Operations | Monitoring | ITSM | DevOps | Cloud

Getting started with Codex and CircleCI

Codex is OpenAI’s coding agent, powered by the GPT-5 family of models. It reads your files, proposes edits, and runs commands directly in your local environment. It ships as both a desktop app and an open source CLI, and it extends through plugins that connect it to external tools and services. Like any AI coding tool, Codex is strongest when the code it generates gets validated automatically.

Rethinking BYOD security: protecting data without trusting devices

BYOD (bring your own device) has always looked better on paper than it does in real life. The promise is clear: let people use the gadgets they already own. Less friction, lower costs, and more freedom. But when security and privacy are non-negotiable, the conversation around BYOD usually ends quickly. Not because BYOD is a bad idea, but because the model behind it doesn’t quite work. With BYOD, you’d be trying to secure something that isn’t meant to be trusted.

HIPAA-Compliant Messaging and Clinical Communication

In today’s fast-paced healthcare environment, patient outcomes rely entirely on immediate, accurate, and secure information transfer. Mismanaged communication is costly; industry data suggests that communication failures contribute to an estimated $12 billion in annual revenue loss and are linked to nearly 30% of malpractice claims.

What's New in Calico v3.32

We’re excited to announce the release of Calico Open Source v3.32! This release corresponds with Kubernetes v1.36 (Codename Haru) and it goes beyond just sharing a cat as the mascot of the release, it actually extends capabilities and features of Kubernetes to keep you up to date with the latest innovations of the cloud. This release brings some of the most significant architectural changes in Calico, from live-migrating KubeVirt VMs to eBPF based Maglev load balancer.

Total Economic Impact study finds LogicMonitor Edwin AI delivered a 313% ROI and payback in 6 months or less

Forrester Consulting’s Total Economic Impact study found that a composite organization based on interviewed customers achieved 313% ROI and payback in less than 6 months with LogicMonitor Edwin AI. AI for IT operations has a credibility problem. The market is crowded with claims about speed, automation, and intelligence, while buyers are left doing the harder work of separating measurable impact from vendor language.

How HAProxy built its modern application delivery architecture

Let’s be real: building reliable tech products is hard. Modernizing that same tech without compromising the user experience is even harder. The "rip and replace" approach to modernization can severely disrupt your customers’ integration efforts and workflows. When it doesn’t work, reversing course might be the least-worst option. By contrast, the evolution of the HAProxy One application delivery platform architecture at HAProxy Technologies over 25 years has been gradual and consistent.

From Copy Fail to Dirty Frag: Why Speed-to-Exploit Is Forcing a New Approach to Linux Security

In early 2026, two back-to-back Linux kernel exploits, Copy Fail (CVE-2026-31431) and Dirty Frag (CVE-2026-43284 & CVE-2026-43500), shattered assumptions about how quickly attackers can weaponize disclosed CVEs. Dirty Frag, a zero-day Linux vulnerability that affected most major distributions, had PoC exploits published within hours of its disclosure. It’s a stark reminder: the timeline between vulnerability disclosure and active exploitation has shrunk from weeks to hours.

Builder in the loop: Henry Andrews on building AURA like production software

An interview series with the people building Mezmo’s open-source agentic harness for production operations. Builder in the loop is a Mezmo interview series focused on the engineers, product leaders, and operators shaping AURA, our open-source, MCP-native agentic harness for production operations. The goal is to get past the polished product layer and talk through the decisions that matter when AI starts interacting with real systems. What should agents be allowed to do?

ActiveMQ Message Persistence: KahaDB, Artemis Journal & JDBC

Every persistent message in ActiveMQ must survive a broker restart. That guarantee is the contract behind DeliveryMode.PERSISTENT is what separates a messaging system from a memory buffer. It is also what makes message persistence configuration the most consequential decision in ActiveMQ architecture.