Oracle to acquire SD-WAN provider Talari Networks

Oracle has entered into an agreement to acquire software-defined wide area network (SD-WAN) provider Talari Networks. According to Oracle, Talari’s Failsafe technology adds greater reliability and predictability to SD-WAN, while still maintaining security. “Talari is the original innovator of Failsafe SD-WANs that deliver both MPLS-class high availability and high QoE (Quality of Experience) predictable application …

IBM and ServiceNow team up on multi-cloud management

IBM is extending its partnership with ServiceNow to help enterprises easily manage IT resources in multi-cloud environments. As part of the announcement, IBM’s Multicloud Management Platform be extended with ServiceNow’s IT Service Management and IT Operations Management solutions. The company’s IBM MultiCloud Manager will also be provider to address Kubernetes apps for multi-cloud environments. This …

New Relic extends leadership in observability across modern architectures with APM support for AWS Lambda

New Relic, Inc., provider of real-time insights for software-driven businesses, today announced a number of innovations and enhancements for companies rapidly adopting modern software architectures, including serverless application monitoring. With today’s announcements, New Relic continues to help DevOps teams move fast, manage the complexity and performance of complex systems, and ultimately drive business value. Serverless …

Why multi-cloud can be more secure—and make more possible

Moving to the cloud can make your business more agile, flexible, and scalable—or it’s supposed to, anyway. Over time, though, many organizations are discovering that the choices you make as you implement your cloud strategy can actually limit your options. That’s especially true when it comes to security. If you’re not careful, it’s all too …

Latest News

Veritas launches Predictive Insights

Veritas Technologies today launched its Predictive Insights engine, a solution that leverages artificial intelligence and machine learning for monitoring the health of systems, detecting anomalies and creating proactive remediation to reduce downtime. Unforeseen events lead to downtime that has cost organizations roughly $21 million per year, according to Eric Seidman, director of solution marketing at …

Red Hat drives unified foundation for Kubernetes and virtual machines with Red Hat OpenStack Platform 14

Red Hat, Inc., the world’s leading provider of open source solutions, today announced Red Hat OpenStack Platform 14, the latest version of Red Hat’s massively-scalable, cloud-native apps-ready Infrastructure-as-a-Service (IaaS) solution. Based on the OpenStack “Rocky” community release, Red Hat OpenStack Platform 14 more tightly integrates with Red Hat OpenShift Container Platform, the industry’s most comprehensive …

Aqua Security 3.5 comes with serverless functions and container encryption protection

Aqua Security has announced version 3.5 of its cloud-native security platform with new risk assessment controls for a range of cloud-native technologies. According to the company, this release addresses the need for runtime visibility and multi-application, multi-team policy management. A key feature of 3.5 is the ability to deploy end-to-end security for containers, serverless containers …

Twistlock provides insight into cloud-native environments with Cloud Discovery

Twistlock is open sourcing its Cloud Discovery tool to help infrastructure, operations and security teams discover the “unknown unknowns” in their cloud environments. Cloud Discovery provides insight into what cloud native services are running and where. According to the company, it can discover services like container registries, managed Kubernetes platforms, and serverless services through the …

Cloud security company Threat Stack acquires Bluefyre for its targeted application security

Cloud security and compliance company Threat Stack wants to bolster its cloud capabilities with the acquisition of Bluefyre. According to the company, Bluefyre will help deliver greater visibility into security as well as help developers build secure, cloud-native apps. Bluefyre provides targeted application security for Kubernetes, Mesosphere and OpenShift applications, and according to Threat Stack …

Startup YotaScale aims to automate enterprise IT cloud ops

Organizations are moving applications to modern cloud computing infrastructures at a growing pace because they provide business services on-demand, but the transition to a usage-based OpEx cost model can come at a steep price. A Silicon Valley startup company known as YotaScale claims it can automate cloud IT operations management and thereby reduce sticker shock …

Cisco announces hybrid solution for Kubernetes on Amazon Web Services

Applications are the lifeblood of business. Build them easily and get them up and running quickly and you have a huge competitive advantage. But get bogged down worrying about where those applications run, and you miss opportunities. Cisco is now solving that problem with a new solution built for Amazon Web Services (AWS) that makes running new containerized …

Security and compliance in DevSecOps

In the space of time it takes you to read this blog post and finish your morning coffee, a company at the vanguard of DevSecOps, such as Etsy, Amazon or Netflix, will have completed yet another deployment – one of potentially thousands per day. Deployment frequency has accelerated to a pace that would have been …

Google launches Cloud Scheduler beta for GCP

Google released the beta of Cloud Scheduler, a fully-managed, serverless job scheduler for the Google Cloud Platform today, designed to allow for the scheduling and execution of batch, big data and cloud infrastructure tasks from within any application. “Job schedulers like cron are a mainstay of any developer’s arsenal, helping run scheduled tasks and automating …

Boomi World 18: Dell Boomi’s iPaaS roadmap, iPaaS portfolio updates, and new partnership program

Dell Boomi made a number of new updates and improvements to its Boomi platform at the Boomi World conference in Las Vegas this week. The company laid out its vision for reinventing the iPaaS industry, added new capabilities to Boomi, and launched a new partner program. In the next few months, the company will work …

Learning Center

  • White Papers

    A Microservices Reference Architecture

    There are many different approaches to implementing microservices. Many of them or specific to the needs of individual development teams. A model can make it easier for those teams to develop and deliver their own microservices-based applications. This eBook offers a microservices reference architecture that includes a set of models you can use to create …

  • White Papers

    Container Networking: From Docker to Kubernetes

    You’ve built your first containerized application, and now you want to connect it to another container that, say, has a database. And, you don’t want to have to do the manual work of launching the containers and checking to see if they’re still running.. and if not, relaunching them. It’s at this point that you …

  • Webinars

    Leveraging Containers for Improved Security

    RECORED EVENT: As containers become commonplace for delivering and deploying applications, we’ve seen more of our customers taking a “lift-and-shift” approach to migrating their existing applications. In this session, Patrick Maddox, Sr. Director, Twistlock Solutions Architecture, will reveal how an environmental science and engineering consulting company moved its 14-year-old app that models storm surge to containers. …

  • White Papers

    5 Things to Know about Network Monitoring in a Cloud-Centric World

    The move to cloud computing has significant repercussions for network management. Cloud computing environments are dynamic, so your tools need to be dynamic as well. Download this white paper to learn about five best practices for cloud monitoring including: Focusing on service monitoring of your own applications instead of network monitoring Monitoring within the cloud …

  • Webinars

    Embedding security into your cloud-native pipeline

    In today’s modern software factories, organizations are shifting security to the left. No longer just the purview of firewalls, security needs to be built in during development and deployment processes. By doing so, organizations can ensure they are limiting vulnerabilities getting into production while cutting costs of both downtime and code rework. Learn about: How …

  • Webinars

    Redis Enterprise on Kubernetes

    Containers are becoming the basic unit of deployment. Kubernetes is becoming the industry standard for managing containerized applications. In this webinar, we will talk about basic Kubernetes constructs and will show how you can run three pod clustered Redis Enterprise on Kubernetes. You will learn:  Kubernetes primitives  How to deploy Redis Enterprise service on Kubernetes …

ITOps Times Newswire

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!