Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Post-Incident Reviews: Turning Failures into Learning Opportunities

Incidents are inevitable. From software failures to service disruptions, unexpected events can disrupt the smooth functioning of systems and processes, causing frustration for users and impacting business operations. However, what separates successful organizations from the rest is not the absence of incidents, but rather their approach to handling and learning from them.

How to run Chaos Engineering experiments in your CI/CD pipeline

Part of the Gremlin Office Hours series: A monthly deep dive with Gremlin experts. Ad-hoc Chaos Engineering experiments are great for learning more about how your systems work, but they don’t tell you how your systems behave over time. As new features get deployed, environments change, and regressions get introduced, even the most resilient systems can gain reliability risks. QA and performance testing are already built into CI/CD - why not reliability?

GitLens' Features to Better Understand Code History

When you’re working on a complex project, keeping track of all the who’s, what’s, and when’s of code changes can be a daunting task. From deciphering the origins of a specific line to understanding the entire journey your project has undergone through its various stages of development, the challenges can be numerous and nuanced – especially for devs working on large teams.

Navigating Unconscious Bias in Cloud Native Communities

Join Aakansha Priyaa at Civo Navigate as she delves into the topic of unconscious bias within cloud native communities. Through personal anecdotes and practical examples, this presentation sheds light on the subtle biases that permeate the tech industry and provides strategies for creating a more inclusive workplace.

What Is the Impact of Digital Operational Resilience Act (Dora) on My IT?

If you’re in banking, you know the drill. Adhering to stringent EU regulations is a standard practice. This involves undergoing extensive audits, closely managing IT assets, maintaining your CIA (Confidentiality, Integrity, Availability) rating, conducting and responding to fire drills, and establishing continuity plans. So far, nothing new, and if you’re in other highly regulated environments, you know that these measures are commonplace.

An overview of machine learning security risks

Data is at the heart of all machine learning (ML) initiatives – and bad actors know it. As AI continues to occupy the limelight of modern tech discourse, ML systems are becoming increasingly attractive targets for attack. With the Identity Theft Resource Center reporting a 72% spike in data breaches in 2023, it’s critical to take the proper precautions to ensure your ML projects don’t provide a back door to your data.

How to Get the Database Size and Count All SQL Server Object Types in the Database

In our routine database management tasks, it’s often necessary to learn the size of the database and count the objects within all SQL Server tables. Fortunately, we have established methods and tools to swiftly provide this information. In this article, we will explore these methods and tools. Let’s get started.