ITOps Times Open Source Project of the Week: Bat

This week’s highlighted open-source project is bat. Bat is a tool that IT practitioners can use to test, debug, and interact with HTTP servers.  It is a Go implementation of a CLI, and was inspired by the project Httpie.  According to the project’s GitHub page, its key highlights include its expressive and intuitive syntax, built-in …

ITOps Times news digest: Mirantis acquires Kontena, Humio Bucket Storage, and 1E Tachyon 5.0

Following their acquisition of Docker last year, Mirantis has now acquired Kontena. Kontena is a tool that allows teams to deploy, run, monitor, and operate Kubernetes cluster and workloads. It is an open-source tool that is currently in use by a number of companies. According to Mirantis, this acquisition should accelerate its roadmap in multi-cluster …

Report: IT security is becoming too complex to manage

Enterprises are struggling to maintain and manage the security of their hybrid environments. A recent report found that complexity of internal environments is one of the most significant obstacles for organizational IT security.  “When it comes to security complexity, the fact that the attack surface has continued to grow (with cloud, on-prem, and more SaaS …

Red Hat expands partner offerings to foster hybrid cloud innovation

Red Hat is hoping to drive innovation of open-source solutions for hybrid cloud by expanding its partner offerings. Red Hat’s Partner Connect provides opportunities such as certifications, tools, and alignment opportunities to “automate, accelerate, and streamline modern application development.” The company will expand both its certification and support services. It believes this will make companies …

Latest News

IEEE releases International Network Generations Roadmap

In order to prepare for the next generation of networks the IEEE along with the Future Networks Initiative has announced the IEEE International Network Generations Roadmap (INGR), First Edition. The INGR is designed to identify trends and reduce technical and engineering risks associated with developing and deploying next generation networks through 2030.  “The International Network …

OpsRamp announces AI-driven suggestions in Winter 2020 release

AIOps company OpsRamp has announced its Winter 2020 Release with new capabilities to make AIOps easier for the everyday operator. The release includes AI-driven suggestions, cloud monitoring integrations, and hybrid discovery and synthetic monitoring. “While machine learning models for IT operations have generated considerable excitement among technology decision-makers, customers would like to understand how a …

Boomi releases Integration Center of Excellence service

Boomi wants to help businesses build and manage their integrations with a new Integration Center of Excellence (ICoE) service. The new ICoE will provide best practices, company and industry guidelines and a repository of reusable frameworks.  In addition, the ICoE will access an organization’s integration maturity, identify goals and gaps, and provide a roadmap for …

ITOps news digest: Falkonry’s operational AI products, CloudBolt 9.2, and Huawei’s new 5G products

Predictive operations company Falkonry has announced two new AI product offerings designed to scale with lower total cost of ownership and short time to value. The products include Falkonry Workbench and Analyzer.  Workbench analyzes large amounts of data to build predictive models and solve production problems. Other features include ability to perform forensic analysis on …

ManageEngine releases Access Manager Plus for managing privileged sessions

ManageEngine released a new privileged management solution called Access Manager Plus that provides secure connections to remote systems, monitors privileged sessions, and tightens overall access governance. “Despite being inflexible and presenting huge privacy and security risks, traditional tools like VPNs are still used by most organizations. A solution that streamlines corporate remote access, while also …

Intel announces new hardware and software to unlock full potential of 5G

Intel is on a mission to drive the transformation of network infrastructure that is necessary to unlock the full potential of 5G. The company has announced a number of new software and hardware in order to achieve this. “As the industry makes the transition to 5G, we continue to see network infrastructure as the most …

Report: Container and Kubernetes security concerns are inhibiting business innovation

The latest edition of the State of Container and Kubernetes Security Report finds that 44% of respondents have delayed deploying cloud-native applications because of security concerns, delaying the deployment of cloud-native applications into production. StackRox surveyed more than 540 IT professionals for this third version of its industry-first report. Roughly 25 percent of respondents serve …

Google details how to apply SRE to monolith applications

Microservices are taking the software industry by storm, but that doesn’t mean monolithic applications are becoming extinct. While SRE is more commonly associated with modern architectures, Google is providing some insight into how enterprises can use SRE to manage their monoliths.  “When and why to choose monolithic architecture is usually a matter of what works …

ITOps Times Open-Source Project of the Week: KubeEdge

KubeEdge brings container orchestration and device management to the edge. Built on Kubernetes, it provides infrastructure support for networking, deployment, and synchronization between the cloud and edge.  The project has a number advantages, according to the team. For one, the edge allows large volumes of data to be secured and processed locally. “With business logic …

Red Hat OpenStack Platform 16 now available

Red Hat has announced the latest release of its Agile Infrastructure as a Service (IaaS) solution. Red Hat OpenStack Platform 16 features new improvements and capabilities for enterprises working with hybrid clouds, developer clouds, production clouds and cloud-native applications.  In addition, it takes on network functions virtualization, edge computing, artificial intelligence and machine learning.  The …

Learning Center

  • Webinars

    Why Automated AIOps Is Better Than AIOps- and How to Get There

    Thursday, March 12 | 1PM EST | 10AM PST Early monitoring efforts relied on specialists to scrutinize production environments for issues that might hurt performance. But as IT grew in size and complexity, humans struggled to keep up. Growing out of that struggle, AIOps enabled systems to independently spot anomalies and issue alerts. Adding automation …

  • White Papers

    Log Management: A Guide for Buyers

    Over the last several years, organizations have had to deal with exponentially more data than ever before. A good log management solution can help your organization connect the dots between your data, helping you uncover insights you didn’t even know you were looking for. Logs can help you understand what is going on within your …

  • White Papers

    Pay the price to mitigate ransomware attacks

    Ransomware attacks against organizations are on the rise, and one study puts the cost of downtime at $8 billion! But your applications and data don’t have to be held hostage. When an attack is discovered, the goal is to minimize further infection and restore to a safe state as quickly as possible (low RTO). Read this …

  • Webinars

    Breakthroughs and Best Practices in Disaster Recovery

    Wednesday, August 21,2019 at 1:00 pm E.T. Disaster Recovery (DR) has never been more important. Natural disasters such as hurricanes, wildfires, and floods are on the rise. According to the U.S. National Oceanic and Atmospheric Administration the total cost of last year’s natural disasters was approximately $91 billion. FEMA has stated, “the need for forward-leaning …

  • White Papers

    Monitoring your network with time-series data

    Today’s applications are architectured to work on hybrid, componentized, containerized, distributed, mobile/sensor environments, and so do the networks that sustain all these applications together. Complexity, traffic volume, intolerance to performance degradation and inefficiency will only increase, demanding real-time and holistic monitoring. …

  • White Papers

    Container Security: More moving parts mean more complexity

    Securing containerized applications is quite a bit more challenging than securing traditional monolithic applications. The use of open-source components in code, the microservices within containers, and the containers themselves, all need to be secure to ensure vulnerabilities do not make their way into the deployed application. This guide to container security looks at the issue …

ITOps Times Newswire

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!