Snyk and Docker partner up to advance container vulnerability scanning

Snyk and Docker have partnered up to help developers securely build and use containers and open source.  Docker stated that it will provide native vulnerability detection and fixes powered by Snyk. Developers can get a report of their container image vulnerabilities after a quick ‘docker scan.’ They then receive guidance to help fix the reported … continue reading

Google Cloud VMware Engine announced and VMware plans Octarine acquisition

Google announced the release of its VMware Engine, an integrated first-party offering with end-to-end support to migrate and run VMware environments in Google Cloud. Also, VMware announced its plans to acquire Octarine. The service delivers a fully managed VMware Foundation stack – VMware vSphere, vCenter, vSAN, NSX-T, and HCX for cloud migration in a dedicated … continue reading

NVIDIA SmartNIC released for advanced network offloads and 25/50 Gb/s connectivity

NVIDIA announced the release of NVIDIA Mellanox ConnectX-6 Lx SmartNIC, which provides advanced network offloads to accelerate cloud and enterprise workloads.  SmartNIC was designed to handle the needs of modern data centers by providing 25/50 Gb/s Ethernet smart network connections. It extends accelerated computing by leveraging software-defined, hardware-accelerated engines to offload more security and network … continue reading

Red Hat Quay 3.3 now available

Red Hat has released the latest version of its container registry Quay. The release of Red Hat Quay 3.3 focuses on deeper integrations with Red Hat OpenShift through the introduction of Quay Bridge Operator, which automates common workflows when the two solutions are used in conjunction with one another.  “Built in collaboration with the Red … continue reading

Confluent announces Elastic Scaling for Apache Kafka and Project Metamorphosis update

Confluent announced Elastic Scaling for Apache Kafka in Confluent Cloud to power real-time applications at scale, as well as new innovations that accelerate how companies can harness the full power of event streaming at any scale as part of Project Metamorphosis.  Under Project Metamorphosis, elastic scaling is the first and foundational step in establishing the … continue reading

Cumulus Networks logo

Nvidia plans to acquire Cumulus Networks

Nvidia announced its plans to acquire Cumulus Networks to further its networking software capabilities and to accelerate software-defined data centers. “Cloud data centers are evolving to an architecture that is accelerated, disaggregated and software-defined to meet the exponential growth in AI and high performance computing,” Amit Katz, vice president of Ethernet Switch at Nvidia wrote … continue reading

Red Hat: Culture change and automation are necessary to create DevOps and SRE teams

In order to bring more effective operational practices, DevOps and site reliability engineering (SRE) teams need to go through a culture change within the organization. Red Hat held its virtual summit this week where it talked about how to reinvent IT Ops as SRE.  According to the company, change can happen by automating processes and … continue reading

McAfee MVISION now supports encryption enhancements in Microsoft Teams

McAfee MVISION Cloud now supports encryption enhancements in Microsoft Teams, including encrypted webhooks and encrypted payloads. While utilizing Teams as a collaboration platform, users can participate in conversations, and calls, as well as upload and share documents while ensuring customer data remains secure with encryption when evaluated by McAfee MVISION Cloud.  “Effective collaboration allows organizations … continue reading

Datadog announces Security Monitoring to inject security without disrupting workflows

Datadog has extended its monitoring and analytics platform to security engineers with its new Security Monitoring solution, which will help break down silos between teams.  Key features in Security Monitoring include unified observability and security through over 400 integrations; real-time, out-of-the-box threat detection with turn-key threat Detection Rules; cost-effective data ingestion and analysis; customizable rule-editing; … continue reading

Report: Complexity replaces cost as the number one concern for WAN

Complexity and application performance have grown as the biggest concerns for global IT and network practitioners as modern applications become more distributed across on-premise data centers, multiple public clouds and edge locations. This is according to Aryaka’s 2020 State of the WAN study. “The two are interrelated since complexity negatively impacts application performance and therefore … continue reading

Aqua Security announces dynamic threat analysis for containers

Aqua Security’s new Dynamic Threat Analysis (DTA) solution was designed to protect container-based environments against malware that can only be detected through dynamic analysis of a running container.  The company said that it has seen a sharp increase in sophisticated attacks on containers that use obfuscation and evasion techniques to avoid detection by static scanners. … continue reading

Internet of Things Consortium adds connected health and wellness as core vertical for IoT adoption

The Internet of Things Consortium (IoTC) added connected health and wellness as one of the five core verticals to advance IoT growth and adoption amidst the COVID-19 pandemic.  “Coronavirus has without a doubt underscored the critical need to drive adoption of devices, platforms and services to support individuals at every level of care—from preventive to … continue reading

« Previous PageNext Page »
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!