News Category: Enterprise

Tech Heavyweights Create Open Source Project to Transfer Data

Google, Facebook, Twitter, and Microsoft launched a new open source project aimed at making it easier for users to transfer data between services without having to download it and upload it to another service. The use cases for this type of open source software are wide ranging. For example, an end...
Read 0 Comments

The Istio Service Mesh Hits Version 1.0

Istio, the service mesh for microservices from Google, IBM, Lyft, Red Hat and many other players in the open-source community, launched version 1.0 of its tools today. If you’re not into service meshes, that’s understandable. Few people are. But Istio is probably one of the most important new open-...
Read 0 Comments

ons-eu.jpg

Open Networking Summit
Register for Open Networking Summit Europe by August 4 to save $805.

Open Networking Summit Europe Schedule Announced! 3 Days Left to Save $805 | Register Now

Open Networking Summit, the premier open networking event in North America, comes to Europe for the first time this year, gathering enterprises, service providers, and cloud providers across the open networking ecosystem. Join 1000+ architects, developers, and thought leaders in Amsterdam,...
Read 0 Comments

Half Year in Review – Four Leading Virtualization Products

Nowadays, virtualization is becoming the top priority need for many organizations and they take special care of it while designing their IT infrastructures. The trend of using virtualization instead of hardware storage is just not an occasional practice rather it has become important because of the...
Read 0 Comments

ossummit-everyone.jpg

open source summit
Sign up for this interactive workshop that examines networking and cloud-native technologies side by side.

Join Interactive Workshop on Cloud-Native Network Functions at Open Source Summit

ONAP and Kubernetes – two of the fastest-growing Linux Foundation projects – are coming together in the next generation of telecom architecture.   ONAP provides a comprehensive platform for real-time, policy-driven orchestration and automation of physical and virtual network functions, and ...
Read 0 Comments

How to Use the gpg Command to Encrypt Linux Files

There are many reasons to encrypt files — even on a system that is well maintained and comparatively secure. The files may highly sensitive, contain personal information that you don't want to share with anyone, or be backed up to some variety of online storage where you'd prefer it be extra secure...
Read 0 Comments

An Interview with Heptio, the Kubernetes Pioneers

I recently spent some time chatting with Craig McLuckie, CEO of the leading Kubernetes solutions provider Heptio. Centered around both developers and system administrators, Heptio's products and services simplify and scale the Kubernetes ecosystem. Petros Koutoupis: For all our readers who have...
Read 0 Comments

NetSpectre Attack Could Enable Remote CPU Exploitation

Researchers from Graz University in Austria released new research on July 26 detailing how the Spectre CPU speculative execution vulnerability could be used over a remote network. In a 14-page report, the researchers dubbed their attack method NetSpectre, which can enable an attacker to read...
Read 0 Comments

Evaluating the Evaluation: A Benchmarking Checklist

A co-worker introduced me to Craig Hanson and Pat Crain's performance mantras, which neatly summarize much of what we do in performance analysis and tuning. They are: Performance mantras Don't do it Do it, but don't do it again Do it less Do it later Do it when they're not looking Do it...
Read 0 Comments

10+ Top Open-Source Tools for Docker Security

For container security, you'll find plenty of open-source tools that can help prevent another debacle like the one at Tesla, which suffered a Kubernetes cluster breach. But container security is still tricky, so you need to know which utilities to add to your arsenal. Sure, there are commercial...
Read 0 Comments

Pages

Click Here!