Join us

ContentUpdates from UWS...
Link
@faun shared a link, 1 year, 3 months ago
FAUN.dev()

Build Free, Build Reliably, Build Proud: Road to LLM Observability

Large language models (LLMs) require context to produce accurate responses, which is where Retrieval-Augmented Generation (RAG) comes in. Observability in RAG systems involves monitoring metrics like Precision, Recall, MAP, MRR, and NDCG to ensure reliable performance. Choosing the right metrics and.. read more  

Link
@faun shared a link, 1 year, 3 months ago
FAUN.dev()

Practices of Reliable Software Design

The author shares eight practices adopted through experience while designing a fast, small, in-memory cache. These practices include using off-the-shelf solutions, prioritizing cost and reliability over features, moving quickly from idea to production, using simple data structures, reserving resourc.. read more  

Link
@anjali shared a link, 1 year, 3 months ago
Customer Marketing Manager, Last9

A Deep Dive into Log Aggregation Tools

The guide discusses the essential components, challenges, popular tools, and advanced techniques that define effective log aggregation.


A Deep Dive into Log Aggregation Tools
Story
@laura_garcia shared a post, 1 year, 3 months ago
Software Developer, RELIANOID

Skill Share article about RELIANOID SRE solutions

A big thank you toSkill Share Magazinefor featuring our innovative solutions in their latest article, "Adaptive Load Balancing: Enhancing Performance in Dynamic Environments." In today's fast-paced digital landscape, the ability to adapt to changing demands is more crucial than ever. Adaptive Load B..

Skill Share article RELIANOID
Story
@laura_garcia shared a post, 1 year, 3 months ago
Software Developer, RELIANOID

Protect your business from Cyber Threats

🔒 The digital landscape is increasingly dangerous, with cybercriminals lurking at every corner. Recent surveys reveal that 63% of businesses fall victim to cybercrimes, with small businesses and healthcare systems being the most vulnerable. 📈 In our latest article, we dive deep into the critical imp..

cyber security and threats
Story
@idjuric660 shared a post, 1 year, 3 months ago
Technical Content Writer, Mailtrap

The Ins and Outs of POP 3 (Post Office Protocol 3)

Navigating emails can be like driving a car – most of us know how to drive one, but not everyone understands what’s under the hood.

If you have ever opened a new email message and wondered what’s behind it, you’ve come to the right place.

In this article, I’m going to pop open the hood on POP3, one of the mail protocols responsible for retrieving the emails we receive every day. I’ll show you how it works and provide you with a step-by-step tutorial on how to test it out yourself by using some simple POP3 commands.

Don’t worry – it’s not rocket science. Let’s get straight into it!

POP3
Story
@laura_garcia shared a post, 1 year, 3 months ago
Software Developer, RELIANOID

Calling RELIANOID API REST from Powershell

Streamline your RELIANOID Load Balancer management on Windows with two powerful tools: noid-cli and PowerShell. The Perl-based noid-cli simplifies API tasks directly from the command line, ideal for quick configurations and monitoring. For more complex automation, PowerShell’s Invoke-RestMethod allo..

Knowledge base_Calling RELIANOID API REST from Powershell
Story
@squadcast shared a post, 1 year, 3 months ago

Best Practices for On-Call Rotation Software

The blog provides a comprehensive guide to on-call rotation software, outlining best practices for effective implementation and management. It covers key concepts such as schedule design, staff availability, incident detection, and escalation procedures. The blog emphasizes the importance of choosing the right software, optimizing schedule design, ensuring clear communication, leveraging automation, and continuously improving on-call practices. By following these guidelines, organizations can enhance team efficiency, improve incident response, and deliver exceptional service to their customers.

Link
@anjali shared a link, 1 year, 3 months ago
Customer Marketing Manager, Last9

Redacting Sensitive Data in OpenTelemetry Collector

Discover how to implement data redaction in OpenTelemetry Collector to protect sensitive information in your observability pipelines for Prometheus, logs, and traces. This guide covers types of data that can be redacted and step-by-step instructions for configuring the Attribute Processor.

UG

Redacting Sensitive Data in OpenTelemetry Collector
Story
@squadcast shared a post, 1 year, 3 months ago

Reduce Toil and Boost Productivity with Better Alerting Solutions

The blog discusses the importance of reducing toil in SRE teams and how to achieve this through better alerting systems. Toil, defined as repetitive, manual, and automatable tasks, can negatively impact team morale and productivity. The blog identifies and measures toil, highlighting its detrimental effects on team morale and productivity. It explores common causes of toil in alerting systems, such as lack of automation, poor alert configuration, ignoring SRE golden signals, and insufficient alert information. To reduce toil, the blog recommends setting alert rules based on historical performance, creating proactive alerts, and implementing alert-as-code. It also highlights Squadcast's alerting solutions, including alert suppression, contextual tagging, incident deduplication, and on-call traffic analysis, as effective tools for reducing toil and improving incident management.

This organization doesn't have a detailed description yet. If you are the administrator of this organization, please claim this page and edit it.