What's Your IT Question?

Want to know more about this topic or about us? Contact us!

All posts in edge computing

Cilium Mesh: A new way to extend Kubernetes benefits across on-premises and cloud networking

Image: Ar_TH/Adobe Stock Networking has long been the holdout in enterprise aspirations toward high-performance, multicloud or hybrid architectures. While such architectures were once aspirational marketing buzzwords, they are today’s enterprise reality. Now, with the launch of Cilium Mesh, enterprises get “a new universal networking layer to connect workloads and machines . . . Read more

What Is IBM Hybrid Cloud Mesh?

Learn what the expanded cloud offerings mean for potentially smoothing out the line between DevOps and SecOps. Image: metamorworks/Adobe Stock IBM continues to expand its cloud offerings with Hybrid Cloud Mesh, a software-as-a-service platform meant to give DevOps and CloudOps teams more fine-grained control over application connectivity between clouds. It . . . Read more

Ubuntu Pro now available on Amazon Web Services

Image: IB Photography/Adobe Stock Canonical announced on Tuesday that Ubuntu Pro is available in a subscription-included model on Amazon Web Services. With Ubuntu Pro on AWS, users can launch Ubuntu Pro on-demand instances and purchase Ubuntu Pro compute savings plans directly from the Amazon Elastic Compute Cloud console. The new . . . Read more

Running WordPress on Azure for secure, fast and global content delivery

Learn about Microsoft’s WordPress on Azure App Service, as well as an interesting alternative from WP Engine. Image: Hugo Baeta Twenty years old this year, WordPress remains one of the most popular content management tools. Running a WordPress instance requires a web server and a database, an ideal combination for . . . Read more

Botnet Attackers Turn to Vulnerable IoT Devices

Cybercriminals are leveraging the multitudes of vulnerable connected devices with botnets that launch dangerous distributed denial-of-service (DDoS) attacks. The vast number of Internet-of-Things (IoT) devices are proving to be lucrative for botnet operators to carry out various attacks – from sending spam to launching harmful distributed denial-of-service (DDoS) attacks, according . . . Read more