
The conversation between Sam and Michael, two platform‑engineering ambassadors, centers on how teams measure—or fail to measure—their impact. Their latest report reveals that while 40.8% of teams rely on DORA metrics and 31% cite time‑to‑market, a startling 29.6% admit they do not measure anything at all. The data also expose a self‑reporting bias: 24% of respondents say they don’t know whether metrics have improved since adopting platform engineering, creating a 5‑percentage‑point gap between claimed measurement and actual awareness. The authors link this gap to a lack of product‑mindset, noting that 25.4% of teams also reject treating the platform as a product, which correlates with the non‑measuring cohort. Examples illustrate the payoff of rigorous measurement. By tracking DORA throughput on build servers, one team reduced pipeline lead time from 20 minutes to 8 minutes—a 60% improvement—through controlled experiments. Conversely, relying on “vibes” such as smooth meetings can mask red‑flag metrics, prompting a call for triangulating qualitative feedback with quantitative data like IDE telemetry, ticket volumes, and PR merge rates. The takeaway for executives is clear: without objective metrics, platform teams struggle to justify budgets, secure stakeholder buy‑in, and align with broader business goals. Starting with simple data collection—often as basic as an Excel sheet—allows teams to establish a baseline, prioritize dimensions such as velocity, security, quality, people, and cost, and gradually adopt more sophisticated observability tools as capability matures.

Eric Kimberling, CEO of Third Stage Consulting, hosted a solo “Industry 4.0 Reality Check” session after his guest canceled, framing a wide-ranging discussion on manufacturing technology trends, what’s working, and what’s overhyped. He emphasized his firm’s manufacturing focus, invited audience...

The video explains how to authorize sources to route traffic to a Protective DNS resolver, a required step before configuring internal destinations. Authorized sources are individual IP addresses (IPv4, IPv6, or SSE providers) grouped into logical "source sets" that reflect...

Protective DNS’s Policy Editor lets organizations create, manage and customize DNS filtering rules that sit at an upstream resolver for roaming and mobile devices. Policies exist at two levels—global (CISA-managed) and organizational—and can be static (rule-based) or dynamic (threat-feed driven),...

Protective DNS’s Resolver Logs feature lets organization users with reporting roles preview, filter, download and schedule full DNS query extracts from the management dashboard. Users can filter by source set, authorized source, policy, record type, name and time range, preview...

The video walks through user management in the Protective DNS management application, showing how managers add organizational users, assign roles, and control access. By default new users receive read-only access to dashboards, policies, threat analysis and organization info; additional roles...

The video warns that platform engineering is being reduced to a checkbox exercise, as C‑suite leaders chase promised gains in developer productivity without committing to the deep organizational changes required. Renaming cloud or IT groups, purchasing internal developer portals, or installing...

The CIO Talk Network episode focuses on the growing difficulty enterprises face in detecting and responding to security incidents. Host Sanjor Bal and Paul Corp CISO Nares Fidila discuss how manual, skill‑dependent processes and numerous handoffs—especially for endpoint alerts—extend dwell...

Andrew Harmel‑Law’s DDD Europe 2025 keynote spotlights variability as the second‑hardest problem in software architecture, after people. He explains how variability fuels both unpredictability and the immense power of software, shaping delivery pipelines and system design. The talk walks through...

In this CIO Talk Network episode, host Sanjal interviews Ariel Zitlin, CTO and co‑founder of Guardicore, about why traditional network segmentation is no longer sufficient for modern enterprises. The discussion highlights how the proliferation of cloud, bare‑metal, virtualization, and container...

The Simply Cyber Fireside chat brings together veteran SOC practitioners Wade Wells and Hayden Covington to explore how artificial intelligence is reshaping day‑to‑day security operations. The conversation centers on concrete AI‑driven workflows—using large‑language models to draft detection rule descriptions,...