Operations | Monitoring | ITSM | DevOps | Cloud

Episode 22: Zoho's CIO on Building, Using, and Trusting Your Own Tech ft. Saravanan Muthian

In this episode of Server Room, we sit down with Saravanan Muthian, Chief Information Officer at Zoho Corp, to explore what it really means to "eat your own dog food." From stress-testing new apps internally to managing sprawling data across multiple tools, Saravanan walks us through the philosophy, challenges, and advantages of trusting your own tech stack. We also talk about Zoho’s decision to invest in its own data centres, the balance between automation and human touch, and the importance of sustainable scaling in IT.

Michael Donovan, VP of Product at Docker, has a hot take on shift left security

Shift left means improving security at the early stages of software development. Is it the best approach? See the full webinar: https:/cloudsmith.com/webinars Get to know Cloudsmith: About Cloudsmith We offer the world's best cloud-native artifact management platform to control, secure, and distribute everything that flows through your software supply chain. Cloudsmith operates at enterprise scale, reduces risk, and streamlines builds.

Bindplane Launch Week 1 [June 2-6] - Day 2 - Custom OTel Collectors

The point of OpenTelemetry has been to give you a choice. Yet, most observability vendors still insist you run their collector. We’re removing that last point of friction. With Bring Your Own Collector (BYOC), Bindplane now accepts any upstream-compatible build, recognizes exactly which receivers, processors, and exporters it contains, and adapts the UI and configuration workflow on the fly. No forks, no vendor stamp—just the collector you already trust, fully managed by Bindplane.

Regulation Nation: The what, when, why and how of the new CMMC for MSPs

As the cybersecurity landscape continues to evolve, the U.S. Department of Defense (DoD) is ramping up efforts to ensure that contractors and their vendors adhere to robust security standards. One of the key initiatives driving this transformation is the Cybersecurity Maturity Model Certification (CMMC). But what does CMMC mean for Managed Service Providers (MSPs) and IT shops, and how can you ensure your business is prepared to meet these new compliance requirements?