Report: Nearly half of all internet traffic is bots, a third is bad bots

The percentage of internet traffic that is bots continues to rise every year, and last year bots made up 49.6% of all internet traffic, which was a 2% increase from 2022.  This is according to Imperva’s 2024 Bad Bot Report, which analyzed bot traffic across the internet. They found that the proportion of bots out … continue reading

OSSummit: Linux Foundation launches edge interoperability initiative

The Linux Foundation this week announced the launch of Margo, an open standard initiative for interoperability  of edge industrial automation ecosystems. According to the foundation’s announcement, Margo “promises to bring much needed flexibility, simplicity, and scalability – unlocking barriers to innovation in complex, multi-vendor environments and accelerating digital transformation for organizations of all sizes.” The … continue reading

Bitdefender offers two tiers of managed detection and response services

Cybersecurity services provider Bitdefender today announced it is offering two tiers of managed detection and response services — MDR and MDR Plus. Bitdefender MDR services, which are managed using the company’s GravityZone Platform, provide continuous threat monitoring, detection and response, threat hunting, analyst-led recommendations, and security consulting, according to the company. In the announcement, the … continue reading

BMC to acquire network observability provider Netreo

BMC this morning announced it plans to acquire Netreo, a network and application observability solution provider, to enhance the capabilities of its Helix observability platform. Terms of the deal were not disclosed. According to the company’s announcement, Netreo’s Open Telemetry-based solution provides application and network performance monitoring and IT infrastructure management, which gives organizations deep … continue reading

Arm announces new NPU and IoT Reference Design Platform

Arm has announced a new neural processing unit (NPU) and a new IoT Reference Design Platform. The company believes these new advancements will help support edge AI applications.  Arm Ethos-U85 improves performance by 4x compared to the previous version and also has 20% higher power efficiency. It also has 2048 MAC units, compared to the … continue reading

Unlocking growth: Strategies for IT organizations in the face of rising demands

IT organizations increasingly find themselves at the forefront of change in a transition from cost-saving entities to critical drivers of innovation and business growth. According to Gartner, IT spending is expected to surge by 6.8% in 2024, underscoring the pivotal role of IT in organizational advancement. Yet this growth is juxtaposed against a looming talent … continue reading

ITOps Times Open-Source Project of the Week: Copa

Copa, short for Copacetic, is an open-source project for vulnerability management. It can automatically apply the necessary patches to a container image based on the results of vulnerability scans.  This allows containers to be patched quickly without waiting on a full rebuild upstream, so that they can be redeployed as fast as possible.  The maintainers … continue reading

BackBox launches programmatic Network Configuration Management capabilities

The network automation company BackBox has added a set of automated Network Configuration Management (NCM) features to its Network Automation Platform.  By adding automation to NCM, tasks can be triggered by parts of the DevOps workflow, such as initiating a backup before an update is performed. This contrasts with traditional NCM which typically is just … continue reading

Vultr Sovereign Cloud and Private Cloud launches to help companies keep up with data sovereignty regulations

Vultr is attempting to make it easier for companies to manage data sovereignty with the launch of its new product, Vultr Sovereign Cloud and Private Cloud.  This new offering ensures that data remains within national borders and is adhering to local regulations.  According to the company, much of the existing cloud workloads out there are … continue reading

Unleashing innovation via Composable Cloud: Customizing AI tech stacks for inference at the edge

Edge operations dominate the CTO agenda today, and as artificial intelligence (AI) and machine learning grow increasingly important across business operations, the CIO, CAIO, CDO, and other leaders are joining the conversation, leaning into edge operations to deliver AI at scale. However, the traditional edge operations designed to support distributed web apps can’t handle the … continue reading

Tufin releases new tool for automating network access requests

The network policy automation company Tufin has announced a new AI assistant designed to make it easier for IT operations teams to get easy answers about the state of the network. TufinMate can be used by end users to ask if there is a current outage, cutting down the time help desk personnel need to … continue reading

Cloudflare acquires Baselime to bolster its serverless observability capabilities

Cloudflare has announced that it has acquired Baselime, which is a cloud-native observability platform for developers. The main benefit of the acquisition is to solve the challenges of performing observability on serverless applications.  “Two million developers building on Cloudflare trust us to help scale their apps globally, but can still struggle to understand the behavior … continue reading

ITOps Times Open-Source Project of the Week: Cloud Foundry BOSH

Cloud Foundry BOSH is an open-source solution for provisioning and deploying software to virtual machines (VMs).  It also includes capabilities for monitoring, failure recovery, and software updating.  The tool was initially designed to deploy to Cloud Foundry PaaS, but it can also be deployed to almost any other software as well, the maintainers claim.  It … continue reading

Lacework launches new capabilities for securing cloud environments

The security company Lacework has announced the addition of new capabilities to its platform to help IT and security teams more easily secure their cloud environments.  The first new addition is Lacework Explorer, which is designed to provide better visibility into potential threats. It provides a visualization of the relationships between cloud resources, which helps … continue reading

Next Page »
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!