There are no blog posts with such text: " g/ "

-

The disruption cloud is causing in IT is a lot like the coming of sound to silent films.


-

OpenStack, Security, NFV and VNFs, and the Internet of Things: it’s all linked together.


-

Everyone thinks that the hard part is deploying OpenStack, but really, with the right distribution it’s easy. Once you’ve done that, how do you actually get something useful out of it?


-

At the OpenStack summit last month in Austin, Mirantis’ Craig Peters and the OpenStack Foundation’s David Flanders got together to discuss application development on OpenStack with Superuser.TV.


-

The $130B+ datacenter market is simply too large to jump onto one single bandwagon. Here are 10 reasons why you need to at least consider private cloud as part of your strategy.


-

The NetApp Mirantis Unlocked Reference Architecture for the Liberty-based Mirantis OpenStack 8.0 with NetApp’s leading enterprise storage platforms, clustered Data ONTAP and E-Series.


-

With every new software architecture, there typically emerges a new hardware architecture. There is a chicken and egg element here: did new hardware designs enable a new software model or vice versa?


-

This week EMC made two new announcements, both focused on helping customers more easily bridge the so-called “OpenStack skills gap” holding back adoption.


-

OpenStack:Unlocked Podcast hosts Nick Chase and John Jainschigg interview Iron.io’s Director of Business Development, Ivan Dwyer about serverless computing.


-

In a December 2015 post, I introduced the concepts and base building blocks underpinning the Logging, Monitoring and Alerting (LMA) Toolchain of Mirantis OpenStack, now officially called StackLight.


-

There are three ways to use the OpenStack APIs: straight REST, the SDKs, and the CLI.


-

The first Global OpenStack Bug Smash was organized to improve the Mitaka release by identifying and addressing open issues across component projects.


-

How AT&T is planning even more deployments in 2016 as it virtualizes its infrastructure based on OpenStack.


-

The main problem with targeted attacks is that they can be difficult (if not impossible) to detect using a standard set of security solutions such as network and host Intrusion Detection/Prevention Systems because these systems rely on well known attack signatures, which requires a greater number of known infections than we typically see with these particular attacks. What’s more, targeted attacks can stay undetected for long periods while an attacker is building and maintain an espionage network. That is why they are called Advanced Persistent Threats.


-

Like most OpenStack Summits, the Austin event opened today with a host of big-name keynote speakers. Unlike previous years, however, the talk was much less about the technology, and more about the world it inhabits and the people who affect it — and are affected by it.