IT News and Events
Jun 6th, 2022 — Jun 12th, 2022 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 291, Issue 2 << Previous Issue | Next Issue >>
Red Hat News
disable
Containers Vulnerability Risk Assessment
Security considerations are even more important today than they were in the past. Every day we discover new vulnerabilities that impact our computer systems, and every day our computer systems become more complex.
With the deluge of vulnerabilities that threaten to swamp our security teams, the question, "How much does it matter?" comes quickly to our minds.

This question, "Does it matter?", has two parts:

  • How soon does it need to be fixed (a question for the software vendor)?
  • How soon does it need to be applied (a question for the end user)?

To set the stage, Red Hat Product Security uses the following terminology to help remove some of the ambiguity around discussing software vulnerabilities.

Red Hat News, June 8th, 2022
(Get More Information . .) open to premium members only

Explaining Artificial Intelligence Governance - And Why Financial Institutions Need It
The financial services sector is highly challenging, with participants seeking to gain a competitive advantage through technologies, business practices and the incorporation of more efficient operational methods.
Artificial intelligence (AI) is becoming one of the essential tools that financial institutions possess that can assist in automating processes, improving the accuracy of predictions and forecasts and improving customer service. However, financial institutions must establish a robust AI governance framework to drive AI implementations that encompass operational safety while remaining effective.
Red Hat News, June 8th, 2022
(Get More Information . .) open to premium members only

Friday Five - June 10, 2022
The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.
  • SiliconANGLE - Three insights you might have missed from KubeCon + CloudNativeCon EU
  • Application modernization with Apache Kafka
  • Phoronix - Red Hat Enterprise Linux 9.0 Performing Well, Great Benefit To Newer Intel Xeon & AMD EPYC Servers
  • Red Hat brings greater simplicity and flexibility to Kubernetes management with latest version of Red Hat Advanced Cluster Management for Kubernetes
  • In the Clouds (E24) | Cloud security & VMware + Broadcom

Read on for details.

Red Hat News, June 10th, 2022
(Get More Information . .) open to premium members only

Kubernetes Operators: Good Security Practices
A Kubernetes operator is a method of packaging, deploying and managing a Kubernetes application.
A Kubernetes application is both deployed on Kubernetes and managed using the Kubernetes API. Operators automate the management of applications or service life cycles on behalf of a human operator, providing for the ability to automate at every level of the stack-from managing the parts that make up the platform all the way to applications that are provided as a managed service.
Red Hat News, June 10th, 2022
(Get More Information . .) open to premium members only

Using Multipath TCP To Better Survive Outages And Increase Bandwidth
MultiPath TCP (MPTCP) gives you a way to bundle multiple paths between systems to increase bandwidth and resilience from failures.
Here we show you how to configure a basic setup so you can try out MPTCP, using two virtual guests. We'll then look at the details of a real world scenario, measuring bandwidth and latency when single links disappear.

What is Multipath TCP?

Red Hat Enterprise Linux 9 (RHEL 9) and later enables the MultiPath TCP daemon (mptcpd) to configure multipath TCP. But what exactly is MPTCP and how can it help us?

Red Hat News, June 9th, 2022
(Get More Information . .) open to premium members only

IBM News
disable
IBM Tackles Growing Attack Surface Risks With Plans To Acquire Randori
Addition of Randori helps further simplify threat detection and response, building on recent acquisition of ReaQta and Launch of QRadar XDR
IBM at RSAC 2022 announced it plans to acquire Randori, a leading attack surface management (ASM) and offensive cybersecurity provider based in the Boston area. Randori helps clients continuously identify external facing assets, both on-premise or in the cloud, that are visible to attackers - and prioritize exposures which pose the greatest risk. Today's news further advances IBM's Hybrid Cloud strategy and strengthens its portfolio of AI-powered cybersecurity products and services.
IBM News, June 6th, 2022
(Get More Information . .) open to premium members only

Power Of Hybrid, Multicloud Innovation Creates A Seamless Customer Experience Across Industries
Think about the rate and pace of innovation we are all experiencing as customers in today's digital age - from securely initiating a timely banking transaction to rapidly changing a flight last minute on an airline's mobile app or ensuring the video of a must-see sports final does not get dropped on a 5G network.
All of these daily activities must be powered by agile technology platforms that can help businesses modernize in response to our ever-changing demands to provide us faster, better customer experiences.

A study conducted by IBM Institute for Business Value in cooperation with Oxford Economics revealed that enterprises have moved on from a single cloud approach and have entered the hybrid, multicloud era to boost flexibility as they work to keep pace with customer demands. If not managed properly, the shift to this new era can create complexities around security and interoperability, opening the door to major security threats that can potentially compromise your data.

IBM News, June 6th, 2022
(Get More Information . .) open to premium members only

The Mayflower Autonomous Ship Has Reached North America: Why This Pioneering Transatlantic Voyage Matters For The Advancement Of Ai And Automation Technology Across Every Industry
In a voyage lasting 40 days and conquering approximately 3,500 unmanned miles at sea, the Mayflower Autonomous Ship arrived in North America in Halifax, Nova Scotia on June 5, 2022
Following two years of design, construction and AI model training, the Mayflower Autonomous Ship (MAS) was officially launched in September 2020. Fast forward to today, June 6, 2022, we celebrate the completion of MAS's historic transatlantic voyage from Plymouth, UK to its North American arrival in Halifax, Nova Scotia yesterday, June 5.

With no human captain or onboard crew, MAS is the first self-directed autonomous ship with technology that is scalable and extendible to traverse the Atlantic Ocean.

IBM News, June 6th, 2022
(Get More Information . .) open to premium members only

IT News - CxO
disable
4 Takeaways For CIOs From The MIT Sloan CIO Symposium
IT leaders from a range of industries offer perspectives on security, the IT talent shortage, and more
Gordon Haff writes in The Enterprisers Project, "Last week saw a return to a partly in-person MIT Sloan CIO Symposium event. As usual, there was a wealth of insights from senior IT leaders - some related to ongoing trends, others to new or at least accelerated ones.

Here are four discussions that jumped out from the mostly panel-oriented format.

1. How to become cyber-resilient

There's been plenty of discussion over the past few years about preventing cyber attacks. But that framing might be wrong, or at least too narrow. Prof. Stuart Madnick, Co-founder, Cybersecurity at MIT Sloan (CAMS), went so far as to say that 'prevention is futile,' given, for example, that supply chain attacks such as Log4j are 'zero-click vulnerabilities.' (That's not to say that security scans and other processes can't reduce the number of vulnerabilities, but you shouldn't expect to catch them all.)..."

The Enterprisers Project, May 31st, 2022
(Get More Information . .) open to premium members only

CIOs Largely Believe Their Software Supply chain is vulnerable
Internal bureaucracy and barriers hold up roll out of defenses, report finds
Thomas Claburn writes in The Register, "Ask 1,000 CIOs whether they believe their organizations are vulnerable to cyberattacks targeting their software supply chains and about 82 percent can be expected to say yes.

Security biz Venafi engaged research firm Coleman Parkes to put that question to as many corporate IT leaders from the US, UK, France, Germany, Austria, Switzerland, Belgium, Netherlands, Luxembourg, Australia, and New Zealand.

The result was an emphatic vote of no confidence..."

The Register, May 31st, 2022
(Get More Information . .) open to premium members only

8 IT Spending Trends For The Post-Pandemic Enterprise In 2022
Over the past three years, the chaos of the pandemic has been felt everywhere.
"IT managers suddenly found themselves supporting legions of work-from-home employees," writes Erik Bradley in TechCrunch, "...planned system expansions and upgrades had to be put on hold; organizations needed new technologies to accommodate changing workforce requirements.

Now with people returning to offices, IT priorities are shifting rapidly, especially given the looming recession, high inflation and stressed supply chains. Our latest research report offers some insight into where companies are allocating their IT spend in 2022..."

TechCrunch, May 31st, 2022
(Get More Information . .) open to premium members only

CIOs Welcome Users' Bid For More IT Budget Control - Mostly
When Richard Wiedenbeck became chief information officer of Ameritas Life Insurance Corp. 12 years ago, he encountered a siloed business structure in which each business unit fulfilled its own information technology needs
Paul Gillin writes in SiliconANGLE , 'IT was treated as back-office order-taking operation to an unhealthy level,' he said. 'Businesspeople were making software application and design decisions who had no skill or qualifications to do so. One team had three developers who only knew SQL Server, so they had 45 SQL Server databases even though SQL Server wasn't the answer for 80% of the problems they had to solve.'

Wiedenbeck, who has been a management consultant and run two software companies, knew that control was part of the problem. 'If you don't get the technology leaders and business leaders working together, the idea that one is leading and one isn't can become a control construct, not an outcome construct,' he said. 'Both sides are thinking about how to control stuff as opposed to how to achieve an end state.'..."

SiliconANGLE , June 1st, 2022
(Get More Information . .) open to premium members only

Digital Transformation: 5 Ways To Create A Realistic Strategy
Digital transformation requires organizational alignment and a shared vision. Consider this expert advice as you design your strategy
"Digital transformation is the giant umbrella that encompasses how people work in today's economy," opines Sarah McCasland in The Enterprisers Project. "It's typically a multi-faceted initiative that goes beyond simply modernizing applications. It encompasses everything that represents the way a business needs to operate in 2022 to deliver exceptional customer experiences.

This type of initiative is a shared responsibility. It starts with the CEO, who must be a champion of change, but it must also involve other leaders throughout the organization working together to make transformation happen. Sometimes it will require a Chief Digital Officer to coordinate the response, but one fact is consistent: Without alignment throughout the organization, the effort is likely to fail. And it might just take the company down with it..."

The Enterprisers Project, June 1st, 2022
(Get More Information . .) open to premium members only

How IT Leaders Can Drive Digital Innovation
More CEOs want their CIOs and CDOs to think strategically and help transform their organizations' products and services. Learn how some top IT leaders are tackling this challenge.
"Today's CIOs and chief digital officers have a critical dual challenge," opines Diann Daniel in SearchCIO, "they need to lead both technology and cultural transformations.

That was one of the important takeaways from experts in the panel discussion "Digital Leadership: Collaboration between CIOs, CDOs and CEOs" at the MIT Sloan CIO Symposium in Cambridge, Mass., on May 23.

The panel discussion made clear that the specific role or roles designated in IT to lead digital innovation and transformation can be different at different companies. But whether that role is the CIO, chief digital officer (CDO), chief digital information officer (CDIO) or something else, IT has a critical role in today's digital ecosystems.

Here are six ways IT leaders in charge of transformations can drive digital innovation..."

SearchCIO, May 31st, 2022
(Get More Information . .) open to premium members only

The State Of Digital Leadership
Most tech decision-makers report that their organization has a single leader overseeing both digital business strategy and digital transformation.
Leaders must always steer their organization through challenging periods and help to future-proof the business, but after the COVID-19 pandemic drove more reliance on digital services, Gartner Peer Insights wanted to explore whether new skills are required for digital leadership.

We polled tech decision-makers about the state of digital leadership, and executives can use this report to benchmark against their peers. (Customizable, real-time results remain available to Gartner Peer Insights community members even after polls close). These data were collected Oct 14, 2021 - Mar 3, 2022, and are based on responses from 338 tech decision-makers.

CIODIVE, May 31st, 2022
(Get More Information . .) open to premium members only

IT News - Storage
disable
The Unstructured Data Management Maturity Index
As data management matures, unstructured data evolves from being a storage cost center to sitting at the epicenter of value creation.
"To make use of unstructured data for competitive gain, it's important to develop a strategy for managing it to meet the dual needs of cost efficiency and monetization," writes Krishna Subramanian in jaxenter.

"Here is a 5-stage maturity model to follow for organizations looking to modernize unstructured data management practices.

Enterprise data is growing - no surprise there. It is the current rate of data growth that is truly astounding. In 2010, the amount of data created, consumed and stored was 2 zettabytes, according to Statista. Firms like IDC have been predicting explosive growth overall in data over the next few years: from 64.2 ZB of data in 2020 to 175 ZB in 2025. That's nearly three times growth in five years. Roughly 80% of all data is unstructured: file and object data including documents, medical images, video and audio files, design data, research data and sensor data.

jaxenter, June 3rd, 2022
(Get More Information . .) open to premium members only

2022-23 DCIG Top 5 Rising Vendors In Storage For Life Sciences Report Now Available
DCIG is pleased to announce the immediate availability of the inaugural 2022-23 DCIG TOP 5 Rising Vendors in Storage for Life Sciences report.
DCIG recently conducted research into Storage for Life Sciences solutions. This 2022 - 23 DCIG TOP 5 Rising Vendors in Storage for Life Sciences report focuses on the top solutions by vendors of size less than $200M whom we consider to be 'rising' in the market. The use cases are the same, but rising companies tend to be younger companies bringing newer technologies and disruptive solutions to market. Those organizations looking for modern approaches and potential competitive advantage may want to consider working with a rising vendor.
DCIG, May 31st, 2022
(Get More Information . .) open to premium members only

IT News - AI
disable
Quick Study: Artificial Intelligence Ethics And Bias
Our collection of articles will help guide you through why organizations need an AI ethics strategy, what's a good and bad ethics strategy, and how and why to tackle bias head on
"Mention artificial intelligence to pretty much anyone and there's a good chance that the term that once seemed magical now spawns a queasy feeling," opines James M. Connolly in InformationWeek.

"It generates thoughts of a computer stealing your job, technology companies spying on us, and racial, gender and economic bias.

So, how do we bring the magic back to AI? Maybe it comes down to people and things that humans actually do pretty well: thinking and planning. That's one finding that will become clear in a review of the articles in this Quick Study packed with InformationWeek articles focused on AI ethics and bias..."

InformationWeek, May 31st, 2022
(Get More Information . .) open to premium members only

Artificial Intelligence Developments
During the long pandemic, the global population have consistently turned to artificial intelligence-powered technologies for their daily needs.
Paramita (Guha) Ghosh writes in Dataversity, "Be it chat bots for uninterrupted customer service, drones for food and medicine delivery during a crisis, or mitigation of growing cyber attacks at the roots-AI has had a solution.

As AI increasingly makes machines smarter, human roles will gradually become more focused and machine-supported. The no- or low-code applications generated by machine learning-driven machines is just one example of a completely augmented workforce, where machines remove the need for highly specialized human employees, and offer valuable free time for human-only tasks..."

Dataversity, May 31st, 2022
(Get More Information . .) open to premium members only

IT News - Humor
disable
Keeping Your Head As An Entire Database Goes Pear-Shaped
WHO, ME? A reminder of the devastation a simple DROP can do and that backups truly are a DBA's best friend in this morning's "there but for the grace of..." Who, Me?
Richard Speed writes in The Register, "'Stephen' is the author of today's confession and was faced with what should have been a simple case of applying an update to an Estimating and Invoicing system.

The system ran on a PostgreSQL-database and was, in his words, "Software that I don't touch save when there's an issue, needs rebooting, etc."

The best sort of software, in the opinion of this writer. However, an update was required and Stephen was the man assigned to the task. He had prepared the installer and was ready to wait for the 30 or so minutes while it ran when he noticed that the backups had not been running..."

The Register, May 30th, 2022
(Get More Information . .) open to premium members only

IT News - Operations
disable
Open Compute Project: Data Center Design By Community Effort
For 11 years OCP has been changing the ways that data centers are constructed and operate by putting data center operators and their suppliers under a single roof.
Christine Hall writes in Data Center Knowledge, "Although the Open Compute Project doesn't get a lot of media attention and in some ways remains below the radar, there's no arguing the fact that in the 11 years the project has been around it's had a huge effect on how data centers are built and operate.

The project was born in 2011, after Meta (then Facebook) made big news in the tech community when it opened the doors to its first custom built data center in Prineville, Oregon, which had been purpose-designed for energy efficiency, even while meeting the demands of a hyperscaler..."

Data Center Knowledge, June 3rd, 2022
(Get More Information . .) open to premium members only

Data Center Infrastructure Management (DCIM)
Data center infrastructure management (DCIM) is the convergence of IT and building facilities functions within an organization.
"The goal of a DCIM initiative is to provide administrators with a holistic view of a data center's performance so that energy, equipment and floor space are used as efficiently as possible," writes Alexander S. Gillis in SearchDataCenter.

"DCIM software is used to measure, monitor and manage the IT equipment and supporting infrastructure of data centers. This enables data center operators to run efficient operations while improving infrastructure design planning. DCIM software can be hosted on premises or in the cloud..."

SearchDataCenter, June 2nd, 2022
(Get More Information . .) open to premium members only

40% Of Enterprises Don't Include Business-Critical Systems In Their Cybersecurity Monitoring
Logpoint has announced findings from a recent poll to uncover the security and cost implications enterprises face with their existing IT infrastructure. The poll was targeted at cybersecurity and IT professionals in both the U.S. and UK.
The problem with monitoring of business-critical systems

The poll revealed the extent of insecure and unmonitored business-critical systems, with 40 per cent noting that they do not include business-critical systems such as SAP in their cybersecurity monitoring. In addition, a further 27 per cent were unsure if it was included in their cybersecurity monitoring at all. This is concerning given that SAP serves as the core system behind every aspect of business operations. Not including this in the centralised security monitoring solution leaves organizations vulnerable and exposed to the risk of cyber threats.

HelpNet Security, June 3rd, 2022
(Get More Information . .) open to premium members only

IT News - Security
disable
A Perfect Cybersecurity Storm Is Brewing
There's a storm brewing in cybersecurity that may reshape the priorities of the entire industry over the next couple of years.
Leora Pudell writes in Security Boulevard, "Four macro-trends coming together at the same time:

1) Use of stolen credential and phishing now represents the most commonly used attack vectors in successful breaches.

2) Recession is looming if not already upon us. Employees that are laid off, or believe they are at risk, may be more susceptible to threat actors attempting to leverage access.

3) The Great Resignation People are quitting and moving to firms with a better work/life balance or more flexible working policy. Increased employee churn needs careful security management to avoid exposure.

4) Inflation - the cost of living is spiraling. If offered enough money to keep the heating on through winter, in return for sharing credentials - how many employees would accept?..."

Security Boulevard, May 31st, 2022
(Get More Information . .) open to premium members only

4 Reasons Why Cisos Can't Ignore Climate Change
Climate change is causing disruptions to the supply chain and critical services, and attackers are keen to take advantage of it.
Michael Hill writes in CSO Online, "Climate change may not be an issue synonymous with cybersecurity, but there is a growing need for the security sector to recognize and address the impact a changing climate is having. A new report from the World Meteorological Organization (WMO) stated that there is a 50% chance that, during the next five years, the global average surface temperature will exceed 1.5 degree C above the preindustrial average for the first time in an individual year..."

Climate-related factors such as shifting weather patterns, resource availability, and mass migration could alter the cyberthreats organizations and governments face, introducing new or heightened risks in an already complex landscape.

CSO Online, June 2nd, 2022
(Get More Information . .) open to premium members only

Log4Shell: How Friendly Hackers Rose To The Challenge
HackerOne CISO Chris Evans looks back at how the security community successfully rose to the challenge of Log4Shell, and saved end-user organisations millions
Chris Evans writes in ComputerWeekly, "Imagine the scene: a severe vulnerability emerges that affects organisations worldwide, allowing unauthorised access to highly sensitive data. This scenario happened in late 2021 when a popular open source tool published a critical vulnerability called Log4Shell.

So, what exactly happened? Log4Shell is a software vulnerability found in Apache Log4j, a widely used Java library for logging error messages in applications. It sent organisations into panic mode as they scrambled to discover if they were vulnerable.

Amid the panic, the hacking community sprang to action, hunting the vulnerability across the internet and providing real-time reports central to remediation efforts..."

ComputerWeekly, May 30th, 2022
(Get More Information . .) open to premium members only

6 Trends IT Leaders Need To Know About Enterprise Identity
We still have a lot to learn about the fast-paced field of digital identity and our current approaches. The '2022 Identity Management Survey' takes a look at daily identity practices from respondents in IT job functions. Six different identity management trends emerged from the data.
Jackson Shaw writes in jaxenter, "With a fast-growing, frequently moving, highly distributed workforce, identity management and security have come to the forefront for IT leaders. Add advances in technology, cloud proliferation, and equally evolving cyber threats, and we've reached an inflection point for digital identity. And despite the field having been around for nearly 30 years, we still have a lot to learn.

To distill what those lessons are, we first need to understand the challenges, use cases, and behaviors driving our current approach to identity. The '2022 Identity Management Survey' seeks to achieve this, compiling the need-to-know details about identity practices from more than 500 knowledge workers living in the space every day. Of the respondents, a majority (60%) hold IT job functions-folks right in the trenches. From their responses, here are the 6 trends that emerged..."

jaxenter, May 30th, 2022
(Get More Information . .) open to premium members only

The Top Five Sources Of Data Breaches And How To Reduce Their Impact
Corporate IT security teams are often accused of being too reactive in their approach to threat defense.
Dan Simmons writes in Security Boulevard, "Yet it's unfortunately all too easy to fall into a vicious cycle of firefighting incident after incident, given the scale and sophistication of modern threats. In the US, 2021 was a record year for reported data breaches, while in the UK, a recent government report revealed that two-fifths of businesses had suffered a cyber-attack over the previous 12 months.

The truth is that today's threat actors have multiple avenues for attack and a large potential target as organizations build out their internet-facing digital infrastructure. Let's take a look at the five of the most common ways companies can be breached and how data-centric security could help minimize cyber risk...."

Security Boulevard, June 3rd, 2022
(Get More Information . .) open to premium members only

Protect Your Executives' Cybersecurity Amidst Global Cyberwar
It's been roughly three months since Russia first launched its unprovoked invasion of Ukraine. Since then, the world has borne witness to unspeakable tragedy
While damaged and destroyed property can and will be rebuilt; the death and despair incurred by Ukrainians will leave a lasting imprint across all of Europe for generations to come.

As horrific as the physical war has been, the much-anticipated cyberwar hasn't materialized as quickly as some cybersecurity and national security experts thought it would. In early March, Former General Counsel of the National Security Agency and Central Security Service Glenn S. Gerstell told The Guardian, 'we have not yet seen the completely destructive attacks on Ukraine infrastructure some anticipated.'

Security Boulevard, May 31st, 2022
(Get More Information . .) open to premium members only

IT News - Database
disable
This Is The Beginning Of The Unbundled Database Era
Thanks to the cloud, the amount of data being generated and stored has exploded in scale and volume.
"Every aspect of the enterprise is being instrumented for data, so new operations are built based on that data, pushing every company into becoming a data company," writes Ethan Batraski in TechCrunch.

"One of the most profound and maybe non-obvious shifts driving this is the emergence of the cloud database. Services such as Amazon S3, Google BigQuery, Snowflake and Databricks have solved computing on large volumes of data and have made it easy to store data from every available source.

The enterprise wants to store everything they can in the hopes of being able to deliver improved customer experiences and new market capabilities..."

TechCrunch, June 1st, 2022
(Get More Information . .) open to premium members only

IT News - HPC
disable
Top500: The Supercomputers Advancing Cyber Security, Renewable Energy, And Black Hole Research
Get a peek into the standouts conducting powerful research in energy generation, cyber and physical threats, and astrophysics.
Among those ranked in the 59th edition of the TOP500 announced at the 2022 International Supercomputing Conference (ISC) in Hamburg, Germany, are standouts conducting powerful research in energy generation, cyber and physical threats, and astrophysics. Plus, Canada's most powerful supercomputer and Dell's HPC at the edge.

Eni, HPC5: The Supercomputer Working for Energy

Global energy company Eni was recognized for its HPC5 supercomputer, a powerful and sustainable system used to research new energy sources. Active in 69 countries, Eni works across the value chain-from natural gas and oil to electric and renewable energy generation, traditional and bio-refining and chemicals.

CIO, June 2nd, 2022
(Get More Information . .) open to premium members only

The Final Frontier: Talking Exascale With Oak Ridge's Jeff Nichols
Just ahead of the revelations about the feeds and speeds of the 'Frontier' supercomputer at Oak Ridge National Laboratory concurrent with the International Supercomputing conference in Hamburg, Germany and the concurrent publishing of the summer Top500 rankings of supercomputers, we had a chat with Jeff Nichols, who has steered the creation of successive generations of supercomputers at Oak Ridge.
Timothy Prickett Morgan writes in The Next Platform, "Nichols is associate laboratory director for Computing and Computational Sciences at Oak Ridge and two decades ago was running the Computer Science and Mathematics Division for the lab, and before that did a stint as deputy director of the Environmental Molecular Sciences Laboratory at the Department of Energy's Pacific Northwest National Laboratory, and is one of the key developers of the open source NWChem computational chemistry simulator that includes both quantum chemical and molecular dynamics scale interactions..."
The Next Platform, June 3rd, 2022
(Get More Information . .) open to premium members only

All-AMD US Frontier Supercomputer Ousts Japan's Fugaku As No. 1 In Top500
Exascale beast's test system also claims top spot in the Green500
"The land of the rising sun has fallen to the United States' supercomputing might," reports Tobias Mann in The Register.

"Oak Ridge National Laboratory's (ORNL) newly minted Frontier supercomputer has ousted Japan's Arm-based Fugaku for the top spot on the Top500 rankings of the world's most-powerful publicly known systems.

Frontier's lead over Japan's A64X-based Fujitsu machine is by no means a narrow one either. The cluster achieved peak performance of 1.1 exaflops according to the Linpack benchmark, which has been the standard by which supercomputers have been ranked since the mid-1990s.

The Register, May 30th, 2022
(Get More Information . .) open to premium members only

Top500: Exascale Is Officially Here With Debut Of Frontier
The 59th installment of the Top500 list, issued today from ISC 2022 in Hamburg, Germany, officially marks a new era in supercomputing with the debut of the first-ever exascale system on the list
"Frontier, deployed at the Department of Energy's Oak Ridge National Laboratory, achieved 1.102 exaflops in its highest-scoring High Performance Linpack run," reports Tiffany Trader in HPCWire, "which was completed over the course of two hours and thirty minutes Friday morning in Oak Ridge, Tenn. It was widely anticipated that Frontier would debut on this list, but the run that put them over the one exaflops line was filed in the nick of time, according to list co-author Jack Dongarra..."
HPCWire, May 30th, 2022
(Get More Information . .) open to premium members only

IT News - Cloud
disable
Legacy Systems Should Be Part Of A Multicloud Strategy
Multicloud is the direction many enterprises are heading, but legacy systems need to be part of the road map
David Linthicum writes in InfoWorld, "You're at a multicloud strategy planning meeting. You see the network people, the cloud database group, the cloud security team, even the finops people, but no one charged with maintaining existing mainframes or other older systems. Why?

Enterprises that are focused on building the next-generation cloud systems, which are largely multicloud deployments, don't seem to want to include traditional systems. Typically, 'traditional' means most of the systems currently in the data center and usually running 60% to 80% of the core business systems, depending on the company..."

InfoWorld, June 3rd, 2022
(Get More Information . .) open to premium members only

How To Guard Against The Biggest Cloud Security Threats
Human mistakes made by your staff remain a huge cloud security risk. Train your staff to protect the enterprise against themselves.
"IBM recently announced the results of a global study which found that data breaches in 2021 cost the companies studied $4.24 million per incident on average," reports David Linthicum in eWeek.

"For those of you keeping track, this is the highest cost in the 17-year history of the report.

Are these hoody-wearing bad-actors sitting in some evil country, working overtime to hack our system walls and breach our data? In many cases, the employees sitting down the hall inadvertently leave the doors wide open to breaches..."

eWeek, June 2nd, 2022
(Get More Information . .) open to premium members only

Five Steps To A Secure Cloud Architecture
Cloud computing cyberattacks don't play out like the scenes from Hollywood thrillers.
In a brief video explainer and commentary, Josh Stella, chief architect at Snyk and founding CEO of Fugue, a developer-first cloud security SaaS company, advises business and security leaders on why it's so easy for attackers targeting cloud environments to sidestep an enterprise's security measures and discusses the five key steps to creating an inherently secure cloud architecture.

Cloud computing cyberattacks don't play out like the scenes from Hollywood thrillers. No one is slowly lowering Tom Cruise into a preselected target's secure data center equipped with ultrasensitive noise, temperature and motion detectors so he can steal a specific file.

AiTHORITY, June 4th, 2022
(Get More Information . .) open to premium members only

Forrester Tackles The Future Of Edge Computing In New Report
The research company addresses the potential benefits of edge, as well as some of the growing pains faced by integrating the emerging technology.
Brian Stone writes in TechRepublic, "Research company Forrester has assessed edge computing and its role in future technologies as part of its newly released study. 'The Future of Edge Computing' goes into detail on the potential innovations presented by this type of technology, as well as some of the downsides of employing advanced edge tech.

Future benefits of edge computing Three important insights brought up by Forrester in the report show what edge computing will be capable of in the future:

  • Edge computing promises key benefits for software everywhere
  • Edge innovation will lead to smarter, faster digital experiences everywhere
  • Edge networks will make us more connected and interdependent

Forrester suggests these advantages will become a reality through workload affinity..."

TechRepublic, May 30th, 2022
(Get More Information . .) open to premium members only

IT News - Careers
disable
6 Ways To Reinvent Your IT Leadership Career
Is your IT career ripe for a do-over? Then check out these ways to pull yourself out of a rut and get back on course.
"In an industry where second chances can be hard to come by," notes John Edwards in CIO, "IT leaders who find themselves stuck in jobs with limited flexibility and potential can break free from their current predicaments and get back to building careers rich with satisfaction and growth.

The CIO role is undergoing fundamental changes as enterprises alter their expectations for how IT capabilities are deployed, says Elizabeth Ebert, CIO advisory partner at IT services firm Infosys Consulting. 'Every CIO we work with is experiencing these shifts,' she notes.

CIO, May 31st, 2022
(Get More Information . .) open to premium members only

IT News - Virtualization
disable
5 Network Virtualization Challenges And How To Solve Them
The challenges of network virtualization include an overhaul of network architecture, thorough staff training and breaking down knowledge silos among IT departments.
Andrew Froehlich writes in SearchNetworking, "When enterprises implement network virtualization inside their corporate infrastructure, they undoubtedly could benefit from improved performance, flexibility, scalability and security enhancements. That said, however, organizations still need to overcome some network virtualization challenges in order to get it right.

Interestingly, the network virtualization challenges that IT teams will face are both technical and nontechnical in nature. Let's explore five common challenges and provide guidance on how best to overcome them..."

SearchNetworking, June 3rd, 2022
(Get More Information . .) open to premium members only

IT News - Email
disable
How To Send A Secure Email In Outlook
Sensitive data leaks are too common in the headlines these days, and there is no need to waste space explaining why it is essential to secure your sensitive information.
Secure encryption is one such method to ensure your email messages are encrypted to be read-only by the intended recipients. Sending an encrypted email message is the need of the hour for business or professional practice and Outlook encryption is the best possible solution available in the market.

This blog will discuss how to send a secure email or encrypted email in Outlook. Before discussing that, let's first talk about Microsoft Outlook.

Security Boulevard, May 30th, 2022
(Get More Information . .) open to premium members only

IT News - Developer
disable
The 7Rs Of Modernisation - A Roadmap To App Transformation
Modernisation requires a healthy dose of elbow grease - not quite as simple as tapping 'update' in the app store.
Michael Cote, and Marc Zottner write in jaxenter, "We've found that there are seven different ways of modernising any given app. Here they are, ordered from least to most effort, risk, and value: Retain, Retire, Rehost, Replatform, Refactor, Rewrite, and Replace.

Digital transformation is well underway, with tech teams around the world hitting the ground running to try to update their organisation's digital experiences at the rate that consumers demand. The way enterprises have integrated technology slowly, over time, means that many have a sprawling web of half-fit for purpose apps behind the scenes that could be improved, updated, or cut altogether..."

jaxenter, June 2nd, 2022
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section