Storage, Security, HPC, DevOps, Networks, Big Data (291.1.4)
John J. McLaughlin
Editor-In-Chief, Board Member, Professional Services Engineer, Community leader
Each week, IT News And Events (ITNE) selects articles from mainstream IT publications, press releases and blogs from major IT vendors, and webinar announcements of interest to senior IT professionals, all to be published in the websites and newsletters of “IT News and Events” for our 45,000+ subscribers.
This week, we are experimenting with a new layout. There will be 1 LinkedIn Newsletter post per day and the content will be spread evenly across 5 posts. We would appreciate your feedback on this new layout.
Please share this?LinkedIN newsletter, which now has 5,200+ subscribers, with your IT friends and colleagues.
As data management matures, unstructured data evolves from being a storage cost center to sitting at the epicenter of value creation.
To make use of unstructured data for competitive gain, it's important to develop a strategy for managing it to meet the dual needs of cost efficiency and monetization. Here is a 5-stage maturity model to follow for organizations looking to modernize unstructured data management practices...?more
Micron spoke of 232-layer SSD tech and a 'combination of external and optimized internal controllers' at its recent Investor Day Conference.
This was picked up by Jim 'The SSD Guy' Handy, who heard technology and product veep Scott DeBoer say that Micron makes vertically integrated SSDs which include NAND, some DRAM, and the controller. DeBoer said Micron is using an in-house controller because a portion of it was incorporated into the NAND flash chips themselves... more
DCIG is pleased to announce the immediate availability of the inaugural 2022-23 DCIG TOP 5 Rising Vendors in Storage for Life Sciences report.
DCIG recently conducted research into Storage for Life Sciences solutions. This 2022 - 23 DCIG TOP 5 Rising Vendors in Storage for Life Sciences report focuses on the top solutions by vendors of size less than $200M whom we consider to be 'rising' in the market... more
Tuesday, June 14th, 2022: 1:00 PM to 5:30 PM Wednesday, June 15th
I recently ran another of my highly scientific industry polls - via LinkedIn to get a feel for this years spending patterns as they pertain to some emerging identity and access management technology areas.
I have been tracking four emerging areas over the past 8 months or so, including Passwordless Authentication (where The Cyber Hut released a 61 page buyer guide last year), Cloud Identity/Infrastructure Entitlements Management, Decoupled Authorization and Identity Threat Detection and Response...?more
Cyber resilience best practices can help organizations face a variety of threats. Here are three guidelines shared by experts at the MIT Sloan CIO Symposium
Imagine your company is undergoing a cyberattack. You discover that temporarily shutting down System X will stop the attack immediately, but it will also cause your company to lose out on millions in revenue. You then discover that if you shut down System Y instead, it won't adversely affect your revenue stream, but it will take much longer (a few days) to stop the attack.more
Automated risk assessment tools help you assess information security risks and related metrics in real-time based on the available data internally and externally
Connecting the dots makes the bigger picture visible to management to see what's going on. This is exactly what these tools do...?more
By David Lindner, Chief Information Security Officer
Insight #1 -- "The most recent malicious takeover of the ctx and phpass packages unearthed yet another gap in supply chain security. I say anything not maintained or changed within the last year should be scrutinized by security teams, and anything beyond 2 years should not be allowed to be used in production environments.'?more
Password fatigue, cloud sprawl and developer simplicity are pushing the rise of centralized authentication services.
领英推荐
Single sign-on (SSO) is a centralized session and user authentication service in which one set of login credentials can be used to access multiple applications. Its beauty is in its simplicity; the service authenticates you on one designated platform, enabling you to then use a variety of services without having to log in and out each time... more
The top ranking on Graph500 was won by a collaboration involving RIKEN, Kyushu University, Fixstars Corporation, and Fujitsu. It earned a score of 102,955.5 gigaTEPS.
The supercomputer Fugaku, jointly developed by RIKEN and Fujitsu, has successfully retained the top spot for five consecutive terms in multiple major high-performance computer rankings including HPCG and Graph500 BFS (Breadth-First Search), and has also taken second place for the TOP500 and HPL-AI rankings...?more
The 59th edition of the TOP500 revealed the Frontier system to be the first true exascale machine with an HPL score of 1.102 Exaflop/s.
The No. 1 spot is now held by the Frontier system at Oak Ridge National Laboratory (ORNL) in the US. Based on the latest HPE Cray EX235a architecture and equipped with AMD EPYC 64C 2GHz processors, the system has 8,730,112 total cores, a power efficiency rating of 52.23 gigaflops/watt, and relies on gigabit ethernet for data transfer.
However, a recent development to the Frontier system has allowed the machine to surpass the 1 exaflop barrier. With an exact HPL score of 1.102 Exaflop/s, Frontier is not only the most powerful supercomputer to ever exist - it's also the first true exascale machine.?more
Just ahead of the revelations about the feeds and speeds of the 'Frontier' supercomputer at Oak Ridge National Laboratory concurrent with the International Supercomputing conference in Hamburg, Germany and the concurrent publishing of the summer Top500 rankings of supercomputers, we had a chat with Jeff Nichols, who has steered the creation of successive generations of supercomputers at Oak Ridge.
Nichols is associate laboratory director for Computing and Computational Sciences at Oak Ridge and two decades ago was running the Computer Science and Mathematics Division for the lab, and before that did a stint as deputy director of the Environmental Molecular Sciences Laboratory at the Department of Energy's Pacific Northwest National Laboratory, and is one of the key developers of the open source NWChem computational chemistry simulator that includes both quantum chemical and molecular dynamics scale interactions.?more
Significant business and architectural changes can happen with 10X improvements, but the real milestones upon which we measure progress in computer science, whether it is for compute, storage, or networking, come at the 1,000X transitions.
It has been nearly two decades since the 'Roadrunner' hybrid Opteron-Cell was fired up at Los Alamos National Laboratory and broker through the petaflops barrier at 64-bit floating point precision... ?more
It's no secret that DevOps and security teams are not a marriage made in heaven.This is because both have separate and distinct roles that sometimes are not aligned; that security processes are necessary is a given, but DevOps teams can view them as labor-intensive and cumbersome.
This flies in the face of the agility DevOps teams aim for to bring products to market. The pressure on DevOps to get new releases out quickly is well known. And security is in many cases seen as a negative force pushing the brakes on innovation... ?more
To build a 5G network, the deployment mode, spectrum band and services are all important factors to understand and consider. Here's what you should know about the basics of 5G
Wireless networking has improved significantly over the last several years, as consumers and enterprises deploy growing numbers of mobile devices, accessing new 5G fixed and mobile networks.
Commercial 5G wireless networks first launched on a widespread scale in 2019. Since then, mobile network operators (MNOs) have been working to expand the coverage of this new high-speed, low-latency cellular standard.?more
Learn how to properly secure your enterprise wireless network while considering UX, zero trust and commonly overlooked architectural mistakes.
Wireless security is more important than ever as the traditional perimeter dissolves and remote work via Wi-Fi-connected devices increases. Wireless security needs to be constantly reevaluated as wireless architecture changes and new endpoints, such as IoT devices, connect to the network...?more
Tuesday, June 21st, 2022: 1:00 PM to 2:00 PM EDT
Organizations have discovered ways to overcome data management complexity and deliver the cloud operational experience. Here's how.
If you're like many of the customers I encounter, one thing is clear - data is the lifeforce that drives your business. Yet, the reality is that only a small percentage of businesses are out in front when it comes to being data-first. It's an urgent directive for IT organizations, with the opportunity for positive outcomes if you're prepared to take action now.
Let's look at some of the pathways to becoming data-first.?more
By 2025, the total amount of data created, captured, copied, and consumed globally is projected to reach more than 180 zettabytes.
With this rapid growth, the ability to harness data for business impact is even more vital. To keep up with the exponential data growth and resulting challenges, data teams must adjust the way they operate. Best practices like continuous integration/continuous deployment (CI/CD) have made their way into the data engineering world to help data teams handle the speed and scale at which organizations are running analytics.?more