Operations | Monitoring | ITSM | DevOps | Cloud

[Infographic] AWS RDS from a Serverless perspective

In this article, we’ll deep dive into all the basics to help you decide if AWS RDS is the right decision for your architecture and help you hit the ground running if you do end up AWS RDS. For many decades now, relational databases (RDS) have been the place to store your data. They are pretty flexible often use some kind of SQL dialect, which is one of the main languages taught in computer science classes, and widely understood by the average developer.

Your First Pulumi and Shipa Integration

Typically, Infrastructure-as-Code or IaCs have had their own languages to learn. For example, if leveraging Terraform most likely you came across Terraform’s native syntax, HCL. Though as software engineers we might be more familiar with other languages of choice. Using a general-purpose computer language vs a provider level syntax does unlock the power of the language; anything you can do in the computer language potentially can be additional methods, calls, etc.

Top 5 Tools For Remote Workers

In 2020, Growmotely released a study and found out that 74% of business professionals expect remote work to become standard. The same study found that 97% of employees don’t want to return to the office full-time. Another striking statistic is that 61% of employees prefer being fully remote. With these kinds of statistics, it is only reasonable to expect that remote work will continue to become a new normal for many corporations, even those that are less modern and more traditional.

How operating excellence is redefining enterprise success

For years, enterprises have defined success by higher earnings, bigger market share, or the launch of a new product or service. Lately, however, success has been redefined to encompass much more. For example, organizations are also being evaluated on the success of their operations. Executive leaders are under pressure to: Operations have always been the lifeblood of the business.

What is a Supply Chain Attack (and What Can You Do About It)?

Any cybersecurity breach is damaging to individual companies. But when it becomes a supply chain attack, the results can be chaotic and widespread. While most businesses overlook the dangers of supply chain cyber attacks, hackers have not. Malicious actors are continuously looking for, and finding, new ways to invade company networks. With these looming threats, companies must know how to prevent supply chain attacks and find new means of securing against cybersecurity breaches.

InfluxData Named a Winner in 2021-22 Cloud Awards

InfluxDB Cloud wins Best Use of the Cloud in the Internet of Things category SAN FRANCISCO, February 8, 2022 – InfluxData, creator of the leading time series platform InfluxDB, today announced InfluxDB Cloud was named a winner in the 2021-22 Cloud Awards category for Best Use of the Cloud in the Internet of Things. Now in its 10th year, the Cloud Awards recognize innovation and excellence in cloud computing among startups and global enterprises.

3 reasons top-notch infrastructure performance is critical for service providers

Brocade, a Broadcom Company, named 2/8/2022 as End-of-Support (EOS) for Brocade Network Advisor (BNA), the collection mechanism for Brocade fabrics. Broadcom recommends Brocade SANnav as a replacement for BNA. To continue providing industry-leading infrastructure intelligence, Galileo’s new v2 agent for Brocade will use the REST functionality to collect all the configuration and performance metrics required. Read on for all the details you need to know.

Percepio Releases Tracealyzer 4.6 with Improved Zephyr and ThreadX Support

Percepio®, the leader in visual trace diagnostics for embedded systems and the Internet of Things (IoT), today released Tracealyzer 4.6 with official support for Zephyr RTOS and Microsoft Azure RTOS ThreadX. The new release also includes Percepio’s next generation trace recorder library with improved support for snapshot trace.

Five Ways To Reduce Your Cloud Security Blast Radius

It takes only a glance at the daily headlines to see that cybercriminals are using increasingly sophisticated methods to breach cloud defenses and access sensitive data. The complexity of cloud frameworks makes it extraordinarily difficult to detect nefarious activities. In many cases, attackers lurk in systems for weeks or months before pulling the trigger.