Posts Categorized Under

Security & Compliance

  1. Get Your Cloud, See Your Cloud—A Full View with Fugue

    Fugue's new Composer maps your application’s cloud infrastructure with automated, interactive diagrams that show your whole system in real time and the relationships between system components. You can zoom and inspect. You can quickly discover configuration errors and compliance violations. It's introduced with Fugue’s Transcriber—your tool to scan existing AWS cloud services in an account and automate their translation for easy Composer mapping. It doesn’t matter how you stood those services up. You'll see everything with Fugue. The new features are in beta and they're free.

  2. Validations Give Government Agencies Speed and Certainty in the Cloud

    Fugue now supports the Amazon Web Services (AWS) GovCloud region, which means federal agencies, like enterprises, can automate operations in the cloud fast, while simultaneously meeting regulatory demands. Fugue deployments start with powerful, but easy-to-understand code declarations in a composition that governs a system’s infrastructure. By including select libraries in that composition with simple import statements, a particular agency’s compliance regime gets integrated from the start. This kind of fully realized policy-as-code provides a scalable protocol for agency cloud ops and increases speed to mission.

  3. The Next Cloud Outage is Coming—What You Can Do To Survive

    Whether businesses are using cloud providers, on-premise data centers, or hybrid setups to host web services and backends, infrastructure failures are a fact of life. They have to be on our radars as a matter of routine. This makes architecting for failure and for the future, from the start, among the most pressing imperatives for business IT departments. The next five years will see the rise and democratization of centralized control systems for cloud ops with fault tolerance architected into the very fabric of those systems. (This article was first published in DZone's Cloud Zone on April 3, 2017.)

  4. The Next-Generation Cloud CMDB: Ludwig Code

    A CMDB for APIs is a crucial aspect of Fugue, and one area where running your operations with Fugue offers a lot of value to you. Fugue's CMDB is an effect of our declarative model for configuration, built around our typesafe, compiled Ludwig language. Once it is run as a process in Fugue, that declaration is made real and immutable with machine precision.

  5. Why We Built Ludwig — a DSL for the Cloud of Today and the Future

    Fugue uses a new domain-specific language, Ludwig, to describe infrastructure configuration. Before we started building, we looked around for what we wanted, but didn't find it all in one place. We want typical things you do in cloud to be easy, and not feel like programming. We want users to get great error messages, fast. We want a program that compiles to almost always work in the cloud. We want sophisticated work to be possible, but safe, predictable, and shareable.

  6. Computing Cryptographic Hashes for Cyclic Dependencies

    Implementation of cryptographic hashes is theoretically not that hard, given a good cryptographic library. However, things get trickier when we want to allow dependency cycles. At that point, we get a bit of a chicken-and-egg problem. We need resource A’s hash to compute resource B’s hash, but that in turn depends on B’s hash again! Let's study the problem and solve it.

  7. Immutable Infrastructure: Networks

    If you work with network infrastructure, you know that it has a tendency to drift away from its original configuration, or "grow warts." There are many tools that attempt to solve this problem. Fugue brings automation and control of networks one step further by ensuring networks remain in the state intended when they were deployed.

  8. Cybersecurity's New Frontier

    The exterior walls of Luminal’s downtown Frederick headquarters are made of brick. But the company isn’t focused on walls. Its software aims to make a computer system more secure from the inside, instead of relying only on exterior defenses.

  9. Software Agents are a Vulnerability

    The agent/server model is another example of expanding the vulnerability surface in computing that has already shown itself to be far too large and permeable. The only solutions that will improve security and automation will avoid use of the agent/server model and should have no routable address space between them.

Take Control of Your Cloud Today

You and your team can be productive with Fugue on AWS in less than an hour, without the need for professional services.