Page 3,804«..1020..3,8033,8043,8053,806..3,8103,820..»

Benefits of Kubernetes on bare metal cloud infrastructure – Ericsson

Cloud native technology and the role of CNCF

Lets start with a brief recap on cloud native and CNCF Cloud Native Computing Foundation. With the introduction of 5G, new use cases drive the need for designing applications based on containers and service-based architecture to address some technology gaps associated with virtualization. The most important technology gaps involve smoother software upgrades, automation and the realization of a CI/CD software pipeline to end customers.

In the center of cloud native technology development is CNCF, an open source community driving the adoption of the cloud native paradigm across industries by fostering collaboration between the industrys top developers, end users and vendors. Since CNCF is such a huge community, the focus on the telecom industry has been limited. But now with the formation of the Telecom User Group (A Special Interest Group) within CNCF, Ericsson has taken a leading role in telecom related discussions in the community.

The current industry trend is to deploy Kubernetes in virtual machines hosted on a virtualized platform within an NFVI solution. This deployment approach works well as an intermediate step for introducing cloud native applications, but deploying Kubernetes in virtual environments adds additional cost and complexity to the cloud infrastructure.

In order to further simplify the deployment of Kubernetes and to leverage the full benefits and efficiency promise of the cloud native technology, the underlying cloud infrastructure needs to be optimized. Thats why Ericsson recently launched a new cloud infrastructure solution optimized for cloud native applications.

The solution, Ericsson Cloud Native Infrastructure, is using a bare metal cloud native architecture which means that no virtualization layer is needed in the cloud stack. Instead, cloud native applications are deployed in containers running directly on the bare metal cloud, which results in a radical simplification of the network implementation. It is important to note that virtual network functions (VNFs) will be around for years to come, and they will continue to run on NFVI.

Ericsson Cloud Native Infrastructure enables a fully automated deployment of Kubernetes layer over bare metal servers without the need for an underlying virtualized layer. This evolution in NFVI is a huge step forward in simplifying the deployment and operations of telecom cloud native applications.

Ericsson estimates that the TCO savings for deploying Kubernetes on a bare metal compared to a virtualized infrastructure can be as high as 30 percent, depending on application and configuration. Ericsson Cloud Native Infrastructure will be available on the market later this year to support CSPs 5G and cloud native introduction. View this brief video about Ericsson Cloud Native Infrastructure summarizing the next step in cloud infrastructure evolution.

Watch the Telecom TV interview where Peter Wrndle, expert on NFV at Business Unit Digital Services at Ericsson discusses how far CSP's has come in adoption to cloud native technologies.

Go here to see the original:
Benefits of Kubernetes on bare metal cloud infrastructure - Ericsson

Read More..

Kneron Named to the 2020 CB Insights AI 100 List of Most Innovative Artificial Intelligence Startups – Yahoo Finance

Innovation leader honored for achievements in the on-device edge AI industry

Kneron, Inc., a leading on-device edge artificial intelligence (AI) company based in San Diego, California, was named by CB Insights to the fourth annual AI 100 ranking, showcasing the 100 most promising private AI companies in the world.

"To be listed on the AI 100 is an honor," stated Albert Liu, Knerons Cofounder and CEO. "It represents our determination to expand AI inferencing from the cloud to the edge so that private user data can be more secure, and edge AI devices and applications can be more ubiquitous in our everyday lives. Were excited and inspired to see our work being recognized by CB Insights."

Knerons on-device edge AI solutions include AI chips and AI software models that enhance smart devices with AI functions without the constant need to be connected to a cloud-based AI service because the AI inferencing happens where the data is collected. This greatly reduces the bandwidth needed to share vast amounts of private user data to be computed and stored in cloud servers and the possibility that the data can be compromised, leaked, or hacked.

With real solutions being employed by partners in the market already, Kneron is pioneering the growth of the on-device edge AI industry.

"It's been remarkable to see the success of the companies named to the Artificial Intelligence 100 over the last four years. The 2019 AI 100 saw 48 companies go on to raise $4.9B of additional financing and nine got acquired," said CB Insights CEO Anand Sanwal. "It has been gratifying to see that CB Insights' data-driven approach to identifying the top AI companies using patents, customer traction, investor quality, market sizing and more has become so effective at picking the AI winners of tomorrow. We look forward to seeing what the 2020 AI 100 companies will accomplish over the course of this year and beyond."

Through an evidence-based approach, the CB Insights research team selected the AI 100 from nearly 5,000 companies based on several factors including patent activity, investor quality, news sentiment analysis, proprietary Mosaic scores, market potential, partnerships, competitive landscape, team strength, and tech novelty. The Mosaic Score, based on CB Insights algorithm, measures the overall health and growth potential of private companies to help predict a companys momentum.

About Kneron

Kneron, established in San Diego in 2015, is a leading provider of on-device edge AI solutions. It is dedicated to the design and development of integrated software and hardware solutions for the smart home, smart surveillance, smartphones, personal computers, robots, drones, and other IoT devices. Their products include AI chips and AI models that accelerate on-device AI inferencing that enhance privacy and security. Knerons mission is to enable AI everywhere through their reconfigurable solutions that allows efficient processing of image and audio AI models of the present and future, and making affordable the adoption of on-device edge AI. Kneron's investors include Horizons Ventures, Qualcomm, Sequoia Capital, and more. To date, Kneron has received financing of US$73 million. For more information about Kneron, please visit http://www.kneron.com.

About CB Insights

CB Insights helps the worlds leading companies accelerate their digital strategy and transformation efforts with data, not opinion. Our Emerging Tech Insights Platform provides companies with actionable insights and tools to discover and manage their response to emerging technology and startups. To learn more, please visit http://www.cbinsights.com.

View source version on businesswire.com: https://www.businesswire.com/news/home/20200303005868/en/

Contacts

Jason Zhengjason.zheng@kneron.us

CB Insightsawards@cbinsights.com

Read the rest here:
Kneron Named to the 2020 CB Insights AI 100 List of Most Innovative Artificial Intelligence Startups - Yahoo Finance

Read More..

The Top 10 Best Cloud Storage Books You Need to Read in 2020 – Solutions Review

Sometimes, in order to advance technologically, its helpful to look at an old-school approach. Cloud storage is a great option for your organization, but you should first ensure that it is right for you and your team. While there are many free resources available online, (such as Solutions Reviews best practices articles,solutions directories,andbuyers guides), doing things the old-fashioned way can be beneficial. Solutions Review has taken the liberty of doing the research for you, having reviewed a multitude of books. Weve carefully selected the 10 best cloud storage books based on relevance, popularity, review ratings, publish date, and ability to add business value. Here they are in no particular order.

Cloud Storage Made Easy: Securely Backup and Share Your Files

By James Berstein

Cloud Storage Made Easy was written to help you get an understanding of what cloud storage is and how its used. The focus of this book is to get you up to speed on the concepts of cloud storage and the most popular home and small business cloud storage platforms so you can make an educated choice as to what cloud storage service will work best for you.

The History of Data Storage

By Larry Freeman

This book contains an in-depth look at the products and innovations that created the digital data storage industry we live in today. Suitable as an academic reference, it contains a first-person account of the past, present, and likely future trends in the data storage industry.

The Art of Capacity Planning: Scaling Web Resources in the Cloud

By Arun Kejariwal and John Allspaw

In their early days, Twitter, Flickr, Etsy, and many other companies experienced sudden spikes in activity that took their web services down in minutes. Today, determining how much capacity you need for handling traffic surges is still a common frustration of operations engineers and software developers. This hands-on guide provides the knowledge and tools you need to measure, deploy, and manage your web application infrastructure before you experience explosive growth.

Building a Future-Proof Cloud Infrastructure: A Unified Architecture for Network, Security, and Storage Services

By Silvano Gai

Network pioneer Silvano Gai demonstrates DS Platforms remarkable capabilities and guides you through implementing them in diverse hardware. Building a Future-Proof Cloud Architecture is for network, cloud, application, and storage engineers, security experts, and every technology professional who wants to succeed with tomorrows most advanced service architectures.

iCloud for Beginners: A Ridiculously Simple Guide to Online Storage

By Scott La Counte

Photos used to be relatively small, but as cameras have advanced, the size goes up. Most photos on your phone are several MB big. iCloud means you can keep the newest ones on your phone and put the older ones in the cloud. It also means you dont have to worry about paying for the phone with the biggest hard drivein fact, even if you have the biggest hard drive, theres a chance it wont fit all of your photos. This short book will help new users navigate their way around the cloud service.

Information Storage and Management: Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments

By EMC Education Services

This new edition of the unparalleled bestseller serves as a full training course all in one and as the worlds largest data storage company, EMC is the ideal author for such a critical resource. They cover the components of a storage system and the different storage system models while also offering essential new material that explores the advances in existing technologies and the emergence of the Cloud as well as updates and vital information on new technologies.

Database Cloud Storage: The Essential Guide to Oracle Automatic Storage Management

By Nitin Vengurlekar

Build and manage a scalable, highly available cloud storage solution. Filled with detailed examples and best practices, this Oracle Press guide explains how to set up a complete cloud-based storage system using Oracle Automatic Storage Management. Find out how to prepare hardware, build disk groups, efficiently allocate storage space, and handle security.Database Cloud Storage: The Essential Guide to Oracle Automatic Storage Management shows how to monitor your system, maximize throughput, and ensure consistency across servers and clusters.

Learning Microsoft Azure Storage: Build Large-Scale, Real-World Apps by Effectively Planning, Deploying, and Implementing Azure Storage Solutions

By Mohamed Waly

You will start this book with an introduction to Microsoft Azure storage and how it can be used to build large-scale, real-world applications using Azure storage services such as blob, table, queue, and file. This book will also teach you about the different types of Azure Storage. You will then find out the best practices for designing your Azure VM storage, whether it is Windows-based or Linux based and how to migrate your storage in different scenarios.

Data Storage Networking: Real World Skills for the CompTIA Storage+ Certification and Beyond

By Nigel Poulton

This book covers data storage from the basics to advanced topics, and provides practical examples to show you ways to deliver world-class solutions. In addition, it covers all the objectives of the CompTIA Storage+ exam (SG0-001), including storage components, connectivity, storage management, data protection, and storage performance.

Cloud Storage Forensics

By Darren Quick, Ben Martini, and Raymond Choo

Cloud Storage Forensics presents the first evidence-based cloud forensic framework. Using three popular cloud storage services and one private cloud storage service as case studies, the authors show you how their framework can be used to undertake research into the data remnants on both cloud storage servers and client devices when a user undertakes a variety of methods to store, upload, and access data in the cloud.

Tess Hanna is an editor and writer at Solutions Review covering Backup and Disaster Recovery, Business Process Management, and Talent Management. She aims to simplify the research process for IT professionals. You can contact her at thanna@solutionsreview.com

Related

Follow this link:
The Top 10 Best Cloud Storage Books You Need to Read in 2020 - Solutions Review

Read More..

Investing in as-a-service to light a SPARC under IT modernization – GCN.com

INDUSTRY INSIGHT

Federal IT teams are caught in a vicious modernization cycle. Theyre trying to follow the guidelines laid out by the Data Center Optimization Initiative and the Trump administrations Cloud Smart policy, which call for IT consolidation, optimization and cloud migration. Yet theyre also reliant -- both financially and technologically -- on established legacy systems, like Oracles Scalable Process Architecture server (SPARC). For years, theyve developed systems that are now costing agencies millions of dollars in maintenance fees.

In many cases, IT administrators keep investing in these older systems because they feel like they have no choice -- but now they do.

Instead of paying high maintenance costs or making a major capital commitment to rip and replace existing infrastructure, agencies can invest in as-a-service models that upgrade legacy systems and create a gateway toward a modern, multicloud future. In doing so, they can maximize performance and reduce costs over the long term.

Lets take a look at how agencies can upgrade their aging infrastructure and pave the way to a more cost-effective, consolidated and higher performing future. Well use SPARC as an example of how they can migrate from an outdated system to a modern, cloud-centric architecture.

A dwindling SPARC

SPARC was first introduced by Oracle in 1987 and has since become nearly ubiquitous in government circles. Agencies use the server to manage intensive applications and workloads, from system applications to enterprise resource planning and beyond. The thought of migrating these applications off of this infrastructure understandably gives these organizations pause -- they think its too expensive, too risky, too time-consuming.

But Oracle has already announced SPARCs end-of-life. Like any technology thats several decades old, agencies that are still using it pay a premium to maintain it. Fortunately, there is a better way for agencies to keep their mission focus and continue on the path toward modernization.

Rekindle SPARC with infrastructure as a service

Migrating to a private cloud, infrastructure-as-a-service (IaaS) model is an ideal option. With this model, agencies can upgrade to a modern, secure, reliable and flexible infrastructure that addresses their modernization needs without the disruption and cost associated with retrofitting. They wont need to rewrite code, upgrade their operating systems or experience downtime. They can eliminate technical and operational concerns while supporting the requirements of consolidation, optimization and the cloud.

The movement to an IaaS model can be done over time and in a modular fashion. Administrators can develop an interim upgrade strategy for critical legacy applications while they work on creating a long-term migration plan that will benefit their agencies over the next several years.

This approach lets them develop a strategic cloud model -- private, public, hybrid, or multicloud -- that best suits their unique needs. For instance, many organizations choose multicloud to solve their most complex IT challenges. IaaS can support multicloud initiatives by allowing agencies to auto-deploy applications with the proper configurations on the correct cloud platforms.

Ignite cost reductions

In addition to setting a path toward the future, upgrading from legacy SPARC to a consumption-based service can help agencies meet todays consolidation and optimization objectives.

IaaS can significantly reduce the need for expensive and space-consuming legacy hardware, thereby allowing agencies to save on resources. By migrating to an IaaS model, for example, agencies can save money on everything from cooling and power costs to maintenance bills. They wont have to worry about outdated technology or the usual three- to four-year technology refresh cycle that requires a significant investment.

Savings can then be allocated to initiatives that will add value to the agencys mission over the long haul. Operating expenses can be used to upgrade organizational infrastructure and invest in new initiatives, including the development of applications that can benefit warfighters and citizens.

Fan the flames of innovation

Building platforms that bridge the past, present and future requires a strong infrastructure. With IaaS, agencies can optimize their legacy applications, yet realize opportunities to innovate. They can create an ideal environment upon which they can leverage modern technologies like artificial intelligence, machine learning and more.

Agencies that adopt this approach will be able to enjoy far more flexibility than they have with their legacy architectures. They can turn resources on or off and shift suitable workloads to the right cloud while keeping other applications on-premises. And, they can significantly expedite the deployment of new services to support new government initiatives.

IaaS is a fiscally and technologically smart approach that can get agencies out of the modernization cycle and onto a smart path to their most effective cloud model.

About the Author

Rob Davies is executive vice president of operations at ViON.

Read the original:
Investing in as-a-service to light a SPARC under IT modernization - GCN.com

Read More..

Ampere Altra: Cloud computing ARM processor with 80 cores engraved in 7 nm, currently being tested by giants – Optocrypto

Ampere is a start-up to create a data center processor built on the foundations of Applied Micro Circuits. The company has now announced that it is able to outperform its competitors server processors, and these are the highest level ones available we are talking AMD Epyc and Intel Xeon Cascade Lake. Its 80-core Ultra-Arm processor which is built using the 7nm TSMC process is also expected to deliver performance at competitive levels with better efficiency. Trial versions of Ampere Altra 210W are already being sent to major companies such as Microsoft and Oracle and will be available as single- and dual-socket platforms. Mass production of the systems is planned for mid-2020.

Ampere Altra Arm 80-core process equipment is already being tested by the largest players in the market. Will this Stratup threaten Intel and AMD in the server market?

Renee James, founder, and CEO of Ampere is the former CEO of Intel. James says the new Ampere-Altra is designed to excel in cloud applications and extreme loads. In particular, Ampere Altra is considered the industrys first native 80-core cloud microprocessor. So that makes Ampere Altra different and a better choice for cloud computing than AMD Epyc or Intel Xeon.

According to the Ampere press release, the unique features of the cloud are very different from more traditional enterprise data center environments in terms of how it takes advantage of processing power, security, and energy efficiency. Atiq Bajwa, Amperes CTO and lead architect, provided some information about how Altra works.

Bajwa explained that Altras single-threaded Ampere cores and dense, energy-efficient servers can provide reliable, durable performance and a high level of isolation and security for each customer, regardless of what other tenants are running in these environments. The 64-bit ampere Ultra is based on the Arm Neoverse N1 platform.

Microsoft is evaluating amp systems in its laboratories for use in the Azure cloud. Meanwhile, Oracle plans to use ampere chips in its services and is optimizing most of its software, including Oracle Linux, Oracle Java, and Oracle Database, to run on Altra. Oracle has previously invested $40 million in amps. Amperes press release also lists other companies testing new processors, including Canonical, VMware, Lenovo, Micron and Gigabyte.

David is the chief editor, publicist, and marketer by profession at Optocrypto. He is a Passionist for the technological world and wants to aware of all the benefits of the latest technology.

The rest is here:
Ampere Altra: Cloud computing ARM processor with 80 cores engraved in 7 nm, currently being tested by giants - Optocrypto

Read More..

Micro server IC market is expected to reach USD 1.35 Billion by 2022, at a CAGR of 44.0% – Virtual-Strategy Magazine

In the present scenario, data traffic is continually rising, driving the demand for secure and reliable storage and processing of data. To accommodate this large data, companies are deploying new data centers or upgrading their existing data centers and developing hyperscale or mega data centers. Other major drivers for the growth of the market are low power consumption and space usage by micro servers, growing trend of cloud computing.

The global micro server IC market is expected to reach USD 1.35 Billion by 2022, at a CAGR of 44.0% between 2016 and 2022. In the present scenario, data traffic is continually rising, driving the demand for secure and reliable storage and processing of data. To accommodate this large data, companies are deploying new data centers or upgrading their existing data centers and developing hyperscale or mega data centers. Other major drivers for the growth of the market are low power consumption and space usage by micro servers, growing trend of cloud computing.

The medium sized organizations are adopting micro server ICs owing to their lower buying and installing cost. In addition, it is easy to upgrade the system if the load increases by simply increasing the server nodes. Thus, medium scale enterprise segment holds the largest market for micro server ICs. These organizations need to scale immediately whenever required to stay competitive in the market. Micro servers help such organizations to meet their IT requirements as they are easy to set up, use, and maintain without taking up a lot of space. They provide plenty of power, security, and expansion without requiring dedicated IT resources, which are imperative for medium enterprises.

Download Free PDF Brochure @

https://www.marketsandmarkets.com/pdfdownloadNew.asp?id=952

A data center is a facility used to house computer systems and associated components, such as telecommunications and storage systems. Micro servers are less expensive and consume less power and space than traditional enterprise-class rack servers. They can easily be grouped into clusters and are well suited for tasks that do not require multiple CPUs. The growing need for data centers in various business domains such as IT& telecom, banking, healthcare, agriculture, and government, among others would drive the data center application to grow at the highest CAGR during the forecast period.

The micro server IC market is expected to grow at the highest CAGR in APAC as countries such as India and China are witnessing huge technological advancements and the region is expected to witness many startups and business expansions in the coming years. Currently, the demand for application specific servers is huge. The main reason for this is the increasing need for data centers and cloud computing in fast developing economies such as India and China that still have a huge potential for internet connectivity. The application specific customization capability of micro servers provides a better option for data centers and cloud computing companies to use the micro servers as per the workload need. Thus, such features of micro servers would create huge demand for micro servers in the APAC region.

Media ContactCompany Name: MarketsandMarketsContact Person: Mr. Sanjay GuptaEmail: Send EmailPhone: 18886006441Address: 630 Dundee Road Suite 430City: NorthbrookState: IL 60062Country: United StatesWebsite: https://www.marketsandmarkets.com/Market-Reports/micro-servers-market-952.html

See the original post here:
Micro server IC market is expected to reach USD 1.35 Billion by 2022, at a CAGR of 44.0% - Virtual-Strategy Magazine

Read More..

How to Choose the Right Kubernetes Distribution – ITPro Today

So, you want to use Kubernetes to orchestrate your containerized applications. Good for you. Kubernetes makes it easy to achieve enterprise-scale deployments. But before you actually go and install Kubernetes, theres one thing you need to wrap your head around: Kubernetes distributions. In most cases, you wouldnt install Kubernetes from source code. Youd instead use one of the various Kubernetes distributions that are offered from software companies and cloud vendors.

Heres a primer on what a Kubernetes distribution is, and what the leading Kubernetes distros are today.

What Is Kubernetes?

Before talking about Kubernetes distributions, lets briefly go over what Kubernetes is. Kubernetes is an open source platform for container orchestration. Kubernetes automates many of the tasks that are required to deploy applications using containers, including starting and stopping individual containers, as well as deciding which servers inside a cluster should host which containers.

Kubernetes is only one of several container orchestrators available; other popular options include Docker Swarm and Mesos Marathon. But, for reasons I wont get into here, Kubernetes enjoys majority mindshare, and probably majority market share, too, when it comes to container orchestration.

What Is a Kubernetes Distribution?

As an open source project, Kubernetes makes it source code publicly and freely available on GitHub. Anyone can download, compile and install Kubernetes on the infrastructure of their choice using this source code. But most people who want to install Kubernetes would never download and compile the source code, for several reasons:

Most people turn to a Kubernetes distribution to meet their container orchestration needs. A Kubernetes distribution is a software package that provides a pre-built version of Kubernetes. Most Kubernetes distributions also offer installation tools to make the setup process simpler. Some come with additional software integrations, too, to help handle tasks like monitoring and security.

In this sense, you can think of a Kubernetes distribution as being akin to a Linux distribution. When most people want to install Linux on a PC or server, they use a distribution that provides a pre-built Linux kernel integrated with various other software packages. Almost no one goes and downloads the Linux source code from scratch.

What Are the Main Kubernetes Distributions?

Technically speaking, any software package or platform that includes a pre-built version of Kubernetes counts as a Kubernetes distribution. Just as anyone can build his or her own Linux distribution, anyone can make a Kubernetes distribution.

However, if you want a Kubernetes distribution for getting serious work done, there are several main options available:

Conclusion

To say that Kubernetes is a complex beast is to understate. Fortunately, Kubernetes distributions make it easy to take advantage of Kubernetes without all of the fuss and muss of setting up Kubernetes yourself from scratch. For most use cases, one of the Kubernetes distributions described above is the most practical way to get up and running with Kubernetes.

Read the rest here:
How to Choose the Right Kubernetes Distribution - ITPro Today

Read More..

Building IT Security Requires Improving Teams – Forbes

If youre looking to strengthen your businesss IT security, the solution includes the human factorand its not just about new hires.

Digital transformation can make almost any enterprise better. It brings together collaborators from around the world, draws smarter insights with the help of machine learning, and empowers businesses to become more responsive and innovative.

This combination of ubiquitous connectivity and cloud computing is changing how people workand the kinds of business strategies an enterprise can pursue.

As much as conversations about digital transformation can focus on finding the right kinds of programmers or data scientists, its equally important to emphasize that digital transformation requires the right kind of security professionals.

But when technology improves, enterprises aren't the only ones to experience innovation increases. Hackers and other bad actors can be pretty innovative too. This is one reason its hard to go more than a few weeks without seeing some new data breach, malware risk, or cybercrime in the headlines.

Successful digital transformation boils down to leveraging technology to produce business outcomes, which is a simple idea. But deploying, connecting, protecting, and maintaining those technologies can be enormously complex, making it easy to accidentally expose security vulnerabilities or to react too slowly to a sudden advance in attackers capabilities.

As much as conversations about digital transformation can focus on finding the right kinds of programmers or the right kinds of data scientists, its equally important to emphasize that digital transformation requires the right kind of security professionals.

According to the 2019 The Cybersecurity Workforce Gap report, 82% of employers report a shortage of cybersecurity skills, with 314,000 additional cybersecurity professionals needed as of January 2019.

The need for security professionals is not new. In fact, security is one of the fastest growing job fields, and not just in IT. According to the 2019 (ISC) Cybersecurity Workforce Study, going forward, there will be 10,000 cybersecurity professionals for every 100,000 U.S.-based establishments.

And yet, for all of this need, this CSIS survey showed that 82% of employers report a shortage of cybersecurity skills, with 314,000 additional cybersecurity professionals needed as of January 2019, despite the 716,000 such professionals already in the field.

Think about that: Its as if every single person in Denver were already working in IT security, but because the job is so big, we need everyone in St. Louis to pitch in as well. That is a huge need and a huge shortage.

So whats causing this shortfall? A large part of it is that the professionals in these roles are bogged down by manual work. Between patching servers, maintaining security infrastructure, updating security configurations, and collecting and analyzing data, theres hardly any time left to design proactive cybersecurity.

As with so many issues in the modern workplace, improvements to this people problem lie in the cloud. Most notably, cloud providers maintain and secure the underlying infrastructure,relieving you of some of the more time-consuming manual tasks of infrastructure management.

The cloud provides security by default with systems that simplify IT resource configuration, deployment, and operation throughout the organization. This frees security professionals to concentrate on tasks that are a better use of their time and skills, like designing and modifying security policies, auditing access to critical systems, classifying business-critical content, and investigating anomalous activity through a business lens.

But the cloud offers more than just time. Many cloud providers offer tools and guidance to help users secure their apps and data by letting security teams determine which data is sensitive, who should have access to what, and how to translate the organizations security and regulatory policy to controls. And since the cloud is exposed to users as software and APIs, automation becomes much simpler, resulting in more consistency at scale with fewer opportunities for human errors.

But the cloud offers more than just time. Many cloud providers offer tools and guidance to help users secure their apps and data by letting security teams determine which data is sensitive and who should have access to what. Moreover, since the cloud is exposed to users as software and APIs, automation becomes much simpler, resulting in more consistency at scale with fewer opportunities for human errors.

In addition to the people problem, modern security workforces also find themselves facing a skills problem. Security threats are always evolving, as are the solutions and tools, which means that many established security professionals cant keep up with the skills they need to detect and address new types of attacks. The longer it takes to find solutions, the more productivity may suffer across the organization.

On a deeper level, knowledge of the latest skills is essential to strong DevSecOps. The basic concept of DevSecOps is to build apps with security in mind from the start, rather than the traditional tactic of designing security in toward the end of development or bolting it on after systems and apps are built. Executing this requires a deep knowledge of security skills and tools that grows throughout the development process.

The cloud helps overcome these issues by providing access to the latest technological advancements and giving professionals access to the latest tools without the constant need to acquire and retrain.

Security professionals can also use the cloud to drive DevSecOps by embracing the best practices embedded into cloud-based tools. For example, Google Cloud offers vulnerability scanning, deploy-time controls, and configuration managementtools that underpin Googles own best practices for develop-and-deploy processes. With tools like these, security experts can set up strong security practices from the start that persist throughout the projects life cycle.

Learn more: This Google Cloud Next 19 session explores how enterprises can deliver software faster, without compromising security or reliability.

IT security is only going to become more essential as businesses rely more on technology for innovation and competitive advantage, and the need for professionals who are equipped for the challenge is going to grow as well.

Fortunately, with cloud-based security tools and a healthy amount of security by default, not only can security professionals continue to do their jobs effectively even as the landscape changes, but the next generation of experts will likely already be trained on cloud-based tools. That leaves the major people and skills problems in the IT landscape to those who havent taken advantage of the cloud.

Discover how the highest performers scale DevOps to maximize success. Get the latest Accelerate State of DevOps Report.

See the original post here:
Building IT Security Requires Improving Teams - Forbes

Read More..

‘You Cannot Break That’ HPE Says Of The iLO 5 Chip In Gen 10 Servers – CRN: Technology news for channel partners and solution providers

Allen Whipple, distributor business development channel consultant at Hewlett Packard Enterprise, had a simple question for a room full of MSPs.

Are your customers truly protected? he asked. I see all of your heads shaking no. A majority of them are not, right?

Whipple said HPEs claim that its Proliant servers are the worlds most secure industry standard server, is not marketing fluff.

We threw that tagline around all over the place. We mean it, he said, speaking at a breakout session sponsored by D&H Distributing at XChange 2020. When we first designed this server, we took it out to a third party and said Hack this computer. Tear it apart and tell us what you know. Theyre the ones that came back and said, Based on our research you have the worlds most secure industry-standard server. Based on what were seeing, you are two generations ahead of the competition.

He said for the Gen10 model, HPE stopped using third-party chip makers, choosing instead to make its iLO 5 chip itself, and infuse them with security at the point of manufacture.

We took those iLO 5 chips, we brought them in house and we made them layer upon layer out of silicon, he said. We took our HPE firmware and literally embedded it in that silicon. Its like surrounding it with concrete. What does that mean? Its beautiful. Its like a digital handshake. You cannot break that.

Whipple said that while firmware outside of the chip can still be hacked and ransomed, the iLO 5 chip will stay secure.

In the slim chance your Gen10 server is hacked, we are going to provide you with a way to recover your server in a matter of clicks or minutes, instead of days or weeks, he said, speaking specifically about the iLO 5 Advanced chip. You can set the server to check itself once every 24 hours. So once every 24 hours it is going to go and check all the firmware settings and make sure they are in an authentic state. Now if theyre not in an authentic state, its going to give you three options.

He said first, it will allow the user to restore to the last known good state within the previous 24 hours since it last checked.

That is critical, Whipple said. In less than 24 hours you not only can identify the event hack, but you can absolutely be back up and running to how you were before the hack occurred.

He said the second option is that the server will also allow a user to restore it to factory settings which, with VMware, will allow tech support to drop an image on to the system to get it back up and running. Option number three, meanwhile, will allow a user to take the server off line to preserve it for forensics in the event it needs to be used in a hacking investigation.

They can study it, they can look at it, they can see exactly how that ransomware was operating, he said.

The insurance company Marsh & McLennan awarded the server its Cyber Catalyst designation as a top security product calling it: Arguably a close-to-perfect solution. Security that is baked in at the bare metal hardware level is the standard that security risk management professionals should strive for. Marsh will offer discounted insurance rates to those selling Gen 10 servers, Whipple said.

MSPs in the room said they were anxious to return to their shops and get this rolled out everywhere.

We just switched to the HPE ProLiant Servers. Just learning about the iLO 5 Advanced was worth coming to this whole thing, said Jeff Willems, president of CSRA Technologies, an IT service provider to the U.S. military. To be able to roll something back 24 hours earlier if we have a problem, Im going to go back and challenge my guys: Lets get this rolled out everywhere we have ProLiant servers.

Christopher Alghini, the principal G Suite and Google Cloud consultant at Cool Head Tech in Austin, Tex., agreed.

I was very impressed with the iLO advanced chip, and I can see where it would work really well for government and enterprise server installations, he said. For a data center install, these would be perfect devices because of the security and I think also the speed. Even if the chip is breached, to have that evidence to go back to, I think is an excellent idea as well, so theres some recovery in there.

Read this article:
'You Cannot Break That' HPE Says Of The iLO 5 Chip In Gen 10 Servers - CRN: Technology news for channel partners and solution providers

Read More..

Chess Tournament has strong turnout | Schools – Overton County News

Livingston Academy hosted the Regional Individual Scholastics Chess Tournament for the Tennessee Chess Association on Saturday, Feb. 29. The tournament was open to all Tennessee students from kindergarten to 12th grade.

The event had a great turnout with more than 80 students registered to compete within Region 2.

The format for the tournament was to be played in 5 Round Swiss with the first two rounds lasting 30 minutes each and the last three rounds lasting 60 minutes each.

Thirteen students from Overton County competed in the tournament. Nine students were from Hilham Elementary School Aiden Barlow, Abbi Huckeby, Owen Johnson, Raven Johnson, Waylon Johnson, Sadie Moore, Haley Tidwell, Kenlee Thompson, and William Weaver.

Three students were from Wilson Elementary School Joshua Archbold, Luke Kostalek, and Triston Smith.

One student, Connor Mayercik, was from Livingston Academy.

SRO Ralph Mayercik, who played a huge role in the promotion of chess clubs in Overton County schools, said, Chess means the world to these kids, its all they want to do.

He stressed that chess is a sport anyone can play; its not like physical sports, it is for anyone who has the desire to play.

While the event was a great success, Mayercik hopes the community will be able to help spread the word about chess so more kids can get involved. Also, gaining a few more volunteers to assist with the chess clubs would be a plus too.

The State Individual Finals will be held Saturday, March 21 at Tennessee Technological University. In the individual finals, the top eight players from each section in each region may play. The champions from each section will earn the right to represent Tennessee at the U.S. Open in St. Louis, MO. Tennessee Technological University will also be awarding 4-year University Service Scholarships to the first and second place winners of the high school section.

Here is the original post:
Chess Tournament has strong turnout | Schools - Overton County News

Read More..