Latest Blogs


Register to the Qovery v2 beta now!

When we launched Qovery in January 2020, our product was still a prototype, and we onboarded 53 developers to help them deploy their apps in the cloud. At the time, we were only 2 on the team, and our first employee (Patryk Jeziorowski) decided to join us after being one of our first users. 18 months later, 3004 developers from more than 110 countries use Qovery to deploy their apps on their AWS and Digital Ocean account.


Device management blind to 125 percent increase in financial sector phishing attacks

As guardians of valuable monetary assets and highly sensitive data, financial institutions are the perfect target for cybercriminals. According to IBM, the financial services sector was the number one target of cyberattacks in 2020 among all industries. This means these organizations continue to be challenged and invest heavily in both people and technology to make sure they can withstand attacks of any type.


Confessions of a Digital Security and Fraud Director

What’s the point of collecting a lot of data if you don’t have the tools and power to analyze it? In this Log’s Honest Truth podcast, presented in partnership with ITSP Magazine, Devo’s VP of Customer Success, Jill Orhun, discusses the confessions of “Mr. V,” a digital security and fraud director. His face and voice are disguised, but there’s no disguising his frustrations. Listen to the podcast. “Mr.


What Are Microservices and Why Use Them?

Microservices are the future of software development. This approach serves as a server-side solution to development where services remain connected but work independently from each other. More developers are using microservices to improve performance, precision, and productivity, and analytical tools provide them with valuable insights about performance and service levels.


Pull Requests for Infrastructure Access

Making frequent changes to cloud applications running in production is the de-facto standard. To minimize errors, engineers use CI/CD automation, techniques like code reviews, green-blue deployments and others. Git pull requests often serve as a foundational component for triggering code reviews, Slack notifications, and subsequent automation such as testing and deployments. This automated process enforces peer reviews and creates enough visibility to minimize human error.


Domain-agnostic and here to stay: Gartner outlines the current state and future of AIOps

Coined by Gartner in 2016, the term ‘AIOps’ refers to the combining of big data AI and machine learning to automate and improve IT operations processes. Back then, this very broad definition led to some confusion, with different IT vendors characterizing AIOps differently, depending on what they were actually offering.


Self-Care Tips for IT Pros: Invest in Sleep (And a Good Chair)

As an IT pro, you are your most valuable asset. Obviously, if you aren’t taking care of yourself, how can you be expected to perform with typical sustained, easy awesomeness? Are you able to extricate your IT self from the myriad reactive activities central to IT roles? It’s easy to proclaim taking care of yourself should always be your number one priority.


Cybersecurity is Fundamental for Modernizing Government

Digital transformation is a strategic initiative of the federal government and has been for years, but adequate funding has never been appropriated. Digital transformation is essential within all areas of government, to deliver services faster, more reliably, and securely. In order to keep up with the global expansion of digitalization, government agencies must modernize their IT and security infrastructure.