Operations | Monitoring | ITSM | DevOps | Cloud

The Unsolved Challenges of LLMs in Open-Ended Web Tasks: A Case Study on the Future of Work

Welcome to the AI research bites. This series of short and informative talks showcases cutting-edge research work from ServiceNow AI Research team. The AI Research Bites are open to all, especially those interested in keeping up with the fast-paced AI research community.

Organisational Barriers That SQL Toolbelt Essentials Breaks Down - Jeff Taylor | Redgate

Jeff Taylor, Principal Data Consultant at Fulton Analytics, shares the organisation barriers that SQL Toolbelt Essentials helps to break down. SQL Toolbelt Essentials helps you and your teams reduce manual, time-consuming work and increase productivity. It's the set of industry-standard tools built by SQL Server industry leaders to standardize SQL development across organizations. Learn more here.

How Can AI Transform the Chaos of Developer Workflows? Discover the Future with @getpieces

In this session from Navigate North America 2024, Tsavo Knott and Sam Jones unravel the complexities developers face in today's fast-paced, AI-driven world. This session delves into the innovative ways @getpieces harnesses AI to revolutionize developer workflows, making the seemingly insurmountable tasks of managing multiple languages, projects, and cross-functional teams, not just manageable but streamlined and efficient.

DevOps Debriefs: How The Financial Times Beat Leaks with OIDC

In our first instalment of DevOps Debriefs, join Cloudsmith and special guest Rob Godfrey, Senior Technical Architect at the Financial Times (FT) for a discussion on the crucial role of authentication and credential management in ensuring software pipeline security. We’ll discuss: Innovative strategies that empowered the Financial Times team to overcome software supply chain risks in their pipelines. How the team responded to the fallout of the CircleCI breach by using OIDC with CircleCI and Cloudsmith.

Overview of Playbooks - Incident response automation

Playbooks are a powerful tool to automate common actions in your incident response process. It's like a pre-programmed sequence of steps your team should take when specific incidents occur. Instead of scrambling to remember protocols or manually initiating a series of tasks, responders can activate a Playbook with a single click. This triggers a predefined set of actions, such as notifying team members, setting incident severity/priority, or creating support tickets, all tailored to the nature of the incident.

Cloud Agnostic Backups on Cycle.io

At Cycle.io, we see many unique situations involving data requirements, retention, and security. As a multi/hybrid cloud and LowOps platform, we've had to come up with some pretty interesting solutions for backups and data protection. Dive in with Cycle's co-founder and head of engineering, Alexander Mattoni, as he is easily able to deploy a postgres instance, with automated backups to offsite storage in the span of minutes.

Proactively Protect: Automating and Strengthening Endpoint Security Measures

In an ever-evolving cybersecurity climate, safeguarding endpoints against threats has never been more paramount in today’s constantly evolving cybersecurity space. Endpoint management plays a key role in ensuring key security tools like antivirus and Endpoint Detection and Response (EDR) software are present and operational, while automating endpoint hardening that promotes a stronger security posture.

How to differentiate your MSP like a ninja

In a crowded, commoditized market, being able to differentiate really boils down to how quickly & effectively you can earn trust. The best-performing companies are very intentional about the "trust signals" they're putting out there, and some of those signals may not be what you think they are. Let’s dive into concrete examples and place your business on an entirely different playing field than your competitors.