got an AI-driven risk analyst that tears through past tickets and mines your knowledge base, delivering risk analysis and tailored recommendations for every change — in seconds. Now everyone on your team has a personal Mentat, a strategic sidekick that turns data into sharp insight. In this short video, we used gpt-4.1-mini for completions and text-embedding-3-large for generating embeddings from OpenAI.

Behind the Dashboard - Catchpoint Traceroute

Behind the Dashboard is an ongoing series where we look under the hood of a specific Catchpoint feature. Each episode breaks down the technology itself, what’s challenging about using it for monitoring, and how we removed friction and toil to make it a valuable part of the Catchpoint platform. In this episode Leon, Brandon, and Sergey take a look at “traceroute” tests – a feature that may seem humble and unassuming, but has unexpected power and utility when it comes to identifying performance issues with your site, service, or application.

Ten Minute Troubleshooting: Meet (and Monitor) Users Where They Are

What do you do if your monitoring, APM, and synthetic tools tell you an application is up, but the users say it’s not? A good first question is to ask where your monitoring tools are located relative to both the users and the application itself. In this episode Mursi helps Leon identify his “red-light, green light” issue and adjust his monitoring to do a better job showing the REAL user’s experience.

IT Horror Stories: ITOops Ep12 S1

In the spine-tingling finale of IT Horror Stories, host Jonathan Crowe is joined by a fearless lineup of IT veterans who have stared into the digital void and lived to tell the tale. Guests Kallum Kyle, Senior Sysadmin at Storable; Josh Adcock, Director of Client Services at The Tech Doctor; and Adam Walter, Founder of Humanize IT, recount their most harrowing experiences from the trenches of tech. They relive moments when end users were their only hope, when vulnerable software lurked like ghosts on forgotten networks, and when automation backfired so badly it cost them their jobs.

Mobile Security Isn't a Nice-to-Have - It's an Absolute Must

Mobile Security Isn’t a Nice-to-Have — It’s an Absolute Must According to the Verizon’s 2024 Verizon Mobile Security Index Report, nearly 90% of organizations recognize the urgent need to take mobile security seriously. Are you one of them? From mobile phishing to smishing, vishing, quishing and zero-day threats, the mobile attack surface is bigger and more dangerous than ever. Cybercriminals are relentlessly targeting mobile devices as a gateway to your organization, making mobile security especially critical.