Operations | Monitoring | ITSM | DevOps | Cloud

The AI Revolution in Incident Management: Insights from the Frontlines

Cofounder Doreen Jacobi spoke with several of our customers about the revolution AI is bringing to incident management. Artificial Intelligence has seamlessly integrated into our daily lives, often in ways we barely notice. But what does that actually mean for industries facing complex challenges, like incident management? What real benefits does AI bring today, and how might it shape the future?

The Future and The Floor: Framing Investments for Growth

There are a limited number of investments that a team can make in any given year and it can be daunting to choose the “right” ones. In R&D, there is always more to do. There is always more to research, design, build, fix, maintain, and improve. Spread across multiple domains, the possibilities multiply: we’re spoiled for choice—and, while inspiring, the breadth of possible investment areas can be overwhelming.

Generative AI Vs. Predictive AI: What Is The Difference

2022 was the "Model T" moment for generative AI, with ChatGPT making its grand entrance and shaking up digital transformation the way Ford changed mobility. The excitement and trust in AI are so real that VCs have funneled $3.9 billion into generative AI in Q3 2024 alone. 49% of companies are allocating new budgets to AI initiatives, and firms like Marsh McLennan have already deployed 40+ AI applications in production.

How AI In The NOC Will Transform Network Operations

In July 2024, a routine network configuration change at Microsoft caused a global outage that left millions without access for 90 minutes. The culprit, however, was a network issue within the Microsoft WAN that disrupted global routes. Unfortunately, this isn’t a one-off network outage but a part of a broader, troubling trend. Modern Network Operation Centers (NOCs) are far too siloed and broken to handle the growing complexity of modern networks.

Threat Detection and Response: How Flowmon Detected an Attack in Real Time

According to a study by IBM, organizations, on average, take more than 190 days to identify a data breach and an additional 60 or more days to remediate the issue. The financial implications of such an event, including mitigation and remediation, run into millions and can pose a serious risk to business continuity. However, organizations can effectively handle these scenarios with the help of robust security solutions and well-defined processes.

Announcing InfluxDB 3 Enterprise free for at-home use and an update on InfluxDB 3 Core's 72-hour limitation

Two weeks into the alpha release of InfluxDB 3 Core (our new open source offering) and InfluxDB 3 Enterprise (our newest commercial offering), we’ve received a good amount of feedback that the 72 hour limitation in Core is too limiting. This fell into three categories: For the users in category 1, we’re announcing a free tier of InfluxDB 3 Enterprise for at-home, non-commercial use.

How to utilize CPU offloads to increase storage efficiency

When storing large amounts of data, the cost ($) to store each gigabyte (GB) is the typical measure used to gauge the efficiency of the storage system. The biggest driver of storage cost is the protection method used. It is common to protect data by either having multiple replicas within the storage system or by using erasure coding to create data chunks and parity chunks to reduce the raw storage consumed, albeit at the cost of higher CPU utilisation.