The Cloud Native Computing Foundation (CNCF) has announced the graduation of another project: KEDA, which is a Kubernetes autoscaler. The CNCF is home to many popular cloud-native open-source projects, such as Kubernetes, Istio, and Prometheus. Earning the graduated status means that the organization considers a project to be “stable and used successfully in production.” KEDA … continue reading
VMware’s annual conference, VMware Explore, kicked off today in Las Vegas, Nevada. The event brings together thousands of VMware users and experts, and a number of partners time their announcements to come out at the event. Here are some of the highlights from the event so far: IBM launches new partner-managed service in its cloud … continue reading
IT teams are turning to business process automation as a way to stay competitive, reduce costs, and scale their business. According to Jitterbit’s 2023 State of Automation in IT survey, 89% of respondents say business process automation is “part of their technology strategy this year.” For the survey Jitterbit surveyed IT, marketing, and HR leaders … continue reading
OpenELA, which stands for Open Enterprise Linux Association, is a new initiative to help keep Enterprise Linux downstream distributions available. It was formed by CIQ, Oracle, and SUSE following Red Hat’s recent announcements about the changes to Red Hat Enterprise Linux (RHEL). RELATED CONTENT: SUSE, CIQ, and Oracle form Open Enterprise Linux Association OpenELA provides … continue reading
The Kubernetes release team has officially announced the launch of the next version of the technology, Kubernetes 1.28. Kubernetes 1.28 includes 45 enhancements, 12 of which are stable, 14 that are in beta, and 19 that are in alpha. One of the new generally available features is the ability to recover after an unexpected node … continue reading
The Open CyberSecurity Schema Framework (OCSF) is an open-source project that provides a framework for developing security schemas. In order to detect and stop cyberattacks, there must be coordination across several different tools, but that currently requires a lot of time and resources because there is no standard, vendor-agnostic schema these tools follow, OCSF explained. … continue reading
Amazon has added a new feature to Amazon FSx for Lustre that allows customers to perform file releases. Amazon FSx for Lustre is a managed storage service for Linux-based workloads that builds on the open-source Lustre project. The new file release capability allows customers to release file data that has been synchronized with Amazon S3. … continue reading
The observability company Grafana is hoping to enable companies to unify different observability signals with the launch of Grafana Cloud Profiles. This new solution allows users to better take advantage of profiling, which offers insights into why a system is behaving as it is, at the code level. “It doesn’t merely append another pillar — … continue reading
The application security company Mend.io is working to make containers more secure with the release of Mend for Containers, which scans container images and registries. According to the company, the new solution will enable DevSecOps teams to discover threats before they make it to production. It also can scan containers that are already in production. … continue reading
The companies have been working together since 2018, when IBM released an application for configuring security solutions, which ran on Cloudflare, called IBM Cloud Internet Services (CIS). “As the threat landscape continues to grow, it’s more important than ever to evolve our offerings to better support our clients in their cyber resiliency journey,” said Nataraj … continue reading
K0smotron is an open-source project for managing Kubernetes control planes. It was released earlier this week by the Kubernetes company Mirantis. The tool allows companies to rapidly provision Kubernetes control planes, and these control planes are also separated from worker nodes. According to Mirantis, this separation allows for provisioning of remote worker nodes, which supports … continue reading
A targeted attack can begin within five minutes of credential discovery, and by the time another five minutes have passed, the attackers have completed their goal. This is according to Sysdig’s 2023 Global Cloud Threat report, which looked into cloud-based attacks. “Using their worldwide honeynets, the Sysdig [Threat Research Team] shed light on an alarming … continue reading