Operations | Monitoring | ITSM | DevOps | Cloud

NuttX Bluetooth Vulnerability Explained

Discover the hidden vulnerabilities lurking in even the most trusted software! In this video, François Baldassari dives into the shocking reality of a recent CVE filed against NuttX, revealing how easily mature projects can expose your products to security threats. Are you up-to-date with your RTOS? Find out what steps you need to take to protect your systems now!

Custom Alerts in Checkly

Learn how to customize your alerts in Checkly to get only the notifications you need. This video walks through account-wide alert settings, managing alert channels, using groups for business-critical checks, and leveraging Monitoring as Code to manage everything from your IDE. Plus, see how to use the Checkly CLI to import existing checks from the UI into code for full version control and automation.

Supercharge Microsoft Sentinel with SIGNL4 | Mobile Alerts & On-Call Automation

Are your Microsoft Sentinel alerts stuck in dashboards or buried in emails? It's time to take your SecOps mobile. In this video, discover how SIGNL4 transforms Microsoft Sentinel and Microsoft Defender for Cloud into a fully mobile, on-call incident response platform. SIGNL4 delivers persistent mobile alerts to the right person - instantly - with full escalation, tracking, and acknowledgement. Improve incident response time Eliminate missed alerts Automate on-call scheduling Ensure SLA compliance Reduce alert fatigue.

Get Ready for the Next Level of Gaming!

Recorded at Civo Navigate Austin 2025, join industry experts from Perforce, Gametree, and Streamfog as they share their insights on the current state of technology in gaming, cloud-native technologies, and the future of tech in gaming. This panel discussion explores the latest trends and innovations in game development, AI-powered gaming, and emerging business models, revealing how the gaming industry is leveraging cloud-native technologies, AI, and other cutting-edge tech to drive innovation and growth.

IT Equipment Checkout: Get Loaner Assets Under Control

Need a better way to manage loaner laptops, shared AV gear, or any other equipment for short- or long-term use? This video shows how Alloy’s ready-to-use equipment check-out system simplifies equipment reservations and checkouts — from request to return. Whether you're supporting a school district, healthcare provider, or government agency, knowing who has what and when it’s due back is essential.

The $465M Bug: What Every Dev Needs to Know About Code Health

Is your codebase quietly killing developer productivity? In this talk from GitKon, Jai Predeesh (co-founder of DeepSource) breaks down why code health is more than a buzzword... it’s a critical lever for preventing failures, improving dev morale, and scaling without firefighting. From Knight Capital’s $465M bug to subtle security flaws in AI-generated code, this session shows how automated static analysis can catch the issues that escape human eyes and PR reviews.