Operations | Monitoring | ITSM | DevOps | Cloud

The role of CMDB in breaking down silos between IT and Security

The session highlights the importance of a well-structured Configuration Management Database (CMDB) in managing IT resources and ensuring compliance. It discusses the need for collaboration between IT and security teams to address vulnerabilities and improve incident response. The current cybersecurity landscape, including ransomware threats and data silos, is examined. Integrating CMDB with security tools is emphasized to strengthen security posture and meet governance requirements.

Navigating Windows 10 End of Support #patch

Windows 10 end of support is nearing, leading to important discussions about future steps and ongoing support options. Microsoft offers Extended Security Updates for businesses to license critical systems. Many customers seek ways to prolong Windows 10's life while contemplating upgrades to Windows 11. The operational costs for maintaining support involve a flat subscription fee per device, with Ivanti providing support for certain products under this program.

Exploring why PostgreSQL made generated columns virtual

Generated columns have existed in PostgreSQL since version 12. The idea was to allow people to make calculations based on other columns in the table and store them. It makes your life easier by ensuring data accuracy and preventing unauthorized manual modifications. But why, after 6 versions, is PostgreSQL making generated columns virtual and also making this new way the default? This is an example of the types of questions we had when exploring and playing around with this new feature.

Announcing HAProxy Enterprise 3.2

HAProxy Enterprise 3.2 is a pivotal release that reinforces the product’s identity as both the world’s fastest software load balancer and a sophisticated edge security layer. This release brings next-generation security intelligence, extends its industry-leading performance, and expands the native routing and integration capabilities in HAProxy Enterprise.

Unpatchable Vulnerabilities: Key Risk Mitigation Strategies

Wouldn’t it be great if every vulnerability had a fix waiting in the wings? If patching were always fast, easy, and complete? That’s not the world we live in. Some vulnerabilities can’t be patched at all. Others are buried in systems or services you don’t fully control. And the longer your focus stays limited to internal infrastructure, the more risk slips through the cracks.

Secrets We Forgot... Until Automation Saved Us

We All Have That One Secret… That API key that has been sitting in production for ages. The personal access token that was supposed to be rotated 2 months ago. The service key that is about to expire… wait, when does it expire again? Most developers have experienced working with secrets. We create secrets, use them, and promise ourselves that we will rotate them. But somehow, the secret that was supposed to be rotated after 90 days is still standing strong after 6 months. Sounds familiar?

Why GPUs accelerate AI learning: The power of parallel math

What makes GPUs so crucial for AI workloads? Is it just about raw processing power, or is there more to it? As we explore the world of AI infrastructure, understanding the role of GPUs is essential. Let's dive into the math behind AI. At its core, AI is all about mathematics, and matrix multiplication is a critical component. Whether you're training a model to recognize images or predict outcomes, the data is converted into massive arrays or matrices of numbers.

Making logs work smarter: Evolving your observability strategy

When you start building an observability stack, it’s natural to reach for logs first. They’re familiar, easy to generate, and often already part of a developer’s workflow. And sending logs to a centralized system feels like a quick win, too. Simply add a log shipper, and voila, your application is observable.