Introducing FOG-OPS

| | | 0 comments

The day has arrived when every company, not just those at Google-scale, can achieve high availability and scale without a linear increase in operational cost.  That’s what FOG-OPS is all about—leveraging Site Reliability Engineering, DevOps, automation and the cloud to achieve a truly scalable model for increasing site uptime through pro-active engineering instead of through reactive support operations.

I’ve heard from our customers for many years that they would love to leverage managed services in some way, but that the per server, per month (or % of IaaS) cost model just doesn’t make sense to them, especially as they grow.  This is why I’m so excited to be able to offer services packages that do pencil out and scale economically.  Not to mention that I love our new FOG-OPS logo 🙂 (thanks Justin!).

To explain a bit further, signing up for FOG-OPS means that Foghorn takes responsibility for engineering your site to reduce downtime by leveraging automation and self-healing technologies fearlessly hardened by early adopters over recent years.  Foghorn will respond to alerts and remediate issues, but we don’t want to be up all night either!  Our mission is to engineer the reactive support requirement out of your site and our pricing model ensures we are motivated to do that.  And we will continue to invest in IP and technology that allows us to do this effectively.

Give us a call or drop us a note to learn more about FOG-OPS!

Related Blogs

Migrating to the Cloud Using Lift and Shift

Migrating to the Cloud Using Lift and Shift

What is Lift and Shift in Cloud Migration? You’ve completed all due diligence, decided which platforms fit your operation, and finally accepted that a move to the cloud is the best way to scale. With that big decision out the way,  the next one comes in the form of a...

Demonstration of Penetration Testing Techniques

Demonstration of Penetration Testing Techniques

Join Foghorn’s diligent, cloud security pro, Dennis Pelton, as he takes us on a super helpful, 6-minute tutorial highlighting techniques he has in his penetration testing toolbox. In this exercise, he looks at two types of attacks- cross-site scripting and SQL...