September 2018

5 Tips on Making Your Business More Data-Driven

Businesses and business owners have more instruments and resources to use when it comes to making critical decisions in today's modern world. Aside from the wealth of software and tools you can now add to your business workflows, there is also more data to process and insights to gather than ever before.

This can be a great advantage or a challenge, depending on how you approach making data-driven decisions. The key to turning a wealth of data into a competitive advantage is good data management. In this article, we are going to go over the five tips on how you can make your business more data-driven.

Understand the Boundaries

Hyper-V Failover Clusters - What You Need to Know and How 5nine Can Help



Building a Hyper-V failover plan is a critical step for any organization wishing to maintain 24/7/365 availability of their Microsoft Cloud. However, configuring Hyper-V failover clusters and managing Hyper-V hosts has its own set of unique challenges, nuances and steps. This article provides an introduction to Hyper-V failover challenges, discusses its benefits and shares some resources where virtualization administrators can access more information.

A Brief Introduction to the History of Hyper-V Failover Clusters

A Hyper-V failover cluster is a group of Hyper-V hosts that can synchronize in a way so that one host can take the load (virtual machines, services, processes, etc) if another fails or suffers performance issues. Windows Server Administrators who wish to fortify their server workloads have a helpful option - Hyper-V failover clustering - right inside Windows Server 2012 R2, Windows Server 2012, Windows Server 2016, and 5nine Manager.

NTT Security launches Web Security as a Service (WSaaS) as part of its strategic partnership program with Symantec

Grazed from NTT Security and Symantec
 
NTT Security, the specialized security company of NTT Group, has announced it is ready to deliver its first unified service in partnership with Symantec Corporation. NTT Security, which announced its intention to enter into a strategic partnership in April, will integrate Symantec's cloud based security service with NTT Security's enhanced threat detection, providing Web Security as a Service (WSaaS).

WSaaS will be the first service offered through the partnership program, which was set up to bolster web security services to clients across the cloud, mobile and on-premise, and will be delivered as part of NTT Security's Global Managed Security Services. NTT Security has been developing various technologies to provide more sophisticated cloud based security services as part of the program.
 

Neverfail Opens Cloud Services Data Center in Ashburn, Virginia

Grazed from Neverfail

Neverfail, provider of mission-critical cloud, business continuity, cloud workspaces and cloud file storage solutions, today announced that its new data center in Ashburn, Virginia, will be online and serving a variety of Neverfail's clients starting in September 2018.

The Ashburn data center is a key component in Neverfail's ongoing global expansion of its cloud and software solution offerings, making it easier for Neverfail customers to serve the US region.
 

HubSpot Selects AWS as its Preferred Public Cloud Provider

Grazed from Amazon AWS and HubSpot

Amazon Web Services, Inc. (AWS) today announced that HubSpot has selected AWS as its preferred public cloud provider. HubSpot's core products, including HubSpot CRM, Marketing Hub, Sales Hub, and Service Hub, run on AWS, and HubSpot will expand its use of AWS to build new applications in the cloud. AWS enables HubSpot to scale its business quickly, powering its global expansion and companywide innovation. In turn, HubSpot is able to focus more of its resources on developing new cloud-based products and services on AWS for its over 48,000 customers in more than 100 countries.

AWS's expansive infrastructure, operational expertise, scalability, and industry-leading services gives HubSpot the right set of tools to strengthen its software, services, and support capabilities. HubSpot built a highly automated microservices architecture on AWS to support applications of all sizes, scale, and complexity, gain greater agility, and establish a DevOps practice in the cloud. They've also constructed a data lake using Amazon Simple Storage Service (Amazon S3) and Amazon Athena to ingest and analyze operational data so that HubSpot can diminish internal waste and cut operational costs. In addition, through utilizing Amazon machine learning technology such as Amazon Lex, HubSpot added natural language processing capabilities to GrowthBot, its chatbot that helps marketing and salespeople quickly and easily get help creating content, researching competitors, and monitoring analytics.

Trend Micro Teams Up with Moxa to Secure and Accelerate Industrial Internet of Things Applications

Grazed from Trend Micro and Moxa

Trend Micro Incorporated, a global leader in cybersecurity solutions, has announced a new partnership with Moxa Inc., a leader in industrial communication and networking, as part of its Technology Alliance Partner Program to jointly develop state-of-the-art solutions to protect Industrial Internet of Things (IIoT) environments like smart manufacturing and smart energy.

IIoT projects offer organizations across a range of sectors the opportunity to become more agile, efficient and cost effective. In manufacturing, oil and gas, and transportation, adoption of solutions is estimated to have reached 86 percent. Surging interest in IIoT is also driving a rapidly growing smart city market predicted to be worth over $2.5 trillion by 2025.

However, IIoT cyber risk continues to grow and threaten the success of IIoT applications. Insecure devices and networks can be exploited to sabotage industrial equipment, leveraged to cause damaging ransomware outages, or used to reach sensitive stores of corporate data elsewhere on enterprise networks. Many organizations struggle with securing their IIoT devices because these devices are at the crossroads of IT and OT organizations. The responsibility for their security is often unclear.

Cloudistics Migration Manager Enables Same-Day Workload Migrations between Virtualization or Cloud Platforms

Grazed from Cloudistics

Cloudistics, the cloud software platform company, today announced the release of its Cloudistics Migration Manager for the company's Ignite platform. A no-cost application that is built into the Cloudistics Application Marketplace, it provides point-and-click live migration for workloads to Cloudistics, enabling users to migrate workloads in hours rather than weeks, as is the norm with most platforms. Organizations usually find application migration to be complicated and time consuming, so by including Migration Manager with every Cloudistics platform, customers can sidestep a problem, accelerate time to value, and increase immediate ROI.

ThinPrint Brings Mobile Printing to VMware Workspace ONE

Grazed from ThinPrint

ThinPrint, the Endpoint Print Management experts and a VMware Technology Alliance advanced partner, announced the availability of its secure mobile printing solution, ThinPrint Mobile Print, for VMware Workspace ONE. Customers of Workspace ONE can leverage the solution's management capabilities to easily open their organization's printer infrastructure to its mobile users. It provides employees with the ability to seamlessly and securely access all network printers from their iOS and Android devices, fully in accordance with their assigned permissions.

ThinPrint's Mobile Print solution is configured and distributed with VMware Workspace ONE, an intelligent digital workstation platform that delivers apps to a variety of devices, including iPhones, iPads and Android devices. Mobile users can access all network printers in their organization, no matter which printer model or manufacturer is in use. For IT departments, management is very simple. IT admins can easily adopt printer assignments and user rights from the Microsoft Active Directory, and if required, adapt them specifically for mobile use.

 

Webinar: 451 Research - Key Trends in Machine Learning, AI and Cloud

 

 

Machine learning (ML) and artificial intelligence (AI) aren't new - both are ideas that emerged in the 1950's. But after incubating for 50+ years, it's only in the past few that they have made unprecedented advances in capability, scalability and accessibility.  

Make sure to register and join Zenoss and Nancy Gohring, senior analyst at 451 Research, for a live 45-minute webinar Wednesday, Sept. 19, 11 a.m. CDT, where they will discuss key trends in machine learning and artificial intelligence, the impact of cloud computing on ML and AI and what it all means for IT Ops and DevOps teams.

They will dive into:

  • Digital transformation, "Fast IT," and the rampant risks
  • Trends for ML and AI and the impact they have on IT
  • Cloud computing and its implications for observability
  • Contextualizing all data for faster, safer IT

Register today to learn more about leveraging modern technologies to reduce the risk of digital transformation.

NetJapan Releases ActiveImage Protector 2018 SP2 For Hyper-V Enterprise With ReZoom it! Live

Grazed from NetJapan

NetJapan, Inc., publisher of backup, disaster recovery, and virtualization software, releases ActiveImage Protector 2018 SP2 for Hyper-V Enterprise with a new feature, ReZoom it! Live, and support for ActiveVisor management console.

After a disaster, malware infection, or system failure, large multi-terabyte virtual machines can take hours to recover. ReZoom it! Live eliminates this time-gap between failure and recovery by providing system availability while recovering a virtual machine. ReZoom it! Live boots the virtual machine from the host's backup when the recovery process begins; bringing the virtual machine online while simultaneously recovering the VM. All changes made during the ReZoom it! Live process will be available when the recovered virtual machine is subsequently booted.

Pluribus Networks Extends Support for New DELL EMC Open Networking Switches

Grazed from Pluribus Networks

Pluribus Networks announced the release of Netvisor ONE 3.1 with support for additional Dell EMC Open Networking switches, enabling new interface speeds, greater intelligence and the extension of its unique software-defined network fabric architecture from the data center to the network edge. This brings the total number of Dell EMC Open Networking switches supported by Pluribus Networks to nine.

Building on the previous Netvisor ONE Network Operating System (OS) integrations with the widely-deployed Dell EMC Z- and S-Series switches, Pluribus has added support for the Dell EMC S4148F-ON, S4148T-ON, S4128F-ON, S4128T-ON, and S5048F-ON models. These high-performance Open Networking switches, designed for enterprise and service provider data center and network edge deployments, deliver increased capacity and support for 25 GbE and 100 GbE interfaces to meet the increasing demands of virtualized and multi-cloud operations.

CA Technologies Unveils Seven Trends in Docker Container Monitoring

Grazed from CA Technologies

CA Technologies, a leader in industry application performance management solutions today announced new survey research, "Seven Trends in Docker Container Monitoring," a study conducted in collaboration with Gatepoint Research. As application containerization adoption continues to rise, the survey findings examine key challenges and provide guidance for organizations to maximize their container investments.

Containers offer immense value to enterprises by allowing developers to easily build, ship and run any application virtually anywhere, as a lightweight, self-sufficient package. In turn, organizations benefit from the ability to enable instant application portability. According to a recent Gartner study of 664 respondents, "65% of respondents stated that their organization expected to deploy containers into production by the end of 2017...Further, an additional 13% expect to deploy containers during 2018, suggesting that interest and adoption will only increase."

"Digital transformation initiatives increasingly rely on cloud-based containerized applications that cannot be managed with traditional IT monitoring tools," said Ali Siddiqui, general manager of the Agile Operations, CA Technologies. "These new app architectures create blind-spots or worse, a surge of false alarms that prevent teams from fixing problems quickly. CA Technologies unique approach to container monitoring delivers full visibility in these most dynamic environments."

Can a single Virtual Volume (VVol) span different physical arrays/devices?

 

If you were to pose this question, "Can a single Virtual Volume (VVol) span different physical arrays/devices?" to your storage vendor or to VMware support today, you'd likely receive the following answer: "No. vSphere does not support this."

Nevertheless, with the VMware certified, universal vSphere APIs for Storage Awareness (VASA) provided from DataCore, you can easily achieve that with full VMware support and without VVol certified hardware today.  Use of local discs alone, or in combination with other storage arrays as part of the Virtual Volumes datastore, would even be sufficient.

Watch this on-demand webinar to discover:

  • How to setup such a solution in real life
  • How to implement auto-tiering across different arrays 

WhiteHat Adds Deeper Artifical Intelligence Capabilities for Sentinel DAST Solution for DevSecOps

Written by David Marshall

WhiteHat Security announced that new, artificial intelligence (AI) software is being added to WhiteHat Sentinel Dynamic, its dynamic application security testing (DAST) solution, which draws from a data lake of 95 million identified vulnerabilities.  The enhancements will enable WhiteHat to provide high levels of accuracy in the shortest timeframe, which can traditionally only be achieved through fully automated testing with additional human verification.  Though human verification is always available to WhiteHat clients, the company will now offer fully AI-enabled verification, taking just seconds.  This will allow developers to create secure web applications at the fast pace demanded by modern businesses. 

AppSec teams are constantly caught between the need for proper security testing and the ability to allow developer teams to meet strict deadlines. AI software will dramatically decrease threat vector identification times and improve the efficiency of false positive identification. As a result, businesses will increase the speed at which developers are made aware of potential application security vulnerabilities and deliver real-time security risk assessments.

ParkMyCloud and CloudHealth Technologies Announce Integration for Optimized Cloud Cost Management

Grazed from ParkMyCloud and CloudHealth

ParkMyCloud, the leading enterprise platform for continuous cost control in public cloud, and CloudHealth Technologies, trusted cloud management platform provider, today announced that they have furthered their partnership with a technology integration that provides customers with end-to-end multi-cloud cost control and visibility.

More than $12.9 billion will be wasted on unused cloud resources this year - which means public cloud users have an immediate need for automated savings and governance. Customers leveraging ParkMyCloud and CloudHealth's integrated solution are empowered to reduce this cloud waste - in fact, customers already using both platforms currently save an average of more than $25,000 monthly on their cloud bills.

 

Cloudera Launches an End-to-End, Open, Modular IoT Architecture with Red Hat and Eurotech to Accelerate IoT Deployments

Grazed from Cloudera

Cloudera, Inc., the modern platform for machine learning and analytics optimized for the cloud, announced the launch of an end-to-end, open source Internet of Things (IoT) architecture in collaboration with Red Hat and Eurotech. Enterprises now have a modern IoT architecture that is scalable, secure, and technologically advanced without vendor lock-in. 

Organizations that bought into proprietary IoT platforms are finding themselves tied to limited functionality, locked into a particular vendor, and unable to scale. Enterprises have had to piece together multiple vendors' solutions, manage all of the complexities of integration, and deal with security risks of the patchwork, only to end up with incompatible connectivity, a rigid architecture from black box solutions, and minimal interoperability. These setbacks cause businesses to miss out on technological advances such as machine learning, real-time decision-making, and cloud/hybrid flexibility.

Cloudera with Red Hat, the world's leading provider of open source software solutions, and Eurotech, a long-time leading provider of industrial embedded hardware, have collaborated to develop an end-to-end architecture that is based on open standards and is integrated, flexible and runs on multi- or hybrid-cloud environments. This architecture is designed to provide the foundational components that organizations need to quickly and securely roll out IoT use cases.

 

SIOS Technology Showcases Early Adaptation of Machine Learning for High Availability Challenges in the Cloud at AWS Summit

Grazed from SIOS

SIOS Technology Corp., the industry pioneer in providing intelligent application availability for critical workloads, today announced that it will showcase advanced research in the application of Machine Learning (ML) aimed at lowering cloud costs while optimizing High Availability (HA) for critical applications operating in the cloud at AWS Summit in Atlanta, GA on September 13 in Booth #612. SIOS is an exhibiting Silver Sponsor.

"The move from datacenter to the cloud is well underway for many applications, but the migration of critical applications based on SAP, SQL Server and Oracle has just begun," said Jerry Melnick, president and CEO, SIOS Technology. "At SIOS, we have a long history delivering HA software to ensure availability and we've developed leading-edge machine learning solutions to help IT understand and optimize computing infrastructures. At the show, we'll give attendees a peek into the future of how these technologies used together can deliver the confidence and cost savings that will be essential for operating in the cloud."

HITRUST Program Addresses Security Risks and Inefficiencies When Leveraging Cloud Service Providers

Grazed from HITRUST

To address the growing misunderstandings, risks and complexities when leveraging service providers, HITRUST is introducing a new program to clarify the roles and responsibilities regarding ownership and operation of security controls while automating and streamlining the assurance process when security controls are shared or inherited.

Protecting sensitive information is a challenge for any organization and even more so for organizations that leverage service providers. The risks associated with control failures by third party service providers - such as cloud hosting, platform-as-a-service, or a business process outsourcer - continue to increase as customers don't fully understand their responsibilities, coupled with the complexity of assessing security control effectiveness when control responsibility is shared.

The HITRUST Shared Responsibility Program will remove the guesswork, ambiguity and confusion in understanding the roles and responsibilities between customer and their service provider relating to shared and inherited controls by outlining data governance, information risk management and regulatory compliance requirements in clear, concise language.

Alibaba Cloud and myDevices Partner to Launch Turnkey IoT Solutions in China

Grazed from myDevices and Alibaba Cloud

myDevices, Inc. today announced the availability of turnkey Internet of Things (IoT) solutions, in partnership with the IoT Business Unit of Alibaba Cloud, the cloud computing arm of Alibaba Group. myDevices will market and sell IoT in a Box solutions in China through Alibaba Cloud's existing reseller distribution network. These remote monitoring solutions protect important assets for small businesses and large enterprise customers across a wide variety of industries for use cases in the commercial refrigeration and facility management vertical markets.

"Integrating myDevices' IoT Solutions with Alibaba Cloud and the LinkWAN network exponentially accelerates the adoption of the Internet of Things for businesses of all sizes across China through our vast distribution ecosystem," said Wang Yunci, Marketing Director of the IoT Business Unit at Alibaba Cloud. "By offering custom and expandable, commercially-ready solutions, this initiative will enable our direct and partner sales channels to thrive as well."

These enterprise ready IoT Solutions powered by myDevices combine an Ethernet or cellular connected gateway, over 95 sensor types, device management, LinkWAN network server, and an iOS/Android mobile application that provides key features for remote monitoring such as automating sensor data recordings, email and SMS text alerts, and reporting. Pre-packaged and ready-for-sale solutions are deployed in minutes with built-in provisioning technology and can scale to adapt to a multitude of use cases instantly.

Amazon and Google Leap Up the Rankings for U.S. IoT Projects

"U.S. IoT Reality Check" report finds an increasingly competitive environment for IoT vendors, in consideration for IoT projects by U.S. firms. While the complexity of managing legacy processes and juggling IoT platforms are growing pain points for U.S. firms.

Other key findings from the newly released U.S. analysis include:

  • Microsoft and Mobile Operators remain the top two vendors in consideration for IoT deployments among U.S. firms.
  • IBM is closing in on Mobile Operators, having improved to 3rd position, up from 5th in 2017.
  • Amazon has jumped into 5th position from outside the top 10 in 2017; while Google has also improved and now sits in the top 5 ranking.
  • Figure 1 illustrates the top 5 vendors considered for IoT deployments by U.S. firms, as ranked by IoT decision makers in 10 vertical markets.

As a core part of Strategy Analytics IoT Strategies service, the U.S. Enterprise IoT Deployment Survey provides detailed analysis of the status of the IoT industry, including: