Amazon WorkSpaces announces support for Ubuntu

The team at Amazon recently announced that Ubuntu desktops can now be provisioned for developers, engineers, or data scientists. With this, virtual desktop users are enabled to have more choices as well as gain access to new categories of workloads.  Support for Ubuntu also offers virtual desktop administrators a consistent experience regardless of whether they … continue reading

ITOps Open-Source Project of the Week: Spiffe and Spire

Spiffe and Spire is an open-source universal identity control plane for distributed systems. It allows users to secure microservices communication automatically with Envoy, X.509, or JWT.  Spiffe is a Secure Production Identity Framework For Everyone which works to offer a secure identity to every workload in a modern production environment. It also removes the need … continue reading

Zendesk launches new customer sentiment and intent functionality

The service-first CRM company Zendesk recently announced Intelligent Triage and Smart Assist, new AI solutions to enable businesses to triage customer support requests automatically as well as access important data at scale.  According to the company, the democratization of these solutions allow organizations to see value faster by understanding intent and sentiment through account-specific, data-driven … continue reading

Sysdig announces new CSPM and guided remediation tool

Sysdig, the unified container and cloud security company, has unveiled ToDo, a cloud security posture management offering that aggregates security findings by root cause and prioritizes remindiation based on impact, and Remediation Guru, which offers guided remediation at the source. According to Sysdig, ToDo works to save time during investigations and Remediation Guru enables security … continue reading

Linkerd 2.12 now available

The team at Linkerd, the service mesh for Kubernetes, today announced the release of Linkerd 2.12. With this, route-based policy is introduced to Linkerd, enabling users to define and enforce authorization policies based on HTTP routes in a zero-trust way. These policies are built on top of Linkerd’s workload identities, which are secured by mutual … continue reading

AWS Private 5G released to enable users to deploy private mobile networks

The team at AWS unveiled AWS Private 5G, a new service that allows users to design and deploy their own private mobile network in just a few days. This network can be used to communicate with the sensors and actuators in smart factories, or to provide better connectivity for handheld devices, scanners, and tablets for … continue reading

ServiceMax announces core expansion to its field service management platform

The asset-centric field service management company, ServiceMax, today unveiled the continued core expansion of ServiceMax Core by adding new features that are intended to drive better customer field service management performance, revenue, and margin growth. According to the company, these updates serve to benefit dispatchers, field technicians, planners, and administrators as well as several other … continue reading

Dynatrace combines its log analytics and user experience analytics capabilities

Dynatrace, the software intelligence company, announced that it has unified its AI-powered log analytics with its digital experience monitoring (DEM) capabilities, enhancing its analytics capabilities for modern multi cloud environments.  The goal of this combination is to enable development teams to automatically gain deeper insights into specific user journeys by connecting logs to the user … continue reading

Report: over 50% of organizations prioritize security over user experience

Broadcom Software, provider of wireless LAN infrastructure solutions, today released the results of its survey on avoiding tradeoffs between security and user experience. The findings of the survey revealed that over half of organizations value security above the experience of end-users, often at the expense of productivity and customer satisfaction.  The struggle that organizations face … continue reading

Report: 75% of organizations say conducting regular access reviews strengthens their cybersecurity posture

A majority of companies agree on the importance of conducting regular reviews of who has access to their systems, but many of these companies are still doing these reviews manually.  The cybersecurity vendor, Netwrix, has released the results of its recent survey that looked at 590 IT professionals’ treatment of user access permissions. The report … continue reading

ITOps Times Open-Source Project of the Week: kube-monkey

Kube-monkey is an implementation of Netflix’s Chaos Monkey specifically for Kubernetes clusters. It works by randomly removing Kubernetes (k8s) pods in the cluster, encouraging and validating the development of failure-resilient services. According to GitHub, kube-monkey runs at a pre-configured hour on weekdays and creates a schedule of deployments that will experience a pod death at … continue reading

Microsoft introduces new cost management updates

Microsoft recently announced several updates that have been made regarding cloud cost management. These updates are intended to bring users visibility into what they are spending and where they are spending it so there are no surprises when it comes to the bill. The first of these updates is the ability to view costs in … continue reading

Next Page »

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!