Operations | Monitoring | ITSM | DevOps | Cloud

The single pane of glass approach to cloud monitoring

Dozens of SaaS services you depend on, starting from Google Workspace and Slack to Shopify, may experience downtime, partial outages, or degraded performance. And most have their own status pages, APIs, or RSS feeds. Juggling all these sources is exhausting, and many teams suffer from alert fatigue, missed early warnings, and fragmented visibility.

Inventory to Intelligence: How AI and Automation Improve Endpoint Visibility

Endpoint visibility has always been foundational to IT and security. You can’t secure, patch or support what you can’t see. But as environments have become more distributed and complex, what visibility means has evolved. It’s no longer enough to know that a device exists — IT teams and organizations as a whole need to understand its health, its risk posture and its impact on both security and user experience.

KubeCon + CloudNativeCon EU 2026: What We Learned About AI, Observability, and Fast Feedback Loops

Honeycomb was excited to attend KubeCon + CloudNativeCon Europe, where one theme stood out across sessions: as AI reshapes how software is built and run, teams are being pushed to rethink how they understand their systems. Without strong observability and feedback loops, AI can accelerate confusion, misalignment, and operational risk.

The Hidden Cost of Misalignment

Let’s suppose you’re building an even smarter fishtank. You’re adding temperature and salinity sensors, logging timestamped readings to flash. The struct is your binary record format – every field at a fixed byte offset, so you can read it back on any system that knows the layout. You use fixed-width types from stdint.h and pack(1) to strip out compiler-inserted padding. This is the advice I had always received and given, and it’s correct – as far as it goes.

Ubuntu Summit 26.04 is coming: Save the date and share your story!

Following the incredible success of Ubuntu Summit 25.10, we are thrilled to announce that Ubuntu Summit 26.04 is officially on the horizon. If you are new to the Ubuntu community, every new release of Ubuntu comes with an Ubuntu Summit – an event that takes place twice a year and serves as a showcase of the absolute best in open source innovation from around the world. Our hub in London hosts the talks, which are then streamed live, across the world.

The Business Case for AI-Driven Observability in Network Operations

Modern network operations generate an extraordinary amount of telemetry. Metrics, logs, events, topology data, cloud signals, and service context all contribute to a richer picture of system behavior. As environments expand across cloud, data center, edge, and SaaS, the opportunity for operations teams is clear: when that telemetry is unified and understood in context, it becomes a powerful source of resilience, efficiency, and business insight.

Authentication vs Authorization: What's the Difference and Why It Matters | Harness Blog

‍ Let's get something out of the way: authentication and authorization are not the same thing. We know, we know. People swap the two terms constantly. And honestly, it's easy to see why. They both start with "auth," they both deal with security, and they often show up in the same conversations on access control. But if you build or secure software, blurring the line between authentication and authorization is how you end up with a system where everyone is logged in and everyone is an admin.

Streaming Video Monitoring: How to Detect Playback Issues Before Viewers Leave

Video is the single largest driver of internet traffic worldwide. According to the Sandvine Global Internet Phenomena Report, video accounts for 65% of all internet traffic, with on-demand streaming alone consuming over half of all downstream bandwidth on fixed networks. In the United States, households spend nearly five hours per day streaming content, and 94.6% of internet users worldwide watch online video monthly.

Profiling Java apps: breaking things to prove it works

Coroot already does eBPF-based CPU profiling for Java. It catches CPU hotspots well, but that's all it can do. Every time we looked at a GC pressure issue or a latency spike caused by lock contention, we could see something was wrong but not what. We wanted memory allocation and lock contention profiling. So we decided to add async-profiler support to coroot-node-agent. The goal: memory allocation and lock contention profiles for any HotSpot JVM, with zero code changes. Here's how we got there.