Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Understanding Role-Based Access Control (RBAC) in SharePoint Online

Role-Based Access Control (RBAC) is a sophisticated method designed to streamline the management of user permissions within software environments, including SharePoint Online. At its core, RBAC allows administrators to assign system access to users based on their role within an organization rather than on an individual basis. This approach simplifies the process of granting appropriate access levels by grouping permissions into roles that correspond to job functions.

The real origins of the Agile Manifesto

In February 2001, 17 people met at the Snowbird ski resort in Utah. They were the leading exponents of Extreme Programming, Scrum, and Adaptive Software Development, and they were seeking a set of compatible values based on trust, respect and collaboration. They wanted to make software development easier. And they found it in the form of a manifesto. Their only concern was that the term describing the manifesto came from a ‘Brit’ and they weren’t sure how to pronounce it.

Incident Commander Training Strategies: What The Books Don't Tell You

It has been lightly revised and reposted with his permission from the original article on Medium. So, you’re training incident commanders (IC), and you have your group read Google’s SRE books. Everyone knows what they are supposed to do and you are ready for any incident, right? Not quite. Half of your team complains that the descriptions are too vague or don’t apply to their situations, and the other half just starts to improvise. The result?

Crafting new Linux schedulers with sched-ext, Rust and Ubuntu

In our ongoing exploration of Rust and Ubuntu, we delve into an experimental kernel project that leverages these technologies to create new schedulers for Linux. Playing around with CPU scheduling policies has always been a dream for many kernel hackers and OS enthusiasts. However, such material typically remains within the domain of a few core kernel developers with extensive years of experience.

Troubleshoot anomalies in workload performance with Watchdog Insights and Alerts for Live Processes

Processes—the service workloads that run on your infrastructure—are the building blocks of your application, and it’s critical to know how well they operate at every level of the stack. Degraded process performance can lead to downtime for your mission-critical services, resulting in loss of customer trust and potentially impacting revenue for the business.

Top 4 Open Source Load Balancers of 2024

In the network infrastructure, load balancers play a major role in distributing incoming traffic across multiple servers, optimal performance, scalability, and reliability. Choosing the right load balancer is important as organizations meet the demands of the digital era, characterized by increasing data volumes and user expectations. Open-source software offers many options, providing flexibility, transparency, and community-driven support.

Performing Seamless Root Cause Analysis With Squadcast

Critical incidents can pose significant challenges in organizational operations that demand prompt and effective resolution. A vital aspect of this resolution process involves Root Cause Analysis (RCA) reports, which dissect incidents to uncover their underlying causes and pave the way for preventive measures.

Breaking Down the 2024 VOID Report: "Exploring the Unintended Consequences of Automation in Software"

In an era where automation and artificial intelligence are increasingly integral to software development and operations, the 2024 VOID Report sheds critical light on the nuanced impacts of these technologies. Here, we delve deeper into the report's key findings and explore predictions for the near future, weaving a comprehensive narrative highlighting challenges and opportunities.