STEM

IBM, Lenovo Top ITIC 2016 Reliability Poll; Cisco Comes on Strong

IBM Power Systems Servers Most Reliable for Seventh Straight Year; Lenovo x86 Servers Deliver Highest Uptime/Availability among all Intel x86-based Systems; Cisco UCS Stays Strong; Dell Reliability Ratchets Up; Intel Xeon Processor E7 v3 chips incorporate advanced analytics; significantly boost reliability of x86-based servers

In 2016 and beyond, infrastructure reliability is more essential than ever.

The overall health of network operations, applications, management and security functions all depend on the core foundational elements: server hardware, server operating systems and virtualization to deliver high availability, robust management and solid security. The reliability of the server, server OS and virtualization platforms are the cornerstones of the entire network infrastructure. The individual and collective reliability of these platforms have a direct, immediate and long lasting impact on daily operations and business results. For the seventh year in a row, corporate enterprise users said IBM server hardware delivered the highest levels of reliability/uptime among 14 server hardware and 11 different server hardware virtualization platforms. A 61% majority of IBM Power Systems servers and Lenovo System x servers achieved “five nines” or 99.999% availability – the equivalent of 5.25 minutes of unplanned per server /per annum downtime compared to 46% of Hewlett-Packard servers and 40% of Oracle server hardware. …

IBM, Lenovo Top ITIC 2016 Reliability Poll; Cisco Comes on Strong Read More »

IBM z/OS, IBM AIX, Debian and Ubuntu Score Highest Security Ratings

Eight out of 10 — 82% — of the over 600 respondents to ITIC’s 2014-2015 Global Server Hardware and Server OS Reliability survey say security issues negatively impact overall server, operating system and network reliability. Of that figure a 53% majority of those polled say that security vulnerabilities and hacks have a “moderate,” “significant” or “crucial impact on network availability and uptime (See Exhibit 1).

Overall, the latest ITIC survey results showed that organizations are still more reactive than proactive regarding security threats. Some 15% of the over 600 global corporate respondents are extremely lax: some seven percent said that security issues have no impact on their environment while another eight percent indicated that they don’t keep track of whether or not security issues negatively affect the uptime and availability of their networks. In contrast, 24% of survey participants or one-in-four said security has a “significant” or “crucial” negative impact on network reliability and performance.

Still, despite the well documented and high profile hacks into companies like Target, eBay, Google and other big name vendors this year, the survey found that seven-out-of-10 firms – 70% – are generally confident in the security of their hardware, software and applications – until they get hacked. …

IBM z/OS, IBM AIX, Debian and Ubuntu Score Highest Security Ratings Read More »

Contemplating a Hybrid Cloud Deployment? Why Infrastructure Matters

The forecast for 2014 and beyond is cloud, cloud and more cloud – cloud computing, that is. For a majority of organizations – irrespective of size or vertical market – it’s a matter of “when” not “if” they will initiate a cloud computing deployment.

And ITIC survey data indicates that hybrid clouds will predominate and be the cloud architecture of choice for 64% of businesses. Hybrid cloud solutions offer organizations the best elements of public and private clouds when properly architected, tested, deployed and maintained. The benefits include reduced costs based on a utility-like pay-per-use model, greater scalability, flexibility and greater efficiencies in terms of manageability and business processes.

That said, in order to ensure optimal hybrid cloud performance and maximize Return on Investment (ROI), companies must start with a strong foundation. This includes a robust, reliable, flexible, scalable, manageable and secure infrastructure that provides integration and interoperability among legacy network components and the firm’s public and private clouds. Any hybrid cloud deployment lacking in these aforementioned elements is almost certainly doomed to failure. …

Contemplating a Hybrid Cloud Deployment? Why Infrastructure Matters Read More »

IBM Watson Takes Cognitive Computing to the Head of the Class

Pardon the pun, but there’s nothing elementary about IBM’s newly formed, New York City-based Watson Business Unit (BU).

IBM is committing $1 billion and 2,000 employees, as well as its considerable research and development (R&D) talents and marketing muscle to Watson, thus putting the full weight of its global technology and services brand behind the newly formed BU and initiative.

IBM CEO Virginia Rometty said that Michael Rhodin, most recently SVP of IBM’s Software Solutions Group, will take charge of the Watson Group. According to Rometty, the company established Watson as a separate BU based on the strong demand for cognitive computing. The IBM Watson Group will develop cloud-based technologies that can power services for businesses, industries and consumers.

Rometty also said the new IBM Watson Group notably integrates design, services, core functions, technologies, and a fully formed ecosystem which includes a design lab as well as hundreds of outside external partner applicants, foundations and advisors. All of these elements are crucial if Watson is to succeed. …

IBM Watson Takes Cognitive Computing to the Head of the Class Read More »

IBM Platform Resource Scheduler Automates, Accelerates Cloud Deployments

One of the most daunting and off-putting challenges for any enterprise IT department is how to efficiently plan and effectively manage cloud deployments or upgrades while still maintaining the reliability and availability of the existing infrastructure during the rollout.

IBM solves this issue with its newly released Platform Resource Scheduler which is part of the company’s Platform Computing portfolio and an offering within the IBM Software Defined Environment (SDE) vision for next generation cloud automation. The Platform Resource Scheduler is a prescriptive set of services designed to ensure that enterprise IT departments get a trouble-free transition to a private, public or private cloud environment by automating the most common placement and policy procedures of their virtual machines (VMs). It also helps guarantee quality of service while greatly reducing the most typical human errors that occur when IT administrators manually perform tasks like load balancing and memory balancing. The Platform Resource Scheduler is sold with IBM’s SmartCloud Orchestrator and PowerVC and is available as an add-on with IBM SmartCloud Open Stack Entry products. It also features full compatibility with Nova APIs and fits into all IBM OpenStack environments. It is built on open APIs, tools and technologies to maximize client value, skills availability and easy reuse across hybrid cloud environments. It supports heterogeneous (both IBM and non-IBM) infrastructures and runs on Linux, UNIX and Windows as well as IBM’s zOS operating systems. …

IBM Platform Resource Scheduler Automates, Accelerates Cloud Deployments Read More »

Does Infrastructure Really Matter When it Comes to IT Security?

Yes, infrastructure absolutely does matter and has a profound and immediate impact on enterprise security.

Server hardware (and the server operating systems and applications that run on them) form the bedrock upon which the performance, reliability and functionality of the entire infrastructure rests. Just as you wouldn’t want to build a house on quicksand, you don’t want your infrastructure to be shaky or suspect: it will undermine security, network operations, negatively impact revenue, raise the risk of litigation and potentially cause your firm to lose business.

And that’s just the tip of the iceberg. These days, many if not most corporate enterprises have extranets to facilitate commerce and communications amongst their customers, business partners and suppliers. Any weak link in infrastructure security has the potential to become a gaping hole, allowing a security breach to extend beyond the confines of the corporate network and extranet. Security breaches can infect and invade other networks with astounding rapidity.

Increasingly, aging and inadequate infrastructure adversely impacts enterprise security. …

Does Infrastructure Really Matter When it Comes to IT Security? Read More »

Microsoft: Bullish or Bottoming Out? Part 2

According to some press and industry, you’d think that Microsoft was all but dead. Microsoft’s tactical and strategic technology and business missteps are well publicized and dissected ad infinitum. Less well documented are Microsoft’s strengths from both a consumer and enterprise perspective and there are plenty of those.

Microsoft Strengths

One of the most notable company wins in the past five years is the Xbox 360 and Kinect.

Xbox 360 and Kinect: Simply put, this is an unqualified success. The latest statistics released earlier this month by the NPD Group show that Microsoft has a 47% market share and sold 257,000 Xbox 360 units in the U.S. in June, besting its rivals the Sony PlayStation 3 and Nintendo Wii for the 18th consecutive month. But Microsoft and indeed all the hardware games vendors find their sales shrinking due to the sharp increase in the numbers of users playing games on their smart phones. In Microsoft’s 2012 third fiscal quarter ending in March, Xbox 360 sales dropped 33% to $584 million. The consumer space is notoriously fickle and games users are always looking for the next big thing. Microsoft’s ace in the hole is the Kinect motion-controller, which still has a lot of appeal. The company is banking on that as well as slew of new applications and functions like the Kinect PlayFit Dashboard which lets users track the number of calories they burn when they play Kinect games. …

Microsoft: Bullish or Bottoming Out? Part 2 Read More »

Spring 2011: Hackers Had a Bonanza

Hackers have had a bonanza in April, May and June (so far). Nary has a day gone by without news of yet another major attack. Here’s a partial list of some of the most publicized hacks of the last 10 weeks:

RSA Security: On April 1, in a move akin to raiding Fort Knox, RSA’s Secure ID technology (one of the industry’s gold standards in security software) was hacked. RSA executives described the hack as “very sophisticated.” They characterized it as an advanced persistent threat (APT)-type targeted attack. It used a routine tactic – a phishing Email that contained an infected attachment that was triggered when opened.

Epsilon:  This Irving, TX –based company handles customer email messaging for over 150 firms, including large banks and retailers like Best Buy, JPMorgan Chase, Citigroup and L.L.Bean. In April, millions of consumers learned that Epsilon’s networks were breached when they received Emails from their banks and credit card companies informing them that the hack might have exposed their names and Email addresses to the hackers. Epsilon released a statement assuring consumers that only Email addresses and names were compromised and that no sensitive data was disclosed. …

Spring 2011: Hackers Had a Bonanza Read More »

Security Wars: Time to Use Continuous Monitoring Tools to Thwart Hackers

It’s time for corporations to wise up and use the latest, most effective weapons to safeguard and secure their data.

High tech devices, software applications, Emails, user accounts, social media and networks – even those presumed safe — are being hacked with alarming alacrity and ease.

Security tools, encryption and updating your networks with the latest patches are certainly necessary, but they are not enough. Corporations must arm themselves with the latest security tools and devices in order to effectively combat the new breed of malware, malicious code and ever more proficient hackers. I’m referring to the new breed of continuous monitoring tools that identify, detect and shut down vulnerabilities before hackers can find and exploit them. …

Security Wars: Time to Use Continuous Monitoring Tools to Thwart Hackers Read More »

2011 in High Tech YTD Part 3: Cisco Pulls Plug on Flip, Focuses on Core Competencies

Cisco Pulls the Plug on Flip

Following two consecutive fiscal quarters, Cisco Systems shocked the industry three weeks ago with the news that it will cease to manufacture its popular Flip video camera and will lay off the division’s 550 workers, substantially reducing its consumer businesses.

Also within the past two weeks, Cisco unveiled a voluntary retirement program aimed at workers 50 years old whose age plus tenure at the company equals 60; these workers have from May 10 through June 24 to opt in. This is the first time in two years that Cisco instituted such a cost cutting policy.

Cisco recently hired Gary Moore as Chief Operating Officer to fine tune its re-focused initiatives. …

2011 in High Tech YTD Part 3: Cisco Pulls Plug on Flip, Focuses on Core Competencies Read More »

Scroll to Top