Operations | Monitoring | ITSM | DevOps | Cloud

AI Integration #speedscale #ai #integration #mcp #march

Ken Ahrens from Speescale dives into the best AI API integration model of March 2025 — Anthropic's MCP model. This innovative integration enables seamless communication with browsers and various tools, including the popular Cursor. Discover how the MCP model is revolutionizing AI-powered workflows and boosting productivity.

Service Mocks #speedscale #service #mocks #software

Ken Ahrens from Speedscale break down the challenges with service mocks — from the complexity of building them to common misunderstandings about their purpose. Many think of mocks like unit test stubs, but service mocks are much more powerful. They can simulate production conditions right on your laptop, making testing more realistic and reliable.

Observability Reimagined: How AI is Transforming Monitoring

Observability needs to evolve. With AI reshaping IT monitoring, how can businesses leverage predictive analysis, AI-driven monitoring, and auto-remediation workflows to create more resilient infrastructures? At Civo Navigate San Francisco 2025, Jemiah Sius, New Relic, explores how AI is transforming observability, shifting from reactive responses to proactive, intelligent solutions.

Improve Hospital Workflows and Patient Care with Zebra's Healthcare Solutions | Zebra

Join Riccardo from Zebra Technologies as he demonstrates how Zebra’s solutions enhance hospital workflows at the Alinka Brendan Love Lock Center. Discover the seamless integration of Zebra’s HC50 clinical smartphone, ZD510 printer, and ZQ610 mobile printer to improve patient safety, asset management, and clinical efficiency. From signing in with the single sign-on feature to scanning patient IDs and printing wristbands and specimen labels, Zebra’s technology ensures accuracy at every step. Track vital hospital assets using Zebra’s location technology, preventing loss and ensuring efficient use.

Unifying risk and business strategy, Karl Triebes, CPO, Ivanti

How do we break down silos between security and IT and move to an all-encompassing, unified view of risk? Karl Triebes, Ivanti Chief Product Officer, shares original research from Ivanti’s 2025 State of Cybersecurity Report (report link: ivanti.com/stateofcyber) highlighting how security and IT silos undermine organizations’ cybersecurity postures and make it difficult to identify and prioritize risk.

Tech debt and mutual accountability, Dennis Kozak, CEO, Ivanti

Why is such a critical security concern for most organizations? And why are customers and vendors divided over who is responsible for software security? Ivanti CEO Dennis Kozak shares original research from Ivanti’s 2025 State of Cybersecurity Report (report link: ivanti.com/stateofcyber) addressing the significant challenge of tech debt and its impact on cybersecurity.

Exposure management makes risk a business priority, Mike Riemer, Field CISO, Ivanti

How does transforming traditional vulnerability practices and help organizations more proactively protect themselves from cyber risk? Mike Riemer, Field CISO at Ivanti, shares original research from Ivanti’s 2025 State of Cybersecurity Report (report link: ivanti.com/stateofcyber) and explains the goals of exposure management for businesses and cybersecurity leaders.

Uplink | Episode 1: The Future of AI Consumption with Chris Sharp, CTO of Digital Realty

Welcome to Uplink, the podcast where digital infrastructure leaders reveal the underlying technology powering AI and cloud innovation. In this episode, our host Michael Reid sits down with Chris Sharp, CTO of Digital Realty, to discuss how enterprises are consuming AI today, the role of private interconnection, and what the future of AI workloads looks like.

Feature Spotlight - Task Lists

When an incident occurs, teams often perform a known set of steps in a specific order to help identify and triage the incident. For Base and Advanced plan users, the Incidents menu includes a Task Lists section where teams can build out priority lists for different incident types or use cases. For example, a list of failover tasks, or the tasks required to perform a deployment rollback. With task lists, Incident Commanders can be sure that resolvers know exactly what needs to be done to quickly resolve incidents.