Operations | Monitoring | ITSM | DevOps | Cloud

The New Retrospective Experience Is Now Available to All

A great retrospective isn’t just about documenting what happened — it’s about bringing your team together to uncover the insights that lead to real improvements in your process, roles, and technology. But to make that happen, retrospectives need to be structured enough to be effective, flexible enough to fit your team, and easy to collaborate on. That’s exactly what we set out to build.

Why a Mobile Alerts App Makes All the Difference in Efficient Mobile Alerting

written by Doreen Jacobi To understand the significance of a mobile alerts app, we need to first look at mobile technology in general. It is no secret that it has become an integral part of our personal and professional lives, fundamentally changing how we communicate, interact, work, and respond to challenges. With over 307 million smartphone users in the U.S. alone, smartphones are not just a convenience, they are at the center of our everyday life.

Chris Unwin - test data management with Redgate

Chris Unwin discusses the challenges of test data management and how Redgate can solve them. They highlight the difficulties in finding data, discovering PII data, and implementing protective measures like masking. They emphasize the importance of automating these processes to improve feedback cycles and speed up delivery.

AI in Embedded Systems: A Black Box You Must Learn To Control

AI isn’t predictable, it adapts, making embedded engineering even more complex. A model that works in the lab might fail in the real world. So, how do successful teams deploy AI at the edge? A/B test models in the field—controlled environments aren't enough. Collect real-world performance data—observability tools are key. AI deployment isn’t a one-and-done process. It requires constant iteration and real-world validation.

A comprehensive guide to container security

So much of our modern software runs on containers. Containerized applications offer great flexibility for developers, but they also come with security risks. Container security is a holistic approach to managing risk in containerized environments. Securing containers requires a broad approach incorporating different tools and policies that enforce security in the software supply chain, infrastructure, container runtime environments, and other potential container attack surfaces.