Kubernetes 1.30 is now available

The Kubernetes release team has announced that Kubernetes 1.30 is now available. It includes 45 enhancements; 17 are Stable, 18 are in Beta, and 10 are in Alpha.  One of the stable features in this release is that the volume manager has been updated to allow the kubelet to populate information about how existing volumes … continue reading

Report: Nearly half of all internet traffic is bots, a third is bad bots

The percentage of internet traffic that is bots continues to rise every year, and last year bots made up 49.6% of all internet traffic, which was a 2% increase from 2022.  This is according to Imperva’s 2024 Bad Bot Report, which analyzed bot traffic across the internet. They found that the proportion of bots out … continue reading

Arm announces new NPU and IoT Reference Design Platform

Arm has announced a new neural processing unit (NPU) and a new IoT Reference Design Platform. The company believes these new advancements will help support edge AI applications.  Arm Ethos-U85 improves performance by 4x compared to the previous version and also has 20% higher power efficiency. It also has 2048 MAC units, compared to the … continue reading

ITOps Times Open-Source Project of the Week: Copa

Copa, short for Copacetic, is an open-source project for vulnerability management. It can automatically apply the necessary patches to a container image based on the results of vulnerability scans.  This allows containers to be patched quickly without waiting on a full rebuild upstream, so that they can be redeployed as fast as possible.  The maintainers … continue reading

BackBox launches programmatic Network Configuration Management capabilities

The network automation company BackBox has added a set of automated Network Configuration Management (NCM) features to its Network Automation Platform.  By adding automation to NCM, tasks can be triggered by parts of the DevOps workflow, such as initiating a backup before an update is performed. This contrasts with traditional NCM which typically is just … continue reading

Vultr Sovereign Cloud and Private Cloud launches to help companies keep up with data sovereignty regulations

Vultr is attempting to make it easier for companies to manage data sovereignty with the launch of its new product, Vultr Sovereign Cloud and Private Cloud.  This new offering ensures that data remains within national borders and is adhering to local regulations.  According to the company, much of the existing cloud workloads out there are … continue reading

Tufin releases new tool for automating network access requests

The network policy automation company Tufin has announced a new AI assistant designed to make it easier for IT operations teams to get easy answers about the state of the network. TufinMate can be used by end users to ask if there is a current outage, cutting down the time help desk personnel need to … continue reading

Cloudflare acquires Baselime to bolster its serverless observability capabilities

Cloudflare has announced that it has acquired Baselime, which is a cloud-native observability platform for developers. The main benefit of the acquisition is to solve the challenges of performing observability on serverless applications.  “Two million developers building on Cloudflare trust us to help scale their apps globally, but can still struggle to understand the behavior … continue reading

ITOps Times Open-Source Project of the Week: Cloud Foundry BOSH

Cloud Foundry BOSH is an open-source solution for provisioning and deploying software to virtual machines (VMs).  It also includes capabilities for monitoring, failure recovery, and software updating.  The tool was initially designed to deploy to Cloud Foundry PaaS, but it can also be deployed to almost any other software as well, the maintainers claim.  It … continue reading

Lacework launches new capabilities for securing cloud environments

The security company Lacework has announced the addition of new capabilities to its platform to help IT and security teams more easily secure their cloud environments.  The first new addition is Lacework Explorer, which is designed to provide better visibility into potential threats. It provides a visualization of the relationships between cloud resources, which helps … continue reading

Fastly Bot Management solution released to help cut down on fraud

Fastly has announced a new bot management solution to help companies fight back against bots at the edge. Fastly Bot Management was designed to help cut down on fraud, DDoS attacks, account takeovers, and other online abuse.  It automatically identifies and stops bots that are attempting to engage in fraudulent activity, which could ultimately result … continue reading

AWS expands Amazon GuardDuty Runtime Monitoring to EC2 instances

AWS has announced the general availability of Amazon GuardDuty EC2 Runtime Monitoring. Amazon GuardDuty is a monitoring and threat detection solution for AWS data sources, and the company has already introduced Runtime Monitoring for other AWS services, including EKS, ECS, and AWS Fargate.  Now the capability is being expanded to EC2 instances. According to AWS, … continue reading

« Previous PageNext Page »
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!