Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Welcoming new leadership at Cloudsmith - a note from Alan Carson

Alan Carson writes about his experience and journey with Cloudsmith, as new CEO Glenn Weinstein steps in as leadership. I heard something recently, that resonated, about success. In a simple (but not easy) three-step plan; success happens when the following three things align: A great example is, of course, Steve Jobs and Apple. The contrarian idea was that every single human would need a personal computer. He was proven right. And he executed expertly (with a few ups and downs obviously!)

Barcode trends: The future of inventory management

With advances in technology, inventory management has evolved considerably, from traditional manual methods to more automated and intelligent systems. In this article, we’ll take a look at barcode trends, exploring how artificial intelligence (AI) and new technologies are revolutionizing the way companies manage their inventory.

Troubleshooting Spring Boot Microservices - A Real World Case Study

Today, I’ll cover Shift Left Monitoring: A Pathway to Optimized Cloud Applications and how left-shifted troubleshooting of Spring Boot code issues using observability tooling can avoid production issues, unnecessary costs and improve product quality. Shift-left is an approach to software development and operations that emphasizes testing, monitoring, and automation earlier in the software development lifecycle.

The Landscape of Zero Trust Adoption: Insights from Our 2023 Zero Trust Progress Report

Organizations are responding to the changing cybersecurity landscape. And zero trust is at the heart of this change, with 68% of respondents saying they’re planning or actively working towards adopting a zero trust access model. In collaboration with Cybersecurity Insiders, Ivanti surveyed 421 US-based IT and cybersecurity professionals to identify the latest enterprise adoption trends, challenges, gaps and solution preferences related to zero trust security.

TPM-backed Full Disk Encryption is coming to Ubuntu

Full disk encryption, FDE, has long been an integral part of Ubuntu’s security strategy. Its mission is straightforward: to mitigate the risks of data breaches due to device loss and unauthorised access, by encrypting data while stored on the computer’s hard drive or storage device. For 15 years, Ubuntu’s approach to full disk encryption relied on passphrases for authenticating users.

What is a virtual private cloud in AWS?

Amazon Web Services (AWS) dominates the cloud computing industry with over 200 services, including AI and SaaS. In fact, according to Statista, AWS accounted for 32% of cloud spending in Q3 2022, surpassing the combined spending on Microsoft Azure, Google Cloud, and other providers. A virtual private cloud (VPC) is one of AWS‘ most popular solutions. It offers a secure private virtual cloud that you can customize to meet your specific virtualization needs.

Hospital Discharge Best Practices

Establishing an effective hospital discharge process is a crucial part of a patient’s stay and can significantly impact the success of their recovery. Patients, families, and subsequent care providers require a detailed education on continued treatment, aftercare processes, and required medications, to avoid any complications that may surface during recovery.

How to use the Grafana Faro Web SDK with Grafana Cloud Frontend Observability to gain additional app insights

Frontend observability (or real user monitoring) is a critical, yet often overlooked, part of systems monitoring. Website and mobile app frontends are just as complex, if not more so, than the backend systems observability teams typically prioritize. They also represent the first interaction users have with our applications — so it’s important to have full visibility into that experience.

Simplify Azure Monitoring with Logz.io's New Azure-Native Integration

If you’re looking to monitor Microsoft Azure infrastructure with Logz.io, we’re now making it easier than ever with our new Azure-native integration Typically, collecting infrastructure metrics from Azure involves installing and configuring data collection components on your system, such as Prometheus, Telegraph, or a number of proprietary agents that are specific to different vendors.