Operations | Monitoring | ITSM | DevOps | Cloud

How to test the reliability of a Point of Sale (POS) system

Point of Sale (POS) systems are the backbone of any retail store. A single outage can cost retail companies thousands of dollars each minute in lost sales, and even more if the outage happens during peak hours. If the outage goes on too long, it can cause even more costly damage as customers abandon carts and turn to competitors. In an industry where customer loyalty is worth its weight in gold, that brand damage can end up even more costly than the initial lost sales.

Unreal Engine crash reporting now available on gaming consoles with trace-connected logs

With the first major release of the Sentry Unreal SDK (now on v1.2.0, and you can also explore in our interactive sandbox), we’ve made some important improvements to support cross-platform Unreal developers when it comes to platform coverage, debugging with user feedback, and performance monitoring improvements. Here’s what’s new.

The role of CMDB in breaking down silos between IT and Security

The session highlights the importance of a well-structured Configuration Management Database (CMDB) in managing IT resources and ensuring compliance. It discusses the need for collaboration between IT and security teams to address vulnerabilities and improve incident response. The current cybersecurity landscape, including ransomware threats and data silos, is examined. Integrating CMDB with security tools is emphasized to strengthen security posture and meet governance requirements.

Navigating Windows 10 End of Support #patch

Windows 10 end of support is nearing, leading to important discussions about future steps and ongoing support options. Microsoft offers Extended Security Updates for businesses to license critical systems. Many customers seek ways to prolong Windows 10's life while contemplating upgrades to Windows 11. The operational costs for maintaining support involve a flat subscription fee per device, with Ivanti providing support for certain products under this program.

Exploring why PostgreSQL made generated columns virtual

Generated columns have existed in PostgreSQL since version 12. The idea was to allow people to make calculations based on other columns in the table and store them. It makes your life easier by ensuring data accuracy and preventing unauthorized manual modifications. But why, after 6 versions, is PostgreSQL making generated columns virtual and also making this new way the default? This is an example of the types of questions we had when exploring and playing around with this new feature.

Announcing HAProxy Enterprise 3.2

HAProxy Enterprise 3.2 is a pivotal release that reinforces the product’s identity as both the world’s fastest software load balancer and a sophisticated edge security layer. This release brings next-generation security intelligence, extends its industry-leading performance, and expands the native routing and integration capabilities in HAProxy Enterprise.

Unpatchable Vulnerabilities: Key Risk Mitigation Strategies

Wouldn’t it be great if every vulnerability had a fix waiting in the wings? If patching were always fast, easy, and complete? That’s not the world we live in. Some vulnerabilities can’t be patched at all. Others are buried in systems or services you don’t fully control. And the longer your focus stays limited to internal infrastructure, the more risk slips through the cracks.

Secrets We Forgot... Until Automation Saved Us

We All Have That One Secret… That API key that has been sitting in production for ages. The personal access token that was supposed to be rotated 2 months ago. The service key that is about to expire… wait, when does it expire again? Most developers have experienced working with secrets. We create secrets, use them, and promise ourselves that we will rotate them. But somehow, the secret that was supposed to be rotated after 90 days is still standing strong after 6 months. Sounds familiar?