Emerging technologies are key to organizations that have seen their business priorities switch to "survival" amid the COVID-19 pandemic, says a new report.
VMware this week updated its cloud management tools that provide automation, operations and governance functionality, with a focus on hybrid cloud environments.
Another cloud crypto-mining exploit has been publicized, this one with the added ability to steal credentials stored on the Amazon Web Services cloud computing platform.
It has been well-noted that the COVID-19 pandemic has boosted cloud computing, and an analyst sees that trend continuing as the world recovers, predicting a permanent shift in the enterprise tech space.
Cloud providers often trumpet big customer wins, and Amazon Web Services didn't miss the opportunity to publicize a particularly timely one with the potential to be the biggest of all: Moderna, a biotech front-runner to produce the first vaccine for COVID-19.
VMware virtualization solutions continue to expand in the public cloud space, as Oracle announced a new VMware solution on its cloud platform, following other major providers including Amazon Web Services (AWS), Google Cloud Platform (GCP) and Microsoft Azure.
Over the past several years, user misconfigurations of cloud storage infrastructure settings have led to a spate of high-profile security vulnerabilities, and a new study shows the problem persists despite heightened visibility of the problem and copious remediation guidance.
Brien Posey cuts through the confusion associated with allocating IP addresses to EC2 instances on the Amazon cloud, which is done automatically though users can also associate elastic IP addresses with instances.
Microsoft has made generally available two new features of Windows Virtual Desktop: Azure portal integration for easier deployment and management, and audio/video redirection for Microsoft Teams to boost the meetings experience.
Although Amazon's AWS Route 53 can be used to enable run-of-the-mill, static DNS routing, it can also be used to bring some intelligence to the routing process. For example, Route 53 makes it easy to perform weighted routing, useful in situations where you need to distribute traffic unevenly.
Cybersecurity specialist CyberArk is publicizing the problem of "Shadow Admins" -- or hidden admin users -- on cloud platforms, introducing an open source tool to combat the problem.
Aside from third-party solutions, snapshots are the best option for backing up your EC2 virtual machines, says Brien Posey, who explains how managing the process is something of an art form.
Users of Google's BigQuery data warehouse will soon be able to conduct Big Data analytics on data stores housed in multiple public clouds.
With multi-cloud implementations becoming the enterprise norm, cybersecurity specialist Fortinet unveiled a new software-defined wide-area networking (SD-WAN) offering targeting those scenarios.
If you host a lot of services on AWS, it can sometimes be useful to let Amazon's Route 53 handle your DNS hosting rather than letting a domain registry service handle it, because sometimes it's just nice to be able to manage your DNS record from within the same environment that you use to manage your other AWS resources.
With remote work becoming the "<a href="https://virtualizationreview.com/articles/2020/05/13/permanent-remote-work.aspx" target="_blank">new normal</a>" amid the COVID-19 pandemic, a new report details the many benefits of the work-from-home model, including productivity and "avoiding office politics."
The Azure Machine Learning studio web experience is generally availabl, enabling data scientists and data engineers to complete their end-to-end machine learning lifecycle from prepping and visualizing data to training and deploying models in a single location.
U.K.-based security company Sophos released a report, "The State of Cloud Security 2020," suggesting that seven in 10 organizations have experienced public cloud security incidents in the last year.
- By Scott Bekker
- 07/09/2020
Even though datacenter networking is still a thing -- not yet obviated by cloud computing -- cloud tech is increasingly infiltrating on-premises networks, says a new research report.
The days of relying solely on a "blinky light firewall" to give you a sense of security are gone, and you need a cloud-based security solution for controlling your users' cloud access, such as Microsoft Cloud App Security. Paul Schnackenburg details what MCAS can do for your business, how it integrates with other security technologies and the different flavors it's available in.
- By Paul Schnackenburg
- 07/02/2020