Operations | Monitoring | ITSM | DevOps | Cloud

Spotify's performance & control across large monitoring environments with VictoriaMetrics

When your active time series is in the billions and the total number of data points you need to monitor runs into the tens of trillions, you need a high-performance observability solution with operational simplicity. Streaming behemoth Spotify is one such case. Their observability team chose VictoriaMetrics as the fastest monitoring and observability solution on the market.

AI & FinOps: The New Power Duo Driving Modern Profitability

FinOps teams have been expected to understand millions of dollars in cloud and AI spend using tools that a handful of (usually technical) specialists can operate. Dashboards, filters, exports, and SQL have been the norm. That era is over. CloudZero is now bringing AI directly into the FinOps workflow so anyone in the business can ask natural-language questions about cloud and AI spend, and get accurate answers back from the platform.

ITAM: Your Unexpected First Line of Cyber Threat Defense

When the conversation turns to cybersecurity, people often think of firewalls, intrusion detection systems or state-of-the-art endpoint protection. Yet, beneath these sophisticated shields is an essential (and often unsung) foundation: robust IT Asset Management (ITAM). For CIOs guiding mid-sized and enterprise organizations through an increasingly perilous digital landscape, ITAM offers not just operational clarity, but a powerful first line of cyber threat defense.

AI adoption is messy. Here's how engineering leaders are taming the chaos.

There's a moment every engineering leader hits when implementing AI where they realize that no one really knows what they're doing. Not your competitors. Not the consultants. Not even the executives pressuring you to show results yesterday. Everyone is figuring this out in real time, and beneath the confident vendor pitches and LinkedIn thought leadership, the truth is messier than anyone wants to admit.

How the Best IT Help Desk Automation Gives Tickets the Context They Should've Had All Along

IT help desk automation has evolved far beyond scripts and workflow triggers. It refers to intelligent, agentic systems that enrich, triage, diagnose, and recommend or execute actions before a human ever touches the ticket. Modern automation gathers the context engineers normally have to hunt for and presents issues as decision-ready cases. In IT, we love predicting the end of things: data centers, passwords, and yes, tickets. Zero Ticket IT often gets misunderstood in that same category.

Inventory Management Plan: A Guide to Efficient Resource Management

Inventory planning is essential for any organization that needs to track supplies, equipment, and materials efficiently. Schools, construction companies, IT departments, and other industries must manage inventory effectively to avoid shortages, optimize stock levels, and reduce costs. A well-structured inventory management plan ensures that essential resources are available when needed while preventing unnecessary expenditures and delays.

Evidence as an Input

Evidence isn’t something you produce at the end — it’s something every control generates for the next one. In this video, Mike Long (CEO & Co-founder, Kosli) explains how vulnerability scans produce evidence tied to the artifact fingerprint and the policy file used, and how that evidence becomes an input to downstream controls like release approvals. This is the core of reusable, continuous compliance.

Why Release Control Takes Weeks

The industry standard for release control is painfully manual: long-form policy documents, ServiceNow forms, human approvals, meetings, and tickets that take days or even weeks to close. In this video, Mike Long (CEO & Co-founder, Kosli) explains the difference between manual release control and an automated, zero-trust model where evidence is collected automatically, provenance identifies the artifact, and approvals can be fully codified.

Building visibility and resilience across Kubernetes

Kubernetes has transformed how modern applications are deployed and scaled. Its flexibility and automation power innovation but also expand the attack surface. From control plane access to runtime drift, Kubernetes introduces layers of complexity that can obscure visibility if not properly monitored. For security leaders, Kubernetes is both an opportunity and a risk. While it enables agility, it also decentralizes security responsibility across teams, tools, and cloud layers.