Operations | Monitoring | ITSM | DevOps | Cloud

What Is SDLC? Understand the Software Development Life Cycle

The Software Development Life Cycle (SDLC) refers to a methodology with clearly defined processes for creating high-quality software. in detail, the SDLC methodology focuses on the following phases of software development: This article will explain how SDLC works, dive deeper in each of the phases, and provide you with examples to get a better understanding of each phase.

Simplify NFV adoption - Charmed OSM and Managed Apps

Charmed OSM and Managed Apps let telecom operators accelerate adoption of NFV. This is needed because the way we consume data has changed. We want data at a cheaper price with faster speeds and in larger quantities. To meet the challenge, telecom operators are changing the underlying network infrastructure that delivers data. Software-defined networking (SDN) and network function virtualisation (NFV) are enabling this by lowering costs and improving infrastructure flexibility.

The Anatomy of a Secure Serverless Platform, Pt. 2 -- Development

Stackery’s secure serverless platform for AWS offers teams a key resource to help realize the promise of serverless – by automating otherwise complex infrastructure processes, we enable you to leverage the massive suite of AWS tools and services with minimal management overhead. It’s crucial for teams to do this while enforcing security and ensuring adherence to compliance guidelines.

Splunk Rapid Adoption Packages - Part 2

In part 1 of the RAP blog we focused on an overview of Rapid Adoption Packages, Part 2 will now focus on the use case package specifics and how these can help with customer goals. With Rapid Adoption Packages Customers have the option to select a number of use cases which are specifically designed exactly to do this, there are currently 9 available use case packages and they include...

Monitoring Family Pickle Consumption with Splunk!

Recently, about a month after our public health crisis started in the US, I opened my mailbox. Inside was a printed public service announcement sent from the mayor of my little community northwest of Denver. It had cute graphics of cartoonish townsfolk wearing facemasks, and the content conveyed reasonable, folksy messaging about social distancing and sheltering in place.

Fraud Detection: WFH Leading to Increased BEC and Phishing Threats - What To Look For

A lot has changed in the past few weeks. And the percentage of us working from home (WFH) has increased tremendously. With increased WFH, we rely more on email communication, and this increases the opportunities for abuse by others. One thing that has stayed constant: bad people want to do bad things. As we have seen in the past, when one avenue of attack is restricted, the fraudsters redouble their efforts in other areas, and online fraud attempts are already increasing during our new normal.

IAM Access in Kubernetes: How to Install Kube2iam

IAM is the de-facto method of authorization in AWS. Most Kubernetes “Quick Start” guides for AWS do not adequately cover how to manage IAM access in your pods. This blog series will first go over the security issues specific to AWS IAM on Kubernetes, then compare solutions, and then we will end with a detailed walkthrough for setting up your cluster with one of those solutions.

Motadata ServiceOps | An ITIL Compliant IT Service Management Platform

Introducing Motadata ServiceOps! An ITIL compliant IT Service Management platform which offers a single point solution that is simplified, easy-to-use and deploy, meeting the IT operation management and automation requirements. It eliminates manual complexities, encourages self-service, offers a modern interface to improve user experience, and provides meaningful insights that improve the overall quality of IT services.