Operations | Monitoring | ITSM | DevOps | Cloud

Operational excellence in the age of AI and Automation

The future of operations is here with PagerDuty's groundbreaking AI and automation innovations. Learn how PagerDuty AI agents, powered by PagerDuty Advance, and new use cases like security incident management and LLMOps can help your organization achieve operational excellence to reduce cost, mitigate the risk of outages, and accelerate innovation.

COREDUMP #004: The Future of Edge AI and What it Means for Device Makers

Join the Founders of Memfault as they dive into this trend alongside special guest Alexander Samuelsson, CTO and Co-Founder of Imagimob (an Infineon Technologies company). This conversation on The Future of Edge AI and What It Means for Device Makers will explore how advancements in Edge AI are reshaping the embedded landscape, from hardware design to edge AI model development.

Former Pebble Engineers Discuss The Evolution of Pebble's App Sandbox

When Pebble launched its SDK in 2012, it started as a pile of Python scripts. That was just the beginning. Memfault founders, François Baldassari and Chris Coleman, along with Brad Murray of Beeper, discuss the evolution of Pebble’s app sandbox, the challenges of early firmware development, and how a passionate developer community helped shape the platform.

Why Context Matters: Mastering Serverless App Monitoring

Hi there, and welcome to the second video in this series on observing AWS serverless applications with Datadog. In this video, you’ll learn how important it is to add custom business context to the telemetry you send to Datadog and how you can use that inside APM to quickly diagnose and debug issues. You’ll walk away with an understanding of the importance of distributed tracing, as well as how you can add specific business context to the telemetry you send.

Netdata vs. Prometheus: Which Monitoring Tool is Right for You? #monitoring #realtime

Netdata's founder Costa Tsaousis built Netdata with performance and efficiency in mind. The result? 8x less RAM usage, 30x less disk I/O, 40x more data retention, 40x more data stored, and up to 22x faster queries—all thanks to our innovative tiered storage system, enabling ultra-efficient long-term queries.

State of DevOps: 2024 DORA Report Insights with Google

Enjoy this exclusive webinar with Ben Good from Google as we explore the findings in the 2024 State of DevOps report. For over a decade, the DORA report has provided critical insights into the capabilities and practices that fuel high-performing technology organizations. This report highlights the significant impact of AI on software development, explores platform engineering’s promises and challenges, and emphasizes user-centricity and stable priorities for organizational success.

What does reinventing Data Center Infrastructure Management (DCIM) software mean? #dcim #datacenter

"Growth, growth, growth." At Hyperview, we’ve reinvented data center infrastructure management (DCIM) by embracing a product-led growth (PLG) strategy. This means we work closely with users to create features that actually matter to them. With updates rolling out every five weeks, we’re always finding ways to make the platform even better. Plus, we’ve teamed up with data center leaders like Panduit and nVent to bring even more value to our shared customers. Finally, we’re expanding our reach to serve customers better, adding APAC and UAE regions to host their Hyperview instance and data.

Boosting IT Efficiency: How to Do More With Less

IT teams are constantly asked to do more with limited resources and budgets. Is your IT team’s monitoring strategy keeping up? Thankfully, these challenges aren’t impossible to overcome. Check out this exclusive webinar where Greg Collins, Product Marketing Manager at Progress, and Jason Alberino, Principal Product Manager at Progress, will share tips on accomplishing your IT goals with less.

Urgent Security Updates for iPhones and iPads #shorts

Major security vulnerabilities in iPhones and iPads prompt Apple to release urgent updates. A USB vulnerability allows unauthorized access, particularly from commercial spyware. High-profile users, including executives, are at significant risk if their devices are lost or stolen, as these vulnerabilities can bypass existing security features. Staying informed about these updates is crucial for safeguarding both personal and proprietary information.