Paul Schnackenburg takes a look at how Microsoft 365 Defender integrates several different security technologies into a single console.
- By Paul Schnackenburg
"In Q1, they demanded astronomical ransoms and refined their arsenal, including adding new ways to hide from security tools."
After earlier explaining how to use AWS Config to create rules that could determine whether or not a given resource is in compliance with your organizational mandates, Brien Posey now shows how to check to see if a resource is in compliance.
The new CodeFlare framework simplifies the integration and efficient scaling of Big Data and AI workflows onto the hybrid cloud in order to ease the manual drudgery of setup and configuration.
As organizations accumulate more and more AWS objects, Brien Posey explains, those objects can become increasingly difficult to manage at scale, so he provides help.
Canonical published a new cloud native tech report with a focus on Kubernetes, finding that the growing ecosystem has yet to achieve full enterprise adoption, with lack of in-house skills a primary challenge.
Resource recommendations for EC2 instances, auto scaling groups, Lambda functions and EBS volumes might improve your overall performance and save money.
Microsoft announced Azure VM Image Builder has reached general availability, providing a managed service that reduces the complexity of manually creating virtual machines images -- with associated workflows and pipelines -- for Windows and Linux.
The data warehouse architecture and the data lake design pattern have converged to form a new, richer data architecture, a new report says, and both have already gone mainstream in the cloud.
The COVID-19 pandemic may be lessening in the U.S., but its effects on enterprise cloud computing costs and security concerns may well linger for a while, new surveys suggest.
The years-long friction between the open source camp and cloud computing platforms still lingers, a recent report reveals.
Tom Fenton looks at using ControlUp to monitor a dHCI cluster and how HPE implements vVols on Nimble Storage.
Tom Fenton concludes his series by creating a script to gather metrics from devices and then creating a custom report from the information gathered.
VMware's new Kubernetes study shows the fast-growing open source project continues to thrive, though a lack of expertise is a big challenge for enterprise adoption.
Tom Fenton discuss disaggregated hyperconverged infrastructure (dHCI), an interesting emerging technology in the datacenter that can address limitations of HCI while still embracing its attractive features.
Tom Fenton looks at Edge DX, a new product from ControlUp that was designed to monitor and manage Windows, macOS, Linux and IGEL OS endpoint devices. He explains the information it gathers, how it displays logon and processes to help troubleshoot and diagnose issues that end users might be having.
Brien Posey completes his 3-part series, including an 18-hour server replication process.
Tom Fenton begins a 3-part series on this new offering, used for monitoring and managing physical devices.
Brien Posey details how to set up a replication settings template, replication agent and more.
Paul Schnackenburg takes an IT view of the developer conference, focusing on two main themes and several releases.
- By Paul Schnackenburg