How Mediterra opted for a new cafe location in the 10th ward of ... The Business Journals
See original here:
How Mediterra opted for a new cafe location in the 10th ward of ... - The Business Journals
How Mediterra opted for a new cafe location in the 10th ward of ... The Business Journals
See original here:
How Mediterra opted for a new cafe location in the 10th ward of ... - The Business Journals
Fifty West Brewing Co.'s original taproom and restaurant will reopen next week after being closed for two years.
In a Facebook post, the Columbia Township brewery said its Brewpub will reopen on Jan. 4, followed by a reopening ceremony on Jan. 7, which also marks the company's 10-year anniversary.
The Brewpub, located at 7668 Wooster Pike, closed in 2020 due to the pandemic. Fifty West's Burger Bar and beer garden, which serves burgers and milkshakes across the street, has remained open.
Dining:These are the 5 best new Cincinnati restaurants of 2022
Beer:One of Cincinnatis best brewers to help launch Newport's new taproom
According to the post, the Brewpub will reopen under the direction of Cincinnati chef Jackson Rouse with a menu inspired by "the great American road trip," featuring local and regional ingredients. The Brewpub also has a 24-tap bar, serving Fifty West beer, hard lemonade, vodka seltzers, wine and cocktails.
The space will be open for dinner Wednesday through Sunday and offer brunch on weekends.
Find hours and more information at fiftywestbrew.com/brewpub.
View post:
Fifty West Brewing Co. reopening original Brewpub location in January - The Cincinnati Enquirer
Warming-induced tree growth may help offset increasing ... pnas.org
Go here to read the rest:
Warming-induced tree growth may help offset increasing ... - pnas.org
The Veracious Brewing Company brewery at 246 Main Street in Monroe, Conn. on Thursday, September 8, 2016.
Brian A. Pounds / Hearst Connecticut Media file photo
Veracious Brewing Company, the popular brewery known for its dog-friendly atmosphere and its offerings such as 29 Pews, closed its doors in June. Co-owner Mark Szamatulski said he would cherish the memories, but it was time to retire.
Szamatulski said another company was moving in and taking over the space. At first, he said he planned to look for a new location, but soon realized that wouldnt be possible. They wanted the whole building, and we were looking for a place to buy, but we couldnt find a place locally that we could get into, he said. And we made a financial deal with them to leave a little early. So it was fine for both us and them.
Veracious supplies were rehomed locally to small breweries in Connecticut, New Jersey and Massachusetts. - Eddy Martinez
Read more: Last call for Monroes Veracious Brewing Co.
The rest is here:
These are the Connecticut breweries that closed in 2022 - CT Insider
Comment Hype around liquid and immersion cooling has reached a fever pitch in recent months, and it appears that the colocation datacenter market is ready to get in on the action.
Recently, Zachary Smith, Equinix's global head of edge infrastructure services, told The Register that the outfit would like to offer customers more liquid and immersion cooling capabilities, but blamed a lack of standards for getting in the way.
"Can we use standard connectors for liquid-cooled loops? Can we put them in the same place? Can we label them the right colors so our techs know what to do with them?" he asked, listing the litany of questions a colocation provider like Equinix has to answer before it can support liquid-cooled systems more broadly.
The fact that colocation providers like Equinix are even talking about liquid cooling shows goes to show it isn't a niche tech suited only for exotic supercomputing applications.
And while the lack of standardization is unquestionably a roadblock, it's not an insurmountable one. Arguably the incentives for adopting liquid cooling tech, in any capacity, far outweigh any potential headaches that may arise in the process.
Equinix is certainly right about one thing: chips are only ongoing to get hotter. And at a certain point, air cooling high-end systems especially those aimed at AI and ML is going to become impractical.
Intel's and AMD's 4th-gen Xeon and Epyc processor families have thermal design profiles (TDPs) of 350W and 400W, respectively. Meanwhile, nearly every current and upcoming datacenter GPU and AI accelerator is pushing upwards of 600W a piece, with anywhere from four to eight of them being packed into a chassis. (For comparison, the CPU in a typical modern laptop has a TDP of under 20W and you know how warm they can get.)
But the situation isn't as dire as Smith would have you believe. Despite his claims to the contrary, 300W per socket isn't some magical point of no return where liquid cooling becomes a must-have. If it were, we expect the market would have taken off a lot sooner.
With that said, just because you can liquid cool something doesn't mean you should or even need to. For example, Iceotope recently demonstrated the use of immersion cooling on helium-filled hard drives. While cool in concept, as our sister site Blocks and Files recently reported, there's not really much point. Years ago, storage and backup services provider BackBlaze investigated the relationship between drive temperature and failure rate and found no correlation as long as the drives were kept within spec usually between 5C-60C.
Instead, the biggest problem for air-cooled datacenter operators is a structural one. It takes a lot of power to feed these systems with cool air fast enough to keep them from overheating. Hotter chips only exacerbate this problem.
According to analysts, upwards of 40 percent of a datacenter's power consumption can be attributed to thermal management. When every watt saved on cooling is cash back in your wallet it's not hard to see why datacenter operators might be interested in tech that lets them claw back even a fraction of that. And spoiler alert that's exactly what liquid and immersion cooling promises to do.
But rather than leaping straight to direct liquid cooling (DLCs) or filling datacenters with immersion cooling tanks, operators may want to start with something that doesn't hinge on customer buy-in.
Dell'Oro Group projects liquid and immersion cooling to grow from just 5 percent of the datacenter thermal management market to 19 percent by 2026. Meanwhile, research from Omdia shows that number to be closer to 26 percent.
Demand for air-cooled systems clearly isn't going away anytime soon.
That's not to say liquid-cooling tech can't be used with air-cooled systems. Take rear-door heat exchangers, for example. These are essentially big radiators that are bolted to the back of a rack. As coolant flows through the radiator, it pulls the heat out of the hot exhaust air exiting the servers.
The advantage of rear-door heat exchangers is they can be used to achieve much higher rack power densities than conventional air-cooled servers. This isn't some unproven technology either. California-based colocation vendor Colovore, for instance, has been using rear-door heat exchangers to cool racks up to 50kW for years.
More importantly, rear-door heat exchangers rely on the same infrastructure as DLC or immersion cooling tanks. Before any of these systems can be powered on, coolant distribution units (CDUs) need to be installed, racks need to be plumbed, and power-hungry air handlers need to be swapped for exterior mounted dry coolers.
Because this infrastructure can be shared, it becomes much easier to add support for direct liquid or immersion-cooled systems as the standards around them mature.
While half-measures or stop-gaps like rear-door heat exchangers may not be as sexy as pumping liquids through a chassis or immersing a motherboard in hydrocarbons, it arguably provides datacenter operators like Equinix a way to achieve higher-rack densities and cool hotter systems while they wait for the OEMs and equipment vendors to align on usable standards.
Read more from the original source:
As liquid cooling takes off in the datacenter, fortune favors the brave - The Register
GOOD Morning America host Robin Roberts has revealed where she has traveled to as she has been missing from the news program for weeks.
Robin revealed she's enjoying a peaceful vacation in Key West amid her co-stars TJ Holmes and Amy Robach's affair.
5
5
Robin's update comes It comes as she was reportedly furious about how the ABC network handled GMA3 stars TJ Holmes and Amy Robachs alleged affair, according toDailyMail.com.
However, the rumors Robin was frustrated were quickly quashed as a spokesperson announced: This is untrue about Roberts, and she is not involved in the situation.
Robin has taken an extended time off from hosting GMA through the holidays and in the wake of the scandal.
She revealed he has been relaxing in her "happy place" with her partner Amber Laign.
The GMA host took to Instagram to share a sunny photo of palm trees and a sparkling ocean.
One eager viewer commented on Robin's post: Cant wait for you and George [Stephanopoulos] to return in 2023.
Another shared: Enjoy your holiday! I miss you, George and Michael [Strahan] but you guys deserve vacation time. See you in 2023.
A third fan told Roberts that her sunset post looked amazing and said: Missing you this week in GMA.
Most read in Entertainment
Robin has shared several looks inside her winter vacation.
In one clip, she was riding a bike illuminated withChristmaslights.
Roberts said: Look what sweet Amber did!"
She added: Theyll see us coming - and pedaled off into the distance.
Although fans were stunned by the journalist wearing flip-flops and shorts.
One viewer said: Thats one thing on my bucket list - to wear shorts and flops for Christmas.
Another commented: I know you are not inNY, its 12 degrees here.
A third fan said: Unfortunately, I cant wear shorts and bike in my hometown."
Meanwhile, Robin isn't the only star taking time off from GMA after the scandal.
George and Michael are additionally missing from their host duties.
Their stand-in hostsJanai Norman,Gio Benitez, and Mary Bruce have a harsh review of their performance from viewers.
Tuesday morning onGMA, Janai, Gio, andMaryreported on various topics including the winter storms, relationships and even fitness.
However, one harsh critic wasn't pleased with the fill-ins' performances.
"These people filling in for the regulars are annoying as f**k!" they tweeted.
Usually, fans go wild overGio's glowing personalityon television, although fans were not impressed with his dance moves today.
In the fitness section, Gio tries to get his hips involved while busting some dance cardio moves.
One fan Tweeted: "Nice try, Gio."
GMAhas utilized fill-in hosts for the past several weeks asRobin,George,Michael, andLaura Spencerhave mysteriously been absent.
Now fans have also taken toTwitterto express their frustration as they urge the network to address the situation regardingAmyandTJ's affair.
"When will we see Amy Robach and TJ Holmes again? Who cares if they hooked up?" one person raged at the time.
"They are cute together. Dont let it ruin their careers. Let us see more of them."
Robin, Laura, and George have been on hiatus from the show surrounding the holiday and amid the shocking scandal involving the two GMA3 hosts.
Sources have revealedtension behind the scenesas the program navigates its direction after the affair was revealed.
Amy and TJ, whose affair was outed last month, are planning to spend New Years Eve together inGeorgiaafter a tumultuous end to 2022.
In photos obtained byDaily Mailon Monday,TJ, 45, andAmy, 49, looked cozy as they navigated Atlanta airport the day after Christmas.
The couple landed in Georgia, where TJ owns a home.
Amy and TJ are rumored to be celebrating New Years Eve there, althoughit hasn't been confirmed where they spent Christmas Day.
They had plans to be at TJs Atlanta home already, but their plans were derailed - possibly by thecyclonethat has grounded thousands of flights.
5
5
5
View post:
Cloud services do not offer enough power for latency-intensive next-gen applications like AI, machine learning, robotics, smart cities, and automated manufacturing. These applications require faster computational speed than allowed in a centralized public cloud location. Edge offers a much faster computational speed with greater reliability and data processing in distributed locations closer to where data is generated, says Steve Grabow, SVP of Lumen Technologies.
The move to the cloud brought an interesting benefit for savvy business leaders: Freedom and focus, allowing them to get in an innovative state of mind. Rather than only operating an IT infrastructure, business innovators found the cloud freed them up to focus on developing innovative new applications.
The cloud also helped businesses double down on innovation. With the cloud, they could make critical applications available to personnel regardless of their location. It helped with cutting costs and consolidating valuable data.
But innovation wont stay only in the cloud alone. The next direction for these innovators to go is to the edge recognizing its the next frontier for innovation. They will move there for speed but garner a range of other benefits. While the cloud remains a great option for hosting many applications and workloads, it may not be the best place for many of todays latency-sensitive, interaction-intensive applications. Heres why.
Artificial intelligence, machine learning, robotic automation, and video analytics require near real-time data processing. We are talking about tremendous amounts of data that must be acquired, analyzed, and acted upon nearly instantly to produce the desired outcome.
This is where edge computing comes into play. Integrating edge computing with cloud computing offers faster data processing for these next-generation applications. Here is why the edge is where its all about.
With edge computing, companies can shorten the physical distance that data needs to travel to reach a public cloud location or on-premises data center, resulting in reduced latency. A large, centralized data center could be hundreds of miles from where data is produced and collected. Edge computing allows businesses to place computing and storage where digital interactions occur. Edge devices can collect, process, and store data in a more distributed fashion than the cloud alone, leading to quicker response times and reduced latency.
There are other benefits to shortening the distance data needs to travel, and that is improved security. Security remains a top priority for global IT decision-makers. 80% are concerned about data security. By physically isolating data, applications, and other resources at the edge, customers can achieve more privacy and security than the cloud. This reduces risk and allows businesses to support industry-specific regulatory or compliance requirements better.
Many edge devices include built-in security capabilities that protect data that lives or transports through devices and out of centralized data centers. As the data lives at the farthest reaches or edge of a companys network, it becomes easier to isolate and protect key data sources allowing autonomous operations to avoid disruption.
The idea behind edge computing is beautifully simple: When you cant get your data closer to your data center, you move your data center closer to your data. Think about it, applications that would power robotics dont have time to travel to the public cloud to get the needed performance. Applications that require high volumes of interactions, like streaming analytics, are subject to costly fees for moving that data in and out of the cloud.
Enter edge data centers, which can facilitate much faster response times. 77% of global IT decision-makers say that only edge computing can solve their latency challenges, and 56% say that their mission-critical applications will require five milliseconds of latency or less in the coming years. Thats because data flow must be seamless and data processing lightning fast to enable things like cashier-less checkout at retail or robotic automation on the manufacturing floor. If a system or application takes too long to respond or put in place an action, the result will be a poor customer experience.
Edge computing can deliver that ultra-low latency and improved reliability. Processing data locally at the edge also reduces the traffic flowing to and from central servers, which can cut those costly data transfer fees and improve overall network performance.
See More: 4 Reasons Why Enterprise Innovation Will Come From the Cloud
Cloud computing and edge computing are distinct but complementary. However, a central cloud often cant provide the performance, low latency, and scale businesses need for their next-generation applications. A more agile, distributed environment that extends the cloud is now necessary.
Edge computing brings a unique combination of local computing and storage with built-in security and unified orchestration. Businesses can still manage applications with similar ease as the cloud but achieve reduced latency and better performance.
This does not mean that the edge replaces the public cloud or data centers. Rather, the edge is an additional place to run workloads when it makes sense and when end users can benefit from more speed.
According to Gartner, enterprise-generated data processed outside a traditional data center or cloud will jump to 75% by 2025. On their own, more than cloud services are needed to manage this growing amount of data. Businesses are grappling with creating better ways of acquiring data, analyzing it for insights, and acting upon it to drive a specific outcome. With edge computing, businesses can bring millions of smaller cloud environments closer to billions of connected devices to do more with their data.
Driving unique digital experiences is how businesses compete and win. And at the heart of those digital experiences is data. Innovators will lead the way to the edge. Future-ready businesses will be prepared at the edge for the data-intensive applications of the 4th Industrial Revolution.
Why do you think data will require edge and cloud in the future? Let us know on Facebook, Twitter, and LinkedIn.
Original post:
Double Down On Innovation With Edge Computing | - Spiceworks News and Insights
Sponsored Feature Sovereignty has traditionally been defined as the ability for a state to rule itself and its subjects, and it's been on the agenda since civilisation began. But only recently has digital sovereignty - the ability to control and make decisions about your own digital assets emerged to become an issue in its own right.
"Broadly speaking, digital sovereignty means having control of your digital destiny," explains Tim Phipps, director of cloud alliances at French technology group Thales. "One level below that, it means that you're in full control of the software and the hardware and the data that your business relies on."
Having control of your digital destiny might not have seemed important when all IT did was run a batched payroll. Today, when companies live and die based on their use of technology which spans multiple devices, systems, applications, workloads and hosting locations, it's a much bigger deal.
It's a particular problem for companies using cloud service providers that don't tend to keep their data in one place anymore. Over 90 percent of organisations now have a multi-cloud strategy according to a recent Thales Threat Report. It also found companies mixing these multi-cloud environments with on-premises and collocated data centre operations, muddying the waters further.
That presents a number of challenges, including the costs involved in managing multiple encryption key stores and management processes as more data moves into the cloud for example. That means organisations often have to employ different teams to run different key management solutions (a recruitment challenge in itself). They also run the risk of extending the attack surface for hackers by fielding a series of disjointed data security solutions each of which operates differing security policies and processes.
Like the internet itself then, digital sovereignty sounds simple enough but is a deceptively complex concept with many moving parts. To help organisations fully understand and address these challenges, Thales breaks sovereignty down further into three elements: data, operations, and software.
Data sovereignty
Data is what many people think of first when they hear the term digital sovereignty. This is a state's ability to protect its own data, and that of its citizens, from intrusion by other states. This has been a defining issue at the heart of internet governance during the last two decades.
"The thing that nations were concerned about, especially in Europe, was that a lot of that cloud providers (or hyperscalers) are all American," Phipps points out. "There were all sorts of concerns around these US spy laws."
The Patriot Act included language that granted US authorities possible access to cloud service providers' business records, which Microsoft later admitted put the privacy of non-domestic customers' records in jeopardy if the US government asked for them. The CLOUD Act, introduced in 2018, later solidified government investigators' ability to obtain files from companies processing data on foreign soil.
At the same time, there was an ongoing tussle with privacy advocates over data sharing between US and European companies. The Safe Harbour provision allowed US companies transfer to data from EU partners to the US if they promised to abide by several privacy principles. Privacy advocate and lawyer Max Schrems challenged this provision in 2015, which led to it being struck down and eventually replaced with the EU-US Privacy Shield agreement. Schrems challenged that, too, and it was declare invalid in 2020.
Now, the EU and US are taking a third stab at it with the Trans-Atlantic Privacy Framework. A draft adequacy decision, that attempts to replace the "Privacy Shield Decision" that was subsequently invalidated by Schrems II, has very recently been published by EU.
Initial feedback from privacy advocate Max Schrems is that the draft decision is almost wholly based on the known Executive Order that was previously thrown out. The expectation is that Max Schrems' team is likely to challenge this in the European Courts. Consequently, companies on both sides of the Atlantic remain unclear about what happens next and this can cause digital transformation projects to stall.
Phipps recommends that organisations put appropriate controls in place to protect their digital assets, so that they can own their own data sovereignty and speed up their journey to the cloud independently of geopolitical change.
However, this can present a considerable challenge in a multi-cloud and hybrid environment. Almost one in five respondents to the Thales survey said that they did not know where all their data is stored. Around half said that managing their sensitive data in multi-cloud environments is more difficult than looking after it on-prem. It's a situation that can have grave ramifications. The Thales survey also found 35 percent of respondents suffered data breaches or failed audits of cloud-based data and applications in the last year.
Operational and software sovereignty
The second class of digital sovereignty is operational, Phipps continues. "This is where you've got your data in the cloud and you're worried about an insider threat or bad actors," he says. "That could be a cloud engineer, but it could also be your own people." A rogue employee intending to seek personal financial gain, could pilfer your data, as could a disgruntled worker of your own, potentially at the behest of a third party.
The threat to operational sovereignty might also appear in the form of malware, a corrupted application, or ransomware that has harvested the login credentials of a privileged user to gain escalated access to sensitive data or systems.
Finally, Thales lists software sovereignty as an issue for companies. "This is the ability to run your workloads wherever you want," Phipps says.
Companies increasingly want choice when they go to the cloud. They might want to run most of their workloads with a specific cloud provider to get improved commercial terms, he explains. But regulators are concerned that, if there's no possibility to perform a controlled and prompt stressed exit, those companies are effectively putting all their eggs in one basket. Organisations are being encouraged to ensure that their mission critical workloads are secure and portable which helps ensure operational resilience and business continuity should something go wrong.
For example, the Bank of England's Prudential Regulation Authority, which succeeded the Financial Services Authority, has expressed concern over banks' reliance on cloud computing from a single vendor. It recommends that Financial Services Institutions adopt multi-cloud architectures to spread risk and avoid vendor lock in, whilst the Digital Operational Resilience Act (DORA) in the EU advocates a similar approach.
Consequently, banks are under pressure to share their workloads around and have backup cloud providers that they can switch to in the event of an outage or a breakdown in the relationship.
Protecting digital sovereignty in practice
Thales has made a business of supporting these various sovereignty requirements. It uses a four-step process to get its clients onto a positive footing where they feel completely in control of their own data, operations, and software.
The company begins with a process of discovery. You can't control what you don't know about, after all. So it seeks to answer the questions: Where is your data and what is it? How sensitive is it?
Many organisations don't know these basic facts, says Phipps. They're generating new data all the time, and it's no longer simply a case of classifying database records in known fields. "Increasingly, a lot of the sensitive data that's been generated is unstructured and appears in random locations," he posits. Increased cloud adoption and modern remote work policies have contributed to 2.5 quintillion bytes of new data being generated every day in emails, presentations and spreadsheets according to some estimates. Without outside help, it's much harder to track the location of the sensitive information those vast volumes contain.
To that end, Thales developed its Data Discovery and Classification (DDC) solution, which scans for specific data types according to compliance models in which the organisation is interested. DDC uses machine learning algorithms, and a reference library of pre-defined data privacy and regulatory templates such as GDPR, CCPA, LGPD, PCI DSS and HIPAA, to find sensitive data of interest and apply a risk score based on the client's policies and compliance. DDC can then recommend manual remediation or apply it automatically which saves time and helps minimise the attack surface.
Protection through multi-layered encryption
What does this remediation look like? This is where the second step of Thales' methodology - protection - comes in. This focuses mainly on multi-layered encryption, which it splits into three types: data at rest, in transit, and in use.
As Phipps points out, all major cloud providers encrypt data at rest by default. However, there's a caveat: many of them only encrypt it at the disk level. That may stop someone retrieving the data in the unlikely event that they steal a physical disk from the cloud data centre, but what if they hijack someone's account remotely? Few, if any, cloud providers automatically encrypt data above the disk level such as at the file, database, or application level, which can help mitigate this threat.
Thales provides solutions to encrypt data at multiple levels, including structured and unstructured data, to achieve defence in depth. Transparent encryption at the file level protects the entire database for around a two percent performance overhead, Phipps says. Clients can apply higher levels of encryption to specific fields in the database should they wish.
While that imposes an extra performance overhead, it also provides heightened levels of protection where needed. Security, compliance and performance are often subject to trade-offs. The key is to adopt a risk-based approach to ensure that the protection appropriately applied is based on desired business outcomes.
When it comes to in-transit encryption, TLS is the de facto standard. However, Phipps argues that this can often struggle under the huge volumes of data that some companies process in the cloud. Instead, Thales offers high-speed encryption in its Network Encryptor products, which Phipps says are faster than TLS and offer a higher degree of protection.
Thales also focuses on encryption of data in use, which fights tampering or snooping during cloud processing. "We've been speaking to some critical infrastructure providers like energy companies, and they're worried about running sensitive workloads in the cloud for safety critical applications," Phipps says. "If somebody injects some malware into a chip that is processing data, they could effectively perform a denial of access and take the whole system down."
To combat this, cloud providers are working on various confidential computing initiatives. In these services, a portion of the chip becomes a secure enclave under the customer's control rather than the cloud service provider's. Microsoft Azure, Google Cloud and AWS all have offerings here.
Maintaining data sovereignty in the cloud
The third strut of Thales' digital sovereignty service is control. Leaving those encryption keys in the cloud theoretically puts them under the cloud service provider's control, which is a clear threat to the customer's sovereignty. This renders the customer vulnerable to malicious behaviour or mistakes from a third party such as the cloud service provider's own support engineers. It also puts the data at risk in the event of a subpoena from a foreign state.
The solution to this threat lies in the separation of duties. Creating and storing encryption keys outside the cloud, separating them from where the sensitive data is stored, gives the customer ultimate control over the data. Should a threat to the data arise, the customer can withhold the keys. Because the cloud service provider cannot unilaterally access those keys, they cannot be compelled to hand over the data to a third party.
Some cloud providers have introduced services that allow customers to store their own keys for cloud-based workloads, creating a clear segregation of duties between cloud service provider and customer. Google Cloud's External Key Manager (EKM) is a case in point.
Thales has been working with Google Cloud to help customers manage control of their data, operations, and software while still enjoying the benefits of cloud computing. In December 2020, they worked to integrate Thales' CipherTrust Key Broker service with Google Cloud's EKM. This enables customers to generate their encryption keys for Google's cloud service while keeping the keys outside the Google Cloud environment.
Since then, the two companies have expanded the partnership to cover other services. In June 2021, CipherTrust Manager and Thales' SafeNet Trusted Access product were integrated to support client-side encryption for Google's Workspace service for example. This lets organisations encrypt Google Drive data using their own keys.
In the last year, they've also collaborated on a cloud-based platform that complies with the French government's Trusted Cloud label. This requires cloud service providers to host their servers in France and allow only European companies to operate them, while limiting data transfers to other countries. In addition they're developing a Trusted Cloud-compliant service, scheduled for release in 2024. In the meantime, Thales majority owned joint venture with Google Cloud, S3NS, is already enabling Google Cloud customers in France to restrict access to EU locations, with the help of its own key management services.
Unifying cloud operations and key management while keeping keys under customer control solves one of the biggest problems in cloud security: the complexity of key management. The Thales survey found 57 percent of companies using at least five separate key management solutions, increasing the complexity and cost of managing data encryption. Aggregating and simplifying this key management will become steadily more critical as companies manage sensitive data in an increasingly distributed environment.
Monitoring digital sovereignty over time
As companies continue to expand their digital assets across complex multi-cloud and hybrid environments, they need a way to maintain visibility. This is where the final part of Thales' digital sovereignty process comes into play: monitoring. The company's CipherTrust platform, currently available as an on-premise product but soon to be launched as a service, provides a single pane of glass view of digital sovereignty across all of their tools and processes in multi-cloud and hybrid cloud environments. The system provides access to a range of third-party products alongside Thales' DDC.
Digital sovereignty principles and practices will only become even more complex over time, says Phipps. That's why he emphasises the benefits of building in privacy by design into hybrid multi-cloud architectures. Phipps also advocates the need for building human relationships based on trust and empathy that seek to maximize the customer experience.
"Technology on its own without the right partnerships at an advisory and supplier level probably won't make it easier for the customer to understand how to move forward," he concludes. This is a difficult puzzle to unravel, and it takes third-party expertise, and a partnership approach, to do it properly.
Sponsored by Thales.
See original here:
Simplifying digital sovereignty in a multi-cloud world - The Register
ReportLinker
In addition to assisting with other business operations, corporations employ information technology (IT) services to create, manage, and deliver information. Services include hardware deployment, training, consulting, software development, and systems integration.
New York, Dec. 21, 2022 (GLOBE NEWSWIRE) -- Reportlinker.com announces the release of the report "Global IT Services Market Size, Share & Industry Trends Analysis Report By Type, By Enterprise Size, By Industry, By Regional Outlook and Forecast, 2022 - 2028" - https://www.reportlinker.com/p06374139/?utm_source=GNW Outsourcing, managed services, security services, data management, and cloud computing are some of the areas that make up the overall market for IT services.
Generally, an industry companys profitability depends on its capacity to develop its technical know-how and improve its services. Both smaller and larger businesses can compete in this sector. While larger businesses tend to offer a wider range of services and have a global presence, smaller businesses typically target specialized markets and cater their products more closely to the demands of their target audiences.
Cloud computing, which stimulates IT-related innovation, is the section of IT services that are developing at the fastest rate. Some IT services, such as hardware installation, support, and maintenance, are frequently outsourced on demand since they frequently involve replacing or repairing out-of-date equipment.
Consumer hardware will be properly disposed of by a qualified provider, who will also format hard drives to remove all potentially sensitive data. Computers, hard drives, printers, modems, and routers that the company needs to run smoothly are typically installed by IT departments. On the other hand, there is a constant need for repairs anywhere there is a ton of hardware equipment. Error troubleshooting is a part of the repair.
COVID-19 Impact Analysis
In recent years, the interconnection of the global economy has increased substantially. Indicators of the negative effects of various containment-related actions such as Disruptions in the global supply chain, a decline in demand for imported products and services, and an increase in the unemployment rate. The financial market has grown more volatile as a result of historically low-interest rates, huge decreases in equity and commodity prices, and heightened risk aversion. Most organizations have stabilized and enhanced their infrastructure to improve operations and facilitate operations during the pandemic.
Market Growth Factors
Demand for cloud-based it services is growing
The majority of businesses and industries have replaced on-premises software with cloud-based software. The cloud-based software enables access to all enterprise applications at a reasonable cost and without requiring a significant initial investment in software or hardware. Similarly, the adoption of cloud computing facilitates the expansion and contraction of commercial operations. Consequently, cloud-based IT services have become a more advantageous and cost-effective option for SMBs in recent years. In addition, cloud computing provides SMBs with new business possibilities and opportunities.
Increased Investment Return With Reduced Infrastructure And Storage Costs
The initial implementation and ongoing costs of hosting data on-premises are a problem for businesses. In addition, labor expenses and downtime difficulties are additional challenges for businesses. Existing rivalry and global economic conditions have hastened the adoption of cost-effective business model restructuring strategies. Increasing enterprise embrace of digital transformation and speeding customer experience are other drivers driving the growth of cloud computing services, which eventually reduce enterprise costs.
Market Restraining Factors
Insufficient Standardization
The effectiveness of IT services in businesses depends on a variety of criteria and varies significantly between firms. Similarly, each organization is unique and, as a result, utilizes specialized technologies to satisfy its distinct business needs. Due to the lack of standardization, it is difficult for businesses to assess the viability of IT services based on the success rate of the same technology in another organization. A typical IT service setup may cost up to $75 to $300 per user. Insufficient IT services may therefore place a significant cost strain on enterprises.
Type Outlook
Based on the Type, the IT Services Market is segmented into Security Outsourcing, IT Support, Managed Security Services, Systems and Network Implementations, and Security Strategy and Planning. The security outsourcing segment witnessed a significant revenue share in the IT services market in 2021. The prevalence of cyberattacks, which is constantly rising, is a major worry for business owners everywhere. In-house IT security is more expensive than security outsourcing. As a result, small and medium-sized organizations typically choose to contract out their security needs.
Industry Outlook
On the basis of Industry, the IT Services market is segmented into BFSI, Telecommunication, Healthcare, Retail, Manufacturing, Government, and Others. The Telecommunication segment recorded a substantial revenue share in the IT services market in 2021. Communication service providers were confronted with pertinent issues associated with the optimization of an existing company and the hunt for new niches to offer innovative services. The market shifts fundamentally owing to alterations in the nature and methods of providing new services.
Organization Size Outlook
By organization size, the IT Service Market is divided into Large Enterprises and Small & Medium Enterprises. The small & medium enterprises segment registered a significant revenue share in the IT services market in 2021. It improves small businesses competitiveness, operational efficiency, and growth. Internationally, company executives are placing a larger focus on the adoption of information technology to develop dynamic capabilities.
Regional Outlook
Region-wise, the IT Services Market is analyzed across North America, Europe, Asia Pacific, and LAMEA. The Asia pacific segment acquired a promising growth rate in the IT services market in 2021. The increase in IT service spending by businesses in the Asia Pacific region coincides with COVID-19 accelerating digital transformation and the shift to the cloud and a record-high level of demand for IT services globally. The majority of businesses in the Asia Pacific region have expanded their investments in cutting-edge technology to quickly implement and respond to market changes.
The major strategies followed by the market participants are Partnerships. Based on the Analysis presented in the Cardinal matrix; Accenture PLC and IBM Corporation are the forerunners in the IT Services Market. Companies such as Tata Consultancy Services Ltd., Infosys Limited and Capgemini SE are some of the key innovators in IT Services Market.
The market research report covers the analysis of key stake holders of the market. Key companies profiled in the report include Microsoft Corporation, Accenture PLC, Tata Consultancy Services Ltd., Cognizant Technology Solutions Corporation, Wipro Limited, HCL Technologies Ltd. (HCL Enterprises), Capgemini SE, IBM Corporation, Infosys Limited, DXC Technology Company, and NTT Data Corporation.
Recent strategies deployed in IT Services Market
Partnerships, Collaborations & Agreements
Oct-2022: DXC Technology formed a partnership with Dynatrace, which provides a software intelligence platform based on artificial intelligence and automation. Under this partnership, Dynatrace Software Intelligence Platform would become the selected DXC Platform X software for monitoring and artificial intelligence-powered automated management of a consumers IT estate. Moreover, the addition of Dynatrace, with its cooperative and smart view across software products and technologies, helps reinforce predictive AIOps abilities and drive cost optimization.
Oct-2022: Capgemini joined hands with Microsoft Corporation, an American multinational technology corporation. Together, the companies aimed to provide a first-of-its-kind, serverless, cloud-native, Azure-based digital twin platform, known as ReflectIoD. Additionally, ReflectIoD is a safe, highly scalable platform that would utilize best-in-class architecture and technological features from the Azure portfolio to assist transform an organizations procedures and maintenance effectiveness, allowing intelligent industry and operating sustainable business value.
Oct-2022: Accenture partnered with Google Cloud, an American multinational technology company. This partnership aimed to increase their respective talent, increase their joint abilities, create new solutions utilizing data and AI, and deliver improved support to help customers build a strong digital core and reimagine their companies on the cloud. Moreover, Cloud presents boundless opportunities for companies to be more creative and resilient.
May-2022: NTT DATA joined hands with NTT, a completely owned subsidiary of Nippon Telegraph and Telephone Corporation. Through this collaboration, the companies aimed to integrate their system connectivity capabilities with NTT Ltd.s Edge to Cloud service operation abilities. Moreover, the integration would allow the business to combine IT services and Connectivity and react to increasingly complicated and various client needs on a global level by centrally creating a service offering necessary for digital transformation.
May-2022: IBM joined hands with Amazon Web Services, which provides on-demand cloud computing platforms. Through this collaboration, the companies aimed to provide IBM Software-as-a-Service on AWS. However, the presence of the IBM SaaS portfolio on AWS would permit businesses to concentrate on providing clients value without concern about IT infrastructure management, allowing innovation at a faster clip.
Mar-2022: Cognizant joined hands with Microsoft, a technology corporation creating computer software. Through this collaboration, Cognizant aimed to improve its Multiphase Solutions Rollout, helping its expanding healthcare practice and capability to modernize payers and suppliers with digital abilities.
Mar-2022: HCL Technologies signed an agreement with NEORIS, a global digital accelerator that co-creates disruptive solutions. This agreement would bring special abilities to customers in global markets, including the capabilities to improve application utilization time, business management operations, and combined IT services. Additionally, the companies aimed to boost up digital transformation, reduce risks, assign teams based on product development, develop a zero-incident culture and save expenses.
Feb-2022: HCL Technologies partnered with VMware, an American cloud computing and virtualization technology company. This partnership would expand its Cloud Smart portfolio of services powered by VMware technology to include support for VMware Telco Cloud 5G Core and VMware Telco Cloud RAN. Moreover, this collaboration would provide combined solutions for service providers across the world.
Dec-2021: NTT DATA teamed up with AWS, a subsidiary of Amazon. Together the companies aimed to utilize their proven track record and high delivery abilities in Japan to establish a supreme position in digital business, advance their enterprise on a global scale, and contribute to business development for their clients. Moreover, NTT DATA would reinforce a framework to support customers that consider shifting their IT infrastructure to the cloud.
Nov-2021: Wipro Limited came into a partnership with TEOCO, a privately owned telecom software vendor. Through this partnership, the companies aimed to create solutions that help communication service providers (CSPs) enhance network automation, efficiency, flexibility, and dependability. Moreover, TEOCO would help CSPs create a cooperative process to ensure service quality, network performance, and defect management, eventually allowing the rapid adoption of next-generation services.
Dec-2021: Wipro partnered with HERE Technologies, the location data, and the technology platform. This partnership would deliver location-based services, to customers from Telecom, Energy & Utilities, Transport & Logistics, Manufacturing, and Automotive industry verticals.
Nov-2020: Tata Consultancy Services came into a partnership with Zoho, a developer of web-based business tools. This partnership aimed to deliver premium IT Service Management, Customer Relationship Management, and e-Commerce solutions to solve issues for large companies. Additionally, Partnership would deliver end-to-end business solutions to global businesses and mid-market enterprises.
Jun-2020: NTT DATA joined hands with Microsoft, an American multinational technology corporation. Under this collaboration, companies aimed to combine NTT DATAs best-in-class global IT services with Microsofts authorized cloud platform, AI technologies, and offering of productivity tools aimed at supporting business digitally transform, growing efficiencies of business productivity and procedures.
Mergers & Acquisition
Oct-2022: Accenture completed the acquisition of Stellantis, World Class Manufacturing Training & Consulting Business. This acquisition would reinforce Accentures abilities in business process optimization. Additionally, the acquisition permits Accenture to combine the World Class Manufacturing (WCM) process in its solutions that permit clients to convert their manufacturing process and supply chain networks to be more endurable, efficient, and robust.
Sep-2022: Accenture took over The Beacon Group, a growth strategy consulting firm serving Fortune 500 corporations. This acquisition would enhance Accentures abilities that permit C-suite leaders to make fact-based conclusions for segmentation, targeting, and ways to growth powered by market insights and flexible solutions to manage enterprise transformations at scale.
Sep-2022: IBM completed the acquisition of Dialexa, a foremost digital product engineering consulting service. This acquisition would improve IBMs hybrid cloud and AI abilities, and boost growth for customers. However, the acquisition is expected to enhance IBMs product engineering expertise and provide end-to-end digitalization services for consumers.
Apr-2022: NTT DATA completed the acquisition of Business Services and Technologies OOD, one of the foremost SAP service providers. This acquisition aimed to improve flexibility and scalability in international shoring systems in consulting and managed services and highlight the claim of multinational capacities, and local proximity. Under this acquisition, NTT is developing its shoring portfolio in the European Union.
Feb-2022: IBM completed the acquisition of Neudesic, a foremost U.S. cloud services consultancy. This acquisition would significantly expand IBMs offering of hybrid multi-cloud services and further enhance the companys hybrid cloud and AI strategy. Moreover, Neudesic brings deep Azure data engineering, cloud, and data analytics expertise to boost customers hybrid cloud journeys.
Mar-2021: Accenture acquired REPL Group, a U.K.-based technology consultancy. This acquisition aimed to expand Accentures abilities that help customers across retail and adjacent industries transform their supply chains and procedures and provide seamless consumer and employee experiences. Moreover, REPL utilizes its deep retail expertise, along with cutting-edge technology skills, to support global businesses and provide sustainable value.
Mar-2020: Infosys completed the acquisition of Simplus, one of the fastest-growing Salesforce Platinum Partners. Under this acquisition, Infosys further advances its standing as an end-to-end Salesforce enterprise cloud services and solutions provider, delivering clients unparalleled abilities for cloud-first digital transformation.
Product Launches & Product Expansion
Mar-2022: HCL Technologies introduced Quality of Experience (QoE) and Energy Savings applications, new 5G applications to help mobile network operators optimize the customer experience. The applications improve network performance in places with high traffic congestion, such as city centers and large sporting events, HCLs QoE application enables mobile network operators to deliver seamless, fast, and dependable 5G services, by utilizing artificial intelligence (AI). Additionally, HCLs Energy Savings application decreases the operating costs of providing 5G, utilizing AI-based network automation abilities.
Dec-2021: Wipro introduced VisionEDGE Solution, a digital signage and omnichannel ad solution. The Wipro VisionEDGE delivers a centralized platform for innovation and enables brands to control and stream content to heighten consumer attention. Moreover, Wipro VisionEdge would utilize the potential of Wipro FullStride Cloud Services to provide customers the capability to unlock new enterprise value from their brand belongings and develop new income streams.
Apr-2021: IBM introduced revamped model ESS 5000, the IBM Elastic Storage System (ESS) family of high-performance solutions that are highly flexible and developed for easy deployment. The ESS 5000 provides 10% greater storage ability and the new ESS 3200 which delivers dual the read performance of its prototype.
Scope of the Study
Market Segments covered in the Report:
By Type
Managed Security Services
Security Outsourcing
IT Support
Systems & Network Implementations
Security Strategy & Planning
By Enterprise Size
Large Enterprises
Small & Medium Enterprises
By Industry
BFSI
Telecommunication
Healthcare
Retail
Manufacturing
Government
Others
By Geography
North America
o US
o Canada
o Mexico
o Rest of North America
Europe
o Germany
o UK
o France
o Russia
o Spain
o Italy
o Rest of Europe
Asia Pacific
o China
o Japan
o India
o South Korea
o Singapore
o Malaysia
o Rest of Asia Pacific
LAMEA
o Brazil
o Argentina
o UAE
o Saudi Arabia
o South Africa
Visit link:
ST. CLOUD St. Cloud Crush Hockey will be hosting two hockey games in remembrance of Charlie Boike, a 17-year-old Technical High School student who died in a car accident Dec. 10 on his way home from his high school hockey game.
The games will take place on Dec. 30 and "will transform the annual battle between cross-town rivals St. Cloud Crush and St. Cloud Cathedral into a celebration of Charlies impact on both teams, their families, and the community," said the St. Cloud Crush Boys Hockey Booster Club in a press release Thursday.
A junior varsity game will start at 3 p.m. and the varsity game will start at 7 p.m. at the St. Cloud Municipal Athletic Complex.
There is no better way to celebrate Charlies approach to life than his friends and teammates competing in the arena that houses so many fond memories, said St. Cloud Youth Hockey Association President Jared Smith.
More:Tech High School hockey player dies in rollover crash
Community members are asked to wear white clothing to the game in celebration of Boike's life and impact. The first 1,000 attendees will receive a commemorative t-shirt at the door.
You can buy tickets to the games at the door or online at http://www.stcloudmac.com.
A GoFundMe started to support the Boike family surpassed $57,500 as of Thursday morning, exceeding the family's initial $10,000 goal. According to a post on the site, the family is planning to create a Charlie Boike Memorial Fund that will help others play hockey, whether it be with equipment, registration costs, team fees or more.
"They hope to help as many kids experience the sport that meant so much to Charlie and so much to the entire Boike family," wrote organizer Amber Hedin, speaking on behalf of the family. "They want to have Charlie live on (through) so many as they take the ice."
Becca Most is a cities reporter with the St. Cloud Times. Reach her at bmost@stcloudtimes.com. Follow her on Twitter at@becca_most.
Support local journalism. Subscribe to sctimes.com today.
More:
St. Cloud hockey games scheduled in honor of player killed in crash - SC Times