Operations | Monitoring | ITSM | DevOps | Cloud

Improve log utilization with Datadog log exclusion filters | Datadog Tips & Tricks

Want to make your logs easier to work with? Excluding unneeded logs from indexing reduces noise and may reduce log management costs. In this video, you’ll learn how to: See for yourself how to improve log utilization with Datadog Log Patterns and log exclusion filters. Then set up an alert to track ingestion spikes.

The Hidden Costs and Concerns of Iceberg Maintenance

Everyone talks about how great Apache Iceberg is, but nobody warns you about this: without proper maintenance, your tables will bloat, queries will slow down, and your catalog will run out of memory. Here are the 4 critical operations you MUST run regularly. Expiring snapshots prevents metadata bloat (Datadog learned this the hard way with catalog memory pressure). Deleting orphan files cleans up failed writes. Compacting data files keeps streaming workloads fast. Compacting manifests optimizes query planning.

Cloud Cost Optimization Services Beyond Tools: Building A Sustainable Operating Model

If you’ve already worked through cloud cost optimization strategies, the fundamentals aren’t new. CloudZero’s State of Cloud Cost report shows that cloud cost optimization is now a priority for most organizations. We’ve also covered these foundations in depth, including how cloud cost optimization works in practice and how FinOps teams approach cost accountability. What’s less discussed is what happens next. Cloud environments don’t stand still. Architectures change.

Understanding Cloud Cost Elasticity: Aligning Spend With Value

In the cloud computing industry, we hear the word “scaling” a lot. We talk about scaling up resources to meet demand, scaling our teams, and scaling our platforms. What tends to get lost is whether your costs are scaling in proportion to the value you’re delivering. If those two metrics don’t move in tandem, it’s likely you’re leaving money on the table. It’s not enough to simply use the cloud.

DLL Hijacking: Risks, Real-World Examples and How to Prevent Attacks

There’s been buzz around CVE-2025-56383 (published on Sept. 26, 2025), a hijacking vulnerability in Notepad++ v8.8.3 in which a DLL file can be swapped to execute malicious code. The CVE has been disputed by multiple parties, but we’re not here to comment on that. However, we are here to comment on DLL hijacking and discuss the very real threat that it poses to an organization. Let’s look into what DLL hijacking is and what measures you can take to keep your DLLs safe.

Friends of GNOME | Ubuntu Summit 25.10 | Lightning talk

In this talk, Cassidy gives us a look into GNOME, the open source desktop environment project. Cassidy explains how GNOME has developed over time, the support provided by donations, and what could come next for the project. About Cassidy Cassiy James Blaede is a GNOME Foundation Director, Flathub Contributor, and Co-founder & CXO of Elementary. Ubuntu Summit 25.10 is a showcase for the innovative and the ambitious.