Organizations are finding it increasingly difficult to identify dark endpoints, which not only costs enterprises millions of dollars, but also puts companies at risks for threats and attacks. According to new research from Absolute, an endpoint security company, and the Ponemon Institute, organizations are wasting over $6 million in detection, response, and wasted time. While … continue reading
Atlassian announced new ways for teams to break down siloes and accelerate their DevOps adoption. The company today announced new products — the Atlassian Stack and DevOps Marketplace — for customers looking to consolidate their solutions and add new solutions to complete their DevOps cycle. According to Cameron Deatsch, head of server and enterprise marketing … continue reading
The cloud is no longer an afterthought, it is a competitive advantage. According to a new Insight-sponsored report by Harvard Business Review Analytic Services, businesses are turning to the cloud for agility, data capabilities, customer and user experiences as well as cost savings. “A company’s IT environment should work for them by enabling them to … continue reading
IBM announced its new Database-as-a-Service (DBaaS) toolkit on IBM Power Systems, designed to deliver speed, control and efficiency to enterprise developers and IT teams. IBM’s latest solution is focused on making popular open-source databases like MongoDB, MySQL, PostgreSQL, and others available for developers and IT teams to easily provision. According to IBM global power growth … continue reading
As an effort to help users create secure passwords, researchers from Carnegie Mellon University and the University of Chicago have developed a new solution that provides password advice. The new password meter not only tells users in real time whether or not their password is good, but it offers feedback and advice on how the … continue reading
When something goes wrong and there is a major production incident in IT, the business usually suffers. Developing, delivering, and managing software systems and applications is complicated. People make mistakes, wrong commands get entered, bugs get introduced, and systems fail. When something like this happens, a cascade of unintended consequences often follows. Once the dust … continue reading
MuleSoft today announced Crowd, a set of collaboration capabilities that allow teams to create, save and reuse APIs and other integration assets within the company’s application network platform, the Anypoint Platform. Along with this release, MuleSoft also announced it has joined the Open API Initiative under the Linux Foundation. According to the company, Crowd is … continue reading
Consumers have high expectations when it comes to digital experiences and applications, and this is proving to be a challenge for IT organizations ability to resolve customer-impacting incidents quickly, according to findings from PagerDuty’s State of Digital Operations report. The report, based on a two-part survey of more than 300 IT professionals in development and … continue reading
Deciding to create a mobile application is more difficult than it sounds. Red Hat Mobile today is releasing a new Mobile App Assessment Tool to give businesses an overview of the complexities and resource requirements involved in a mobile application strategy. According to Clare Grant, general manager of Red Hat Mobile, the purpose of the … continue reading
HPE is embracing the benefits of container technology with the launch of containerized versions for its HPE IT Operations Management (ITOM) suites. The suites are based on container deployment foundations that are built to natively handle container clusters at scale. Container adoption and the container ecosystem have been growing exponentially on the application development side, … continue reading
It’s now old news to most people that the rate of change in the lifecycle of a business has accelerated dramatically over the past two decades. Ideas are born, concepts are funded, markets are created, ambitions are expanded, and business models are disrupted and abandoned at a rapid pace. This is equal parts exciting and … continue reading
The DevOps community is struggling with bringing security into the organization and across the software development life cycle (SDLC). However, new research from Sonatype reveals that while companies continue to face breaches, mature development organizations finally realize how critical it is to weave automated security early in the SDLC. Sonatype, a software automation and security … continue reading