Page 10«..9101112..2030..»

Internet Of Everything (IoE) Market Growth Analysis By Manufacturers, Regions, Types and Application Forecast – Market Research Posts


The Internet of Everything (IoE) brings people, process, data and things together to form a networked connection which is more beneficial. The market is still in its nascent stage. The Global Internet of Everything (IoE) Market offers operational efficiency and enables better decision making. Increase in internet usage drives the IoE market growth. A strong demand across several entities high-speed processors, internet security and high network speed equipment sustains demand for IoE.

Market Analysis

The Global Internet of Everything (IoE) Market will be growing at a CAGR of 15.3% during the forecast period 20152020.

Increased adoption of IoE by state, federal, and local governments, non-governmental organisations, healthcare organisations, utilities, educational institutions drive the growth of the Internet of Everything (IoE) Market.

Internet proliferation, focus on big data, government initiatives, innovation in manufacturing technology are few growth propelling factors. Data transfer speed is a major constraint in the IoE environment due to the need for high traffic data transfer.

Request For Report sample @

The Global Internet of Everything (IoE) Market is impacted by several technology trends such as mobility, data analytics, social networks, and cloud computing.

Growth potential is high in the emerging markets of Asia Pacific and Latin America. India and China are the fastest growing countries in the developing market. SMEs are the major end users for this technology as it yields them competitive advantage. Increasing FDI investments, improving connectivity, infrastructural investments and government initiatives for digital will positively impact the market.

Regional Segmentation

The Global Internet of Everything (IoE) Market is segmented and analysed by six regions- North America, Western Europe, Asia Pacific, Central Eastern Europe, Latin America and the Middle East & Africa. Each region is analysed in terms of technology, services, applications, and devices.

Segmentation by Technology

The Internet of Everything (IoE) Market is segmented and analysed by Infrastructure and Network Technologies and Application Technologies.

Key Vendors

Some of the key industry players include Bosch, Cisco, Ericson, IBM, Intel, and Oracle. The report also includes companies to watch for such as Axiros, Sigfox, and Wireless Logic Group.

Current and predicted business strategies for the leading companies of the market such as Cisco System Inc., PTC Inc. & Qualcomm Technologies, and Intel. Total 23 companies are covered.

Competitive Analysis

Competitive analysis (i.e. current and future key business strategies of the competitors and their regional growth). A detailed competitive profiling of all the major vendors in the market. Competitive benchmarking in terms of product/service offerings, mergers and acquisitions, strategic alliances, business strategies etc.


The report will be useful for the key stakeholders of the IoE market such as technology providers, device providers, and application providers in the following ways:

The report provides an in-depth analysis of the Internet of Everything (IoE) market globally. Bringing out the key insights of the industry, the report aims to provide an opportunity for players ranging from SMEs to larger enterprises and even for the start-ups to understand the latest trends and technologies related to the IoE market.

The report provides a detailed analysis of the global industries in terms of technology, services, applications, devices, verticals and regions. The report entails information related to the latest industry and market trends, key stakeholders, industry pest analysis and competitive landscape. It includes implementation, opportunities and adoption rate of IoE in the industry. It also includes the end user analysis. This analysis was done based on global end user survey.

More Info of Impact Covid19 @

Read the original post:
Internet Of Everything (IoE) Market Growth Analysis By Manufacturers, Regions, Types and Application Forecast - Market Research Posts

Read More..

What are you giving away on social media? | IT PRO – IT PRO

Its not every day you get challenged to hack a business leader. But when Jake Moore, a cyber security specialist at ESET, was invited to a debate with the CEO of a firm in Dorset on internet security, thats exactly what happened.

I bet you cant hack me, the CEO said, laying down the gauntlet ahead of the debate.

Advertisement - Article continues below

Oh, really? Moore thought, raising an eyebrow.

He accepted, but suggested that the best way to get the debate going was to try and hack his business. This would give him three weeks to plan and execute an attack on a man hed specifically told was a target.

For some reason, I got really cocky at this point, Moore says. I said, I bet I could even get your shoe size.

And so began a cautionary tale involving a weak password, a gullible personal assistant and the size of an executives feet.

Moore created a fake LinkedIn profile, using a generated image of an attractive woman, which he suggests is the quickest way to make it look legitimate. The account had about 2,000 followers, mainly men, in about two weeks, which would seem to prove his point.

Next, Moore filled out the profiles employment history, adding lots of fantastic sounding companies and listing ITV as her current employer. He sprinkled in some personal info too, listing Bournemouth University where he actually studied as her alma mater. As he explains later, these bits of information are tailored to the victim.

Advertisement - Article continues below

Now, with the CEO expecting something suspicious to come through any of his inboxes, Moore decided to send a LinkedIn request to his personal assistant instead. It was accepted, straightaway. He followed up with a message: I work for ITV and our production team are planning a programme on how digital marketing companies are coping in the wake of GDPR. We're keen to feature vibrant companies such as yours to jazz up the subject and you guys look ideal. I see you're in Bournemouth too. I studied at Bournemouth University and would love an excuse to visit again

The message, Moore explains, not only has the bait of TV exposure but a personal influence; Hey, were both from Bournemouth. He isnt just making a LinkedIn connection, hes making a friend too. He rounds off the email with a note of urgency: If its something you're interested in, let me know ASAP.

Advertisement - Article continues below

The PA replied quickly, saying the company would love to, believing its an opportunity to raise its profile, while failing to do any background checks other than reading the LinkedIn profile. Moore replied back, asking if he could send through an application form for her boss to fill in. Yes, of course, she said.

So he's there thinking Jake's coming for me, I'm not touching a mouse, Moore says. However, the PA probably storms into his office, you're never gonna guess what: We're going to be on TV!

With Google Forms and some ITV Production Team graphics, Moore created a believable questionnaire. He put all the various details you would expect to see: Name, address, date of birth, and so on, knowing its going to be filled in because the unsuspecting CEO is thinking who cares, Im going to be famous.

So he added more, sexual orientation, disability, ethnic origin and then, shoe size. He tagged it as sponsored by Clarks, making it seem like a product placement spot. He also asked for a password to set up an account, with an asterisk compelling the victim to put one in.

The IT Pro Podcast: The secret life of hackers

What its really like to be a professional penetration tester

No joke in about 15 minutes I get a notification that says someone has entered the details, Moore says. I kid you not, his password was Tottenhamhotspurs84. If you were going to start researching someone on the internet where would you start? Probably with someone's Facebook account.

Advertisement - Article continues below

Im not their Facebook friend so I can only see limited things but I found out he was a Tottenham supporter from seeing his profile photos, which are public, and a public post saying happy 30th birthday which told me that he was 30-years old in 2014 so born in 1984.

A few weeks later, Moore was up on stage with the CEO in front of an audience of his employees. As he started explaining the fake LinkedIn account he could see his mark turning red, clearly beginning to piece it together. Moore had the room in stitches as he revealed all the information he was secretly able to extract.

The thing that I still feel slightly bad about was after I released it all and everyone had a good old laugh, the room fell silent and then there was a voice at the back. It was the personal assistant, he says.

I told my mum I was gonna be on TV!

The IT Pro guide to audio collaboration

Make audio a priority for a successful remote working strategy

How malware and bots steal your data

Protect your organisation with a layered defence

Modern networking for the borderless enterprise

5 ways top organisations are optimising networking at the edge

IT managers best practice guide to hybrid cloud

Your blueprint to hybrid cloud success

Read this article:
What are you giving away on social media? | IT PRO - IT PRO

Read More..

Explained: Why is spyware, stalkerware gaining traction during the pandemic? – The Indian Express

Written by Aashish Aryan, Edited by Explained Desk | New Delhi | Updated: July 28, 2020 7:20:59 am The usage of these apps, the company had in its note said, increased during lockdown in the backdrop of heightened domestic violence cases. (File Photo)

Global cyber-security leader Avast has in a note warned that there was a 51 per cent increase in the use of spyware and stalkerware during the lockdown period from March to June. The usage of these apps, the company had in its note said, increased during lockdown in the backdrop of heightened domestic violence cases.

Spy and stalkerware apps, like viruses and other malware, infect devices that are connected to the internet. While viruses and malware can be detected by anti-virus software, spyware and stalkerware apps disguise themselves as useful and send out stolen data to central servers without the knowledge of the users.

Ironically, most spyware and stalkerware apps disguise themselves as anti-theft applications that can be used to track in case the device is stolen or gets lost, cyber-security experts warn.

A spyware app, which can also be installed remotely, accesses the data usage pattern of the device, gains access to photos and videos as well as other personal information of the user, and then passes it off to a central server.

On the other hand, in most cases, a stalkerware app can be installed only when someone has physical access to the digitally connected device. Though the app works in a manner similar to spyware apps, it goes a step ahead and also gives out the location of the device to a master device which controls the stalkerware app.

Most stalkerware apps work in stealth mode with no trace of the app having ever been installed. Once installed, such apps can allow the master device to control, intercept, and even change your emails, text messages and your communication on social media platforms, a Pune-based cyber-security expert said.

Express Explainedis now onTelegram. Clickhere to join our channel (@ieexplained)and stay updated with the latest

There are two of three-types of spyware and stalkerware applications. For spyware apps, the easiest method is to disguise the spying code inside the unauthorised versions of premium apps.

For example, someone can claim to have a cracked version of a premium app such as Spotify. Now, whoever installs such apps can be remotely tracked easily. Since the code of the application (inside which the spyware codes are hidden) do not spy on the users, such codes pass the scrutiny of anti-virus programmes, said the expert, who also works with government and security agencies.

Stalkerware apps on the other hand, seek explicit permissions at the time of their installation. Once the app is installed in the phone, it can be hidden from the apps menu into the background, from where they continue functioning.

There are some dedicated apps which people install on their partners or their kids phones. When you install such apps, it asks for permissions such as access to gallery locations, call logs among other things. Once you do that, the master device which has a dashboard can see whatever is going on with the other device, Guwahati-based independent cyber-security researcher Indrajeet Bhuyan said.

Also read | Google to restrict ads for tracking technology, spyware

One of the main reasons, experts said, is the increased usage of internet by everyone due to various lockdown measures in place.

With apprehensions around Covid still in place, everything has gone online. Anything and everything which could bought offline from a market is now at your doorstep. But bringing that to the doorstep requires going online, which is where the opportunities for cyber criminals come, the Pune-based expert said.

Another reason, highlighted by the UN Women in a report in April, was security, health, and money worries which was further accentuated by cramped and confided living spaces.

Emerging data shows that since the outbreak of COVID-19, reports of violence against women, and particularly domestic violence, have increased in several countries as security, health, and money worries create tensions and strains accentuated by the cramped and confined living conditions of lockdown, the UN women had said in its report.

The Indian Express is now on Telegram. Click here to join our channel (@indianexpress) and stay updated with the latest headlines

For all the latest Explained News, download Indian Express App.

The Indian Express (P) Ltd

More here:
Explained: Why is spyware, stalkerware gaining traction during the pandemic? - The Indian Express

Read More..

Are we seeing the beginnings of an Indian internet? – Deccan Herald

Almost a month ago, the Ministry of Information Technology took the unprecedented step of banning 59 apps/services on the purported grounds that these services were prejudicial to the sovereignty and integrity of India. At the time it was unclear what a ban entailed and how it would be implemented and/or enforced.

However, the subsequent weeks between companies voluntarily suspending their services, Apple and Google de-listing them from their respective app stores and telecom service providers being ordered to block these apps, the ban has been 'technically' enforced from the perspective of an average user that may not want to navigate the world of Virtual Private Networks (VPNs) and TOR. So, for now, it appears that we have the answer to the second question.

Reports now suggest that 47 more apps could be facing a ban with another 275 being monitored closely.

Forests, trees and branches of the internet

In the context of the stand-off between India and China, these moves have and will be portrayed as a strong response to China. As Alex Stamos (former CSO at Facebook) of Stanford's Internet Observatory illustrates there are several overlapping considerations - many of these are applicable to India too.

Thus, as far as the future of the internet in India (and even the world) goes, these developments cannot be viewed in isolation. And must be looked at in combination with recent events in India, its stated position on cyber sovereignty as well as global trends.

Also read: China says it will take 'necessary measures' to protect interests of its companies in India

In early July, the websites of three environmental advocacy groups were blocked without any direct warning/notice. In one of these cases, the Delhi Police issued a notice to a service provider catering to one of these groups citing the Unlawful Activities (Prevention) Act (UAPA). This notice was withdrawn 14 days later and a fresh one citing the Information Technology (IT) Act was subsequently issued.

And while it appears that access has mostly been restored, some telecom providers continue to block the websites in question. Back in May/June, file sharing service WeTransfer was also blocked. And since the relevant sections of the IT Act allow for confidentiality, these orders were not officially released in the public domain.

Though imperfect, it is evident that the capacity to execute these block-lists is improving. Media reports referencing an increase in apps being banned also indicate that a 'framework' for 'constant scrutiny' of the apps operating in India is being developed. With these developments, the groundwork for what can evolve into a separate Indian internet could well be in place. There have also already been experiments with allow-lists as in the case of Jammu and Kashmir in response to the Anuradha Bhasin judgement in the Supreme Court.

Also Read: Indias growing economic reliance on China may be tough to break

And as I've argued in this space before, in multilateral engagements, India does espouse the idea of sovereignty over 'domestic cyberspace'. It has also chosen not to make its comments on the ongoing Open Ended Working Group consultations on developments in the field of information and telecommunications in the context of international security available publicly.

This also needs to be viewed alongside developments in Hong Kong in the aftermath of the passage of the national security law. Companies like Facebook, Twitter, Google, Zoom, Microsoft and even Bytedance (TikTok's parent company) have chosen to pause processing of data requests. And may very well be the first steps towards making the 'special administrative region' of Hong Kong an offshoot or splinter of the Chinese branch of the Internet.

It is also important to note that India's actions have seemingly enabled countries like Australia and the United States to elevate the pitch of their criticism. In July, there have been instances of members from the executive and legislative branches of their governments advocating for bans on TikTok.

Breaking the internet

A recent report by Freedom House points out that 'cyber norms promoted by China and Russia are expanding to countries such as Brazil, India and Turkey' and contends that the subsequent splintering of the internet could result in more governments pursuing the cyber sovereignty model. Another report analysing government responses to disinformation across different countries (based on surveys) for the Library of Congress concluded that foreign intervention and disinformation was considered a threat to national security especially ahead of national elections.

Whether intentional or not, the tendency to pin the blame for disinformation on foreign actors also strengthens the narrative that a domestic or national internet will address disinformation/misinformation. This is likely to result in calls to link real-world identification with presence on the internet and further cleave domestic from international/global spaces. In fact, we have already seen representations to this effect made in Indian courts as recently as May. And the current publicly available draft of the personal data protection bill also proposes voluntary verification.

With the second largest (and still growing) internet user-base, India's actions will play a significant role in shaping the future of the internet. If one were to try and read the tea leaves at this juncture, it appears we are on a trajectory to break the internet, just not in a good way.

(Prateek Waghre is a Research Analyst at The Takshashila Institution)

The views expressed above are the authors own. They do not necessarily reflect the views of DH.

Excerpt from:
Are we seeing the beginnings of an Indian internet? - Deccan Herald

Read More..

How cloud is turning to be an effective tool for healthcare industry during Covid-19 – Express Computer

By Khushboo Jain

Healthcare in the digital age has become a place where a tremendous amount of data is generated on a daily basis. Patients medical and financial details, as well as any research, are just some of the data that is generated, and maintaining a quick and secure database is of utmost importance.

With the coronavirus outbreak, hospitals and clinics are being overwhelmed with patients. The amount of data that needs to be generated or shared and the speed at which it needs to occur puts a lot of pressure on healthcare professionals. Luckily for them, cloud computing could provide a quick, secure, and cost-effective solution.

Cloud computing comes with a unique set of benefits that can greatly benefit the healthcare sector.

Management of serversThe advantage of cloud-based systems for healthcare is that managing data is not the job of the healthcare provider. With talented IT professionals keeping a watch and managing the system, healthcare providers are able to focus on other important facets of healthcare.

Cost benefitsWith cloud computing, it is easier to oversee the services you pay for and take decisions that are cost-effective. By making a custom plan to fit your needs, you can negotiate a deal that is a lot more cost-effective than setting up your own systems.

Designed to manage a tremendous amount of dataAs stated earlier, Healthcare and its related sectors generate a lot of data. For example, medical images like scans are extremely detailed and generate high-resolution images, utilizing a lot of data. A lot of this data needs to be stored for the patients entire lifetime, not to mention be kept secure. Physical storage is inconvenient and cloud computing provides an easier alternative.

Fast speedsWith patient numbers increasing, speed is of utmost importance. Accessibility to faster cloud servers makes it easy to upload, share, and recover data at a quick pace. It also gives us the ability to make changes faster. Exchange of data and communication between healthcare workers, hospitals, research centers, and funding services like medical crowdfunding creates a better healthcare environment. Time is of the essence in healthcare and with cloud, we can now be a lot more time-efficient.

Security and protectionCloud computing has come a long way when it comes to addressing security concerns. The use of private and hybrid cloud systems has ensured that the medical and financial details of a patient remain secure. For example, if a hospital has a patient that needs to raise funds using a crowdfunding platform, there can be a secure exchange of data between the platform and the hospital using cloud systems. Moreover, the remote servers keep it more protected from any on-location hazard and also reduces any hassles during data recovery.

The opportunities that Cloud computing gives to the Healthcare systems:

ScalabilityThe needs of the healthcare service provider may change with time. Scaling the cloud services according to their requirements is easy. Cloud allows you to scale up or down quickly, allowing you to meet your current needs or prevent unnecessary expenditure, and also allow for future growth.

Ability to updateTechnology is in a constant state of change and innovation. As systems upgrade, data will need to be changed/updated. Whenever these changes do occur, updating data using cloud will be much easier and quicker. Having a cloud-based system will enable you to update your data, applications, and systems as quickly as possible.

Allowing easier collaborationsDuring the digital age, the sharing of resources is important to create better opportunities for patients. For eg. collaborating with other healthcare providers can provide better services while collaborating with crowdfunding and other alternative funding options enables patients to afford them. Collaborations like these create a better healthcare system for everyone.

Using cloud data in telemedical practicesDuring this pandemic, doctors and patients alike are at risk of contracting the virus in hospitals. During this critical time, telemedical practices can help healthcare workers continue to provide safe healthcare remotely. These modern medical systems need to transfer the patient data back and forth at high speeds, something that cloud can be used easily, while also maintaining the doctor-patient privacy. By involving cloud computing in telemedical systems, we can now have a safe system, both physically and digitally.

More resources to focus on the medical needsFrom all that we can assimilate from the advantages that cloud-based systems have, we can come to the conclusion that such systems can drastically reduce the number of resources that would be required from the healthcare systems to manage data. It saves time, money, and other important resources. The availability of these resources allows healthcare service providers to concentrate on providing better services, which should be their primary focus.

The early adopters of cloud services have been able to reap the benefits of it for some time now. This has only proved that cloud computing is not only viable, but essential to healthcare, and needs to be adopted now more than ever before.

(The author is Co-Founder and COO,

If you have an interesting article / experience / case study to share, please get in touch with us at [emailprotected]

Originally posted here:
How cloud is turning to be an effective tool for healthcare industry during Covid-19 - Express Computer

Read More..

The pros and cons of moving to the cloud – Accounting Today

There has been much talk in recent years about migrating your accounting firm to the cloud. With the recent outbreak of COVID-19, it has become even more appealing as the work-from-home movement is in full force.

While it is a hot buzzword, many do not understand what it means to move to the cloud. Essentially, moving to the cloud means that you do not need to physically be in an office in order to access centralized data. This can be your clients tax returns, documents, spreadsheets, and anything else that in the past you needed to login at your desk in the office to access.

Change is never easy, but during these unprecedented times it may be a good idea for you to migrate your firm to the cloud. Some organizations are opting to dip their toes in the water and do a hybrid solution, where the main server is cloud-based, but the other machines are still physical.

While there are a huge number of advantages to moving to the cloud, there are some cons that are associated with it as well.

To help you decide which is best for your firm, weigh the following pros and cons.

Continued here:
The pros and cons of moving to the cloud - Accounting Today

Read More..

Veritas taps NetBackup as the beating heart of universal data management – Blocks and Files

Veritas is laying the foundations for a universal data management platform, with NetBackup at its centre.

The company released NetBackup 8.3 today and dont let the point release fool you. This is a huge update, with a slew of new features.

NetBackup customers can standardise on a single platform covering hybrid and multi-cloud environment and save money, according to Veritas, which has combined the software with the Veritas Resiliency Platform (VRP) and CloudPoint into the Enterprise Data Services Platform (EDSP).

Deepak Mohan, EVP for the Veritas Products Organisation, said a prepped quote: Were extending enterprise-grade data protection and the most robust set of recovery options to every corner of our customers IT environments from on-premises physical to virtual, to cloud and even to containers.

NetBackup 8.3 includes:

Theres more. NetBackup 8.3 has cloud-native data protection for AWS, Azure and GCP. There is workload and data portability in hybrid and multi-clouds, with to-the-cloud and between-cloud storage tiers. Veritas has extended cloud-to-anywhere portability, adding Azure Stack to Azure Stack and Azure region-to-region, with push button orchestrated disaster recovery using Veritas Resiliency Platform integration.

Veritas has added storage cost optimisation with integrated management and reporting from Veritas APTARE IT analytics.

NetBackup 8.3 reduces discovery time from hours to minutes for large environments, with 50x speed-up for VMware vCenter and vCloud. There is 25 per cent faster dynamic NAS data protection via auto-discovery of resources and load balancing with the ability to restore data anywhere on any NetBackup target. This removing vendor lock-in, according to Veritas.

Check out the NetBackup 8.3 data sheet .

Veritas is a veteran enterprise backup supplier with more than 80,000 customers, and traditionally competes with the like of Commvault and Dell EMC. In common with these rivals, is fighting a catch-up war with three groups of vendors.

Veeam and Acronis are backup vendors that have ridden the server virtualization wave. Actifio, Cohesity and Rubrik are in a second group that has pioneered secondary data management functions such as copy data management. They use backup as a data generating source for these functions.

A third group consists of vendors such as Clumio and Druva that provide backup as a service and in-cloud backup. Some venders in this category HYCU, is an example specialise in data protection for Nutanix and Azure.

Veritas is on the money in articulating the need for universal data management across on-premises, hybrid, and multi-cloud environments. The core features should include cloud protection, workload migration and disaster recovery functionality. However, this is a big ask and Veritas is in a race to deliver such as service and prevent customer erosion.

Continued here:
Veritas taps NetBackup as the beating heart of universal data management - Blocks and Files

Read More..

The Style Of Cloud Networking In The Corporate Datacenter – The Next Platform

It is easy to understand the lure of the public clouds siren call. Theres the flexibility and agility to enable immediate elastic scaling up or down as needed, the tools and services needed for running modern workloads like artificial intelligence and data analytics, the removal of headaches related to deploying and managing vast numbers of systems enterprises in large part no longer want to run their own datacenter infrastructures and the cost efficiencies, with no longer having to pay upfront for hardware and instead leveraging models like pay-per-use.

The benefits of the cloud have been put in even greater focus during the COVID-19 pandemic, which has forced businesses to accelerate their digital efforts to adapt to a rapidly evolving business environment where most people are working remotely. In addition, businesses are seeing their revenues and budgets shrink in the wake of the public health crisis, driving many of them to look to the cloud to run more of their workloads. Synergy Research Group noted that in the first quarter, while spending on traditional datacenter hardware and software fell 4 percent year-over-year, revenues in the public cloud datacenter infrastructure market grew 3 percent.

Despite all this, the majority of workloads some estimates put it at 70 percent still run in traditional datacenters. There are myriad reasons, from security and compliance concerns to the costs that come with moving some larger applications and data sets to the cloud. While a report by Virtustream a cloud company owned by Dell Technologies last year found that organizations were moving more mission-critical applications to the cloud, the belief among most vendors is that for the foreseeable future, most enterprises will continue to run in this hybrid mode, with some workloads remaining on premises in the datacenter and others running in the public cloud, and in most cases in multiple public clouds.

Given that, a growing trend is to make the movement of workloads and data between on-premises and public cloud easier and faster and to bring cloud-like features to the datacenter. Most recently, Hewlett Packard Enterprise is leveraging its GreenLake platform as the foundation for its efforts and Pure Storage rolled out its Purity 6.0 for FlashArray operating system, with a range of features that are available through its Evergreen subscription model. Oracle earlier this month announced Oracle Cloud@Customer, which is a way to bring the full cloud experience into the datacenter.

VMware also has become a significant player in the hybrid cloud space over the past several years and has a goal to make an enterprises traditional datacenter or private cloud as flexible, efficient and cost-effective as a public cloud.

We are helping our customers make their private cloud as agile, as efficient, as flexible as the public cloud infrastructure, Tom Gillis, senior vice president and general manager of VMwares Networking and Security Business Unit, said at a recent press briefing. This is increasingly important because our customers say that if they dont deliver this level of efficiency, more or more of their internal constituents are going to look to the public cloud. But the public cloud cant always meet the security requirements and the cost requirements or other concerns, data privacy concerns. Having the ability to make your private cloud infrastructure programmatic and efficient is really critical.

VMware began its journey beyond its server virtualization roots and into the software-defined datacenter (SDDC) space when it bought software-defined networking (SDN) startup Nicira in 2012 for $1.26 billion, bringing aboard the technology that would form the basis of its NSX networking platform. Over the next several years it would build on the technology with NSX-T, support for virtual machines (VM), containers and bare-metal infrastructures. VMware created its vRealize management suite, bought VeloCloud for software-defined WAN and two years ago launched is Virtual Cloud Network to enable organizations to connect and secure applications and data as workloads moves outside of the datacenter.

A year ago, the company bought startup Avi Networks, whose technology essentially balance workloads and application delivery both in the cloud and in the datacenter. It was the one-year anniversary of that acquisition that brought Gillis and other VMware officials to speak to the media this week about not only the adoption of VMwares NSX Advanced Load Balancer based in large part on the technology inherited through the Avi deal but also new features in the latest version of the product.

Networking is obviously connectivity that you get from switching and routing, and NSX is known for that. But as weve expanded the NSX portfolio created this family of products we now have the NSX Services-Defined Firewall and the NSX Advance Load Balancer, which gives you all the necessary services you need to fully define a workload and deploy it with a single-click strategy, Gillis said. Thats what motivated the acquisition of Avi. They had built a very unique software architecture. There are other software load balancers on the market, but there is only one software load balancer that has a scale-out architecture, which means you can keep adding little data plans and create one giant logical load balancer. Having that as part of the NSX portfolio has allowed us to really complete this vision of a public cloud experience in your private cloud infrastructure.

VMware not only is integrating the Avi load balancing technology into its own networking portfolio but also in other products, such as its Carbon Black security offerings, automated orchestration tools and Tanzu Kubernetes platform. Since the Avi acquisition, 7,000 traditional hardware-based load balancers have been replaced with VMware software and the customer base for NSX Advanced Load Balancer has grown about 70 percent, from 6,500 companies to more than 15,000. That includes six of the top 10 financial services companies, Gillis said. In addition, VMware has been able to deliver more than a million transactions per second for a single application.

The software load balancer, which runs on standards x86 servers, can scale horizontally in seconds or minutes using the software load balancer rather than the weeks or months needed for hardware appliances. This becomes even more important given the changes being forced on businesses by the coronavirus outbreak.

The first thing we needed to do was just react to a global shift that suddenly everybodys branch office was in their living room, he said. We have a number of customers that are ramping up remote access technologies like VDI virtual desktop infrastructure so having a load balancing solution specifically designed to solve those use cases has been a real win for us and weve been able to help our customers adapt and adjust. The second thing we need to do is stabilize the operation and find some efficiency here. Thats the phase that many customers are in now. COVID, while it presents so many challenges, it also creates opportunity. Smart companies are using this as a time to rethink how we accelerate our digital initiatives and how we can be faster for the future and not be beholden to old legacy infrastructure, and it is infrastructure that requires people to be onsite in buildings. All of those things are things that were leaving behind us and that really has created some uplift for the VMware portfolio and the NSX Advanced Load Balancer in particular.

VMware is putting new features into version 20.1 of NSX Advanced Load Balancer, a platform that includes not only load balancing but also a web application firewall (WAF), application analytics and Kubernetes ingress services in the datacenter and cloud, with the software available for both VMware and non-VMware environments. The new features include enhancements to more easily install global load balancing updates and to offer full integration with Google Cloud Platform and VMwares NSX-T. Security updates include automated Pulse cloud services and case management, WAF threat feeds, while consolidated VMware solutions with vRealize Orchestrator and vRealize Automation. VMwares new architecture for consolidated Kubernetes Ingress Services is aimed at streamlining container deployments for multiple clusters and multiple sites.

The Kubernetes Ingress services, the ability to support modern applications, to have the ability to provide all of those networking services into Kubernetes applications, has been an important part of the product, said Chandra Sekar, a senior director of marketing at VMware who came to the company with Avi. Now, the critical piece here is the ability to interact and integrate with a lot of the newer technology stack as well. Weve always had integrations with vCenter. We have full access integration with NSX-T as well. When the business continuity initiatives started with enterprises that were dealing with the aftermath of COVID, we were able to provide VDI services, with load balancing with VDI services with Horizon [VMwares desktop and application virtualization product] and we also have several integrations with automation frameworks, including vRealize Orchestrator and vRealize Automation. Everythings available in one single platform that can be deployed and managed centrally across different environments.

See the original post:
The Style Of Cloud Networking In The Corporate Datacenter - The Next Platform

Read More..

Storage skills in the age of the cloud and convergence –

The volume of data that needs to be stored just keeps on increasing, which means potential employees with storage skills are always in demand.

But in-demand skillsets change over time. In storage, skills that were mainstream 10 years ago have all but disappeared and new disciplines have emerged.

So, what trends are driving demand for storage and what skills are necessary to get a job in this ever-changing sector?

Storage has changed a lot in recent years. In terms of jobs and skills, the idea of storage as a discrete discipline has been eroded by virtualisation, hyper-converged technology and the cloud.

And often, IT roles have converged. There are fewer roles for IT professionals in traditional, specialist areas such as storage. Instead, IT professionals must become generalists to successfully manage on-premise, cloud and software-as-a-service (SaaS) infrastructures.

This change has been heightened by the pandemic, but even beforehand, the lines between IT responsibilities were becoming blurred, says Sascha Giese, head geek at SolarWinds.

IT convergence has also been exacerbated by flat to shrinking budgets, but in all, it has added complexity for IT pros, making it difficult to know what skills should be focused on.

The situation is that siloed roles in storage or compute have been broken down to make way for a new type of IT professional who can cover multiple disciplines and is central to keeping IT environments operating at full capacity.

Data has evolved in its use over the past decade. The explosion of analytics has presented an enormous challenge in how data is stored and processed.

Meanwhile, the cloud has been instrumental in moving storage away from on-premise systems, with a consequent need for fewer on-premise storage specialists.

The rise of hyper-converged infrastructure which bundles compute, storage and hypervisor has also had an impact on the storage skills landscape, with logical unit number (LUN) design becoming a thing of the past.

Meanwhile, provisioningstoragefor a new virtual machine (VM) has for some time no longer been done in thestoragearray console, but from the hypervisor, and that had a knock-on effect on roles.

This greatly simplified operations and allowed infrastructure and operations specialists to diversify their responsibilities and take on additional areas, says Robert Rhame, director of market intelligence at Rubrik.

Other features of the storage landscape are also changing, with the rise of object storage, software-defined storage, and non-volatile memory express (NVMe) flash and its networked, over-fabric iterations.

According to IT JobsWatch, the top skills in storage engineer job roles in the first six months of 2020 were Windows, storage area network (SAN), VMware/VMware infrastructure, Linux, Windows Server, and infrastructure engineering.

But according to Thomas Harrer, chief technology officer (CTO) for IBM Systems hardware sales in Europe, demand in storage skills is not a matter of specificity, but extended scope.

He says IT professionals that interact with or manage storage environments need to broaden their technology skills to fully understand the impact, connectivity and optimisation potential of these environments as a whole.

So, for example, storage specialists may need familiarity or proficiency with DevOps or cloud to be more attractive to potential employers and command a bigger salary.

They equally need cloud knowledge public and private and application development knowledge to achieve an ideal balance between flexibility, cost efficiency, quality, security and cyber resiliency when implementing or upgrading their storage environments, says Harrer.

His view is that understanding the application and objective, as well as supplier-agnostic options to achieve these objectives whether storage, cloud or app development-related are critical.

Ideally, we are talking about skilled professionals who have developed architectural or strategic storage skills to fully understand the impact of supplier or environment components that storage might be a part of, he adds.

In a recent survey IT trends report 2020: the universal language of IT IT professionals were asked to cite the non-technical skills they saw as most valuable to their role, and project management (69%), interpersonal communication (57%) and people management (53%) were the top skills listed.

Core storage skills are crucial for designing, building and maintaining the infrastructure needed to store and process data, but the soft skills of explaining and demonstrating the value of storage systems to C-level decision-makers is also essential. So, building up interpersonal skills is vital.

Sometimes interpersonal skills are relegated to the category of soft skills, which is misleading, considering their overall importance in leadership and management, says Giese at SolarWinds. Ultimately, interpersonal skills are human skills that help teams break though jargon and better address business challenges by relating to other people and speaking in a clear way.

He adds that it is worth remembering that IT professionals dont just speak to other IT professionals. Theyre increasingly talking to customers, cross-functional teams, and other business stakeholders. Good communication and personal understanding are the mastery of any of those domains, he says.

For many organisations, storage is more strategically important than ever. So, it is not just about putting together all-purpose storage systems; specific solutions are key now. This means designing systems and infrastructure that focus on privacy and security, or systems that enable data analytics via artificial intelligence.

People with storage skills can go for roles such as infrastructure automation engineer, DevOps engineer, and cloud engineer, to name a few. Rubriks Rhame recommends job seekers should search for terms such as Kubernetes, Terraform, Ansible, Chef, Puppet or other tools to see what jobs come up.

My advice for someone seeking a job in these areas is not to get hung up on not having the necessary skills that are being requested. These are scarce commodities right now, and those who have them are not looking for jobs, he says.

He adds that people should showcase their other skills, technologies and programming capabilities that remain relevant in this changing world and focus on demonstrated cases where you picked up a new skill.This is emerging and has a good future indeed, he says.

For those who want to stay in the datacentre, there is a future here as well, and the role to look for will likely have infrastructure and operations or simply operations in the description.

See the original post:
Storage skills in the age of the cloud and convergence -

Read More..

Report: Despite Covid-19 disruption in 2020, data center capex poised to hit more than $200B over next five years – FierceTelecom

While the Covid-19 pandemic is expected to disrupt the demand for data center equipment this year, data center capex will grow at a 6% CAGR to reach just over $200 billion over the next five years.

A report by Dell'Oro Group said data center capex, which includes capex for servers and other data center infrastructure equipment, growth will be a mixed bag depending on the customer segment. The cloud, which accounts for more than 60% of the worldwide data center capex, will continue to flourish when compared to enterprise/on-premise data center deployments.

Telco edge data centers could emerge over the long-term as telcos build their edge compute services and applications.

How Fierce are you about applying AI to your business?

The editorial teams behind Fierce Life Sciences, Fierce Healthcare, Fierce Telecom and Fierce Electronics bring you Fierce AI Week, August 10-12. This is the only virtual event focused on the application of AI to drive business, customer and process value through a discuss, debate and define format. #FierceAI #BeFierce #FierceAIWeek

The coronavirus pandemic has hit several industry verticals hard over the past five months, including brick-and-mortar retail, travel, hospitality and small-to-medium sized business, which led to them reining in their IT spending this year.

On the flip side, Covid-19 has led to some organizations accelerating their digital transformations, which includes putting data, workloads and applications in the cloud. Dell'Oro's report said that as enterprises look to conserve capital spending, the public cloud, which has a flexible and consumption-based infrastructure, could help meet the growing demand for remote work and distance learning.

"The Covid-19 pandemic and the ensuing recession may have the long-lasting effect of accelerating the permanent migration of certain industries and workloads to the cloud," according to Dell'Oro.

While Microsoft reported its earnings on Wednesday, the other major cloud providers, including Amazon Web Services and Google Cloud Project, will be conducting their earnings calls over the coming weeks. Microsoft Azure's revenue growth was 47% in the fourth quarter compared to 59% in the third quarter.

RELATED: Hyperscale data center count reaches 541 with 176 more in the works

Dell'Oro said the top-four U.S. cloud service providersAmazon, Facebook, Google, and Microsoftwere well positioned to continue their momentum of expansion over the next five years.

"Servers will continue to be consolidated in fewer mega cloud data centers that could potentially provide greater capacity than the same number of servers spread out across thousands of enterprise data centers," according to Dell'Oro Group.

Those top four U.S. cloud service providers have been prolonging the life of their servers to lower server depreciation expenses while maintaining the reliability of their server fleets. Last year, Arista Networks saw an impact on its fourth quarter earnings due to declining switch revenue from an unnamed cloud provider.

Also on the trend front, Dell'Oro Group said the Intel server processor refresh cycles have historically influenced IT spending.

"While the major cloud service providers typically ramp server capacity outside of the processor refresh cycle, the upcoming Intel 10 nm Whitley server platform refresh due later this year could generate an uplift on server spending. Viable alternatives to Intel processors, AMD EPYC and ARM, for server and storage system applications are starting to materialize in certain markets," according to Dell'Oro Group.

Dell'Oro Group also cited open source groups coming together to share and standardize best practices in the design of sustainable data center infrastructure as a factor going forward.

"The Open Compute Project (OCP), in particular, has introduced various technological innovations in the areas of server and server connectivity, rack architecture, and networking switches, which could shape the future development of data center infrastructure," Dell'Oro Group said.

Facebook launched OCP nine years ago as an open-source hardware initiative to drive the deployment of web-scale operations and services. OCP has thousands of engineers from close to 200 member organizations working on more energy-efficient hardware equipment for the likes of hyperscale data centers and large service providers.

See the original post:
Report: Despite Covid-19 disruption in 2020, data center capex poised to hit more than $200B over next five years - FierceTelecom

Read More..