ValidKube combines open-source tools to help ensure Kubernetes YAML best practices, hygiene and security. The tool can verify your Kubernetes configuration files through kubeval, remove clutter from your Kubernetes manifests through kubectl-neat, and can scan YAML code for security vulnerabilities with trivy. RELATED CONTENT: Abstracting complexity from Kubernetes breaks down barrier to entry Kubeval uses … continue reading
BMC announced new capabilities and integrations across its BMC AMI (Automated Mainframe Intelligence) and BMC Compuware portfolios that will help users improve service quality and accelerate software delivery. The company is aiming to enhance service quality with better data. The BMC Helix Discovery solution now automatically maps and visualizes service dependencies across mainframe and distributed … continue reading
Shotover Proxy is an open source, high performance L7 data-layer proxy for controlling, managing and modifying the flow of database requests in transit. It can be used to solve many different operational and interoperability challenges for teams where polyglot persistence (many different databases) is common. Shotover can be deployed in many different ways including as … continue reading
Connected workflow company Transposit announced Activities, which is a new feature that applies automation to ITSM processes. It provides a single source of truth across issues, incidents, and requests. Every action taken by both human and machine throughout any activity within the Transposit Timeline is captured through auto-tickets. Data and actionability are brought neatly together to … continue reading
The general availability of Amazon EC2 R6i instances are designed for memory-intensive workloads. Like M6i and C6i instances, these new R6i instances are built on the AWS Nitro System, building blocks that can offload a lot of the traditional virtualization functions to dedicated, delivering high performance, high availability, and highly secure cloud instances. The new … continue reading
ManageEngine announced the addition of data loss prevention for endpoints, anti-ransomware and endpoint compliance capabilities to its unified endpoint management (UEM) solution, Desktop Central. This follows a 500% spike in ransomware attacks since the move to remote work last year, according to a Bitdefender report. Also, ManageEngine’s 2021 Digital Readiness Survey found that 83% of … continue reading
Crowdstrike launched a free Humio Community Edition to bring the power of streaming log management to a wider range of users. The community edition allows users to ingest 16 GB of data per day and retain the data for up to seven days. Users will receive ongoing access to the data and the offering does … continue reading
Auth0 announced that it launched its Auth0 Identity Platform on Microsoft Azure to unlock a secure cloud deployment option for organizations seeking strategic fit with their technology stack. Auth0’s identity platform provides organizations with tools to support security, compliance, and data residency that apply to them. Organizations requiring data residency options can take advantage of … continue reading
TrueNAS is an open-source storage OS that gives users the power to build their own professional-grade storage system to use in a variety of data-intensive applications without any software costs. “IT professionals, photographers, designers, audio/video producers and editors, developers, and any user serious about storing and protecting lots of data can take advantage of TrueNAS … continue reading
The mean time to resolve (MTTR), the industry gold standard for success and efficiency, proves to be an inaccurate metric for success. The 2021 VOID report by chaos engineering company Verica set to come to conclusions about how to tackle software-based failures, but do to the distribution of data, the company found MTTR wasn’t a … continue reading
Lookout announced its new Zero Trust solution for any app that dynamically adapts based on data sensitivity and on a continuous risk assessment of endpoints and users. The solution is an expansion of Lookout Continuous Conditional Access (CCA), achieved by integrating the company’s Mobile Endpoint Security and Secure Access Service Edge (SASE) solutions. Organizations have … continue reading
Today’s AIOps and observability solutions are applying increasing levels of intelligence to IT Ops data with the goal of generating actionable insights. However, sophisticated AI and ML can sometimes be no match for ‘bad data.’ It’s the age-old problem of garbage in/garbage out. Data can’t simply be taken at face value because it can lead … continue reading