Page 10«..9101112..2030..»

Canon USA Advances PRISMAsync Color Print Server in Version 5.2, Offering Cloud-Based PRISMAlytics Dashboard … – PR Newswire (press release)

Canon will debut PRISMAsync Print Server v5.2 at PRINT 17 (booth #1213), held in Chicago, Illinois from September 10 to September 14, 2017.

“The evolution of the PRISMAsync family of print servers reflects Canon’s technological leadership and our focus on creating products that can help users increase productivity and maximize efficiency,” said Toyotsugu Kuwamura, executive vice president and general manager, Business Imaging Solutions Group, Canon U.S.A., Inc. “Productivity is an evolving term and means so much more than just the number of pages printed per minute in today’s market. The new tools and features of the PRISMAsync solution are designed specifically to help print providers keep operators efficient and their imagePRESS engines running, as is our effort to maintain the functionality and user interaction of the PRISMAsync platform for color and monochrome presses as uniform as possible.”

Among new features included with PRISMAsync Color Print Server v5.2 are:

PRISMAlytics Dashboard1-A cloud-based service that collects, organizes and displays performance trends from PRISMAsync driven digital presses running on version 5.2 or later. It records press data and transforms it into an easy-to-access and interpret dashboard, displaying usage, production and consumption-related information. This fact-based dashboard can help print floor managers study press performance on a daily basis as well as analyze trends over time, which can help them identify areas of improvement as a basis to take actions and bring higher efficiency to their production environment.

Extended and Automated Color Management Tools – For color critical environments, PRISMAsync Print Server v5.2 brings new color controls that can be implemented on a job or system-wide basis, helping operators produce each job with high quality. From optimized black point compensation to special saturation rendering, operators can be confident a full range of tools for producing the best color are at hand.

In addition, with PRISMAsync v5.2 for the imagePRESS C10000VP/C8000VP, the presses’ Inline Spectrophotometric Sensors (ILS) can be used for color calibration and ICC output profile creation. Rather than relying on measuring color targets by hand, the imagePRESS C10000VP Series presses will be able to automatically print and measure color patches (including G7 targets), creating custom ICC output profiles in just a few minutes and with no operator intervention after initiation.

“We chose PRISMAsync to drive our imagePRESS color digital presses because G7 calibration is built into the RIP and there is no need for add-ons or third-party software,” said Brad Steven, IT/Digital Production Manager at Print-Tech, a G7 Master Qualified Printerin Ann Arbor,Michigan. “The efficiency and productivity of PRISMAsync print server and imagePRESS C10000VP is phenomenal. Our color calibration continues to be spot on. We are excited to implement the new release of PRISMAsync Version 5.2; it is expected to cut the time it takes to perform our in-RIP G7 calibration and color profiling nearly in half while assuring even greater consistency of measurement.”

New Scan/Copy Features – For copy/scan-intensive print operations such as in-plants, full support of Lightweight Directory Access Protocol (LDAP) search when scanning to email and a new simplified “Easy Copy” screen have been implemented, helping to bring new efficiencies to these environments. Furthermore, v5.2 enables user interface configuration by user role, allowing administrators to limit available settings and options for certain roles to better fit their operation’s workflow or task division.

PRISMAsync Print Servers are key components of the PRISMA Suite – Canon’s integrated suite of workflow essentials for production print. Designed to optimize the print production workflow from job submission to completion; enabling users to adapt, evolve and grow within ever-changing production print environments.

PRISMAsync Color Print Server v5.2 is now available through Canon Authorized Dealers and Canon Solutions America for imagePRESS C10000VP/C8000VP, imagePRESS C850/C750 and brings the relevant functionality in line with the PRISMAsync platform for varioPRINT monochrome digital presses. For current PRISMAsync users, Canon makes a strong effort to allow the field upgrades to keep the PRISMAsync feature and usability level aligned with newly sold devices. As such, version 5.2 is now also available for imagePRESS C800/C700 and imagePRESS C70xxVPS Series2.

The new PRISMAlytics Dashboard is scheduled to be available from October 2017.

For more information about Canon U.S.A., visit http://www.usa.canon.com.

About Canon U.S.A., Inc.

Canon U.S.A., Inc., is a leading provider of consumer, business-to-business, and industrial digital imaging solutions to the United States and to Latin America and the Caribbean markets. With approximately $29 billion in global revenue, its parent company, Canon Inc. (NYSE: CAJ), ranks third overall in U.S. patents granted in 2016. Canon U.S.A. is committed to the highest level of customer satisfaction and loyalty, providing 100 percent U.S.-based service and support for all of the products it distributes in the United States. Canon U.S.A. is dedicated to its Kyosei philosophy of social and environmental responsibility. In 2014, the Canon Americas Headquarters secured LEED Gold certification, a recognition for the design, construction, operations and maintenance of high-performance green buildings. To keep apprised of the latest news from Canon U.S.A., sign up for the Company’s RSS news feed by visiting http://www.usa.canon.com/rss and follow us on Twitter @CanonUSA. For media inquiries, please contact pr@cusa.canon.com.

Based on weekly patent counts issued by United States Patent and Trademark Office.

Availability and specifications are subject to change without notice. Prices are set by dealers and may vary.

All referenced product names, and other marks, are trademarks of their respective owners.

1PRISMAsync System Version 5.2, enablement of data transfer via the Web, PRISMAlytics license and Google or Microsoft account required to gain access to PRISMAlytics. Subscription to a third party service required. Google and Microsoft accounts are subject to Google’s and Microsoft’s terms and conditions, respectively. Neither Canon, Inc., nor Canon U.S.A., Inc. represents or warrants any third party product, service or feature referenced hereunder.

2PRISMAlytics Dashboard is not supported for imagePRESS C7000VPS Series/C7010VPS Series/C7011VPS Series.

Canon U.S.A. website: http://www.usa.canon.com

For sales information/customer support: 1-800-OK-CANON

View original content with multimedia:http://www.prnewswire.com/news-releases/canon-usa-advances-prismasync-color-print-server-in-version-52-offering-cloud-based-prismalytics-dashboard-and-additional-functionality-300515633.html

SOURCE Canon U.S.A., Inc.

http://www.usa.canon.com

See the original post here:
Canon USA Advances PRISMAsync Color Print Server in Version 5.2, Offering Cloud-Based PRISMAlytics Dashboard … – PR Newswire (press release)

Read More..

5 Reasons SD-WAN, 4G LTE Are Cloud Essentials – No Jitter

5 Reasons SD-WAN, 4G LTE Are Cloud EssentialsThese technologies provide critical WAN edge infrastructure for seamless and elastic connectivity to the cloud — and an optimal user experience.

These technologies provide critical WAN edge infrastructure for seamless and elastic connectivity to the cloud — and an optimal user experience.

Businesses of all sizes across many industries are embracing cloud-based IT solutions in lieu of traditional on-premises server deployments, but wide-area network (WAN) implications brought about by this transition aren’t immediately recognized.

Cloud-based applications for office automation, Web and video conferencing, file sharing, VoIP and collaboration — including Microsoft 365, Cisco Spark, Slack, Box, and others — are proliferating due to the reduced cost and complexity associated with rolling out and managing these services across a distributed enterprise.

However, unified communications- and other software-as-a-service (SaaS) applications create new demands on underlying WAN infrastructure, especially for remote branch sites. Two emerging WAN technologies make it easier for businesses to update their WAN infrastructures for the cloud era: software-defined WAN (SD-WAN) and 4G LTE.

Here are five reasons SD-WAN and 4G LTE provide essential capabilities for ensuring reliability and optimal performance of cloud-based applications:

In the cloud era, SD-WAN and 4G LTE technologies provide essential WAN edge infrastructure for seamless and elastic connectivity to the cloud — and an optimal user experience.

Read the original:
5 Reasons SD-WAN, 4G LTE Are Cloud Essentials – No Jitter

Read More..

Huawei ups its bet on cloud computing with broader support for Microsoft apps – GeekWire

Huawei and Microsoft executives sign an expanded cloud computing partnership. (Huawei Photo)

Huaweis bid to be a player in Chinas cloud computing scene got a little stronger Tuesday with the signing of a deal with Microsoft to host more of the software giants apps on its cloud.

Just five months into the making of Huaweis public cloud strategy, the two companies signed a deal that will see more of Microsofts enterprise technology software become available on Huaweis public cloud. Huawei launched its public cloud service in April with support for Windows Server and RDS (relational database service) for SQL Server, but customers running other Microsoft apps on-premises will now be able to take advantage of a cloud option for those apps through the new partnership.

Cloud computing in China is the domain of home-grown companies, with Alibaba as the countrys leading provider of cloud computing services. Baidu and Tencent are also going after cloud customers, while U.S. companies like Amazon Web Services and Microsoft operate their cloud services through a local subsidiary. The overall market is a little behind where the global cloud computing market is at the moment, but demand for cloud services in China is expected to surge over the next decade.

Microsoft and Huawei will cooperate on bringing new services to Huaweis customers, the two companies said in a statement. The announcement kicks off the Huawei Connect 2017 conference, which is being held in Shanghai.

Read the original here:
Huawei ups its bet on cloud computing with broader support for Microsoft apps – GeekWire

Read More..

How The Automotive Industry Is Leveraging Cloud Computing – CXOToday.com

The Volkswagen Group, the worlds second largest car manufacturer, is planning to use open-source cloud-computing platforms in order to build a private cloud to host websites for its brands Audi, VW, and Porsche. The company is also looking at a comprehensive platform for innovative automotive technology. In fact, VW officials debated for a long time over how to leverage the technology. The Group employs over 600,000 employees globally and of them, there are 11,000 who are internal IT experts.

They first plan to build private cloud to span the thousands of physical nodes across multiple data centers in the USA, Europe, and Asia. The automotive giant then eventually plans to build public cloud in order to create a hybrid cloud. The automobile giant has evolved from a car manufacturer to a global mobility provider and realizes the need to move away from traditional application development processes to those which are agile and can sustain rapid development. For new mobility services, Volkswagen will collect data, analyze it, and store it to make better products for its customers. These are real cases of digital transformation. Volkswagen is in fact one of the many automotive companies that are leveraging transformational technologies for a digital future.

Massive expansion predicted for cloud services globally

Cloud computing is one of the most disruptive forces facing the industry. According to the Bain & Company research report The Changing Faces of the Cloud, globally, the cloud IT market revenue is projected to increase to $390 billion in 2020 from $180 billion, translating into a compound annual growth rate (CAGR) of around 17%. The scale of change is mind-boggling.

The overall global public cloud market will mature, and its growth rate will slightly slow down from 17.2% in 2016 to a 15.2% increase in 2020, says Sid Nag, research director at Gartner. While Brexit and other growth challenges exist, some segments such as financial SaaS applications and the PaaS user markets will still see strong growth through 2020. As buyers intensify and increase IaaS activity, they will be getting more for their investment: ongoing enhancement of performance, more memory, more storage for the same money (which will drive increases in consumptions) and increased automation in traditional IT outsourcing (ITO) delivery, added Nag.

Cloud computing is radically changing the face of the automobile industry

The change is not cosmetic but radical in all aspects and could be truly transformational as it will power and define business processes and supply chains. These are companies genuinely trying to change everything: from the way their structure is managed to the products they sell.

We live in a world where innovation is the only constant. The world is witnessing unprecedented change driven by digital revolution. Everything is changing from how organizations function to how people work. Digital transformation is the buzzword across industries and cloud-based tech is leading that digitalization of processes and supply chains, said Shashank Dixit, CEO, Deskera, a global cloud provider.

Automotive companies are leveraging modern Cloud-computing platforms for creating Cloud native Applications, Operating System, the Internet of Things (IoT), devising a comprehensive software development methodologyall of which have the potential to literally transform it into a global powerhouse. As the company strives to explore new markets, it is overhauling everything that defines the core of its business and moving towards being a software services company, away from its hallmark of being a leading automaker. The bold move will perhaps lay the blueprint of how automobile enterprises of the future will keep reinventing themselves.

Read the rest here:
How The Automotive Industry Is Leveraging Cloud Computing – CXOToday.com

Read More..

Why You Should Be Encrypting Your Devices and How to Easily Do It – Gizmodo

Is the data on your phone or laptop encrypted? Should it be? And what does encrypting your data do to it anyway? Here well explain the ins and outs of encryption, and how you can make sure that everything in your digital life is safe from prying eyes.

Despite some of the complicated math involved, encryption isnt difficult to understandsimply put, it locks your files and data away using a secret code, just like a pair of spies might talk in code to hide what theyre really saying. If anyone else overhears that conversation, it sounds like gibberish, and its the same with encrypted files.

To make sense of encrypted data, you need the key to the code, which on your phone is often your PIN numberget past the lock screen, and your files and apps are no longer gibberish. Thats why being able to unlock an encrypted phone is so important to making sense of the data on it.

It applies to data we have stored on our devices and data we send through the air, to and from the internet. Apps with end-to-end encryption cant be spied on, much to the chagrin of law enforcement agencies and governments worldwide, and only the sender and intended recipient gets to see the real message.

You can go a long way down into the technical details of encryption, but it essentially just scrambles the data. The number of bits is often listed next to the type of encryption being used tell you how many possible combinations there are for the unlock codesomething locked with 256-bit encryption would take a bank of supercomputers billions of years to decode using brute force alone.

If the disk is not encrypted your device can easily be booted off a USB drive and the unencrypted data extracted, explains cybersecurity expert Professor Alan Woodward from the University of Surrey. You can even just take out the hard drive and mount it on another machine to examine data unless the disc is encrypted.

Different types of encryption algorithms have been developed for different purposes, with varying compromises between complexity and speed, though most of the time you wont have to worry about which flavor of encryption youre using (most of the time you just wont get a choice).

For example, the encryption on the iPhone is the 256-bit AES standard also used by the US military, which has the benefit of being both very speedy to apply and impossible to crack by running through the various unlock code combinations, as weve already pointed out.

If you do get a choice, Professor Woodward recommends looking for packages and encryption methods that have gone through some kind of public audit or independent testing to verify the methods used.

In some cases, such as the encryption supplied by Apple and Microsoft, you have little choice but to accept their assurances, but if using a third-party package look for audits, he told Gizmodo. Its the same as with secure messaging apps, its a sign of how robust the developers believe their system to be if they put it up for scrutiny.

If your data isnt encrypted, anyone who happens across your phone or laptop can get at the files within pretty easily; with encryption added, accessing the same data becomes very, very difficult (though not impossible, if other security loopholes can be found on the device). But do you need it in place if youre not carrying government secrets or company financials with you?

As security expert and Chief Technology Officer at IBM Resilient Bruce Schneier puts it in his blog: Encryption should be enabled for everything by default, not a feature you turn on only if youre doing something you consider worth protecting.

This is important. If we only use encryption when were working with important data, then encryption signals that datas importance. If only dissidents use encryption in a country, that countrys authorities have an easy way of identifying them. But if everyone uses it all of the time, encryption ceases to be a signal.

Even if you dont mind the thought of other people rifling through your folders of GIFs and angry letters to your Internet Service Provider, any device you own contains a wealth of information about you thats best kept private, from contacts to browsing histories.

Whether you think it worth doing is really whether you think your device has valuable data, says Professor Woodward. Youd be surprised what you do have: Contacts, emails, passwords. People underestimate the value of these to criminals. So, on the whole I think it is worth doing.

Youre building a wall between everything on your phone or computer, and anyone else who might want to look at it who isnt you. The good news is, encryption has become so important that a lot of devices now include it by default, so you dont necessarily need to do anything to stay protected.

iOS has been encrypting data for years, and encryption is now switched on by default in macOS as well: To check, open System Preferences, click Security & Privacy, then open the FileVault tab. If encryption isnt enabled, you can start the process here, and Apple has more information on its official support page.

After lagging behind iPhones for several years, just about all new Android devices are also now encrypted by default, as long as theyre running Android 6.0 Marshmallow or later. If your Android device isnt encrypted, and can be encrypted with its current OS version, then youll find the option by tapping the Security link in Settings.

That just leaves Windowssome PCs that ship with Windows 10 come with something called Device Encryption enabled, as long as you set it up and sign in with a Microsoft account. To check if this applies to you, from Settings click System then About and see if theres a Device Encryption section at the bottom.

If you dont have Device Encryption on your machine then the next option is BitLockerbut that requires upgrading to Windows 10 Pro. You may think the $100 is worth it, but free options, like the open source VeraCrypt, are available as well.

Were not going to go into too much detail about the data traveling to and from your devices, but encryption applies here toowith encryption in place, if someone should intercept the data going to or leaving from your computer, they wont be able to make sense of it.

A lot of apps apply encryption by default, and its also added when you connect to HTTPS sites such as Facebook, Gmail, Amazon and many others. Adding a password to your Wi-Fi network at home encrypts the data moving across it, and if youre using a public Wi-Fi network that anyone can access you should consider installing a VPN to encrypt your data and keep it scrambled.

Finally, its important to remember that nothing keeps your devices 100 percent protected, not even encryption (though it of course goes a long way towards doing that)dont think because your phone or laptop is encrypted you can become complacent about all the other precautions you need to put in place to stay safe.

Original post:
Why You Should Be Encrypting Your Devices and How to Easily Do It – Gizmodo

Read More..

Encryption Explained – Arizona Daily Wildcat

An indicator that a tool or system is working well, especially in programming, is that you never have to think about it. It can chug along in the background, without us giving it any attention. Imagine that using your refrigerator required an intimate understanding of endothermic reactions, or that opening it required a complete mechanical comprehension of how a compressor works.

Thankfully, it doesnt, and all we need to know is how to open and shut the door. The same goes for encryption.

Its likely that you used some form of encryption today. Whenever you log into a website, encryption protects your information while its sent to its destination. Most smart phones and computers also use some form of encryption to protect their contents. This encryption is what caused the controversy surrounding the FBIs demand for Apple to break into one of the San Bernardino shooters phones.

If it werent for encryption, services such as online banking and social media wouldnt exist, and while digital encryption is relatively new on the timeline of human existence, the practice of obfuscating communication is not.

Encryption grew out of cryptography, the art of writing and solving codes. Though various forms of cryptography have existed for thousands of years, one of the first and most recognizable forms of encryption was used by Julius Caesar. Dubbed the Caesar Cipher, it works by simply shifting all the letters in the alphabet by some fixed number.

RELATED:UA astronomers make observations on blinking brown dwarfs

So if the number is three, the letter “A” becomes “D,” “Y” becomes “B” and “HELLO” becomes “KHOOR”. To decrypt the message, you just shift all the letters back by three. Though this is a simple and specific example, it adheres to the main ideas of how encryption works.

Anything encrypted uses some variation of two main components, a cipher text and a key. The cipher text is the message after its been encrypted and the key is the algorithm used to turn the cipher text back into readable text. In the previous example, “KHOOR” was the cipher text and the number three was the key. Modern encryption algorithms hold trueo these two main concepts but are vastly more complex.

An encryption system is only as good as the number of possible keys to decrypt it. Being limited by the alphabet, the Caesar Cipher has just 25 possible keys, and a computer could try all 25 in the blink of an eye. As the popularity of computers grew, so did the need for encryption systems that are difficult for computers to crack.

Algorithms were needed that were difficult for a computer to solve, but easy for a computer to confirm that a provided solution was correct. One way this was achieved was by creating algorithms with so many possible keys that it would take an eternity for a computer to crack it.

Throughout the digital revolution, mathematicians and computer scientists employed various encryption methods until we arrived at two main schools of thought regarding encryption: symmetric and asymmetric cryptography.

In symmetric cryptography, the same key is used to encrypt and decrypt the cipher. This type of encryption is most often associated with computer hardware, such as encrypting your hard drive, because its simplicity makes it less resource-demanding and therefore more efficient.

RELATED:UA study finds distrust a unique phenomenon

Asymmetric encryption, also known as Public Key Cryptography, relies on two separate keys. The first is the public key, which is the key that can be safely shared with others to encrypt a message. The second key is the private key, which is the only thing that can decrypt something encrypted with the associated public key.

The basic idea is that I can send you my public key, which you use to encrypt a message that you send to me. I then use my private key to decrypt your message. This makes asymmetric encryption perfect for things such as authenticating passwords when you log into a website.

All major cryptographic systems today are in one of these two categories, though each category contains countless different encryption algorithms, each with strengths and weaknesses. An important way weaknesses are addressed is a principle by Claude Shannon, called Shannons Maxim. It states that “one ought to design systems under the assumption that the enemy will immediately gain full familiarity with them.” This essentially means that an algorithm should be able to be released to the public without this making it easier to be cracked.

As you can probably tell, theres a lot to be said about encryption and its role in our world today. These ideas are just the tip of the iceberg; theres still a great deal to be learned. As always, gaining a better understanding of how things work only stands to broaden our worldview as well as satisfy our curiosity. As our friend Claude Shannon once said, “I just wondered how things were put together.”

Follow Brian Winkler onTwitter

Here is the original post:
Encryption Explained – Arizona Daily Wildcat

Read More..

Black Hats, White Hats, and Hard Hats The Need for Encryption in Mining and Resources – Australian Mining

Mineral Blue announcesFedora, a socially responsible encryption system.

Are you concerned by criminals having access to strong encryption? Youre right to be worried. Modern encryption is virtually impossible for governments to crack. That means criminals can operate in secret.

At the same time, honest people need access to cryptography. Without it, every innocent transaction is at risk.

Governments routinely ask encryption providers to provide backdoors that enable them to decrypt ciphertext. This puts providers in a difficult position. Backdoors create weaknesses that can be exploited by a different set of criminals.

This may already be happening, without your knowledge.

Fedora solves this problem by providing secure private key access to the government of your choice from the outset.

Fedora is aimed at socially responsible businesses and individuals.

Fedora isopen source, andfree.

Fedora goes live on Google Play on January 1.

Mineral Blue is an advanced, cloud-based safe work system for the mining and resources industries.www.mineral.blue

To download this whitepaper, fill in and submit the form below:

See the original post:
Black Hats, White Hats, and Hard Hats The Need for Encryption in Mining and Resources – Australian Mining

Read More..

How can enterprises secure encrypted traffic from cloud applications? – TechTarget

A recent report found that cloud-based application use is driving up the use of SSL/TLS. What is the correlation…

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

between the two? Are there any drawbacks that network security teams should be aware of when it comes to increased SSL/TLS traffic?

With many applications being utilized in a SaaS model, it’s important to encrypt the traffic between end users and applications. When personal and sensitive data is transferred, processed or stored off local premises, the connections between these points need to be secured.

Many large websites default to SSL/TLS, increasing the encrypted traffic on the internet. This is a plus for data security, but malicious actors can and do take advantage of this encryption with their malware, spoofing and C2 servers. With organizations like Let’s Encrypt and Amazon Web Services, attackers use these flexible, well-designed and inexpensive technologies for malicious purposes. It’s for this reason that enterprises need to make monitoring of encrypted traffic and decryption appliances mandatory in networks.

The recent increase in SSL/TLS traffic within networks is cause for both delight and concern. The security community has seen the need for encryption, but so have malicious actors. From a network security standpoint, it’s important to be cautious when dealing with encrypted traffic. Its use is only going to grow from here, and the majority of internet traffic will move toward end-to-end encryption.

With this increased traffic, network security administrators should look for decryption methods for monitoring and visibility purposes. It’s one thing to understand where the traffic is destined to go — many companies are using this to alert them of known malicious IP addresses — but it’s a completely different thing to have the capability to review the complete packet data for risks outside the source and destination IP addresses.

Including SSL inspection hardware on encrypted traffic at choke points within a network for additional visibility should become a priority. However, doing so will increase overhead, so validate the current resources on the hardware and determine what increase in resources might occur.

Organizations rely on SaaS apps more than ever now, so there needs to be visibility into what’s being sent to these third-party providers. Another step organizations can take to increase their data governance around encrypted traffic is to use tools that enable visibility into encrypted traffic, and that also include data loss prevention functions to search for sensitive or malicious data being sent to SaaS apps. Cloud access security brokers are also in a growing field that can help organizations gain insight into their traffic.

When adding SSL inspection to your arsenal of security monitoring, be aware of how your appliance is encrypting outbound data. There were issues in the past with particular proxies re-encrypting the data with lower security standards than organizations were using — or thought they were using. Also, keep in mind that key management on the certifications being used for inspection should be handled carefully, as to not disrupt traffic during expirations.

Ask the expert:Want to ask Matt Pascucci a question about security?Submit your question nowvia email. (All questions are anonymous.)

Find out why HTTPS interception tools weaken TLS security

Learn why the lack of SSL traffic inspection poses a threat to enterprises

Check out the SSL VPN based on open source software

Go here to see the original:
How can enterprises secure encrypted traffic from cloud applications? – TechTarget

Read More..

Huawei Releases the New-Generation Intelligent Cloud Hardware Platform Atlas – Markets Insider

SHANGHAI, Sept. 6, 2017 /PRNewswire/ — Today at HUAWEI CONNECT 2017, Huawei released the new-generation intelligent cloud hardware platform – Atlas. Positioned for scenarios such as public cloud, artificial intelligence (AI), and high-performance computing (HPC), Atlas rides on the advantages of key technologies including heterogeneous resource pooling and intelligent orchestration to deliver new levels of hardware resource utilization and adapt more flexibly to service demands. As the result of Huawei’s Boundless Computing strategy, the Atlas platform makes Huawei well positioned to steer the infrastructure resource pool revolution.

With the rise of AI research and application, AI and cloud computing technologies will be integral to people’s daily lives. From applications such as safe city and smart manufacturing to autonomous driving, AI and cloud technologies are spreading. Meanwhile, pivotal to intelligence is having capabilities that allow numerous systems to process in real time the massive volumes of data generated from a world of full connectivity. For example, a city with 100,000 cameras installed can produce 100 billion car plate records and 1 trillion facial recognition records a year. It has become a tremendous challenge for traditional computing systems to deliver the required capabilities in order to process, query, and analyze data of such a high order of magnitude.

Built for the public cloud, AI, and HPC scenarios, the Atlas platform released by Huawei addresses the data processing challenges in the AI era. The Atlas platform is based on Huawei’s FusionServer G series heterogeneous servers. The FusionServer G series leverages technologies such as heterogeneous resource pooling and intelligent orchestration to pool resources like GPUs, HDDs, and SSDs, and provides hardware resources on demand to suit the needs of specific service models.

Atlas drives an over 50% higher resource utilization efficiency, and boosts performance by over 10x compared with the traditional x86 architecture, meanwhile slashing the hardware device types for customers. Additionally, Atlas can provision logical servers in different resource configuration ratios, and deploy the servers within seconds, significantly shortening the service rollout cycle while empowering customers with the flexibility to adapt to service changes.

“As the AI era is approaching, traditional hardware cannot meet the requirements on development of AI and cloud technologies,” said Qiu Long, President, IT Server Product Line, Huawei. “Positioned as a new-generation intelligent cloud hardware platform, Huawei’s Atlas pioneers heterogeneous resource pooling and intelligent orchestration technologies to bring resource utilization and performance to new high levels. Atlas is also the fruit of Huawei’s Boundless Computing strategy. Huawei has been inspired by the idea of making computing simple through continuous innovation, and keeps customers’ requirements in mind to build servers that are stable, reliable, and high-performing, to help customers better cope with the challenges for successful transformation in the AI and cloud era.”

Huawei has strategized Boundless Computing as a major step to building a better connected world. The Boundless Computing strategy advocates innovations around computing and leverages innovative chips, heterogeneous computing, and edge computing in order to push the traditional computing boundaries that used to be confined to CPUs, servers, and data centers. At HUAWEI CONNECT 2017, Huawei has released multiple brand new public cloud services based on the Atlas hardware platform, including GPU and FPGA cloud services, empowering AI applications with cloud capabilities and enabling customers to access heterogeneous computing services with more ease and speed.

Huawei servers and the entire IT product line have emerged to the global IT mainstream. Huawei delivers leading performance, and simplified and efficient IT infrastructure to help enterprises accomplish their digital transformation. So far, 197 companies on the Fortune Global 500 list and 45 companies in the Fortune Global 100 have chosen Huawei as their digital transformation partner.

HUAWEI CONNECT, Huawei’s flagship event for the global ICT industry, is taking place at the Shanghai New International Expo Centre from September 5-7, 2017 under the theme of “Grow with the Cloud”. At this global platform for open collaboration, Huawei together with its customers and partners will explore new growth opportunities through digital transformation. For more information, please visit http://www.huawei.com/en/events/huaweiconnect2017/

SOURCE Huawei

Read more here:
Huawei Releases the New-Generation Intelligent Cloud Hardware Platform Atlas – Markets Insider

Read More..