Operations | Monitoring | ITSM | DevOps | Cloud

Evals are just tests, so why aren't engineers writing them?

You’ve shipped an AI feature. Prompts are tuned, models wired up, everything looks solid in local testing. But in production, things fall apart—responses are inconsistent, quality drops, weird edge cases appear out of nowhere. You set up evals to improve quality and consistency. You use Langfuse, Braintrust, Promptfoo—whatever fits. You start running your evals, tracking regressions, fixing issues, and confidence goes up as a result. Things improve.

Zero Ticket Video Series: How to Automate Password Resets with Resolve

Struggling with repetitive IT tickets like password resets and account unlocks? You're not alone — these make up nearly 30% of all service desk requests. In this demo, learn how RITA, the AI-powered IT Agent from Resolve, can eliminate these issues entirely — no ticket required.

How to Enable and Configure Front-end Observability in Blackfire

In this video, learn how to enable and configure Front-end Observability in Blackfire. The tutorial covers steps to enable features across multiple environments via the Organization settings / Front-end usage in the Blackfire dashboard. Control front-end observability by enabling or disabling Browser Monitoring and Analytics per environment, using a JavaScript probe and a unique browser key. The video emphasizes the importance of naming transactions and explains how to manually add tracking snippets to HTML for better control.

How to monitor and manage front-end observability in Blackfire

In this video, we'll guide you through the process of monitoring and managing your usage of front-end observability features in Blackfire. Learn how to access your Browser usage dashboard to view browser traces collected per environment, track your quota consumption, and understand the concept of spike protection. You'll discover how Blackfire's automatic detection of abnormal traffic spikes protects your monthly quota and ensures continuous data collection.

AI-Driven Efficiency with Zebra Mobile Computing AI Suite | Zebra

Enhance your Zebra mobile devices with the Zebra Mobile Computing AI Suite, a comprehensive set of advanced AI tools designed to empower frontline workers to perform tasks more efficiently and accurately. This suite includes the AI Data Capture SDK, which offers powerful AI models for a variety of applications. Additionally, solution accelerators with sample applications and APIs are included to expedite the development of AI-driven data capture solutions for enterprise needs like inventory management and price verification. These tools seamlessly integrate into business applications, improving workflow efficiency.

New in APM

Datadog’s Latency Investigator for APM—now in Preview—automatically investigates hypotheses in the background, comparing historical traces and correlating change tracking, DBM, and profiling signals. This helps teams quickly isolate root causes and understand impact without combing through raw telemetry data. You can go from detection to resolution in a single workflow, and generate a pull request to apply a recommended fix, all without leaving Datadog..

AI Agents Console: Monitor the behavior and interactions of any AI agent in your stack

With Datadog's AI Agents Console, you can monitor the behavior and interactions of any AI agent that’s a part of your enterprise stack, whether that’s a computer use agent like OpenAI’s Operator, IDE agent like Cursor, DevOps agent like Github Copilot, enterprise business agent like Agentforce, or your internally built agents. You'll have full visibility into every agent's actions, insights into the security and performance of your agents, analytics on user engagement, and measurable business value from every agent, all in a centralized location.

Multi Factor Authentication for Synthetic Monitoring for AVD

Today, I’ll cover some of the basics of monitoring Multi-Factor Authentication and why ensuring MFA is implemented is essential, particularly in environments where remote access is possible. I’ll cover some recent, specific case studies where a lack of MFA has led to security breaches and the mechanisms the bad actors used.

Introducing Schedule Rotations: One Schedule, Many Rotations, Total Coverage

When coverage gets complicated, Schedule Rotations keeps it simple. On-call can get real messy, real fast. One minute you’ve got a neat little schedule for the two people rotating primary and secondary. Next thing you know, you’ve got engineers in three time zones, a new hire shadowing incidents, and your “simple” rotation has turned into a board game with no rules. So we fixed it.