Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Resell Platform.sh-hosted apps on WooCommerce

Many software developers build their product on Platform.sh. You can take several approaches, some of which are very straightforward. For instance, you can become a member of our Agency Partner Program. Or you can take advantage of our White-label offering to deliver a fully functional, fully-featured Platform.sh PaaS, branded with your organization’s logo.

Tutorial: Build Serverless functions with C#

The world of cloud computing has been revolutionized by a solution called serverless computing. It has been an absolute joy for developers to use. Before this innovation, developers had to worry about the resources powering their code. Since the launch of serverless computing, the developer’s focus on operating-system and hardware architecture is now a thing of the past. It handles all the server management while focusing on what you do well — writing good quality code.

What does a mature MSP actually look like?

We talk a lot about MSP maturity, but I wanted to take the opportunity in this blog to really consider what that maturity actually looks like. For starters, I believe there are three key areas of excellence that currently define maturity in an MSP business: In all these areas, mature MSPs are constantly tweaking the dial and making ongoing investments.

Detailed Insight, Right on Time: Introducing Scheduled Alerts

Logz.io customers, here’s some big product news that we think you’ll be excited to hear. Scheduled Alerts, an altogether new manner of alerting, is coming your way. That’s right, get ready to utilize a whole new world of alerts that weren’t previously available in the Logz.io platform.

How to connect Puppet Enterprise to Okta using SAML

Nowadays, staff in organizations are required to access multiple applications in their infrastructure. This can lead to the user having to manage multiple login credentials and passwords. There are many solutions available that provide a single sign-on (SSO) capability — such as Okta, LDAP, and Active Directory — which is becoming common practice across businesses.

How Leading Data Center Managers Track and Manage Parts

Data center managers often struggle to accurately track and manage their data center parts inventory. Legacy management tools like Excel spreadsheets are commonly used, but they fail to support the complexity and distributed nature of modern data center environments. They are hard to use, difficult to maintain, time-consuming, and error-prone.

Embrace your Updates

As developers, we’re passionate about creating and delivering high-quality software to our end-users and customers. Simply knowing that our software was shipped, deployed, and is being used is a great achievement. And it looks like we did a good job. Everything around us in our lives depends on high-quality software. Software needs to run for us to get water, energy, electricity, transportation, food, etc. Developers have a huge responsibility to keep this software updated and running efficiently.

A New Era of Software Asset Management

Do you remember when all applications were on-premises applications? Do you remember quarterly BSA (The Software Alliance) audits and press releases that identified companies for being out of compliance? Do you remember when big software manufactures were in the news because they were auditing school districts for software compliance? Have you read about any of this recently? Probably not.

Training Intelligent Alert Grouping

Complex incidents are both exhausting and commonplace. In this case, incidents that I am referring to as “complex” are incidents that involve multiple, disparate, notifications in your alert management platform. Perhaps these incidents are logically separated because the underlying systems or services were seen as less coupled than they turned out to be in reality.

Python Malware Imitates Signed PyPI Traffic in Novel Exfiltration Technique

The JFrog Security research team continuously monitors popular open source software (OSS) repositories with our automated tooling to report vulnerable and malicious packages to repository maintainers. Earlier this year we disclosed several malicious packages targeting developers’ private data that were downloaded approximately 30K times. Today, we will share details about 11 new malware packages that we’ve recently discovered and disclosed to the PyPI maintainers (who promptly removed them).