Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Azure Automation Best Practices

Kelverion have put together this Azure Automation Best Practices Guide to support the creation of automation process in Azure Automation. Our consultants work with Azure Automation every day and have substantial experience with Azure Automation and IT automation built using other tools. It’s important to recognize that these are recommendations rather than hard and fast rules.

StackPod: Making Customers Successful With Martin Lako of StackState

A while ago, we asked our customers to write reviews about their experiences working with us. With an average rating of 4.6 out of 5 and ten reviews submitted and published within two weeks, we were humbled by the responses. As our CEO, Toffer Winslow wrote, “Perhaps the thing I was most proud of…was just how frequently our customers commented on the high quality of StackState employees they interact with and the caliber of service we deliver.”

What is Azure Active Directory?

Azure Active Directory (Azure AD) is a comprehensive cloud-based platform used around the world. It is an identity provider and access management service. If a company employs OneDrive, Skype, or Outlook, they are already using Azure in some capacity. Similarly, if a company uses Microsoft Teams or other applications in the Microsoft Office Suite, they are accessing them by logging into Azure AD.

Managing Your Hyperconverged Network with Harvester

Hyperconverged infrastructure (HCI) is a data center architecture that uses software to provide a scalable, efficient, cost-effective way to deploy and manage resources. HCI virtualizes and combines storage, computing, and networking into a single system that can be easily scaled up or down as required.

Automatically scale self-hosted runners in AWS to meet demand

Self-hosted runners allow you to host your own scalable execution environments in your private cloud or on-premises, giving you more flexibility to customize and control your CI/CD infrastructure. Teams with unique security or compute requirements can set up and start using self-hosted runners in under five minutes.

Unified Observability is the Solution IT Has Been Waiting For

IT teams have been relying on observability tools to (theoretically) provide intelligence and insights into operating conditions within an organization’s digital infrastructure for years. But most of these tools have come with significant shortcomings that leave IT teams wanting more.

Introduction to Confidential Computing

Public clouds are great! Yet, many users are still reluctant towards moving their security-sensitive workloads away from their private data centers and into the public cloud, due to a set of security concerns. To address these challenges, what we need is a way to perform a privacy-preserving computation that can protect the confidentiality and integrity of your workload. Confidential computing achieves this by running your workload in a hardware-encrypted execution environment, that is isolated from the cloud provider’s privileged system software (e.g. hypervisor, host OS, and firmware), as well as its employees.

7 Ways to Accelerate Cloud Native Development

Modern enterprises understand the need to move away from developing monolithic applications to ones that make best use of the cloud to enable business acceleration at scale and speed. That means transforming development to more resilient cloud native architectures that can be readily deployed to cloud, multi-cloud, and hybrid environments. What does it mean to be cloud native?