Google announced a new training program to expand the cybersecurity workforce

Google announced a new training program built by cybersecurity experts that aims to expand the cybersecurity workforce by filling major skills gaps in the United States and providing opportunities for people from a wide range of backgrounds.  The new Google Cybersecurity Certificate provides job seekers with affordable paths to careers in data analytics, IT support, … continue reading

ITOps Times Open-Source Project of the Week: Dashy

Dashy is a self-hostable personal dashboard that includes status-checking, widgets, themes, icon packs, a UI editor, and more. The tool helps users organize self-hosted services by making them accessible from a single place. Dashy includes a selection of pre-installed themes that users can easily preview, apply, and modify via the user interface. The presence of … continue reading

Report: IT executives growing concerned over cloud spending

These IT leaders will be trying to find ways to reduce their cloud infrastructure, application, and tools costs.  According to a survey by Vega Cloud, 100% of the 100 executives they surveyed say that cloud is important to their business. 91% currently spend at least $1 million per year on cloud infrastructure.  Despite the critical … continue reading

AWS now offers a single place in console for managing notifications across services and accounts

Amazon is making it easier to consolidate notifications across all your AWS services with the launch of AWS User Notifications. The new feature is a capability in the AWS console that provides a single location for managing notifications across multiple AWS accounts, regions, and services. According to AWS, there are over 100 services that can … continue reading

New Relic announces generative AI observability assistant

The observability platform New Relic today announced New Relic Grok, a generative AI assistant for observability. This tool is geared at minimizing the need to manually sort through data, making observability more accessible, and unlocking insights from any telemetry data source.  With the help of OpenAI’s large language models and New Relic’s unified telemetry data … continue reading

Provisioning capacity for Athena allows users to prioritize, control, and scale queries

AWS has recently announced the ability to provision capacity to run Athena queries. With this, users can dedicate capacity for their queries and utilize new workload management features to prioritize, control, and scale important queries while only paying for the capacity being provisioned. Athena is a query service that is geared at simplifying the process … continue reading

How the open data lakehouse makes data mesh real—and radically expands data use for business

When Zhamak Dehghani introduced data mesh in 2019, she was acknowledging both the unmet expectations of business leaders and major frustrations of technologists in the data warehousing world. The talk channeled a decades-long groundswell of sentiment in the field, but most importantly, described a better approach for analytical data management. Data mesh surrenders to data’s … continue reading

ITOps Times Open-Source Project of the Week: OpenKruise

OpenKruise is an extended component for Kubernetes that was built with a focus on application automation like deployment, upgrade, ops, and availability protection.  The project became a Cloud Native Computing Foundation (CNCF) Incubating Project last month which means that the project is considered stable and used successfully in production.  The majority of features offered by … continue reading

How to think about managing modern application workloads

Workloads are the workhorses of your mission-critical applications—they’re what get the job done. The environments that these workloads run in, and the way we manage them, have evolved significantly. Back in the old days, applications were built as monoliths. They were self-contained systems that included not just the capabilities you needed them for but also … continue reading

Mezmo offers free trial, community plan for Telemetry Pipeline

The observability company Mezmo announced that Mezmo Telemetry Pipeline now has a free trial and free community plan. This free option will enable companies to get insights into their data without actually needing to do the upfront investment that would otherwise be required.  “Developers, site reliability engineers, security analysts, and more need access to telemetry … continue reading

RSA 2023: Google Cloud Security AI, SentinelOne Singularity Security DataLake, and CrowdStrike XDR for ChromeOS

The RSA security conference kicked off earlier this week, bringing security professionals from around the world together in San Francisco, and online. Here is a summary of some of the latest news from the event: Google Cloud Security AI Workbench This new security platform uses a large language model that is specifically designed for security … continue reading

Drive Your Network Operations Into the Future

Once taken for granted, the network has become the key connective tissue as organizations increasingly move workloads to the cloud and have employees that work from anywhere. While the network has become the lynchpin for delivering modern application experiences, traditional network operations teams have suffered from a loss of visibility and control as network elements … continue reading

VergeIO Unveils IOclone To Solve the VM Snapshot Problem

VergeIO, the Ultraconverged Infrastructure (UCI) company, today announced the launch of IOclone, a new solution that solves the virtualization snapshot problem facing users today. VMware and other virtualized environments suffer from highly inefficient snapshots and because of performance concerns, customers can only maintain a few active snapshots. This level of retention is insufficient for adequate data … continue reading

The High Cost of Data Compliance Failure: Three Ways to Get Your Data House in Order

With today’s ever-expanding threat surface, businesses face critical challenges in protecting vital data from compromise. Mitigating data security risk is top of mind for security professionals at corporate and public sector agencies alike. An indication of the severity of the problem can be found in the latest Binding Operational Directive from the Cybersecurity and Infrastructure … continue reading

« Previous PageNext Page »
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!