Operations | Monitoring | ITSM | DevOps | Cloud

Trigger CircleCI pipelines from your IDE with natural language

Most CircleCI pipelines are configured to trigger automatically on code commits, but not every development scenario fits that model. Sometimes you need to trigger a build manually—to test pipeline changes, retry a flaky test, or run CI on a colleague’s branch—without the friction of pushing empty commits or navigating to the UI to manually trigger a build.

Easy Way to Convert Wavefront Metrics Using OpenTelemetry

Once upon a time in the world of metrics, Wavefront was a pioneer. Before Prometheus took over and tools like OpenTelemetry unified tracing and metrics, Wavefront brought something novel to the table: human-readable metrics with real-time querying and tag-based dimensionality. In enterprise environments running VMware or early microservices, it offered a scalable way to understand a system's behavior. But as the telemetry landscape evolved, many systems that spoke Wavefront were left behind.

Agentic AI in Enterprise Risk Management - Key Benefits And Features for Chief Risk Officers

Companies using AI are expected to grow by 5.6% in 2025, pushing AI-driven business value to $4.9 trillion, up from $4.7 trillion in 2024, predicts Forrester. If this momentum continues, we won’t just see growth in AI adoption; we’ll witness a transformation in how businesses operate, opening doors to even greater innovation and long-term success.

Securely quarantine suspect packages using Rego code with Cloudsmith's Enterprise Policy Management.

Software supply chain attacks are becoming more sophisticated, and Cloudsmith tackles this head-on with EPM. Using a set of tools, including a policy-as-code approach, you can tailor security policies to be as simple or as advanced as you need. Define any policy using Rego code and Open Policy Agent (OPA) to be highly prescriptive and catch suspect or non-compliant software artifacts before the damage is done..

Securing Containers at Scale: Docker Hardened Images + Cloudsmith

Containers have been with us for a while and are ubiquitous in the Secure Software Development Life Cycle (SSDLC). According to some reports, nearly 60% of organizations use containers for most or all of their production applications. It’s no surprise really, as containers provide consistency and standardization across the lifecycle while speeding up delivery pipelines. They revolutionized how we develop and deploy apps in the cloud and there is no sign of this changing anytime soon.

Preparing for the Autonomous Future

Throughout this blog series, we’ve followed how AI reshapes network operations – from foundational data harmonization to real-time correlation, from contextual insights to agent-driven automation, and most recently, to conversational access through natural language interfaces. But we haven’t reached the final destination.

Harnessing Network Observability to Enhance Grid Resilience

Within the utility sector, a lot is changing. Utilities continue to pursue digital transformation, altering the way services are delivered and operations are managed. What hasn’t changed is the criticality of the services provided. These organizations deliver essential resources like natural gas, electricity, and water—services that we as consumers rely upon constantly for our comfort, sustenance, communications, and more.

SAML authentication in Grafana Cloud: a guide for easy configuration

In my role as Senior Observability Architect here at Grafana Labs, one of the things I focus on is making sure customers are getting the most out of our products. Recently, I noticed a trend where customers were struggling to get SAML authentication configured properly. They were getting stuck on some of the steps needed to configure the users key pair values, which allows users to log in with the correct roles assigned in Grafana.