Operations | Monitoring | ITSM | DevOps | Cloud

DevOps

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Building a trust-centric culture for success

What’s important when building a new business? A good idea is vital, obviously, plus the right people, hard work, experienced investors, and so on. Building trust is important, but probably far down the list. It’s not that trust isn’t important, it’s just likely to be put aside while working on tasks that are perceived as more time-sensitive or of a higher priority, especially those which directly and noticeably impact the bottom line.

Event Hubs Kafka and event streaming at high speed - Kasun Indrasiri and Steve Gennard

Microsoft's Kasun Indrasiri and Steve Gennard from the London Stock Exchange break down the world of Event Hubs in this session titled "Event Hubs - Kafka and event streaming at high-speed". Learn about the importance of streaming events in real-time and how Azure Event Hubs makes it easy to work with Kafka. They also introduce new tools and updates, such as the Data Generator preview. Plus, find out about the latest upgrades that make Event Hubs faster and more efficient.

Software Development Life Cycle: Day 1 Best Practices

Welcome to Day 1 of the software development life cycle — what now? We’ve already covered Day 0 server provisioning, and you should be ready to start writing code that will support your DevOps initiatives and make your life easier …or are you? Put some of our wisdom and experience at work for Day 1 of the software life cycle, and make sure you’re fully prepared to handle common pitfalls and problems that can become ongoing issues for Day 2.

5 AWS Tagging Challenges - And How CloudZero Solves Them

As an AWS user, you know how important it is that your organization understands what you’re spending and why. AWS is a tremendously powerful resource, and when you have complete visibility into the cost efficiency of your AWS environment, you can use it to remove many of the scaling obstacles that companies faced in the past.

ITIM and the Public Sector: How Network Monitoring Rises to the Challenge

Government agencies and public sector organizations are a tantalizing hacker target. Cybercriminals go after public sector organizations because they hold confidential, often classified, information – the exact data state-sponsored and other criminal groups salivate over. The Cybersecurity and Infrastructure Security Agency, or CISA, along with the United States Computer Emergency Readiness Team, or CERT, have warned public sector IT of key threats.

What is Docker Network Host?

Docker is a platform as a service for deploying applications in Docker containers. Containers are software "packages" that bundle together an application's source code with its libraries, configurations, and dependencies, helping software run more consistently and reliably on different machines. To start using Docker containers, you need to be familiar with Docker networking. Below, we'll answer the question: "What is a Docker network host?".

Formalize your organization's best practices with custom Scorecards in Datadog

The Datadog Service Catalog is a centralized hub of information around the performance, reliability, security, efficiency, and ownership of your distributed services. By using the Service Catalog, teams can eliminate knowledge silos and realize seamless DevSecOps workflows.

The pivotal role of network automation software in your network environment

Today, automation has shifted from being a luxury to an absolute necessity, especially within the realm of networks. This shift is driven by the rapid evolution of network technologies, compliance standards, and evolving business needs, placing an increasingly daunting burden on network administrators to manage these tasks manually.