TidalScale announces upgrade that greatly reduces server failure rates

The TidalScale 4.1 update will dramatically improve overall system reliability, availability, and serviceability to reduce server failure rates. “The cost of server downtime, whether planned or unplanned, has never been higher.  Enterprise customers are experiencing server hardware failures at a rate never seen before, often resulting in significant financial losses for their business,” said Gary … continue reading

IBM and VMware partner to support modernization initiatives in highly regulated industries

IBM and VMware have announced a new partnership that will help their joint customers modernize mission-critical workloads and improve their hybrid cloud environments. They believe that this partnership will be especially beneficial to customers in highly regulated industries like financial services, healthcare, and public sector.  Companies in those industries wish to modernize their infrastructure but … continue reading

Report: Nearly half of companies rely on outdated backup and recovery infrastructure

Nearly half of companies are using outdated, legacy backup and recovery infrastructure to manage and protect their data, according to a survey commissioned by data management company Cohesity.  The survey of more than 2,000 IT and SecOps professionals in the United States, the United Kingdom, Australia and New Zealand was conducted this April and was … continue reading

ITOps Times Open-Source Project of the Week: Service Mesh Interface

Service Mesh Interface (SMI) provides a standard interface for service meshes on Kubernetes, a basic feature set for common service mesh use cases, and the flexibility to support new service mesh capabilities over time.  The specification defines a common standard that can be implemented by various providers and it follows the CNCF code of conduct.  … continue reading

Workato launches tool to help cut down on unnecessary IT costs

The automation platform Workato has announced its Software License Optimization Accelerator to help companies reduce unnecessary IT spending. It does this by analyzing application usage, identifying underutilized licenses, and initiating optimization processes.  According to Workato, the current economic situation has been a concern on leaders’ minds, causing them to start thinking about areas where costs … continue reading

Linkerd 2.12 now available

The team at Linkerd, the service mesh for Kubernetes, today announced the release of Linkerd 2.12. With this, route-based policy is introduced to Linkerd, enabling users to define and enforce authorization policies based on HTTP routes in a zero-trust way. These policies are built on top of Linkerd’s workload identities, which are secured by mutual … continue reading

3 reasons you need continuous performance validation for your SD-WAN

Traditional networks have typically relied on multiprotocol label switching (MPLS) circuits to connect sites to data centers – it’s a classic routing technique in private telecommunications networks that directs data from one node to the next based on labels. However, the rapid adoption of cloud-based applications creates an MPLS bottleneck as network traffic is increasingly … continue reading

TidalScale announces availability of software-defined server technology in AWS marketplace

TidalScale, the industry leader in software-defined server technology, today announced that it is now live and available in the AWS Marketplace, making it even easier to try, deploy and run TidalScale without a long-term commitment. TidalScale software solution “glues” AWS EC2 bare metal instances together so that they function as a single larger system. The software accomplishes … continue reading

Maslow’s Hierarchy of DevSecOps

When psychologist Abraham Maslow came up with his hierarchy of needs pyramid in the 1940s, he probably didn’t know what a behemoth he was creating. Those five simple stages were a baseline that applied to so much more than individuals. That’s especially true when we think about software and the human-centric processes we use in … continue reading

DigitalOcean acquires managed cloud hosting provider Cloudways

The cloud platform DigitalOcean entered into a definitive agreement to acquire Cloudways, a managed cloud hosting and SaaS provider for SMBs.  Cloudways offers a wide range of features and services that are designed to make it easy for users to launch and manage their applications in the cloud and it enables users to launch applications … continue reading

ITOps Open-Source Project of the Week: Waltz

Waltz is an open-source project that lets users visualize and define their organization’s technology landscape developed by Deutsche Bank. Deutsche Bank released the project in early 2018 to help users make smarter decisions on technology investment.  “A core belief behind Waltz is that technology information should be accessible by everyone within your organisation. Furthermore employees … continue reading

What to expect in Kubernetes 1.25

The next version of Kubernetes, 1.25, is expected to be released in a few weeks (UPDATE: 1.25 is now available). In advance of that, Sysdig, creator of Falco, an open-source project for securing Kubernetes, has shared details of what to expect in the release. Sysdig often gives an advance look into upcoming releases of Kubernetes. … continue reading

How businesses need to adapt to the everchanging workplace

According to Gartner, by the year 2024, remote workers will use at least four different device types for remote working, up from three devices in 2019. In spite of this, many businesses still do not have the right solutions in place to properly prepare. Businesses and IT teams are in desperate need of new technologies … continue reading

Report: Over half of organizations have a Zero Trust Initiative in place

The number of organizations that have some sort of Zero Trust initiative in place has more than doubled in the last year. This finding comes from the security company, Okta, which has announced the results of its fourth annual State of Zero Trust Security Report. The survey looked at 700 security leaders and revealed that … continue reading

« Previous PageNext Page »
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!