After previously demonstrating how to deploy a serverless application to AWS Lambda, Brien Posey shows how to create a test event, run a test, and then remove the application.
Research firm IDC is out with a new report on virtual client computing (VCC), an industry it says has been changed by the rise of public clouds and the growth of organizational "digital workspaces."
VMware today marked "a new chapter" in its history with the introduction of a portfolio of application/infrastructure modernization offerings headed by the new vSphere 7 with Kubernetes support.
Tom Fenton reviews the ATEN CS1964 4-Port Triple Monitor DisplayPort USB KVM Switch and discovers the joy of switching between computers and displays without having to plug in different cables or a mouse and keyboard, regardless of the content to be displayed.
Kuebeflow, an open-source, cloud-native machine learning (ML) toolkit for the Kubernetes container-orchestration system, is out in version 1.0, its first major release.
- By John K. Waters
Amazon Web Services, a dominant cloud computing platform that tops many industry rankings, is also No. 1 when it comes to cloud artificial intelligence developer services, according to new research.
Brien Posey takes you through the steps for deploying serverless applications on the AWS cloud, explaining how users can choose from hundreds of preconfigured applications ready for use in the Serverless Application Repository, or publish their own private applications.
New research reveals an exploding market for software-defined wide-area networking (SD-WAN) that topped $1 billion in 2019, propelled by five leading vendors.
The major cloud computing platforms like to publicize their big customer wins, and Google Cloud stealing Major League Baseball business from Amazon Web Services could be considered a home run.
VMware's new Carbon Black cybersecurity report breaks things down into the most basic of concepts: the eternal cat-and-mouse struggle between "good" and "evil," providing constiutents of the former with advice to defend themselves from those in the latter camp.
Integration with virtual network functions (VNFs) hardware from Dell EMC highlights an update to the Pluribus UNUM management platform used with the company's Adaptive Cloud Fabric (ACF), which provides a controllerless approach to software-defined networking (SDN).
Multi-tier applications are typically composed of services that span several virtual machine instances. While there is nothing stopping you from creating these EC2 instances in the usual way, AWS gives you the option of using placement groups, which helps you to strategically locate EC2 instances in a way that is beneficial to your workloads.
Tom Fenton does a step-by-step review of the installation and use of NetropyVE 4, a software version of the well-regarded Netropy hardware appliance for WAN emulation and testing.
Tom Fenton demonstrates how to use SMART data on a Windows system to see if a storage drive has been previously used or not.
Cisco, Google, Microsoft and other industry heaveyweights led a chorus of recent announcements from security players large and small as the RSA Conference continues in San Francisco.
Paul Schnackenburg takes a look at just what a "modern desktop" means today in the Microsoft IT camp -- investigating different management approaches that just might improve the lives of you and your end users.
- By Paul Schnackenburg
The new Red Hat OpenStack Platform 16 for cloud computing includes a refined long-life support lifecycle and a commitment to continually infuse open source community innovations via stream releases.
It's good to be a technologist with cloud skills, and even better to have data-wrangling cloud skills.
Platforms for managing multicloud -- private/public cloud -- services and resources are emphasizing security and cost management functionality in a growing market, says research firm Gartner in a new Magic Quadrant report.
Cisco's huge new Annual Internet Report predicts great things for mobile 5G in the next few years but also warns of an increase in the size and frequency of distributed denial-of-service (DDoS) attacks.