Cloud Computing


Making Automatic Adjustments to Your AWS Budget

Brien shows how budgets can be adjusted automatically based on your recent usage trends, helping to avoid sticker shock.

Once a Security Problem, Open Source Now a Solution, Report Says

Red Hat was surprised by this finding from its new report on open source software in the enterprise: It's now seen as a benefit, when it was a big security problem not that long ago.

Using Amazon's New Backup Capabilities for S3, Part 2: Backup Plan

Brien shows how to create a backup plan after previously creating an on-demand backup of an S3 bucket.

Using Amazon's New Backup Capabilities for S3, Part 1: On-Demand Backups

Amazon S3 storage buckets previously were conspicuously absent from the list of backup-supported services, but no longer, as Brien demonstrates.

No. 1 Cloud Computing Cost Saver: Resource Reservations

"The most important cost savings that you can do in the cloud is resource reservation," says Joey D'Antoni, principal consultant at Denny Cherry and Associates Consulting.

Take Five: Dynatrace Perform 2022

Tom Fenton gives his five takeaways from the recent Perform user conference held by Dynatrace, an application performance monitoring and autonomous cloud management specialist.

Data Protection Report: Most Orgs Suffered Ransomware Outage

A new data protection report from Veaam shows the tremendous impact of ransomware and other cybersecurity attacks currently plaguing the IT industry.

Azure Spring Cloud Enterprise Preview Now Open to All

The joint VMware/Microsoft Java enterprise offering, Azure Spring Cloud Enterprise, is now open to all in a public preview after a five-month private preview.

VMware Details Malware Threats in Linux Multi-Cloud Implementations

While Windows is generally seen as the most malware-vulnerable OS, cloud computing is mostly done on Linux, so VMware has published a threat report about malware in Linux-based multi-cloud environments.

Hit by Cyberattack? Don't Be Afraid to Ask for Help

When you've been hit, insurance companies won't be eager to help. ISPs usually are, though.

Party Lights Graphic

Microsoft Poll: 95% See Hybrid/Multi-Cloud Already 'Critical to Success'

Microsoft sponsored a survey of IT pros and decision-makers to reaffirm the industry consensus about the importance of multi-cloud and hybrid cloud enterprise implementations.

Google Cloud Compares Blockchain to Open Source/Internet, Forms New Team

Google Cloud announced the formation of a new Digital Assets Team for blockchain technology, whose rise it compared to that of open source and the internet.

Despite 'Perceived Risk,' Edge Deployments Mature: AT&T Report

AT&T published a report on Securing the Edge, finding that despite perceived risks, enterprise edge deployments have momentum and are at a surprisingly high level of maturity.

Automatically Rotating Amazon Key Management Service Keys

Brien Posey explains a couple limitations that you need to be aware of.

Epic DDoS Fail: Azure Cloud Fends Off 'Largest Attack Ever Reported in History'

"In November, Microsoft mitigated a DDoS attack with a throughput of 3.47 Tbps and a packet rate of 340 million packets per second (pps), targeting an Azure customer in Asia. We believe this to be the largest attack ever reported in history," Microsoft reported last week.

Finding an Object's Amazon Resource Name

The thing that makes using an ARN so tricky is that even though every AWS object has an ARN, Amazon may not tell you what that ARN is.

Blue Sky with Clouds Graphic

Creating AWS IAM Policies the Easy Way

It can be intimidating, but you don't need to use the IAM Management Console.

What Cloud-Native Skills Are Most in Demand in 2022?

A new survey-based report from Platform9 on cloud-native enterprise trends in 2022 reveals the top talent that will be in demand in the new year.

Microsoft Warns AKS Kubernetes Users of Docker Runtime Deprecation

Microsoft warned users of its Azure Kubernetes Service (AKS) of the upcoming deprecation of the Docker runtime in the popular Kubernetes ecosystem.

Zero Trust Study Shows Gaps Remain

Despite the Zero Trust security model being heralded as integral to the future of network security, a new study revealed many gaps in enterprise implementations.