Operations | Monitoring | ITSM | DevOps | Cloud

Developer-ready Ubuntu on Qualcomm IoT platforms | Ubuntu Summit 25.10

Qualcomm and Canonical have partnered to provide organizations and developers with a reliable, security-focused, high performance, certified operating system platform. The GA release of Ubuntu on Qualcomm Dragonwing platforms for both Desktop and Server is now available, offering the ability to create, test, and customize your use cases on-device.

Using Traces, Metrics, and Logs All in One Place, as Demonstrated by Pipeline Builder

When troubleshooting complex software, it’s important to be able to gain insight via its telemetry quickly and precisely. No one wants to waste time switching between tools or worrying about how to interact with different types of data. At Honeycomb, all your data is available in one place, accessible via our fast query engine. But what does that look like in practice?

DBA vs Developer Dynamics: Bridging the Gap with Database DevOps

Developer velocity and DBA caution are not opposing forces, they reflect two essential priorities that historically lacked a shared process. Database DevOps eliminates tension by introducing automated validation, approvals, and visibility that allow developers to move fast while DBAs safeguard performance and reliability. With platforms like Harness, database change becomes a collaborative workflow instead of a conflict, turning release cycles into a partnership built on trust and predictability.

Data Centre Security Checklist: Executive Oversight for Compliance & Continuity

Compliance requirements and rising risk standards have raised the stakes for data centre security. Without assurance that facilities can resist disruption and protect data, organisations face increased exposure to audit failure, downtime, and reputational damage. For executives and auditors, data centre security is part of wider governance and risk management. Oversight means confirming that physical safeguards, environmental systems, and compliance frameworks are in place and can be trusted.

Seeing Everything: Shedding Light on Shadow IT and AI Usage

I still remember the working with a leading insurance provider on an internal review of their IT estate and discovering a team quietly using an unapproved SaaS tool to speed up their reporting. It wasn’t malicious, they were trying to solve a problem faster. But as we stared at the dashboard, I could see the CIO’s mind racing: What data had they uploaded? Was it encrypted? Were they still compliant?

Perfect Forward Secrecy Made Your Private Keys Boring

For twenty years, a stolen private key was a disaster. It meant total compromise. Every encrypted conversation, password transmitted, API call ever made was readable. Traffic was being recorded all the time, “just in case” your private key leaked out. The NSA even had a name for it: “harvest now, decrypt later.” Record all the encrypted traffic today. Steal the private keys tomorrow. Decrypt everything retroactively.

Bindplane in 200 Seconds: Windows Event Logs & Google SecOps

Learn how to configure Bindplane to collect and route Windows Event Logs from a Windows VM into Google SecOps. In this 200 second onboarding walkthrough, Chelsea shows how to build and configure a full SecOps-ready pipeline in just a few minutes. You’ll see how to: Create a Configuration Add the Windows Event Log source Configure the Google SecOps destination Roll out the configuration to an agent running on a Windows VM Start receiving security telemetry inside SecOps.

Bindplane Onboarding | Install Your First OTel Collector & Send Windows Events to Google SecOps

In this 10-minute step-by-step walkthrough, Chelsea from the Bindplane Customer Success team shows you how to install your first Bindplane OpenTelemetry Collector and start sending Windows Event telemetry from a Windows VM directly into Google SecOps.

Enhancing User Experience with Ivanti Neurons Automation Bots #shorts

Ivanti is a leading enterprise software company that offers a powerful, cloud-based IT and security platform. Our solutions are designed to scale with your business, helping IT and Security teams boost operational efficiency, cut costs and stay ahead of security threats. The Ivanti Neurons platform is cloud-native, providing a unified and reusable foundation for consistent visibility, scalability, and secure delivery. Trusted by over 34,000 customers, including 85 of the Fortune 100, Ivanti empowers organizations to tackle challenges with end-to-end solutions.