On-call is broken. It’s not a little broken. It’s really broken. We all take the current on-call experience for granted. It’s the way it’s always been. Most of us never stop and think about how expensive, manual, and error-prone on-call really is. That is, until a major outage sets your company back and damages trust … continue reading
Given the increase in remote work and shadow IT usage, perhaps it shouldn’t be surprising that the cloud access security broker (CASB) market is exploding. Valued at $8.74 billion in 2020, the CASB market is projected to reach $32.9 billion by 2028—a projected compound annual growth rate of roughly 18% from 2021 to 2028. What … continue reading
Flagger is an open source automation tool for progressive delivery on Kubernetes. According to the project’s GitHub page, Flagger helps to reduce the risks associated with introducing new software versions in production. It shifts traffic to the latest version of an application gradually and measures metrics and runs conformance tests as it does this. It … continue reading
IT infrastructure provider Kyndryl announced an expansion of its global alliance with Dell Technologies that focuses on helping customers use data optimization, infrastructure management services, and a cyber resilience solution to protect their critical business assets. Kyndryl provides Cyber Incident Recovery with Dell Technologies to accelerate cyber resilience for customers using Dell’s high-performance storage, servers, … continue reading
Kubernetes 1.24 is expected to be released in a few weeks, on May 3rd, and cloud-native security company Sysdig shared information about what to expect in the latest release. According to Sysdig, one main difference in this release is the removal of Dockershim, which the company sees as a “necessary step to ensure the future … continue reading
In order to take advantage of new opportunities in the market, managed service providers (MSPs) are going to need to embrace new complex technologies. This is according to OpsRamp’s 2022 State of the Market for MSPs in IT Operations, which includes responses from 211 MSP decision makers. According to the report, there is more opportunity … continue reading
Cloudprober is a monitoring software that makes it easy to monitor the availability and performance of various components of one’s system. “Cloudprober’s main task is to run probes. A probe executes something, usually against a set of targets, to verify that the systems are working as expected from consumers’ point of view. For example, an … continue reading
During the past 25 years, the open-source movement has changed just about everything in technology. By transforming how software is developed, deployed and licensed, open source now powers most of the cloud-based apps and digital services we rely on in daily life. And now it is coming for one of the last proprietary holdouts: a … continue reading
Google Cloud and other database providers in the tech industry announced that they are forming a new initiative to ensure that companies have more seamless insights and access into the data they need for digital transformation. “The proliferation of data, along with the many software and cloud-based applications used to analyze and manage it, means … continue reading
AIOps company Moogsoft has updated its portfolio with new enhancements to its integration capabilities, user experience, and its ability to deliver actionable insights. The company now offers an Insights dashboard that provides a high-level view of incident management. It gathers information from historical data as well as business services trends. Moogsoft also built upon its … continue reading
The newly released Citrix Secure Private Access is a cloud-delivered, zero-trust network access offering that allows companies to provide employees access to apps and data that they need, from a variety of device types. “The IT pendulum has been swinging toward flexible work models for years, and the pandemic has accelerated the velocity,” said John … continue reading
Red Hat Enterprise Linux 8.2 has achieved a new certification that will make it a more appealing option for companies that are managing critical workloads in classified and sensitive deployments. It has earned a new Common Criteria Certification, which is a certification that assures that a product meets security criteria for a specific environment. According … continue reading
An average employee of a small business with less than 100 employees will receive 350% more social engineering attacks than an employee of a larger enterprise. The most commonly impersonated brand is Microsoft, used by cybercriminals in 57% of phishing attacks – the most prevalent social engineering attack of 2021. These findings are from the … continue reading
Vcluster allows users to create fully functional virtual Kubernetes clusters that each run inside a namespace of the underlying Kubernetes cluster. Virtual clusters have their own API server, making them both more powerful and better isolated. Additionally, Vcluster offers a more cost effective alternative to creating separate “real” Kubernetes clusters. After getting started with Vcluster, … continue reading