Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Auto-Scaling is now available for everyone!

Worried that your app will not have enough resources as you grow? All apps on Qoddi can scale at any time and as part of Qoddi's new interface launch early this week, we made auto-scaling available for everyone after more than 6 months in Beta. Auto-Scaling, like Auto-Heal (another feature included with all Qoddi apps), is the guardian angel of your apps and will make sure your app continues to run whatever happens.

ITIL vs. IT Infrastructure Library: What's the Difference?

Recently, we discussed how change management became change enablement with a new version of ITIL, and what that meant for its application. But did you know that ITIL itself also went through a bit of a change? It's a little more subtle, and if you look at its current usage you might not even realize that a change even happened, but it represents a conceptual shift that might mean big things for its guidelines moving forward.

Why Edge Computing Will Overtake the Cloud

Compared to the previous generation, today’s generation of startups are increasingly cloud-centric. The previous generation of dotcoms had to suffer the economics and complexities of deploying, managing, and scaling their own servers, networks, and data centers. In contrast, today’s generation grew up in the just-in-time, pay-for-what-you-need, and scale-up-on-demand world that is cloud native.

Adding value to applications using the software testing life cycle

Software testing is important enough to have its own phase in the software development life cycle (SDLC). The software testing life cycle (STLC) is a step-by-step process that improves the quality of software by applying rigorous planning and analysis to the testing process. Testing is a development tool that adds value to your team’s applications. Embracing testing as a vital component of software development can save you and your team a lot of time debugging and fixing errors in the future.

Tips to implement AIOps the right way in 2022

A lot of things have changed in recent years. From the way of working to executing IT operations, the business strategies have changed overnight with arising advances like Machine Learning, Automation, and Artificial intelligence. The technologies have changed present-day applications and IT operations, and with AI and ML on board, IT industries operate more perplexing undertakings and resolve issues across complex infrastructures.

8 Tips for an Effective Preventive Maintenance Program

Lots of organizations ignore the maintenance of assets but asset maintenance expenses are more compared to regular maintenance in the long run. That is why it is essential to implement a preventive maintenance program. Preventive maintenance program provides several other benefits That we will discuss later but first let us know what preventive maintenance is! So, without wasting any time let us begin.

Learn how to get started with Grafana Cloud, Grafana OnCall, Grafana Tempo, and the Grafana Stack

Are your metrics, logs, and traces playing hard to get in your current observability setup? Feel like your on-call messages are left on read? Is the heatmap between your data sources fizzling out on your dashboard?

GitKraken Client v8.3: Now 2x Faster for Apple Silicon Users

What do Olympic speed skaters and developers have in common? They have a need…a need for speed. 😏 Nobody likes moving slow, no matter if you’re competing for the gold, or just trying to deploy an awesome new feature. The GitKraken team has been hard at work making sure all GitKraken Client users, especially macOS users, have the speediest experience possible when leveraging our legendary Git client to collaborate with teams.

Puppet Enterprise installation and self-signed Intermediate CA

This article is about how to install Puppet Enterprise using your own self-signed Intermediate CA (Certificate Authority). In some environments, regulations require you to intercept and inspect all SSL traffic to detect malicious activities that could otherwise masquerade as legitimate encrypted traffic. This requires the ability to decrypt and re-encrypt the stream in real time, which can only be done with the proper certificates installed.