Showing posts with label Computer News. Show all posts
Showing posts with label Computer News. Show all posts

Mozilla Moves to Block Cookies, What Impact Will This Have on Google Analytics?

images images

The perspectives of donors are their own particular, and possibly those of SEJ.

On October 18 2011, pursuit advertisers (and all advertisers) took a fundamental blow when Google advertised the "Not Provided" catchphrase section in Google Analytics. Click Consult reports that over 40% of all watchword movement in Google Analytics is presently clustered into the dark opening reputed to be "Not Provided." I composed a post on this back in August 2012.  As web crawler streamlining agents I'm certain we would all be able to concur that this choice influenced our reporting endeavors, as well as our capability to enhance utilizing profitable catchphrase information.

This torment was felt when an allotment of one report was taken far from us. How might you feel assuming that all examination information was taken far from us? I'm not satisfied to report that Mozilla is getting up and go with another "Do Not Track" program that will square treats (by default setting) from clients browsers. Yes, our cherished Mozilla, the browser that we have all figured out how to affection and love, has betrayed us.  The Interactive Advertising Bureau's general direction Mike Zaneis called Mozilla's browser nothing less than an "atomic first strike" against the (notice) neighborhood.

It's vital to comprehend that Mozilla reported this back in February, yet chose not to push ahead with the characteristic.

New Soul Machine Neuroporphic Computing


images

ANALOGIES change. When, it was elegant to portray the cerebrum as being like the water driven frameworks utilized to make satisfying wellsprings for seventeenth century blue-bloods' enclosures. As innovation proceeded onward, first the broadcast system then after that the phone trade turned into the similitude of decision. Right away it is the turn of the machine. Be that as it may however the cerebrum as workstation may be, without a doubt, just an allegory, one gathering of researchers might want to stand that analogy on its head. Rather than considering brains being like Pcs, they wish to make workstations increasingly like brains. Along these lines, they accept, mankind will wind up not just with an improved comprehension of how the mind lives up to expectations, additionally with better, more intelligent workstations.

These visionaries depict themselves as neuromorphic designers. Their objective, as per Karlheinz Meier, a physicist at the University of Heidelberg who is one of their pioneers, is to plan a PC that has some—and ideally the sum of three aspects that brains have and Pcs don't. These are: low force utilization (human brains use around the range of 20 watts, although the supercomputers presently used to attempt to mimic them require megawatts); deficiency tolerance (losing only one transistor can wreck a microchip, yet brains lose neurons constantly); and an absence of need to be customized (brains study and change spontaneously as they connect with the planet, rather than accompanying the settled ways and extensions of a decided beforehand calculation).

The Risks of Computerized Innovation Falsehoods, accursed untruths and filters

DAVID KRIESEL, a doctoral scholar in computational geometry at Bonn University, has no scholastic investment in clamping calculations. The point when a previous customer got some information about a peculiar episode including a scanner, his first response was, "You gentlemen must be joking me." The customer called him when they discovered that a Xerox machine had filtered a compositional drawing of a house in such a route, to the point that numbers from one part of the definitive drawing wound up swapping those in an alternate share. The puzzle demonstrated excessively hard to oppose.
images
In the carpet plan, zones comparing to three rooms were indicated as measuring 14.13, 21.11 and 17.42 square meters (see picture). After a touch of examining, Mr Kriesel discovered that two diverse Xerox Workcentre models might trade one or two of the aforementioned numbers with an alternate, in a clearly irregular style. (Current scanners go about as large advanced scanners with a printer joined as opposed to utilizing the conventional simple photographic methodology and can process picture documents and additionally printed doubles.)

The New Intel's 'Bay Trail' Atom chip could smudge the line between Pcs, tablets

Desktops, note pads, tablets: Just five years prior, those three expressions described three unique classes of items. However now purchasers tend to be asked to pick around holding nothing back-ones, two-in-ones, convertibles, smaller than expected tablets, ultraportables, and phablets. With Intel's new "Bay Trail" Atom chip, due this fall, you can anticipate that the business will expand considerably more.

Furthermore that is a wonderful thing.

images
For the greater part of the different sorts of processing mechanisms we may buy, every is described by its working framework. We purchase a Windows machine, an Android unit, or an ipad.

Anyhow that may soon change. Intel's Bay Trail helps both Windows and Android, and equipment makers can incorporate machines that boot with either OS—or both. Their OS executions regardless, framework costs could drop as low as $150, Intel executives have asserted.

SMB Data Centers: Turn Out the Lights, The Party's Over!

"Manufacture lights, the gathering's over. They say that all exceptional things must close." Lyrics from Willie Nelson's melody may be a suitable tune to sing when portraying what's to come for the server farm in minor and medium organizations.
Mist processing offers the minor and medium-estimated business client an approach to turn on requisitions for their staff and clients rapidly and proficiently. No more drawn out do more diminutive conglomerations need to use quite required capital to give planet class IT benefits. What's more, clients now have brilliant associations to browse when obtaining their mist processing administrations.
Arabloads

Uploadboy
Rapid file share
Aberdeen's later report "IBM Buys Softlayer: Cloud Computing Now Mainstream" surveys IBM's later securing of Softlayer, a fog processing association. The report additionally uncovers fog utilization patterns, top mist results , profits and the forces driving conglomerations to the fog.
Aberdeen's March 2013 review, Usage of the Public Cloud, discovered that 85% of all respondents utilization or want to utilize the people fog. Programming as an administration (Saas) is the heading fog engineering empowered by finish clients. Provisions, for example CRM, web and ecommerce are a regular fit for Saas innovation. Base as an administration (Iaas) is an additional mist engineering that is picking up force and is one of the administrations that Softlayer offers. Iaas permits conglomerations to lease register force and space, in place of acquiring equipment and programming. This gives the client more stupendous adaptability and fundamentally diminishes the time to convey new provisions to clients at less take. Lessened capital and overhead expenses were refered to as top profits from fog drives.
While the greater part of these profits are incredible for the IT client, by what means will this impact customary heading, on-reason, IT foundation conglomerations like IBM, HP, Dell and Cisco. Decreased expenses for the close client methods diminished income for these associations. What will these conglomerations look like in 10 years is difficult to envision, however it is ensured they will be much distinctive.
Assuming that you are a minor or medium-measured business and are considering overhauling or opening another server farm, don't trouble. Only close out the lights, unwind and arrive at for the mists!

Distinctions on Cybertheft Complicate China Talks


WASHINGTON —Vice President Joseph R. Biden Jr. opened twelve-month key chats with senior Chinese guides here on Wednesday by rehashing the United States' charge that the electronic robbery of American scholarly property could undermine the relationship between the planet's two biggest economies.
Furthermore to not a single person shock, the Chinese had a response primed: that the distribution of mystery reports indicating the degree of American observation of Chinese colleges and different organizations undercuts the Obama management's case.
That grating, American authorities surrendered in private, underscores how challenging it will be for the United States to make advance on what President Obama and his top associates have said is currently a focal issue between two nations whose economies are interlaced and whose militaries are in rivalry.

Google's Penguin 2.0 Algorithm


In April 2012, Google discharged one of its most amazing calculation updates to date. Penguin 1.0 focused on locales that offered flawed connection profiles, level quality backlinks, and grapple message that was too essential word rich or overly improved for a solitary term. As an aftereffect of the clearing and noteworthy effects of Penguin 1.0, expectation encompassed the arrival of Penguin 2.0, which formally took off May 22.

images

While a considerable measure of the specifics of the upgrade are even now shaking out, there's an extraordinary arrangement of qualified information as of recently rising. Here's a more intensive take a gander at what we know, how Penguin 2.0 is influencing locales, and what to do if your site has been swayed.

Super-itemized Cgi human skin could at long last cross the uncanny valley, carry reasonable faces to recreations and films

Workstation engineering has become always propelled in later decades, however we arrived at an impasse a while back where innovation impacted science in a sudden way. Attempting to make computerized forms of human faces ordinarily brought about something strange or absolute bothering. The sensation, regarded as the uncanny valley, is even now vexing for the film and diversion commercial ventures. Nonetheless, a group headed by Abhijeet Ghosh and Paul Debevec of the University of Southern California (Usc) has advanced a strategy to make manufactured appearances considerably more true, maybe intersection the uncanny valley. It creates responses were just shallow.

http://www.extremetech.com/wp-content/uploads/2013/07/CGI-Face-640x353.jpg
The human mind is decisively tuned to comprehend what a face should look like. These unobtrusive signals are profoundly instilled and when we find them missing, the reaction is frequently instinctively negative. It might be as basic as muscles around the eyes getting strangely, or the way lips part throughout discourse. Science is getting closer to nailing down the mechanical methods, however the Usc group is handling the most testing perspective skin.

Citrix, Palo Alto Networks join to offer applications over next-generation networks

Palo Alto Networks announced Wednesday a multi-phase partnership with Citrix that brings together network security and application delivery capabilities. In response to market demand, Palo Alto Networks
and Citrix will deliver jointly validated solutions that are designed to simplify how enterprises accelerate application delivery on next-generation networks.

As businesses embrace mobility, consumerization and desktop virtualization, IT organizations are looking for ways to transform their networks into an end-to-end cloud delivery platform, making it easy for employees to safely access any application from any device or location.
It is this shared vision for how enterprises can best evolve towards cloud networks that has inspired Palo Alto Networks and Citrix to align product development plans to capture the power of flexible next-generation platforms. Additionally, the two companies are collaborating across technical support teams, consulting organizations, and partner communities to coordinate the introduction of joint solutions for mutual customers. This partnership will provide the right technologies to deliver applications with cloud-level scalability but without compromising on security, high performance or availability of critical data and applications.
Palo Alto Networks brings to the partnership next-generation firewall technology that gives organizations the ability to identify, control, and safely enable applications while at the same time inspecting all content for all threats in real time. Citrix NetScaler delivers complementary network capabilities to deliver any business application, cloud service or virtual desktop with the fastest performance and highest availability. When used together, the two companies deliver native application intelligence, template-based management and high performance to optimize the delivery of any application to any user.
As part of this announcement, Citrix and Palo Alto Networks have agreed on a multi-phase relationship starting with validated joint solutions for virtual application and desktop virtualization solutions Citrix XenApp and Citrix XenDesktop, as well as popular enterprise applications. Customers will be able to avoid complex, piecemeal solutions, and alternatively use guidelines and expert resources from two industry leaders to design a next-generation network infrastructure that achieves availability, security, performance, flexibility and visibility. In the near term, the two companies will back these solutions with global support for enterprise customers and channel partners.
"Citrix NetScaler and Palo Alto Networks are providing solutions and a vision that clearly complement each other,” said Zeeshan Sabir, senior director, IT, Qualcomm. “We look forward to deploying the two company's solutions more tightly and continue superior leverage while simplifying and scaling our data center and next generation cloud architectures."
"This partnership comes at a very opportune time given that many of our customers are currently rethinking their network architectures,” said Vid Sista, director, Network & Security Practice, Accudata Systems. “Enterprise customers look to us to bring together solutions that will give them the best in performance, availability, and security, which is exactly what this partnership is committed to providing."
"Citrix and Palo Alto Networks share a common vision for how networks are evolving,” said Rene Bonvanie, chief marketing officer, Palo Alto Networks. “There's synergy in bringing these two technologies together to deliver next-generation cloud network solutions."
"Palo Alto Networks and Citrix have already established strong, but independent, positions in leading cloud-first network solutions,” said Sunil Potti, vice president and general manager, NetScaler Product Group, Citrix. “Our alliance will provide customers with the freedom to leverage the leading advanced delivery controller and firewall solutions without compromising on integration, simplification and consolidation."

IBM enhances security, cloud and analytics capabilities with new Power systems, storage and mainframe technologies

IBM Corp. unveiled on Wednesday new technologies designed to help organizations with greatest challenges, including the need for improved security, the ability to take advantage of cloud computing, and the requirement to manage and analyze vast amounts of data. The new offerings include enterprise Power Systems to date, a new high-end disk storage system and key software updates for IBM's newest mainframe computer.
The announcement is part of IBM's continued focus on Smarter Computing systems aimed at solving the varied and intensifying challenges organizations are facing, from security vulnerabilities to managing ballooning data volumes that are expanding through social and mobile technologies.
IBM customer Toyota Australia is one example of a company with complex data management needs. Running a sophisticated just-in-time manufacturing, logistics and parts operation at its Altona plant in Melbourne, Toyota Australia uses a series of IBM Power servers running SAP software on AIX to manage and analyze data about vehicle parts availability, shipping estimates, inventory levels and sales planning. The manufacturing process is entirely reliant on this infrastructure in order for production operations to run as efficiently as possible so that not only can its dealerships receive car deliveries on time to meet consumer demand but it can meet export market demand.
According to Toyota Australia CIO James Scott, "One of our company's top concerns is data management delays. This has the potential to negatively impact our production line, costing us tens of thousands of dollars in lost productivity, and the profits of our 250 dealerships across the country. Having a fast, reliable technology infrastructure is critical to the success of our business and IBM gives us the tools we need to support the organization most effectively."
As a result of more than $1.4 billion in R&D investment, IBM is announcing its enterprise Power Systems with new hardware and software innovations designed to help customers gain business insights fast and securely.
IBM Power 770 and Power 780 servers now feature the new POWER7+ microprocessor, a technology that offers a performance boosts of 30 to 40 percent on application workloads compared with previous versions. Among its many features, the POWER7+ offers an expanded 2.5x L3 cache memory, greater security with faster file encryption for the IBM AIX operating system, and memory compression that results in no increased energy usage over previous generation POWER7 chips.
At the top of the Power line, the Power 795 server has been enhanced to enable customers to run very demanding applications, such as business analytics, fast by utilizing up to 16 terabytes of memory with new 64GB Dual In Line Memory Modules (DIMM). In addition, IBM has added several new capabilities to its family of Power Systems servers to help customers build virtualized private cloud or managed service cloud infrastructures, and respond dynamically to changes in application and workload requirements. Elastic Capacity on Demand for Power Systems Pools, for example, enables the sharing of resources across multiple servers, which can improve the availability and enhance the access to resources during planned and unplanned maintenance activities.
When managing a cloud-based infrastructure with IBM PowerVM virtualization software, customers can now more easily move individual server partitions to quickly balance resources in reaction to changing business needs. Single virtual machines can be moved three times faster and concurrent migrations can occur up to 4.7 times faster than with previous versions.
The average corporate IT infrastructure is cyber-attacked nearly 60,000 times every day and the average total organizational cost of a data breach is $5.5 million, making security one of the top priorities of enterprise organizations. To enhance data security and regulatory compliance, IBM PowerSC security and compliance software along with Trusted Surveyor has been updated and provides real-time security alerts and delivers improved compliance reporting.
The deluge of information organizations continue to grapple with is posing increasingly dynamic challenges for IT administrators. Mounting data volumes are stressing system performance and manageability, as well as security. To help customers respond to these challenges, IBM today solidified two of its high-end storage systems with dramatic performance and security updates.
The IBM System Storage DS8870 is the newest and most powerful member of the company's DS8000 family of "high-density" enterprise class storage systems. Upgraded with the advanced IBM POWER7 processors and up to 1TB of system cache, the DS8870 delivers up to three times more performance for transaction processing applications than the current DS8800 model. What's more, according to the Storage Performance Council, the DS8870 has also achieved the number one ranking in its standardized SPC-2 benchmark result. In addition, the DS8870 comes standard with full self-encrypting drives for additional security.
On the tape storage front, IBM updated the IBM Virtualization Engine TS7700 Release 3, a system that melds virtualization with magnetic tape. The system is an update of the TS7700 Enterprise Virtual Tape Library System, which is typically used in enterprises powered by mainframes and is designed to help administrators virtualize their existing tape storage systems for improved manageability, capacity and security. The Virtualization Engine takes the system to new levels of each, with end-to-end encryption and the ability to connect up to six systems in a grid architecture for greater access to information, as well as redundancy.
The new Technical Computing for Big Data solution includes IBM's General Parallel File System (GPFS), an advanced file management platform often used in high performance computing environments for storing and delivering large volumes of data for weather modeling, oil exploration and digital media production. Combining GPFS with the latest IBM Platform Symphony scheduler and application platform, as well as the IBM Intelligent Cluster, delivers enterprise clients a scalable, high performance environment for analytics.
IBM also announced software offerings for IBM's newest mainframe -- the zEnterprise EC12 unveiled on August 28 -- to help clients operate their IT more efficiently while making use of critical information to fuel business insights and help provide better service to clients.
The zEC12 system runs transaction processing applications and analytics applications on one machine, enabling clients to receive and analyze structured business data in real-time. Now, IBM is making it simpler, faster and more affordable to run analytics on System z with the new IBM DB2 Analytics Accelerator V3 appliance that can speed response times for analytics to provide business insights and results. The Accelerator can also reduce the need to store data on disk drives in the mainframe by 95 percent, which can dramatically lower storage costs.
IBM is enabling its transaction processor, CICS (Customer Information Control System), to be developed, delivered and operated in the cloud in order to help zEnterprise clients build private cloud environments that can support a high volume of customer transactions. With the new CICS 5.1 portfolio, interactive applications such as ATM systems, bank-teller applications and insurance applications can be made available in the cloud.
The new IBM Security zSecure Suite V1.31.1 enhances security intelligence by spotting unusual activity before the system is compromised, monitoring for threats with real-time alerts and network behavior analytics, and managing security audits. Integration with QRadar SIEM (security information and event management) provides enterprise-wide security monitoring.
In addition to these systems and storage updates, IBM also announced a Software Defined Networking (SDN) controller for its enterprise networking portfolio. The new IBM Programmable Network Controller provides intelligent software for IBM RackSwitch and other OpenFlow-enabled switches. Through OpenFlow, people can create virtual networks with the scalability and flexibility required to respond to business changes in cloud and mobile services environments.
IBM Global Financing (IGF) can help clients acquire IBM systems with financing that promotes greater financial flexibility, lowers total cost of ownership and provides predictable payments. By working with a strategic partner like IGF, clients can conserve upfront cash and use it for other business critical initiatives. With industry-leading expertise in IT financing, IGF can customize financing programs to help accelerate a project's cash flow break even point and lower costs throughout the IT lifecycle.
Credit-qualified clients that elect financing may qualify to defer their first payment to 2013 for greater budget flexibility. IGF also offers 0% financing on a 12-month full payout lease or loan for select IBM solutions. For clients migrating from non-IBM platforms, IGF offers buyback of older servers at market value to facilitate ease of transition to IBM systems.

Sophos announced it has extended protection for Android devices with the release of two free apps.

Sophos announced it has extended protection for Android devices with the release of two free apps. The
latest version of Sophos Mobile Security for consumers and the new Sophos Mobile Encryption app secure Android devices against malware and privacy issues, provide loss and theft protection, and allow Sophos SafeGuard Enterprise users to securely access encrypted files stored in the cloud. Both apps are available for free download from Google Play, the company announced on Thursday.
According to the recent Worldwide Smartphone 2012-2016 Forecast Update by IDC, Android-powered phones make up 69 percent of the smartphone market. Many of these Android owners are using their devices to access business applications and related documents, including those on cloud storage solutions like Dropbox. As such, businesses must ensure data is secure and free from malware regardless of where it is stored or how it is accessed.
Sophos Mobile Security is a free lightweight anti-virus app that protects Android devices against malware, privacy issues and hardware loss -- without reducing performance or battery life. Among the enhancements in the new version, Sophos Mobile Security includes additional loss and theft mitigation features as well as the ability to schedule device scans for malware.
By scheduling scans, users can ensure they are consistently monitoring their devices for the latest malware. The enhanced loss and theft protection features allow pre-selected contacts from a user's address book to send remote commands to a missing device via text message. These commands can help users find a misplaced phone by sounding a loud ringtone, sending a message to the phone for a finder to read, or wipe the device's information if it is stolen or permanently lost. These features minimize the impact of losing a device and help to protect corporate data from unauthorized access.
Sophos Mobile Encryption allows Sophos SafeGuard Enterprise customers who use the Encryption for Cloud Storage module to securely view documents saved in Dropbox on their Android device. This ensures data encrypted by SafeGuard before being uploaded to the cloud is protected regardless of where or how the user accesses it.
Users must enter their password, and they can view encrypted documents on their mobile devices without compromising corporate security. An iOS version of this app is already available via Apple's App Store, and Sophos plans to support further cloud storage providers such as Egnyte and Google Drive with future releases.
"Users want to stay flexible and take advantage of personal apps in their working environment. They use Dropbox to take their data with them and can be tempted to download apps from stores other than Google Play. As Android increases its global market share, Android devices and apps are becoming a prime target for data theft and attacks by cybercriminals. It has never been more important for individuals to have security applications on their devices," said Matthias Pankert, vice president, product management, Sophos. "Our mobile security and encryption apps make it simple for Android users to have secure access to data no matter where it is stored or accessed, and provide organizations with peace of mind if a device is lost or stolen."

Virtustream announces PCI DSS 2.0 compliance, improves secure cloud e-commerce offerings

Virtustream Inc., an enterprise class cloud solution provider, announced on Thursday that the company has achieved Payment Card Industry Data Security Standard (PCI DSS) 2.0 compliance for its cloud platform
to secure data in its private and public clouds. Now fully compliant with PCI DSS 2.0, Virtustream is able to guide clients through the PCI certification process with the security and transparency required to ensure compliance and business requirements are met.
With Virtustream, customers do not have to resort to “blind” trust; instead, they benefit from a transparent PCI approach involving accessible documentation, reporting and processes to view and manage the entire lifecycle in any audit or operational situation (up to and including the OS layer).
For businesses that would like to implement private clouds in their own data-center and IT operations, Virtustream also provides xStream 2.0 cloud management software with security, compliance and reporting tools required to enable PCI-compliant private clouds. This new standard of cloud PCI compliance will be attractive to customers needing additional e-commerce capabilities dynamically delivered from the cloud.
Virtustream attained PCI compliance by integrating its best-of-breed technologies (including GRC, SIEM, IDS, firewall and SLA monitoring) into one comprehensive environment. With security controls integrated in the solution and a mature software development lifecycle process, Virtustream achieved a fully PCI 2.0 compliant application and environment in a compressed – and record setting – timeframe. Virtustream’s technology, which isolates and protects PCI workloads from non-PCI workloads embedded in the platform, was instrumental in achieving this feat.
In addition, Virtustream’s encryption of virtual machine images, data in transit, at rest, in database and in archive tools have FIPS 140-2 certified encryption built in, which surpasses typical security requirements. The company’s facilities have also been independently certified to FISMA Moderate, and its processes have been successfully audited to SSAE 16 SOC II and ISO 27000. PCI DSS 2.0 guidelines place an emphasis on virtual machine security to which Virtustream now adheres. Consultants and third-party Qualified Security Assessors (QSAs) will be able to efficiently guide clients through their PCI certification efforts using the compliant foundation Virtustream offers.
“Most cloud and hosting companies lack transparency; they only provide customers with a cover sheet of the audit and exclude the full report that shares all of the audit details,” said Pete Nicoletti, director of security solutions for Virtustream. “We want to ensure transparency around our entire approach. Clients can see what we are doing on their behalf – whether it is documentation, process or lifecycle – and feel confident that Virtustream is delivering a secure environment that meets their compliance and real security needs.” Nicoletti recently joined Virtustream to drive federal business, security and compliance. Previously the vice president of security engineering at Terremark and Verizon, he has extensive experience dealing with security and compliance, and a wide range of security certifications including CISA, CISSP and CCSK.
The Virtustream xStream cloud solution delivers a new approach to private, public and hybrid clouds, enabling customers to deploy mission-critical applications to the cloud. xStream is available as software for existing data centers and as a managed service from the Virtustream Cloud. Powered by Virtustream µVMTM technology, xStream delivers enterprise-grade security and compliance, multi-tenant efficiency, application performance SLAs and consumption based charging for both legacy and web-scale applications.
xStream provides the hybrid cloud solution that most enterprises prefer – allowing a combination of existing IT, on-site private clouds with off-site virtual private/public clouds. xStream allows businesses to adopt the cloud at their own pace, managing the entire solution with a single pane of glass.

Promise announces its Hybrid Cloud Storage line for SMBs

Promise Technology Inc., a provider of high-performance storage solutions to the data center, cloud,

surveillance and rich media markets and vendor of Thunderbolt devices announced on Wednesday its Hybrid Cloud Storage Series SmartStor A4R-CLD and A6-CLD are now available for order through their global networks of distributors and value added resellers.
DOWNLOAD LINKS
The Hybrid Cloud Storage Series is a cloud storage solution designed for SMBs, schools, governments, and similar data environments. It allows users to access, manage, and share content from any device at any location. Powered by the proven Promise enterprise RAID engine, end-users can be assured all their content will be safe, synchronized and available wherever they need it.
The Hybrid Cloud Storage Series SmartStor A4R-CLD and A6-CLD are dynamic solutions providing mobile access and file sharing that businesses demand. IT professionals can leverage the ability to securely control data and manage user accounts: when users save changes to a file, it is automatically synchronized across all of the devices in which the SmartStor Agent or App has been installed.
The SmartStor APP was designed to be fully functional with both Apple and Android mobile platforms including support for the recently announced iOS6 thus providing an exceptional degree of flexibility demanded by today's tech-savvy users. All users sharing the files are automatically updated too, a huge benefit when collaborating with team members on projects.
The Hybrid Cloud Storage Series SmartStor A4R-CLD and A6-CLD offers advanced real-time synchronization technology ensures that all information is in sync across devices through SmartStor Agent or App, new file sharing features allow the user to share folders as well as specific files, and users can easily revert back to any previous version of a file, and all users sharing that file will receive the update at the same time. The line also supports Windows, Mac, iPhone/iPad and Android devices, offers fully automatic setup, simply plug in the application, turn it on and connect the network cable, supports Windows AD synchronization, and offers intuitive user interface to allow users to set up profiles and add profile pictures, It also features Promise’s enterprise level RAID technology, and is available in 6-bay tower and 1U rack configurations.
According to a technology analyst firm, the emergence of the 'cloud' as an alternative for information services delivery will continue to be one of the most important developments in the evolution of the IT market with the storage industry in a position to be among the major beneficiaries of the deployment of 'hybrid' cloud environments. Successfully addressing this trend supplier's will balance growing demands from cloud customers for low-cost hardware while addressing the demand for advanced software solutions in areas such as object-based storage, automated data tiering, Big Data processing, and advanced archiving services.
The Hybrid Cloud Storage Series SmartStor A4R-CLD and A6-CLD are now available for order through the Promise global network of distributors and value added resellers. They will both be available for delivery in early October.

EMC announces storage and backup support for IBM zEnterprise EC12 system

EMC Corp. announced Tuesday immediate storage and backup support for customers deploying the new IBM zEnterprise EC12 Mainframe System. Through this support, EMC is offering EC12 customers with powerful, trusted and smart storage for mission-critical mainframe environments.
For over 20 years, EMC has addressed the specific performance, availability and backup needs of mission-critical mainframe applications and data. The result is one of the industry's broadest portfolios of mainframe solutions and technologies, including the EMC VMAX line, EMC Connectrix storage connectivity capabilities, fully automated storage tiering (FAST) software and the EMC Disk Library for mainframe.
EMC FAST VP (Fully Automated Storage Tiering for Virtual Pools) automatically optimizes application performance and maximizes the benefits of Flash drives for EC12 mainframe customers. FAST VP for mainframe count-key data (CKD) volumes brings the automation, performance and economies of scale benefits of FAST VP to mainframe-based workloads and applications. The recently announced EMC DLm8000 is a mainframe virtual tape library that ensures consistency between tape data at both production and recovery sites, providing the shortest possible RPO and RTO for critical recovery operations for EC12 environments.
EMC also offers one of the industry's only four-site business resiliency solution using EMC Symmetrix Remote Data Facility (SRDF) and Geographically Dispersed Disaster Restart (GDDR) software. When combined, SRDF and GDDR automation provide near-continuous availability between data centers within a region, as well as continued disaster recovery protection in a second region located an extended geographical distance away. EMC AutoSwap supports the EC12 mainframe platform, providing a continuous availability solution, including support for Linux on System z workloads. It does so by enabling non-disruptive swaps of active z/OS and z/VM workloads to secondary disk storage using EMC SRDF software.
In addition, EMC Global Services helps customers achieve maximum stability, performance and agility from their mainframe architecture. The EMC Backup Infrastructure Assessment service aligns mainframe backup infrastructure, applications, policies and procedures to meet business demands and SLA requirements. The EMC Mainframe Transformation Services enable customers to modernize and accelerate their mainframe applications to seize new business opportunities.
"EMC is thoroughly committed and continues to innovate for mainframe customers,” said Brian Gallagher, Title, Enterprise Storage Division at EMC. “Hybrid cloud and Big Data are forcing organizations to rethink their overall IT infrastructure, including mainframe environments. EMC continues to deliver new innovation for the mainframe community to meet the performance, protection, availability and efficiency requirements demanded by zEnterprise customers—while enabling them to keep up with the mega industry trends of Cloud and Big Data. As the market leader in storage, we're pleased to support the needs of zEnterprise EC12 customers right out of the gate."

Syncsort teams with Cloudera to ease Apache Hadoop for enterprise, enable adoption of Big Data platform

Syncsort, provider of data integration solutions, announced Wednesday that its DMExpress data integration software is now a Cloudera Certified Technology, certified for CDH4 (Cloudera’s Distribution Including Apache Hadoop, version 4). The company also announced that it has officially joined the Cloudera Connect Partner Program.
Recently announced, CDH4 is a 100-percent open source solution that combines Apache Hadoop with other Big Data technologies within the Hadoop stack to deliver advanced, enterprise-grade features to customers. CDH4 and Cloudera Enterprise 4.0, the company’s Apache Hadoop data management platform, provide an end-to-end solution that enables enterprises to combine Hadoop with existing enterprise data management systems.
The certification of Syncsort DMExpress with CDH4 gives customers the ability to use the high-performance, scalable data integration software with Cloudera’s widely deployed Big Data platform. DMExpress simplifies and speeds the integration and movement of Big Data between the Hadoop Distributed File System (HDFS) and enterprise systems. Together, CDH4 and DMExpress simplify Hadoop for the enterprise and accelerate Big Data time-to-insight.
“Cloudera is focused on providing enterprises with the solutions and support they need to maximize the value of Big Data with confidence and ease,” said Tim Stevens, vice president of Business and Corporate Development at Cloudera. “An important part of the value we bring is in uniting, educating and supporting a rich ecosystem of leading Big Data technology vendors, and we are excited to welcome Syncsort to the Cloudera Connect Partner Program. The efficiency and simplicity with which DMExpress can move data in and out of Apache Hadoop is complementary to CDH4, making it easier for enterprises to realize the full potential of Hadoop. We’re committed to helping enterprises achieve the most from their Big Data initiatives, and we’re pleased that Syncsort has completed certification of DMExpress on CDH4.”
“Syncsort and Cloudera share a commitment in finding valuable ways to contribute to the Hadoop community and help make Hadoop a stronger, more viable Big Data solution for leading enterprises,” said Mitch Seigle, vice president, Marketing and Product Management, Syncsort. “The certification of Syncsort DMExpress with CDH4 provides customers with an enterprise-ready solution for cost effectively moving data in and out of Hadoop, and addressing their Big Data integration challenges.”

Oracle debuts new release of Oracle VM VirtualBox

Oracle has announced the availability of Oracle VM VirtualBox 4.2, the latest enhancement to its open source, cross-platform virtualization software. The release builds on previous versions by adding new features such as VM Groups which are designed to streamline management, improving network capabilities, and providing support for new host and guest operating system platforms.
Oracle VM VirtualBox 4.2 makes it easier and efficient to manage larger numbers of similar virtual machines, Oracle VM VirtualBox 4.2's new VM Group feature enables grouping of VMs. This allows administrators or users to operate on any number of VMs all at once, through a graphical user interface, APIs, and command line tools. VMs that do not need user interaction can now be started within Oracle VM VirtualBox the same way as standard VMs. Virtual machines of all types can be set to start automatically after the host system is booted, allowing virtual machines to be managed similarly to other host services.
With an increase in the maximum number of network cards per VM from eight to 36, Oracle VM VirtualBox 4.2 can be used to simulate complex networks without the need to procure costly hardware, new network bandwidth controls have been added, and are designed to prevent any VM from taking more than its allocated share of network traffic. The virtual network card in Oracle VM VirtualBox now supports VLAN tagging, allowing VMs to participate in VLAN environments.
Oracle VM VirtualBox 4.2 adds support for Windows 8, Mac OS X 10.8 "Mountain Lion," and Oracle Linux 6.3.
"As the only free, open source virtualization software that supports Windows, Mac, Linux and Oracle Solaris platforms, users can install Oracle VM VirtualBox 4.2 on their preferred host platform and run a huge variety of guest operating systems in virtual machines," said Wim Coekaerts, Oracle senior vice president of Linux and Virtualization Engineering. "Oracle VM VirtualBox 4.2 makes it even easier and more efficient for users to manage virtual machines with VM Groups, new startup options, and new network tuning capabilities."

QLogic offers high performance, cloud-enabling solutions for Windows Server 2012

QLogic announced this week that its portfolio of Fibre Channel, 10Gb Ethernet (10GbE) and converged network adapters provide high performance, reliability, scalability and simplified deployment for the Windows Server 2012 platform through QLogic in-box drivers, which are included standard with the new operating system (OS).
Windows Server 2012 is a cornerstone of the Cloud OS. For organizations deploying shared services via a private or public cloud, it is imperative to choose I/O technologies that provide fine-grained Quality of Service (QoS) capabilities. QLogic Fibre Channel and Network QoS technologies for Windows Server 2012 handle these increased demands for flexibility and stringent service level agreements (SLAs), and allow enterprises to enhance performance and network utilization, while simultaneously reducing complexity within Windows Server 2012-based clouds.
"QLogic has been closely involved in the execution of Microsoft's Cloud OS strategy, providing network adapters with rich features that address the demands of virtualized and cloud computing environments," said Amit Vashi, vice president, marketing, Host Solutions Group, QLogic. "Our Fibre Channel, 10GbE and converged networking adapters, with in-box drivers, are designed to maximize customers' investments in Windows Server 2012 in enterprise data centers and cloud deployments. Our battle-tested, widely adopted software stack makes it easy for customers to deploy all QLogic network adapters with complete confidence with Windows Server 2012."
"Windows Server 2012 has its roots in Microsoft's long-standing expertise with large cloud data centers," said Sandeep Singhal, general manager, Windows Networking, Microsoft. "With a large installed base of network adapter solutions that fully exploit the advantages of virtualized data centers and cloud environments, QLogic provides customers with network adapter solutions that can help them make the most of Windows Server 2012's breakthrough capabilities."
Leveraging the company's 15 years of industry-leading Fibre Channel expertise, QLogic provides highly stable, reliable and efficient Fibre Channel connectivity in Windows Server 2012 environments. QLogic Fibre Channel adapters provide a number of benefits for Windows Server 2012 customers including integration with Windows Server 2012 Virtual Fibre Channel (VFC) technology, QLogic adapters are the only ones in the industry that provide a switch-agnostic QoS solution which enables data center administrators to control the amount of SAN I/O resources to match enterprise application workloads. The ability to allocate bandwidth and set priorities for VFC ports in Windows Server 2012 Hyper-V via the QLogic N-Port ID Virtualization (NPIV) solution enables granular QoS settings that are essential for shared public and private cloud deployments.
QLogic 3200 Series 10Gb Ethernet adapters and 8200 Series converged network adapters provide Windows Server 2012 users with a number of features, including VMflex switch-agnostic capabilities and QoS for network partitions in Windows Server 2012. The QLogic 8200 Series provides full offload of all three key data center fabric protocols—NIC, FCoE and iSCSI—from a single, physical port, allowing Windows Server 2012 customers to mix and match the most appropriate I/O fabric that best serves the enterprise data center.
QLogic leverages Dynamic VMQ and Receive Segment Coalescing (RSC) features to enable performance-optimized, high-density VM deployments, and support for Windows Server 2012 NIC teaming provides unparalleled operational reliability and performance. QLogic is actively engaged to provide Windows Server 2012 Network Virtualization using Generic Routing Encapsulation (NVGRE).

New EMC offering permits secure data access and movement between clouds

At the Intel Developer Forum 2012, EMC Corp. announced this week the EMC Secure Cloud On-Boarding Solution, offering service providers and enterprises with ingredients to securely migrate mission critical applications between public, private and hybrid clouds. The solution, which will be available in early 2013, combines RSA Archer eGRC compliance and reporting software with Intel TXT technology and EMC VPLEX virtual storage for secure end-to-end workload migration within and between data centers.
Migrating mission-critical applications without causing downtime for end users or applications remains a top priority for service providers and enterprises deploying cloud infrastructures. The EMC Secure Cloud On-Boarding Solution offers components needed to do this quickly, securely and seamlessly. It does so by making sure the underlying hosts that virtual machines are running on are operating securely at multiple locations—and that regardless of what data center the workloads are migrated to, they will only run on trusted servers. Now Information Security Officers and Security Administrators will have a view of the hardware trust status within a cloud infrastructure—regardless of location.
The EMC Secure Cloud On-Boarding Solution offers solution providers and enterprises with policy and compliance. RSA's Solution for Cloud Security and Compliance, built on the RSA Archer eGRC platform, offers compliance reporting for cloud environments with over 130 VMware specific control procedures. This allows customers to implement VMware security and policy management tied directly to regulations such as PCI and HIPAA. With the addition of the Intel TXT control procedures to those already existing ones, security compliance is further enhanced by ensuring that the underlying servers running those virtual workloads have been verified against known good configurations, free of malware or rootkit hypervisors that typical runtime anti-virus applications might miss. By extending the compliance reporting to all data centers, these customers can gain a comprehensive high level view of their overall cloud compliance posture. This ensures that when a customer's virtual machines are migrated, they are only moved to other trusted compute hosts within that cloud infrastructure environment.
The new offering also offers data mobility. EMC VPLEX delivers storage federation and creates cooperating pools of storage resources. Federation enables IT to quickly and efficiently support the business through pools of resources that can be dynamically allocated. VPLEX enables dynamic, non-disruptive workload mobility between sites, allowing virtual distributed storage volumes to be created between multiple data centers, supports heterogeneous storage arrays and enables immediate data access. VPLEX eliminates the need to migrate data from one site to another when workloads need to move, because the data already resides at the site to which the workload is moving.
The new offering enhances security with Intel TXT’s built-in security capability that is part of many systems based on the Intel Xeon processor E3, E5 and E7 families. Intel TXT can help ensure that a system is not compromised with malware or rootkit hypervisors by establishing a hardware-based root of trust. This hardware-based security solution helps protect IT infrastructure against software-based attacks by validating the behavior of key components within a system at startup. Companies can securely realize operational efficiencies by making it easier to move virtual machines across clouds to trusted pools of "known good" servers.
"The agility and efficiencies offered by cloud computing are attractive to IT decision makers, but security has been a major inhibitor for organizations moving their mission critical applications into a cloud,” said Jason Waxman, general manager, Cloud Infrastructure Group, Intel. “Intel is collaborating with EMC to strengthen cloud security and enable the VPLEX virtual storage component which is able to migrate workloads over distance to the cloud through its unique cache coherency technology, high data availability, and federation capabilities. We look forward to broad availability in early 2013, and continuing to work with EMC and RSA to enhance hardware-based security and compliance via Intel TXT with leading edge solutions."
"Intel, EMC and RSA have collaborated to offer service providers and enterprises with the key components for building 'bullet proof' security in public, private and hybrid clouds,” said Prasad Rampalli, senior vice president, Solutions Group, EMC. “Data security remains the #1 impediment to mission critical applications moving to the cloud. With today's news, Intel, EMC and RSA are now offering technologies that—together—ensure non-disruptive and secure workload migration within and between data centers."
"Ensuring trust in the security of the underlying physical and virtual infrastructure is a pre-requisite for enterprises moving critical workloads to the cloud,” said Manoj Nair, vice president of Products Management, RSA, the security division of EMC. “We now have the ability to verify and report on the security compliance posture of servers in the virtual environment with the combined power of RSA Archer and Intel TXT. Together our companies are demonstrating that internal and external clouds can be secure, compliant, and auditable for the management of a company's most important business processes."
The EMC Secure Cloud On-Boarding Solution is being tested with select service providers and enterprises to pilot a formal solution that will be available in early 2013. EMC VPLEX Metro is available today. Availability of RSA Archer support for Intel TXT will be generally available early in 2013.

Brocade enhances Ethernet Fabric scalability with new VDX 8770 switch

Brocade Communications Systems Inc., provider of fabric networking, announced the Brocade VDX 8770 Switch, a new switching platform along with VCS Fabric technology enhancements that take data center network simplicity, efficiency and resiliency to a new scale. The Brocade VDX 8770 is designed for
enterprises and service providers striving to both simplify and scale-out their data center infrastructure in order to accelerate new service introduction and drive innovation, while also lowering costs.
With more than 700 customers who have already installed Brocade VDX switches, Brocade is building on the success of its VCS fabric-enabled switch portfolio with the addition of the modular Brocade VDX 8770 Switch. The newest family member is built to support the largest data centers, delivering unprecedented simplicity and automation along with massive scalability and performance, while offering investment protection.
The Brocade VDX 8770 and VCS Fabric technology deliver a simplified data center network. Designed specifically for highly virtualized environments, Ethernet fabrics built on VCS Fabric technology accelerate application deployment and enable faster virtual machine (VM) migrations through zero-touch VM discovery, VM mobility and VM port configuration migration. Using VCS fabrics, customers can manage dozens of switches as a single logical device, dramatically reducing operational costs. They can also save installation time as new switches self-provision when they are connected to the fabric.
With virtualized and cloud-centric data center architectures, application performance is highly dependent on the efficiency and utilization of the network infrastructure. VM density per server is also rapidly increasing as customers seek to maximize server utilization. To support these requirements, they need a high-performance network that can scale out on demand to address immediate business needs.
The Brocade VDX 8770 provides fabric scalability for large data center environments, enabling customers to expand a single VCS fabric up to 8000 switch ports with up to 384,000 VMs attached to the fabric -- 20 times the scalability of the leading competitor. Designed for real-time applications, the Brocade VDX 8770 also delivers low port-to-port latency at 3.5 microseconds across all 1 Gigabit Ethernet (GbE), 10 GbE and 40 GbE ports -- half the latency of the nearest competitor.
The Brocade VDX 8770 also sets a new standard for network efficiency and fault-tolerance with improved scalability and load balancing of Layer 3 gateways in the fabric. Combining this Layer 3 innovation with VCS fabric trunking and TRILL-based Layer 2 ECMP, customers can realize improved network resiliency and superior application performance by maximizing available network bandwidth.
The Brocade VDX 8770 is built to address the evolving needs of data centers and to support the latest technologies. With a 4 Tbps backplane, the Brocade VDX 8770 chassis is designed to support future technologies such as dense 100 GbE, providing ample performance capacity for years to come. The Brocade VDX 8770 is also engineered for emerging Software-Defined Networking (SDN) architectures, with flexible hardware support for network virtualization through technologies such as VXLAN overlay networking.
In 2010, Brocade began articulating a vision for transforming networking to support the next-generation cloud-optimized data center. Later that year, Brocade delivered on the first phase of this vision by pioneering the Ethernet fabric category with the introduction of Brocade VCS Fabric technology and the Brocade VDX 6720 VCS-enabled switch. In 2011, Brocade delivered on the second phase of its vision by expanding the Brocade VDX family with the Brocade VDX 6710 and 6730 switches. Continuing the revolution of the data center networking and Ethernet fabric category, the introduction of the Brocade VDX 8770 represents the third phase of Brocade's vision. This vision focuses on helping the largest-scale data centers utilize VCS fabrics that deliver superior automation, resiliency and efficiency to support the most advanced private and public cloud environments.
The Brocade VDX 8770 is orderable now. U.S. list price starts at $65,000 ($833/10G port). The Brocade VDX 8770 and other Brocade networking solutions are available direct, through Brocade channel partners.

Layered Technologies announces Layered Tech Cloud Data Center

Layered Technologies Inc. (Layered Tech), provider of compliant and secure cloud and hosting services supporting mission-critical e-business applications, launched on Wednesday the Layered Tech Cloud Data Center, a next-generation cloud platform that combines Layered Tech’s complete management, security and compliance capabilities with self-service functionality, creating a more agile and secure cloud.
The Layered Tech Cloud Data Center includes a self-service portal, giving customers tremendous control, visibility and management of their cloud environments, as well as the ability to not only control compute and storage resources, but also select from Layered Tech’s extensive managed platforms, security and compliant-hosting services.
Layered Tech offers PCI-, HIPAA- and FISMA-compliant hosting solutions, managed dedicated hosting and cloud computing services, including Compliance Guaranteed, which ensures that all Layered Tech compliance services are guaranteed to pass 100 percent of every IT audit or assessment. By providing high-quality technology, infrastructure and support, Layered Tech enables clients to eliminate capital expenses and save on operating costs so they can focus on core initiatives. Layered Tech’s scalable infrastructure powers millions of sites and Internet-enabled applications, including e-commerce and SaaS. Clients include federal, state and local government agencies; large enterprises with advanced data security, compliance and uptime requirements; and Web 2.0 startups.
“Layered Tech’s next-gen cloud allows enterprises to run their critical workloads in a cloud environment to accommodate complex security needs and meet PCI-DSS and HIPAA compliance requirements,” said Kevin Van Mondfrans, vice president of product management at Layered Tech. “Security and transparency are Layered Tech tenets, and our new Cloud Data Center includes the security and compliance management capabilities for which we are known.”
“SaaS providers whose core business operates in regulated industries can give themselves a huge competitive advantage by running within a cloud platform that is both agile and able to deliver airtight security and compliance performance, and that’s what Layered Tech has built with its next-gen Cloud Data Center,” said Michael Wolfe, CIO of Ontario Systems, provider of accounts receivable and revenue cycle management solutions for the collections and healthcare industries. “Equally important to the cloud infrastructure itself is having a cloud provider that excels at managing highly complex environments, understands its clients’ business objectives and can deliver high-performance solutions that are very secure and can achieve compliance. Ontario Systems has found that provider in Layered Tech.”
With the Layered Tech Cloud Data Center, enterprises are no longer forced to choose between greater business agility or highly secure and compliant-ready cloud environments. As a managed services provider, Layered Tech works with each customer to determine ideal mix of managed services to meet their unique set of business, security and compliance objectives.
According to John Pescatore, vice president at research firm Gartner, in his Securing and Managing Cloud Computing report, “This is an important time to be thinking through how you will secure your business’s use of cloud computing. IT architectures and processes will need to change and extend – and the same is true for security capabilities. Now is the time to be planning how to ensure company and customer data can be protected when public and private cloud services are used and also how security policies and architectures can take advantage of cloud delivery to actually increase levels of security.”
Layered Tech’s cloud platform enables businesses to leverage its security and compliance expertise while running critical workloads containing sensitive data in a self-service, secure cloud environment. In addition, Layered Tech is the only managed services provider in the market to back its PCI-DSS and HIPAA compliance services with Compliance Guaranteed, which promises that compliance customers will pass every IT audit or assessment sanctioned by the relevant industry or regulatory entity 100 percent of the time.
Layered Tech also provides FISMA-compliant hosting via its recent acquisition of NEW WORLD APPS Inc.
“Layered Tech has a proven track record of leading the market in providing secure and compliant cloud and hosting solutions to customers, and our new Cloud Data Center further demonstrates our continued commitment to give clients the business agility they want on a fully trusted platform,” said Brad Hokamp, president of Layered Tech. “There are many hosting and cloud providers in the market, but Layered Tech separates itself from the pack by fusing managed services and technology to create a high-performance, secure and compliant cloud environment like our new Cloud Data Center.”
Related Posts Plugin for WordPress, Blogger...