Operations | Monitoring | ITSM | DevOps | Cloud

Key Takeaways from our digital SCOM Usergroups

After almost two years living with a pandemic that changed the way we live and, not the least - the way we work, we are happy to say that we just finished the first events in quite a long while. What used to be very successful "live events" have now turned into online, digital ones, and though it's not quite the same, we are pleased that the participation was high and feedback positive.

How to build performance tests into your CI pipeline with k6, GitHub Actions, and Grafana

Performance testing is an essential component of building fast and reliable web services. Until recently, this testing typically happened later in the development process and was often performed by a separate team or even a third party. But speed is the competitive advantage for companies, and prioritizing testing during the development process can speed time to market for new applications.

Learn Terraform: Automate and Manage your Infrastructure easily

Infrastructure as Code provides a convenient way to manage and automate deployments to cloud infrastructure. In this blog, learn how Terraform can be used to perform Infrastructure as Code. If you are planning to automate your cloud infrastructure then nothing could be better than Terraform. Terraform is the most widely used and popular automation (infrastructure as code) tool that allows you to build and manage infrastructure easily and efficiently.

6 Signs Your Incident Response Steps Are Working

Although IT incidents have always been a concern, the increase in customer-facing technology adds the cost of a bad customer experience to the cost of responding to and remediating an incident. While in a perfect world, you’d be able to prevent incidents from happening in the first place, the reality is they do happen and more often than most of us would like to admit.

Building Relationships With Clients (2022 Guide)

How much do you know about building relationships with clients? In this guide, we are going to break down all you need to know about building relationships with clients. If you are exploring ways to increase customer retention and reduce churn, this is the perfect guide for you. Let’s dive straight into some practical tips on how to build strong and fruitful relationships with clients.

Introducing LM Concierge

At LogicMonitor, the success of our customers is our biggest priority. Through product training, guidance, and support, we strive to help you optimize the maximum value out of your LogicMonitor investment. That is why we are delighted to introduce LM Concierge; the most robust, exclusive support and services offering for Enterprise customers to take their LogicMonitor journey to the next level.

How Qovery Community plan works

Since we launched Qovery in January 2020, we offered free hosting ("Community" plan) for every developer. Providing free hosting was the perfect way to get product feedback and iterate with our users without the cost constraint. As our hosting infrastructure costs have drastically grown within the last 18 months, we had to reinvent our free offer. In a nutshell, we will continue to offer free hosting to involved community members only. Keep reading to know more 👇

Managing code signing on CircleCI using the runner

Code signing is an important part of testing and distributing your desktop and mobile applications. It ensures that the end user’s system can verify the legitimacy of your application. Because of the need for security around signed certificates, they are stored locally and not uploaded to the cloud. This constraint could prevent your team from fully automating your CI/CD pipeline.

Why should you audit privileged access management?

To pull off a data breach, today’s cybercriminals have some formidable tools at their disposal. They can use software to guess simple passwords. They may infect a system with ransomware, only returning stolen information when they’re received payment. They might choose to deploy a social engineering attack and gain access to a network through human error.