Operations | Monitoring | ITSM | DevOps | Cloud

How do we set up a proper serverless development workflow?

If you’ve built a serverless application or two, you’re probably familiar with the benefits of serverless architecture. You take advantage of already built, managed cloud services to handle standard application requirements like authentication, storage, compute, API gateways, and a long list of other infrastructure needs. You can spin up these resources in a matter of minutes and add your own specific business logic (usually as AWS Lambda function code).

Codemania 2019: What we learned from global tech leaders

For eight years, Codemania has brought developers and technology enthusiasts together in Auckland. This year, 500 developers arrived to network, share ideas, and solve problems with an impressive speaker lineup that included developers, authors, and global tech leaders. As the day unfolded, we learned how Apple appears to achieve the impossible with their short product development lifecycles.

NiCE VMware Management Pack 5.10 released

The NiCE VMware Management Pack delivers first-rate monitoring for your business critical, highly dynamical virtualized environments. Taming the beast of VMware service outages has never been easier. Leverage your existing investment, reduce costs, save time and build efficiencies that will last beyond your expectations.

An Elasticsearch Tutorial: Getting Started

Elasticsearch is the living heart of what is today’s the most popular log analytics platform — the ELK Stack (Elasticsearch, Logstash and Kibana). The role played by Elasticsearch is so central that it has become synonymous with the name of the stack itself. Used primarily for search and log analysis, Elasticsearch is today one of the most popular database systems available today.

Help desk training - Your need-to-know IT service desk scenarios explained

Join this year's ServiceDesk Plus Masterclass webinar series for both on-premises and cloud. Learn how ServiceDesk Plus can help solve everyday IT service desk problems and maximize your service desk productivity while ensuring a great service experience.

CVE-2019-9929 - internal authentication secrets leaked in logs

The CFEngine engineering team has recently discovered a severe security issue in the CFEngine Enterprise product. CFEngine is using some internal secrets for authentication to the Mission Portal API and the PostgreSQL database when running background maintenance tasks. These internal secrets are randomly generated during the installation process and stored in files which only the root user has access to.

Deploying a Private Docker Registry to Cycle

Secure access to your own private registry helps control who has access to your images. Compared to usage-based services such as Docker Hub and Quay, a Cycle hosted private registry only consumes the resources you give it access to, yielding a more cost-effective deployment. Let’s take a look at how simple it is to deploy a private Docker registry on Cycle.