CLOUD

D2iQ™ Kubernetes Platform Enhancements Speed Time-to-Value in Production Environments

D2iQ™ | April 22, 2022

D2iQ_Kubernetes
D2iQ, the leading enterprise Kubernetes provider for smart cloud-native applications, today announced the newest release of the D2iQ Kubernetes Platform (DKP). With customer-led updates, DKP 2.2 gives enterprises more control and visibility when deploying and managing Kubernetes deployments in any environment, and enables customers to accelerate mission-critical production deployments.

DKP now provides VMware vSphere infrastructure provisioning using Cluster API to simplify lifecycle management, a unified DKP user interface to improve the user experience, and access to Kaptain AI/ML to better support artificial intelligence (AI) and machine learning (ML) workloads, streamlining the development of smart cloud-native applications.

D2iQ is kicking off a customer technology preview of DKP Insights, a self-service troubleshooting capability that embeds D2iQ's industry-leading expertise in Kubernetes operations. DKP Insights analyzes the alerts, metrics, logs, and events from Kubernetes clusters managed by DKP and generates heuristic analytics for potential issues and operational challenges. This enables infrastructure teams to quickly identify and proactively resolve issues on their own providing greater support productivity, speed, and reduced costs, while preventing downtime and loss of revenue.

In addition, DKP now includes access to Kaptain AI/ML as a catalog application that enables enterprises to deploy Kaptain to other Kubernetes distributions managed by DKP, including Amazon Elastic Kubernetes Service (EKS) and Azure Kubernetes Service (AKS). With Kaptain AI/ML, organizations can develop, deploy, and run AI and ML workloads in production at scale with consistency and reliability.

"As Kubernetes deployments begin to scale in production environments, complexity increases exponentially, often limiting the success and impact of cloud-native projects," said Tobi Knaup, CEO of D2iQ. "The latest release of DKP further enhances our customers' experience in running enterprise-grade Kubernetes. Customer-led innovations, such as DKP Insights for improved platform management, empower organizations to accelerate time-to-value and increase reliability for all Kubernetes deployments. As the industry's leading independent Kubernetes platform, DKP continues to power the cloud-native applications that have become a requirement in modern business operations."

About D2iQ ™
D2iQ accelerates Day 2 success for smart cloud-native applications on enterprise Kubernetes. The D2iQ Kubernetes Platform (DKP) includes everything needed to adopt Kubernetes easily and expand Kubernetes use to multiple clusters across any infrastructure, whether on-premise, in the cloud, in air-gapped environments, or at the edge, and to enable smart cloud-native applications. D2iQ eliminates roadblocks to success, such as lack of skills, with our Kubernetes and cloud-native expertise, alleviates operational complexity with a simpler and easy-to-use platform, and addresses security concerns with military-grade security. D2iQ is headquartered in San Francisco with additional offices in London and Hamburg. D2iQ investors include Andreessen Horowitz, Hewlett Packard Enterprise, Khosla Ventures, Koch Disruptive Technologies, Microsoft, and T.Rowe Price Associates, Inc.

Spotlight

If you’re feeling a little baffled by all the terminology related to Cloud Computing, you’re not alone. But given the fact that the adoption of Cloud Computing is one of the most talked about topics in the IT industry at present, now’s probably a good time to brush up your understanding of a few key Cloud terms. We’ve put together all the information you need to decide what set of services is right for your business needs. From all the different Cloud Computing models, to the different deployment methods, we’ve got you covered.


Other News
VIRTUAL DESKTOP TOOLS

Red River Named as a VMware Regional Academy for IT Support and Training

Red River | July 01, 2022

Red River, a technology transformation company serving government and enterprise customers, announced today that it has been designated as a VMware Regional Academy for IT support and training. In partnership with the VMware IT Academy, Red River will provide instructors and students at academic institutions with training and learning resources for high-demand IT skills such as digital workspace, application modernization and multi-cloud. VMware academic programs have created positive change throughout the pandemic, providing next-generation technology to academic institutions, allowing instructors to teach virtually and giving students access to industry certifications. “Red River understands the evolving needs of the IT Industry and its talent,” said Jackie Barker, Director of VMware IT Academy. “VMware IT Academy is thrilled to work with Red River to provide educational resources and experience to students in academia.” As a VMware Regional Academy for IT support, Red River will contribute to industry and economic development, providing skills to students seeking high-demand careers in areas such as cloud, dev ops, data, mobility and security. Red River will also support the remote delivery of VMware courses, helping students excel through online certification opportunities, hands-on labs and other VMware learning resources. “We are pleased to be a part of the Regional Academy, sharing years of technology expertise to benefit the next generation of IT professionals, This opportunity enables us to invest in our industry, so we can better prepare students for work and career growth in a digital world.” Richard Ackerman, Vice President of Workforce Development for Red River Red River’s workforce development program offers extensive training programs, new career opportunities and dedicated partnerships. The company is set on making a positive impact on employees, customers, partners and communities. To learn more about workforce development at Red River visit www.redriver.com/resources/workforce-development. For more information on the VMware IT Academy, visit https://www.vmware.com/company/it-academy.html. About VMware VMware is a leading provider of multi-cloud services for all apps, enabling digital innovation with enterprise control. As a trusted foundation to accelerate innovation, VMware software gives businesses the flexibility and choice they need to build the future. Headquartered in Palo Alto, California, VMware is committed to building a better future through the company’s 2030 Agenda. About Red River Red River brings together the ideal combination of talent, partners and products to disrupt the status quo in technology and drive success for business and government in ways previously unattainable. Red River serves organizations well beyond traditional technology integration, bringing 25 years of experience and mission-critical expertise in security, networking, analytics, collaboration, mobility and cloud solutions.

Read More

VMWARE

CISA recommends VMware, F5 patches. Liquidity mining fraud. Strapi issues patched. TDI clarifies data incident.

CISA | May 20, 2022

VMware yesterday addressed issues in several of its products: VMware Workspace ONE Access (Access), VMware Identity Manager (vIDM), VMware vRealize Automation (vRA), VMware Cloud Foundation, and vRealize Suite Lifecycle Manager. That these are more significant than the ordinary run of patches may be seen by the way the US Cybersecurity and Infrastructure Security Agency (CISA) has discussed them. Alert (AA22-138B), "Threat Actors Chaining Unpatched VMware Vulnerabilities for Full System Control" warns that "malicious cyber actors, likely advanced persistent threat (APT) actors, are exploiting CVE-2022-22954 and CVE-2022-22960 separately and in combination." The Alert adds, "CISA expects malicious cyber actors to quickly develop a capability to exploit newly released vulnerabilities CVE-2022-22972 and CVE-2022-22973 in the same impacted VMware products. In response, CISA has released, Emergency Directive (ED) 22-03 Mitigate VMware Vulnerabilities, which requires emergency action from Federal Civilian Executive Branch agencies to either immediately implement the updates in VMware Security Advisory VMSA-2022-0014 or remove the affected software from their network until the updates can be applied." US Federal civilian agencies have until next Monday to identify and remediate the issues, and they're required to report completion no later than Tuesday. Fraudulent liquidity mining. Sophos describes the way the threat of fraudulent liquidity mining is shaping up in decentralized finance systems. "Legitimate liquidity mining exists to make it possible for decentralized finance (DeFi) networks to automatically process digital currency trades," Sophos explains, and criminals are using social engineering to abuse such systems to defraud cryptocurrency investors of their holdings. More loosely regulated than conventional cryptocurrency exchanges, which use market makers and seek to ensure that sufficient reserves are on hand to back trades, DeFi exchanges use Automated Market Makers (AMMs). Sophos explains that "Smart contracts built into the DeFi network have to rapidly determine the relative value of the currencies being exchanged and execute the trade. Since there is no centralized pool of crypto for these distributed exchanges to pull from to complete trades, they rely on crowdsourcing to provide the pool of cryptocurrency capital required to complete a trade—a liquidity pool." Liquidity pool tokens, ("LP tokens") are used to represent the portion of the liquidity pool an investor contributed. But unethical DeFi operators can cancel the tokens (or simply not create a pool to back them in the first place), and this, Sophos observes, offers "ample opportunity for digital Ponzi schemes, fraudulent tokens, and flat-out theft." CMS vulnerabilities disclosed and patched. The Synopsys Cybersecurity Research Center (CyRC) has identified two vulnerabilities in Strapi. Strapi is an open-source headless content management system (CMS) Javascript software that enables developers to quickly design and build content-rich APIs. Both vulnerabilities involve authenticated users with access to the Strapi admin panel having access to private and sensitive data, such as email and password reset tokens. The first vulnerability allows for the authenticated user to view private and sensitive data for other admin panel users that have a relationship with content accessible to the authenticated user. The second vulnerability allows for the authenticated user to view private and sensitive data for API users if content types accessible to the authenticated user contains relationships to API users. The vulnerabilities are fixed in newer, updated versions of Strapi, and Synopsys has commended Strapi for its quick response to the discovery. Texas Department of Insurance clarifies facts surrounding its data incident. The Texas Department of Insurance (TDI) has sent around a fact sheet that clarifies a data incident the agency sustained earlier this year: "In January 2022, TDI found the issue was due to a programming code error that allowed internet access to a protected area of the application. TDI promptly disconnected the web application from the internet. After correcting the programming code, TDI placed the web application back online. The forensic investigation could not conclusively rule out that certain information on the web application was accessed outside of TDI. This does not mean all the information was viewed by people outside TDI. Because we couldn't rule out access, we took steps to notify those who may have been affected." While data could have been accessed by unauthorized personnel, TDI has investigated and found that, "There is no evidence to date that there was a misuse of information."

Read More

VIRTUAL DESKTOP STRATEGIES

Tailscale SSH Now in Beta for Simple and Secure Remote Connections

Tailscale | June 27, 2022

Tailscale has released Tailscale SSH to beta, which makes authentication and authorization trustworthy and effortless by replacing SSH keys with the Tailscale identity of any machine. With Tailscale, each server and user device gets its own identity and node key for authenticating and encrypting the Tailscale network connection, and uses access control lists defined in code for authorizing connections, making it a natural extension for Tailscale to now manage access for SSH connections in your network. “SSH is an everyday tool for developers, but managing SSH keys for a server isn’t so simple or secure, SSH keys are difficult to protect and time consuming to manage. Protecting your network connections with SSH keys requires that admins spend significant resources managing, provisioning, or deprovisioning user access. Tailscale SSH removes the pain from SSH key management with the same powerful simplicity Tailscale offers for virtual private networks.” Tailscale Product Manager Maya Kaczorowski Kris Nóva, Senior Principal Engineer and published distributed systems expert used Tailscale to create a private network between her homelab in New York and a datacenter in Iceland: “Tailscale is seriously the best user experience of my life. I ran a Kubernetes 1.24 cluster on Tailscale with eBPF CNI networking on top of a tailnet, which connects my private subnet at home, across the Arctic ocean to a private subnet in a volcano-powered datacenter in Iceland. It blew my mind how easy and powerful it was to use. I’m excited to use their new SSH feature.” With Tailscale SSH, users can now securely code from their iPad running Tailscale, across operating systems to a Linux workstation, without having to figure out how to get their SSH private key onto their iPad. Enterprise Tailscale customers will reduce churn and resources on SSH key management or bastion jump boxes, and avoid risk of exposing memory unsafe servers to the open internet. The beta release gives all users: Authentication and encryption: Authenticate, authorize, and encrypt SSH connections using Tailscale. No need to generate, distribute, and manage SSH keys. SSO and MFA: Use existing identity providers and multi-factor authentication to protect SSH connections the same way you authorize and protect application access. Built-in key rotation: Tailscale makes it simple to rotate keys with a single command and manages key distribution. Node keys can be rotated by re-authenticating the device, as frequently as every day. Re-verify SSH connections: Tailscale works with existing identity providers and re-verifies before SSH connections are established, and gives users the option to re-authenticate when establishing high-risk SSH connections. Revoke SSH access easily: When an employee offboards, Tailscale allows admins to revoke access to SSH to a machine almost instantaneously with Tailscale ACLs. Manage permissions as code: Define connections to devices using a standard syntax and understand SSH access controls in a centralized configuration file. Reduced latency with point-to-point connections: Connect directly from a device to a server, without having to hairpin through a bastion. Developers can connect wherever they work, without slowing them down by routing their traffic through the main office. Add a user or server painlessly: Maintain users and servers in a network without adding complexity. Tailscale ACLs to give the right people access and add it to a team's known hosts. Tailscale makes network security accessible to teams of any scale and gives developers and DevOps teams the ability to connect to resources easily and securely in the cloud, on-premises, and everywhere in between. Tailscale uses the WireGuard® protocol, the open source, opinionated standard for secure connectivity. It is set up and configured in a matter of minutes on average, while other VPN solutions take weeks to fully implement and several hours a week to maintain. About Tailscale Tailscale builds software that makes it easy to interconnect and secure devices, no matter where they are. Every day, banks and multinational companies use Tailscale to protect their corporate networks. Homelabs and start-ups trust Tailscale to collaborate and share access to tooling. We're building a future for the Internet that's easy, small and safe, like it used to be. Founded in 2019 and fully distributed, we’re backed by Accel, CRV, Heavybit, Insight Partners, and Uncork Capital.

Read More

VIRTUAL SERVER INFRASTRUCTURE

Scale Computing Partners with Servix to Deliver a Leading Hyperconverged Infrastructure Solution to the Brazilian IT Market

Scale | May 25, 2022

Scale Computing, a market leader in edge computing, virtualization and hyperconverged solutions, today announced its partnership with Servix, one of the largest technology integrators in Latin America. Servix will now deliver simple, reliable, affordable, and easy-to-deploy infrastructure solutions to the IT market in Brazil via Scale Computing’s award-winning HC3 virtualization platform, while simultaneously expanding its partner community in the region. Together, Scale Computing and Servix are bringing a virtualization alternative to customers and partners in Brazil. The Scale Computing virtualization platform combines servers, storage, and virtualization into a single solution to make IT infrastructure easier for organizations of every size. Whether an organization has one IT administrator or hundreds, the award-winning Scale Computing hyperconverged infrastructure eliminates complexity, lowers costs, and frees up management time. Many of today’s virtualization solutions consist of multiple vendor products, making them more complicated and expensive than necessary. Moreover, properly configuring disparate server and storage components takes up valuable department resources, and that's even before a company has installed and configured hypervisors or tested for compatibility and performance. Scale Computing’s virtualization software and appliances, meanwhile, are based on patented technologies designed from the ground up to minimize infrastructure complexity and cost. Whether an organization is considering migrating from its existing virtualization platform or is virtualizing from scratch for the first time, Scale Computing’s hyperconverged approach is the shortest path to affordable virtualization that’s easy to deploy, easy to manage, and easy to scale. “To navigate today’s complex infrastructure environments, businesses need flexibility, scalability, and resiliency. Scale Computing has a strong reputation for delivering results to IT operation leaders around the world, and we’re thrilled to be offering the HC3 solutions to Brazil. This partnership further demonstrates our commitment to providing our partners and customers with the most innovative and reliable solutions,” said Cleber Calejon, CEO, Servix. Scale Computing continues to be the top choice for organizations thanks to the simplicity, efficiency, and innovation of Scale Computing software. Automated machine learning capabilities found in the company’s solutions mean that the typical Scale Computing customer sees a reduction in on-going management costs of between 60 and 80 percent. Servix is a leading HCI integrator in Brazil, and we are proud to be partnering with an IT organization that is so forward thinking, embracing new technology as it makes sense for their customer base,” Scott Mann, VP of Sales, ROW & Global Channel Chief, Scale Computing. About Scale Computing Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing is the ideal infrastructure platform.

Read More

Spotlight

If you’re feeling a little baffled by all the terminology related to Cloud Computing, you’re not alone. But given the fact that the adoption of Cloud Computing is one of the most talked about topics in the IT industry at present, now’s probably a good time to brush up your understanding of a few key Cloud terms. We’ve put together all the information you need to decide what set of services is right for your business needs. From all the different Cloud Computing models, to the different deployment methods, we’ve got you covered.

Resources