Operations | Monitoring | ITSM | DevOps | Cloud

What's new in ivanti's Endpoint Management 2026.1

Explore the latest updates in MDM and EPMM, highlighting improvements in admin experience, app management, and security. Key features include new data retention policies, user group management, and device attribute preservation. Enhancements for Vision OS and Email Plus integration with Teams are also discussed, along with ongoing improvements in iOS and Android management. The focus remains on customer feedback and future enhancements in device management.

What is ServiceNow's AI Control Tower?

What happens when AI agents stop being scattered and start being steered? Customer service queues shrink, teams get time back for high-value work, and everyone finally works off the same data. That’s the power of the ServiceNow AI Control Tower—all your AI, all under control. No more fragmentation. No more busywork. Just visibility, control, and workflows that scale across the entire business.

Elephant in the Room, Episode 3: Building a CFP Review Platform with PostgreSQL & Django (Live)

In Episode 3 of Elephant in the Room, we move from theory to practice, building a real, community-focused application live on stream. Join Jay Miller (Aiven), Abigail Dogbe, and Andres Pineda as they collaboratively design and build a CFP (Call for Proposals) review platform using PostgreSQL and Django. The goal: create a practical tool that helps speakers get better feedback on their talks, and helps organizers discover new, diverse voices.

How to Use the Secure Vault in Uptime.com

In this tutorial, we explore Uptime.com's Secure Vault and how to securely create, edit, and manage your credentials. Learn how to access the Vault, add new Vault Items including Username/Password pairs, Certificates, Single Secret Tokens, and Time-based One-Time Passwords (TOTP), and use them in HTTP(S), API, Transaction, and Page Speed checks. Discover enhanced security features, including 256-bit AES-GCM encryption and zero-trust credential storage. We also cover REST API integration, variable usage, and user permissions.

GitKraken Insights | Engineering Intelligence in Minutes

Most software intelligence tools take months to implement, cost a fortune, and end up collecting dust. GitKraken Insights is different. It helps engineering leaders measure what matters: AI impact, code quality, delivery performance, and developer experience, all in one place. It’s the latest evolution of the GitKraken DevEx platform, trusted by over 40 million developers. Insights connects data from across your GitKraken tools to give you a complete picture of engineering health and value. We're talking DORA metrics, pull request metrics, and AI impact.

MCP: Why AI Needs Git Intelligence

GitKraken CTO Eric Amodio breaks down the Model Context Protocol (MCP) and explains why Git intelligence is critical for AI agents at GitKon 2025. In this session, Eric covers: What MCP is and why every major AI company adopted it Why AI needs Git history, not just file system access How GitKraken MCP removes Git pain safely The future of agentic developer workflows How Commit Composer uses AI to organize commits without losing data.

Zebra Tablets | Portfolio Overview | Zebra

Today’s tablets need to be built to survive the rough and tumble of harsh, always-on enterprise work environments. But they also need to be built to adapt to your unique workflows. From screen size to operating system and customization options, they should have the right combination of capabilities to help you achieve more, every day. Meet the Zebra Tablet Portfolio – ET4, ET4-HC, ET6, and ET8 Series.

How to Troubleshoot BGP Faster with Kentik AI Advisor

A BGP session goes down because a transit provider exceeded the maximum prefix limit. How do you find the root cause — fast? In this 10-minute demo, we walk through two approaches using Kentik AI Advisor. First, we troubleshoot step by step using natural language: asking AI Advisor to identify the affected interface, check for interface flapping, and review syslog messages until we find the maximum-prefix violation. Then we show how custom network context and natural language runbooks let AI Advisor do the entire investigation autonomously — following the same four steps a senior engineer would.