ITOps Times Open-Source Project of the Week: Harbor

This week’s open-source project of the week, Harbor, is aiming to make working with containers more secure. Harbor is a cloud-native container image registry that stores, signs, and scans container images for potential vulnerabilities.  Key security features of the project include security and vulnerability analysis, and content signing and validation. On the management side of …

Automation, the key to digital transformation

Nowadays customers have high expectations of (online) services and what a business can (or should) deliver. To meet up to those high expectations, businesses need to transform the way they work and think and even their organizational culture. This involves major changes in day-to-day operations. As a result of these changes, customer value will increase. …

Red Hat OpenStack Platform 15 is now available

The latest version of Red Hat’s infrastructure as a service solution is now available. Red Hat OpenStack Platform 15 introduces improvements to performance and cloud security, as well as expanding the ecosystem of supported hardware. According to the company, IT organizations will now be able to “more quickly and more securely support demanding production workloads.” …

Screenshot of New Relic Programmability

ITOps Times news digest: New Relic’s new capabilities, 128 Technology’s Series D, and Datadog’s IPO

At its FutureStack conference in New York, New Relic unveiled new capabilities for its platform, including New Relic Logs, New Relic Traces, New Relic Metrics, and New Relic AI. The company believes these new solutions will help “empower teams with the data they need to move faster and build better digital experiences.”  128 Technology raises …

Latest News

Zscaler B2B reduces attack surface of customer-facing Internet applications

Zscaler has announced a new B2B solution that helps reduce the attack surface of customer-facing applications exposed to the Internet.  According to the company, Zscaler B2B allows customers to view applications without exposing them to the Internet where they could potentially be attacked.  The solution supports multiple identity provider (IDP) configurations, forcing customers to first …

What We Learned: 7 Field-Tested Best Practices for Kubernetes

Our Kubernetes journey at Algolia began with one question: How can our development team deploy new services with more flexibility? Two years ago, we were a big user of bare metal machines. This changed when we assessed Kubernetes for automating hardware allocation and workloads and services life cycle management. Today, most of our products are …

Kubernetes 1.16 now available

The latest release of the container orchestration platform Kubernetes is now available. Kubernetes 1.16 is the third release of the project this year, and it includes 31 enhancements. According to the Kubernetes release team, the main themes of this release are custom resources, overhauled metrics, and volume extension.  The team has made custom resource definitions …

Oracle OpenWorld: Oracle’s Microsoft Teams integration, Eclipse Che 7, and Toad for Oracle 13.2

Oracle OpenWorld kicked off yesterday in San Francisco. Oracle used the event to reveal some of its latest offerings, such as Autonomous Linux and Java 13, but a number of other companies are also using the event to announce new products.  Oracle expands partnership with Microsoft Oracle also announced an expansion of its partnership with …

Five teams from Sigfox’s Hacking House to grow into startups

Hackathons, boot camps, and other education-focused coding events can help developers learn new things and improve their skills. Sometimes the work produced at these events can even lead to new companies.  Such is the case with IoT company Sigfox’s three-month Hacking House program. Throughout the program, developers work to solve real world problems. It recently …

ITOps Times news digest: Traefik 2.0, IT Glue’s roadmap, and HSB’s new IoT sensor

Version 2 of the edge router Traefik is now available. Traefik 2.0 adds TCP support with SNI routing and multi-protocol ports, middleware, a new dashboard and WebUI, and Service Load Balancers that support canary deployments and mirroring.  “More than anything, this release shows the importance of the community. Every feature that has been discussed today …

Pure Storage grows its portfolio with a number of new additions

Today, at its Pure//Accelerate conference in Austin, Pure Storage announced a number of new updates.   First, it announced a variety of new AI solutions that will help customers on their AI journeys.  It is launching AI Data Hub, which is an end-to-end AI pipeline that was created in collaboration with NVIDIA. According to Pure Storage, …

Best practices for mitigating insider threats in the cloud

Although cloud vendors like Microsoft are generally responsible for protecting their infrastructures against attacks and even offer additional security services (e.g., the Microsoft 365 Security Center) to help customers with data protection, companies need their own controls as well. Why? Many different types of cloud users put corporate data at risk, including IT teams, managers …

ITOps Times Open-Source Project of the Week: Kuma

Earlier this week, Kong announced that it was releasing a new open-source service mesh, Kuma.  Kuma is based on the Envoy proxy, which is an open-source edge and service proxy. “It’s been amazing to see how quickly Envoy has been adopted by the tech community, and I’m super excited by Kong’s new ‘Kuma’ project,” said …

Sumo Logic’s latest innovations help users visualize data, gain insights into Kubernetes

Sumo Logic wants to help companies stay competitive with the announcement of its new capabilities. Today, the company revealed new features such as dashboard visualization, data enrichment for log, and metric transformation rules. The dashboard visualization feature will give users rich analytics of their metrics and log data. Users will also be able to get …

Learning Center

  • White Papers

    Log Management: A Guide for Buyers

    Over the last several years, organizations have had to deal with exponentially more data than ever before. A good log management solution can help your organization connect the dots between your data, helping you uncover insights you didn’t even know you were looking for. Logs can help you understand what is going on within your …

  • White Papers

    Pay the price to mitigate ransomware attacks

    Ransomware attacks against organizations are on the rise, and one study puts the cost of downtime at $8 billion! But your applications and data don’t have to be held hostage. When an attack is discovered, the goal is to minimize further infection and restore to a safe state as quickly as possible (low RTO). Read this …

  • Webinars

    Breakthroughs and Best Practices in Disaster Recovery

    Wednesday, August 21,2019 at 1:00 pm E.T. Disaster Recovery (DR) has never been more important. Natural disasters such as hurricanes, wildfires, and floods are on the rise. According to the U.S. National Oceanic and Atmospheric Administration the total cost of last year’s natural disasters was approximately $91 billion. FEMA has stated, “the need for forward-leaning …

  • White Papers

    Monitoring your network with time-series data

    Today’s applications are architectured to work on hybrid, componentized, containerized, distributed, mobile/sensor environments, and so do the networks that sustain all these applications together. Complexity, traffic volume, intolerance to performance degradation and inefficiency will only increase, demanding real-time and holistic monitoring. …

  • White Papers

    Container Security: More moving parts mean more complexity

    Securing containerized applications is quite a bit more challenging than securing traditional monolithic applications. The use of open-source components in code, the microservices within containers, and the containers themselves, all need to be secure to ensure vulnerabilities do not make their way into the deployed application. This guide to container security looks at the issue …

  • White Papers

    Application Performance Management: A Guide for Buyers

    Changes in software architecture and transition to the cloud have forced the way organizations monitor their applications to change as well. Because of increased complexity of applications — code written in-house, couple with services brought in via APIs, scaling in the cloud, much more data being processed — APM has become more important than ever. …

ITOps Times Newswire

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!