Storage, Security, HPC, DevOps, Networks, Big Data (291.1.4)

Storage, Security, HPC, DevOps, Networks, Big Data (291.1.4)

No alt text provided for this image

Each week, IT News And Events (ITNE) selects articles from mainstream IT publications, press releases and blogs from major IT vendors, and webinar announcements of interest to senior IT professionals, all to be published in the websites and newsletters of “IT News and Events” for our 45,000+ subscribers.

This week, we are experimenting with a new layout. There will be 1 LinkedIn Newsletter post per day and the content will be spread evenly across 5 posts. We would appreciate your feedback on this new layout.

Please share this?LinkedIN newsletter, which now has 5,200+ subscribers, with your IT friends and colleagues.

No alt text provided for this image
Thursday, June 21st, 2022: 11:00 AM to 12:45 PM Friday, June 24th

Storage

Security

HPC

DevOps

Networks

Big Data

No alt text provided for this image
Monday, June 13th, 2022: 9:00 AM to 6:00 PM EDT

Storage

The Unstructured Data Management Maturity Index

As data management matures, unstructured data evolves from being a storage cost center to sitting at the epicenter of value creation.

To make use of unstructured data for competitive gain, it's important to develop a strategy for managing it to meet the dual needs of cost efficiency and monetization. Here is a 5-stage maturity model to follow for organizations looking to modernize unstructured data management practices...?more

Upcoming Micron Ssds Could Have Chip-Level Controller Functions

Micron spoke of 232-layer SSD tech and a 'combination of external and optimized internal controllers' at its recent Investor Day Conference.

This was picked up by Jim 'The SSD Guy' Handy, who heard technology and product veep Scott DeBoer say that Micron makes vertically integrated SSDs which include NAND, some DRAM, and the controller. DeBoer said Micron is using an in-house controller because a portion of it was incorporated into the NAND flash chips themselves... more

2022-23 DCIG Top 5 Rising Vendors In Storage For Life Sciences Report Now Available

DCIG is pleased to announce the immediate availability of the inaugural 2022-23 DCIG TOP 5 Rising Vendors in Storage for Life Sciences report.

DCIG recently conducted research into Storage for Life Sciences solutions. This 2022 - 23 DCIG TOP 5 Rising Vendors in Storage for Life Sciences report focuses on the top solutions by vendors of size less than $200M whom we consider to be 'rising' in the market... more

No alt text provided for this image
Tuesday, June 14th, 2022: 1:00 PM to 5:30 PM Wednesday, June 15th

Security

2022 Emerging IAM Technology Spend

I recently ran another of my highly scientific industry polls - via LinkedIn to get a feel for this years spending patterns as they pertain to some emerging identity and access management technology areas.

I have been tracking four emerging areas over the past 8 months or so, including Passwordless Authentication (where The Cyber Hut released a 61 page buyer guide last year), Cloud Identity/Infrastructure Entitlements Management, Decoupled Authorization and Identity Threat Detection and Response...?more

3 Cyber Resilience Best Practices For Businesses

Cyber resilience best practices can help organizations face a variety of threats. Here are three guidelines shared by experts at the MIT Sloan CIO Symposium

Imagine your company is undergoing a cyberattack. You discover that temporarily shutting down System X will stop the attack immediately, but it will also cause your company to lose out on millions in revenue. You then discover that if you shut down System Y instead, it won't adversely affect your revenue stream, but it will take much longer (a few days) to stop the attack.more

The Top 5 Automated Risk Assessment Tools

Automated risk assessment tools help you assess information security risks and related metrics in real-time based on the available data internally and externally

Connecting the dots makes the bigger picture visible to management to see what's going on. This is exactly what these tools do...?more

Cybersecurity Insights With Contrast CISO David Lindner - 6/3

By David Lindner, Chief Information Security Officer

Insight #1 -- "The most recent malicious takeover of the ctx and phpass packages unearthed yet another gap in supply chain security. I say anything not maintained or changed within the last year should be scrutinized by security teams, and anything beyond 2 years should not be allowed to be used in production environments.'?more

SSO Explained: Single Sign-On Definition, Examples, And Terminology

Password fatigue, cloud sprawl and developer simplicity are pushing the rise of centralized authentication services.

Single sign-on (SSO) is a centralized session and user authentication service in which one set of login credentials can be used to access multiple applications. Its beauty is in its simplicity; the service authenticates you on one designated platform, enabling you to then use a variety of services without having to log in and out each time... more

No alt text provided for this image
Tuesday, June 14th, 2022: 1:00 PM to 2:00 PM EDT

HPC

Supercomputer Fugaku Retains First Place Worldwide in HPCG and Graph500 Rankings

The top ranking on Graph500 was won by a collaboration involving RIKEN, Kyushu University, Fixstars Corporation, and Fujitsu. It earned a score of 102,955.5 gigaTEPS.

The supercomputer Fugaku, jointly developed by RIKEN and Fujitsu, has successfully retained the top spot for five consecutive terms in multiple major high-performance computer rankings including HPCG and Graph500 BFS (Breadth-First Search), and has also taken second place for the TOP500 and HPL-AI rankings...?more

ORNL's Frontier First to Break the Exaflop Ceiling

The 59th edition of the TOP500 revealed the Frontier system to be the first true exascale machine with an HPL score of 1.102 Exaflop/s.

The No. 1 spot is now held by the Frontier system at Oak Ridge National Laboratory (ORNL) in the US. Based on the latest HPE Cray EX235a architecture and equipped with AMD EPYC 64C 2GHz processors, the system has 8,730,112 total cores, a power efficiency rating of 52.23 gigaflops/watt, and relies on gigabit ethernet for data transfer.

However, a recent development to the Frontier system has allowed the machine to surpass the 1 exaflop barrier. With an exact HPL score of 1.102 Exaflop/s, Frontier is not only the most powerful supercomputer to ever exist - it's also the first true exascale machine.?more

The Final Frontier: Talking Exascale With Oak Ridge's Jeff Nichols

Just ahead of the revelations about the feeds and speeds of the 'Frontier' supercomputer at Oak Ridge National Laboratory concurrent with the International Supercomputing conference in Hamburg, Germany and the concurrent publishing of the summer Top500 rankings of supercomputers, we had a chat with Jeff Nichols, who has steered the creation of successive generations of supercomputers at Oak Ridge.

Nichols is associate laboratory director for Computing and Computational Sciences at Oak Ridge and two decades ago was running the Computer Science and Mathematics Division for the lab, and before that did a stint as deputy director of the Environmental Molecular Sciences Laboratory at the Department of Energy's Pacific Northwest National Laboratory, and is one of the key developers of the open source NWChem computational chemistry simulator that includes both quantum chemical and molecular dynamics scale interactions.?more

At Long Last, HPC Officially Breaks The Exascale Barrier

Significant business and architectural changes can happen with 10X improvements, but the real milestones upon which we measure progress in computer science, whether it is for compute, storage, or networking, come at the 1,000X transitions.

It has been nearly two decades since the 'Roadrunner' hybrid Opteron-Cell was fired up at Los Alamos National Laboratory and broker through the petaflops barrier at 64-bit floating point precision... ?more

No alt text provided for this image
Wednesday, June 15th, 2022: 1:00 PM to 2:00 PM EDT

DevOps

5 Things Security Can Do To Make The Devops Team Love You

It's no secret that DevOps and security teams are not a marriage made in heaven.This is because both have separate and distinct roles that sometimes are not aligned; that security processes are necessary is a given, but DevOps teams can view them as labor-intensive and cumbersome.

This flies in the face of the agility DevOps teams aim for to bring products to market. The pressure on DevOps to get new releases out quickly is well known. And security is in many cases seen as a negative force pushing the brakes on innovation... ?more

No alt text provided for this image
Tuesday, June 21st, 2022: 11:00 AM to 4:15 PM Wednesday, June 22nd

Networks

Understand The Basics Of 5G Wireless Networks

To build a 5G network, the deployment mode, spectrum band and services are all important factors to understand and consider. Here's what you should know about the basics of 5G

Wireless networking has improved significantly over the last several years, as consumers and enterprises deploy growing numbers of mobile devices, accessing new 5G fixed and mobile networks.

Commercial 5G wireless networks first launched on a widespread scale in 2019. Since then, mobile network operators (MNOs) have been working to expand the coverage of this new high-speed, low-latency cellular standard.?more

Implementing Wireless Security In The Enterprise

Learn how to properly secure your enterprise wireless network while considering UX, zero trust and commonly overlooked architectural mistakes.

Wireless security is more important than ever as the traditional perimeter dissolves and remote work via Wi-Fi-connected devices increases. Wireless security needs to be constantly reevaluated as wireless architecture changes and new endpoints, such as IoT devices, connect to the network...?more

No alt text provided for this image
Tuesday, June 21st, 2022: 1:00 PM to 2:00 PM EDT

Big Data

3 Ways To Simplify Data Management

Organizations have discovered ways to overcome data management complexity and deliver the cloud operational experience. Here's how.

If you're like many of the customers I encounter, one thing is clear - data is the lifeforce that drives your business. Yet, the reality is that only a small percentage of businesses are out in front when it comes to being data-first. It's an urgent directive for IT organizations, with the opportunity for positive outcomes if you're prepared to take action now.

Let's look at some of the pathways to becoming data-first.?more

DataOps: What It Is And What The Enterprise Gets Wrong

By 2025, the total amount of data created, captured, copied, and consumed globally is projected to reach more than 180 zettabytes.

With this rapid growth, the ability to harness data for business impact is even more vital. To keep up with the exponential data growth and resulting challenges, data teams must adjust the way they operate. Best practices like continuous integration/continuous deployment (CI/CD) have made their way into the data engineering world to help data teams handle the speed and scale at which organizations are running analytics.?more

No alt text provided for this image
Tuesday, June 21st, 2022: 9:00 AM to 5:00 PM
No alt text provided for this image

要查看或添加评论,请登录

John J. McLaughlin的更多文章

社区洞察

其他会员也浏览了