Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Choosing the Best Options to Run Kubernetes on AWS

Kubernetes is the most widely used container orchestration platform, and you will see many tech giants using Kubernetes in their solutions. Its built-in scalability, flexibility, and container orchestration capabilities make it an ideal choice for enterprise applications requiring high availability and robustness. When deciding which Kubernetes solution to select, we come across many options, including Rancher, Amazon Elastic Kubernetes Service (EKS), self-hosted Kubernetes, Kops, Kubeadm, and Qovery.

Docker container security: demystifying FIPS-enabled containers with Ubuntu Pro

In today’s rapidly changing digital environment, the significance of robust Docker container security measures cannot be overstated. Even the containerised layer is subject to compliance standards, which raise security concerns and compliance requirements. Docker container security measures entail safeguarding our lightweight, appliance-type containers –each encapsulating code and its dependencies– from threats and vulnerabilities.

Canonical & Ampere: Building Sustainable, Power-efficient Computing Solutions Together

Canonical's Taiwan General Manager Tony Chiang was invited to join the Ampere event at Computex 2023 and had a great talk with Jeff Wittich, Chief Product Officer of Ampere Computing. Ampere and Canonical have been partnered to build sustainable and power-efficient computing solutions together and we can foresee more opportunities on the way from the cloud to the edge. Watch the video to learn more.

Securing Apache Spark Big Data Operations

Apache Spark is an open source toolkit that helps users develop parallel, distributed data engineering and machine learning applications and run them at scale. In this webinar, Rob Gibbon – product manager, and Massimiliano Gori – senior information security lead, will survey the state of big data security best practices and outline both high level architectures and pragmatic steps that you can take to secure your Spark applications – wherever they may be running.
Featured Post

From shortage to surplus: How to address the skills gap in data centres

Let me state the obvious - operating and maintaining data centres requires a high level of technical expertise. The demand for these skills has consistently exceeded supply. That is by no means unusual in a rapidly expanding industry. However, I've been working in this field for over 30 years, and I've seen this skills gap widen relentlessly. As the industry matures, there is a genuine risk that this shortage will become permanently ingrained.

Mastering Azure Storage: Best Practices for Security, Performance, and Cost Optimization

Azure Storage is a cloud-based service that provides scalable, secure and highly available data storage solutions for applications running in the cloud. It offers different types of storage options like Blob storage, Queue storage, Table storage and File storage. Blob storage is used to store unstructured data like images, videos, audios and documents while Queue storage helps in building scalable applications with loosely coupled architecture.

Business benefits of artificial intelligence in retail

The retail industry is going through a period of major upheaval. AI is transforming the landscape at a rapid pace. Grand View Research evaluated the market value at USD 5.79 billion in 2021 and this is expected to grow at a 23.9% compound annual growth rate (CAGR) from 2022 to 2030. For retailers, this translates into a need to adapt to an entirely new paradigm of customer expectations.

Using PostgreSQL advisory locks to avoid race conditions

The first moments of incident response can be among the most crucial, which in turn can also make them among the most stressful. There are many ways to ensure incidents are kicked off smoothly, but a recent focus of ours was to ensure they could be kicked off quickly. After all, the faster you're able to start mitigating your incident, the more successful you'll be!