article thumbnail

The CIO’s Triple Play: Cyber Resilience, Performance, and AIOps/DevOps

CIO Business Intelligence

This article explores three examples of how listening to the concerns, and changing the requirements and needs of CIOs, has resulted in viable technological solutions that are now widely in demand. A new product must help address or eliminate one or more pain points. Otherwise, what is its value? 1 concern of CEOs.

Devops 119
article thumbnail

Technology Short Take 177

Scott Lowe

The year seems to be flying by—much in the same way that all these technical articles keep flying by my Inbox, occasionally getting caught and included here! More details are available in this Zero Day article. A colleague shared this article on CPU limits and throttling in Kubernetes. Wow, is it the middle of May already?

Linux 90
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 162

Scott Lowe

This article provides a few practical examples of how using VPC Endpoints to reduce network traffic moving through NAT Gateways can help save money. Rory McCune has a series of articles on PCI compliance in containerized and Kubernetes environments. food references in the title of this article are almost too much.

Devops 87
article thumbnail

One of the Best Things You Can Do as a CIO

CIO Business Intelligence

This article aims to provide you with a practical framework to improve your enterprise data protection. Before you make storage and protection decisions, you must know which category each piece falls into – and the value level it either provides or could cost the business. That is the question. You should profile all of your data.

Backup 96
article thumbnail

OpenStack Summit 2013: Getting from Grizzly to Havana, a DevOps Upgrade Pattern

Scott Lowe

DevOps is crucial here in order to support these models, especially the continuous deployment and rolling upgrade models. This article was originally posted on blog.scottlowe.org. Visit the site for more information on virtualization, servers, storage, and other enterprise technologies.

Devops 108
article thumbnail

Technology Short Take 164

Scott Lowe

I’ve got another collection of links to articles on networking, security, cloud, programming, and career development—hopefully you find something useful! This article on using osquery for behavioral detection of macOS malware was an interesting read. Read this article and you will be enlightened.

article thumbnail

Technology Short Take 156

Scott Lowe

I’d never heard of Pipy before seeing it in this article , but it look like it could be quite useful for a number of use cases. Rob Salmond has a good article on Prometheus service discovery, Istio, and mTLS. Read Dan Moren’s article for details. Hopefully something I share here will prove useful to someone.

Vmware 74