Operations | Monitoring | ITSM | DevOps | Cloud

DevOps

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Ways to Detect Anomalies in Azure with Real-Life Examples

Azure MVP, Michael Stephenson (aka Mike) walks through a practical example of Azure anomaly detection and the importance of keeping an eye on costs in Azure. Using Turbo360's cost analyzer module, Mike shows us how to efficiently manage everyday expenses and save money. Mike shares a scenario where he manages a Data Gateway service on Azure within a limited budget. He then explains how changes in resource scheduling led to unexpected cost increases. Using the anomaly detection feature, he identifies the abnormal cost behavior and discusses the significance of promptly addressing such issues.

Can You Move Stateful Apps with Zero Downtime Across Continents? Kubernetes Live Migration Secrets!

Dive deep into the realm of zero downtime live migration for stateful workloads on Kubernetes! Join Shivansh Vij, founder of Loophole Labs, as they unravel the secrets behind migrating applications like Redis and Postgres across nodes, regions, and continents without a second of downtime. Explore groundbreaking techniques, challenge traditional cloud limitations, and witness live demos that showcase this innovative approach in action.

Post-Incident Reviews: Turning Failures into Learning Opportunities

Incidents are inevitable. From software failures to service disruptions, unexpected events can disrupt the smooth functioning of systems and processes, causing frustration for users and impacting business operations. However, what separates successful organizations from the rest is not the absence of incidents, but rather their approach to handling and learning from them.

Navigating Unconscious Bias in Cloud Native Communities

Join Aakansha Priyaa at Civo Navigate as she delves into the topic of unconscious bias within cloud native communities. Through personal anecdotes and practical examples, this presentation sheds light on the subtle biases that permeate the tech industry and provides strategies for creating a more inclusive workplace.

What Is the Impact of Digital Operational Resilience Act (Dora) on My IT?

If you’re in banking, you know the drill. Adhering to stringent EU regulations is a standard practice. This involves undergoing extensive audits, closely managing IT assets, maintaining your CIA (Confidentiality, Integrity, Availability) rating, conducting and responding to fire drills, and establishing continuity plans. So far, nothing new, and if you’re in other highly regulated environments, you know that these measures are commonplace.

An overview of machine learning security risks

Data is at the heart of all machine learning (ML) initiatives – and bad actors know it. As AI continues to occupy the limelight of modern tech discourse, ML systems are becoming increasingly attractive targets for attack. With the Identity Theft Resource Center reporting a 72% spike in data breaches in 2023, it’s critical to take the proper precautions to ensure your ML projects don’t provide a back door to your data.