Twistlock provides insight into cloud-native environments with Cloud Discovery

Twistlock is open sourcing its Cloud Discovery tool to help infrastructure, operations and security teams discover the “unknown unknowns” in their cloud environments. Cloud Discovery provides insight into what cloud native services are running and where. According to the company, it can discover services like container registries, managed Kubernetes platforms, and serverless services through the … continue reading

Cloud security company Threat Stack acquires Bluefyre for its targeted application security

Cloud security and compliance company Threat Stack wants to bolster its cloud capabilities with the acquisition of Bluefyre. According to the company, Bluefyre will help deliver greater visibility into security as well as help developers build secure, cloud-native apps. Bluefyre provides targeted application security for Kubernetes, Mesosphere and OpenShift applications, and according to Threat Stack … continue reading

Startup YotaScale aims to automate enterprise IT cloud ops

Organizations are moving applications to modern cloud computing infrastructures at a growing pace because they provide business services on-demand, but the transition to a usage-based OpEx cost model can come at a steep price. A Silicon Valley startup company known as YotaScale claims it can automate cloud IT operations management and thereby reduce sticker shock … continue reading

Cisco announces hybrid solution for Kubernetes on Amazon Web Services

Applications are the lifeblood of business. Build them easily and get them up and running quickly and you have a huge competitive advantage. But get bogged down worrying about where those applications run, and you miss opportunities. Cisco is now solving that problem with a new solution built for Amazon Web Services (AWS) that makes running new containerized … continue reading

Security and compliance in DevSecOps

In the space of time it takes you to read this blog post and finish your morning coffee, a company at the vanguard of DevSecOps, such as Etsy, Amazon or Netflix, will have completed yet another deployment – one of potentially thousands per day. Deployment frequency has accelerated to a pace that would have been … continue reading

Google launches Cloud Scheduler beta for GCP

Google released the beta of Cloud Scheduler, a fully-managed, serverless job scheduler for the Google Cloud Platform today, designed to allow for the scheduling and execution of batch, big data and cloud infrastructure tasks from within any application. “Job schedulers like cron are a mainstay of any developer’s arsenal, helping run scheduled tasks and automating … continue reading

Boomi World 18: Dell Boomi’s iPaaS roadmap, iPaaS portfolio updates, and new partnership program

Dell Boomi made a number of new updates and improvements to its Boomi platform at the Boomi World conference in Las Vegas this week. The company laid out its vision for reinventing the iPaaS industry, added new capabilities to Boomi, and launched a new partner program. In the next few months, the company will work … continue reading

VMware to acquire Kubernetes solution provider Heptio

VMware is joining forces with Heptio on a shared vision to simplify Kubernetes and accelerate IT in a multi-cloud world. The company announced it signed a definitive agreement to acquire the Kubernetes solution provider. “Kubernetes is emerging as an open framework for multi-cloud infrastructure that enables enterprise organizations to run modern applications,” said Paul Fazzone, … continue reading

Intel announces two new products for its Xeon processor line

Intel is giving IT administrators more options to choose from with the announcement of two new products in its Xeon processor line. Cascade Lake is a new Intel Xeon Scalable processor that was designed for high-performance computing, AI, and infrastructure-as-a-service workloads, the company explained. According to the company, Cascade Lake furthers Intel’s goal of delivering … continue reading

Bleedingbit vulnerabilities affect 70 percent of the enterprise network

Researchers at the security company Armis have identified two chip-level vulnerabilities, dubbed Bleedingbit, in Bluetooth Low Energy (BLE) chips manufactured by Texas Instruments. These chips are used in Wi-Fi devices made by Cisco, Meraki, and Aruba. According to Armis, those three companies account for almost 70 percent of the total enterprise network. BLE is a … continue reading

ZeroStack debuts storage controls on its cloud platform

ZeroStack, creators of a self-driving cloud that lets users focus on their businesses, today announced that administrators of its Self-Driving Cloud platform can now implement flexible storage controls that prevent over-consumption of storage by individual users or VMs. MSPs and enterprises share storage pools across customers or end users in a cloud environment, and this … continue reading

Google Kubernetes Engine gets enterprise-level security features

Google Cloud has announced new networking features to enhance security and privacy within container infrastructures. The new Google Kubernetes Engine (GKE) features are focused specifically on private clusters, master authorized networks, and shared Virtual Private Cloud (VPC). “These new features enable you to limit access to your Kubernetes clusters from the public internet, confining them … continue reading

How automation has changed APM

Changes in software development that have led to accelerated delivery cadences are stressing other parts of the application life cycle. This is especially true in organizations adopting microservices architecture, where teams are working autonomously to deliver their software, which by definition relies on communication with other services to form a more complete application. And one … continue reading

Morpheus multi-cloud management gets OpenStack, AWS CloudFormation and Dell EMC integrations

Cloud application management and orchestration company Morpheus Data released updates for its Morpheus multi-cloud management platform today, including enhanced OpenStack support, AWS CloudFormation automation support and support for storage and cloud using Dell Technologies. Morpheus explained that with the updates to its platform’s OpenStack integration, users can now orchestrate actions like creating OpenStack Octavia load … continue reading

« Previous PageNext Page »
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!