Setting up a peering connection between VPCs in two different regions can help to simplify your disaster recovery efforts.
Tom examines different ways to store persistent data such as volume and bind mounts (or host volumes).
Research firm Gartner's "Magic Quadrant" series of reports on cloud database management systems has long seen a crowded "Leaders" field populated with the usual cast of cloud giants and wannabes, but this year AWS has slightly edged ahead of the pack.
Tom Fenton explains how networking works with containers.
"Fully 75 percent of respondents say that cloud computing represents the single greatest expansion of the enterprise attack surface in the last 20 years!"
After introducing the basics, Tom Fenton looks at the ephemeral nature of container instances and how to use networking and persistent storage with them.
A new survey-based Kubernetes backup and data protection report shows Kasten by Veeam was identified as a leader in the field, though many respondents couldn't name any organization as a leader.
Tom Fenton begins a series on how to install Docker containers on a Linux system while discussing images, performance hits and how to use network/storage with containers.
Tom Fenton looks at specs, design and build quality before discussing how well this low-priced device performs as a thin client, KVM server, Docker server and repository for edge device data.
From Microsoft's "sustainability cloud" to multiple Microsoft 365 emissions dashboards, there are plenty of tools available to businesses to start measuring -- and reducing -- their carbon footprints.
- By Paul Schnackenburg
Microsoft has been busy removing internet domains identified as being criminally used by bad actors, including those sponsored by nations.
The longstanding IT balance between usability and security was tipped in favor of the former during the pandemic-driven remote work wave in many organizations, new research indicates.
"The efforts to colonize enterprises are at odds with most enterprise prerogatives to 'be multicloud' with respect to sourcing strategies."
"Blockchain technologies have the opportunity to become a foundational technology on which our digital experience sits."
Generally, cybersecurity experts advise stricken enterprises to not pay off the ransom to get their IT systems and data back. Now, one country is considering making that advice actual law.
"If a company is to have a viable future, the network needs to be multicloud-enabled, ubiquitous, reliable, secure, and agile."
Some 15 years after becoming a thing, DevSecOps is lagging in the enterprise, primarily held back by organizational culture.
Tom goes to the Motor City and finds not all of the cool Kubernetes innovation is coming from major players.
Tom, who's a sucker for a good auto museum, finds an upbeat, engaged live crowd with plenty of interesting exhibits and attractions in the Motor City.
Amid cybersecurity threats like the current ransomware deluge, organizations are increasingly delegating cloud protection services like backup and disaster recovery to specialists, a new report indicates. What's more, despite a massive cloud migration, some workloads are reversing direction, moving from the cloud back to on-premises datacenters.