The cloud-native networking company Solo.io is introducing a new product called Gloo Mesh Core that was created to increase service mesh adoption by alleviating some of the complexities of working with the technology. “Service mesh does have a bit of a reputation for complexity,” Tom Callway, vice president of marketing for Solo.io, told ITOps Times. … continue reading
Earlier this month, Nokia Bell Labs announced an evolution of UNIX that promises to transform networking. Unified Networking Experience, or UNEXT, aims to reduce the complexity that communications systems have today. “The situation that we have in networking basically is today we have seen the network becoming more and more complex, because with the advent … continue reading
AWS is launching a new solution aimed at companies operating in the European Union (EU). The new AWS European Sovereign Cloud is separated from the existing AWS Regions in the area and includes more options for deployment. The company launched this new cloud in an effort to help companies meet “data residency, operational autonomy, and … continue reading
The cloud security company Lacework has announced updates that aim to provide customers with more choices when it comes to securing multicloud environments. The company now offers support for Oracle Cloud Infrastructure (OCI), giving customers another option to use with its cloud security posture management solution. This is in addition to previous support for AWS, … continue reading
Users wanting to try out Microsoft Security Copilot now have the chance to do so through the company’s Early Access Program. Microsoft Security Copilot was first announced in March 2023 and, according to Microsoft, customers using it in preview have saved up to 40% of time on core security operations tasks like writing complex queries … continue reading
The data backup company Druva is hoping to provide customers with a more seamless way to engage with their backups with the introduction of its generative AI interface, Dru. The new conversational AI capabilities will enable customers to reduce protection risks, gain insights into their protection environment, and navigate their solution in a customized interface. … continue reading
The network automation platform BackBox has announced a new capability that will enable IT teams to more easily discover network vulnerabilities, prioritize CVEs, and automate remediation. Network Vulnerability Manager (NVM) offers capabilities like classification of vulnerabilities by threat level; remediation by configuration changes, network and firewall OS upgrades, and patches; built-in backups, single-click roll-backs, and … continue reading
Canonical has announced the latest release of its Linux distribution, Ubuntu. Ubuntu 23.10 (codename Mantic Minotaur) introduces deeper integration for admin tools, upgraded app discovery, and support for Raspberry Pi 5 and SiFive HiFive Pro P550. According to Canonical, up until this release, administrators were required to adjust their workflow depending on whether they were … continue reading
The Cloud Native Computing Foundation (CNCF), which hosts many popular open-source projects such as Kubernetes and OpenTelemetry, has announced the graduation of another project: Cilium. Reaching graduated status indicates that a project is stable and has been successfully used in production environments. Cilium is a networking, security, and observability tool that is built on the … continue reading
Pure Storage is expanding its commitment to providing energy efficient storage across its Evergreen storage subscription product. The company will now pay for its customers’ power and rack space to help alleviate the cost of rising electricity costs and rack unit space. The payment is made upfront and is proportional to the customer’s location and … continue reading
SingularityCE is an open-source container platform designed for use with high-performance computing (HPC) environments. Users can package complex applications into a single file, which enables portability and reproducibility across complex environments. It supports cryptographic signatures and encryption, and also offers a simple security model where users are considered to be the same user whether they … continue reading