Category: IT Analyst

Oxeye: Cloud-Native Application Security Testing

Security testing that works for monolithic and virtualized apps does not work in a containerized world. There could be a whole new world of hacks out there that we don’t even know about yet. There is a lot of vulnerability, …

Secure Message, Voice, Video w. End-to-End Encryption

Original video (with full player and complete transcript) posted at TruthInIT.com

Browse related videos on the Small World Big Data channel at TruthInIT

Overcome Performance, Security, Privacy Challenges w. 3rd Party Tools

Original video (with full player and complete transcript) posted at TruthInIT.com

Browse related videos on the Small World Big Data channel at TruthInIT

BlueCat: Managing DNS, DHCP, IPAM

Interview with Andrew Wertkin, CPO of BlueCat Networks. BlueCat is focused on on DNS, DHCP and IPAM: DDI, the acronym of acronyms. These these three things fundamentally go together and managing them together makes a great deal of sense. BlueCat …

Verified Backups: Reliable restores for in-flux databases

Are you verifying the integrity of your databases or just ritualistically restoring them? How do you know if your backups will have what you need when you need them?

Original video (with full player and complete transcript) posted at TruthInIT.com

The DDN/Tintri Marriage: Where enterprise meets at-scale

Can a mid-range HPC product for the enterprise also be a secondary storage / active archive for at-scale customers? DDN discusses the flexibility of having enterprise features and applying them in a more intelligent way at-scale.

Original video (with full