Escaping the buzz and hype around Kubernetes seems impossible these days. Clearly the platform has won the container orchestration wars and has been embraced by developers.
Building two separate data centers for reliability makes all the sense in the world. But what happens when they start behaving like one data center? Dr. Peter Welcher has some thoughts on the subject and some things you definitely want to watch out for.
Wi-Fi 6 is a done deal, right? We’re certified, which is almost the same thing as ratified. Except when it isn’t. Nick Shoemaker has a quick overview of why the difference makes all the difference.
In this data-powered economy, all organizations need a solid backup and recovery plan to minimize disruptions in the event of a system malfunction. In this webinar, Chris M. Evans addresses the topic by discussing how business leaders can prepare a data management plan to protect the business from loss and liability.
Is your enterprise ready for DNS-over-HTTPS? How would you know if you weren’t? Josh Warcop takes a look at how to configure Firefox to play nicely in the enterprise with this new security feature.
Is your networking solution of choice SD-WAN? Daniel Dib gives us a great overview of what makes something SD-WAN and how we can ensure we’re getting what we paid for.
Curious how Kubernetes seems to magically achieve your desired state? When you pass you YAML file to the Kubernetes API and stuff just happens, what is going on? Eric Shanks breaks down the basics of the control loop that Kubernetes uses to accomplish this.
When AWS announced their Outpost product in late 2018 there was much excitement around the possibility of bringing native AWS service and VMware Cloud on AWS into the data center for situations where data and applications were latency sensitive and needed to be placed closer to the user. As details have emerged about architecture and delivery, Chris Evans has noticed that the offering could present a potential conflict with traditional enterprise IT hardware vendors.
Security is paramount and we do everything we can to make our systems more secure. But what happens if they’re insecure at the origin? Bruce Schneier has some thoughts about supply-chain security in this great post.
Building on the foundation of wildly successful products, Apple has done it again with the iPhone 11. If you already have an iPhone X-class phone, you probably don’t need to upgrade this cycle. But if you’re desperate for a new iPhone that will give you more battery life or let you shoot better photos and video, this is the update for you. Jason Snell describes the ins and outs of the new iPhone 11.