Category Archives: Cloud Servers
Ad Servers for Advertisers Market to Witness a Pronounce Growth During 2026 – News By ReportsGO
Ad Servers for Advertisers Market to Witness a Pronounce Growth During 2026
The research report on Ad Servers for Advertisers market encompasses a detailed evaluation of the past and present business scenario to offer a conclusive overview of the industry performance over 2021-2026. It sheds light on the sizes and shares the markets and sub-markets, highlighting the key driving forces, challenges, and lucrative prospects governing the industry dynamics.
According to experts, Ad Servers for Advertisers market size is projected to record notable growth over the forecast period, registering XX% CAGR throughout.
The research literature further offers crucial information on the competitive arena, emphasizing on the strategies adopted by key players that proved to be successful, to aid businesses ensure an upward growth trajectory in the forthcoming years. Besides, the study attempts to answer all the queries of clients pertaining to business implications of Covid-19 pandemic.
Request Sample Copy of this Report @ https://www.reportsgo.com/request-sample/68203
Market snapshot:
Regional outlook:
Product landscape outline:
Application spectrum summary:
Competitive arena overview:
Key Questions Answered in the Market Report:
Table of Contents:
1 Scope of the Report
1.1 Market Introduction
1.2 Years Considered
1.3 Research Objectives
2. Executive Summary
3. Global Ad Servers for Advertisers market by Company
4. Ad Servers for Advertisers market by Region
5. Market Drivers, Challenges and Trends
6. Marketing, Distributors and Customer
7. Global Ad Servers for Advertisers Market Size Forecast
8. Ad Servers for Advertisers Market Key Players Analysis
Request Customization on This Report @ https://www.reportsgo.com/request-for-customization/68203
See the rest here:
Ad Servers for Advertisers Market to Witness a Pronounce Growth During 2026 - News By ReportsGO
Enhanced Role for Startup, Entrepreneurs with IT Infrastructure for Secured National Reincarnations – thepolicytimes.com
The term startup is talk of the town nowadays, and it is the most popular topic! Many people define the startup as the tech business and with less than 100 employees. Many people want to become entrepreneurs and open their own businesses. Much needed thing is to explain all about startups to clarify the concept of startups for young and enthusiastic entrepreneurs in the making.
Start ups play a key role in supporting the growth and development of a countrys economy as well as in improving the quality of life for citizens.Economic development preserves and raises the communitys standard of living through a process of human and physical infrastructure developmentFoster cooperative international tie up and technological support through Start up programmes of bilateral and multilateralinterest.Make cities and human settlements inclusive, safe, resilient, and sustainable.
In accordance with the Countries Global Ranking of Startup Ecosystem 2020 by global innovation mapping and research company StartupBlink, India ranked at 23rd position, a drop of 6 places from 17th position in 2019. The ranking has been topped by the United States (US), followed by the United Kingdom (UK), and Israel at 2nd & 3rd position. It should be noted that India is home to the third largest startup ecosystem.
Among the top 100 startup cities, only four India cities were named in 2020 Cities Global Ranking of Startup Ecosystem while total of 38 cities made it to the worlds top 1000 cities with startup ecosystem.
7.1% of the startups in the world operate in the Fintech industry. Followed by Life sciences and healthcare with 6.8%, Artificial intelligence with 5.0%, Gaming 4.7%, Adtech 3.3%, and Edtech with 2.8%. Even though there isnt completely accurate data about industry distribution, its clear that modern startups gravitate towards the internet and digital technologies. With this information we can also see which industry is best for startups now.
The United States is the leading country by the number of startups (63,703) by a long shot. The second on the list is India, with just 8,301 startups, and the third spot is occupied by the UK, with 5,377 startups.
To put things into perspective, the US has almost three times more startups than the rest of the following 9 countries in the world combined.There are currently more than 600 Unicorn companies around the world. However, most of them are in China or the United States.Unicorn companies are startups that are valued at $1 billion or more. Most unicorn companies today are involved in the global sharing economy, where they can make quick gains.
Second place is held firmly by China, with 25% of all unicorn companies in the world. Third and fourth places are constantly being traded by India and the United Kingdom, with about 5% of unicorns or around 20 companies each.
The value of e-commerce sales globally is around $3.5 trillion, with rapid growth expected in the future.That is why e-commerce is one of the most popular industries for new startups. The next industry in line is Fintech Financial technology.
Online financial services have been booming since the introduction of PSD2.Another big focus of new startups is cybersecurity. These companies understand how important online security will be in the future. FoodTech combines food and technology, specifically the internet, to deliver products to customers another popular industry for startups.With over US$16 billion of investments in 2018, EdTech is becoming another popular startup industry that provides educational technology solutions to people worldwide.
95% of entrepreneurs that create startups have at least a bachelors degree.Many people say that education is not important. They point to Mark Zuckerberg and Elon Musk as examples. However, most of the people involved in some of the worlds most successful startups have a higher education.
Look at the honest statistics below about how many startup businesses fail, this information will give you an idea of what percentage of startups are successful:
The primary reason for these numbers is a lack of ability to offer a product for a target market. Many companies arent able to generate interest in their products or services. Some companies also struggle with marketing. They donot have the finances to do it right and present what they have to offer to the right segment of the public.
Another reason for startup failure is poor team organization. Companies are unable to develop a group of people that will work together effectively towards the same goals.
19% of startup leaders agree that competition is the greatest challenge when starting a business.
The second biggest challenge is cash flow (12%), taxes (11%), economy (11%), and growth is last with 10%. Other startups face a variety of other challenges.
The startup industry will continue to be the driving factor for global innovation and business growth for many years. However, companies need to learn how to adjust to trends while being sustainable and efficient so that more startups can survive long term.
Entrepreneurs are rightly known as national assets and individuals who are motivated to a great degree. These are the people responsible for changing the way of life of the people in a country. They arent only adding to their own account with a successful venture, rather they create wealth in the society with these ventures. For the jobless, these entrepreneurial ventures are boon due to the immense job opportunities that come in the market. More jobs are always reflective of a well-balanced society and one that is geared for progress. If the production function model is to be taken into account then entrepreneurial capital is truly of great importance to the entire nation. In India, innovation has taken leaps and bounds of growth in the fields of IT, Education, Health care, etc. due to the numerous start-ups in these domains. If you take a closer look, innovativeness has achieved more growth due to the reign of entrepreneurship. There are numerous competitors in the same domain and hence the need for something new and added quality is always rife to gain more market space and popularity. Here are some of the major impacts that entrepreneurs have on the Indian economy.
It is rightly said that people are of utmost importance in everything you do. If you have got the right people, business models and product will surely find a way into the market. There are numerous youth and fearless entrepreneurs in India that have taken huge strides to bring about a positive change in the economy of the country. On a deeper insight, entrepreneurship is the driving force in the market. However, there are people who have the idea that entrepreneurship is all about the struggle of a man to start a project or business on his/her own, it isnot true. The struggle is far behind and the focus should be on the growth it offers to the country.
Right from gathering workforce, funding, resources and creating an organisational structure, these are the things that encompass the idea of entrepreneurship. What remains a question is how the practice benefits the Indian Economy.
Promoting capital formation: The idle savings of the people are mobilised by the entrepreneurs by providing them with new opportunities. Resources are employed so that people can set up their own enterprises. With these kinds of entrepreneurial activities, value addition the wealth of the nation is assured. Such creation of wealth adds to the industrial and economic growth of the nation. More capital formation means that a noticeable increase in the overall production of the nation.
Job creation: If success is to be achieved in entrepreneurial ventures, then it is to be understood that the work will need more than two hands. Varying skills sets are needed for a project to become successful, and this is where a new scope for jobs opens to the people. Thriving business setups makes sure that the job queues are cut to half in a particular geographical area. Given the fact that unemployment at a large scale in an unending problem prevailing in the country, skilled and technically qualified people are sure to land a job with these opportunities.
Regional development: India vs. Bharat is a debate that has been prevalent for a long period of time and truly the difference in the growth of rural and urban areas is immense in the nation. However, 73% of households are in the rural area and therefore there is a need for balanced regional development. Entrepreneurial ventures remove the disparities between rural and urban areas with the help of industrialisation. The benefits from these ventures lead to community development such as road, education, health, and entertainment. Dwelling habits in slums and congestions are reduced as they have job opportunity and can sustain a better living.
Decentralises economic power: Monopoly takes growth when the industrial set up is more prevalent in the nation and hence the economic power is only within the hands of selected few. Through entrepreneurship, economic power is distributed to subsequent contributors and hence the wealth is no longer decentralised. It makes society a lot more balanced and paves overall development.
Increases GDP and per capita income: Every entrepreneurial venture adds to the economy of the nation. Every innovation in the market is improving the quality of service and hence helping the market to be further advanced. Resource and skill mobilisation in an effective manner helps in developing prospects in the market as well as adding substantially to the economy of the nation. These help to let the gross national product along with per capita income in the place.
As new ideas and innovations keep coming in the market on a daily basis, variety in the market gets a major boost along with prices that are competitive in order to gather better space in the market. It enables people to avail them for leading a better life and without compromising on their budget. It helps boost the standard of living of the people and suddenly the nation becomes a better place to live for even with minimal finances.
Export trade boost: The export trade gets a huge boost since entrepreneurs produce goods in large quantities and there is enough to be exported to foreign countries. Foreign exchange amount is enhanced with this and thus greater economic independence is achieved. All these only points towards a single point agenda of national development and financial growth.
Backward and forward linkages: The essential target of every entrepreneur is to maximise capital flow with the help of rapid innovations which they come up with. Backward and forward linkages are influenced by these practices and hence better economic growth is achieved. Such linkage theory reflects the fact that meaningful investments are being done in the country and there is a plan behind every step taken financially.
It is a fact that competition in the market is sure to come when there are entrepreneurs vying for the attention of the same consumer base in a market. Several producers in the same domain will make sure that each of them will be in search of better facilities which they can provide to their customers. Also, there will be a price war in the market and the one with the best quality will sustain for the longest period of time. It benefits the customer as they can now afford the services without burning a hole in their pockets.
Social change beyond imagination: Entrepreneurs are all about breaking the traditional idea of freedom and further expanding it because the sky is the limit now. The dependency on the lower level of technology and outdated systems are a thing of past as they can be easily replaced with local producers or through imports. The underdeveloped countries are getting access to high end technology to get the work done and as a result they are coming up with new goods and ideas. It is economically viable to them because the cost of living is low for people based in underdeveloped countries. The economic freedom they get along with the wide array of choice make it the best-suited system of production in any given economic set up.
On the other hand, there are always grimmest to any positive aspect. As flawless the system may look on the outset, it is difficult to master unless you are a crafter agent in the domain. Proper education and sense of the market must be imbibed in a person before they are ready to wave off their entrepreneurial venture. If they fail, then it is a massive financial loss for the person and the employed people will find it hard to get their salaries. Additionally, the resource base of the country is stressed with such initiatives. Over exploitation of natural resources are always a threat and it can lead to serious consequences later.
IT infrastructure refers to the composite hardware, software, network resources and services required for the existence, operation and management of an enterprise IT environment.
IT infrastructure allows an organization to deliver IT solutions and services to its employees, partners and/or customers and is usually internal to an organization and deployed within owned facilities.
Developers rely on platforms throughout the IT software development process to connect data, process it, increase their go-to-market velocity, and stay ahead of the competition with new and existing products. They have enormous amounts of end-user data on hand, and productivity infrastructure can remove barriers to access, integrate and leverage this data to automate the workflow.
Access to rich interaction data combined with pre-trained ML models, automated workflows and configurable front-end components enables developers to drastically shorten development cycles. Through enhanced data protection and compliance, productivity infrastructure safeguards critical data and mitigates risk while reducing time to ROI.
IT infrastructure consists of all components that somehow play a role in overall IT and IT-enabled operations. It can be used for internal business operations or developing customer IT or business solutions.
Typically, a standard IT infrastructure consists of the following components:
Hardware: This is the physical part of an IT infrastructure and comprises all the elements necessary to support the basic functioning of the machines and devices constituting the infrastructure itself.Servers, computers, storage and data centers, switches, hubs and routers, as well as all other equipment such as the power, cooling, cabling and dedicated rooms.
Software: It refers to all the applications used by the enterprise both for internal purposes and to provide its services to customers. Software includes web servers, Enterprise resource planning (ERP), customer relationship management (CRM), productivity applications and the operating system (OS).
The OS is the most important software component and is responsible for managing the hardware itself and connect the physical resources to the network infrastructure.
Network: Although is not strictly necessary for an IT infrastructure to function, the network is essential to establish internal and external communication of all elements and devices.
The network part includes all the hardware and software elements necessary to ensure network enablement, internet connectivity, firewall and security. It ensures that personnel get access to stored and transferred data only from strictly controlled access points to reduce the risk of data theft or damage.
Meatware: Since they contribute to constituting the enterprise environment and guarantee its functions, associated personnel and processes such as ITOps or DevOps are also part of an IT infrastructure.
Human users, such as network administrators (NA), developers, designers and end users with access to any IT appliance or service are also part of an IT infrastructure, specifically with the advent of user-centric IT service development.
Traditional Vs. Cloud Infrastructures: All the components mentioned above that constitute a traditional infrastructure are usually owned by the enterprise itself and managed within their own facilities.
The larger the IT infrastructure, the more space, power, personnel, and money will be needed to run it. Today, part of this infrastructure can be virtualized and rented from third-party services to cut the costs.
Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) are all relatively new options that allow businesses to rent software, infrastructure, services and human resources from external vendors who will deliver them using the internet. All the components rented are hosted and managed in cloud servers that employ their own IT infrastructures.
Since all these resources are built on virtualization technology, they can easily be scaled up or down as the needs of the business employing them changes.Set of physical devices and software required to operate enterpriseIT infrastructure Components:
Technology has impacted and improved the way companies conduct their business, including communication, productivity, and speed in making business decisions. Which is why the importance of managed IT infrastructure cannot be underplayed.
IT infrastructure consists of all elements that support the management and usability of data and information. These include physical hardware and facilities, data storage and retrieval, network systems, legacy interfaces and software to support the business goals of the organization. The structure also includes hiring, training, policy, testing, process, upgrades and repairs.
Infrastructure management is the process of managing the components of a companys information technology. Having appropriate methods in place for the management of the IT infrastructure allows for improved performance, improved availability and quick solutions for various issues that could arise.
A managed IT infrastructure is important because it provides structure and control for diverse technical operations which involve hardware, software and networking in both the physical and virtual environment. IT infrastructure management is also responsible for
The benefits of IT structure management all stem from the ease of operation, clarity of information and reporting and cost saving. Behavior that supports this outcome includes
While new technologies present powerful opportunities for organizations, they also introduce challenges. The pace of change in IT is unprecedented. The mobile devices and cloud-based technologies that have brought in so many possibilities have also introduced several devices, platforms and apps for IT departments to manage and secure. These challenges add up to significant expenses such as cost of hiring and training qualified workers, purchasing the infrastructure to support and so on. Rather than struggle to keep pace with technology themselves, organizations hire service providers for help. The third-party service providers help with cloud deployments, data center solutions, mobile initiatives, collaboration tools and security. They offer a holistic approach resulting in higher standards as compared to organizations that handle it in-house. Turning to a trusted partner offers several advantages including:
If a company does not have a team dedicated to managing its IT infrastructure, it will be impossible to predict or manage disasters as they come along. This reactive approach can lead to lengthy downtimes and major data loss. Therefore, being proactive will save a lot of money for the company during disasters and in their aftermath and provide for budget for such emergencies.
Outsourcing functions such as cybersecurity and app development to a partner with technically skilled and specialized engineers in new and emerging technologies alleviates the pressure from the company.
If data is deleted, lost, corrupted, or compromised, it can be restored with the help of backups that have incorporated as part of the IT infrastructure. A careful and efficiently managed backup process reduces downtime, maintains productivity andcontinues to provide outstanding customer satisfaction.
IT organizations spend months deploying large systems. Outsourcing the management of the IT infrastructure helps an organization to scale up or scale down depending on the demand.
There are no more standard/fixed work hours any longer and it only makes sense to have a support system that is working constantly to support users. This can be supported by the service provider in an organized manner.
In addition to regular audits, organizations are also obligated to meet standards and requirements in accordance with the laws of the state. Laws could pertain to safety, reporting and security. All this can be handled by the service provider without adding the burden on the in-house staff.
Improving the infrastructure helps to improve agility, reduce time, effort and cost to manage the IT infrastructure internally. Simplifying equipment and processes will help to better identify weaknesses and necessary improvements in the infrastructure. There are a few important practices that simplify the management of IT infrastructure of an organization and improve its efficiency.
The concept of IT HUB is derived in tune from Secured Governance through a revolution that requires upturning all the procedures evolved through years of efforts and experience. It realizes the tools for bringing about effective and sustainable changes in the system. The methodology has been evolved through hands on experience in dealing with the industry and governmental system. When identifying and determining development potential within an economy a set of criteria is required against which to evaluate whether the effort being undertaken possesses development potential or not. The set of criteria serves as an evaluation tool to identify areas with potential for development and opportunities within each of the local economic sectors.
The IT HUB will provide innumerable benefits in the following way:
Today we find the valuation due to infrastructure growth is not optimally channelized towards infrastructure development and results in inequalities in society. Secured Governance compliments the present PPP (Public Private Participation) developmental model, by ensuring balanced participation of the private and public sector taking advantage of value and valuation of IT HUB thereby yielding higher returns. This valuation of infrastructure, which grows many folds, needs to be shared by society and by the Government to support infrastructure development, ensuring balanced growth.
Secured Governance for Information Technology will provide for high quality commercial development along IT HUB, which serve as Techno Economic HUB. These HUBs will be part of existing or new development project. These HUBs will not only facilitate telecom users but also promotes commercial units generating employment and revenue from the defined region. The HUBs aid to boost employment generation and sustainable investment opportunity in a big way. It is expected to attract billion crore rupees over the next five years and generating millions of direct and indirect employment opportunities in region. With the robust outlook of the IT sector, it is expected that India will see private and foreign participation in the development and financing of IT HUB infrastructure, engineering services, equipment supply and technology partnership in digital communication.
By,Dr P. Sekhar,Chairman,Unleashing India,Global Smart City Panel,MTGF
Summary
Article Name
Enhanced Role for Startup, Entrepreneurs with IT Infrastructure for Secured National Reincarnations
Description
In accordance with the Countries Global Ranking of Startup Ecosystem 2020 by global innovation mapping and research company StartupBlink, India ranked at 23rd position, a drop of 6 places from 17th position in 2019.
Author
TPT News Bureau
Publisher Name
THE POLICY TIMES
Publisher Logo
Continued here:
Enhanced Role for Startup, Entrepreneurs with IT Infrastructure for Secured National Reincarnations - thepolicytimes.com
Hybrid Work Will Change Everything, and Many Companies Aren’t Ready – Business Insider
It turns out, sending workers home to work may have been the easy part.
"Coming back scares the heck out of me," Tim Nall says. As the chief information officer of Brown-Forman, the 151-year-old alcohol and beverage brand that makes Jack Daniels, Nall must keep an eye on the productivity and security of 5,000 workers.
"We're going to have people in the office, people in their homes, people in different offices," Nall says. "It's definitely going to be a challenge."
More than 140 million Americans have received at least one vaccine dose roughly half of US adults and some companies are eager to return to offices as the threat of COVID-19 wanes. Google is pushing for a return to offices, capping employees' work-from-home to 14 days per year, while JP Morgan Chase CEO Jamie Dimon predicts that no more than 10% of his employees will work from home permanently.
But early data suggests that most offices won't be filled to full capacity anytime soon. In 2020 we went from working in the office to all working remotely. In 2021, we'll be both, and every employee will have their own path, Sanjay Beri, the CEO of the $3 billion cloud security startup Netskope, told Insider. "Every company has become more geographically dispersed. People are everywhere."
A recent PwC survey of US executives found that only 20% of employers want workers back in the office five days a week, even as companies like Atlassian give their employees unprecedented flexibility to work wherever they want on a permanent basis. In a separate survey of offices based in New York City, the average employer said they expect 56% of workers to return to offices on a regular basis while the rest work remotely.
Even as workers trickle back into offices, employers are signalling that they'll grant workers flexibility to come and go from offices as they please to keep capacity low in the wake of the pandemic.But all of that flexibility, and all of that uncertainty, introduces new kinds of challenge for IT departments everywhere.
Because while the move to remote work certainly wasn't a walk in the park, it was manageable: You knew, more or less, where every employee was located and how they were connecting to the network. With employees more freely splitting their time between the home, the office, and perhaps even the open road as a digital nomad, the situation gets much more complex. That complexity creates opportunities for the bad guys to exploit, the experts warn.
John Davis of Palo Alto Networks, a vice president in the area of public sector enterprises like government agencies, told Insider that "What we see most is hybrid it's part on-prem, part remote. And when it's cloud-based, it's multi-cloud. So security is an enormous problem."
The hybrid workforce is inevitable, says George Kurtz, the CEO of the $47 billion cloud security company CrowdStrike, which has seen its stock price triple over the past 12 months as it picks up new business protecting remote workers' laptops.
"People really want to get back out, and socialize at work, connect with each other. The social impact is important here," Kurtz told Insider. The CEO has calls with 25-30 companies a month, he said, and he is hearing that the drawbacks of working from home are mounting. "I think there's a negative to working from home, and that is it's meeting to meeting to meeting. There's no natural breaks in there. Dogs are barking, kids are screaming."
Still, Davis of Palo Alto Networks warns that a hybrid, multi-cloud workforce "opens up the attack surface, and once you're attacked, you're playing catch-up."
IT departments keep an eye on companies' computer programs, data, and employees. In the old days, that was all in one place: on the company's network in the office. Now the computer programs are on different servers some on the companies' own on-premises servers, and some in the public cloud, stored on remote servers run by Amazon, Microsoft, Google, and others.
The data may be in all those different servers, but also being processed in cloud software run by the likes of Salesforce, Snowflake, Databricks, and others. And employees may access the programs and data from their laptops and mobile devices using third-party apps on the companies' WiFi networks, their own home WiFi networks, and other WiFi networks when they commute or work elsewhere.
Things often break where they connect, and every one of those connections an employee connecting to an app, an app connecting to WiFi, WiFi connecting to data is a place where criminals use increasingly sophisticated tools to break into a companies' system and steal data like the account numbers of bank accounts, or credit card numbers. Or the criminals may lock up the whole operation by encrypting everything with a secret code and demanding a ransom be paid before it is released, playing into the ransomware crisis sweeping the globe.
In other words, in a hybrid workforce, every employee represents multiple targets for criminals and IT teams won't know who is where, and when.
This dynamic creates an urgency for every IT department. CrowdStrike's Kurtz says "companies are getting in motion. Some are already there. Some haven't started."
The ability to get in motion and adapt to a hybrid workforce depends on how much companies embraced digital transformation cloud computing, AI, automation, and cloud-based cybersecurity under the so-called "zero trust" model, which can better sift out those who should be accessing the data from those who, well, shouldn't.
"Some companies made the switch. You know, they invested in more systems and upgrades. Then there are others who didn't. There are going to be haves and have-nots," Kurtz said.
Agility and resilience will determine winners and losers, says Larry Link, CEO of Cequence Security, a 55-person startup in Silicon Valley. Link, a former Palo Alto Networks executive, helps to protect big companies' public-facing websites from getting hacked. He has big customers eager to work with a startup with new cloud-based, security approaches. "They know they need much more flexibility and much more agility as they are trying to figure out the changes. You don't know exactly how the workforce is going to evolve over these next two years."
It would be simple to say every company should have invested heavily in cloud-based security when COVID-19 hit. But a year ago, the world didn't know that the remote workforce just getting settled in at home was going to be more productive in many cases than it was in the office, not less or that employee burnout would be such an issue.
And companies didn't know that cloud computing was going to fare much better than on-premises networks. For while two of the largest cyberattacks in history rattled the world during quarantine the SolarWinds supply chain hack and Microsoft Exchange Server attacks they were primarily centered in the servers of empty offices, not in their cloud computer assets.
And yet, some did foresee the challenge of hybrid work.In May of 2020,Bret Arsenault, Microsoft's chief information security officer, warned that bringing people back into offices would be a gradual process. Now, Arsenault thinks of that process as "the next great disruption that is hybrid work," requiring cloud-based security tools that work "wherever your employees choose to work and connect from."
The past 12 months "fundamentally shifted the way many people think about security," which is now a matter of "protecting workers wherever they're doing their jobs," Okta CEO Todd McKinnon told Insider.
Investments in cloud-based "zero trust" cybersecurity are paying off for companies now, but protecting a hybrid workforce requires more than just buying equipment. It requires retraining employees who have just been through a year like no other. Beri, the Netskope CEO, says that the human aspect of digital transformation is important for companies to grasp.
"Your people have to be transformed," Beri told Insider. "They now have to learn not the way they used to work, and maybe not the way they want to work at first. And there are some who look at it the wrong way. They fear a power shift, a loss of power because they are losing territory. But the people and companies who have already gone down this course, adopting new tools, are more ready."
And the prepared firms aren't necessarily smaller, younger companies. "Jack is over 150 years old, and Brown-Forman is 151 years old, so a lot of people think that we're just this old, established company," says Nall, the CIO at the beverage and liquor company. That hasn't stopped the company from aggressively modernizing its IT strategy, he says: "We've been in the cloud since 2010."
Nall believes that prepares his company well for the many difficult changes that are coming. Over the past year his company has cranked out more work than ever, rebounded well from a ransomware attack, and begun the process of coming back to the office. Nall says his company is better prepared "because of the investments that we made pre-pandemic" in cloud-based security products like Okta's multi-factor authentication products.
His people have grown more comfortable with change like adopting new cloud-based security tools, Nall says. That familiarity and open-mindedness is crucial for managing the change, he believes. After a year in lockdown, workers are venturing into a new hybrid workplace that will be filled with challenges.
"We used to worry a lot more about how our employees were going to accept changes," Nall says. "I don't worry about that anymore."
The rest is here:
Hybrid Work Will Change Everything, and Many Companies Aren't Ready - Business Insider
Data Center Server Market is Projected to witness Strong Growth during the Forecast Period KSU | The Sentinel Newspaper – KSU | The Sentinel…
According to the latest report by IMARC Group, titled Data Center Server Market: Global Industry Trends, Share, Size, Growth, Opportunity and Forecast 2021-2026, the global data center server market reached a value of US$ 45.8 Billion in 2020. Data center servers refer to the physical or virtual devices that are used to collect, store, process, organize and distribute large amounts of important data. These servers are used to transfer data over different computers and are referred to as the backbones of data centers a centralized location where these servers are usually housed. The servers are widely utilized across various industries and sectors such as banking, healthcare, financial institutions, IT and telecommunication, government and retail.
Request for a sample copy of this research report:https://www.imarcgroup.com/data-center-server-market/requestsample
Market Trends:
Data center servers aid in the swift transfer of huge data sets and subsequent generation of reliable information. Consequently, numerous commercial and industrial enterprises are employing these servers to streamline their operations, thus contributing to the market growth. Moreover, users are increasingly inclined toward public and private cloud-based solutions, such as Google Drive, Amazons Cloud Drive, and Apples iCloud, owing to the convenience and security offered by these services. Furthermore, the rising adoption rate of the Internet of Things (IoT) in diverse industries has led to escalating demand for data centers for analysis and storage at several locations. Another emerging trend in the market is the introduction of energy- and cost-effective micro-servers which are preferred by small- and medium-sized organization for tasks requiring relatively lower computing power. Owing to the aforementioned factors, Looking forward, IMARC Group expects the global data center server market to exhibit moderate growth during the next five years
Browse full report with detailed TOC and list of figures and tables:https://www.imarcgroup.com/data-center-server-market
Market Summary:
About Us
IMARC Group is a leading market research company that offers management strategy and market research worldwide. We partner with clients in all sectors and regions to identify their highest-value opportunities, address their most critical challenges, and transform their businesses.
IMARCs information products include major market, scientific, economic and technological developments for business leaders in pharmaceutical, industrial, and high technology organizations. Market forecasts and industry analysis for biotechnology, advanced materials, pharmaceuticals, food and beverage, travel and tourism, nanotechnology and novel processing methods are at the top of the companys expertise.
Contact UsIMARC GroupUSA:+1-631-791-1145Email:sales@imarcgroup.comWebsite:https://www.imarcgroup.comFollow us on twitter:@imarcglobal
IBM builds containerised version of Spectrum Scale Blocks and Files – Blocks and Files
IBM is launching a containerised derivative of its Spectrum Scale parallel file system called Spectrum Fusion, as well as delivering new ESS 3200 Elastic Storage System storage array and a capacity enhancement for the ESS 5000.
The rationale is that customers need to store and analyse more data at edge sites, while operating in a hybrid and multi-cloud world that requires data availability across all these locations. The ESS arrays provide Edge storage capacity and a containerised Spectrum Fusion can run in any of the locations mentioned.
Denis Kennelly, IBM Storage Systems general manager, said in a statement: Its clear that to build, deploy and manage applications requires advanced capabilities that help provide rapid availability to data across the entire enterprise from the edge to the data centre to the cloud. Its not as easy as it sounds, but it starts with building a foundational data layer, a containerised information architecture and the right storage infrastructure.
Spectrum Fusion combines Spectrum Scale functionality with unspecified IBM data protection software. It will appear first in a hyperconverged infrastructure (HCI) system that integrates compute, storage and networking. This will be equipped with Red Hat Open Shift to support virtual machine and containerised workloads for cloud, edge and containerised data centres.
Spectrum Fusion will integrate with Red Hat Advanced Cluster Manager (ACM) for managing multiple Red Hat OpenShift clusters, and it will support tiering. We dont yet know how many tiers and what types of tiers will be supported.
Spectrum Fusion provides customers with a streamlined way to discover data from across the enterprise, IBM said. This may mean it has a global index of the data it stores.
IBM also said organisations will manage a single copy of data only i.e. there is no need to create duplicate data when moving application workloads across the enterprise. The company does not mention data movement in its launch press release.
Spectrum Fusion will integrate with IBMs Cloud Satellite, a managed distribution cloud that deploys and runs apps across the on-premises, edge and cloud environments.
We asked IBM some questions about Spectrum Fusion:
Blocks & Files: What is the data protection component in Spectrum Fusion?
IBM: For data protection, Spectrum Fusion primarily will leverage a combination of the technology within Spectrum Protect Plus and the storage platform layer based on Spectrum Scale.
Blocks & Files: How many storage tiers are supported?
IBM: Spectrum Fusion will support 1,000 tiers that can span across an enterprise and cloud including Flash, HDDs, Cloud(S3) and tape.
Blocks & Files: Spectrum Fusion is being designed to provide customers with a streamlined way to discover data from across the enterprise. Does that mean it has some kind of global data index?IBM: Spectrum Fusion implements a global file system with a single name space so it does have global awareness of file names and locations. We will support 8YB (yottabytes) of global data access and namespace that can span across the enterprise and cloud. The technology is based on existing IBM advanced file management (AFM) technology currently available in Spectrum Scale. Existing NFS or S3 data from other vendors can be integrated into this global data access allowing existing data sources to integrate into Spectrum Fusion environments.
Blocks & Files: Organisations will be able to manage only a single copy of data and no longer be required to create duplicate data when moving application workloads across the enterprise. How will they access the data from a remote site? Will the data be moved to their site?
IBM: Yes when accessed for optimal performance. For remote access, Spectrum Fusion will automatically move/cache only the data needed to a remote site. With local caching in the remote site, the system can deliver high performance but without the expense and security concern of duplicating large volumes of data. The applications will see the data as a local file but the data is physically located on a remote system (Spectrum Scale, remote NFS FS, or an S3 data bucket).
IBMs ESS systems are clustered storage servers/arrays with Spectrum Scale pre-installed. The ESS 3000 is a 2U-24-slot box fitted with NVMe flash drives and up to 260TB usable capacity. It is a low-latency analysis node.
The high-end ESS 5000 capacity node has two POWER9 servers, each 2U high and running Spectrum Scale, and uses 10TB, 14TB or 16B disk drives in either 5U92 standard depth storage enclosures or 4U106 deep depth enclosures. It scales up to 13.5PB with eight of the 4U106 enclosures.
The new ESS 3200 comes in a 2U box filed with NVMe drives and outputs 80GB/sec; a 100 per cent read performance boost over the ESS 3000. It supports up to 8 InfiniBand HDR-200 or Ethernet-100 ports and can provide up to 367TB of storage capacity per node.
The ESS 5000 has been updated with a capacity increase and now scales up to 15.2PB.
All ESS systems are now equipped with streamlined containerised deployment capabilities, automated with the latest version of Red Hat Ansible. Both the ESS 3200 and ESS 5000 feature containerised system software and support for Red Hat OpenShift and Kubernetes Container Storage Interface (CSI), CSI snapshots and clones, Windows, Linux and bare metal environments.
The 3200 and 5000 work with IBM Cloud Pak for Data, a containerised platform of integrated data and AI services, for integration with IBM Watson Knowledge Catalog (WKC) and Db2. They are also integrated with IBM Cloud Satellite.
Spectrum Fusion in HCI form will become available in the second half of the year and in software-only form in early 2022.
View post:
IBM builds containerised version of Spectrum Scale Blocks and Files - Blocks and Files
CISA tests cloud log aggregation to ID threats – GCN.com
CISA tests cloud log aggregation to ID threats
The Cybersecurity and Infrastructure Security Agency is testing how well aggregated cloud logs can feed its cybersecurity analysis efforts and improve cloud network visibility.
CISAs Cloud Log Aggregation Warehouse collects, aggregates and analyzes national cybersecurity protection system data from agencies that use commercial cloud services. It combines that information with data from Einstein sensors in a cloud-based architecture for improved situational awareness.
CISA wants to see if it can make sense of [the logs] as a community together, CISA CTO Brian Gattoni said at an April 28 event hosted by FCW. "We've run pilots through the [Continuous Diagnostics and Mitigation] program team, through our capacity building team, to look at end point visibility capabilities to see if that closes the visibility gap for us."
In public settings, CISA officials have made clear the government's current programs were not designed to monitor the vectors that Russian intelligence agents exploited during their espionage campaign. They have begun seeking out new capabilities that present a clearer picture on individual end points in agency networks.
In March, Eric Goldstein, a top CISA official, told House lawmakers that "CISA is urgently moving our detective capabilities from that perimeter layer into agency networks to focus on these end points, the servers and workstations where we're seeing adversary activity today,"
Gattoni said during his panel discussion that some cloud providers already have the infrastructure built into their service to help CISA aggregate the security information it wants, but he also said the federal government can't depend on that always being the case.
"There's a lot of slips between the cup and the lip when it comes to data access rights for third-party services, so we at CISA have got to explore the use of our programs like [CDM] as way to establish visibility and also look at possibly building out our own capabilities to close any visibility gaps that may still persist," he said.
This article was first posted to FCW, a sibling site to GCN.
About the Author
Justin Katz covers cybersecurity for FCW. Previously he covered the Navy and Marine Corps for Inside Defense, focusing on weapons, vehicle acquisition and congressional oversight of the Pentagon. Prior to reporting for Inside Defense, Katz covered community news in the Baltimore and Washington D.C. areas. Connect with him on Twitter at @JustinSKatz.
See the rest here:
CISA tests cloud log aggregation to ID threats - GCN.com
The evolution and future of cloud-native security – SDTimes.com
With the acquisition of my company, StackRox, by cloud-native technology vendor Red Hat, it seems like a good time to reflect on the state of cloud-native security. Security in the cloud has been my life for the past five years, and its changed very quickly as new cloud-native platforms have taken over the industry. Weve had to create new tools and approaches to meet the new technologies and workflows of todays cloud and will need to continue evolving them to meet the challenges of tomorrows.
Before we get into the future of cloud-native security, though, lets look at where we started in the distant past of seven years ago.
Our industry started with a focus on basic security hygiene for containers, which formed the basis for container security. While container-related technologies had existed for over a decade, Docker provided the toolset that popularized the Linux container as a standard distribution format for applications, making it widely accessible and adopted. While it started out with developers building and running containerized apps on their local machines, Docker containers rapidly found their way into many software environments.
RELATED CONTENT:4 reasons the future of cloud-native software is open source
Suddenly, with thousands of applications being distributed via Docker Hub, people realized this new, emerging area of the stack created new security problems. One of the most straightforward to address first was preventing obviously vulnerable software from being introduced into production environments. Container image scanning became commonplace, with many different options available, including open-source scanners like Clair and OpenSCAP, paid offerings like Black Duck, and ones proprietary to cloud providers.
The Clair team built it in 2015 to detect vulnerabilities as soon as images were pushed to a registry. By making your container contents more visible, we helped mitigate the distribution of vulnerable applications across servers and workstations. This may sound historical, but many popular public container images are still vulnerable, remarked Louis DeLosSantos of the Clair project.
Image scanning was good enough for most users since they were still running containers in a limited context, such as for non-sensitive web apps, or strictly in development and testing. But then organizations started running containers in production and everyone had to think about baseline security best practices for the underlying container infrastructure, which led to the Center For Internet Security (CIS) Benchmark for Docker and other tools and guidelines such as those published by the National Institute of Standards and Techonlogy (NIST). A few platforms, like OpenShift and CoreOS, extended this approach with security modules to further lock down the operating system on the underlying nodes.
Generally speaking, this combination of image scanning and secure infrastructure configuration then became the new good enough for production deployments, partly because there was no standard for container orchestration yet. The major competing orchestration systems (including Kubernetes, Fleet, Docker Swarm, Marathon, and others) each varied in their feature set, meaning that security tools would have to play to the lowest common denominator to support all of them. Where the security functionality they provided wasnt sufficient for users, a new ecosystem of container security vendors quickly emerged to fill in the gaps and augment the major platforms. They provided and continue to provide solutions for security use cases such as runtime security, compliance, and network segmentation.
As Kubernetes became the dominant orchestration platform, container security evolved into Kubernetes security, the foundation for cloud-native security today. Enterprises rapidly increased their adoption of cloud-native technologies and matured their usage patterns of containerized applications: running in production, deploying sensitive workloads, scaling to hundreds of nodes, and implementing multi-tenant and multi-cluster scenarios. As a result, it eventually became clear that the only way to effectively manage security is to align with the system that is managing the applications that need to be protected.
As a result, we started extending security use cases into the Kubernetes infrastructure itself. Vulnerability management meant supplementing image scanning with scanning for, and fixing, vulnerabilities within the Kubernetes control plane and node components. Configuration management evolved to encompass securing Kubernetes configurations rather than just container configurations. CIS released a Kubernetes security benchmark. Security vendors developed threat detection methodologies focused on finding exploits to Kubernetes components like the Dashboard and malicious activity such as cryptojacking; Microsoft researchers published a Kubernetes Threat Matrix based on the well-known MITRE ATT&CK framework.
This shift to Kubernetes security was also reflected in community efforts that focused on identifying security issues within, and protecting, Kubernetes itself. The Cloud Native Computing Foundation performed a security audit of the main Kubernetes components. The Kubernetes community launched SIG-Security, as well as requiring all component teams to have a member responsible for security, and switching the default settings for controls such as Role-Based Access Control (RBAC) in Kubernetes from optional to mandatory.
The next phase of cloud-native security is already underway, and we are progressing from Kubernetes security to Kubernetes-native security, as we describe in our whitepaper. The small difference between those two phrases belies a widespread evolution in integration, tooling, and approaches. Kubernetes-native security ensures that security is tightly coupled with the underlying Kubernetes platform (such as OpenShift) and extends security controls by taking advantage of the extensibility of Kubernetes. Features like Custom Resource Definitions (CRDs), created to enable application automation, also allow us to achieve security automation.
A key element of Kubernetes-native security is making the stack secure by default. We know that users frequently stick to default configurations, which historically have been left insecure for operational convenience or backwards compatibility. With Kubernetes-native security, there is also the opportunity to provide all the capabilities that someone needs across the full application lifecycle for many different common scenarios, whether dev/test or production, single or multi-cluster, and public web apps or ones that process and store sensitive data.
Aside from integration with native Kubernetes extension points, cloud-native security will also succeed through close integration with DevOps practices and teams, allowing them to manage their security declaratively the same way they manage their infrastructure and workloads. This is what we mean when we refer to the phrase shift left: embed and automate security in the workflows that people already use instead of making it an exception. DevOps teams are the new security users we must enable, and our security tooling must be built with them in mind.
By shifting security left with DevSecOps and leveraging Kubernetes to define security controls as code with a trusted, automated application and deployment pipeline, organizations can achieve highly scalable security and compliance, while spending less time remediating and more time innovating, explained Chris Van Tuin, West Region Chief Solutions Architect, Red Hat.
Newer technologies like serverless platforms and service meshes, like early orchestration, are still more fragmented and as a result dont yet have comprehensive security practices. However, since most of these are built on top of Kubernetes, they too benefit from a Kubernetes-native security approach. We can also extend our approach to cover the new security use cases that arise when they are used.
Cloud-native security continues to evolve and improve rapidly. Since so much of it is open source, you can keep current on it by participating in the Kubernetes and CNCF security SIGs and following projects like Clair, StackRox, OpenShift, and many others. As you continue on your journey with Kubernetes, you can expect security to continually evolve to meet the demands of your business.
To learn more about the transformative nature of cloud-native applications and open source software, check out KubeCon / CloudNativeCon Europe 2021, a virtual event hosted by the Cloud Native Computing Foundation, which takes place May 4May 7. For more information or to register for the event,go here.
Go here to see the original:
The evolution and future of cloud-native security - SDTimes.com
Questions to ask when modernising IT infrastructure using the cloud – Finextra
As financial organisations continue their digital transformation, using a cloud-based infrastructure is no longer a choice: it has become a must-have. The debate lies in choosing the right type of cloud environment and the associated tools and processes. There are multiple aspects to bear in mind, and this articledoesnotcover every single one of those (a whole book could be written on the topic). However, to aid with the decision-making process, here are some questions and considerations.
A good starting point is defining the aim of digital transformation. Often there are multiple interconnected reasons. Taking a hypothetical mid-sized bank with 200 banking centres across a European country and with a full suite of financial products, here are a few examples:
Different flavours of cloud
Once the end goals are clear, the next step is to look at what type of cloud environment to use, together with other supporting technologies. There are various types of cloud, mainly multi-cloud, hybrid, hybrid-multi cloud and distributed cloud.
Multi-cloud means using multiple public cloud providers, and the benefits include vendor independence and improving disaster recovery by replicating workloads across different cloud providers. Hybrid cloud refers to a combination of both public and private clouds (and they could all be from the same provider). For financial service providers, the appeal is they can choose to have certain data reside within their own data centres.
In a distributed cloud environment, a public cloud can be run in multiple locations: on the cloud providers infrastructure, on-premise, even in other cloud providers data centres, but all managed from a single point of control.=Eventually,it willalso supportsedge computingas it evolves, whereby servers and applications are brought closer to whereconsumers arelocated.
Container consideration
Another consideration is which container orchestration to use. There is no doubt that containers have revolutionised how software is developed, deployed and managed, speeding up time-to-market and reliability. They have become fundamental to flexible, cloud-based digital transformation.
Various orchestration technologies each have their pros and cons, but often they can co-exist and run side-by-side so banks can pick-and-mix. Another question is whether to use an orchestration tool from a cloud vendor, or install your own choice?
Factors in containerisation orchestration technology choice include the number of clusters that need management and how to address that. Typically banks and other financial institutions find they are managing multiple clusters, perhaps even hundreds, especially when IoT andedge devices such asmobile payment terminals, cheque scanners, and ATMs are involved.The greater the complexity, the higher the level of risk, which in turn can jeopardise security.
Therefore, the selected containerisation orchestration tool needs to reduce, not contribute, to complexity. The simplicity of implementation, management and trouble-shooting is a vital requirement. Associated with that is how well can security be implemented across clusters. For many organisations, straightforward scalability is going to be necessary too.
Since maintaining regulatory compliance is a big consideration for financial services firms, the overall cloud environment must continue to comply with GDPR, Sarbanes-Oxley and other local regulations. How is authentication between different components of the environment handled?
As is usually the case with technology, when it comes to choosing the right cloud environment, there is no one-size-fits-all solution. What matters is selecting the cloud infrastructure and supporting tools that best fit the financial organisation today and for years to come. Digital transformation is not a one-time event but rather a continuing evolving process, which is why embarking on modernising IT infrastructure sooner rather than later is so essential.
Originally posted here:
Questions to ask when modernising IT infrastructure using the cloud - Finextra
Developer asks, is AWS and Azure killing Linux? – MSPoweruser – MSPoweruser
While Microsoft is building Linux into Windows 10, the companys cloud services may be quietly killing Linux on the server.
More specifically, Engineering Director Mariano Rentera argues that the cloud, in the form of Amazons AWS and Microsofts Azure, is killing off Linux jobs.
Whereas before when companies had an IT project they would host it themselves on their own (likely Linux-based) server farm, these days companies build to the cloud, and they do not even build to Linux virtual machines, but rather platform-agnostic APIs and micro-services which are abstracted from the OS they are built on.
While the cloud may still be built on Linux servers, they are now centrally administered by a much smaller number of technicians, and Rentera argues that if Amazon wanted to, they could easily shift their servers to another operating system without affecting the APIs companies connect to.
Given the move away from writing to (and managing) the metal, the interest in becoming a Linux architect has plunged while the interest in becoming a cloud architect has soared.
It is also cheaper to certify as a cloud architect than a Linux architect with the AWS exam costing $150 and the RedHat Certified Engineer costing $400 per exam.
Rentera concludes:
I see less useful to know Linux in a cloud first era, where the number of people getting certified to be a Cloud Architect is growing, while the number of people looking to get a Linux certification is decreasing.
The current tools make a great abstraction of service without needing to have strong knowledge of Linux, are more developer friendly and allow to build products faster.
Im not saying this is a bad thing, this is just something that could happen sooner than we have thought about.
While Linux is finding application outside of company server rooms, such as IoT devices, it seems it makes increasing sense for new IT trainers to look elsewhere for a career path.
Original post:
Developer asks, is AWS and Azure killing Linux? - MSPoweruser - MSPoweruser
Anticipating Amazon’s Formal Disruptive Entry Into The PC Space | eWEEK – eWeek
Next month, Amazon will launch its first PC-like product with a version of the Amazon Fire tablet bundled with a keyboard; it includes one-year of Microsoft Office 365 use. At a price well below $300, this product provides an interesting alternative to offerings like the iPad Pro and Surface Go, both of which are more expensive.
This new Fire Tablet 10+ has things like wireless charging that low-end products often dont get and it comes preloaded with Amazons core offerings and access to a curated app store with a subsection of Android apps.
But, if you put the Microsoft Virtual Desktop on the device and connected it to a robust cloud solution like, oh, I dont know, AWS, and then you provided more extensive screen offerings, Amazon could jump early to where everyone else seems to be going: the Virtual Desktop. And, because they have no PC installed base, this move wouldnt put any existing products for Amazon or current customers at risk.
Lets talk about the promise and danger of Amazons entry into the PC market this week.
As we improve performance and drop networking latency with products like Wi-Fi 6e and 5/6G, we increase the ability to provide a mobile thin client, or terminal, like experience. The market has wanted this experience back ever since it moved from Windows but has been hampered by the lack of performance with Thin Client solutions. But new servers created by companies like IBM (ZLinux) and those coming based on the new NVIDIA Grace processor promise i/o capability we havent yet seen in the cloud. And these advancements should future enable virtual PCs.
But this wave needs a champion, and, other than Microsoft, none of the major PC vendors has the necessary cloud back-end prominence to make this work. But Amazon certainly does. While theyve mostly played in the low-cost tablet and digital assistance space until now, this latest Amazon Fire 10+ tablet comes close to providing the foundation for this appliance like virtual PC future.
Currently, the Amazon offer is only using a subscription to Office 365 as the bridge technology to the PC but, for most working from home that lives in Office and a Web Browser that may be adequate. This offering will allow Amazon, with their sub $300 PC, to explore the opportunities of PAAS (PCs As A Service) with a relatively small hardware and software commitment to the effort.
That knowledge and the related data should allow them to carve out an AWS service that mirrors what we once had with mainframes a host-centric, centrally managed, PC service with very low-cost hardware, high cloud-based security and performance options, and a far less complex (read: lower operating cost) option to PCs.
If successful, this initial offering will likely lead to larger-screened alternatives tied to more and more enterprise-class cloud features that Amazon has and could uniquely bundle into desktop offerings. This effort stands as a warning that at any time, any one of the major cloud vendors, here or in China, could massively disrupt the PC market in both the consumer and business space. This would be much like Netflix and Amazon took out Blockbuster in movies and Amazon took out some bookstores with Kindle and online purchasing.
The economies of scale, security, performance, and cost advantages of a cloud-based PC offering could, driven by any of these Cloud vendors, do to the PC market what Apple did to the Smartphone market, forcing some existing players to exit the market prematurely.
Markets can change dramatically over short periods, through changes in products or regulations. While many of the changes last century, like the collapse of Standard Oil, RCA, and AT&T, were partially based on regulatory changes, later changes were more driven by vendor disruption.
Netscape took out America Online and CompuServe. Microsoft took out Netscape Navigator; Google took out most prior search products like Ask Jarvis; Apple took crippled or took out Microsoft Phone, Nokia, Research in Motion, Palm, and Motorola, and Sony Walkman.
This move by Amazon could foreshadow a very similar pivotal event, and the shifting WFH (Work From Home) requirements could significantly accelerate this pivot. The market is moving to a cloud-centric, terminal model for PC productivity for reliability, security, cost of ownership, and remote management benefits tied to working from home. It looks like Amazon wants to pull an Apple and get there first.
Link:
Anticipating Amazon's Formal Disruptive Entry Into The PC Space | eWEEK - eWeek