Q&A: Software escrow’s role in business continuity planning

When you’re relying on lots of other services in your technology stack, you need to have a plan for what to do if the company offering that service shuts down. Software escrow — which is the practice of depositing the source code of that service with a third-party — can be a crucial part of … continue reading

Maestro – ITOps Times Open Source Project of the Week

Earlier this week, Netflix open sourced Maestro, a highly scalable workflow orchestrator for handling large-scale workflows, like data pipelines. It can manage the entire workflow lifecycle, including retries, queuing, task distribution to compute engines, and more.  Workflows in Maestro follow the directed acyclic graph (DAG) structure, composed of individual job definitions, or Steps. These Steps … continue reading

Hitachi Vantara’s Hitachi IQ portfolio is now available with certification from NVIDIA

Hitachi Vantara is trying to help IT teams set their companies up for AI adoption with the general availability of the Hitachi IQ platform and the Hitachi Vantara AI Discovery Service. Its AI platform Hitachi IQ will enable customers to access the infrastructure needed to realize the value of AI, the company explained. In its … continue reading

ServiceNow acquires Raytion to level up its AI search capabilities

The IT service management company ServiceNow has announced the acquisition of Raytion, which is an information search and retrieval company.  ServiceNow has invested heavily into AI in recent years, and the purpose of this acquisition is to enhance its AI-powered search and knowledge management capabilities.  The goal is that this new technology will enable real-time … continue reading

Gluware 5.4 introduces new network discovery capabilities

The network automation company Gluware has announced the next version of its platform: Gluware 5.4. This release introduces new network discovery capabilities, such as a new subnet-based search and the ability to create search jobs. The company has also updated the network discovery UI to be more intuitive.  In addition, with this latest update, Ansible … continue reading

CrowdStrike outages underscore importance of incident planning

If you’re working in the IT organization of a company that uses CrowdStrike to protect its Windows computers, you likely spent your whole Friday (and possibly the weekend) trying to revert back a bad update that led to those machines crashing. Earlier that morning, CrowdStrike had pushed an update to Windows machines that caused a … continue reading

Q&A: Is nuclear energy the key to meeting the demands of AI workloads?

AI requires a whole lot of power to run, and as more and more AI workloads are added, the power demand will just get greater. According to a report from Schneider Electric, in 2023 AI consumed 8% of the total power demanded by data centers, and this number is expected to grow to 15-20% by … continue reading

Win11Debloat – ITOps Times Open Source Project of the Week

Win11Debloat is an open-source PowerShell script for removing pre-installed Windows apps and disabling telemetry and intrusive interface elements, ads, and more. Rather than having to go through settings and removing things one-by-one, Win11Debloat can run once and remove everything that is unwanted. The script itself is customizable, so users can pick and choose what they … continue reading

Cerbos Hub launches to simplify deployment of authorization policies

The authorization company Cerbos has announced the general availability of Cerbos Hub, which is a management system for authoring, testing, and deploying authorization policies using the company’s open-source authorization layer Policy Decision Point (PDP). With PDP, authorization policies are separated from application code, which allows authorization to scale and change as the application’s needs change … continue reading

Securing client-facing apps in a hostile, risk-filled 21st century

The digital landscape is exploding with mobile apps as they become an essential element for businesses to meet consumer expectations, with the Apple Store now offering 1.96 million apps and the Google Play store boasting 2.87 million apps. On top of this, a whopping 148.2 billion mobile, desktop, and web apps were downloaded in 2023. … continue reading

Druva announces new Threat Hunting capability for getting insights into potential threats

The security company Druva has announced new capabilities to help customers more efficiently investigate and remediate cyber threats.  It launched a new Threat Hunting capability for indicators of compromise (IOC) that provides IT and security teams with insights into the gestation, timeline, and impact of potential threats in their environment. According to the company, traditional … continue reading

Cloud Canaries Introduces Intelligent Canaries to Disrupt the Observability Market

Cloud Canaries, a Cloud Intelligence company, today launched to improve how organizations monitor and optimize their cloud environments. Its Intelligent Canaries help software engineering and delivery teams practicing DevOps proactively detect, predict and autonomously resolve system issues before they impact operations. With Cloud Canaries, teams can create and deploy canaries in minutes and at a … continue reading

Red Hat OpenShift 4.16 now available with several new virtualization features

Red Hat has announced the latest version of OpenShift, its Kubernetes-based application development and deployment platform.  “Being able to more quickly modernize both infrastructure and applications are crucial capabilities to better support customer needs — but this can’t be done overnight,” said Mike Barrett, vice president and general manager of Hybrid Cloud Platforms at Red … continue reading

Report: Majority of security pros admit to using “shadow SaaS” apps

A recent survey from Next DLP revealed that over the last year, 73% of security professionals have used used “shadow Saas,” or SaaS applications not provided or approved by their IT teams. Further, even though they are using shadow SaaS, they admitted to being aware of the risks of doing so, with the most commonly … continue reading

« Previous PageNext Page »
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!