Page 768«..1020..767768769770..780790..»

Check out our latest solutions for AI, cloud, telco, and more at the … – ASUS Edge Up

Since its inception in 2011, the Open Compute Project (OCP) has challenged us to develop hardware that makes the benefits of open source and open collaboration real and accessible for our data center customers. For the 2023 OCP Global Summit, were ready to share our latest efforts for green and sustainable modular data center operation, as well as our all-new solutions for enterprise-grade generative AI.

Our theme for the OCP Global Summit is Solutions Beyond Limits were eager to show you how ASUS products empower AI, cloud, telco and more. Read on for a sneak peek at what we have planned for OCP 2023.

ASUS servers combined with Modular Data Center Solution products from partner Rakworx address high-capacity demands while minimizing infrastructure cooling requirements, making it an ideal choice for small and medium deployments in diverse environments for simplified deployment of edge and on-premises applications. Its exceptional versatility makes it the go-to solution for scenarios that require utmost efficiency and reliability.

With ASUS server systems, you can choose from a wide range of versatile, resilient, and scalable rack units designed for diverse workloads in data-center environments of all sizes. At the OCP Global Summit 2023, well be showcasing some of our latest designs:

TWSC is a subsidiary of ASUS which provides AI Foundry Service (AFS), featuring a world-leading AI supercomputing cloud platform to help customers establish tailored generative AI (GAI) solutions. AFS is a one-step solution for large-language modeling (LLM), from fine-tuning to deployment. Users can deploy fine-tuned models on Taiwan Computing Cloud (TWCC) or on-premise datacenters with AFS appliances. Enterprises are thus able to deploy their own trustworthy AI on an ASUS GPU server as an integrated appliance in an environment that enterprises can fully manage. AFS empowers enterprises to effectively and efficiently implement GAI solutions without starting from scratch, potentially slashing the cost of GAI IT investment and setup by millions of US dollars.

As an infrastructure solution partner, ASUS offers a complete portfolio of products ready to help enterprises increase their agility through digital transformation, boost employee engagement with flexible digital tools, and protect your assets through enterprise-grade security and comprehensive system protection.

We hope youll give us the opportunity to demonstrate our latest innovations and optimized designs for the open compute community. Visit us at booth A6 at the OCP Global Summit between October 17 and October 19, 2023 at the San Jose McEnery Convention Center. Click here for information on registering for the event we look forward to meeting you.

To schedule a meeting or get more information about our demo products, contact your local ASUS representative or email us at ESBU_Sales@asus.com.

See the original post:
Check out our latest solutions for AI, cloud, telco, and more at the ... - ASUS Edge Up

Read More..

Ten key cloud industry trends in 2023 – IT World Canada

The cloud computing industry is on the cusp of a major transformation, driven by artificial intelligence (AI), multicloud adoption, and industry-specific cloud solutions. These trends are shaping a more complex cloud landscape, but they also offer new opportunities for businesses to innovate and grow.

According to a report by Forrester Research, the AI boom is creating chaos as every cloud provider promotes new services. This abundance of options is challenging enterprises to develop coherent AI strategies. However, embedded AI is also making operations smarter, with technologies like observability, predictive analytics, conversational interfaces and automation. Both cloud vendors and enterprises are infusing AI across monitoring, management and support functions.

WebAssembly (WASM) is emerging as the future of cloud-native applications. WASM is a low-level bytecode that can be executed on any platform, including cloud servers, edge devices, and web browsers. This makes it ideal for developing portable and scalable applications.

With the release of a new server environment standard, WASM is now positioned as a universal application platform. This means that developers can build WASM applications once and deploy them anywhere, without having to worry about underlying hardware or operating system differences.

Also, governments around the world are increasingly enacting digital sovereignty regulations that restrict where data can be stored and processed. This is complicating cloud strategies for enterprises, which must now re-evaluate their supply chain reliance and ensure that their cloud providers comply with all applicable regulations.

In addition, as more workloads shift to the cloud, hardware vendors are pivoting to subscription models to offset declining product sales. This is a win-win for both vendors and customers, as it allows vendors to generate recurring revenue and customers to avoid upfront capital costs.

Cloud cost optimization, also known as FinOps, is seeing renewed interest as businesses seek to rein in their cloud spending. FinOps is a discipline that combines financial management with cloud computing to help businesses optimize their cloud costs.

Multicloud networking also remains an underserved issue, but the convergence of multicloud with zero trust edge (ZTE) architectures offers new hope. ZTE is a security-focused networking approach that can help businesses connect their data centers, clouds, and remote locations securely.

The cloud security ecosystem is advancing to meet the needs of cloud-native enterprises. Cloud vendors and security providers are offering new and innovative solutions to protect data, applications, and workloads in the cloud. Industry-specific clouds are gaining ground as businesses seek specialized solutions to address their unique vertical problems. These clouds are typically led by global systems integrators (GSIs) and offer a range of features and services tailored to specific industries.

Managed service providers (MSPs) are shifting their focus to advisory-led transformations as businesses move to the cloud. MSPs are now helping businesses to develop and implement cloud strategies, as well as to manage their cloud environments once they are in place.

The cloud computing industry is undergoing a major transformation, driven by AI, multicloud, and industry-specific cloud solutions. These trends are creating a more complex cloud landscape, but they also offer new opportunities for businesses to innovate and grow.

The sources for this piece include an article in DataCenterKnowledge.

View original post here:
Ten key cloud industry trends in 2023 - IT World Canada

Read More..

A proactive approach to cybersecurity in Asean – The Manila Times

THE acceleration in the adoption of cloud technology has revolutionized the business landscape, and, in doing so, significantly altered the cybersecurity ecosystem.

The vast potential of cloud technology, such as its scalability, adaptability and cost-effectiveness, has not gone unnoticed by nefarious entities seeking opportunities for exploitation. As businesses across Asean continue their transition to the cloud, they are increasingly confronted with escalating incidents of data breaches, ransomware attacks, and insider threats.

Therefore, it's vital for organizations to devise and implement a robust cloud-specific incident response plan. Such a plan could help minimize the impact of security incidents, accelerate recovery time, and ensure optimal data protection in this rapidly evolving digital space.

Cloud Incident Response (IR) today needs to grapple with a radically different set of challenges, including data volume, accessibility, and the speed at which threats could multiply within cloud architectures. The interplay of various components, such as virtualization, storage, workloads, and cloud management software, intensifies the complexity of securing cloud environments.

That being said, Cloud IR cannot be done in isolation of the company's overall incident response activities and business continuity plans. When possible, cloud security tools should use the same SOC, SOAR, and communication tools currently being used to secure other company elements. Using the same infrastructure ensures that suspicious and threatening cloud activities receive an immediate and appropriate response.

Creating an effective response plan involves understanding and managing the unique cloud platforms, being fully aware of data storage and access, and adeptly handling the dynamic nature of the cloud. Specifically:

Managing the cloud platform. The administrative console, the control center of each cloud platform, facilitates the creation of new identities, service deployment, updates and configurations impacting all cloud-hosted assets. This becomes an attractive target for threat actors, considering it offers direct access to the cloud infrastructure and user identities.

Understanding data in the cloud. The cloud hosts data, apps and components on external servers, making it crucial to maintain correct configurations and timely updates. This is vital not just to prevent external threats, but also to manage internal vulnerabilities, such as misconfigurations, given the inherent complexity and size of cloud networks.

Handling a dynamic cloud. The cloud is a dynamic space requiring security teams to remain agile and maintain visibility across all services and apps. A lack of familiarity with the environment could lead to an overwhelming volume of data, potentially slowing down threat-hunting, triage, and incident investigation processes.

Cloud computing presents new security challenges requiring a more robust and nuanced incident response plan, focused on cloud-specific risks. This includes identifying, analyzing and responding to security incidents within a cloud environment to maintain data confidentiality, integrity and availability. Such a plan could shield businesses from financial loss, protect their reputation, and maintain regulatory compliance.

Establishing a well-defined, routinely tested, and updated plan could effectively reduce the impact of security incidents and foster swift recovery after an attack. It should comprise procedures for responding to various incidents, like data breaches, DDoS attacks, and malware infections, including steps for incident containment, investigation and recovery using tools that are already being deployed by the company.

Mastering cloud IR begins with a thorough risk assessment, identifying potential threats, vulnerabilities and risks to the cloud environment. Security teams must thoroughly understand their cloud infrastructure to effectively defend it, considering factors like data sensitivity, legal requirements, access controls, encryption, network security and third-party risks.

Data and tool availability is a key factor in accelerating a security team's progress during an active security event. Deploying real-time monitoring of cloud resources, network traffic analysis, user activity tracking, intrusion detection systems and automated alerts could ensure swift incident identification and response.

Cloud IR demands efficiency and effective communication. Having pre-set processes and playbooks, defining roles and responsibilities, and maintaining clear communication between team members are essential elements of a Cloud IR strategy. Regular drills and simulations to test the IR plan and improve upon it are vital for optimal incident response.

In conclusion, as businesses in the Asean region increasingly embrace cloud technologies, the need for a well-defined cloud IR plan has never been more crucial. By efficiently identifying signs of cloud-based threats, mitigating breaches and limiting or eliminating damage, organizations could secure their cloud infrastructures, enhance their response processes, and reduce time to resolution.

Evan Davidson is the vice president for Asia Pacific and Japan at SentinelOne, an American cybersecurity company that uses AI-based protection for enterprises.

View post:
A proactive approach to cybersecurity in Asean - The Manila Times

Read More..

Nutanix, Cisco say buyers will get the best of them both – The Register

Cisco has become Nutanix's closest hardware partner meaning integration of the hyperconverged upstart's stack and Cisco's UCS servers will be stronger, sooner, as their partnership gathers steam.

The two announced a "strategic partnership" in August, when Cisco revealed it would resell Nutanix's stack on its UCS servers. A few weeks later, the real reason for the partnership became plain: Cisco discontnued its Hyperflex hyperconverged stack, and anointed Nutanix as its preferred vendor of such software.

The Register chatted to reps of the happy couple about their relationship this week. Nutanix's senior veep of product management, Thomas Cornely, told us that his company and Cisco have a "much deeper tech partnership in terms of early engagement" compared to other hardware makers.

That matters because while Nutanix started life bundling its stack with hardware, it backed away from that position years ago and now partners with server makers. That arrangement means it needs to tune its stack to work with each vendor's hardware. Earlier access to Cisco kit and closer work should make UCS an appealing prospect.

So might planned integration between Nutanix's stack and Cisco's Intersight cloud manager a work in progress that Jeremy Foster, Cisco's senior veep and general manager for networking and compute, said could mean "We can bring a network in a way that has never been integrated before."

The two haven't had time for the fruits of those labors to ripen, but Cornely and Foster told The Register they believe the team-up is already functional, as each vendor has partners familiar with both parties' technologies.

Those partners, they opined, are excited to sell Nutanix on UCS and capable of doing so. Other partners will be trained in due course.

Foster said in future, Cisco hopes the tie-up will help the networking giant to sell UCS servers for more storage workloads. Cisco has dabbled in storage over the years, but stopped well short of producing dedicated hardware. The UCS S-Series storage servers, which can house up to 56 disk drives, are probably the closest thing to a storage array Cisco has ever built.

For now, Cisco and Nutanix's arrangement focuses on the X-series blade server. But Cornely told The Register Nutanix certainly likes the look of the S-Series and sees them as good fit for the vendor's recent disaggregation of compute and storage nodes.

Foster forecast the evolving Ciscanix relationship will soon be championed by global system integrators. He also thinks managed services providers are a fine target for the alliance, with Nutanix-as-a-service or Nutanix-powered clouds in prospect.

View post:
Nutanix, Cisco say buyers will get the best of them both - The Register

Read More..

Axiado and Wiwynn Forge Alliance to Pioneer Cutting-Edge OCP Recognized Servers – Yahoo Finance

Initial Collaboration Project Features Wiwynn's OCP Accepted Yosemite V3-Based Server Platform Powered by Axiado's Trusted Control/Compute Unit

SAN JOSE, Calif. and TAIPEI, Taiwan, Oct. 10, 2023 /PRNewswire/ -- 2023OCP Global Summit Axiado Corporation, an AI-enhanced hardware cybersecurity company, and Wiwynn, a leading cloud IT infrastructure provider that designs and manufactures advanced server and storage solutions for data centers, today unveiled their partnership to revolutionize the landscape of server technology. This collaboration opens the door to a new era in data center security by developing servers powered by Axiado's innovative Trusted Control/Compute Units(TCUs).

Axiado (PRNewsfoto/Axiado)

"Platforms such as Wiwynn's OCP Accepted Yosemite V3, a high-density, multi-sled system, provide a launching pad for players that seek to innovate and leverage the momentum behind highly modular systems that are essential to meet changing workload requirements," said Bijan Nowroozi, CTO of OCP. "Wiwynn and Axiado jointly push the boundary with new features in platform security based on an approved OCP specification."

Leveraging the Open Compute Project's (OCP) open-source multi-node "Yosemite V3" server specification, the collaboration aims to develop a groundbreaking solution that combines the strengths of both companies. The forthcoming TCU-based servers will not only leverage the capabilities of the preexisting service platform but also contribute to the seamless and efficient management of data centers with its integrated platform root of trust (PRoT) and hardware-anchored, AI-driven platform security. The partnership signifies a convergence of security and performance to address the evolving needs of the cloud service provider (CSP) industry.

Axiado's TCUs incorporate a blend of AI, data collection, and software within a compact, power-efficient system-on-chip (SoC). This single-chip solution includes real-time and proactive AI capabilities for preemptive threat detection and comprehensive protection through a dedicated coprocessor. It also seamlessly integrates the root of trust (RoT), baseboard management controller (BMC), trusted platform module (TPM), and complex programmable logic device (CPLD) functions.

Story continues

"The collaboration between Wiwynn and Axiado signifies a critical leap forward for the cloud service provider and enterprise markets," said Steven Lu, Executive Vice President at Wiwynn, "This shift toward modular systems aligns perfectly with the industry's trajectory and reinforces Wiwynn's position as a Tier 1 player."

"The integration of Axiado's TCUs into Wiwynn's OCP-recognized servers opens doors to an architecture based upon OCP-approved specifications, enabled by hardware-anchored, AI-driven solutions," said Gopi Sirineni, President and CEO at Axiado. "By harnessing the capabilities of Axiado's TCUs, we're poised to streamline the deployment of next-generation systems crucial for the future of data centers."

As Wiwynn continues to embrace transformative solutions like Axiado's TCUs, the company's presence within the CSP market will be solidified, while concurrently expanding Axiado's reach across a global customer base.

OCP Summit 2023Learn more about Axiado's and Wiwynn's joint venture at the OCP Summit 2023 on October 17-19, where the two companies will display live demos of platform security innovations. Engage with experts, gain insights into the future of data center security and performance, and explore how this collaboration is shaping the industry's trajectory toward a more secure and efficient computing landscape.

About AxiadoAxiado is a cybersecurity semiconductor company deploying a novel, AI-driven approach to platform security against ransomware, supply chain, side-channel and other cyberattacks in the growing ecosystem of cloud data centers, 5G networks and other disaggregated compute networks. The company is developing new class of processors called the trusted control/compute unit (TCU) that redefines security from the ground-up: its hardware-anchored and AI-driven security technologies include Secure Vault root-of-trust/cryptography core and per-platform Secure AI pre-emptive threat detection engine. Axiado is a San Jose based company with a mission to protect the users of everyday technologies from digital threats. For more information, go to axiado.comor follow us on LinkedIn.

About WiwynnWiwynn is an innovative cloud IT infrastructure provider of high-quality computing and storage products, plus rack solutions for leading data centers. We are committed to the vision of "unleash the power of digitalization; ignite the innovation of sustainability." The company aggressively invests in next-generation technologies to provide the best total cost of ownership (TCO), workload and energy-optimized IT solutions from cloud to edge. For more information, please visit Wiwynn website, Facebookand Linkedinor contact productinfo@wiwynn.com

Cision

View original content to download multimedia:https://www.prnewswire.com/news-releases/axiado-and-wiwynn-forge-alliance-to-pioneer-cutting-edge-ocp-recognized-servers-301951646.html

SOURCE Axiado

See the original post here:
Axiado and Wiwynn Forge Alliance to Pioneer Cutting-Edge OCP Recognized Servers - Yahoo Finance

Read More..

Nobody wins from open RAN except the public clouds – Nobody … – Light Reading

Descending the auditorium steps at the FYUZ event in Madrid this week, attendees were enthusiastically told that a surprise guest would appear for the inaugural session. "Tom Cruise?" one former film studies student hopefully enquired. What no one expected to see was the giant screened face of Fredrik Jejdling, the head of Ericsson's mobile networks unit, hovering above the massed ranks of telecom executives like an alien spaceship. Ericsson is not even a member of the Telecom Infra Project (TIP), the organizer of the show, and it has long been seen as an enemy of open RAN, the topic that consumes TIP's attention.

Jejdling seemed keener on talking about Vonage. Ericsson bought the software business for $6.2 billion last year and yesterday wrote down the value of its investment by $3 billion, blaming the dire performance of Vonage peers on stock markets, among other things. But he was able to muster some faint Swedish enthusiasm the kind you saw when Bjorn Borg won a point at Wimbledon for open RAN after his company recently promised to make radios compatible with a certain flavor of the technology.

About 1 million are already in the field, ready for a software upgrade, he told the audience. Operators, then, should expect to see that software by late 2024, posited Santiago Tenorio, the network architecture director of Vodafone and TIP chairman. "I don't want to commit to any particular time," replied Jejdling with a nervous chuckle.

There is predictable skepticism about Ericsson's intentions and commitment. Open RAN's new interfaces could hurt the Swedish vendor by allowing operators to buy only some of its radio access network parts and link those to other suppliers' components. When they shop with Ericsson today, it is all or nothing. But Jejdling's close encounter with open RAN-kind means both Ericsson and Nokia the other big Nordic vendor have beamed down and are voicing support for the concept. And each has probably realized it is under little direct threat in this strange new land.

Investment gaps and duplication

RAN challengers are almost nowhere to be seen. Parallel Wireless, a RAN software developer, is not even a reference anymore, Tenorio told Light Reading last week, after it reportedly cut most of its workforce last year. Chinese vendors have been evicted from the most important markets for Ericsson and Nokia, if they were ever there in the first place.

Others have weakened their research-and-development (R&D) focus by expanding into new areas. Ericsson's RAN market share outside China has risen by six percentage points since 2017, it boasts. Nokia's 5G share is up by the same amount in just 18 months, it claims, citing Dell'Oro research.

The scale of the challenge was neatly summed up by Robert Soni, the RAN vice president of AT&T, who estimates that Ericsson and Nokia spend about $5 billion on R&D in this market each year. "Those numbers that are spent by the incumbents are staggering," he said. And about one in three dollars goes just on integrating their own products, Soni estimates. Others will succeed only if they pool resources, in his opinion.

But the industry is awash with overlapping initiatives government-backed test centers, TIP's facilities, operators' individual efforts. Meanwhile, vendors are foisting their own pre-integrated partner solutions on telcos. "The whole idea was to give the operator the ability to make the choice," said Soni.

The death of general purpose

The virtualization aspect of open RAN is not what it was cracked up to be, either. In recent days, Nokia has attacked the notion that many central processing units (CPUs), supplied largely by Intel, are "general purpose." Instead, it believes they feature a lot of customization to support 5G needs.

Nokia's own cloud RAN products include the same customized silicon from Marvell used in its purpose-built 5G. Hyperscalers now routinely use customized silicon to offload demanding workloads from CPUs, said Joel Brand, Marvell's senior director of product marketing. Why should something with all the specific needs of 5G buck the trend?

Equally suspect is the description of servers including these chips as "common, off-the-shelf" equipment. A server sold to Walmart is not the same as one designed for telcos and compliant with very specific network equipment-building system (NEBS) guidelines, according to Geetha Ram, the head of RAN compute for HPE.

Brand thinks the industry must go even further. "The RAN today is based on custom appliances," he said during a FYUZ panel session. "Those custom appliances are built to operate outdoors, without active cooling, with passive cooling. They are designed for maximum reliability and availability. If we want to succeed to move that to a server environment, we really need to think what a vRAN server looks like." Yet all this would rather undermine some of the original arguments about open RAN economies of scale.

Cloudy economics

None of this means absolutely nothing changes and nobody wins. But open RAN's likely beneficiaries are probably not what the telecom industry intended. Clues lie in the increasing reference to "cloud" rather than virtual RAN and in recent tie-ups between the Nordic vendors and the hyperscalers. Of particular interest is a new deal between Ericsson and Google Cloud.

Under that arrangement, Google would bring its own computing equipment, described as "black boxes" by Ericsson, into a telco's facilities. The public-cloud giant would essentially replace the telco as the investor in that equipment. Ignoring the radios and antennas, the role of Ericsson, previously involved in hardware development, would be limited to contributing the RAN software. Rather than buying appliances and servers, the operator would pay Google on a usage basis.

Dish, a greenfield open RAN operator in the US, already has this kind of relationship with AWS. Decisions about CPU offload to accelerators and other technical features could eventually be taken away from the telcos. AWS, for instance, is working to put RAN workloads on its own Graviton processors, built with the blueprints of Arm.

"We defined an open fronthaul interface so now the processing can be done by a hyperscaler," says Brand. Whether the hardware is Dell, HPE or Graviton, hyperscalers can put their cloud platforms at the site hosting the distributed unit, responsible for baseband processing. "This is not increasing the variety of vendors, because there are only a few of them. Whether it's good for the industry, bad for the industry, will affect Nokia, will affect Ericsson, will affect Verizon, will affect Vodafone, I don't know."

This is not a fait accompli, of course. Hardly any telco workloads run on hyperscaler platforms today. A crop of alternatives Red Hat, VMware and Wind River exists for building a single private cloud that can manage all workloads. But the paradigm has changed now the hyperscalers have entered the private cloud space.

No one seriously thinks Red Hat can move in the opposite direction and establish itself as a public cloud. Nor can it develop chips, build large language models from scratch and do all the other stuff that might attract a telco to a hyperscaler. Nokia insists Red Hat is now its preferred cloud partner, but its anyRAN strategy is also about ensuring its software can work "on any partner's cloud infrastructure." Earlier this year, it showed that its RAN software, split between Marvell and Graviton chips, could run on an AWS platform.

Cloud RAN of this nature would see the public clouds advance even further into the telco sector. It would be especially awkward for supporters of "fair share," the controversial argument that Big Tech should contribute to network costs because demand for their applications is forcing telcos to invest bigger sums. Adding capacity in mobile often means putting in extra compute resources, but these would be rented from Big Tech, not owned by the telcos. Pricing negotiations between landlords and tenants don't often work out well for the latter.

See the original post:
Nobody wins from open RAN except the public clouds - Nobody ... - Light Reading

Read More..

Unlocking IT Success: Embracing the hybrid cloud revolution – SecurityBrief Australia

The cloud migration revolution has undeniably transformed the IT landscape, encapsulating every business or organisational process in the last decade. The adoption of cloud technology has created greater opportunities for companies to scale and expand both their private and public clouds. Contrary to popular belief, the migration of IT information to the cloud isn't daunting, provided one is backed by an adept IT partner.

Cloud migration encompasses the moving of applications and data from on-premises servers to public or private cloud providers, or even across diverse cloud environments. Typically, this migration strategy is executed in five primary stages: preparation, planning, migration, operation, and optimisation.

Carl Filpo, Director at CMTG, identifies an increase in demand for cloud-based solutions, spawned by the rise in workplaces favouring remote working. "The cloud enables easy access to data and applications from any device with an Internet connection," Filpo explains. This is one key reason for the popularity of cloud-based storage solutions among businesses, as they aim to offer flexibility to their workforce.

However, the ongoing progress in cloud solutions indicates the inefficacy of a one-size-fits-all strategy. Arguably, a hybrid approach of public and private cloud systems may be more fruitful. Some data and information are kept on public cloud systems like Office 365, while others are kept on private clouds or traditional on-premises systems. "The benefit of hybrid clouds is the flexibility, allowing organisations to strategically decide what is kept on-premises and what is migrated to the cloud," Filpo asserts.

Indeed, now is the time to reconsider traditional methods and investigate a hybrid cloud approach. "In this age of hybrid cloud solutions, where public and private clouds can be integrated, the right storage architecture can accelerate your journey," suggests Filpo. Consequently, businesses should contemplate their unique needs and constraints when deciding the right option and tailor strategies that match their IT landscape, needs, and requirements before transitioning to the cloud. A customised solution will be the catalyst for IT success in this dynamic and rapidly evolving era.

CMTG, established in 1998, is an integrated IT infrastructure solutions, service, and consulting company based in WA. The company specialises in high-performance data storage and applications, private cloud systems, and ongoing support. With a state-of-the-art on-site data centre, highly secure dark fibre connection, the latest hardware on the market, and strong aftersales support, CMTG provides industry-leading infrastructure and technology services. The dedicated deployment team ensures high-speed and sustainable IT solutions and safe data migration and handling. Further, the company holds some of the nation's highest security accreditation and certification standards.

See the original post:
Unlocking IT Success: Embracing the hybrid cloud revolution - SecurityBrief Australia

Read More..

What is the Internet of Things (IoT) – IoT Business News

The Internet of Things (IoT) has become a ubiquitous term in the realm of technology and innovation, promising to reshape the way we interact with our environment and the devices that surround us. This article aims to provide a comprehensive understanding of what IoT is, its core concepts, its impact on various industries, and its implications for our daily lives.

At its core, IoT is a network of interconnected physical objects, devices, vehicles, buildings, and even people that are embedded with sensors, software, and network connectivity. These smart objects can collect and exchange data, facilitating the seamless integration of the physical and digital worlds. The key elements that define IoT are:

1. Connected Devices: These can range from household appliances and wearable fitness trackers to industrial machinery and autonomous vehicles. Any physical object can become a part of the IoT when its equipped with sensors and connectivity.

2. Sensors: Sensors are the workhorses of IoT. They gather data from the physical world, measuring everything from temperature and humidity to motion and location. These sensors act as the eyes and ears of IoT devices.

3. Connectivity: Data collected by IoT devices is transmitted over networks, which can be wired or wireless. The data is then sent to cloud-based platforms for storage, analysis, and interpretation.

4. Cloud Platforms: Cloud platforms play a vital role in IoT by storing and processing the immense volume of data generated by IoT devices. They also provide a centralized location for data analysis and management.

5. Data Analysis and AI: The data collected from IoT devices is valuable, but to make it truly useful, it needs to be processed and analyzed. AI (Artificial Intelligence) and machine learning are often used to glean insights from this data.

IoT devices work together in a structured ecosystem to collect, transmit, and interpret data. Heres how IoT typically functions:

1. Data Collection: Sensors in IoT devices gather data from their surroundings. This can include temperature readings, location data, air quality measurements, or any other relevant information.

2. Data Transmission: The collected data is transmitted to a central server or cloud platform through wired or wireless networks. This data is often sent in real-time to ensure up-to-the-minute insights.

3. Data Storage and Analysis: The data is stored on cloud servers and is processed and analyzed using AI algorithms and machine learning. This stage is crucial for transforming raw data into actionable information.

4. User Interface: The processed data can be accessed by users through web applications, mobile apps, or other interfaces. This is where individuals or organizations can view, manage, and make decisions based on the IoT data.

IoT has had a profound impact on various industries, offering innovative solutions and revolutionizing processes. Some key sectors that have been transformed by IoT include:

In healthcare, IoT devices are used for remote patient monitoring, medication adherence, and even surgeries performed by robotic arms. These technologies improve patient outcomes and provide real-time health data to medical professionals.

IoT-enabled sensors in agriculture can monitor soil conditions, weather, and crop health. This data allows farmers to optimize irrigation, minimize waste, and increase crop yields.

IoT has ushered in the era of smart factories. Machines equipped with sensors communicate with each other and with a central system, allowing for real-time monitoring, predictive maintenance, and efficient production.

IoT plays a crucial role in the development of autonomous vehicles. Sensors and connectivity enable self-driving cars to navigate roads safely and efficiently. Additionally, IoT has transformed logistics and fleet management, improving route optimization and reducing fuel consumption.

IoT applications in smart cities include intelligent traffic management, waste management, energy consumption optimization, and public safety enhancements. These solutions make urban living more sustainable and efficient.

IoT has introduced innovations like smart shelves that monitor inventory, personalized marketing through beacons, and cashier-less stores. These developments provide a seamless and personalized shopping experience for customers.

IoTs impact isnt limited to industries; it has made its way into our daily lives. Here are some ways in which IoT has transformed our routines:

IoT devices like smart thermostats, lights, and security systems enable homeowners to control and automate various aspects of their homes remotely. Voice-activated virtual assistants like Alexa and Google Assistant make it even easier to manage these devices.

From fitness trackers to smartwatches, wearables use IoT technology to monitor and relay health data, track physical activity, and provide timely reminders.

Refrigerators, ovens, and washing machines equipped with IoT capabilities can communicate with users smartphones, offering convenience and efficiency.

IoT security cameras and sensors enable homeowners to monitor their properties remotely. Alerts are sent to their phones in real-time, providing peace of mind.

IoT allows businesses to offer personalized services based on customer behavior and preferences. This can include location-based recommendations, customized marketing, and tailored product offerings.

The Internet of Things (IoT) is at the forefront of technological innovation, and its future holds exciting possibilities. As IoT continues to evolve, several key trends are emerging, which promise to reshape the landscape of connected devices and data-driven applications. In this article, we will explore these future trends of IoT and their potential impact.

One of the most significant trends in IoT is the convergence with edge computing. Edge computing involves processing data closer to the source, at the edge of the network, rather than sending it to centralized cloud servers. This trend significantly reduces latency, allowing for real-time decision-making. IoT devices, equipped with edge computing capabilities, can make faster and more localized decisions, leading to more efficient and responsive systems. This trend is particularly crucial for applications that require low latency, such as autonomous vehicles and industrial automation.

The rollout of 5G networks promises to impact IoT. The higher bandwidth and lower latency of 5G will provide faster and more reliable connectivity to IoT applications. With 5G, time-critical IoT applications can operate more efficiently, making them more capable and responsive. From smart cities to healthcare and transportation, 5G will enable a wide range of IoT use cases that were previously limited by connectivity constraints.

The integration of artificial intelligence (AI) with IoT is already transforming the capabilities of connected devices. AI-powered IoT systems can analyze and interpret data, make predictions, and adapt to changing conditions. This integration enhances the intelligence and automation of IoT devices, enabling them to learn from data and make decisions without human intervention. For instance, AI-powered cameras in smart homes can identify security threats or monitor energy usage to optimize efficiency.

As the IoT ecosystem continues to expand, security and privacy concerns are becoming increasingly important. With more devices connected to the internet, the attack surface for cyber threats widens. Ensuring robust cybersecurity measures is essential to protect sensitive data and devices. Privacy regulations and user controls are also playing a more significant role in shaping the way IoT data is collected and managed. These considerations are critical to maintaining user trust and the long-term success of IoT applications.

Sustainability is a growing trend in the IoT landscape. As environmental concerns become more prominent, the development of low-power IoT devices and sustainable manufacturing practices is a top priority. Green IoT solutions aim to minimize the environmental impact of IoT technology. These efforts include using renewable energy sources, designing energy-efficient devices, and promoting eco-friendly manufacturing processes.

To realize the full potential of IoT, interoperability and standardized communication protocols are essential. Future IoT systems must seamlessly connect and communicate with various devices and platforms. The lack of interoperability can be a significant barrier to IoT adoption. Industry standards and collaborations will play a key role in achieving this level of compatibility, ensuring that IoT devices and ecosystems work together seamlessly.

In conclusion, the future trends of IoT promise to revolutionize the way we interact with technology and the world around us. Edge computing, 5G connectivity, AI integration, security measures, sustainability, and interoperability are all poised to play a pivotal role in shaping the IoT landscape of tomorrow. As IoT continues to mature and expand, its impact on industries and daily life will only grow, offering innovative solutions and making our world more interconnected and efficient.

The rest is here:
What is the Internet of Things (IoT) - IoT Business News

Read More..

Everyone Is Chasing What Nvidia Already Has – The Next Platform

Transitions in the datacenter take time.

It took Unix servers a decade, from 1985 through 1995, to supplant proprietary minicomputers and a lot of mainframe capacity that would have otherwise been bought. And from 1996 through 2001 or so, Sun Microsystems servers set the pace and reaped the profits, although nothing like what IBM mainframes had commanded before them. And in 2001, IBM brought its Power architecture and aggressive pricing to bear an aggression funded by its vast profits from proprietary systems where mission-critical COBOL and RPG applications and their underlying databases and middleware were extremely sticky and over the next decade and a half wiped Hewlett Packard and Sun from the face of the Unix market. IBM rules Unix systems with its AIX-Power platform, but that business is maybe 25X smaller than it was in the Unix heyday.

Starting in 1993, it took about a decade for X86 servers to evolve to become a reasonable and credible alternative to RISC platforms and the Linux operating system, which was a few years behind Intels Pentium Pro and Xeon efforts in the datacenter, evolved alongside the X86 platform to supplant Unix. And from there, the X86/Linux platform crushed the RISC/Unix platform and became the first dominant, general purpose compute substrate in the datacenter, actually fueling the rise of the hyperscalers and cloud builders.

The Internet as we know it could never be built on mainframes, or even RISC/Unix machinery. It was just too damned expensive and the vendors providing RISC/Unix gear had no incentive to cut their prices in half and lose money on the operation. New low-cost suppliers of all of the system and software components had to come into being to lower that cost. AMD came into the X86 market in 2003, but by 2009 had run out of gas and Intel took over from there, exercising what was effectively monopoly power in datacenter compute. And its higher profits and less aggressive server CPU roadmap are the two things that inevitably fostered the competitive threat that Intel did not see until it was way too far along the wrong paths in both chip design and manufacturing and hit the wall with Moores Law, no matter how much Intels top brass protests that Moores Law (where transistors become half expensive every two years) is not dead.

Its dead, or at least dead enough that Nvidia co-founder and chief executive officer, Jensen Huang, is correct in his assessment from last September that it was indeed dead. At this point, who you gonna believe: Jensen Huang or Pat Gelsinger, Intels chief executive officer and a student of the Andy Grove only the paranoid survive school of semiconductor design and manufacturing?

With riches, Intel lost the ability to be paranoid, and became complacent. And its wrong moves in manufacturing research and development, the consequential stall in CPU architecture advancement, in GPU development, and in tangential software acquisitions all compounded.

So here is to hoping, if you are a system architect or a Wall Street investor, that Huang & Co can remain paranoid this year and into the future.

The Nvidia financial presentation that came to light this week that had a roadmap for CPUs, GPUs, and networking, and which we edited for accuracy and which we added DPUs to, had some other interesting charts in it, which got us to thinking about the IT market and Nvidias growing place in it. There was a companion presentation that Collette Kress, Nvidias chief financial officer, gave at the Citi Global Technology Conference on September 7 that also had some money and market food for thought.

Lets start with total addressable market and serviceable addressable market. The entire IT market, speaking very generally and including hardware, software, and services including telecom and data services is projected to be a $4.71 trillion market in 2023, according to the latest numbers from Gartner. The Nvidia TAM does not perfectly overlap this because it not only includes IT, but autonomous machines, which is embedded within a very large industry making cars, trucks, forklifts, robots and other machinery. The forklift market is north of $60 billion this year, the robotic market is somewhere around $40 billion to $75 billion, depending on how you characterize it, and cars and trucks will probably account for somewhere around $1,400 billion if you poke around the Internet and look for stats. So the total addressable market for Nvidia is the compute, visualization, networking, and software part of these markets, which together comprise around $5.7 billion in spending this year. Within that, and what Nvidia is really carving out in its data, is the much smaller $1 trillion opportunity it is chasing within these industries where compute and visualization are needed. One might properly call this Nvidias serviceable addressable market, but this is really somewhere between TAM and SAM. Call it TAM we guess.

Nvidia has spoken a lot of this $1 trillion opportunity, and here Kress broke it down here in 2023:

Now, if you take this TAM of $1 trillion and divide it into Nvidias projected revenues for calendar 2023 of somewhere around $50 billion, that is 5 percent of the TAM as we have defined it. That sure doesnt feel like anything close to monopoly power. But if we restricted the actual TAM and SAM comparison to all accelerated computing and its necessary networking, visualization, and graphics, you would find that Nvidia has a dominant share. Our guess is more than 50 percent but less than the 85 percent threshold that law enforcement concerning monopoly regulation tends to use to determine if a company is a monopoly or not.

And once again, we are not against monopolies, which we think are economic as well as technical situations that arise naturally after a certain amount of consolidation in any industry. We are, however, against unbridled and unregulated monopolies after a certain amount of economic pain from customers and potential competitors is reached. Economic substitution is how we all get around such pain, but it is sometimes not possible to do it at any scale. Like, for instance, when it comes to GPU compute in the datacenter right now. But competitors are ramping up and getting better, and there will be substitution. Fear not.

The $1 trillion referenced above is not the same $1 trillion that Huang & Co talk about when they are discussing the datacenter infrastructure installed base.

Now, this chart says datacenter installed base, but it appears to be plotting out datacenter revenues for all kinds of things. We doubt very much that this chart is gauging the net present value of datacenter gear and adding new gear going into the datacenter and extracting the value of the machines that are retired and then plotting then-current server CPU revenues and Nvidia datacenter revenues against that. This had better be all revenues per year for the categories shown.

Nvidia does say that the spending for server CPUs, servers, network infrastructure, and other datacenter infrastructure is on a calendar year and that the Nvidia datacenter spending is on the nearest calendar year. (Nvidias fiscal 2023 ends in January 2023, and is almost the same thing as calendar 2022, to say it in plain English American.)

If you do the math on that chart above (by measuring the lines with a ruler on the Y axis because there are no dollar or percent figures given), then in fiscal 2024/calendar 2023, Nvidias share of datacenter spending is somewhere around 15 percent.

You will also note in the chart above that server CPU revenues have taken a downward trend send AMD thank you notes as well as the Arm collective while server revenues are up modestly as AMD has doubled its revenues, more or less. We see here as we have showed before how much GPU-accelerated server spending is propping up the server market.

The big story after the GPU crazy is networking, of course, and AI has been very, very good to InfiniBand. Like this:

Based on our model, we think networking represented about $410 million in revenues in Q1 F2021 for Nvidia, and that it grew to $1.64 billion in Q2 F2024 ended in July of this year. If you use the 4X for overall networking growth and the 7X for InfiniBand growth, and measure the share on the bars in the chart, that means the share of Ethernet versus other on the Q1 F2021 stacked bar is not right. It has to be almost perfectly evenly split to have InfiniBand grow by 7X and overall networking grow by 4X. This implies that InfiniBand drove $1.41 billion in sales in Q2 F2024 for Nvidia, but Ethernet And Other drove only $232 million, up 1.1X from Q1 F2021. (We wonder where NVSwitch is accounted for here? Hopefully in Other.)

The only thing growing faster than the datacenter networking business at Nvidia over the same timeframe is the rest of the Nvidia datacenter business, which has grown by a factor of 11.9X since the Mellanox acquisition and which drove $8.68 billon in sales in Q2 F2024.

Nvidia is clearly the leader of accelerated computing, and it probably has another 12 to 18 months of being the undisputed revenue and mindshare leader. But, others are coming with new technologies and lower prices, and this is as unavoidable as the rain that eventually comes to spur on new growth.

Visit link:
Everyone Is Chasing What Nvidia Already Has - The Next Platform

Read More..

Cybersecurity in packaging: Q&A with GlobalData thematic analyst – Packaging Gateway

Shabnam Pervez is a thematic analyst at GlobalData. She has been working on the thematic team for over three years, focusing on emerging technology trends in a myriad of different sectors.

Shabnam Pervez: Major cybersecurity challenges within the packaging industry arise from digitalisation. Like other sectors, technology is disrupting the packaging industry. Various technologies can be integrated throughout the value chain to automate processes and gain better insights into customer behaviour. However, understanding and effectively utilising these technologies pose a significant challenge for packaging industry players who are under pressure to keep up with the rapidly changing technological landscape.

Additionally, the future of work presents another challenge as employment dynamics shift. Many businesses are experimenting with hybrid and flexible work strategies, enabled by collaboration tools and cloud computing. These technologies allow employees to work remotely, reducing travel expenses and improving work-life balance. This shift also allows companies to downsize office spaces, lowering real estate costs. However, transitioning to remote and hybrid work models introduces new security challenges as corporate IT has less control over user actions, devices, and software. The Covid-19 pandemic has further accelerated the trend of remote servicing of packaging machinery.

Lastly, businesses across all sectors face the issue of Environmental, Social, and Governance (ESG) considerations. Investors, governments, employees, and customers share the common goal of becoming more sustainable. Companies that prioritise sustainability will reap financial benefits, such as increased share prices and improved customer and partner loyalty. On the other hand, those that neglect sustainability will struggle. In the packaging industry, companies face mounting pressure to use environmentally friendly packaging materials, reduce single-use plastics, and address their carbon emissions. Government regulations, like the UKs Circular Economy Package, dictate sustainability standards favouring recycling and the circular economy. However, ESG encompasses more than just environmental aspects; companies also have a responsibility to care for their customers and employees while ensuring robust corporate governance structures.

Shabnam Pervez: Packaging companies should prioritise cybersecurity across their entire value chain. As the packaging industry undergoes digital transformation, companies at every stage of the value chain are recognising the vulnerabilities present in their supply chains. To address these concerns, they are collaborating with cybersecurity firms to find solutions. Investments in cybersecurity for the packaging industry should focus on essential areas such as threat detection and response, cloud security, data security, vulnerability management, post-breach response services, and risk and compliance. With the increasing use of cloud servers for delivery management and the storage of large amounts of virtual data, packaging companies face the risk of supply chain sabotage if they fail to implement effective cybersecurity measures.

Shabnam Pervez: The manufacturing sector is undergoing rapid digitalisation. According to a survey conducted by the Packaging Machinery Manufacturers Institute (PMMI) in March 2021, approximately 79% of companies have integrated smart technologies into their processing lines, 64% on their assembly lines, and 60% at the end-of-line packaging stage. These numbers are expected to significantly rise as the industry continues to explore and adopt new technologies.

Access the most comprehensive Company Profiles on the market, powered by GlobalData. Save hours of research. Gain competitive edge.

Your download email will arrive shortly

We are confident about the unique quality of our Company Profiles. However, we want you to make the most beneficial decision for your business, so we offer a free sample that you can download by submitting the below form

Shabnam Pervez: Certainly not as per IBM, the manufacturing industry is the second most targeted sector by cybercriminals, yet it remains one of the least prepared. The packaging process, which often occurs as the final step in manufacturing, relies heavily on automated machinery, accounting for approximately 60% of end-of-line packaging. The Packaging Machinery Manufacturers Institute (PMMI) reports that in 2020, a staggering 88% of small business owners in the manufacturing sector felt their businesses were susceptible to cyberattacks. Furthermore, 28% of all cybersecurity breaches targeted small businesses, and a distressing 10% of these small businesses were forced to permanently close their doors as a result of such breaches. Consequently, small packaging companies must prioritise the implementation of suitable cybersecurity measures wherever feasible, given their heightened vulnerability as frequent targets of attacks.

Original post:
Cybersecurity in packaging: Q&A with GlobalData thematic analyst - Packaging Gateway

Read More..