Operations | Monitoring | ITSM | DevOps | Cloud

Strengthen your mobile security with Ivanti Neurons for MDM and MTD

Mobile security is crucial as smartphones become prime targets for cyber attackers. The shift from desktop to mobile usage has increased vulnerabilities, especially during the COVID pandemic. Key statistics show a rise in mobile phishing attacks and risks from unsecured connections and risky apps. The session highlights the need for mobile threat defense solutions and user education to balance comfort and security.

Ubuntu Pro Containers on AWS: Secure Your Workloads

‎‎ Subscribe and join the Ubuntu community. ‎ ‎‎ Learn how to build and run Ubuntu Pro containers on AWS with enhanced security coverage. In this step-by-step walkthrough, we demonstrate how Ubuntu Pro enhances protection for third-party open-source libraries, enabling you to patch CVEs more quickly and maintain secure workloads. You’ll see how to: · Launch an Ubuntu Pro server on AWS· Create and attach Pro containers using tokens· Build a simple PHP container with Pro security updates enabled· Verify security patches with ESM repositories· Run and test your container on AWS.

How to boost observability ROI with continuous profiling and Grafana Drilldown

For the longest time, observability was centered around logs, metrics, and traces, but the growth of more complex systems has made continuous profiling another essential part of maintaining healthy systems. It provides insights into resource usage and latency down to the code level, delivering key insights to improve performance.

The Unit Economics Of Watering My Lawn: A Lesson On Runaway AI Costs

My wife and I spent hours this summer at home digging in the dirt. We planted new shrubs and perennials and created a small vegetable garden. We spread many square yards of fresh topsoil and grass seed over areas of lawn that needed rejuvenation. It turns out, I should have done all that landscaping with a FinOps leader’s mindset — before my water bill tripled when I wasn’t looking.

Automation Observability: See It, Fix It, Skip the Firefighting

IT leaders know the drill. An alert storm rolls in and the tickets pile up. Your team scrambles to piece together root causes before service degradation kicks in. But the firefighting rages on, even when you have enough dashboards, monitoring, and alerts to light up a Christmas tree. Enterprise leaders need to quit burning budget on shiny dashboards that look good in the boardroom but do nothing to stop outages in the real world.

Node.js Monitoring in Serverless Environments - A Complete Guide

Serverless computing with Node.js is transforming how applications are built and scaled by removing the need to manage servers. However, serverless functions run for short durations and scale dynamically, making traditional monitoring ineffective. Effective monitoring is essential to track performance, detect errors, optimize cold starts, and control costs.

Recapping SEV0 San Francisco 2025

Earlier this week, we gathered in San Francisco for our second SEV0—almost a year after our very first event. SEV0 has always been about shining a light on the biggest challenges (and opportunities) in incident response. Last year, we were still talking about the fundamentals: blameless culture, strong processes, and lessons from the best in reliability. This year felt different. AI has moved from background noise to front and center in every conversation, every team, everywhere.

Software Asset Management system for Modern Businesses

Managing software has become one of the most pressing challenges for modern organizations. Licenses span SaaS subscriptions, on-premise tools, and hybrid deployments, each carrying costs and compliance risks. Without structured oversight, audits turn into costly disruptions and budgets bleed through unused applications. This is why asset management software for small business and enterprise platforms alike are gaining traction.

Docker Daemon Logs: How to Find, Read, and Use Them

Sometimes Docker behaves in ways that catch you off guard—containers don’t start as expected, images pause during pull, or networking takes longer than usual to respond. In those moments, the Docker daemon logs are your best reference point. These logs capture exactly what the Docker engine is doing at any given time. They give you a running account of system state, performance signals, and events that help you understand what’s happening beneath the surface.

This Developer Built an App That Doesn't Spy on You

Rizel Scarlet (Staff Developer Advocate at Block) tackled a problem every developer should care about: apps that spy on users before they even know they need the service. Her solution? Build a privacy-first pregnancy app using AI agents and decentralized web nodes. This isn't just about pregnancy apps - it's about the future of user data ownership.