Operations | Monitoring | ITSM | DevOps | Cloud

Coredump #007: AI, Open Source, & the Future of Embedded Development

In today's Coredump Session, we dive into a wide-ranging conversation about the intersection of AI, open source, and embedded systems with the teams from Memfault and Goliath. From the evolution of AI at the edge to the emerging role of large language models (LLMs) in firmware development, the panel explores where innovation is happening today — and where expectations still outpace reality. Listen in as they untangle the practical, the possible, and the hype shaping the future of IoT devices.

Application Debugging in Sentry with Flags, Tracing, and Seer

In this video, Cody takes you on a tour or fixing problems in the Unborked marketplace using Flags, Traces, and Seer! Sentry is all about giving you options when it comes to debugging - whether its using the dev toolbar to manage feature flags on the fly, using replays and tracing to dive deep into whats happening in your application, or even using Seer (in beta) to pull all the context from your application together - everything from traces, to errors, to stack traces and more - and give you a root cause of what went wrong, and pull a PR to fix it.

Measuring success in microservices migration projects

Microservices migrations represent significant investments for organizations seeking greater agility, scalability, and development velocity. Yet without clear metrics to guide the journey and measure outcomes, these initiatives risk delivering technical change without meaningful business impact. Establishing appropriate success measures ensures that migration efforts stay aligned with organizational goals while providing visibility into progress and value delivery.

Strangler pattern implementation for safe microservices transition

Moving from monolithic applications to microservices represents a significant architectural transformation. The Strangler Pattern offers a controlled, incremental approach to this migration, enabling organizations to gradually replace functionality while keeping systems operational throughout the transition. This methodology substantially reduces risk compared to complete rewrites, making it an invaluable strategy for organizations with business-critical applications.

Cortex Recognized by Gartner as Representative Vendor in the 2025 Market Guide for Internal Developer Portals

Gartner Market Guide for Internal Developer Portals offers “Platform engineering teams are tasked with improving developer experience, ensuring consistent governance, and enabling discovery and access to software development and delivery capabilities. Platform engineering leaders can use internal developer portals to address these challenges.” Organizations with a current Gartner license can check out the report here.

Achieve Full Visibility: How External Attack Surface Management (EASM) Reduces Risk

Achieve Full Visibility: How External Attack Surface Management (EASM) Reduces Risk Your organization’s attack surface is bigger than you think — and what you can’t see can hurt you. Many internet-facing assets go undetected by traditional tools, especially those without agents, leaving gaps in your security posture.

Windows 10 & Office Updates Product Marketing #shorts #patchmanagement #patchtuesday

Windows 10 & Office Updates Product Marketing Windows 10 updates reveal 87 vulnerabilities, including known exploited ones. Windows 11 also faces vulnerabilities, especially with Citrix. A specific issue with broker xe and Windows Defender is highlighted, with a fix anticipated. Server 2022 has three vulnerabilities, including Citrix. Office updates for 2016 and Android tackle critical vulnerabilities, stressing the need for regular updates. SharePoint server updates address five important vulnerabilities.

Is There Really ROI for Moving Your Voice Network to Cloud Native?

As an operations leader, you are constantly asked to do more with fewer resources. Join us on April 29th to learn how your peers are successfully leveraging cloud native and end-to-end automation to minimize manual labor and lower OpEx. Many of our customers have expressed their challenges in swiftly launching new services, maintaining compliance, or managing subscriber churn. How does one maintain business continuity in the face of expertise shortages and security concerns?

Introducing Server Nicknames

This past week we released the simple yet widely requested feature Server Nicknames, the ability to easily track and manage various servers with unique custom names. At first glance this may seem like a non update but not when you consider that most Cycle users are connecting many servers from multiple providers and locations in the cloud and on premises. With long default server names, this is a huge quality of life improvement.