Operations | Monitoring | ITSM | DevOps | Cloud

Webinar

The Unplanned Show, Episode 2: Hadijah Creary Demystifies Customer Success vs Customer Service

In this episode, Hadijah Creary breaks down what Customer Service teams are versus Customer Success teams. What do they care about? How can they each get more proactive to improve the overall customer experience? And why is it PagerDuty Customer Service Operations and not Customer Success Operations?

Container Optimization Techniques that Cloud Providers Hate!

Watch this 20-min session to get an in-depth look at factors that must be considered when optimizing containers, and effective ways to optimize container density to make sure that they don’t get throttled or killed, while at the same time making sure that being safe doesn’t run up a huge cloud bill. We cover 3 critical factors that are key when optimizing.

What Are Average MSP Salaries in 2023?

Catch an exclusive sneak peek inside Bowman Williams’ new 2023 MSP Salary Guide, which shares average salary numbers and compensation trends for 32 different MSP positions. Bowman Williams CEO John Davenjay and Operations Manager Mark Hammond sat down with NinjaOne's Jonathan Crowe to discuss the latest salary trends and how owners and candidates are adapting.

From Git to Kubernetes

Join our webinar to learn best-practices when using the JFrog Platform to store and manage your Docker images and Kubernetes deployments from beginning to end, while also setting up a continuous build, test and deploy pipeline. We’ll cover best practices for managing and creating Docker registries and Helm repositories, testing and promotion of Docker containers, and taking your containers all the way to production using the JFrog Platform and Kubernetes together.

Merging to Main #3: CI/CD Secrets

CI/CD Secrets are... well... secret (or at least they should be)! Think of all the credentials and tokens currently in use in your CI/CD pipeline. These secrets provide critical authentication for essential infrastructure like source control, environments, and build and deployment tools, but they can also easily expose you to risk. Having a secure secret management process is more important than ever for protecting your company and ensuring only authorized personnel can access them.