Topic: it

Report: The state of endpoint security and the cost of insecure endpoints

Organizations are finding it increasingly difficult to identify dark endpoints, which not only costs enterprises millions of dollars, but also puts companies at risks for threats and attacks. According to new research from Absolute, an endpoint security company, and the Ponemon Institute, organizations are wasting over $6 million in detection, response, and wasted time. While … continue reading

Atlassian unveils new DevOps Marketplace and the Atlassian Stack

Atlassian announced new ways for teams to break down siloes and accelerate their DevOps adoption. The company today announced new products — the Atlassian Stack and DevOps Marketplace — for customers looking to consolidate their solutions and add new solutions to complete their DevOps cycle. According to Cameron Deatsch, head of server and enterprise marketing … continue reading

cloud

The benefits of cloud computing, Rust 1.18, and intelligent tracking prevention in WebKit — SD Times news digest: June 9, 2017

The cloud is no longer an afterthought, it is a competitive advantage. According to a new Insight-sponsored report by Harvard Business Review Analytic Services, businesses are turning to the cloud for agility, data capabilities, customer and user experiences as well as cost savings. “A company’s IT environment should work for them by enabling them to … continue reading

IBM releases new open DBaaS toolkit on IBM Power Systems

IBM announced its new Database-as-a-Service (DBaaS) toolkit on IBM Power Systems, designed to deliver speed, control and efficiency to enterprise developers and IT teams. IBM’s latest solution is focused on making popular open-source databases like MongoDB, MySQL, PostgreSQL, and others available for developers and IT teams to easily provision. According to IBM global power growth … continue reading

Passwords

Researchers deliver new password solution, Progress Sitefinity 10, and Dell Technologies Capital — SD Times news digest: May 9, 2017

As an effort to help users create secure passwords, researchers from Carnegie Mellon University and the University of Chicago have developed a new solution that provides password advice. The new password meter not only tells users in real time whether or not their password is good, but it offers feedback and advice on how the … continue reading

Guest View: Don’t shoot the messenger — Post-mortems in software

When something goes wrong and there is a major production incident in IT, the business usually suffers.  Developing, delivering, and managing software systems and applications is complicated. People make mistakes, wrong commands get entered, bugs get introduced, and systems fail.  When something like this happens, a cascade of unintended consequences often follows. Once the dust … continue reading

MuleSoft Anypoint Exchange

MuleSoft announces Crowd, joins Open API Initiative to guide API specification development

MuleSoft today announced Crowd, a set of collaboration capabilities that allow teams to create, save and reuse APIs and other integration assets within the company’s application network platform, the Anypoint Platform. Along with this release, MuleSoft also announced it has joined the Open API Initiative under the Linux Foundation. According to the company, Crowd is … continue reading

PagerDuty highlights disconnect between customer expectations, IT operations challenges

Consumers have high expectations when it comes to digital experiences and applications, and this is proving to be a challenge for IT organizations ability to resolve customer-impacting incidents quickly, according to findings from PagerDuty’s State of Digital Operations report. The report, based on a two-part survey of more than 300 IT professionals in development and … continue reading

Red Hat Mobile releases new application assessment tool

Deciding to create a mobile application is more difficult than it sounds. Red Hat Mobile today is releasing a new Mobile App Assessment Tool to give businesses an overview of the complexities and resource requirements involved in a mobile application strategy. According to Clare Grant, general manager of Red Hat Mobile, the purpose of the … continue reading

HPE launches containerized versions of its IT operations suites

HPE is embracing the benefits of container technology with the launch of containerized versions for its HPE IT Operations Management (ITOM) suites. The suites are based on container deployment foundations that are built to natively handle container clusters at scale. Container adoption and the container ecosystem have been growing exponentially on the application development side, … continue reading

chess pieces

Guest View: 3 things to ensure your team gets DevOps right

It’s now old news to most people that the rate of change in the lifecycle of a business has accelerated dramatically over the past two decades. Ideas are born, concepts are funded, markets are created, ambitions are expanded, and business models are disrupted and abandoned at a rapid pace. This is equal parts exciting and … continue reading

Report: Organizations embracing DevSecOps automation

The DevOps community is struggling with bringing security into the organization and across the software development life cycle (SDLC). However, new research from Sonatype reveals that while companies continue to face breaches, mature development organizations finally realize how critical it is to weave automated security early in the SDLC. Sonatype, a software automation and security … continue reading

1 3 4 5 6 7 11
DMCA.com Protection Status