Archives


VMware Advises Horizon Users to Patch for Log4j Vulnerabilities

VMware issued an "IMPORTANT" message to users of its Horizon virtual desktop offering, warning them to patch for critical Log4j vulnerabilities.

Blue Sky with Clouds Graphic

Creating AWS IAM Policies the Easy Way

It can be intimidating, but you don't need to use the IAM Management Console.

What Cloud-Native Skills Are Most in Demand in 2022?

A new survey-based report from Platform9 on cloud-native enterprise trends in 2022 reveals the top talent that will be in demand in the new year.

Microsoft Warns AKS Kubernetes Users of Docker Runtime Deprecation

Microsoft warned users of its Azure Kubernetes Service (AKS) of the upcoming deprecation of the Docker runtime in the popular Kubernetes ecosystem.

Zero Trust Study Shows Gaps Remain

Despite the Zero Trust security model being heralded as integral to the future of network security, a new study revealed many gaps in enterprise implementations.

Testing AWS Network Communications with the VPC Reachability Analyzer

The VPC Reachability Analyzer looks at the configuration of all the resources in your virtual private clouds and uses automated reasoning to determine what network flows are feasible.

Azure Virtual Desktop Now Supports Trusted Launch Virtual Machines

Microsoft's cloud-based virtual desktop infrastructure (VDI) offering, Azure Virtual Desktop, now supports Trust Launch virtual machines (VMs).

Research Firm Provides Tips for Predicted Security Platform Consolidation

Research firm Gartner predicts a consolidation of security platforms as enterprise security and risk management (SRM) teams face a confluence of factors that make their jobs harder.

Increasing Storage on a Windows EC2 Instance in AWS Cloud

What to do if you create an EC2 instance on the AWS cloud only to find that you later outgrow it and need more storage.

Death Knell for the VPN?

Industry analysts, pundits and IT pros are sounding a death knell for virtual private networks (VPNs) in the enterprise -- or at least an obsolete knell.

Report Details Huge Growth in Cloud-Native Tech, Led by Kubernetes

For the third time, the Cloud Native Computing Foundation (CNCF) has published a "State of Cloud Native Development Report" developed by research firm SlashData, showing huge growth in cloud-native tech.

Modifying an EC2 Instance Type in AWS Cloud

The easiest way to adapt to evolving workload demands in EC2 is to change the instance type.

Survey Shows Zero Trust Confusion

"Zero Trust is a main security priority for most organizations, but comprehensive understanding and adoption of the Forrester-founded framework remains inconsistent," One Identity says.

Hands on with VMware Horizon Version 2111 (aka 8.4), Part 2: Usage

After previously showing how to install the new offering, Tom puts it through its paces and shares his thoughts.

Survey Indicates 'Hybrid Cloud Is the Future,' NetApp Says

NetApp says a small survey of organizations using its software indicates hybrid cloud is the future of enterprise IT.

Hands on with VMware Horizon Version 2111 (aka 8.4), Part 1: Installation

After previously providing an overview of the new features included with Horizon 2111, released last month, Tom takes a deeper dive.

Upgrading Windows Server 2012 EC2 Instances, Part 3: Finishing Up

After initial planning and then doing an in-place upgrade of the Windows Server OS as it relates to AWS EC2, Brien finishes the upgrade to Windows Server 2019.

AWS Outage Stirs Cloud-Tech Backlash

As "Big Tech" comes under increasing scrutiny by lawmakers, yesterday's AWS outage sparked a backlash about the dangers of cloud computing.

Upgrading Windows Server 2012 EC2 Instances, Part 2: In-Place Upgrade

After earlier detailing needed planning, Brien goes to the next step: an in-place upgrade of the Windows Server OS as it relates to AWS EC2.

2022 Salary Guide: Network/Cloud Architect Ranks High

One of the non-executive IT positions paying off the most in 2022 will be network/cloud architect, indicates a new salary guide that also highly ranks cybersecurity and data privacy positions in the age of ransomware and other attacks.

Subscribe on YouTube