ITOps Times news digest: Oracle Cloud VMware, Red Hat Virtualization 4.4, etcd security audit

Oracle has announced its VMware solution is now available. The Oracle Cloud VMware solution is a cloud-native VMware-based environment that enables users to move VMware workloads to Oracle Cloud Infrastructure.  “Building new digital services. Scaling business-critical apps. Enabling a remote workforce. Applications sit at the core of addressing these challenges, and hybrid cloud opens the … continue reading

Microsoft releases an open-source, cloud-native service mesh

Microsoft is the latest company to release its own service mesh solution. The company announced the open-source project: Open Service Mesh (OSM), a lightweight service mesh that runs on Kubernetes.  “It is no secret that although microservice environments enable portability, allow faster and more frequent deployment cycles, and can even enable organizations to create teams … continue reading

Tanium and Google Cloud team up to protect distributed business operations

Endpoint management and security provider Tanium and Google Cloud are expanding their partnership to support distributed business operations. According to the companies, as more employees transition to remote work and organizations become more distributed, IT and security teams are having to defend against an increasing number of cyberattacks while maintaining availability and security.  “According to … continue reading

premium 3 reasons enterprises need to implement AIOps

Competitive organizations don’t simply react to their environments or competitors. Rather, they are proactively and predictively anticipating how to deliver better business outcomes. These autonomous digital enterprises know how to pull all the relevant information, capabilities, and people into the same place to quickly and efficiently make the right decisions. This requires flexible and dynamic … continue reading

ITOps Times news digest: Threat Stack for AWS Fargate, Aqua Security now on Red Hat Marketplace, and Aerospike Database 5.1

The company is extending its observability solution to the Amazon Elastic Container Service compute engine. The new capabilities will enable users to monitor AWS Fargate aspects such as processes, network activity, and running code.  “Our ‘Leveraging DevSecOps to Secure Cloud-native Applications’ report shows the top container security challenge is aligning the architectural implementation of a … continue reading

Patch management can be a challenge, but not impossible

Updating systems on a regular basis is one of the best lines of defense against cyberattacks, but many companies are still struggling to effectively do patch management. According to a study conducted by ServiceNow and the Ponemon Institute, of the nearly half of respondents who had a data breach in the past two years, 60% … continue reading

Atlassian acquires asset management company Mindville

Atlassian has announced the acquisition of asset and configuration management company Mindville. Mindville Insight provides companies with full visibility into assets and services, which Atlassian believes is crucial to delivering good customer experiences and is a cornerstone of ITSM. Atlassian will use Mindville to bolster its ITSM capabilities. Mindville’s solution will allow Atlassian to combine … continue reading

ITOps Times Open-Source Project of the Week: Clutch

Lyft has announced it is open sourcing its UI and API platform for infrastructure tooling: Clutch. The platform allows teams to build, run, and maintain workflows that have integrated domain-specific safety mechanisms and access controls. According to Lyft, cloud computing has reduced the adoption cost of new infrastructure because of how dynamic it is. However, … continue reading

BootHole vulnerability discovered in the GRUB 2 bootloader

Security research firm Eclypsium has disclosed a vulnerability, BootHole, present in the GRUB 2 bootloader.  The researchers noted that almost all Linux distributions are vulnerable because most of them use GRUB 2 for bootloading. In addition, any Windows device that uses the Microsoft Third Party UEFI Certificate Authority is vulnerable. “Thus the majority of laptops, … continue reading

Chaos engineering in IT operations during COVID-19

There may never be a more perfect time to experiment with chaos engineering than right now, in 2020, while many IT teams and their end customers continue to work remotely as COVID-19 rages on.  There’s been much written about chaos engineering, particularly its impact on DevOps organizations. Chaos engineering (CE) entails experimenting on a system … continue reading

ITOps Times news digest: New Relic One, Citrix Web App and API Protection, and D2iQ’s Konvoy 1.5 and Kommander 1.1

New Relic has announced updates to its observability platform. New Relic One has been reimagined to provide a better user experience, new capabilities, and predictable packaging and pricing. It also now includes a free tier to make it easier for engineers to try out the platform. “From the beginning, New Relic has been focused on … continue reading

Report: Enterprise data applications that are not optimized with observability and continuous tuning have enormous waste

Pepperdata’s inaugural Big Data Performance Report 2020 revealed that enormous waste exists within enterprise data applications that are not optimized by solutions that allow for observability and continuous tuning. There is also tremendous potential to optimize and reduce that waste. This is happening because as more complex big data applications migrate, the likelihood of resource … continue reading

Juniper Networks announces WAN Assurance service and new AIOps interface for Juniper Virtual Network Assistant

Mist AI optimizes end-to-end user experiences and minimizes IT costs across LAN, WLAN and WAN through insights and Self-Driving Network automation. With the new Juniper Mist WAN Assurance service, customers will receive better automation and insight in branch locations with AI-driven service level expectations, client-to-cloud event correlation for rapid fault resolution, anomaly detection and proactive … continue reading

Enterprises require SREs to supplement Ops teams, rather than replace them

Since Google released its Site Reliability Engineering (SRE) book in 2016, the field has gained widespread attention. However, adopting SRE as defined by Google is not as applicable to most organizations as it may seem, according to Sanjeev Sharma, a principal analyst of Accelerated Strategies, who spoke at Catchpoint’s “SRE from Home” virtual event last … continue reading

« Previous PageNext Page »
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!