Cybersecurity has become national security as parties both foreign and domestic increasingly try to hack into government information systems. It is no wonder then that U.S. federal requirements for information security have also become the gold standard for cybersecurity in financial services, telecommunications, healthcare and other regulated markets. In cloud computing, chief among these requirements … Continued
A single phishing email, missed patch or misconfiguration can wreak havoc or bring things to a screeching h...
Other content in this Stream
A single phishing email, missed patch or misconfiguration can wreak havoc or bring things to a screeching halt. Kubernetes platform providers manage security at the infrastructure, orchestration and c
Recently, Bryan Langston, Senior Solutions Engineer at Mirantis, presented at MediaOps’ virtual event Cloud Native Days, highlighting the latest cyber attacks and explaining best practices for...
There are two types of companies in the world: those that are afraid of becoming the next Colonial Pipeline poster child for security issues, and those that are at risk of doing just that.
Join Mirantis’ John Allwright, with special guests Mayank Kapoor of Reliance Jio and Jay Lyman of 451 Research, for a virtual roundtable where we will discuss these questions as well as: - The current
The latest release of Mirantis OpenStack for K8s builds upon our solid IaaS foundation to enable new advanced features for use case-specific deployment profiles. Specifically, we have introduced a...
Mayank Kapoor, VP of Engineering at Jio Platforms, discusses how Reliance Jio was able to deploy OpenStack and Kubernetes in tandem to transform their cloud infrastructure. Please visit http://bit.ly/
Learn more about the importance of a secure software supply chain: https://www.mirantis.com/blog/what-is-a-secure-software-supply-chain-and-why-should-i-care/ Mirantis’ Nick Chase explains and demons
Blog covering the challenges with understanding Edge Computing & how, if used correctly, it can modernize your enterprise apps. Includes an introductory overview & common use cases in the Edge space.
Follow-up responses to questions posed in a live webinar featuring Boris Renski & Meghana Sahasrabudhe, Product Lead at Facebook Connectivity detailing the Magma project.
Read the Q&A from a webinar by Mirantis and Cloudify about how you can use available open source tools to create a single management environment for PNFs, VNFs, and mobile edge cloud applications.
With edge, we have closed vendor solutions and open reference architectures, but nothing for VNF and software vendors to build on top of. Changing that is the first step towards virtualized edge.
There's a lot involved in making sure a VNF will work in your cloud, and we discussed a lot of it, including the obscurities.
Generic VNF "certification" programs sound great and are terrific for marketing. Unfortunately they don't add value for customers.
Virtlet makes it possible to run VMs on Kubernetes clusters as if they were plain pods, enabling you to use standard kubectl commands to manage them.
If you are a CSP you are probably thinking, do I really need to deal with ONAP? It’s actually a good question, and the answer is yes, but the timing could vary depending on your situation.
Virtlet is a Kubernetes CRI (Container Runtime Interface) implementation for running VM-based pods on Kubernetes clusters.
Telcos, multiple-system operators (MSOs i.e. cable & satellite providers), and network providers are under pressure on several fronts.
If you're not in the telecom business, you probably haven't given much thought to the upcoming 5G standard, except perhaps to wonder when your phone will have faster data.