Buoyant, creator of the open-source Linkerd service mesh, has announced the release of automated cluster failover functionality in Linkerd. With this release, application traffic will be automatically redirected to alternate Kubernetes clusters in case of failures or outages in the original cluster. This works to allow applications which were built on Kubernetes to continue to … continue reading
The cloud-native IT operations provider, Automox, today unveiled the findings of its third annual State of IT Operations Report. The findings revealed that the challenge of managing endpoints has become even bigger than it was in the Automox 2021 report. Additionally, the report showed that many organizations continue to struggle with the challenges of utilizing … continue reading
In this time of rapidly evolving digital transformation, the ability to quickly identify and remediate problems has become more important than ever. In order to address this issue, Kintaba created IRConf, a conference dedicated to the discussion of effective incident response strategies. This conference is the first of its kind and is set to be … continue reading
The developer security company Snyk recently announced its acquisition of Fugue, a cloud security and compliance company that aims to assist global teams in protecting their cloud environments and help them prioritize innovation. With this, Snyk makes its entrance into the cloud security market, a rapidly growing segment of cybersecurity. Fugue was founded on the … continue reading
Cloud technologies are an increasingly important aspect of the technology industry, but physical infrastructure will still remain important too. This is according to the latest “Trends in ITOps 2021 Survey” by Tribe29, the organization responsible for the Checkmk IT monitoring solution. Of those surveyed, 79% said that they expect monitoring cloud assets will become more … continue reading
A majority of organizations understand the importance of modern security in cloud native deployments, but few seem to be following through on that. According to a new survey from the Cloud Native Computing Foundation (CNCF), 85% of respondents consider modern security to be of the utmost importance. However, only 9% of those surveyed had a … continue reading
When an organization is looking to partner with a vendor, there are many factors to consider, and recently, sustainability has been added to that list. Many organizations are now opting to spend more money in order to protect the planet and make more environmentally conscious choices. CloudBolt Industry Insights, the research extension of CloudBolt Software, … continue reading
Recently, server provider ServerPronto, announced its accelerator program to help IT founders bring their innovations to life. The Infrastructure Accelerator is powered by Navigate and is set to launch in November of 2021. ServerPronto is inviting several early-stage founders in the IT Infrastructure space to join a focused unit of startups to help push innovation … continue reading
The Cloud Native Computing Foundation (CNCF) recently announced the graduation of Linkerd, which was the first project to join the CNCF Sandbox. Linkerd now becomes the first service mesh project to achieve graduated status, which indicates that the project has shown widespread adoption, an open governance process, feature maturity, and a commitment to community, sustainability, … continue reading
Today, Qualcomm Technologies announced the release of the Gloria AI Edge Box in collaboration with Foxconn Industrial Internet. BKAV Corporation is the first to utilize this Cutting-Edge-On-Premise Solution. Qualcomm foresees broad adoption of Foxconn Industrial Internet’s Gloria platform using their AI Solution, the Qualcomm Cloud AI 100. They anticipate that the platform will be used … continue reading
A lot of focus is made on hardening systems from outside attacks, but threats from within the company shouldn’t be ignored. Results from Egress’ Insider Data Breach Survey 2021 showed that 94% of organizations have fallen victim to insider data breaches in the last year alone. The survey was conducted by Arlington Research on behalf … continue reading
Data breaches and cyberattacks are often the result of weak or stolen passwords. Developing an authentication system that doesn’t involve passwords will be the key to more secure systems. One organization trying to eliminate the need for passwords in favor of biometric logins in order to make ransomware attacks and widespread hacking more difficult is … continue reading