Operations | Monitoring | ITSM | DevOps | Cloud

Talent Shortage 2022: Stretching Your Lean DevSecOps Team

The cybersecurity talent shortage is real. As of December 2021, a job-tracking database from the U.S. Commerce Department showed nearly 600,000 unfilled cybersecurity positions. And a 2021 study found that 57% of cybersecurity professionals worked at organizations that have been directly impacted by the cybersecurity talent shortage. Even so, many organizations want to “shift security left” or build security best practices earlier into the software development lifecycle (SDLC).

"What's in it for us?": Putting Users in the Driver's Seat of VDI w/ VMware

Back in 2007, when the VMware team was outlining the benefits of virtual desktop infrastructure (VDI), our presentations included a very specific use case: “global pandemic”. No, we didn’t have a crystal ball through which we could foresee the COVID crisis, more than a decade in advance. But even back then, we were looking at the security benefits of VDI, if global health crisis did suddenly force workforces to go remote.

Understanding bare metal Kubernetes

Bare metal Kubernetes is a powerful set of technologies that builds on the best ideas behind the public and private cloud, yet abstracts away some toilsome aspects related to virtualisation management and networking. For operators and users, it provides significant benefits, making it easier and faster to ship and maintain complex, distributed applications.

GripMatix Citrix MP most used SCOM 3rd-party Management Pack for Citrix

The Big SCOM Survey 2021 results are available and we are happy to see that at organizations the use of SCOM is still expected to grow according to more than half of the respondents. It is a survey executed by SCOMathon. But above all, our Citrix Ready Management Pack solution for monitoring Citrix Virtual Apps and Desktops scored as second-most used 3rd-party Management Pack of all 3rd-party Management Packs out there.

The secret to managing multiple websites

Forrester Research interviewed digital leaders at enterprise organizations and found that, on average, they were maintaining 268 customer-facing websites and applications. As the number of websites you manage continues to grow, so do the number of challenges in managing it. Often the websites are designed by different teams, are built using different languages and frameworks, and run on different hosting solutions with different DevOps tools and workflows.

Defining Your IT Security Perimeter

It wasn’t too long ago that a security system would be nothing more than a few walls, some cameras, and an inattentive security guard. That’s no longer the case In today’s digital landscape. Now organizations must invest in securing their assets from a growing number of cyberthreats. To start, they must first draw up the boundaries of their IT security perimeter.

Run Datadog Synthetic tests in your Jenkins pipelines

Continuous integration (CI) has become the mainstream approach to software development as it enables organizations to iterate quickly while minimizing the risk of releasing faulty code. To implement CI, many organizations rely on Jenkins—one of the most mature and widely used automation servers on the market. Jenkins comes with hundreds of community-backed plugins to help you easily integrate it with other tools in your development workflow.

11 of the most costly software errors in history

The mere mention of a serious software error can strike fear into the heart of any developer, project manager or tech leader. The wrong error in the wrong system can be incredibly expensive and difficult to resolve, not to mention humiliatingly public. Catastrophic software errors are mercifully rare these days, but the potential for chaos, PR disasters and spiraling costs still remains.