Operations | Monitoring | ITSM | DevOps | Cloud

February 2024

Advancing MLOps with JFrog and Qwak

Modern AI applications are having a dramatic impact on our industry, but there are still certain hurdles when it comes to bringing ML models to production. The process of building ML models is so complex and time-intensive that many data scientists still struggle to turn concepts into production-ready models. Bridging the gap between MLOps and DevSecOps workflows is key to streamlining this process.

Elevate Your IT Outage Experience : Avoid The "Are You Down Chaos".

In today's digital age, IT outages can throw your operations into chaos, leaving you and your team scrambling to determine if you're down. Don't let the "Are You Down Chaos" disrupt your workflow! 🔗 In this video, we explore effective strategies to elevate your IT outage experience and steer clear of the confusion. Learn from real-world experiences as we share stories of how others successfully navigated through the turbulence of IT downtime.

Revolutionizing the Microsoft Teams Experience: Yorktel and Martello Join Forces

In a strategic move aimed at redefining the Microsoft Teams experience, Yorktel, a global managed services provider, announces its dynamic collaboration with Martello’s Vantage DX. This innovative partnership is not just about adding a solution but about Yorktel’s commitment to enhancing their existing offering through the power of Vantage DX.

Detecting Cryptojacking with Progress Flowmon

In the ever-evolving landscape of cybersecurity threats, cryptojacking has emerged as a stealthy and financially motivated attack method. In attacks of this type, cybercriminals hijack servers (or endpoint devices) to use the computing resources to “mine” cryptocurrencies. They get a financial benefit from this activity when they sell the newly minted currencies.

Navigating User Experience, Performance & Security

In the ever-evolving digital landscape, where users expect lightning-fast, seamless experiences, a thoughtful balance needs to occur between creating a unique website experience and achieving optimal performance whilst tackling the mounting threats posed by cybercriminals. This predicament places website owners and developers at a crossroads: How can they achieve great user experience (UX) while upholding stringent security protocols with a well-performing website?

Icinga 2 API and debug console

Have you ever experienced configuration issues, such as notifications not being sent as expected or apply rules not matching all expected objects, probably due to an incorrectly set custom variable? Icinga 2 has several options to assist you in such situations. Last time, Julian demonstrated how to analyse such problems using the icinga2 object list command. Today I will show you how to interactively investigate your problem using the mighty Icinga 2 debug console.

5 things to look for in a database monitoring tool

Databases are the backbone of enterprise-level organizations, facilitating efficient data management, supporting critical business processes, and providing a foundation for secure innovation and growth. Effective database monitoring is critical for maintaining a high level of performance, security, and reliability in database systems, particularly in enterprise-level environments where large volumes of data and critical business operations are involved.

Introduction to Kublr with Ceph

Imagine this scenario: You deploy your Kubernetes cluster using Kublr and integrate Ceph storage into the mix effortlessly. Suddenly, all your managed Kubernetes clusters gain access to Ceph, leveraging its features to enhance performance, reliability, and scalability. With Ceph added to the mix, data storage in Kublr becomes even more streamlined.

Understanding SharePoint Online Licensing and Pricing

Imagine a place where all your work documents, projects, and team collaborations live—a space that’s not just in the office but accessible from anywhere, at any time. That’s SharePoint Online for you. It’s a cloud-based service, hosted by Microsoft, designed to empower organizations to share and manage content, knowledge, and applications.