As organizations adopt and expand their usage of microservices, the level of application performance monitoring complexity will equally increase. Learn how to monitor applications in a microservice environment.
Moving to the cloud is not a question of how and why anymore. In order to scale your applications and move at the speed of the market, you must consider a cloud strategy. Every case is different, but migrating to the cloud shouldn’t mean you have to give up control and depend completely on your cloud service provider.
The first concern that comes to mind when we think about cloud computing is security. We can’t help it. This worry seems to be ingrained in the minds of many decision-makers in companies across the world, and there is a reason for it: If we can see it, we believe it is safe. We still believe this, even though many events – like the hacking of Target’s and Equifax’s on-premises data centers – have shown us otherwise.
We have identified four cloud migration models, based on the way different companies want to use the cloud. Finding the model that matches your goals is the first step to a successful migration.
Many organizations are implementing infrastructure automation to save time, eliminate variability, and reduce costs. John Ray explains why you should consider infrastructure automation and how to get started.
Open source enterprise software has never been more popular than right now. More and more organizations, recognizing the array of benefits that it has to offer, are bringing open source software into their processes and even building whole businesses around…
Multi-Cloud is a term used to describe IT infrastructure that uses multiple Public Cloud providers. Given that Cloud offers native redundancy, you may wonder why go that route? In the article below we explore several reasons why a Multi-Cloud provides an…
Technical disruption is everywhere. I would go so far as to say that we are on the cusp of another ‘Industrial Revolution’ with IT taking the place of industrial equipment. From the emergence of SMAC (Social, Mobile, Analytics, Cloud) to…
Many of you know about or will hear about CVE-2016-5195 aka Dirty COW. CVE-2016-5195 Bugzilla FAQ This particularly nasty kernel vulnerability has been around for years and likely affects a majority of the Linux nodes are currently running. The short…
Idempotency at all times when building Ansible tasks Overview In general, idempotence is “the property of certain operations in mathematics and computer science that can be applied multiple times without changing the result beyond the initial application”. For Ansible it…