Pivotal and Samsung join the O-RAN Alliance; Splunk withdraws from Russia; Microsoft expands its security service into Europe.
The fabric is in trials with “two major wireless operators,” said Thomas Eklund Kaloom’s VP of marketing and strategy. It will enter production with operators and enterprises later this year.
The new product, based on the open source Eclipse Che integrated development environment project, enables OpenShift developers to conduct entire projects in Kubernetes..
Red Hat and Affirmed Networks helped with the deployment. Turkcell is on track to have 40 percent of its voice and data services capacity virtualized by year-end.
One analyst puts the eight-year cloud deal France’s largest bank “around or somewhat above $2 billion.”
The Stackalytics numbers show that Google was the source of nearly 53 percent of all code commits, which was seven-times more than the second largest contributor, Red Hat.
The new organization, co-led by Vodafone and IBM, will provide European companies with technologies that integrate and manage multiple clouds.
AWS purchases a disaster recovery startup; Synchronoss and TBSCASoft build blockchain for telecom operators; Red Hat releases a new version of its enterprise workflow framework.
The startup's business model works like this: companies pay Tidelift a subscription, and in return they receive support for the open source projects they use from the developers who created and maintain these projects.
Open source and containers found themselves at the center of M&A activity this year.
The company closed 100 deals valued in excess of $1 million and added more than 100 new customers to both its OpenShift and Ansible platforms during the quarter.
Etcd is the primary storage location for Kubernetes and needs to be established before Kubernetes can be run on a system.
The collaboration focuses on the three biggest container pain areas for enterprises: 1) networking; 2) visibility; and 3) security.
ACG Research‘s Dr. Ray Mota and Red Hat's Thomas Waldrop share examples of service providers making strides in IoT, mobile banking, media, and other adjacent-industry initiatives.
It affects all Kubernetes-based products and services, and it gives hackers full administrative privileges on any compute node being run in a Kubernetes cluster.