Operations | Monitoring | ITSM | DevOps | Cloud

Technology

The latest News and Information on APIs, Mobile, AI, Machine Learning, IoT, Open Source and more!

Ubuntu optimised for Intel processors accelerates adoption of IoT innovations

2 November 2021: Canonical published the first Ubuntu images optimised for the next generation of Intel IoT platforms, which address the unique requirements of the intelligent edge across multiple industry verticals. Both companies are dedicated to enabling on Ubuntu the Intel IoT platforms’ specific features such as real-time performance, manageability, security, and functional safety, as well as allowing users to take advantage of their improved CPU and graphics performance.

Open Source for Better Observability

Monitoring cloud-native systems is hard. You’ve got highly distributed apps spanning tens and hundreds of nodes, services and instances. You’ve got additional layers and dimensions—not just bare metal and OS, but also node, pod, namespace, deployment version, Kubernetes’ control plane and more. To make things more interesting, any typical system these days uses many third-party frameworks, whether open source or cloud services.

REST vs CRUD

CRUD and REST are two of the most popular concepts in the Application Program Interface (API) industry. REST was made to standardize the HTTP protocol interface between clients and servers and is one of the widely used design styles for web API. On the other hand, CRUD is an acronym used to refer to the four basic operations executed on database applications. Because both work on manipulating databases’ data, it’s easy to see why people have some confusion between them.

What can you learn from IoT with i2M - Part 2

In the first part, I outlined some of the terms associated with the delivery of IoT. Next, let’s look at how this gets complex. You will need to read the state of each sensor (through their appropriate API and through their appropriate vendor-supplied hub), create logic to determine what actions must be taken when certain conditions are met, and then deliver these as a workflow to each responder, and confirm through data collected from sensors that the requested change was implemented.

Securing the Open-Source supply chain with Ubuntu Pro on Google Cloud

It’s official: since the outbreak of the COVID-19 pandemic, cybercrime has increased by 600%. Among these, ransomware attacks are estimated to cost $6 trillion in 2021 alone. And there were nearly 550,000 ransomware attacks per day in 2020. The question is: are your workloads secure enough? In this blog, we will discuss how to make your Open Source workloads more secure in one second.

What can you learn from IoT with i2M - Part 1

The Internet of Things (IoT) is a wonderful marketing term given to devices that are connected to the internet. Today everything from light switches, air conditioners to door locks have the option of being internet-connected. Now that multiple companies have created “tags” that you can add to anything from keys to cars and packages, anything can be tracked. Across the business, industry, and retail almost every physical component has the option of being internet-connected.

Activating Connected Experiences in 60s

Looking to get started with Splunk Mobile and Connected Experiences? You’ve come to the right place. This video will show you all the steps you need to take to deploy Connected Experiences to your entire organization. If you’re using SAML, no worries. MDM, it works! Come one, come all and learn to unlock the power of Splunk Connected Experiences in your own organization.