Operations | Monitoring | ITSM | DevOps | Cloud

Apple Developer outage on March 10th

On March 10, 2026, developers around the world began experiencing issues with Apple Developer services that prevented apps from being verified or launched on physical devices. For many teams building and testing iPhone apps, the outage disrupted development workflows and blocked deployment to test devices. The issue appeared to involve Apple’s developer certificate verification systems.

Improved Azure status integration

Monitoring Azure health across large environments should not require complicated setup. Until recently, connecting Azure to StatusGator required configuring access at the subscription level, which could become difficult for organizations managing dozens or even hundreds of subscriptions. We redesigned the Azure integration to make it simpler, more scalable, and easier to manage.

Claude Agent SDK Monitoring & Observability with OpenTelemetry and SigNoz

Learn how to implement monitoring and observability for the Claude Agent SDK using OpenTelemetry and SigNoz. In this video, we walk through instrumenting your Claude-based agents, capturing traces, metrics, and logs, and visualizing everything in SigNoz for real-time insights. You’ll learn how to debug agent behavior, identify latency bottlenecks, and monitor performance in production environments.

Why SSIS will never die - with Tim Mitchell

Steve is joined by business intelligence architect and author Tim Mitchell. They discuss why SSIS will never die, the general pros of cons of integration services, the evolution from XML to JSON, how AI can help with coding, and taekwondo – among other topics! Recorded on-site at PASS Data Community Summit 2025.

Why 200k Developers Ditched Big Tech AI #openclaw #openai #claude #aicoding #aiagents #speedscale

Is architectural purity dead? The big labs are racing for enterprise control, but developers are flocking to OpenClaw for one reason: ergonomics. It treats AI like a human, not a restricted tool. Are you sticking with the corporate harnesses or going unfiltered? Let’s talk in the comments. Learn more: speedscale.com.

Let's Encrypt 45-Day Certificate Expiration: Monitoring & More

TLS certificate lifetimes are shrinking fast — and that changes how every organization handles renewals, validation, and outage prevention. Let’s Encrypt has confirmed it will move from 90-day certificates to 45-day certificates (with staged rollouts) and dramatically shorten authorization reuse windows. At the same time, the CA/Browser Forum’s Ballot SC-081v3 has adopted a broader industry schedule that ultimately caps public TLS certificates at 47 days by March 15, 2029.