Operations | Monitoring | ITSM | DevOps | Cloud

Latest Security Updates from Mozilla, Adobe, and Microsoft #patch

Mozilla releases Firefox 1.45, fixing 16 vulnerabilities, while the older ESR version 15.30 addresses four. Adobe updates critical vulnerabilities in InDesign, Photoshop, and Illustrator. Microsoft also updates various Office versions, tackling critical vulnerabilities and known issues in SharePoint and SQL Server. This month sees a decrease in overall vulnerabilities, emphasizing the importance of keeping applications updated.

Wireless Workstation Connect Solutions for Public Safety at IACP25 | Zebra

Explore Zebra's latest innovation — the Wireless Workstation Connect. This cutting-edge hands-free technology is designed to empower law enforcement officers to multitask like never before. With the ability to seamlessly connect and transition between devices, officers can efficiently manage tasks such as accessing real-time data, completing reports, and staying connected in the field — all while keeping their hands free for critical duties.

In the age of AI, measurement becomes our superpower

The last few years have felt less like a product roadmap and more like a scene from science fiction. Artificial intelligence didn’t simply arrive, it erupted. In what feels like a blink, we’re building software by prompting instead of programming. Our words now generate code, compose music, translate languages, and create entire digital experiences.

New features: Introducing Metrics Usage and Query Usage analyzers

As teams grow and telemetry scales, it becomes harder to keep track of which metrics matter. Labels pile up, cardinality increases, and costs start rising faster than anyone expected. At the same time, dashboards often stay quiet and alerts go untouched. The truth is, most teams don’t actually know how and how much of their metric data is being used, let alone which metrics are driving cost. This is exactly the problem we set out to solve.

Coredump #018: Hidden Complexity of Sleep Tech: Power, Comfort, and 8 Hours of Reliability

In today’s Coredump Session, François and Chris from **Memfault** sit down with **Charles Taylor**, co-founder of **Ozlo Sleep**, to explore the journey from Bose’s original Sleepbuds to the rebirth of a product designed to help people truly rest. The conversation traces how Ozlo revived this beloved idea, balancing power management, all-night comfort, and reliability in one of the most demanding consumer tech categories. Along the way, Charles shares lessons from bringing a hardware product back to life, testing technology people use in their sleep, and building a community that believes better rest starts with better engineering.

Pastries with SREs: Holding onto extra observability data and desserts

In this episode of Pastries with SREs, we dig into why you should keep all of your observability data, even if you don’t need it quite yet. We explore: With enriched logs and flexible, cost-effective storage, you can stop worrying about what you might need later and start answering questions with confidence, no matter when they arise. Additional resources.

Stop Leaking PII in Your #Telemetry with Cribl Guard

Sensitive data sneaks into destinations more often than teams realize. In this clip, we capture live events, spot emails and login tokens slipping through, and fix it instantly with Cribl Guard. A few clicks, a commit and deploy, and Guard redacts the data in real time. No complex configs. No regex nightmares. Just fast protection that keeps your telemetry clean and your security tight.

Announcing HAProxy 3.3

HAProxy 3.3 is here, and this release brings downloadable packages compiled by HAProxy Technologies, numerous TLS enhancements including expanded ACME support, better observability with persistent stats over reloads, and many improvements to performance and flexibility such as support for QUIC on the backend. These powerful capabilities help HAProxy remain the G2 category leader in API Management, Container Networking, DDoS Protection, Web Application Firewall (WAF), and Load Balancing.

Defend Against Shai-Hulud 2.0 Supply Chain Attack with Harness SCS

Shai-Hulud 2.0 shows how quickly a compromised maintainer account can result in thousands of infected NPM packages and repositories within hours. Harness SCS provides end-to-end SBOM visibility, policy enforcement to block compromised NPM packages, and complete traceability to detect malicious components early and prevent them from entering your pipelines.

From Concept to Reality: The Journey Behind Harness Database DevOps

Harness Database DevOps was born from a simple question - how can database delivery be as seamless and safe as application delivery? Through deep collaboration with design partners, open-source learnings, and relentless iteration, the team built a platform that unites developers, DBAs, and DevOps under a single, automated workflow. At its core, it’s a story of empathy-driven engineering - transforming database change management into a faster, more reliable, and collaborative experience.