Operations | Monitoring | ITSM | DevOps | Cloud

Exploring why PostgreSQL 18 put asynchronous I/O in your database

For years, PostgreSQL relied on synchronous I/O, meaning that when the database needed data from disk, each read operation was a blocking system call. The database process would therefore pause and wait for the data retrieval before moving to the next task. Synchronous I/O works well for local storage, but our database needs have changed drastically since then, resulting in this architecture creating significant bottlenecks when storage has higher latency.

Densify Announces Kubex AI to Simplify and Democratize Resource Optimization

Densify has announced Kubex AI, a major leap forward in how organizations optimize complex Kubernetes and AI environments. This new solution combines verticalized AI for resource optimization with a conversational interface, empowering anyone—regardless of technical background—to access expert-level analytics and automation through simple, natural-language interactions.

Sync your Backstage catalog with Datadog IDP

Backstage is a popular open source framework for building internal developer portals (IDPs) used by organizations to aggregate service metadata and create a single source of truth for their software developers. However, data stored in the Backstage Software Catalog can quickly become siloed and inaccessible from monitoring tools such as Datadog.

The Hidden Side of AI: Building a Smarter Enterprise AI Solution

Everyone is talking about AI models, copilots, and large language engines. They’re certainly impressive, even transformative, but they’re only part of the story. The real power of AI depends on what’s happening behind the scenes. In enterprise environments, that hidden side of AI (the infrastructure, automation, and orchestration that make everything run) determines whether an AI strategy succeeds or fails. That’s where a smarter enterprise AI solution begins.

Certificate revocation is broken but we pretend it works

Last week, someone commented on my post about 47-day certificates: This perfectly captures our collective delusion that SSL certificate revocation works. You click a button, the certificate stops working. And why wouldn’t we believe that? Every CA has a big “Revoke Certificate” button right there in the dashboard. It must do something, right? Here’s the dirty truth: most revoked certificates keep working.

SIEM Migration in 68 Days

In this session, we will discuss how the University of Pittsburgh was able to modernize their data processing strategy, migrate to a new SIEM solution, and avoid ballooning SIEM costs all within 68 days from the first install of a Cribl product. We will showcase how we were able to use Cribl's software to easily handle the following scenarios: 100% agent replacement and consolidation using Cribl Stream Workers and Edge.

The Modern SOC: Transforming security operations with Al and automation

Security teams are dealing with massive data growth, siloed tools, and constant alert fatigue. All of this makes it harder to detect and respond to threats. AI has become a key part of the solution, but its effectiveness depends on having access to complete, high-quality data. In this session, Palo Alto Networks and Deloitte will explore how AI and automation are redefining the modern Security Operations Center (SOC). Learn how leading organizations are leveraging intelligent workflows, automated threat detection, and machine learning to accelerate response times, reduce analyst fatigue, and strengthen overall security posture.

What the RFC?! Making sense of syslog before you migrate

Syslog: it's everywhere, it’s ancient, and let’s be honest — it rarely shows up the way the RFC says it should. Before you cut over to Cribl Stream, it pays to understand exactly what you're dealing with and why it matters. In this talk, we’ll demystify the syslog format (yes, the actual RFC 3164 and 5424 stuff), look at what happens when data goes rogue, and explore how Cribl can help bring order to the chaos.