What Incident Management teaches us about the pandemic

In early 2020, before we realized that the pandemic was surging under our noses and that we were mere months away from global lockdowns, I was sitting in a bar off of Brannan Street in San Francisco talking about building my new company, Kintaba, around modern incident management. At the time, this seemed to be … continue reading

ITOps Times news digest: Red Hat Runtimes, Intel and Cybereason partnership, and Red Kubes open sources Otomi

Red Hat has added new features to Red Hat Runtimes, which is a set of tools for building and maintaining cloud-native applications.  New features include expanded support for Quarkus, JBoss EAP XP 2.0, support for IBM Power Systems, a developer preview of OpenShift Serverless Functions, and more.  In addition, this version brings support for Spring … continue reading

Red Hat to acquire Kubernetes and container security company StackRox

Red Hat has entered into an agreement to acquire StackRox for its container and Kubernetes-native security capabilities. According to Red Hat, bringing StackRox to its container application platform OpenShift will help users build, deploy and securely run apps across the hybrid cloud from a single platform.  In addition, Red Hat plans to use StackRox to … continue reading

Martin Schroeter

Martin Schroeter to lead IBM’s managed infrastructure company NewCo

A few months after announcing its decision to spin off a new managed infrastructure company, IBM has revealed the new CEO for that company. IBM’s NewCo will be headed by Martin Schroeter, as of January 15th. Previously, Schroeter served as IBM’s senior vice president of global markets, where he oversaw global sales, client relationships and … continue reading

4 ways to optimize your network security posture for the remote workplace

The new reality of remote working is driving businesses to re-examine their network security posture. Let’s face it: these networks were originally architected to support a dramatically different work environment. IT now must secure the network by bringing into the fold a myriad of remote, mobile and digital workspace devices, some of which were previously … continue reading

ITOps Times Open-Source Project of the Week: CloudStack

Apache CloudStack is an open-source, Java-based software project for deploying and managing large networks of virtual machines (VMs). It makes VMs highly available, scalable Infrastructure as a Service cloud computing platforms. It is currently hosted by the Apache Software Foundation as a top-level project, and used to offer public cloud services, provide an on-premises private … continue reading

ITOps Times news digest: BackupAssist partners with Wasabi, Incident Xpress now available, and SentinelOne’s SUNBURST identification tool

BackupAssist has announced it is partnering with storage company Wasabi. This will provide a cheaper and faster solution for customers of both companies, BackupAssist explained.  According to BackupAssist, Wasabi offers storage at a fifth of the cost of Amazon S3 and is faster than many competitors. It provides customers currently using a private cloud with … continue reading

ITOps Times news digest: Dell’s new offerings, Blue Prism and Azure, and IBM survey on IT preparedness

Dell Technologies has announced a number of new products and applications designed to help reimagine the way people work.  New products include the Latitude 9420 PC, Dell 34 Curved Video Conferencing Monitors, Dell UltraSharp 40 Curved WUHD Monitor, Latitude 5000 series, Precision 3560, and more.  In addition, the company has released updates to its Dell … continue reading

ITOps Times Open-Source Project of the Week: Podman

Podman is a tool for managing OCI containers and pods that are made from groups of containers. It provides APIs for managing containers, pods, container images, and more.  Podman’s GitHub documentation states that the project is based on libpod, a library for container lifecycle management that is also contained in this repository.  The latest 2.2.1 … continue reading

How 5G, self-driving cars and drug discovery breeds new tech

In today’s environment, both within the tech industry and outside, the topic of data growth is a popular one. But the reality is that data isn’t just growing. It’s exploding. In 2010, 1.2 zettabytes of brand new data were created. That’s more than had been created in all of previous human history. This year, humanity … continue reading

IT operations predictions for 2021

While it’s unlikely many people could have predicted how IT operations would transform in 2020, many thought leaders are looking forward to how the “new normal” will impact IT trends in 2021 and beyond. Many predictions for 2021 build off of the massive digital transformation that companies have already undergone this year. Here are a … continue reading

ITOps Times news digest: SolarWinds fix, White Ops acquisition, and Service Workbench on AWS

SolarWinds has released an update related to the SuperNova malware, which is believed to have been used in a recent cyberattack on the United States government. There is a patch for all supported versions of the Orion Platform and a fix for customers on unsupported versions as well.  It had initially released hotfixes for the … continue reading

ITOps Times Open-Source Project of the Week: Crossplane

Crossplane is an open-source Kubernetes add-on that is currently hosted at the Cloud Native Computing Foundation as a sandbox project. It is designed to extend clusters with the ability to provision, manage cloud infrastructure, services and apps.  “We built Crossplane to help organizations build their clouds like the cloud vendors build theirs—with a control plane. … continue reading

Qualys identifies 7 million vulnerabilities associated with SolarWinds and FireEye breach

The cloud-based security and compliance company Qualys stated that it identified 7.54 million vulnerabilities related related to FireEye Red Team assessment tools and compromised versions of SolarWinds Orion. Most of these vulnerabilities, 5.29 million, were related to the FireEye Red Team tools. Additionally, the vast majority of the vulnerabilities at 99.84% were from eight vulnerabilities in Microsoft … continue reading

« Previous PageNext Page »
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!