Operations | Monitoring | ITSM | DevOps | Cloud

New dotConnect and Entity Developer Release: EF Core 10, AI Vector Types, and Expanded Database Compatibility

We are thrilled to announce a set of product updates across our dotConnect data providers and Entity Developer. The new release adds support for Entity Framework Core 10, introduces AI-focused vector data types across major databases, and extends compatibility with the newest platform capabilities such as SQL Server 2025, Oracle 26ai, and Microsoft Entra authentication.

API Failure: 7 Causes and How to Fix Them | Harness Blog

APIs have revolutionized how web and web app developers interact with data, whether for personal use or business. One of our most profound responsibilities as API developers is to protect our endpoints from being hacked. Even with essential safeguards in place, our websites can be vulnerable. This post discusses seven causes of API failures and how to fix them.

From signals to savings: Optimizing cloud costs with Grafana Assistant and MCP servers

In today's cloud-native environments, managing resource waste and optimizing costs can feel like a constant battle. Operators, along with their fearless FinOps teams, spend countless hours hunting down unused resources, deciphering complex telemetry data, and manually implementing code or configuration changes to try to reduce cloud costs. But what if you could automate the entire process, from identifying waste to implementing the fix, all based on actual production telemetry?

How to Integrate Microsoft Entra - Part 1

Our Field CTO, Jeff Hunter, demonstrates how to integrate Microsoft Entra into NinjaOne using SAML, which forces NinjaOne accounts to use Microsoft Entra as the authentication source for login. Next week in part 2, we'll discuss configuring SCIM, which allows you to use Entra to create and manage both technician and end user accounts in NinjaOne. Chapters.

What is SSL Certificate Monitoring?

SSL Certificate Monitoring is the automated process of validating the integrity, trust chain, and expiration status of TLS certificates across network endpoints to prevent connection failures. SSL/TLS certificates are required for encrypted data transmission and server authentication. If a certificate is expired or fails validation (hostname, trust chain, issuer, etc.), properly configured clients will terminate the connection.

MCP and A2A: What They Are and Why They Matter for Autonomous IT

MCP and A2A are the two protocols that make agentic AI governable at enterprise scale. One controls how agents use tools, and the other controls how agents work together. AI in the enterprise is no longer confined to chat windows. It’s operating inside incident queues and automation pipelines. Increasingly, teams are using AI agents to take action: detecting incidents, executing remediations, updating tickets, coordinating across systems.

Why the New Normal in Cyberattacks Demands Network Intelligence

As cyberattacks evolve into “machine-speed” disruption campaigns that span cloud, identity, and network planes, traditional monitoring is no longer enough to protect modern enterprise infrastructure. Shifting to a network intelligence model, powered by real-time telemetry and AI-driven reasoning, enables security teams to detect weak signals and automate defenses before an incident becomes systemic.