Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Get Cybersmart with JFrog This October

We live in a world of increasingly connected devices – phones, digital assistants, smart watches, cars, thermostats, refrigerators, windmills, and more. More than 50% of the world’s population is now online and two-thirds own a mobile device, according to the World Economic Forum. Additionally, the codebase of today’s applications typically consists mainly of open source components – exposing them to greater risk of hacking than ever before.

Introducing VMware Tanzu Community Edition: Simple, Turnkey Access to the Kubernetes and Cloud Native Ecosystem

Open source is the foundation on which Tanzu stands, and we take inspiration not only from the engineering community, but also from the end-user community that has taken an upstream-first approach to deploy cloud native technologies in production. As with many things Kubernetes-centric, it is still quite challenging to operationalize a pure, clean, open source–only, upstream-aligned platform for enterprise use. We are looking to change that with VMware Tanzu Community Edition.

VMware Tanzu Kubernetes Grid Now Supports GPUs Across Clouds

While AI workloads are becoming more pervasive, challenges with deploying AI have slowed adoption. Blockers like data complexity, data silos, and lack of infrastructure contribute to the difficulty of deploying AI workloads, and to address these issues, organizations need an integrated, scalable, and high-performing solution.

Network-As-A-Service And The Cloud

The almost wholesale shift of enterprise workloads into the public cloud have cemented the appeal of greater business flexibility and agility through on-demand consumption of services (X-as-a-Service) and pay-as-you-go pricing. But bridging the connectivity gap between the enterprise network and the cloud is a complex process and one where one size does not fit all.

Building a Long-Term, Comprehensive FinOps Journey: Spot by NetApp + CloudCheckr

It’s been over a year since Spot was acquired by NetApp, and since the acquisition we’ve been able to not only grow revenue significantly, but also accelerate our investments in the Spot product portfolio as a core pillar in NetApp’s cloud strategy. We’ve acquired companies, including Data Mechanics, to accelerate our investments in Kubernetes, Spark and big data.

HAProxy Kubernetes Ingress Controller Reaches 10 Million Community Downloads

It’s almost wild how two years have passed already since we first announced the HAProxy Ingress Controller for Kubernetes. Note that this project is different from the jcmoraisjr/haproxy-ingress HAProxy ingress controller project on GitHub. Our project is also an open-source project, but it is overseen by engineers at HAProxy Technologies, which has allowed us to streamline its release cycle.

SBC Interoperability: How Do I know if This Works with That?

Growing up, I was the youngest member of my family, so I was not very fond of the game “Keep Away” that my older brothers liked to play. The idea of the game (it has a few different names) is that two people toss a ball back and forth while the third person stands in the middle and tries to intercept it. Being the youngest, and therefore the smallest, it often seemed like a futile game that wasn’t much fun.

Ubuntu 20.04 Now Supported!

Announcing support for Ubuntu 20.04 on all Cloud 66 products (including registered servers). From this point onward, brand new applications will have Ubuntu 20.04 installed. We will continue to install Ubuntu 18.04 when scaling up servers in an existing application. Don't forget, you can control your target Ubuntu version through your manifest! It has been a while in the building and testing (and dependency pruning), but we are now very pleased to make it public.

The Vulnerability Conundrum: Improving the Disclosure Process

The vulnerability disclosure process involves reporting security flaws in software or hardware, and can be complex. Cooperation between the organization responsible for the software or hardware, and the security researcher who discovers the vulnerability can be complicated. In this blog we’ll look at the vulnerability disclosure process, the parties involved and how they can collaborate productively.

How Netflix, Lyft, Slack, And Other Top Tech Brands Manage Cloud Costs

Breakthroughs in engineering best practices often stem from a handful of top tech companies. Many of them share their behind-the-scenes stories at conferences, in blogs, and slide decks — or open source code. These companies invest millions of dollars and dedicated headcount in optimizing everything from uptime to engineering velocity — so why wouldn’t you look to them for inspiration?