Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on APIs, Mobile, AI, Machine Learning, IoT, Open Source and more!

Integrate certificate life cycle management with enterprise MDM and boost your mobile ecosystem security

A huge portion of today’s corporate network is made up of mobile endpoints, such as laptops, tablet computers, and mobile phones. These are domain-joined and non-domain devices that require access to corporate assets to carry out everyday operations.

How to get mobile push notifications from any service

Love 'em or hate 'em, mobile push notifications can be very useful. They are not as intrusive as a phone call and have better information formats and control than text messages. Which is why it can be very frustrating to not get push notifications for your favorite product because it doesn't have a mobile app. In this post, we will see how to get mobile push notifications from any service, even if they don't have a mobile app.

How AI Will Give IT Professionals Their Time Back

The whole world has been dreaming about the possibilities of artificial intelligence for decades. Whether it's cars capable of making critical decisions and driving themselves, or robots capable of lending a hand around the house, the potential is almost limitless. The benefits of AI aren't limited to the everyday life of the consumer, however, and IT is just one sector set to reap the rewards as software becomes ever smarter.

The basics of IoT, and why Prometheus works so well with it

Before we start, please take a moment to appreciate what day it is. IoT, or Internet of Things, has been a buzzword for longer than usual. Buzzwords usually have two common properties, and then their paths fork. I like thinking about buzzwords and about the useful aspects of what they mean. The most recent public example focuses on another buzzword currently in its hype phase: observability.

Open source enterprise support vs free open source use

Many enterprises use open source enterprise support from a vendor, such as Red Hat or Canonical, to boost uptime and peace of mind. Others choose to use open source without any additional vendor support, relying on one of the major benefits of open source – the robust community support that is freely available.

Detecting threats in AWS Cloudtrail logs using machine learning

Cloud API logs are a significant blind spot for many organizations and often factor into large-scale, publicly announced data breaches. They pose several challenges to security teams: For all of these reasons, cloud API logs are resistant to conventional threat detection and hunting techniques.

How to deploy an open source database in 10 minutes | Aiven

A short demo showing how to create managed data infrastructure in 10 minutes with Aiven. ABOUT AIVEN We help organizations fuel the continuous innovation needed to create awesome, data-intensive applications by using the leading open source technologies. After building expertise managing mission-critical data infrastructure for companies like F-Secure and Nokia, Aiven’s founders noticed that cloud adoption was increasing but infrastructure solutions were either proprietary or difficult to translate into business results.