Operations | Monitoring | ITSM | DevOps | Cloud

Navigating the 5G Edge - Xhaul, Slicing and MEC

5G architectures are groundbreaking on several fronts.  Disaggregated RAN, virtualized core, edge cloud capabilities, and network slicing can all be combined to address an entirely new generation of use cases that create opportunities for disruptive operators to gain revenue and market share.      Most of these new technologies must be deployed very close to the customer network edge and require a nimble toolkit of fronthaul transport solutions, MEC solutions, and network slicing orchestration across all components.  This session will discuss these new ‘edge-related’ capabilities and how they can work together to maximize mobile operator differentiation.

Building a Go-to-Market Strategy for Developer Tools

As a YC alum and co-founder of Mattermost, I often get asked by early stage YC companies about what it’s like to build a commercial open source business. With the start-up’s permission, we’ve started recording some of the Q&A sessions, transcribing them and sharing the more popular questions on the Mattermost blog in short form articles.

Cloud 66 Feature Highlight: Application Update Lockdown

Application Update Lockdown allows you to control your deployments. Ask a team member or your client to sign-off your project before deploying to the production environment. By default, AUL is not active, and anyone with the proper permissions can deploy the application. However, you can change the default setting to one of the other two options: Approval from Anyone, or Approval from specific Team Member(s).

TeamTNT: Latest TTPs targeting Kubernetes (Q1-2021)

In April 2020, MalwareHunterTeam found a number of suspicious files in an open directory and posted about them in a series of tweets. Trend Micro later confirmed that these files were part of the first cryptojacking malware by TeamTNT, a cybercrime group that specializes in attacking the cloud—typically using a malicious Docker image—and has proven itself to be both resourceful and creative.

Integrating Logging into CI/CD

In my experience, pipeline monitoring and management is traditionally either left for the last developer who deployed, or unmonitored entirely. This lack of centralized monitoring and production-level resiliency can lead to significant development delays or even bring pipeline and train deliveries to a grinding halt. But we can do better.

SQL Server Problems? Try These Tips First

When SQL Server is having performance issues, giving you error messages, or just running slowly, you need to figure out the root cause of the problem before making any changes. Don’t jump to conclusions—make sure you get a big-picture view of the issue. Start with these five troubleshooting tips to optimize your SQL Server performance.

Scaling Software Supply Chains Securely

Software supply chains are mission-critical for digital businesses, and as global conditions accelerate the growth in contactless interactions and transactions, many organizations are reviewing how to solve the challenge of scaling the volume and velocity of their software development and release processes to meet the digital demand. The latest JFrog Platform release delivers a rich payload of new capabilities to scale and secure the software supply chain for digital businesses.

Back Again: The Mobile Endpoint Is Now the Policy Enforcement Point in the Everywhere Workplace!

Several years back before the COVID-19 pandemic hit and the work-from-home shift took hold, we wrote a blog about how the mobile-centric zero trust framework removed the traditional perimeter security controls to protect the corporate enterprise network and all connected endpoints from cybercriminals.