Following up on a previous post that explained that Amazon logs AWS administrative activities and exposes those activities through CloudTrail, Brien Posey now examines two additional features that are worth looking at: Insights and Trails.
Hackers managed to exploit misconfigurations from lazy users to launch cryptocurrency mining campaigns leveraging powerful Kubernetes machine learning nodes in the Azure cloud, Microsoft said.
Tom walks through his experience trying to get a virtual machine to be able to use an integrated GPU, and then do the same thing with a Horizon desktop.
While you can enable logging through EC2 instance guest OSes and through various other tools and applications running in the AWS cloud, you can also enable centralized logging through CloudTrail, which is designed to show you the administrative actions that have been performed across the various AWS services.
Dell Technologies unveiled two new additions to its VxRail systems for hyper-converged infrastructure (HCI), offering its first-ever ruggedized system and for the first time introducing AMD EPYC processors into the mix.
Research firm IDG's new study on cloud computing reaffirms the cloud is the place to be for enterprises by documenting pervasive adoption trends, but it also shows both the upsides and downsides of some aspects, such as using multiple public clouds.
Cisco Application Centric Infrastructure (Cisco ACI) 5.0 -- the networking giant's software-defined networking (SDN) offering -- has shipped with added functionality for multicloud deployments, 5G wireless and more.
Research firm Gartner has published a new Magic Quadrant report on the top professional and managed services providers who help organizations implement and operate solutions on big cloud computing platforms like Amazon Web Services, Microsoft Azure and Google Cloud.
Echoing other industry studies, a new report from database company MariaDB on the impact of the COVID-19 pandemic shows increased usage of cloud computing platforms and more organizations planning permanent work-from-hope options, possibly the "new normal," especially among tech companies.
VMware is leveraging technology gained from its acquisition of Bitfusion to allow for elastic infrastructure provision for artificial intelligence and machine learning applications, specifically the sharing of previously siloed graphics processing unit hardware acceleration computing power.
Paul Schnackenburg looks at some of the highlights in the Azure space, and how you can apply some of these new technologies and improvements to your cloud deployments.
- By Paul Schnackenburg
Microsoft Azure outpaced perennial cloud computing champion Amazon Web Services (AWS) as the top Internet of Things (IoT) platform in a new research report.
Red Hat has added Quarkus -- a A Kubernetes-native Java stack -- to its list of supported frameworks in its Runtimes collection for developing cloud-native applications.
Although many studies have confirmed the importance of public cloud initiatives in IT modernization efforts, a new report actually shows an increasing number of workloads being moved off of public clouds.
After previously explaining how to create immutable storage within Amazon S3, Brien Posey details some additional capabilities such as automated data lifecycle management or the ability to place a legal hold on certain data.
Tom Fenton, delighted to discover that Microsoft now includes an SSH server with Windows 10 that unfortunately is not enabled or configured by default, shows you how to do so.
VMware today announced the second-generation of its VMware on Dell EMC offering, optimizing the formerly edge-centric solution -- designed to provide a cloud experience on-premises -- for datacenter use cases.
Microsoft's Azure cloud is featured front-and-center at the company's Build developer conference being held this week, highlighted by the announcement of an Azure Arc enabled Kubernetes preview.
Brien Posey demonstrates Object Lock and other functionality for immutable storage on the AWS cloud, often used for compliance mandates and increasingly in conjunction with backup and recovery solutions since some types of ransomware are now designed to target backups.
With the OpenSSH client now installed by default on Windows 10, Tom Fenton explaines what SSH is and why it is so popular, how to use it, and what configurations can be done with it, before doing the same for Secure Copy (SCP).