Cloud-optimized Linux: Inside Ubuntu’s edge in AWS cloud computing

AARON MELGAR | August 15, 2017

article image
While the market’s cloud infrastructure solutions are beginning to consolidate, there remains a multitude of options for software development environments. Of the operating systems available, however, Ubuntu overwhelmingly leads as the operating system in Amazon.com Inc., according to Dustin Kirkland (pictured), head of product and strategy at Canonical Ltd., the company behind Ubuntu. In fact, about 70 percent of all instances running in Amazon right now are running open-source Ubuntu, Kirkland added.

Spotlight

Data Dimensions

For more than 40 years, Data Dimensions has been an innovative leader in the area of business process automation (BPA) services. We provide innovative solutions to optimize workflows, delivering process efficiencies, improved quality, and reduced costs for our customers.

OTHER ARTICLES

Why we need more 5G cyberhacks

Article | February 24, 2020

How secure are 5G networks? That question should be on the lips of every network operator (and their customers) as the next generation of mobile broadband technology is rolled out across the world. While the industry is likely to find out the hard way, there are steps that can be taken to head off potential trouble. One such step is for network technology vendors to open up their systems to ethical hackers to see what happens (a scenario that doesn't happen nearly enough in the industry across all types of network technology). So it was encouraging to see a recent report on what was the world's first 5G cyber hackathon, which was held last November in Oulu, Finland. It was particularly encouraging to see that two of the radio access network market's leaders, Ericsson and Nokia, participated, as more than 80 ethical hackers got stuck into 5G New Radio, non-standalone (NSA) core and 5G fixed wireless access systems to see what vulnerabilities they could uncover.

Read More

Graph machine learning in distributed systems: What you need to know

Article | March 16, 2020

Just as graphs make it easier for us to understand and act on complex data, graph machine learning can take graph theory a giant step further. But can it even help today’s service providers to improve reliability and predict anomalous behaviors in complicated distributed systems? Find out below…How much do you know about graph representation of data? Over the last two decades, graph theory has become increasingly popular in both research and industry. Among other areas, it has been used in epidemiology, medicine genetics, healthcare, banking and engineering to solve challenges such as routing, finding relation, path etc.

Read More

The critical role of Internet of Things infrastructure in connecting all of our devices

Article | February 20, 2020

The Internet of Things (IoT) will fundamentally change all industries, from agriculture to transportation to healthcare. In the next few decades, nearly everything in our world will become connected. But with that increased connectivity comes several concerns. For example, the IoT will generate immense amounts of data, which will put pressure on the Internet and force us to come up with more efficient ways to transmit and store this data. Perhaps chief among these concerns are the infrastructure considerations as other sectors grow thanks to the IoT. Below, we've outlined the future of IoT infrastructure management, along with some IoT infrastructure companies that are leading the way.

Read More

5 TIPS TO ENSURE NETWORK SECURITY OF INTERNAL IT INFRASTRUCTURE

Article | May 3, 2021

What Is IT Infrastructure Security? If you are reading this blog, we would like to assume that you are either an aspiring cybersecurity professional or a business owner looking for ways to improve their network security. A business IT infrastructure includes networks, software, hardware, equipment, and other facilities that make up an IT network. These networks are applied to establish, monitor, test, manage, deliver, and support IT services. So, IT infrastructure security describes the process of safeguarding the core networking infrastructure, and it is typically applied to enterprise IT environments. You can improve IT infrastructure security by installing protective solutions to block unauthorized access, theft, deletion, and data modification.

Read More

Spotlight

Data Dimensions

For more than 40 years, Data Dimensions has been an innovative leader in the area of business process automation (BPA) services. We provide innovative solutions to optimize workflows, delivering process efficiencies, improved quality, and reduced costs for our customers.

Events