Archives


AWS Open-Source Brouhaha About Elasticsearch Takes Another Turn

A twisty, years-long brouhaha centered around open-source licensing has taken another turn, with an Amazon Web Services (AWS) project based on Elasticsearch being turned over to a new group under the direction of the Linux Foundation.

Cohesity Data Protection Adds CrowdStrike Threat Intelligence

"Our latest collaboration with CrowdStrike allows customers to bring their own (BYO) cyber threat intelligence."

Feds Propose Reporting Requirements for AI, Cloud Providers

This proposed rule from the department's Bureau of Industry and Security aims to enhance national security by establishing reporting requirements for the development of advanced AI models and computing clusters.

VMware Explore 2024: Announcements and Final Recap

Veteran attendee Tom Fenton explains how the event showcased a clear vision for VMware's future, with AI, on-premises and edge computing emerging as focus points.

Best Practices for Managing AWS EC2 Security Groups

Security groups crucially keep VM instances secure, so cloud expert Brien Posey is sharing best practices for working with them.

VMware Explore 2024: Day 1

Tom braves concerns about Broadcom's acquisition of VMware to once again attend the big show and connect with vendors both big and small to check out all the new offerings, techniques, guidance and more.

We Have a Software Quality Problem

"I'm an MSP, providing IT services to a handful of small businesses, and the software supply chain brings a lot of risks to my clients."

AWS CEO and GitHub Agree on One Thing: AI Coding Is the Future

GitHub data released same day cloud giant CEO predicts a possible future where "most developers are not coding."

Spotlight on Nexthink Experience 24

Tom Fenton previews upcoming conference exploring the future of digital employee experience (DEX) and the role of technology in enhancing workplace productivity and end-user satisfaction.

Report Lists Principles/Best Practices for Securing AI Systems

"Continuous verification of identities and permissions, coupled with designing systems that limit the potential impact of issues, is crucial."

Azure OpenAI (GPT-4o) Chases Other Cloud AI Services with Federal Security Approval

Effectively, Azure OpenAI is catching up to AI offerings from the other cloud giants, AWS and Google Cloud.

DEX in the Workplace

Tom Fenton explains why Digital Employee Experience is important, the components that make up DEX, some of the key players in this field, and where it is headed.

Hands On with SearchGPT Prototype: Not My Default Engine Yet

I was hoping for an all-around new super-tool, but the temporary prototype for this impressive search tool is for functionality to be added to ChatGPT. When that happens, Goodbye Google.

Previewing First-Ever EUC World Conference

World of EUC (WEUC) is a new organization for End User Computing (EUC) professionals dedicated to "creating an inclusive and vendor-agnostic platform that advances collective expertise and enhances the power of knowledge in the world of end-user computing."

Accepted for Limited Beta: Hands On with Azure AI-Assisted GitHub Models

"We believe every developer can be an AI engineer with the right tools and training."

Getting Started with the IAM Access Analyzer

A new tool called the IAM Access Analyzer can help you to find IAM resources with unused permissions, IAM settings that allow for external access, and more.

Veeam, Rubrik Lead in Enterprise Backup/Recovery Market Report

In quickly changing market, Veeam leads the execution axis and Rubrik leads the vision axis.

Using AI for 'Offensive Security' by Simulating Attacks

Adversarial testing with red/black teams is nothing new in cybersecurity, but a new paper examines how advanced AI can help and provides recommendations for organizations to do just that.

KubeCon 2024: Visiting Utah

Former resident Tom Fenton shares some of the fun and exciting things he found there to try to convince you to spend a few days after or before the conference exploring attractions outside Salt Lake City.

CSA Top Cloud Threats Report Shows New No. 1

The top cybersecurity threat in the cloudscape has changed from a couple years ago says a new report from the Cloud Security Alliance (CSA), which provided handy mitigation strategies and suggested AI can help (or hurt).

Subscribe on YouTube