Google Data Centers HVAC.jpg

Google, AWS Boast 6x Energy Efficiency Over Average Data Centers

Many global companies have begun to tackle climate change by investing in on-site renewable energy. While Google, AWS and Microsoft Azure are large purchasers of renewable energy and renewable energy credit offsets, these cloud computing leaders are also tackling climate change by reducing their overhead energy consumption. To be sure, energy efficiency is an often neglected yet incredibly important piece of climate change action. While data centers as a whole have become more efficient over time, hyperscale data centers have outpaced smaller data centers in energy use reduction.

cq5dam.web.1400.350.desktop.jpg

Alongside the rise in cybersecurity positions has been a rise in cybercrimes, with the largest cyber crimes ever being the LinkedIn breach causing the loss of 700M records in 2021, and the 2022 Shanghai police data breach of one billion records that we expand on more in this newsletter. What is responsible for the worldwide rise in cybercrimes? It appears that crime levels have risen due to remote work because of the COVID pandemic and increased IOT device connectivity, increasing the number of attack vectors by which hackers can gain entry into company systems.
 

fms.png

Flash Memory Summit returned to in-person and was well attended with many breakout sessions and keynotes filled to standing room only. Companies highlighted new products and innovation and attendees embraced the opportunity to network with old and new friends and colleagues.

 

Highlights:

 

SNIA won the Most Innovative Memory Technology Award and their Computational Storage Technical Work Group Received an Award for Computational Storage Architecture and Programming Model

0722_09_OCSR_Blog_1060x698_edited.jpg

Splunk, AWS and Symantech are the leaders in the new Open Cybersecurity Schema Framework (OCSF) that was revealed last week at BlackHat USA 2022. The Open Cybersecurity Schema Framework is an open-source project, delivering a framework for developing schemas, along with a vendor-agnostic core security schema. Vendors and other data producers can adopt and extend the schema for their domains. Data engineers can map differing schemas to help security teams simplify data ingestion and normalization, so that data scientists and analysts can work with a common language for threat detection and investigation. 

DPA-events-NABSHOW-L_edited_edited.jpg

Tuesday, May 17

The first in-person NAB Show since 2019 was quite a success this past weekend in Las Vegas, NV. 52,468 attendees visited the Las Vegas Convention center to see the newest advancements in media, film, software, storage and ancillary industries. Cloud integration stole the show, with the entertainment and media industries needing to share and upload 4K/8K content taking center stage, alongside media archiving for data management and storage.

slideshow.PNG
SEF_1024x512.png
111.jpg

Thursday, February 17

Assisted and Self-Driving Vehicles are Mobile Datacenters 

5-20TB of Data Will Be Consumed Per Day Per Vehicle

The evolution of cars to assisted and self-driving creates the need for cars to serve as mobile data centers with the computing power to process data in real-time. Managing this data effectively and quickly creates new challenges for the enterprise storage industry.

For decades, most of the electronics on a car were encased in electronic control units, segmented by function such as braking and infotainment. As more safety features were added and centralized, they were organized by distinct software stacks and automotive OSes based on different domains communicating with each other through a centralized gateway, which is what most new vehicles use today.

6pvyg.png
kioxia3.PNG
file-20210813-20-bi0lsj.jpg

Monday, January 24

Cybersecurity is a people problem, driven by our perception of risk. Tools help. In fact, tools are incredibly necessary but tools are also only as good as the people implementing them. Also, the work culture has a huge impact on behavior because employees tend to gravity toward the middle of the group, modeling their behavior to fit in, and be accepted as part of the team – for better or worse from a security best practices standpoint.

67% of security breaches are due to human behavior, not the failure of tools.

People have to digest a lot of information and success often means navigating that information efficiently, making decisions quickly – like to avoid getting in an accident on the freeway. But, that quick decision-making is not helpful during a cyberattack. 

ameca.PNG

Monday, January 10

Ameca is said to be the world’s most advanced humanoid robot. CES attendees have the unique opportunity to view and interact with Ameca up close. This robot looks like a person, with facial features that move and flex to indicate expressions and mimic emotion and eyes that accurately track movement. Engineered Arts designed Ameca with as realistic facial features as possible to help scientists and engineers study and improve human-robot interactions. People connect by reading facial cues, so having a robot with life-like expressions and responses is expected to be beneficial in hospital and hospitality uses where communication interactions are integral to success.

Picture1.jpg

Wednesday, January 12

The semiconductor chip shortage highlights a major infrastructure problem for the US – 75% of semiconductors are manufactured in Asia. Twenty-five years ago, the US produced 37% of the world’s semiconductor manufacturing in the US but today only produces 12%. In our June 2021 enterprise storage newsletter, we highlighted the chip shortage and, in particular, the impact on the automotive industry. Even the most basic gas-powered car now has over 100 chips, while the latest electric vehicle may hold more than 1,000. The chip shortage has resulted in few available gaming consoles, cars with limited features, and a reduced production of iPhones.

t.png
tt.png

Thursday, December 16

Brands 2021

    Fastest Growing     

           Growth of Top 10,             and Most Valuable

12.jpg
11.jpg
KIOXIA_BG5_front_high.png

Tuesday, December 7

KIOXIA America, Inc. announced the addition of the BG5 Series that is intended to bolster its lineup of PCIe® 4.0 solid state drives (SSDs). It is designed to balance performance, cost and power for gamers and PC users. The KIOXIA BG5 Series is built with a PCIe® 64 GT/s interface (Gen4 x4 lanes) and accelerated by the company’s fifth-generation BiCS FLASH™ 3D flash memory technology and is available in capacities of 256, 512 and 1024 gigabytes (GB).

1910385_143730939029_6207208_n.jpg

Tuesday, November 23

Department of Justice officials announced the arrests of five members of the ransomware criminal enterprise, REvil. REvil has been tied to over 7k ransomware attacks and hundreds of millions in ransoms, including the attack on meat supplier JBS and Miami-based technology company Kaseya. JBS paid $11M in ransom but Kaseya refused to negotiate with the cybercriminals. The arrests were part of an international investigation, Operation GoldDust, involving law enforcement agencies from 17 countries. Members of REvil were identified through wiretapping and seizure of REvil infrastructure – and, exploiting REvil tactics against its members.

p5510.PNG

Friday, November 12

Storage Review’s analysis of Intel P5510 vs Samsung PM9A3 Enterprise SSDs was thorough and intensive. While Brian Beeler was quick to politely comment on each and talk about the giants amongst us, and phew, what a whirlwind it was, we won’t hesitate to declare a winner. Intel crushed Samsung – especially if you are actually looking for a bottom line, instead of a participation trophy for each. This is business and competition drives, motivates, propels companies to greatness (or demise). Let’s not hesitate to call it like it is – for everyone’s good, including the competitors.

MostValuablebrands_Explorer_2400-1.jpg
extremeCloudPage.Ecosystem.576x576.02.png

Monday, December 13

Extreme Networks was established by three LAN switching industry veterans, Gordon Stitt, Herb Schneider, and Stephen Haddock, to target the development of third-generation LAN switches based on emerging Gigabit Ethernet technology. Extreme Networks is based in San Jose, with over 2700 employees and over 50k worldwide customers. 

1629742796419.jpg

Monday, November 29

Muon Space will launch a fleet of satellites designed to analyze Earth’s atmosphere, land, and water in fine detail using measurements from its own equipment and publicly available satellite data. Muon’s satellites will use thermal infrared sensors, infrared spectroscopy, and low-frequency radar to gather data and apply its algorithms to existing image databases and calculating soil moisture levels, snow depth, and standing water in various locations. Their integrated remote sensing platform is expected to provide accuracy and integration of data to more effectively combat climate climate.

herzog.jpg

Wednesday, November 17

Infinidat persuaded thirtyfive-year enterprise storage veteran, Eric Herzog, to serve as Chief Marketing Officer after nearly seven years as CMO and VP of Global Storage Channels at IBM Storage Solutions where he was responsible for worldwide product marketing and management for IBM's storage systems, software-defined storage, hyper converged infrastructure, and global storage channels. Eric Herzog has managed all aspects of marketing, product management, and business development in both start-ups and Fortune 500 companies. 

kioxia 2 webinar.PNG
nov 9 webinar.PNG
dcif3-1.jpg

Thursday, October 21

Technology, including special effects in movies, as truly evolved. How have datacenters evolved in movies – not just as a background prop but as a central feature? We highlight a few movies below…

2001: A Space Odyssey, 1968

Keir Dullea, Gary Lockwood, William Sylvester – A quest to find mankind’s origins with help from supercomputer H.A.L 9000

The main character must disassemble the AI villain inside the datacenter. And, while datacenters did not make it to space by 2001, that technology is well underway for the near future. The movie is iconic in reflecting much of the technology we take for granted today.

WarGames, 1987

Matthew Broderick, Ally Sheedy, John Wood – A young man finds a backdoor to a military central computer and game play is blurred with reality and the potential threat of WWIII. Okay, fair enough, no datacenter. But, it gets an honorable mention at that start of this evolution because President Reagan

Flash Memory at Scale Should be Software Defined.png
oct 21 webinar.PNG
kio series.PNG
money2.jpg

Wednesday, August 11

VCs Banking on Threats, Breaches, and Accelerating Cybersecurity Market

AdobeStock_193236128.jpeg

Friday, August 13

Windows Facial Recognition
Authentication Hacked –

Easily

august17webinar.PNG
july webinar2.PNG
SDWAN-Graphic.png

Tuesday, June 15

$53B SD-WAN Market by 2030

Persistence Market Research report indicates SD-WAN market growth reaching $53M by 2030. The top five vendors in revenue share for the full-year 2020 were led by Cisco, followed by VMware, Fortinet, Versa and HPE/Silver Peak and account for nearly 2/3rds of the market.  Top reasons for adoption include auto-failover and redundancy (66.8%), simplified management (61%), and cost savings over MPLS (57.7%).

big.PNG

Tuesday, June 22

EVOTEK Cybersecurity Predictions - Hit or Miss?

EVOTEK leadership, Matt Stamper, CISO, Executive Advisor, and Macy Dennis, CSO, provided 2021 cybersecurity predictions to CSW. Now that we are halfway into the year, let’s look at whether industry movement matches expectations.

Matt Stamper - “2021 will be the year of SOAR and investments in enhanced detention technologies including deception. I am cautiously optimistic that the improvements in security automation, ...

june webinar2.PNG
poll1.PNG
cp.png

Tuesday, May 25, 2021

Colonial Pipeline Attack &

Why You Should Not Hoard Gas in Plastic Tubs

A ransomware attack on Colonial Pipeline by hacking group DarkSide crippled gas and jet fuel supplies to nearly half the east coast. The pipeline is 5,500 miles long and can carry 3M barrels of fuel each day. The pipeline is owned by the Koch Industries (28%), South Korea’s National Pension Service and Keats Pipeline Investors LP (23.44%), CDPQ Colonial Partners, LP (16.55%), Shell Pipeline Company, LP (16.55%), and IFM Colonial Pipeline (15.8%).

rsa_edited.jpg

Thursday, May 27, 2021

RSA Conference 2021
COVID & the Expanded Attack Surface

RSAC Virtual 2021 kicked off on Monday May 17th with a keynote titled “A Resilient Journey” from Rohit Ghai, RSA’s CEO. Unsurprisingly, one of the big themes of the keynote was how COVID-19 forced IT and IT security to rethink how we approach remote workers, trust, resiliency, and hacks when most of the workforce of a variety of companies were forced to work remotely. 

pollresults.PNG
may security webinar2.PNG
may storage webinar2.PNG
AdobeStock_168496711-min.jpeg

Thursday, April 22, 2021

Fusion Centers: 

Social Media, Blue Leaks, & Suspicious Activity Reporting

2 Views – ACLU versus NSA

Where there is collection of data, there is always the prospect of great use and/or bad abuse.

And, much of the data culled has been packaged and delivered directly from the individual user, via social posts about getting vaccinated, vacation plans, new purchases, 10 year challenge photos (assisting in AI facial recognition), attendance at protests, and check-ins at every restaurant, workout, and airport - complete with selfies, food photos, and Fitbit results.

Picture1.jpg

Thursday, March 25, 2021

Building Storage Solutions for HPC

High-Performance Computing (HPC) originally started out in defense and research domains, such as universities and government agencies. The workloads that the initial HPC solutions were used for included particle physics, fluid dynamics, nuclear weapons modeling, and research and aerospace projects – and, obviously, the space program. What we have seen in the last several years is HPC being applied to new problems in commercial enterprises.

webinar march.PNG
F-35.pdf.jpg

Wednesday, March 10, 2021

Security Hack of F-35 Results in J-31. DOD Says NO MORE in Cybersecurity Enforcement Push

China’s J-31’s is “modeled after” the F-35. That is a nice way of referring to the Chinese hack of F-35 data in 2007 through contractor Lockheed Martin, to build their jet fighter, J-31. Contractors are required to meet standards regarding security protocols but those requirements have not been verified in the past.

61KuqHZ-anL._AC_SL1280_.jpg

Friday, February 19, 2021

Flash or Cache?

Deep Dive on SSD versus HDD (plus cache) for Arrays

In storage systems (and in particular storage arrays), the conventional wisdom has been that flash storage in the form of solid-state drives (SSDs) are necessary for high performance, and NVMe® SSDs provide the highest performance of all storage media. However, a recent interview in Blocks and Files by Infinidat (started by a number of ex-EMC alumni) would like to be the start of a rewrite to this narrative.

feb webinar 4.PNG
AdobeStock_69409115.jpeg

Monday, February 8, 2021

AI & Stock Trading 

High frequency and algorithm trading has moved from 60-70% of trading in 2010 to 90% in 2017. 

 

While AI is being largely utilized, the proof seems far into the future Don’t we need a recession or major market correction to test the stock trading models?

Server vs SSDs.png

Monday, February 1, 2021

Balancing Servers and SSDs

How can datacenter systems and application architects rebalance the relationship between server needs and storage capacity for typical enterprise workloads? Balancing the relationship between servers and SSDs is critical to datacenter cost, operational efficiency, and performance. 

webinar jan 2021.PNG
AdobeStock_216979649.jpeg

Saturday, January 9, 2021

U.S. Capitol Security Issues - January 6, 2021

Our AI & Cybersecurity Newsletter typically covers topics such as ransomware attacks, exploits, security issues facing major companies such as Zoom, & security breaches such as the Solarwinds attacks on Nuclear Labs, the U.S. Treasury, & Pentagon. However...

AdobeStock_219783815.jpeg

Wednesday, December 30, 2020

Will 2020's Hot Topics Still be Hot in 2021?

Here is a look at three topics for 2021 - storage-class memory, computational storage, and composable infrastructure - what they promised to deliver, to what extent they have lived up to their promise, and what to expect in the coming decade.