AWS tries a telco tack; Teradata's new vector
Today on Product Saturday: AWS spruces up its Outposts server gear for wireless carriers, Teradata jumps on the vector database train, and the quote of the week.
Today: the first release of a new enterprise Linux project has arrived, Okta shares more details about how hackers got into its customer-support system, and the quote of the week.
Welcome to Runtime! Today: the first release of a new enterprise Linux project has arrived, Okta shares more details about how hackers got into its customer-support system, and the quote of the week.
(Was this email forwarded to you? Sign up here to get Runtime each week.)
This week OpenELA, a consortium of companies that until this summer produced Linux clones based on a free distribution of Red Hat Enterprise Linux, released their own Enterprise Linux code designed to be compatible with RHEL. The announcement demonstrates CIQ, Oracle, and Suse's commitment to continue providing cheap RHEL-compatible Linux distributions after Red Hat made that goal much more difficult earlier this year.
The code released Thursday is designed to provide compatibility with RHEL version 8 and version 9, although ZDNet reported that it's not quite ready for prime time just yet. In case you missed enterprise tech's annual bit of open-source drama while taking a summer vacation, here's a quick recap:
That decision left the vendors that relied on that free copy in a bind, and they joined forces in August to provide their own RHEL-compatible code base.
However, it's not clear how OpenELA will be able to maintain "bug-for-bug" compatibility with RHEL in the future.
Okta was unable to identify suspicious behavior in its customer-service portal for two weeks last month, it acknowledged Friday, leading to the exposure of data belonging to 134 customers before it was addressed.
The identity management company, which plays a key role for customers looking to authenticate users on their corporate networks, employs a relatively standard SaaS customer-service procedure that asked customers to share HAR files. Those files record how customers are interacting with a cloud service through their browser, and contain sensitive information about how to log into their accounts with the vendor.
But hackers were able to get access to a computer used by an Okta customer service employee that was signed into their personal Google account while also using a corporate Okta account. The attackers were able to get access to the HAR files through that account and "hijack the legitimate Okta sessions of 5 customers," which Okta did not notice until three of those customers — 1Password, BeyondTrust, and Cloudflare — informed the company that they had detected suspicious activity.
That's not a great look for a security company.
“I often ask vendors to walk me through their product quote and explain what each product SKU or line item is, such as the cost for an application with the microservices and containerization. Most cloud agreements have an auto-renewal clause, which decreases leverage in negotiating prices upon renewal. I strike this language from all my contracts.” — Thomas Phelps, CIO and SVP of corporate strategy at Laserfiche, with some sage advice for enterprise tech buyers as reported by CIO.
Several Cloudflare services remained down or degraded well into Friday as the company continues to recover from widespread issues caused by a power outage at one of its North American data centers on Thursday.
Nvidia is planning to sell the A800 AI chips originally designed for Chinese customers in North America after new export restrictions forced its hand, which could put a small dent in the ongoing GPU shortage.
Thanks for reading — see you Tuesday!