Hewlett Packard Enterprise is one of the new investors, having initially signed up for the Portworx Enterprise platform last year.
Breaking News in SDx, SDN, & NFV
Want to know what’s new in SDx, SDN, & NFV? Check out SDxCentral’s Breaking News page to keep up to date on the latest news and trends.
“When you deal with Kubernetes in the core of a network, dealing with quarterly updates is one thing,” said Red Hat's Brian Gracely. “But when you have 2,000 branch offices that is a different model."
The platform provides a more consistent way for enterprises to manage their applications across multiple infrastructure locations.
The open source project creates the necessary tunnels and routes between Kubernetes clusters that allow for direct connections regardless of their location.
The currency miners were relying on a Docker runC vulnerability discovered in early February (later patched by Docker Inc.) in combination with an exposed remote Docker API.
The increasingly complex array of cloud environments used by businesses provides bad actors with great opportunities to sneak into corporate networks.
Its purpose is to show the ability to run the same networking code running as VNFs on OpenStack and as CNF’s on Kubernetes.
The new product joins VMware’s other two Kubernetes offerings: Enterprise PKS and Cloud PKS.
The edge computing company is open sourcing some of the code through the Telecom Infra Project.
The fabric is in trials with “two major wireless operators,” said Thomas Eklund Kaloom’s VP of marketing and strategy. It will enter production with operators and enterprises later this year.
The support will allow organizations to deploy Knative in a Kubernetes cluster using a one-click install via the IBM Cloud Kubernetes Service user interface.
The data preparation software company immediately identified dozens of problems within its code after deploying Instana’s APM and SDK software.
Watson applications can now be run as microservices orchestrated by Kubernetes across rival cloud ecosystems like like AWS, Azure, and GCP.
The flaw basically allows an infected container to gain control of the overarching host container and allow an attacker to execute any command.
Mirantis scored an eight-figure, multi-year deal to provide the carrier with core infrastructure software that has Kubernetes running on bare metal on-premises.