Operations | Monitoring | ITSM | DevOps | Cloud

August 2024

MegaPod | Guilherme Soubihe, CEO of Latitude.sh

In this conversation, Michael Reid, CEO of Megaport, interviews Gui Soubihe, CEO and founder of Latitude, a company that offers Bare Metal and GPU as a Service. They discuss the growth of AI and the demand for GPU resources, as well as the challenges and opportunities in the industry. Gui shares how Latitude provides a full stack solution, combining software and infrastructure to offer a seamless user experience. They also talk about the benefits of using Megaport's connectivity services to access Latitude's GPU platform.

100G VXC Expansion: Now Available From 597 Data Centers Worldwide

Our 100G connectivity is now one of the most widely available in the NaaS market with new locations across America, Asia Pacific, and Europe. Due to a combination of technological advancements and the forced innovation brought on by COVID-19, businesses are now processing more data than ever. Analytics engines and big compute are being introduced and leveraged across diverse infrastructures. Generative AI is being incorporated wherever businesses can fit it, taking processing capacities to their limits.

Top 10 How-To Guides To Improve Your Network

Tech providers often provide valuable resources to help you optimize your network. Here are ten of our recent favorites. Cloud, network, data center, and managed service providers often go beyond just offering their services. Explore any of your providers’ websites, and you’ll often find an abundance of resources with actionable guidance that can help improve and maintain an efficient enterprise network.

Comparing Encryption in Transit Options

Weigh up three popular ways to protect your data in transit—host level encryption (TLS/SSH), MACsec, and IPsec—to fortify your network security. Encryption in transit refers to protecting data while it moves from one place to another, in contrast to “encryption at rest” which is used to protect data where it is stored. In this blog we’ll look at a few common options for encryption in transit, and the pros and cons of each from a network perspective.