Category Archives: Cloud Storage
AMD Brings World-Class Performance of 4th Gen AMD EPYC … – Investor Relations
NRNBERG, Germany, March 14, 2023 (GLOBE NEWSWIRE) -- Embedded World 2023 (Hall 2, Stand 2-411) AMD (NASDAQ: AMD) today announced it is bringing world-class performance and energy efficiency to embedded systems with AMD EPYC Embedded 9004 Series processors. The new 4th generation EPYC Embedded processors powered by Zen 4 architecture provide technology and features for embedded networking, security/firewall and storage systems in cloud and enterprise computing as well as industrial edge servers for the factory floor.
Built on the Zen 4 5nm core, the processors combine speed and performance while helping reduce both overall system energy costs and TCO. The series is comprised of 10 processor models with performance options ranging from 16 to 96 cores, and a thermal design power (TDP) profile ranging from 200W to 400W. The performance and power scalability afforded with AMD EPYC Embedded 9004 Series processors make them an ideal fit for embedded system OEMs expanding their product portfolios across a range of performance and pricing options. The AMD EPYC Embedded 9004 Series processors also include enhanced security features to help minimize threats and maintain a secure compute environment from power-on to run time, making them well suited for applications with enterprise-class performance and security needs.
Supporting enterprise-grade reliability, AMD EPYC Embedded 9004 Series processors are targeted for heavy workload, always-on embedded systems requiring exceptional compute performance and I/O agility in a power-optimized profile, said Rajneesh Gaur, corporate vice president and general manager, Embedded Solutions Group, AMD. With the launch of the EPYC Embedded 9004 Series processors, were bringing the power of data center-level computing to embedded networking, security, storage and industrial applications.
With AMD EPYC Embedded 9004 Series processors, customers can create a variety of embedded networking, security, storage and industrial systems that operate in the most demanding conditions. AMD EPYC Embedded 9004 offers the world-class performance and efficiency, enhanced data security features and unmatched core scalability of the EPYC 9004 Series server processor, while providing unique, embedded-specific benefits to help improve reliability and system longevity including:
Customer Traction
Siemens and Advantech are among the lead OEM and ODM customers deploying the AMD EPYC Embedded 9004 Series. The processors will also be deployed by customers in networking for next-gen firewalls and software-defined routers, as well as enterprise and cloud storage systems.
Siemens new SIMATIC IPC RS-828A server is powered by the EPYC Embedded 9004 Series processors. The system is designed for hyper-convergent infrastructures serving a wide range of applications, including automotive manufacturing, 5G base stations and IoT public clouds. The server can also be useful for applications involving AI or heavy computation, such as visual tracking in a retail environment.
Siemens selected the AMD EPYC Embedded 9004 Series devices for our new high-performance, data center-class server because the processors reliably deliver performance and power efficiency while being able to operate seamlessly in extreme temperatures, as well as in settings with vibration or electromagnetic interference, said Thibault de Assi, head of business line industrial computing, Siemens. With AMD leadership in the data center, we have been able to leverage its exceptional expertise for our industrial-grade products, where performance and efficiency are paramount. The new processors will open new opportunities for the industrial market.
Advantechs new ASMB-831 server board, with HPC-7420 4U Rackmount, features five PCIe Gen5 x16 and two PCIe Gen5 x8 slots for four double-deck cards with DDR5 4800 MHz RDIMM and up to 384GB (6 DIMMS). The ASMB-831 server board is designed to enable image analysis in various use cases, including industrial machine vision, AOI and facial recognition for smart city applications, and security surveillance.
AMD EPYC Embedded 9004 Series ProcessorOverview
Freq
(GHz)
(GHz)
AMD at Embedded World 2023At Embedded World 2023, AMD will be showcasing its latest hardware and software innovations for embedded applications and markets in Hall 2, Stand 2-411. Product and solution demonstrations will feature the new AMD EPYC Embedded 9004 Series processors, Ryzen Embedded devices, Kria SOMs and Zynq and Versal adaptive SoCs powering industrial, vision, automotive and healthcare-based applications. Learn More
EPYC Embedded 9004 AvailabilityThe AMD EPYC Embedded 9004 Series processors are sampling now with production shipments expected in April 2023. To accelerate development, evaluation kits featuring a reference board, comprehensive documentation and development tool kits are available now to qualified customers.
Supporting Resources
About AMDFor more than 50 years AMD has driven innovation in high-performance computing, graphics and visualization technologies. Billions of people, leading Fortune 500 businesses and cutting-edge scientific research institutions around the world rely on AMD technology daily to improve how they live, work and play. AMD employees are focused on building leadership high-performance and adaptive products that push the boundaries of what is possible. For more information about how AMD is enabling today and inspiring tomorrow, visit the AMD (NASDAQ: AMD) website, blog, LinkedIn and Twitter pages.
AMD, the AMD Arrow logo, EPYC, Kria, Ryzen, Versal, Xilinx and combinations thereof are trademarks of Advanced Micro Devices, Inc. Other names are for informational purposes only and may be trademarks of their respective owners
Contact:David SzabadosAMD Communications(408) 472-2439 david.szabados@amd.com(408)386-4621
Suresh BhaskaranAMD Investor Relations(408) 749-2845 Suresh.bhaskaran@amd.com
Released March 14, 2023
More here:
AMD Brings World-Class Performance of 4th Gen AMD EPYC ... - Investor Relations
Gartner: So long HCI MQs, hello full-stack HCI software Blocks and … – Blocks and Files
Gartner has kissed the HCI appliance market goodbye. Its analysts have taken a fresh look at the HyperConverged Infrastructure (HCI) market, and moved away from an appliance approach, looking instead at full stack software suppliers of server, storage and network infrastructure management.
The folk at Gartner have produced a Market Guide for Full Stack HyperConverged Infrastructure Software which looks at three well-known suppliers: Microsoft (Azure Stack HCI), Nutanix and VMware (VMware Cloud Foundation); and three less prominent suppliers: ArcherOS, Sangfor Technologies, and SmartX. They say this is not an exhaustive list. We note that HCI systems from Cisco (HyperFlex), HPE (Alletra 5000 and SimpliVity), Quantum (Pivot3) and Scale Computing (HyperCore) are not included. Neither are the VxRail and PowerFlex systems from Dell.
The reports strategic planning assumption is that, through 2024, more than 75 percent of data center x86 workloads will continue to use hypervisor-based virtualization, down from approximately 80 percent in 2020, and despite cloud migration and container adoption. It declares: This market consists of those vendors that develop and sell hyperconverged infrastructure software comprising the vendors own server virtualization, software-defined storage and network management tools.
The full stack components are hypervisor, containers, storage, network, infrastructure management, cloud management and monitoring. The global full stack HCI market is worth more than $1 billion. The report writers think that, as full-stack HCI software has evolved, the integrated support of orchestration tools such as Kubernetes has increased across many providers. The actual use of these tools, though, is minimal at the moment. Edge computing support is another coming feature.
There are two kinds of suppliers: global ones and regional ones. Microsoft, Nutanix and VMware are global. China-based ArcherOS is an APAC and EMEA supplier as is Sangfor, also China-based,while SmartX, another China-based provider, is an APAC region player. The Chinese players have an APAC presence, obviously, with two having expanded into EMEA, but none of the three have meaningful presence in North America.
The report profiles each vendor and closes by saying it provides Gartners initial coverage of the market and focuses on the market definition, rationale for the market and market dynamics. There is no Magic Quadrant for this sector, yet.
In some ways this Gartner document is equivalent to a GigaOm Sonar emerging technology report, being an introduction to a new field with a fresh set of players. But it is also, of course, an attempt to inject fresh analytical energy into what has become a boring, mature and staid market the hyperconverged infrastructure appliance market. That is dominated by Dell, VMware and Nutanix, and not set to change anytime soon.
This new Gartner report could find welcome readers in the APAC and EMEA regions who are exposed to the three Chinese HCI suppliers.
Bootnote
The Gartner report ID is G00779344 and the analysts were Jeffrey Hewitt, Philip Dawson, Tony Harvey, and Julia Palmer.
Go here to see the original:
Gartner: So long HCI MQs, hello full-stack HCI software Blocks and ... - Blocks and Files
Recover Deleted Dropbox Files in 2023 [Versioning & Rewind] – Cloudwards
When you delete a file or folder from any platform, there are often ways to get it back. With cloud storage services like Dropbox, getting back a deleted file is as simple as visiting the services deleted files folder. However, what happens when you want to recover deleted Dropbox files that are no longer available in the trash?
In this article, well show you how to recover deleted Dropbox files that are still available in the file history and files that arent. Well use some tools provided by Dropbox and some third-party tools. Well also show you how to restore older versions of files using Dropboxs version history.
Its also important to know the common reasons other than deletion that can cause files to go missing. Well explore some of these in depth and let you know how to prevent them from affecting you.
Dropbox is a top-notch cloud storage service, and theres a lot to learn about it, so check out our Dropbox review if youre unfamiliar.
You can recover permanently deleted files on Dropbox by using data recovery software, such as Stellar, Prosoft Engineering and EaseUS.
You can recover files youve deleted within the last 30 days (or 180 days for Professional and Business users) from Dropboxs deleted file history.
Deleted files that are no longer available in Dropbox after 30 and 180 days can be recovered using Dropbox recovery software.
Not unless theyve stayed deleted for more than 30 days (or 180 days on Professional and Business plans). In this case, you can only recover them using data recovery software.
Follow these steps to recover deleted Dropbox files that are still available in Dropboxs deleted file history.
When you delete files from Dropbox, you can still recover them for up to 30 days (or 180 days on Professional and Business plans). You also have the option to permanently delete them if youre sure you wont be needing them in the future.
Its important to note that you can restore a shared file within Dropbox only if you have can edit access to it. You wont be able to restore the file if you have can view access.
Open dropbox.com in your browser and sign in to your Dropbox account. Click on deleted files at the left-hand corner of the screen.
Place your cursor on the deleted file you want to recover and click the checkbox by it. You can select multiple files or folders.
Click restore at the right-hand corner of the screen. Restoration can take a long time if youre restoring many files.
When you make changes to files or folders in your Dropbox account, the older versions are stored in a repository known as version history. With version history, you can view and restore any previous version of a Dropbox file.
Follow these steps to restore previous versions of files in your Dropbox account.
Place your cursor over the file whose older version you want to recover and click the (ellipsis) icon.
From the menu that appears, place your cursor over activity and click on version history.
Click any of the versions to see a preview. If the preview shows the version you want to restore, click roll back to this version to restore it.
Youll see the preview of the old version one last time in Dropbox Paper. Once youre done, click roll back to this version to complete the restoration.
If you cant find your missing file in the deleted files folder, youre not out of options yet. Dropbox rewind is Dropboxs tool for data recovery. You can use it to roll back a folder, or your entire account, to any time within the last 30 days (180 days for Professional and Business plans).
Dropbox rewind is available on Dropbox plans, including the Dropbox Backup plan and Dropbox Plus, Family, Professional, Standard, Advanced and Enterprise. Unfortunately, you cant access this feature on the Dropbox Basic (free) plan.
Heres a step-by-step guide on how to use Dropbox rewind. This process applies to both rewinding your entire Dropbox account and rewinding a single folder.
Sign in to dropbox.com and click on the (ellipses) icon beside organize.
On the dropdown menu that appears, click rewind this folder.
On the sidebar that appears at the right, click on try rewind.
Click on the graph to pick a day. Its best to pick a day right before the file loss incident occurred. This is usually indicated as a spike on the graph. The graph is a timeline of all the past versions of your file.
To acknowledge that you want to go ahead with this, click continue.
A list called fine tune will appear on the right, showing the timeline of the changes youve made to the folder. Locate the oldest change you want to undo and click the blue line below it. This will blur all the file changes above the blue line, which means theyll be undone after the rewind.
Tap continue to go ahead with the fine tune.
From the sidebar that appears on the right, tap rewind. Rewinding will take a few seconds. Youll receive an email once it is complete.
The incidence of missing files can be due to several issues, including file corruption, virus attacks, accidental deletion, accidental overwrites and sync errors.
Files get corrupted when theyve been contaminated with harmful data from another program, or when a computer shuts down or experiences a power surge while a file is still open.
Virus attacks are another common cause of lost files. A type of malware called ransomware can bar access to files on a computer and demand a ransom in exchange for regaining access to them. It does this by encrypting the files.
Sometimes a user, program or piece of malware may set a files property to hidden while the file explorer is not configured to show hidden files. This can make the file appear to not exist anymore.
To prevent files from going missing, always close files completely before shutting down your computer, use antivirus software to detect ransomware threats, and use anomaly detection tools to monitor whether ransomware has replaced any of your files with encrypted versions.
With Dropbox rewind, you can restore deleted files or folders for just 30 days on the Basic, Plus and Family plans. The only Dropbox pricing plans that allow you to go restore after 30 days up to 180 days and a year are the Professional and Business plans.
If you want to recover deleted files or folders that are no longer available in the deleted files folder, especially if youre subscribed to any of the personal plans, consider using third-party data recovery software.
Data recovery software scours your devices local storage for lost files and recovers them. However, data recovery software apps are not always effective. Their success depends on certain factors, like the type of data that has been deleted and whether the data has been overwritten by new data.
Stellar is one of our favorite data recovery software tools because of its wide range of features and impressive performance in recovering accidentally deleted files.
Some of the best data recovery software apps on the market include Stellar, Prosoft Engineering and EaseUS. These companies offer powerful tools for recovering lost data and a variety of other features to help with data management, computer diagnostics and other IT activities. Their features are tailored towards both tech-savvy people and regular users.
To learn more about each of these data recovery software options, read our best data recovery software guide.
If youre panicking about a deleted Dropbox file, we hope weve reassured you. To recap, you can easily get deleted files back when theyre still available in Dropboxs deleted file history.
However, if you want to get back files that have exceeded the 30 and 180-day limit on Dropboxs file history, you can try data recovery software.
Have you tried recovering your deleted Dropbox files? Did you run into challenges? Do you have other data recovery software recommendations? Let us know in the comment section below, and as always, thanks for reading.
Let us know if you liked the post. Thats the only way we can improve.
YesNo
Read the original post:
Recover Deleted Dropbox Files in 2023 [Versioning & Rewind] - Cloudwards
Hybrid workplaces need a cloud-based print and scan solution – IT-Online
One of the main findings of Microsofts 2022 Work Trend Index an annual study that outlines the top trends business leaders must pay attention to in the shift to hybrid work is that every organisation in every industry will have to infuse technology into every business process and function to do more with less and remain competitive in a South African and global economy.
Greg Griffith, senior product manager at Kyocera Document Solutions South Africa, says: Businesses can now advance with a more centralised approach to print and security management while lowering print expenses thanks to the Kyocera Cloud Print and Scan solution, which supports professional mobility and the anywhere-office.
Small-to-medium and enterprise businesses alike will benefit from our cloud-based print and scan solution, which includes integration with: Microsoft Azure and SharePoint, as well as Kyoceras Mobile PrintApp for Android and iOS.
Griffith says that the Kyocera Cloud Print and Scan solution is optimal for organisations that are aiming to increase productivity in hybrid workspaces, by offering the following advantages:
* Secure print release data encryption is used and documents are outputted only after user authentication.
* Multiple scan options scan from multiple locations and scan to the cloud, third-party cloud storage or email a downloadable link.
* Reporting reports by user or group provide actionable data to manage printing costs.
* Print Policies assign group print policies to improve efficiency and save paper.
* User Management easy to set limits, add, import and manage users and the associated costs.
The solution builds on our print from anywhere and scan-to-the-cloud solution, and were thrilled that our users can easily boost business productivity whilst saving on operational costs, says Griffith.
Additionally, Kyocera worked with Microsoft to offer integration with Universal Print for selected Kyocera MFPs and printers. Universal Print is a multi-tenant, cloud-based modern print service from Microsoft which allows organisations to manage their print infrastructure through Microsoft 365 cloud services.
Kyocera Cloud Print and Scan reflects our expanding position in document solutions, enabling businesses to tackle current issues and future-proof themselves, concludes Griffith.
Related
Original post:
Hybrid workplaces need a cloud-based print and scan solution - IT-Online
Channel roundup: Who’s gone where? – ComputerWeekly.com
Another busy week across the industry with personnel moving, featuring some promotions, fresh faces and as always an emphasis on experience.
The software-defined cloud interconnect (SDCI) specialist has appointed Luc Imbert as its new chief product officer. Prior to joining InterCloud, Luc held the role of vice-president of product solution management and technology alliances at cloud service provider OVHcloud.
InterClouds work across Europe to date has put it at the forefront of seamless, neutral and transparent multicloud connectivity, and I am delighted to join such an exciting business as it continues to expand throughout the EMEA region. Its unique offering has huge potential for enterprises looking to streamline their IT operations and realise cloud promise, he said.
The red carpet has been rolled out to welcome John Godwin to the business as vice-president of retail UK. His CV is packed with experience of delivering digital transformation projects and he was most recently digital director of Travis Perkins.
The retail industry is constantly evolving, and we are committed to helping our clients stay ahead of the curve by delivering cutting-edge solutions and expertise, said Alexander Goncharuk, vice-president of global retail at Intellias.
With my background in both technology and finance, I aim to help customers tackle key challenges in the retail market from both a development and business perspective to ensure long-term success and provide enhanced value to our growing client base worldwide.
The vendor has appointed Mark Yeeles as its vice-president of its secure power division in the UK and Ireland. He will start the role next month, with a brief to work with the firms channel, datacentre customers and users to address the challenges associated with datacentre sustainability, efficiency, energy security and resilience. He has been with the business in various roles since 2015.
Marc Garner, senior vice-president of secure power division atSchneider Electric, Europe, said: Im delighted to name Mark Yeeles my successor for the UK and Ireland, and I believe both his appointment and his customer-first approach will be essential as we continue to grow our engagement and relationships with owners, operators and partners across this mission-critical sector.
The storage player has given former VMware and HPE executive Peter Brennan the chance to make a difference as its next chief revenue officer.
Peter and I share an unfaltering belief that serving the channel serves the customer and, ultimately, maximises your success, said Jerome Lecat, Scality CEO.
Scalitys growth is strong and steady, and we are primed to meet the new business realities realities that are unequivocally calling for object storage. The stars were aligned when we secured such a high-calibre executive as Peter. I have every confidence he is the right person to take us to the next level of growth.
The AI lifecycle specialist has hired Saty Bahadur to become its next chief technology officer. He has a CV that spans 25 years, with experience in AI, including playing a role in developing the AI platform for Alexa.
Appens CEO and President, Armughan Ahmad, talked of the importance of the appointment: We are delighted to welcome Saty, a highly respected technology visionary and renowned expert in the AI industry, to Appen.
Satys addition to our team will enable us to further enhance our Appen platform, deliver even better experiences for our crowd and delight our clients. Our commitment to providing world-class AI products and services remains unwavering, as we continue to empower our clients to create transformative and ethical AI-driven solutions.
Read more:
Channel roundup: Who's gone where? - ComputerWeekly.com
Data growth slowing, recovery times increasing: Commvault – iTWire
Exclusive: Commvault's latest State of Data Readiness report for ANZ reveals that the rate of data growth is slowing, but post-attack recovery times are increasing.
Annual data growth rates fell to 33 percent in 2022-23, continuing the trend first seen in 2021-22 which saw a drop from 40 percent to 37 percent.
Commvault ANZ director of public sector and enterprise Jonathan Hatchuel told iTWIre that this is the result of organisations being more deliberate about collecting, holding and purging data, as well as increased governance of these activities.
For example, there is no need for an airport to keep for 20 years the information it collects from passengers who want to use its public Wi-Fi network, he said, nor to keep credit card numbers after a transaction has been successfully completed.
"There's definitely a higher level of governance," he said, and given the likelihood of being breached, a straightforward way to reduce risk is to avoid storing unnecessary data.
The cost of storage is still significant, so organisations still need to optimise its use this is the top data management challenge in 2023, according to the report, while data protection has moved up from fourth place in 2022 to third.
However, "data estates are still growing," he emphasised.
As for recovery times, there is a mismatch between senior executives' expectations and reality. The expectation at around two-thirds of organisations that a data outage that lasts more than five days is intolerable, but only one-fifth managed to recover in less than a week.
The 2021 report found 71 percent recovered in four weeks or less, but that fell to 46 percent in 2022 and 42 percent in 2023.
Furthermore, only 40 percent of organisations managed to recover all their data, down from 47 percent in the previous year, Hatchuel pointed out.
Worryingly, one percent of respondents said they were unable to recover any of their data after an attack.
The report also noted that "blended" storage is the default, with 62 percent of organisations having multi-cloud or hybrid cloud environments, and this is presenting challenges for data management and protection.
Organisations need to accept that they probably will be breached at some stage: "it shouldn't be like that, but it is," he warned.
Backup is "the last line of defence in any attack," so "it has to look different than it did five years ago" because "the brightest minds" are working on both sides of this battle and ongoing improvements are needed.
Part of the problem is that attackers are increasingly targeting primary, secondary and archive data simultaneously. This was the case for five percent of respondents in the 2022 report, but that leaped to 22 percent in 2023.
Commvault is the only company with deception technology built into its products, Hatchuel said. The idea is to "bait and deceive bad actors" by presenting them with fake but attractive documents and servers to keep them occupied, giving IT staff an opportunity to detect and block the attack.
"That's how it looks different [to other products]," he said.
The report was prepared for Commvault by Tech Research Asia, and was based on a survey of 376 companies with more than 100 employees in Australia and 50 employees in New Zealand.
A link to ANZ Market Analysis: The State of Data Readiness, 3rd edition will be added here once the report is available to the public.
Read this article:
Data growth slowing, recovery times increasing: Commvault - iTWire
Auto-tech series: Nutanix How cloud automation creates silver linings – ComputerWeekly.com
This is a guest post for the Computer Weekly Developer Network written by Rob Tribe in his capacity as VP for systems engineering EMEA at Nutanix.
As an enterprise cloud organisation with a foundation in infrastructure management and intelligence, Nutanix has seen the shape of software automation in cloud (and now increasingly cloud-native) deployments play out and develop over the last couple of decades using that background to provide a special kind of insight into what cloud automatism will give us next.
Given the compounded complexities and idiomatic incongruous incompatibilities that many cloud engineers have to struggle with, Nutanixs Tribe provides some reasoning to take forward and writes as follows
Automation in the realm of software engineering manifests itself at various levels of complexity, power and scope. Specifically in the cloud computing space, we talk about cloud automation as the accelerating use of tools, services and functions all designed to remove the stress (and, very often, the system errors) caused by cloud engineers having to shoulder tedious and time-consuming manual processes.
Given that cloud is an always-on entity in the vast majority of IT stacks that it serves to underpin, managing the operational requirements for cloud workloads represents an extremely burdensome task.
If we consider the very recent (and still current) global disruptions that have forced IT teams to create, innovate, change, adapt and re-engineer, these types of innovations are far tougher to pull off if the team has to spend all its time (often 110% of its time with people simply pulling extra shifts) keeping the lights on.
There needs to be a more intelligent (and more automated) separation between valued-operations and high-value project innovation.
Using automation to build, create, deploy, monitor, extend and retire or decommission clouds, is an agnostic advantage i.e. these are processes that work across private on-premises, public and hybrid cloud instances in multi-cloud deployment zones, with some even straddling poly-cloud architectures.
But enough big picture contextualisation, what are these cloud automation fundamentals in specific terms? We are talking about services built to automate the steps needed to set up Virtual Machines (VM) clusters, tools to enable cloud engineers to create virtual networks, deploy cloud workloads and to provide controls capable of staying on top of availability and performance standards.
Each and every one of those actions can be performed by a human, but this (spoiler alert, the clue is in the name) inevitably introduces more potential for human error. This is obviously a bad thing in any context, but because cloud computing is so powerful and is often run at scale, the scale of potential system errors increases at the same rate, as does the possibility of security vulnerabilities being exposed.
Fixing these scenarios through troubleshooting is possible, but its expensive, takes time and it generally leads to system downtime, which is also expensive and time consuming its not hard to create a vicious circle.
But if cloud is anything it is flexible, composable and inherently open to be codified. This means that cloud orchestration and cloud automation give us the ability to convert any process into a software-defined block of code that can be encapsulated, instantiated and above all automated to serve the IT teams needs and alleviate pressure.
Theres something of an epiphany moment once this point happens. Business teams find they can work with a more effective IT service where system errors are a rarity and innovative new service augmentations are a normality. In balance also, IT teams find they can reassign sysadmins to higher-level tasks where they dont just keep the lights on theyre more likely to be reengineering the next carbon-neutral lightbulb.
Analysts and industry commentators estimate that every penny invested in automation today, organisations should be able to reap a whole pound, dollar or Euro (roughly speaking) in return within a five-year period.
Nutanix VP Rob Tribe: Managing the operational requirements for cloud workloads (without automation) represents an extremely burdensome task.
As we progress from this point of cloud automation silver linings, lets remember where we started when we said that cloud was inherently powerful. This means that all cloud automation needs to adhere to policies governing compliance standards and other regulatory rulings many of which will typically apply to the country of operation and to any nation states that any given organisation chooses to operate in.
If this has been a story, a progression of realisation and a journey, then it brings organisations who travel this road to a point where they can comprehensively embrace the automation advantages that define Infrastructure-as-Code (IaC). This highly flexible state of operations enables an enterprise IT team to categorize and deploy compute resources into pools, which then lets users add and deploy more resources no matter where they live in the datacentre.
At this level, cloud automation enables a business to pull common configuration items that work in the realm of the total cloud instance such as containers, storage Logical Unit Numbers (LUNs), VPNs or centrally important Virtual Machines (VMs) into use. The IT team is then able to depend upon cloud automation services to place application components onto configuration items.
With an interlaced sandwich layer of cloud automation engineered to provide Application Performance Management (APM) and observability functions, teams will be able rely on cloud automations to handle extended tasks such as auto-scaling, adding clusters, removing container instances and other features to ration or improve resource consumption when needed.
The end result is an automated, unified, software-defined, workload-managed, intelligently orchestrated and eminently deploy-able (and retire-able) cloud environment.
Cloud really does have a silver lining, but it should be no surprise to find out that its a digital one. Grab your sunglasses, the future is bright.
Visit link:
Auto-tech series: Nutanix How cloud automation creates silver linings - ComputerWeekly.com
Prevent cyberstalking on your digital devices with these simple steps – USA TODAY
Kim Komando| Special to USA TODAY
Ive been answering tech and digital-lifestyle questions on my national radio show and podcast for many years. At this point, Ive heard it all.
I also notice trends. Sometimes, everyone wants to know about app privacy. Use these steps to stop companies and people from tracking your every move.
More and more, Im hearing from people who are being stalked online or who suspect they are. Heres how to tell if youre being paranoid or being watched.
For those who are being stalked or digitally harassed, its a terrifying experience and one to take very seriously. Heres my guide to protecting yourself online:
Join 400,000+ people who get my trusted info in their inboxes each day.
One of my listeners, Rhonda from Boston, called because a hacker had been tormenting her for seven years. They disabled her home security system, broke into her car, and changed her passwords. Jill from Phoenix said shes been dealing with similar invasive issues for two years.
One familys issues ended with an arrest after a stalker tricked the college-aged daughter of a caller to my show. Find out how my team and I helped her out here scary stuff.
In my experience, these stalkers are almost always people who are or were close to the victim.
If something strange happens your passwords are hacked, someone is logging in to your accounts, you find an AirTag on your car or in your bag consider who in your life could be behind it.
I don't say this to scare or make you question your friends and loved ones. Instead, it can often take a long time to find out who is behind these invasions, and you need to think logically from the start.
PRIVACY SMARTS: How to catch anyone spying on your text messages
I like to start here because so many people forget about just how much info someone has if they know the login to your router. Theoretically, they can see what you do online and what devices are connected.
That, in particular, can be dangerous. It allows a stalker to see if youre home and using the internet from your phone, for example.
If youre concerned that someone is accessing your devices or knows too much about your life, get a new router. Be sure to reset the default password as soon as possible.
No idea where to start with router shopping? See my picks here.
Are you recently divorced? You need to do a lot of work to untangle your digital life from your spouse. Start here with my guide to breakups in the digital age.
Whether or not the person harassing you is your ex, they may have found their way into your accounts, and that's a big problem. Start with your most important logins like your email, cloud storage, and bank and change the passwords.
No repeating passwords, and dont use anything easy to guess. Consider using a password manager to keep track of them.
Add an extra layer of security to your accounts by enabling two-factor authentication. Yes, you can do this via text, but it's not the safest way. I recommend using an authenticator app. These apps generate one-time login codes. You need the username, password, and code to get into an account. Heres a primer on how they work.
Check your monthly data usage, look for unexplained charges on your bill and take sudden pop-ups as red flags. Use antivirus software to scan your devices for any malware or spyware that may be installed.
When the issue is with your phone, a full factory reset is the easiest way to start fresh. Scroll to No. 2 for the steps to do this for an iPhone or Android. Be sure to back up your photos, videos, and messages first.
Make sure all of your devices are running the latest versions of their operating systems and software. This patches security vulnerabilities that hackers may have exploited.
When I hear about a sure case of cyberstalking, I highly recommend reaching out to a cybersecurity professional. You should contact your local authorities, but someone specializing in digital forensics may have time and resources your local police department doesn't.
Need help? Send me an email here. I read them all myself.
PODCAST CONTENT ON THE GO: Fords self-driving repo man, Bing AIs new personalities & discover your Facebook friend rejects
Plus, banned from Airbnb? It might not be your fault. If you're an EV owner, I share the best temp for your car's battery range. (Hint: it's warm.) If you print wirelessly, make sure you do a few things first for your security. And before you click "buy" on that Amazon product, here's the lowdown on whether their warranties are really worth it.
Check out my podcast Kim Komando Today on Apple, Google Podcasts, Spotify, or your favorite podcast player.
Listen to the podcast here or wherever you get your podcasts. Just search for my last name, Komando.
Learn about all the latest technology on theKim Komando Show, the nation's largest weekend radio talk show. Kim takes calls and dispenses advice on today's digital lifestyle, from smartphones and tablets to online privacy and data hacks. For her daily tips, free newsletters and more, visit her website atKomando.com.
See the rest here:
Prevent cyberstalking on your digital devices with these simple steps - USA TODAY
How to use shared family cloud storage – Microsoft 365
Getting everyone in your family on the same page saves time and makes it easier to stay connected and stay togetherand its simpler than you think.
So where to begin? The cloud, of course!
First, you have to figure out what cloud provider to usemaking sure its one that lets you share your account with multiple people. Its also best to pick one that lets you collaborate across the popular apps everyone uses, like Word, Excel, etc.
Soon, youll be sharing files, photos, slideshows and moreand putting your family cloud storage to good use. Here are just a few examples of the family-friendly things you can do:
Cloud storage makes it easy to collaborate on documents, files and more. Imagine sharing a spreadsheet via the cloud with your partner or roommate to keep tabs on rent or mortgage payments, utilities, and other household budgetary expenses. No need to send a hefty file. Just a simple link will do.
You can even create family groups or groups of any kindgiving you one-click sharing capabilities. Just build and name the group (e.g. Smith Family in Phoenix) and when youre ready to share something, its as easy as 1-2-3. Just click on your group and share away. Not ready to share with the whole group? You can pick individuals, as well. You can also customize everyones level of access and edit permissions.
The next time your family returns from an epic summer vacation, instead of emailing and/or texting photos and videos from the trip, put everything in a shared folder on the cloud. Now anyone in your group can access the footage or upload their own. You can add or delete captions, tags, and comments and control permission settings for others to do the same. With all these great memories at your fingertips, hand-picking which images you want to download to your local drive or fashion into a keepsake album has never been easier.
Securely store your documents and photos and access them anywhere.
Imaging being able to plan and budget for all those big family gatherings with a little help from everyone! If youre planning a wedding, for example, you can create things like party budgets, seating arrangements, guest lists, music lists and morethen share them with your fianc, parents, future in-laws, family members, friends and more. Best of all, you can get as much (or as little) real-time input as you choose on any or all of it.
Lots of people prefer staying in touch with good, old-fashioned snail mail. That doesnt mean the whole process needs to be old school. A spreadsheet shared in the cloud is an excellent way to manage mailing addresses for holiday cards, party invites and thank-you notes. When saved to the cloud, family and friends can add and edit entries in the shared spreadsheet and easily convert those addresses to mailing labels or envelopes.
Forget the pencil marks on the wall! Imagine tracking your kids growth over time and then sharing it with family and friends. You can do that and more now that you can upload files to the cloud. Or maybe create a shareable photo album showcasing your babys first year with themes ranging from animals to nature scenes in a variety of layouts and frame styles. Now you can manage all your kids important milestones and share them with loved ones. You can even create things like medication and immunization trackers, as well as medical history forms, emergency contact lists and moreall instantly shareable with schools, babysitters, grandparents and other caretakersgiving you the ultimate peace of mind.
You know that sinking feeling of seeing your computer crash, knowing you havent backed it up? With cloud storage, you dont have to worry anymore. Your cloud account will let synchronize files so even if your computer goes kaput at any time, rest assured youll have rock-solid backup of your important documents and family photos. Whew!
(HINT: For those extra sensitive documents like social security cards, mortgage papers, birth certificates, etc. make sure your cloud provider offers a digital high-security vault with added layers of protection, like multifactor authorization and more.)
Who says collaborating and sharing is just for the office? Now you can bring your entire family closer than ever beforethanks to the ability to share meaningful photos, files, vacation slideshows and moreeffortlessly.
The rest is here:
How to use shared family cloud storage - Microsoft 365
Is your personal information being stored on the cloud? Here’s how to find out – The Tech Outlook
Is your personal information being stored on the cloud? Here's how to find out The Tech Outlook
Go here to read the rest:
Is your personal information being stored on the cloud? Here's how to find out - The Tech Outlook