Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

On-Call Software Engineer Roles and Responsibilites

Most software engineers know that they are typically tasked with on-call shifts, but new software engineers entering the field may be asking themselves – What do I even do if I get scheduled for an on-call shift? This is a common question that often doesn’t get answered until that first on-call shift, and unfortunately that can be overwhelming for a young professional who is nervous about their first on-call shift, let alone their first incident.

LLM Monitoring and Observability

Large Language Models (LLMs) are advanced artificial intelligence models designed to comprehend and generate human-like language. With millions or even billions of [parameters, these models, like GPT-3, excel in natural language processing, understanding context, and generating coherent and contextually relevant text across various applications.

Managing Databases on AWS: A Practical Guide

Amazon Web Services (AWS) provides a range of managed database services that provide multiple database technologies to handle various use cases. They are designed to free businesses from tasks like database administration, maintenance, upgrades, and backup. AWS databases come in several types to cater to different business needs.

Best Practices to Avoid Website Outages on Black Friday

The most frenzied shopping day of the year – Black Friday – is fast approaching, and businesses around the globe are bracing themselves. However, imagine this – a massive number of eager shoppers ready to snag the hottest deal, and just when your website should be working at its best, it crashes, leaving behind frustrated customers and potential revenue slipping through your virtual fingers. This scenario is not entirely fictional.

What is Vulnerability Management?

Vulnerability management is a critical aspect of a cybersecurity strategy. It refers to the systematic and ongoing process of identifying, classifying, prioritizing, and addressing security vulnerabilities in a network environment. This proactive approach to network security aims to minimize the risk of exploitation by attackers. Vulnerability management is about staying one step ahead of potential threats.

OnPage Releases Healthcare-Focused Slack Integration

In the healthcare realm, the need for communication platforms that meet HIPAA standards is undeniable. Enter Slack, a popular collaboration platform armed with robust security features. However, the real game-changer emerges through the integration with OnPage. This isn’t just an upgrade in collaboration; it’s a transformative shift in critical communication within healthcare—a field where every moment counts.

The Journey Into Automation: Optimizing Care Delivery

In a world where efficiency and precision are the cornerstones of progress, automation has become the unsung hero across diverse industries. From manufacturing floors to customer service, its transformative power has reshaped the way we work and deliver services. Today, we embark on a journey to explore the profound influence of automation on healthcare, where each automated process is a progressive step towards optimizing care delivery and reshaping the future of patient-centered care delivery.

What Should Your System Outage Notifications Say?

System outages: they are an inevitable problem that every single IT team will encounter at some point. Whether they come about due to technical issues, act-of-god natural disasters, or simply random human error, system outages happen to the best of us. Though the cause of system outages is not always in your control, you can control your team’s processes for response and resolution.

Kubernetes Incident Management: A Practical Guide

As more organizations embrace containerized applications, Kubernetes has emerged as the leading platform for orchestrating these containers. However, its complexity, combined with the inevitable reality of IT incidents, demands a well-defined strategy for managing disruptions. This article introduces Kubernetes incident management, describes common Kubernetes errors, and provides practical guidance to efficiently handle incidents.

What is HCAHPS: A Comprehensive Overview

In the realm of hospitals and healthcare organizations, the term “HCAHPS survey” is a recurrent presence: Hospital Administrator A: “The latest HCAHPS survey results just came out, and patients seem satisfied with…” Hospital Administrator B: “Some of our past patients participated in the HCAHPS survey, but they expressed disappointment with…” You might be left wondering, “What exactly is the HCAHPS survey?” Allow me to elucidate.