The hyper-converged tech behind Dell EMC’s new 14G PowerEdge

Dell EMC launched the latest generation of its PowerEdge server portfolio at Dell EMC World in Las Vegas, Nevada. The 14th-generation server brings together better compute, scalability and security, answering enterprise client requests for better automation and productivity with simplified lifecycle management, according to Yanbing Li (pictured), senior vice president and general manager of storage and availability at VMware Inc. “We are very excited to work with Dell very closely on the 14G development and launch it. We are really looking for ‘better together’ opportunities,” Li said. “Coming from my business unit, storage and availability, we are [using] hyper-converged infrastructure solutions on top of the 14G server.”

Spotlight

CMIT Solutions, Inc.

CMIT Solutions started as a small computer support company in Austin, Texas in 1996. Over the past decade, we have grown into a leading provider of managed services and other computer consulting services tailored to the unique needs of small business with over 150 locally owned and operated locations nationwide. We’re able to combine personalized local service with all the technical resources of a large national company -- offering our small business clients the products, partnerships, and round-the-clock technical support that standalone locals can’t always provide.

OTHER ARTICLES
Hyper-Converged Infrastructure

How to Scale IT Infrastructure

Article | October 10, 2023

IT infrastructure scaling is when the size and power of an IT system are scaled to accommodate changes in storage and workflow demands. Infrastructure scaling can be horizontal or vertical. Vertical scaling, or scaling up, adds more processing power and memory to a system, giving it an immediate boost. Horizontal scaling, or scaling out, adds more servers to the cloud, easing the bottleneck in the long run, but also adding more complexity to the system.

Read More
Hyper-Converged Infrastructure

Ensuring Compliance in IaaS: Addressing Regulatory Requirements in Cloud

Article | July 13, 2023

Stay ahead of the curve and navigate the complex landscape of regulatory obligations to safeguard data in cloud. Explores the challenges of maintaining compliance and strategies for risk mitigation. Contents 1. Introduction 2. 3 Essential Regulatory Requirements 2.1 Before migration 2.2. During migration 2.3. After migration 3. Challenges in Ensuring Compliance in Infrastructure as a Service in Cloud Computing 3.1. Shared Responsibility Model 3.2. Data Breach 3.3. Access Mismanagement 3.4. Audit and Monitoring Challenges 4. Strategies for Addressing Compliance Challenges in IaaS 4.1. Risk Management and Assessment 4.2. Encryption and Collaboration with Cloud Service Providers 4.3. Contractual Agreements 4.4. Compliance Monitoring and Reporting 5. Conclusion 1. Introduction Ensuring Infrastructure as a Service (IaaS) compliance in security is crucial for organizations to meet regulatory requirements and avoid potential legal and financial consequences. However, several challenges must be addressed before and after migration to the cloud. This article provides an overview of the regulatory requirements in cloud computing, explores the challenges faced in ensuring compliance in IaaS, a cloud implementation service and provides strategies for addressing these challenges to ensure a successful cloud migration. 2. 3 Essential Regulatory Requirements When adopting cloud infrastructure as a service, organizations must comply with regulatory requirements before, during, and after migration to the cloud. This ensures avoiding the challenges, firms may face later and suggest solutions if they do so. 2.1 Before migration: Organizations must identify the relevant regulations that apply to their industry and geographic location. This includes: Data Protection Laws, Industry-Specific Regulations, and International Laws. 2.2. During migration: Organizations must ensure that they meet regulatory requirements while transferring data and applications to the cloud. This involves: Ensuring proper access management, data encryption, and data residency requirements. 2.3. After migration: Organizations must continue to meet regulatory requirements through ongoing monitoring and reporting. This includes: Regularly reviewing and updating security measures, ensuring proper data protection, and complying with audit and reporting requirements. 3. Challenges in Ensuring Compliance in Infrastructureas a Service in Cloud Computing 3.1. Shared Responsibility Model The lack of control over the infrastructure in IaaS cloud computing is caused by the shared responsibility model of IaaS, where the cloud service provider is responsible for the IaaS security while the customer is responsible for securing the data and applications they store and run in the cloud. According to a survey, 22.8% of respondents cited the lack of control over infrastructure as a top concern for cloud security. (Source: Cloud Security Alliance) 3.2. Data Breach Data breaches have serious consequences for businesses, including legal and financial penalties, damage to their reputation, and the loss of customer trust. The location of data and the regulations governing its storage and processing create challenges for businesses operating in multiple jurisdictions. The global average total cost of a data breach increased by USD 0.11 million to USD 4.35 million in 2022, the highest it's been in the history of this report. The increase from USD 4.24 million in the 2021 report to USD 4.35 million in the 2022 report represents a 2.6% increase. (Source: IBM) 3.3. Access Mismanagement Insider threats, where authorized users abuse their access privileges, can be a significant challenge for access management in IaaS. This includes the intentional or accidental misuse of credentials or non-protected infrastructure and the theft or loss of devices containing sensitive data. The 2020 data breach investigations report found that over 80% of data breaches were caused by compromised credentials or human error, highlighting the importance of effective access management. (Source: Verizon) 3.4. Audit and Monitoring Challenges Large volumes of alerts overwhelm security teams, leading to fatigue and missed alerts, which result in non-compliance or security incidents going unnoticed. Limited resources may also make it challenging to effectively monitor and audit infrastructure as a service cloud environment, including the implementation and maintenance of monitoring tools. 4. Strategies for Addressing Compliance Challenges in IaaS 4.1. Risk Management and Assessment Risk Assessment and Management includes conducting a risk assessment, including assessing risks related to data security, access controls, and regulatory compliance. It also involves implementing risk mitigation measures to address identified risks, like additional security measures or access controls such as encryption or multi-factor authentication. 4.2. Encryption and Collaboration with Cloud Service Providers Encryption can be implemented at the application, database, or file system level, depending on the specific needs of the business. In addition, businesses should establish clear service level agreements with their cloud service provider related to data protection. This includes requirements for data security, access controls, and backup and recovery processes. 4.3. Contractual Agreements The agreement should also establish audit and compliance requirements, including regular assessments of access management controls and policies. Using contractual agreements, organizations help ensure that they are clearly defined and that the cloud service provider is held accountable for implementing effective access management controls and policies. 4.4. Compliance Monitoring and Reporting Monitoring and Reporting involves setting up automated monitoring and reporting mechanisms that track compliance with relevant regulations and standards and generate reports. They should also leverage technologies such as intrusion detection and prevention systems, security information and event management (SIEM) tools, and log analysis tools to collect, analyze, and report on security events in real time. 5. Conclusion In accordance with the increasing prevalence of data breaches and the growing complexity of regulatory requirements, maintaining a secure and compliant cloud environment will be crucial for businesses to build trust with customers and avoid legal and financial risks. Addressing these requirements, the cloud helps companies maintain data privacy, avoid legal risks, and build customer trust. Organizations create a secure and compliant cloud environment that meets their needs by overcoming challenges and implementing best practices, working closely with cloud service providers. Ultimately, by prioritizing compliance and investing in the necessary resources and expertise, businesses can navigate these challenges and unlock the full potential of the cloud with confidence.

Read More
Hyper-Converged Infrastructure, Windows Systems and Network

Infrastructure Lifecycle Management Best Practices

Article | July 11, 2023

As your organization scales, inevitably, so too will its infrastructure needs. From physical spaces to personnel, devices to applications, physical security to cybersecurity – all these resources will continue to grow to meet the changing needs of your business operations. To manage your changing infrastructure throughout its entire lifecycle, your organization needs to implement a robust infrastructure lifecycle management program that’s designed to meet your particular business needs. In particular, IT asset lifecycle management (ITALM) is becoming increasingly important for organizations across industries. As threats to organizations’ cybersecurity become more sophisticated and successful cyberattacks become more common, your business needs (now, more than ever) to implement an infrastructure lifecycle management strategy that emphasizes the security of your IT infrastructure. In this article, we’ll explain why infrastructure management is important. Then we’ll outline steps your organization can take to design and implement a program and provide you with some of the most important infrastructure lifecycle management best practices for your business. What Is the Purpose of Infrastructure Lifecycle Management? No matter the size or industry of your organization, infrastructure lifecycle management is a critical process. The purpose of an infrastructure lifecycle management program is to protect your business and its infrastructure assets against risk. Today, protecting your organization and its customer data from malicious actors means taking a more active approach to cybersecurity. Simply put, recovering from a cyber attack is more difficult and expensive than protecting yourself from one. If 2020 and 2021 have taught us anything about cybersecurity, it’s that cybercrime is on the rise and it’s not slowing down anytime soon. As risks to cybersecurity continue to grow in number and in harm, infrastructure lifecycle management and IT asset management are becoming almost unavoidable. In addition to protecting your organization from potential cyberattacks, infrastructure lifecycle management makes for a more efficient enterprise, delivers a better end user experience for consumers, and identifies where your organization needs to expand its infrastructure. Some of the other benefits that come along with comprehensive infrastructure lifecycle management program include: More accurate planning; Centralized and cost-effective procurement; Streamlined provisioning of technology to users; More efficient maintenance; Secure and timely disposal. A robust infrastructure lifecycle management program helps your organization to keep track of all the assets running on (or attached to) your corporate networks. That allows you to catalog, identify and track these assets wherever they are, physically and digitally. While this might seem simple enough, infrastructure lifecycle management and particularly ITALM has become more complex as the diversity of IT assets has increased. Today organizations and their IT teams are responsible for managing hardware, software, cloud infrastructure, SaaS, and connected device or IoT assets. As the number of IT assets under management has soared for most organizations in the past decade, a comprehensive and holistic approach to infrastructure lifecycle management has never been more important. Generally speaking, there are four major stages of asset lifecycle management. Your organization’s infrastructure lifecycle management program should include specific policies and processes for each of the following steps: Planning. This is arguably the most important step for businesses and should be conducted prior to purchasing any assets. During this stage, you’ll need to identify what asset types are required and in what number; compile and verify the requirements for each asset; and evaluate those assets to make sure they meet your service needs. Acquisition and procurement. Use this stage to identify areas for purchase consolidation with the most cost-effective vendors, negotiate warranties and bulk purchases of SaaS and cloud infrastructure assets. This is where lack of insights into actual asset usage can potentially result in overpaying for assets that aren’t really necessary. For this reason, timely and accurate asset data is crucial for effective acquisition and procurement. Maintenance, upgrades and repair. All assets eventually require maintenance, upgrades and repairs. A holistic approach to infrastructure lifecycle management means tracking these needs and consolidating them into a single platform across all asset types. Disposal. An outdated or broken asset needs to be disposed of properly, especially if it contains sensitive information. For hardware, assets that are older than a few years are often obsolete, and assets that fall out of warranty are typically no longer worth maintaining. Disposal of cloud infrastructure assets is also critical because data stored in the cloud can stay there forever. Now that we’ve outlined the purpose and basic stages of infrastructure lifecycle management, it’s time to look at the steps your organization can take to implement it.

Read More
Application Infrastructure

Advancing 5G with cloud-native networking and intelligent infrastructure

Article | December 15, 2021

The success of 5G technology is a function of both the infrastructure that supports it and the ecosystems that enable it. Today, the definitive focus in the 5G space is on enterprise use cases, ranging from dedicated private 5G networks to accessing edge compute infrastructure and public or private clouds from the public 5G network. As a result, vendor-neutral multitenant data center providers and their rich interconnection capabilities are pivotal in helping make 5G a reality. This is true both in terms of the physical infrastructure needed to support 5G and the ability to effectively connect enterprises to 5G. Industry experts expect 5G to enable emerging applications such as virtual and augmented reality (AR/VR), industrial robotics/controls as part of the industrial internet of things (IIoT), interactive gaming, autonomous driving, and remote medical procedures. These applications need a modern, cloud-based infrastructure to meet requirements around latency, cost, availability and scalability. This infrastructure must be able to provide real-time, high-bandwidth, low-latency access to latency-dependent applications distributed at the edge of the network. How Equinix thinks about network slicing Network slicing refers to the ability to provision and connect functions within a common physical network to provide the resources necessary to deliver service functionality under specific performance constraints (such as latency, throughput, capacity and reliability) and functional constraints (such as security and applications/services). With network slicing, enterprises can use 5G networks and services for a wide variety of use cases on the same infrastructure. Providing continuity of network slices with optimal UPF placement and intelligent interconnection Mobile traffic originates in the mobile network, but it is not contained to the mobile network domain, because it runs between the user app on a device and the server workload on multi-access edge compute (MEC) or on the cloud. Therefore, to preserve intended characteristics, the slice must be extended all the way to where the traffic wants to go. This is why we like to say “the slicing must go on.” The placement of network functions within the slice must be optimized relative to the intended traffic flow, so that performance can be ensured end-to-end. As a result, organizations must place or activate the user plane function (UPF) in optimal locations relative to the end-to-end user plane traffic flow. We expect that hybrid and multicloud connectivity will remain a key requirement for enterprises using 5G access. In this case, hybrid refers to private edge computing resources (what we loosely call “MEC”) located in data centers—such as Equinix International Business Exchange™ (IBX®) data centers—and multicloud refers to accessing multiple cloud providers from 5G devices. To ensure both hybrid and multicloud connectivity, enterprises need to make the UPF part of the multidomain virtual Layer 2/Layer 3 interconnection fabric. Because a slice must span multiple domains, automation of UPF activation, provisioning and virtual interconnection to edge compute and multicloud environments is critical. Implementing network slicing for interconnection of core and edge technology Equinix partnered with Kaloom to develop network slicing for interconnection of core and edge (NICE) technology within our 5G and Edge Technology Development Center (5G ETDC) in Dallas. NICE technology is built using cloud-native network fabric and high-performance 5G UPF from Kaloom. This is a production-ready software solution, running on white boxes built with P4 programmable application-specific integrated circuits (ASICs), allowing for deep network slicing and support for high-performance 5G UPF with extremely fast data transfer rates. With NICE technology in the 5G ETDC, Equinix demonstrates: 5G UPF deployment/activation and traffic breakout at Equinix for multiple slices. Software-defined interconnection between the 5G core and MEC resources from multiple providers. Software-defined interconnection between the 5G core and multiple cloud service providers. Orchestration of provisioning and automation of interconnection across the 5G core, MEC and cloud resources. Architecture of NICE technology in the Equinix 5G ETDC The image above shows (from left to right): The mobile domain with radio access network (RAN), devices (simulated) and mobile backhaul connected to Equinix. The Equinix domain with: Equinix Metal® supporting edge computing servers and a fabric controller from Kaloom. Network slicing fabric providing interconnection and Layer 2/Layer 3 cloud-native networking to dynamically activate UPF instances/interfaces connected with MEC environments and clouds, forming two slices (shown above in blue and red). Equinix Fabric™ and multicloud connectivity. This demonstrates the benefit of having the UPF as a feature of the interconnection fabric, effectively allowing UPF activation as part of the virtual fabric configuration. This ultimately enables high-performance UPF that’s suitable for use cases such as high-speed 5G fixed wireless access. Combining UPF instances and MEC environments into an interconnection fabric makes it possible to create continuity for the slices and influence performance and functionality. Equinix Fabric adds multicloud connectivity to slices, enabling organizations to directly integrate network slicing with their mobile hybrid multicloud architectures. Successful private 5G edge deployments deliver value in several ways. Primarily, they offer immediate access to locally provisioned elastic compute, storage and networking resources that deliver the best user and application experiences. In addition, they help businesses access a rich ecosystem of partners to unlock new technologies at the edge. Secure, reliable connectivity and scalable resources are essential at the edge. A multivendor strategy with best-of-breed components complemented by telemetry, advanced analytics with management and orchestration—as demonstrated with NICE in Equinix data centers—is a most effective way to meet those requirements. With Equinix’s global footprint of secure, well-equipped facilities, customers can maximize benefits.” - Suresh Krishnan, CTO, Kaloom Equinix and its partners are building the future of 5G NICE technology is just one example of how the Equinix 5G and Edge Technology Development Center enables the innovation and development of real-world capabilities that underpin the edge computing and interconnection infrastructure required to successfully implement 5G use cases. A key benefit of the 5G ETDC is the ability to combine cutting-edge innovations from our partners like Kaloom with proven solutions from Equinix that already serve a large ecosystem of customers actively utilizing hybrid multicloud architectures.

Read More

Spotlight

CMIT Solutions, Inc.

CMIT Solutions started as a small computer support company in Austin, Texas in 1996. Over the past decade, we have grown into a leading provider of managed services and other computer consulting services tailored to the unique needs of small business with over 150 locally owned and operated locations nationwide. We’re able to combine personalized local service with all the technical resources of a large national company -- offering our small business clients the products, partnerships, and round-the-clock technical support that standalone locals can’t always provide.

Related News

Global Hyper-Converged Infrastructure Industry

prnewswire | April 27, 2020

Hyper-Converged Infrastructure market worldwide is projected to grow by US$23.6 Billion, driven by a compounded growth of 31.9%. Hardware, one of the segments analyzed and sized in this study, displays the potential to grow at over 30.8%. The shifting dynamics supporting this growth makes it critical for businesses in this space to keep abreast of the changing pulse of the market. Poised to reach over US$20.1 Billion by the year 2025, Hardware will bring in healthy gains adding significant momentum to global growth.

Read More

Keep the cost of VDI in check

TechTarget | December 11, 2017

For years, the popular sentiment among many IT professionals was that the cost of VDI is just too darn high. But the tide is turning. If IT knows where to look, it can actually create a quality VDI deployment without busting its budget. The change is, in large part, thanks to some technological advances. All-flash storage, for example, is less expensive than ever. Its features, such as data compression and deduplication, can lead to major savings in the long run. The rise of hyper-converged infrastructure (HCI) and inexpensive thin clients has also helped drive down prices.

Read More

Peak 10 + ViaWest Unveils One of the Largest Data Halls in the World

Peak 10 + ViaWest | November 14, 2017

" Peak 10 + ViaWest today announced the completed 88,000-square foot expansion of its Englewood, Co. Compark data center, bringing the facility's total data center space to 138,000 square feet. The Compark facility is now one of the largest raised floor data halls in the world and features design innovations that yield super high-density capabilities exceeding 1,500 watts per square foot and a Power Usage Effectiveness (PUE) of 1.3."Demand in the Denver area is spiking as our customers' data needs increase and their infrastructure strategies shift toward a fully hybrid IT model," said Chris Downie, CEO for Peak 10 + ViaWest.

Read More

Global Hyper-Converged Infrastructure Industry

prnewswire | April 27, 2020

Hyper-Converged Infrastructure market worldwide is projected to grow by US$23.6 Billion, driven by a compounded growth of 31.9%. Hardware, one of the segments analyzed and sized in this study, displays the potential to grow at over 30.8%. The shifting dynamics supporting this growth makes it critical for businesses in this space to keep abreast of the changing pulse of the market. Poised to reach over US$20.1 Billion by the year 2025, Hardware will bring in healthy gains adding significant momentum to global growth.

Read More

Keep the cost of VDI in check

TechTarget | December 11, 2017

For years, the popular sentiment among many IT professionals was that the cost of VDI is just too darn high. But the tide is turning. If IT knows where to look, it can actually create a quality VDI deployment without busting its budget. The change is, in large part, thanks to some technological advances. All-flash storage, for example, is less expensive than ever. Its features, such as data compression and deduplication, can lead to major savings in the long run. The rise of hyper-converged infrastructure (HCI) and inexpensive thin clients has also helped drive down prices.

Read More

Peak 10 + ViaWest Unveils One of the Largest Data Halls in the World

Peak 10 + ViaWest | November 14, 2017

" Peak 10 + ViaWest today announced the completed 88,000-square foot expansion of its Englewood, Co. Compark data center, bringing the facility's total data center space to 138,000 square feet. The Compark facility is now one of the largest raised floor data halls in the world and features design innovations that yield super high-density capabilities exceeding 1,500 watts per square foot and a Power Usage Effectiveness (PUE) of 1.3."Demand in the Denver area is spiking as our customers' data needs increase and their infrastructure strategies shift toward a fully hybrid IT model," said Chris Downie, CEO for Peak 10 + ViaWest.

Read More

Events