Operations | Monitoring | ITSM | DevOps | Cloud

How a global bank turned a search engine into its data backbone

BBVA transformed customer experience and operational insight by using Elastic to unify 45B+ data points across 50+ banking services, with sub-second response times. When BBVA's David Jiménez Ausin looks back at 2014, he sees a very different banking landscape. “Almost everything was still via web channel, as the app wasn't as developed as it is now, and each service had its information in its own systems,” he recalls.

Introducing Support for Chocolatey and PowerShell Packages

In February, we announced our support for Hex packages, which further solidified the JFrog Platform as the most universal package management solution. We’re excited to announce we’re continuing to build on our universality with our new official support of Chocolatey and PowerShell, which allows both technologies to be used with our NuGet repositories in JFrog Artifactory.

Network Monitoring Automation: Streamlining Operations and Efficiency with Motadata AIOps

Did you know the network infrastructure market revenue is expected to reach YS$253.21bn by the end of 2025? Over the years, small businesses and large organizations have been using networks to communicate and exchange information. With digital transformation and adoption of new technologies, networks are becoming increasingly complex. Organizations find it challenging to track these complex, extensive networks and identify issues in real time through manual monitoring.

The Future of AI in Asset Management: Key Trends and Technologies

Artificial Intelligence (AI) has become one of the most transformative technologies in today’s business landscape, especially in asset management. From improving decision-making to automating maintenance schedules, AI is redefining how organizations monitor, track, and manage their valuable assets. As digital transformation accelerates, the relationship between asset management and AI is growing stronger, unlocking new opportunities across industries.

How One Enterprise Reduced 1,600 Trap Alerts by 80% and Saved 26 Hours During Migration

For large-scale IT organizations, SNMP traps and log alerts are critical, but they can also be a hidden source of technical debt. Over time, alerting systems balloon with noise like redundant conditions, alerts from decommissioned tools, and logic that no longer maps to today’s hybrid infrastructure.

How To Rebuild a Scalable Data Pipeline with AWS Serverless And Graviton

Learn how a cybersecurity startup cut cloud costs by 95%, automated onboarding, and scaled effortlessly by migrating from EC2 to a fully serverless architecture. Takeaways When a fast-growing cybersecurity startup hit the limits of its monolithic cloud setup, it didn’t just need an upgrade – it needed a full re-architecture. The goal: eliminate surprise costs, automate customer onboarding, and build for scale. Here’s how a full serverless revamp, powered by Graviton, made that happen.

New Feature: Manage Your session.id in Honeycomb's Web SDK

The session.id field is special in Honeycomb for Frontend Observability. It’s a default option for filtering and grouping, and it’s the basis for session timeline analysis (in Early Access). Now you can control how session.id is set. In prior releases (< 0.15.0) of the Honeycomb Web SDK, we used our own UUID generator for session.id, and it was not accessible outside of the Web SDK itself. As of version 0.15.0, we give you full control.

Why Puppet Vulnerability Remediation is a Game-Changer for Enterprise Infrastructure Ops

Effective vulnerability management has become a growing priority for organizations. Aided in part by AI, threats and vulnerabilities grow in speed and sophistication while IT environments become more complex. The skill gap for cybersecurity keeps widening (further worsened by a sprawling toolkit), exposing critical systems to exploitation. Managing secure infrastructure manually just isn’t possible at the scale and speed today’s enterprises demand.

Ensuring Compliance & Business Continuity with Automated Backup & Recovery

Every organization has two non-negotiables: stay compliant and stay online. But achieving both—especially at scale—isn’t easy. Many IT teams still rely on manual processes for backups, documentation, and recovery. And when something goes wrong? The cost isn’t just measured in downtime, but in regulatory penalties, lost trust, and business disruption. What if network compliance wasn’t a separate process—but could naturally integrate into your recovery strategy?