Glen Knight

NYC Based IT Professional

How We Sent an AWS Snowcone into Orbit

I have been a fan of space travel and the US space program since I was 4 or 5 years old. I remember reading about the Mercury and Gemini programs, and watched with excitement as Lunar Module Eagle landed on the Moon. Today, with the cost to reach Low Earth Orbit (LEO) seemingly declining with […]

0 Comments

Read More

Deciphering the Observability Market

Observability has become one of the most overused buzzwords in IT and cybersecurity. Today, the term is used by vendors to refer to everything from application performance to network monitoring, cybersecurity and data and analytics. While the term’s ubiquity has created confusion for everyone from end users to journalists, startups in the space have also […]

0 Comments

Read More

3 Ways API Analytics Can Help Application Owners

Software development is fraught with risk that can run projects aground like a ship against a rocky beach. Whether it is misunderstood requirements, rapidly evolving marketplaces or old-fashioned bugs and schedule slippage, all can derail otherwise well-resourced and managed software development projects. Even when software development teams eventually ship their product and collect payment from […]

0 Comments

Read More

Curriculum Vitae

The post Curriculum Vitae appeared first on DevOps.com. Source: DevOps.com

0 Comments

Read More

Oracle’s Free Managed Service Integrates With Microsoft Azure

Oracle today extended its alliance with Microsoft to include a managed service that makes it simpler for IT organizations to embrace hybrid cloud computing. Oracle Database Service for Microsoft Azure integrates Windows applications with Oracle databases running on Oracle Cloud Infrastructure. Leo Leung, vice president of products and strategy for Oracle, said the managed service […]

0 Comments

Read More

How DevOps Teams Can Defend Against API Attacks

Remember when ransomware was the main security threat that DevOps teams needed to worry about? Those days are over. Ransomware attacks are certainly still happening, but API security breaches—which increased by a whopping 600% in 2021—are now poised to become the top attack vector for threat actors, according to Gartner. That’s the bad news. The […]

0 Comments

Read More

Filter the Firehose

We are tired. Information overload is a problem in the modern world. We hear instantly about events we never would have known about otherwise, or that we would have learned about months after the fact. Today, moments after an event, we have thousands of “professionals” analyzing it for us, a millions-strong army of amateurs telling […]

0 Comments

Read More

New – Amazon EC2 R6a Instances Powered by 3rd Gen AMD EPYC Processors for Memory-Intensive Workloads

We launched the general-purpose Amazon EC2 M6a instances at AWS re:Invent 2021 and compute-intensive C6a instances in February of this year. These instances are powered by the 3rd Gen AMD EPYC processors running at frequencies up to 3.6 GHz to offer up to 35 percent better price performance versus the previous generation instances. Today, we […]

0 Comments

Read More

Poor App Remediation Creates a Vicious Vulnerability Cycle

A survey of 200 security professionals found nearly 83% of respondents reported that an increase in the rate at which applications are being deployed has led to an increase in the reintroduction of previously remediated vulnerabilities. The survey, conducted by Waratek, a provider of tools for managing security-as-code, found 93% of the security professionals polled […]

0 Comments

Read More

3 New WFH and Hybrid Work Trends That YOU Need to Grok

In this week’s The Long View, a remote/hybrid work special: Bribes to relocate you, Fridays are forgotten, and big tech firms stop building offices. The post 3 New WFH and Hybrid Work Trends That YOU Need to Grok appeared first on DevOps.com. Source: DevOps.com

0 Comments

Read More