Global Hyper-Converged Infrastructure Industry

prnewswire | April 27, 2020

Global Hyper-Converged Infrastructure Industry
Hyper-Converged Infrastructure market worldwide is projected to grow by US$23.6 Billion, driven by a compounded growth of 31.9%. Hardware, one of the segments analyzed and sized in this study, displays the potential to grow at over 30.8%. The shifting dynamics supporting this growth makes it critical for businesses in this space to keep abreast of the changing pulse of the market. Poised to reach over US$20.1 Billion by the year 2025, Hardware will bring in healthy gains adding significant momentum to global growth.

Spotlight

This video shows how to terminate a compute instance from the web console in Oracle Cloud Infrastructure while retaining the boot volume. Explains instance dependencies for its VNICs, block volumes and boot volume, and how these are detached and managed when performing the instance termination process.

Spotlight

This video shows how to terminate a compute instance from the web console in Oracle Cloud Infrastructure while retaining the boot volume. Explains instance dependencies for its VNICs, block volumes and boot volume, and how these are detached and managed when performing the instance termination process.

Related News

Puppet's New IT Infrastructure Service Compliance with Center for Internet Security Benchmarks

Puppet | May 19, 2020

Puppet Inc. is pitching a new service that helps companies ensure the information technology infrastructure they use is compliant with Center for Internet Security benchmarks. Puppet Enterprise platform that’s used to manage infrastructure and applications as they move across the software delivery pipeline. The platform also helps to automate functions including code review, testing, continuous integration. DevOps automation firm Puppet Inc. is pitching a new service that helps companies ensure the information technology infrastructure they use is compliant with Center for Internet Security benchmarks. Puppet sells tools that developers use to automate the delivery and optimization of modern software applications. It’s best known for its flagship Puppet Enterprise platform that’s used to manage infrastructure and applications as they move across the software delivery pipeline. With Puppet Enterprise, the underlying infrastructure is automated via code that optimizes things such as servers and virtual machines. The platform also helps to automate functions including code review, testing, continuous integration and deployment in order to accelerate the development process.Today’s new offering is all about helping companies to ensure their IT infrastructure meets regulatory standards, something that Puppet said is one of the most difficult and important challenges its customers face. Yasmin Rajabi, global services strategy manager at Puppet, told that ensuring compliance is especially tricky for customers in industries such as finance, insurance and retail that handle sensitive customer data. Learn more: CLOUD IT INFRASTRUCTURE SPEND WILL SCRAPE $70B THIS YEAR “ It’s best known for its flagship Puppet Enterprise platform that’s used to manage infrastructure and applications as they move across the software delivery pipeline .” ~ Puppet Enterprise It’s really hard to deal with this,” Rajabi said in an interview. “Operations teams actually have to go out and make changes and make sure systems are compliant. Software can help continuously enforce this.” Rajabi explained that the CIS provides a list of benchmarks for servers and other IT systems that needs to be adhered to. “Our software takes that content and maps that to the systems you need to enforce the benchmarks for,” she said. “It’s continuous enforcement, done automatically.” “Today’s new offering is all about helping companies to ensure their IT infrastructure meets regulatory standards, something that Puppet said is one of the most difficult and important challenges its customers face.” Puppet said its CIS compliance service can help organizations ensure they are both secure and also equipped to pass audits quickly and easily. Organizations can identify exactly where they’re out of compliance and then ensure those systems conform to CIS standards. It’s providing a capability that’s likely to be in greater demand than ever as companies increasingly allow employees to work remotely to prevent the spread of the coronavirus. “A sea of enterprise companies just went to remote work,” said recently appointed Puppet Chief Technology Officer Abby Kearns. “That wasn’t a common practice for them. And so security and compliance become even more of a priority. The automation of that compliance is so important.” Puppet said its new CIS compliance service is available now in alpha for both Puppet Enterprise and Open Source Puppet users. IT teams need a simple way to get started with automation and a solution that grows with them as their automation footprint grows. You shouldn’t have to throw away your existing scripts or tools to scale automation across your organization. Organizations need a solution that is extensible — one that complements their current automation efforts and helps them scale beyond individuals to multiple teams,” said Matt Waxman, Head of Products at Puppet. “Our latest product capabilities meet people where they are and provides a clear roadmap to expand automation across their organizations. Learn more: FLEXENTIAL TO BUILD ITS LARGEST DATA CENTER TO MEET THE GROWING IT INFRASTRUCTURE NEEDS

Read More

Reeling from Ransomware Attack, eHealth Saskatchewan Says Restructuring IT Infrastructure

eHealth Saskatchewan | June 12, 2020

Five months after a ransomware attack locked the computer systems storing eHealth Saskatchewan says it’s going to take a while to restructure its IT infrastructure. It wasn’t long after the agency’s IT team discovered files from some of its servers had been sent to suspicious IP addresses. Additional steps taken to protect its computer systems better since the initial attack include updating password protocols, updated protection software. Five months after a ransomware attack locked the computer systems storing confidential medical data of Saskatchewan residents, eHealth Saskatchewan says it’s going to take a while to restructure its IT infrastructure, and that it’s still unsure who stole the data or where it is. The health agency’s chief executive officer Jim Hornell confirmed in February that the virus first entered the eHealth system on December 20, 2019. Employees didn’t discover there was a problem until they tried to open files on Jan. 6 and were asked to hand over bitcoin in exchange for the encrypted data. As we outlined publicly in early February, eHealth discovered some files were sent to IP addresses outside of eHealth’s environment. Those files were encrypted and password protected by the attacker. This makes it difficult to determine the exact content of those files,” wrote Ian Hanna, director of communications for eHealth Saskatchewan in an email to IT Word. “Longer-term work on re-organizing and restructuring eHealth’s IT architecture will continue for several more months. Read more: COMPARING SIX LEADING CONVERGED INFRASTRUCTURE VENDORS' PRODUCT eHealth Saskatchewan in an email to IT Word. “Longer-term work on re-organizing and restructuring eHealth’s IT architecture will continue for several more months. ~ Ian Hanna, director communications eHealth Saskatchewan Law enforcement and privacy officials have been kept up-to-date on the forensic investigation, wrote Hanna. He also confirmed that eHealth had hired outside help to determine if any files were illegally sold. As of now, no trace of such activity has been found. The agency’s website says, should it be determined that personal health information has left the organization, the public will be advised. Additional steps taken to protect its computer systems better since the initial attack include updating password protocols, updated protection software the introduction of multi-factor authentication for crucial systems, added Hanna. There was a total lack of visibility of the health agency’s computer network, according to David Masson, director of enterprise security at Darktrace. Unfortunately, it’s a common problem with many companies, he said. It’s too late to really do much once you discover there’s a problem because by then, the damage is done, One of the other disturbing details of the attack against eHealth Saskatchewan. With eHealth, there was never any ransom paid, but we’ve seen that the data has left [the data centre] and turned up in various other places,” said Masson. When it comes to action items on the part of residents whose data might be compromised, Masson suggested additional vigilance. Be wary of strange emails, text messages and phone calls. And it doesn’t hurt to check bank statements every once in a while, he added. One of the other disturbing details of the attack against eHealth Saskatchewan is how files from some of its servers had been sent to suspicious IP addresses, he indicated. This could reflect a more sophisticated ransomware attack akin to the one that crushed an agricultural services company earlier in June. In that case, a website called “Happy Blog” run by threat group dubbed REvil auctioned off data it says was stolen from a London, Ont., company that offers crop advisory and protection services. The auction notice said the data available included accounting documents and customer accounts for the last three months. Read more: HELIX TECHNOLOGIES BREAKS GROUND IN DATA ANALYTICS FOR CANNABIS PRODUCTION, UNVEILS BI TOOL

Read More

VVDN Announces 5G IP Device to speed up 5G networks using its Xilinx T1 Telco Accelerator card programme

prnewswire | September 15, 2020

5G network deployments accelerated with leading IP, O-RAN Fronthaul and L1 Offload to enable more efficient platforms with its complete product engineering and manufacturing expertise, is set to simplify and accelerate 5G networks using its software on the Xilinx T1 Telco Accelerator card, announced today from Xilinx Inc. VVDN supports the Xilinx T1 – a multi-function small form factor PCIe card that performs both O-RAN fronthaul and 5G NR layer-1 acceleration in a single slot PCIe card. With its advanced offload capabilities, the Xilinx T1 provides a dramatic reduction in the number of CPU cores required in a virtualized system.

Read More