premium The automation imperative

Cloud-native and Kubernetes are dominant topics in technology circles these days. But why? What makes such previously obscure concepts and tools suddenly so relevant? Standard practices for software operations until now have been imperative, meaning that instructions are explicit, requiring manual steps and active intervention. Kubernetes and a new generation of cloud-native software have changed …

ITOps Times Open-Source Project of the Week: KubeCarrier

Kubernatic has announced the open source release of KubeCarrier. KubeCarrier was designed to automate the provisioning and entire lifecycle management of services, applications, and API-accessible hardware devices by leveraging Kubernetes Operators. As cloud adoption accelerates, the company explained that operation teams are confronted with the complexities of service management across multiple clusters, clouds, and regions.  …

ITOps Times news digest: Oracle Cloud VMware, Red Hat Virtualization 4.4, etcd security audit

Oracle has announced its VMware solution is now available. The Oracle Cloud VMware solution is a cloud-native VMware-based environment that enables users to move VMware workloads to Oracle Cloud Infrastructure.  “Building new digital services. Scaling business-critical apps. Enabling a remote workforce. Applications sit at the core of addressing these challenges, and hybrid cloud opens the …

Microsoft releases an open-source, cloud-native service mesh

Microsoft is the latest company to release its own service mesh solution. The company announced the open-source project: Open Service Mesh (OSM), a lightweight service mesh that runs on Kubernetes.  “It is no secret that although microservice environments enable portability, allow faster and more frequent deployment cycles, and can even enable organizations to create teams …

Latest News

Tanium and Google Cloud team up to protect distributed business operations

Endpoint management and security provider Tanium and Google Cloud are expanding their partnership to support distributed business operations. According to the companies, as more employees transition to remote work and organizations become more distributed, IT and security teams are having to defend against an increasing number of cyberattacks while maintaining availability and security.  “According to …

premium 3 reasons enterprises need to implement AIOps

Competitive organizations don’t simply react to their environments or competitors. Rather, they are proactively and predictively anticipating how to deliver better business outcomes. These autonomous digital enterprises know how to pull all the relevant information, capabilities, and people into the same place to quickly and efficiently make the right decisions. This requires flexible and dynamic …

ITOps Times news digest: Threat Stack for AWS Fargate, Aqua Security now on Red Hat Marketplace, and Aerospike Database 5.1

The company is extending its observability solution to the Amazon Elastic Container Service compute engine. The new capabilities will enable users to monitor AWS Fargate aspects such as processes, network activity, and running code.  “Our ‘Leveraging DevSecOps to Secure Cloud-native Applications’ report shows the top container security challenge is aligning the architectural implementation of a …

Patch management can be a challenge, but not impossible

Updating systems on a regular basis is one of the best lines of defense against cyberattacks, but many companies are still struggling to effectively do patch management. According to a study conducted by ServiceNow and the Ponemon Institute, of the nearly half of respondents who had a data breach in the past two years, 60% …

Atlassian acquires asset management company Mindville

Atlassian has announced the acquisition of asset and configuration management company Mindville. Mindville Insight provides companies with full visibility into assets and services, which Atlassian believes is crucial to delivering good customer experiences and is a cornerstone of ITSM. Atlassian will use Mindville to bolster its ITSM capabilities. Mindville’s solution will allow Atlassian to combine …

ITOps Times Open-Source Project of the Week: Clutch

Lyft has announced it is open sourcing its UI and API platform for infrastructure tooling: Clutch. The platform allows teams to build, run, and maintain workflows that have integrated domain-specific safety mechanisms and access controls. According to Lyft, cloud computing has reduced the adoption cost of new infrastructure because of how dynamic it is. However, …

BootHole vulnerability discovered in the GRUB 2 bootloader

Security research firm Eclypsium has disclosed a vulnerability, BootHole, present in the GRUB 2 bootloader.  The researchers noted that almost all Linux distributions are vulnerable because most of them use GRUB 2 for bootloading. In addition, any Windows device that uses the Microsoft Third Party UEFI Certificate Authority is vulnerable. “Thus the majority of laptops, …

Chaos engineering in IT operations during COVID-19

There may never be a more perfect time to experiment with chaos engineering than right now, in 2020, while many IT teams and their end customers continue to work remotely as COVID-19 rages on.  There’s been much written about chaos engineering, particularly its impact on DevOps organizations. Chaos engineering (CE) entails experimenting on a system …

ITOps Times news digest: New Relic One, Citrix Web App and API Protection, and D2iQ’s Konvoy 1.5 and Kommander 1.1

New Relic has announced updates to its observability platform. New Relic One has been reimagined to provide a better user experience, new capabilities, and predictable packaging and pricing. It also now includes a free tier to make it easier for engineers to try out the platform. “From the beginning, New Relic has been focused on …

Report: Enterprise data applications that are not optimized with observability and continuous tuning have enormous waste

Pepperdata’s inaugural Big Data Performance Report 2020 revealed that enormous waste exists within enterprise data applications that are not optimized by solutions that allow for observability and continuous tuning. There is also tremendous potential to optimize and reduce that waste. This is happening because as more complex big data applications migrate, the likelihood of resource …

Learning Center

  • White Papers

    The Gorilla Guide to Why Modern IT Requires Modern Disaster Recovery

    Protecting your data center is your top priority. But, you’re continually faced with the rise of new external threats. That means you need new tools to respond effectively and quickly. Read the Gorilla Guide to Why Modern IT Requires Modern Disaster Recovery, to see how you can improve your backup and disaster recovery strategy. We review the …

  • White Papers

    The Complete Ransomware Recovery Guide

    Using best practices for ransomware prevention, network intrusion, encryption, and anti-phishing tools, plus keeping all endpoints up to date with the latest security patches will put you in a good position to recover your data without paying a ransom. Download this guide to learn: Proactive ransomware prevention What to do when your systems are infected …

  • White Papers

    Observability: A Guide for Buyers

    You’ve likely heard the term observability being passed around for the past few years, and you might have assumed that it is just another marketing buzzword for monitoring. And you wouldn’t be alone in that thinking. Some experts would say that “observability”, “AIOPs” and “application Performance Monitoring (APM)” are just terms used to distinguish between …

  • Webinars

    Why Automated AIOps Is Better Than AIOps- and How to Get There

    RECORDED EVENT Early monitoring efforts relied on specialists to scrutinize production environments for issues that might hurt performance. But as IT grew in size and complexity, humans struggled to keep up. Growing out of that struggle, AIOps enabled systems to independently spot anomalies and issue alerts. Adding automation takes AIOps to a whole new level—introducing …

  • White Papers

    Log Management: A Guide for Buyers

    Over the last several years, organizations have had to deal with exponentially more data than ever before. A good log management solution can help your organization connect the dots between your data, helping you uncover insights you didn’t even know you were looking for. Logs can help you understand what is going on within your …

  • White Papers

    Pay the price to mitigate ransomware attacks

    Ransomware attacks against organizations are on the rise, and one study puts the cost of downtime at $8 billion! But your applications and data don’t have to be held hostage. When an attack is discovered, the goal is to minimize further infection and restore to a safe state as quickly as possible (low RTO). Read this …

ITOps Times Newswire

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!