VMware published results of a U.S.-focused cybersecurity survey, finding that 89 percent of enterprise respondents have been targeted by COVID-19-related malware -- enabled by the work-from-home surge.
If you host a lot of services on AWS, it can sometimes be useful to let Amazon's Route 53 handle your DNS hosting rather than letting a domain registry service handle it, because sometimes it's just nice to be able to manage your DNS record from within the same environment that you use to manage your other AWS resources.
With remote work becoming the "<a href="https://virtualizationreview.com/articles/2020/05/13/permanent-remote-work.aspx" target="_blank">new normal</a>" amid the COVID-19 pandemic, a new report details the many benefits of the work-from-home model, including productivity and "avoiding office politics."
The Azure Machine Learning studio web experience is generally availabl, enabling data scientists and data engineers to complete their end-to-end machine learning lifecycle from prepping and visualizing data to training and deploying models in a single location.
U.K.-based security company Sophos released a report, "The State of Cloud Security 2020," suggesting that seven in 10 organizations have experienced public cloud security incidents in the last year.
- By Scott Bekker
Even though datacenter networking is still a thing -- not yet obviated by cloud computing -- cloud tech is increasingly infiltrating on-premises networks, says a new research report.
The general economy may be slow to recover as the COVID-19 pandemic subsides, but new research reports predict two sectors will be leading the bounce back: software-defined wide-area networking (SD-WAN) and Big Data Analytics, a primary use case for cloud computing.
Tom follows up on his previous article about installing FreeNAS and using it to create an NFS share to back a VM, now creating an iSCSI target on FreeNAS and using that target as backing for a vSphere VM.
The days of relying solely on a "blinky light firewall" to give you a sense of security are gone, and you need a cloud-based security solution for controlling your users' cloud access, such as Microsoft Cloud App Security. Paul Schnackenburg details what MCAS can do for your business, how it integrates with other security technologies and the different flavors it's available in.
- By Paul Schnackenburg
With VMware services already available on the AWS cloud and Microsoft Azure, the Google Cloud VMware Engine is now generally available in two U.S. regions, enabling users to migrate existing VMware-based applications to the GCP, no refactoring or rewriting required.
FreeNAS is one one of the most popular software-defined storage products available and in this article Tom Fenton shows you how he installed it on a virtual machine to provide an NFS Share.
With licensing requirements becoming more complex than ever before, it has become increasingly important to use automated tools such as AWS License Manager to track license usage. Brien Posey shows you how.
Amazon Web Services has created a new front in the cloud computing wars: low-code (or no-code) application development, announcing Honeycode to challenge existing offerings on Google Cloud and Microsoft Azure.
Citing the need for secure access to enterprise applications amid the work-from-home surge caused by the COVID-19 pandemic, VMware is augmenting its software-defined wide-area networking (SD-WAN) offering with a Zero Trust Service.
Colt Technology Services published results of a cloud computing survey that measures the impact of the COVID-19 pandemic on cloud migration projects, finding that most organizations are reporting delays, but aren't having communication problems.
Following up on a previous post that explained that Amazon logs AWS administrative activities and exposes those activities through CloudTrail, Brien Posey now examines two additional features that are worth looking at: Insights and Trails.
Tom walks through his experience trying to get a virtual machine to be able to use an integrated GPU, and then do the same thing with a Horizon desktop.
Hackers managed to exploit misconfigurations from lazy users to launch cryptocurrency mining campaigns leveraging powerful Kubernetes machine learning nodes in the Azure cloud, Microsoft said.
While you can enable logging through EC2 instance guest OSes and through various other tools and applications running in the AWS cloud, you can also enable centralized logging through CloudTrail, which is designed to show you the administrative actions that have been performed across the various AWS services.
Research firm IDG's new study on cloud computing reaffirms the cloud is the place to be for enterprises by documenting pervasive adoption trends, but it also shows both the upsides and downsides of some aspects, such as using multiple public clouds.