Operations | Monitoring | ITSM | DevOps | Cloud

Webinar

An Introduction to Memfault's IoT Reliability Platform

Memfault's platform includes device debugging, performance monitoring, and over-the-air update capabilities. These not only help streamline the device development process and quickly identify and resolve issues; but additionally provide insights into your device performance, identify trends, and proactively address potential problems before they impact users. Watch to see a demo of our IoT reliability platform.

GitOps the Planet #14: Building Open Source Communities with Itay Shakury

Itay is the VP Open Source at Aqua Security and CNCF Ambassador. In this GitOps the Planet, we'll discuss open source, dev advocacy, community and how we approach these open source roles. Open source lives at the intersection of community and business, striking the right balance and tone is critical to having a sustainable project with strong community buy-in to serve as the foundation for successful businesses. Come hear all about it!

Putting the Network in Observability

With the accelerating use of DevOps and cloud-native infrastructure, observability is all the rage. Organizations, large and small, are doing their best to make sense of the logs, metrics and traces generated by their applications to identify performance and availability issues. But what about the network? It seems that many organizations forgot that network telemetry has always been the foundation of any monitoring initiative relating to performance, security, or availability. In this Techstrong Learning Experience, Techstrong Research GM Mike Rothman is joined by Phil Gervasi and Rosalind Whitley from Kentik to discuss how network observability adds depth and context to any APM or security analysis environment. Mike also highlights data from a recent network observability survey done by Techstrong Research. In this learning experience, you’ll learn.

Unleash the Potential of Your Log and Event Data, Including AI's Growing Impact

In this Techstrong Learning Experience, Techstrong Research GM Mike Rothman and André Rocha, VP Product & Operations from ChaosSearch, will share insights from a recent Techstrong audience poll on this topic, and discuss the most pressing challenges and solutions, including the inevitable and significant impact of Generative AI.

Analytics Plus webinar: How to drive successful IT infrastructure capacity planning and optimization

With the widespread implementation of cloud infrastructure and the subsequent proliferation of resources across various hybrid platforms, IT teams often struggle to draw effective capacity plans and optimize infrastructure costs. A tailored strategic plan that manages and rightsizes IT infrastructure is the need of the hour. This way, organizations can enjoy increased visibility and scalability across varied deployments, as well as establish sustained cost savings.

The Unplanned Show, Episode 3: LLMs and Incident Response

A software engineer, a data scientist, and a product manager walk into a generative AI project… Using technology that didn’t exist a year ago, they identify a customer pain point they might be able to solve, build on teammates’ experience with building AI features, and test how to feed inputs and constrain outputs into something useful. Hear the full conversation here.

Phishing 2.0: How to Stop Cyberattacks Even Pros Can't Catch

According to Ivanti's 2023 Press Reset cybersecurity report, over 50% of surveyed security professionals said their organizations hadn’t experienced a phishing attack – despite virtually every organization getting phished last year! Today’s phishing campaigns use sophisticated social engineering techniques and the latest AI advances with devastating effectiveness, tricking your most valuable users out of sensitive information, network access and personal credentials.

incident.io Catalog hands on lab

The incident.io Catalog is a connected, navigable, map of "things" that exist in your organization. We can use it to describe an organization as a connected graph, and use that graph to drive powerful workflow automations during incidents. In this hands-on training session, we'll work through an example of building a catalog for a mock organization. We'll then use the catalog to solve some real business problems, including automated incident data attribution, and some realistic workflows which outline how it works and what it enables in the context of incident management.