Page 22«..10..21222324..3040..»

5 Reasons SD-WAN, 4G LTE Are Cloud Essentials – No Jitter

5 Reasons SD-WAN, 4G LTE Are Cloud EssentialsThese technologies provide critical WAN edge infrastructure for seamless and elastic connectivity to the cloud — and an optimal user experience.

These technologies provide critical WAN edge infrastructure for seamless and elastic connectivity to the cloud — and an optimal user experience.

Businesses of all sizes across many industries are embracing cloud-based IT solutions in lieu of traditional on-premises server deployments, but wide-area network (WAN) implications brought about by this transition aren’t immediately recognized.

Cloud-based applications for office automation, Web and video conferencing, file sharing, VoIP and collaboration — including Microsoft 365, Cisco Spark, Slack, Box, and others — are proliferating due to the reduced cost and complexity associated with rolling out and managing these services across a distributed enterprise.

However, unified communications- and other software-as-a-service (SaaS) applications create new demands on underlying WAN infrastructure, especially for remote branch sites. Two emerging WAN technologies make it easier for businesses to update their WAN infrastructures for the cloud era: software-defined WAN (SD-WAN) and 4G LTE.

Here are five reasons SD-WAN and 4G LTE provide essential capabilities for ensuring reliability and optimal performance of cloud-based applications:

In the cloud era, SD-WAN and 4G LTE technologies provide essential WAN edge infrastructure for seamless and elastic connectivity to the cloud — and an optimal user experience.

Read the original:
5 Reasons SD-WAN, 4G LTE Are Cloud Essentials – No Jitter

Read More..

Huawei ups its bet on cloud computing with broader support for Microsoft apps – GeekWire

Huawei and Microsoft executives sign an expanded cloud computing partnership. (Huawei Photo)

Huaweis bid to be a player in Chinas cloud computing scene got a little stronger Tuesday with the signing of a deal with Microsoft to host more of the software giants apps on its cloud.

Just five months into the making of Huaweis public cloud strategy, the two companies signed a deal that will see more of Microsofts enterprise technology software become available on Huaweis public cloud. Huawei launched its public cloud service in April with support for Windows Server and RDS (relational database service) for SQL Server, but customers running other Microsoft apps on-premises will now be able to take advantage of a cloud option for those apps through the new partnership.

Cloud computing in China is the domain of home-grown companies, with Alibaba as the countrys leading provider of cloud computing services. Baidu and Tencent are also going after cloud customers, while U.S. companies like Amazon Web Services and Microsoft operate their cloud services through a local subsidiary. The overall market is a little behind where the global cloud computing market is at the moment, but demand for cloud services in China is expected to surge over the next decade.

Microsoft and Huawei will cooperate on bringing new services to Huaweis customers, the two companies said in a statement. The announcement kicks off the Huawei Connect 2017 conference, which is being held in Shanghai.

Read the original here:
Huawei ups its bet on cloud computing with broader support for Microsoft apps – GeekWire

Read More..

How The Automotive Industry Is Leveraging Cloud Computing – CXOToday.com

The Volkswagen Group, the worlds second largest car manufacturer, is planning to use open-source cloud-computing platforms in order to build a private cloud to host websites for its brands Audi, VW, and Porsche. The company is also looking at a comprehensive platform for innovative automotive technology. In fact, VW officials debated for a long time over how to leverage the technology. The Group employs over 600,000 employees globally and of them, there are 11,000 who are internal IT experts.

They first plan to build private cloud to span the thousands of physical nodes across multiple data centers in the USA, Europe, and Asia. The automotive giant then eventually plans to build public cloud in order to create a hybrid cloud. The automobile giant has evolved from a car manufacturer to a global mobility provider and realizes the need to move away from traditional application development processes to those which are agile and can sustain rapid development. For new mobility services, Volkswagen will collect data, analyze it, and store it to make better products for its customers. These are real cases of digital transformation. Volkswagen is in fact one of the many automotive companies that are leveraging transformational technologies for a digital future.

Massive expansion predicted for cloud services globally

Cloud computing is one of the most disruptive forces facing the industry. According to the Bain & Company research report The Changing Faces of the Cloud, globally, the cloud IT market revenue is projected to increase to $390 billion in 2020 from $180 billion, translating into a compound annual growth rate (CAGR) of around 17%. The scale of change is mind-boggling.

The overall global public cloud market will mature, and its growth rate will slightly slow down from 17.2% in 2016 to a 15.2% increase in 2020, says Sid Nag, research director at Gartner. While Brexit and other growth challenges exist, some segments such as financial SaaS applications and the PaaS user markets will still see strong growth through 2020. As buyers intensify and increase IaaS activity, they will be getting more for their investment: ongoing enhancement of performance, more memory, more storage for the same money (which will drive increases in consumptions) and increased automation in traditional IT outsourcing (ITO) delivery, added Nag.

Cloud computing is radically changing the face of the automobile industry

The change is not cosmetic but radical in all aspects and could be truly transformational as it will power and define business processes and supply chains. These are companies genuinely trying to change everything: from the way their structure is managed to the products they sell.

We live in a world where innovation is the only constant. The world is witnessing unprecedented change driven by digital revolution. Everything is changing from how organizations function to how people work. Digital transformation is the buzzword across industries and cloud-based tech is leading that digitalization of processes and supply chains, said Shashank Dixit, CEO, Deskera, a global cloud provider.

Automotive companies are leveraging modern Cloud-computing platforms for creating Cloud native Applications, Operating System, the Internet of Things (IoT), devising a comprehensive software development methodologyall of which have the potential to literally transform it into a global powerhouse. As the company strives to explore new markets, it is overhauling everything that defines the core of its business and moving towards being a software services company, away from its hallmark of being a leading automaker. The bold move will perhaps lay the blueprint of how automobile enterprises of the future will keep reinventing themselves.

Read the rest here:
How The Automotive Industry Is Leveraging Cloud Computing – CXOToday.com

Read More..

Why You Should Be Encrypting Your Devices and How to Easily Do It – Gizmodo

Is the data on your phone or laptop encrypted? Should it be? And what does encrypting your data do to it anyway? Here well explain the ins and outs of encryption, and how you can make sure that everything in your digital life is safe from prying eyes.

Despite some of the complicated math involved, encryption isnt difficult to understandsimply put, it locks your files and data away using a secret code, just like a pair of spies might talk in code to hide what theyre really saying. If anyone else overhears that conversation, it sounds like gibberish, and its the same with encrypted files.

To make sense of encrypted data, you need the key to the code, which on your phone is often your PIN numberget past the lock screen, and your files and apps are no longer gibberish. Thats why being able to unlock an encrypted phone is so important to making sense of the data on it.

It applies to data we have stored on our devices and data we send through the air, to and from the internet. Apps with end-to-end encryption cant be spied on, much to the chagrin of law enforcement agencies and governments worldwide, and only the sender and intended recipient gets to see the real message.

You can go a long way down into the technical details of encryption, but it essentially just scrambles the data. The number of bits is often listed next to the type of encryption being used tell you how many possible combinations there are for the unlock codesomething locked with 256-bit encryption would take a bank of supercomputers billions of years to decode using brute force alone.

If the disk is not encrypted your device can easily be booted off a USB drive and the unencrypted data extracted, explains cybersecurity expert Professor Alan Woodward from the University of Surrey. You can even just take out the hard drive and mount it on another machine to examine data unless the disc is encrypted.

Different types of encryption algorithms have been developed for different purposes, with varying compromises between complexity and speed, though most of the time you wont have to worry about which flavor of encryption youre using (most of the time you just wont get a choice).

For example, the encryption on the iPhone is the 256-bit AES standard also used by the US military, which has the benefit of being both very speedy to apply and impossible to crack by running through the various unlock code combinations, as weve already pointed out.

If you do get a choice, Professor Woodward recommends looking for packages and encryption methods that have gone through some kind of public audit or independent testing to verify the methods used.

In some cases, such as the encryption supplied by Apple and Microsoft, you have little choice but to accept their assurances, but if using a third-party package look for audits, he told Gizmodo. Its the same as with secure messaging apps, its a sign of how robust the developers believe their system to be if they put it up for scrutiny.

If your data isnt encrypted, anyone who happens across your phone or laptop can get at the files within pretty easily; with encryption added, accessing the same data becomes very, very difficult (though not impossible, if other security loopholes can be found on the device). But do you need it in place if youre not carrying government secrets or company financials with you?

As security expert and Chief Technology Officer at IBM Resilient Bruce Schneier puts it in his blog: Encryption should be enabled for everything by default, not a feature you turn on only if youre doing something you consider worth protecting.

This is important. If we only use encryption when were working with important data, then encryption signals that datas importance. If only dissidents use encryption in a country, that countrys authorities have an easy way of identifying them. But if everyone uses it all of the time, encryption ceases to be a signal.

Even if you dont mind the thought of other people rifling through your folders of GIFs and angry letters to your Internet Service Provider, any device you own contains a wealth of information about you thats best kept private, from contacts to browsing histories.

Whether you think it worth doing is really whether you think your device has valuable data, says Professor Woodward. Youd be surprised what you do have: Contacts, emails, passwords. People underestimate the value of these to criminals. So, on the whole I think it is worth doing.

Youre building a wall between everything on your phone or computer, and anyone else who might want to look at it who isnt you. The good news is, encryption has become so important that a lot of devices now include it by default, so you dont necessarily need to do anything to stay protected.

iOS has been encrypting data for years, and encryption is now switched on by default in macOS as well: To check, open System Preferences, click Security & Privacy, then open the FileVault tab. If encryption isnt enabled, you can start the process here, and Apple has more information on its official support page.

After lagging behind iPhones for several years, just about all new Android devices are also now encrypted by default, as long as theyre running Android 6.0 Marshmallow or later. If your Android device isnt encrypted, and can be encrypted with its current OS version, then youll find the option by tapping the Security link in Settings.

That just leaves Windowssome PCs that ship with Windows 10 come with something called Device Encryption enabled, as long as you set it up and sign in with a Microsoft account. To check if this applies to you, from Settings click System then About and see if theres a Device Encryption section at the bottom.

If you dont have Device Encryption on your machine then the next option is BitLockerbut that requires upgrading to Windows 10 Pro. You may think the $100 is worth it, but free options, like the open source VeraCrypt, are available as well.

Were not going to go into too much detail about the data traveling to and from your devices, but encryption applies here toowith encryption in place, if someone should intercept the data going to or leaving from your computer, they wont be able to make sense of it.

A lot of apps apply encryption by default, and its also added when you connect to HTTPS sites such as Facebook, Gmail, Amazon and many others. Adding a password to your Wi-Fi network at home encrypts the data moving across it, and if youre using a public Wi-Fi network that anyone can access you should consider installing a VPN to encrypt your data and keep it scrambled.

Finally, its important to remember that nothing keeps your devices 100 percent protected, not even encryption (though it of course goes a long way towards doing that)dont think because your phone or laptop is encrypted you can become complacent about all the other precautions you need to put in place to stay safe.

Original post:
Why You Should Be Encrypting Your Devices and How to Easily Do It – Gizmodo

Read More..

Encryption Explained – Arizona Daily Wildcat

An indicator that a tool or system is working well, especially in programming, is that you never have to think about it. It can chug along in the background, without us giving it any attention. Imagine that using your refrigerator required an intimate understanding of endothermic reactions, or that opening it required a complete mechanical comprehension of how a compressor works.

Thankfully, it doesnt, and all we need to know is how to open and shut the door. The same goes for encryption.

Its likely that you used some form of encryption today. Whenever you log into a website, encryption protects your information while its sent to its destination. Most smart phones and computers also use some form of encryption to protect their contents. This encryption is what caused the controversy surrounding the FBIs demand for Apple to break into one of the San Bernardino shooters phones.

If it werent for encryption, services such as online banking and social media wouldnt exist, and while digital encryption is relatively new on the timeline of human existence, the practice of obfuscating communication is not.

Encryption grew out of cryptography, the art of writing and solving codes. Though various forms of cryptography have existed for thousands of years, one of the first and most recognizable forms of encryption was used by Julius Caesar. Dubbed the Caesar Cipher, it works by simply shifting all the letters in the alphabet by some fixed number.

RELATED:UA astronomers make observations on blinking brown dwarfs

So if the number is three, the letter “A” becomes “D,” “Y” becomes “B” and “HELLO” becomes “KHOOR”. To decrypt the message, you just shift all the letters back by three. Though this is a simple and specific example, it adheres to the main ideas of how encryption works.

Anything encrypted uses some variation of two main components, a cipher text and a key. The cipher text is the message after its been encrypted and the key is the algorithm used to turn the cipher text back into readable text. In the previous example, “KHOOR” was the cipher text and the number three was the key. Modern encryption algorithms hold trueo these two main concepts but are vastly more complex.

An encryption system is only as good as the number of possible keys to decrypt it. Being limited by the alphabet, the Caesar Cipher has just 25 possible keys, and a computer could try all 25 in the blink of an eye. As the popularity of computers grew, so did the need for encryption systems that are difficult for computers to crack.

Algorithms were needed that were difficult for a computer to solve, but easy for a computer to confirm that a provided solution was correct. One way this was achieved was by creating algorithms with so many possible keys that it would take an eternity for a computer to crack it.

Throughout the digital revolution, mathematicians and computer scientists employed various encryption methods until we arrived at two main schools of thought regarding encryption: symmetric and asymmetric cryptography.

In symmetric cryptography, the same key is used to encrypt and decrypt the cipher. This type of encryption is most often associated with computer hardware, such as encrypting your hard drive, because its simplicity makes it less resource-demanding and therefore more efficient.

RELATED:UA study finds distrust a unique phenomenon

Asymmetric encryption, also known as Public Key Cryptography, relies on two separate keys. The first is the public key, which is the key that can be safely shared with others to encrypt a message. The second key is the private key, which is the only thing that can decrypt something encrypted with the associated public key.

The basic idea is that I can send you my public key, which you use to encrypt a message that you send to me. I then use my private key to decrypt your message. This makes asymmetric encryption perfect for things such as authenticating passwords when you log into a website.

All major cryptographic systems today are in one of these two categories, though each category contains countless different encryption algorithms, each with strengths and weaknesses. An important way weaknesses are addressed is a principle by Claude Shannon, called Shannons Maxim. It states that “one ought to design systems under the assumption that the enemy will immediately gain full familiarity with them.” This essentially means that an algorithm should be able to be released to the public without this making it easier to be cracked.

As you can probably tell, theres a lot to be said about encryption and its role in our world today. These ideas are just the tip of the iceberg; theres still a great deal to be learned. As always, gaining a better understanding of how things work only stands to broaden our worldview as well as satisfy our curiosity. As our friend Claude Shannon once said, “I just wondered how things were put together.”

Follow Brian Winkler onTwitter

Here is the original post:
Encryption Explained – Arizona Daily Wildcat

Read More..

Black Hats, White Hats, and Hard Hats The Need for Encryption in Mining and Resources – Australian Mining

Mineral Blue announcesFedora, a socially responsible encryption system.

Are you concerned by criminals having access to strong encryption? Youre right to be worried. Modern encryption is virtually impossible for governments to crack. That means criminals can operate in secret.

At the same time, honest people need access to cryptography. Without it, every innocent transaction is at risk.

Governments routinely ask encryption providers to provide backdoors that enable them to decrypt ciphertext. This puts providers in a difficult position. Backdoors create weaknesses that can be exploited by a different set of criminals.

This may already be happening, without your knowledge.

Fedora solves this problem by providing secure private key access to the government of your choice from the outset.

Fedora is aimed at socially responsible businesses and individuals.

Fedora isopen source, andfree.

Fedora goes live on Google Play on January 1.

Mineral Blue is an advanced, cloud-based safe work system for the mining and resources industries.www.mineral.blue

To download this whitepaper, fill in and submit the form below:

See the original post:
Black Hats, White Hats, and Hard Hats The Need for Encryption in Mining and Resources – Australian Mining

Read More..

How can enterprises secure encrypted traffic from cloud applications? – TechTarget

A recent report found that cloud-based application use is driving up the use of SSL/TLS. What is the correlation…

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

between the two? Are there any drawbacks that network security teams should be aware of when it comes to increased SSL/TLS traffic?

With many applications being utilized in a SaaS model, it’s important to encrypt the traffic between end users and applications. When personal and sensitive data is transferred, processed or stored off local premises, the connections between these points need to be secured.

Many large websites default to SSL/TLS, increasing the encrypted traffic on the internet. This is a plus for data security, but malicious actors can and do take advantage of this encryption with their malware, spoofing and C2 servers. With organizations like Let’s Encrypt and Amazon Web Services, attackers use these flexible, well-designed and inexpensive technologies for malicious purposes. It’s for this reason that enterprises need to make monitoring of encrypted traffic and decryption appliances mandatory in networks.

The recent increase in SSL/TLS traffic within networks is cause for both delight and concern. The security community has seen the need for encryption, but so have malicious actors. From a network security standpoint, it’s important to be cautious when dealing with encrypted traffic. Its use is only going to grow from here, and the majority of internet traffic will move toward end-to-end encryption.

With this increased traffic, network security administrators should look for decryption methods for monitoring and visibility purposes. It’s one thing to understand where the traffic is destined to go — many companies are using this to alert them of known malicious IP addresses — but it’s a completely different thing to have the capability to review the complete packet data for risks outside the source and destination IP addresses.

Including SSL inspection hardware on encrypted traffic at choke points within a network for additional visibility should become a priority. However, doing so will increase overhead, so validate the current resources on the hardware and determine what increase in resources might occur.

Organizations rely on SaaS apps more than ever now, so there needs to be visibility into what’s being sent to these third-party providers. Another step organizations can take to increase their data governance around encrypted traffic is to use tools that enable visibility into encrypted traffic, and that also include data loss prevention functions to search for sensitive or malicious data being sent to SaaS apps. Cloud access security brokers are also in a growing field that can help organizations gain insight into their traffic.

When adding SSL inspection to your arsenal of security monitoring, be aware of how your appliance is encrypting outbound data. There were issues in the past with particular proxies re-encrypting the data with lower security standards than organizations were using — or thought they were using. Also, keep in mind that key management on the certifications being used for inspection should be handled carefully, as to not disrupt traffic during expirations.

Ask the expert:Want to ask Matt Pascucci a question about security?Submit your question nowvia email. (All questions are anonymous.)

Find out why HTTPS interception tools weaken TLS security

Learn why the lack of SSL traffic inspection poses a threat to enterprises

Check out the SSL VPN based on open source software

Go here to see the original:
How can enterprises secure encrypted traffic from cloud applications? – TechTarget

Read More..

Huawei Releases the New-Generation Intelligent Cloud Hardware Platform Atlas – Markets Insider

SHANGHAI, Sept. 6, 2017 /PRNewswire/ — Today at HUAWEI CONNECT 2017, Huawei released the new-generation intelligent cloud hardware platform – Atlas. Positioned for scenarios such as public cloud, artificial intelligence (AI), and high-performance computing (HPC), Atlas rides on the advantages of key technologies including heterogeneous resource pooling and intelligent orchestration to deliver new levels of hardware resource utilization and adapt more flexibly to service demands. As the result of Huawei’s Boundless Computing strategy, the Atlas platform makes Huawei well positioned to steer the infrastructure resource pool revolution.

With the rise of AI research and application, AI and cloud computing technologies will be integral to people’s daily lives. From applications such as safe city and smart manufacturing to autonomous driving, AI and cloud technologies are spreading. Meanwhile, pivotal to intelligence is having capabilities that allow numerous systems to process in real time the massive volumes of data generated from a world of full connectivity. For example, a city with 100,000 cameras installed can produce 100 billion car plate records and 1 trillion facial recognition records a year. It has become a tremendous challenge for traditional computing systems to deliver the required capabilities in order to process, query, and analyze data of such a high order of magnitude.

Built for the public cloud, AI, and HPC scenarios, the Atlas platform released by Huawei addresses the data processing challenges in the AI era. The Atlas platform is based on Huawei’s FusionServer G series heterogeneous servers. The FusionServer G series leverages technologies such as heterogeneous resource pooling and intelligent orchestration to pool resources like GPUs, HDDs, and SSDs, and provides hardware resources on demand to suit the needs of specific service models.

Atlas drives an over 50% higher resource utilization efficiency, and boosts performance by over 10x compared with the traditional x86 architecture, meanwhile slashing the hardware device types for customers. Additionally, Atlas can provision logical servers in different resource configuration ratios, and deploy the servers within seconds, significantly shortening the service rollout cycle while empowering customers with the flexibility to adapt to service changes.

“As the AI era is approaching, traditional hardware cannot meet the requirements on development of AI and cloud technologies,” said Qiu Long, President, IT Server Product Line, Huawei. “Positioned as a new-generation intelligent cloud hardware platform, Huawei’s Atlas pioneers heterogeneous resource pooling and intelligent orchestration technologies to bring resource utilization and performance to new high levels. Atlas is also the fruit of Huawei’s Boundless Computing strategy. Huawei has been inspired by the idea of making computing simple through continuous innovation, and keeps customers’ requirements in mind to build servers that are stable, reliable, and high-performing, to help customers better cope with the challenges for successful transformation in the AI and cloud era.”

Huawei has strategized Boundless Computing as a major step to building a better connected world. The Boundless Computing strategy advocates innovations around computing and leverages innovative chips, heterogeneous computing, and edge computing in order to push the traditional computing boundaries that used to be confined to CPUs, servers, and data centers. At HUAWEI CONNECT 2017, Huawei has released multiple brand new public cloud services based on the Atlas hardware platform, including GPU and FPGA cloud services, empowering AI applications with cloud capabilities and enabling customers to access heterogeneous computing services with more ease and speed.

Huawei servers and the entire IT product line have emerged to the global IT mainstream. Huawei delivers leading performance, and simplified and efficient IT infrastructure to help enterprises accomplish their digital transformation. So far, 197 companies on the Fortune Global 500 list and 45 companies in the Fortune Global 100 have chosen Huawei as their digital transformation partner.

HUAWEI CONNECT, Huawei’s flagship event for the global ICT industry, is taking place at the Shanghai New International Expo Centre from September 5-7, 2017 under the theme of “Grow with the Cloud”. At this global platform for open collaboration, Huawei together with its customers and partners will explore new growth opportunities through digital transformation. For more information, please visit http://www.huawei.com/en/events/huaweiconnect2017/

SOURCE Huawei

Read more here:
Huawei Releases the New-Generation Intelligent Cloud Hardware Platform Atlas – Markets Insider

Read More..

HPE Reports Q3 Gains Along With Cloud Deal – EnterpriseTech

Alumni/Shutterstock

Hewlett Packard Enterprise reported better-than-expected earnings for its third quarter ending July 31 despite what it described as continued “commodities cost pressures” related to tighter memory supplies for servers. It also announced a cloud acquisition.

The hybrid IT specialist also reported unexpected gains in its server business as its “pivots” beyond the datacenter to greener pastures such as HPC while mapping its strategy in the emerging all-flash storage market.

CEO Meg Whitman also addressed reports she was in the running to head the ride-share service Uber, acknowledging interest in the position but declaring she would remain as head of HPE.

The company reported third quarter revenues totaling $8.21 billion, ahead of analysts’ estimate of about $ $7.5 billion. The company (NYSE: HPE) also exceeded its earnings-per-share target while operating margins rose sequentially.

The results also reflect completion of the “spin-merge” of its enterprise software business to U.K. vendor Micro Focus. HPE stock jumped 5 percent in response to the quarterly results, and is up 3 percent since the beginning of the year.

As it exits the application software business to focus on systems software used in datacenters and cloud deployments, Whitman said future acquisitions in area such as storage would focus on “organic growth.” To that end, the company announced earlier in the day it is acquiring the consulting firm Cloud Technology Partners.

Founded in 2010, the “cloud agnostic” consulting firm helps customers determine the appropriate environment for running specific workloads. Whitman said the acquisition strengthens HPE’s “hybrid IT” approach that spans datacenters, public and private clouds as well as systems software.

Asked whether the service would draw customers away from its on-premises IT services to public clouds, Whitman replied. “We will add our expertise with [on-premises] private cloud” and the acquisition is “an opportunity to scale that practice.” She added: “There are some workloads that customers probably should move to a public cloud. Microsoft (NASDAQ: MSFT) Azure is HPE public cloud partner.

Whitman and Tim Stonesifer, HPE’s chief financial officer, made frequent references to the impact of what Stonesifer called “ongoing commodities pressure” related to tight supplies of DRAMs used in servers.

“We continue to see commodities pressure,” Stonesifer noted, adding that the company expects rising memory prices at least through the end of this year. HPE reportedly plans to raise its server memory prices by 20 percent in response to accelerating adoption of higher density memory modules. Tightening supplies for server memories also is being driven by increased for DDR4 memory modules as new platforms such as Intel’s (NASDAQ: INTC) Skylake-SP, or “Purley” are introduced.

As DRAM supplies tighten, memory prices have risen between 5 and 10 percent. “We’ll see what happens with commodity prices,” Whitman said.

Meanwhile, HPE’s overall server business grew during the third quarter, and its expects to gain market share in its core datacenter business while “pivoting” to higher-end markets such as HPC.

“We are cautiously optimistic about our server business,” Whitman added, especially with blade and next-generation servers “with security built into servers at the chip level.”

In the competitive storage business, HPE touts the introduction of all-flash arrays in its 3Par storage line along with its recent acquisition of all- and hybrid flash array provider Nimble Storage. Competitors such Dell EMC also are rolling out all-flash storage options while targeting their existing customer bases. “We have to go mine our installed base” as competitors have, Whitman said. “This is a fundamental [technology] in the datacenter.”

As for her dalliance with Uber, Whitman said: “In the end, it wasn’t the right thing,” adding, “I actually am not going anywhere.”

Related

About the author: George Leopold

George Leopold has written about science and technology for more than 25 years, focusing on electronics and aerospace technology. He previously served as Executive Editor for Electronic Engineering Times.

Read the original:
HPE Reports Q3 Gains Along With Cloud Deal – EnterpriseTech

Read More..

Melbourne Server Hosting Renamed to iomart – Web Host Industry Review

Five years after acquiring Manchester-based Melbourne Server Hosting, iomart Group is renaming it to iomart to promote a wider range of services to businesses in the Manchester area and across northwest England, according to a Monday announcement.

Melbourne Server Hosting has billed itself as a web host for e-commerce and digital agencies, while iomarts services also include designing, building, and managing physical and virtual platforms, and hybrid and cloud-based environments.

As of the announcement, Melbournes websitedirects visitors to iomart.com to find out more about the wide range of managed hosting and cloud services we offer.

We believe the time is right to change the name to iomart to reflect the increased capabilities we can offer in all areas of digital transformation, said iomart Manchester Sales Director Rob Grimshaw. iomart doesnt sell one type of hosting, we offer a vast range of products and services backed by industry-leading technical expertise to help with whatever IT challenges you are facing. By focusing on the iomart brand we can take this clear message to the whole of the north west.

The 2012 deal brought iomart to the Northern England market for a reported $11 million. That was the first in a series of acquisitions by the Glasgow-based iomart, which culminated in an 11 million deal for United Hosting in late 2015.

iomart also announced Tuesday it has been named a finalist for Mid-Market Business of the Year by Lloyds Bank National Business Awards.

Original post:
Melbourne Server Hosting Renamed to iomart – Web Host Industry Review

Read More..