Google, AWS Boast 6x Energy Efficiency Over Average Data Centers
Many global companies have begun to tackle climate change by investing in on-site renewable energy. While Google, AWS and Microsoft Azure are large purchasers of renewable energy and renewable energy credit offsets, these cloud computing leaders are also tackling climate change by reducing their overhead energy consumption. To be sure, energy efficiency is an often neglected yet incredibly important piece of climate change action. While data centers as a whole have become more efficient over time, hyperscale data centers have outpaced smaller data centers in energy use reduction.
Alongside the rise in cybersecurity positions has been a rise in cybercrimes, with the largest cyber crimes ever being the LinkedIn breach causing the loss of 700M records in 2021, and the 2022 Shanghai police data breach of one billion records that we expand on more in this newsletter. What is responsible for the worldwide rise in cybercrimes? It appears that crime levels have risen due to remote work because of the COVID pandemic and increased IOT device connectivity, increasing the number of attack vectors by which hackers can gain entry into company systems.
Flash Memory Summit returned to in-person and was well attended with many breakout sessions and keynotes filled to standing room only. Companies highlighted new products and innovation and attendees embraced the opportunity to network with old and new friends and colleagues.
Highlights:
SNIA won the Most Innovative Memory Technology Award and their Computational Storage Technical Work Group Received an Award for Computational Storage Architecture and Programming Model
Splunk, AWS and Symantech are the leaders in the new Open Cybersecurity Schema Framework (OCSF) that was revealed last week at BlackHat USA 2022. The Open Cybersecurity Schema Framework is an open-source project, delivering a framework for developing schemas, along with a vendor-agnostic core security schema. Vendors and other data producers can adopt and extend the schema for their domains. Data engineers can map differing schemas to help security teams simplify data ingestion and normalization, so that data scientists and analysts can work with a common language for threat detection and investigation.
Tuesday, May 17
The first in-person NAB Show since 2019 was quite a success this past weekend in Las Vegas, NV. 52,468 attendees visited the Las Vegas Convention center to see the newest advancements in media, film, software, storage and ancillary industries. Cloud integration stole the show, with the entertainment and media industries needing to share and upload 4K/8K content taking center stage, alongside media archiving for data management and storage.
Thursday, February 17
Assisted and Self-Driving Vehicles are Mobile Datacenters
5-20TB of Data Will Be Consumed Per Day Per Vehicle
The evolution of cars to assisted and self-driving creates the need for cars to serve as mobile data centers with the computing power to process data in real-time. Managing this data effectively and quickly creates new challenges for the enterprise storage industry.
“For decades, most of the electronics on a car were encased in electronic control units, segmented by function such as braking and infotainment. As more safety features were added and centralized, they were organized by distinct software stacks and automotive OSes based on different domains communicating with each other through a centralized gateway, which is what most new vehicles use today.
Monday, January 24
Cybersecurity is a people problem, driven by our perception of risk. Tools help. In fact, tools are incredibly necessary but tools are also only as good as the people implementing them. Also, the work culture has a huge impact on behavior because employees tend to gravity toward the middle of the group, modeling their behavior to fit in, and be accepted as part of the team – for better or worse from a security best practices standpoint.
67% of security breaches are due to human behavior, not the failure of tools.
People have to digest a lot of information and success often means navigating that information efficiently, making decisions quickly – like to avoid getting in an accident on the freeway. But, that quick decision-making is not helpful during a cyberattack.
Monday, January 10
Ameca is said to be the world’s most advanced humanoid robot. CES attendees have the unique opportunity to view and interact with Ameca up close. This robot looks like a person, with facial features that move and flex to indicate expressions and mimic emotion and eyes that accurately track movement. Engineered Arts designed Ameca with as realistic facial features as possible to help scientists and engineers study and improve human-robot interactions. People connect by reading facial cues, so having a robot with life-like expressions and responses is expected to be beneficial in hospital and hospitality uses where communication interactions are integral to success.
Wednesday, January 12
The semiconductor chip shortage highlights a major infrastructure problem for the US – 75% of semiconductors are manufactured in Asia. Twenty-five years ago, the US produced 37% of the world’s semiconductor manufacturing in the US but today only produces 12%. In our June 2021 enterprise storage newsletter, we highlighted the chip shortage and, in particular, the impact on the automotive industry. Even the most basic gas-powered car now has over 100 chips, while the latest electric vehicle may hold more than 1,000. The chip shortage has resulted in few available gaming consoles, cars with limited features, and a reduced production of iPhones.
Tuesday, December 7
KIOXIA America, Inc. announced the addition of the BG5 Series that is intended to bolster its lineup of PCIe® 4.0 solid state drives (SSDs). It is designed to balance performance, cost and power for gamers and PC users. The KIOXIA BG5 Series is built with a PCIe® 64 GT/s interface (Gen4 x4 lanes) and accelerated by the company’s fifth-generation BiCS FLASH™ 3D flash memory technology and is available in capacities of 256, 512 and 1024 gigabytes (GB).
Tuesday, November 23
Department of Justice officials announced the arrests of five members of the ransomware criminal enterprise, REvil. REvil has been tied to over 7k ransomware attacks and hundreds of millions in ransoms, including the attack on meat supplier JBS and Miami-based technology company Kaseya. JBS paid $11M in ransom but Kaseya refused to negotiate with the cybercriminals. The arrests were part of an international investigation, Operation GoldDust, involving law enforcement agencies from 17 countries. Members of REvil were identified through wiretapping and seizure of REvil infrastructure – and, exploiting REvil tactics against its members.
Friday, November 12
Storage Review’s analysis of Intel P5510 vs Samsung PM9A3 Enterprise SSDs was thorough and intensive. While Brian Beeler was quick to politely comment on each and talk about the giants amongst us, and phew, what a whirlwind it was, we won’t hesitate to declare a winner. Intel crushed Samsung – especially if you are actually looking for a bottom line, instead of a participation trophy for each. This is business and competition drives, motivates, propels companies to greatness (or demise). Let’s not hesitate to call it like it is – for everyone’s good, including the competitors.
Monday, December 13
Extreme Networks was established by three LAN switching industry veterans, Gordon Stitt, Herb Schneider, and Stephen Haddock, to target the development of third-generation LAN switches based on emerging Gigabit Ethernet technology. Extreme Networks is based in San Jose, with over 2700 employees and over 50k worldwide customers.
Monday, November 29
Muon Space will launch a fleet of satellites designed to analyze Earth’s atmosphere, land, and water in fine detail using measurements from its own equipment and publicly available satellite data. Muon’s satellites will use thermal infrared sensors, infrared spectroscopy, and low-frequency radar to gather data and apply its algorithms to existing image databases and calculating soil moisture levels, snow depth, and standing water in various locations. Their integrated remote sensing platform is expected to provide accuracy and integration of data to more effectively combat climate climate.
Wednesday, November 17
Infinidat persuaded thirtyfive-year enterprise storage veteran, Eric Herzog, to serve as Chief Marketing Officer after nearly seven years as CMO and VP of Global Storage Channels at IBM Storage Solutions where he was responsible for worldwide product marketing and management for IBM's storage systems, software-defined storage, hyper converged infrastructure, and global storage channels. Eric Herzog has managed all aspects of marketing, product management, and business development in both start-ups and Fortune 500 companies.
Tuesday, October 19
Thursday, October 21
Technology, including special effects in movies, as truly evolved. How have datacenters evolved in movies – not just as a background prop but as a central feature? We highlight a few movies below…
2001: A Space Odyssey, 1968
Keir Dullea, Gary Lockwood, William Sylvester – A quest to find mankind’s origins with help from supercomputer H.A.L 9000
The main character must disassemble the AI villain inside the datacenter. And, while datacenters did not make it to space by 2001, that technology is well underway for the near future. The movie is iconic in reflecting much of the technology we take for granted today.
WarGames, 1987
Matthew Broderick, Ally Sheedy, John Wood – A young man finds a backdoor to a military central computer and game play is blurred with reality and the potential threat of WWIII. Okay, fair enough, no datacenter. But, it gets an honorable mention at that start of this evolution because President Reagan
Wednesday, October 13
Monday, September 27
Friday, October 1
Tuesday, September 14
Thursday, September 16
Tuesday, September 21
Wednesday, August 25
Is the sky falling?
Well, I suppose that would help.
Monday, August 30
Pay $125K to fly into the Stratosphere in a Hydrogen Balloon?
Thursday, September 2
Data Storage, Servers, and Data Center Infrastructure in Space
Wednesday, August 11
VCs Banking on Threats, Breaches, and Accelerating Cybersecurity Market
Top investors include Accel, Insight Partners, Techstars, Y Combinator, Ten Eleven Ventures, Lightspeed Venture Partners, Clearsky, ForgePoint Capital, Intel Capital, Salesforce Ventures, and Sequoia Capital.
Friday, August 13
Windows Facial Recognition
Authentication Hacked –
Easily
“We created a full map of the Windows Hello facial-recognition flow and saw that the most convenient for an attacker would be to pretend to be the camera, because the whole system is relying on this input.”
Monday, July 19
10 Hot Semiconductor Startups
Thursday, July 22
Human Factors and Cybersecurity
Monday, July 26
Pay Ransom,
Expect to Pay Again.
Tuesday, June 15
$53B SD-WAN Market by 2030
Persistence Market Research report indicates SD-WAN market growth reaching $53M by 2030. The top five vendors in revenue share for the full-year 2020 were led by Cisco, followed by VMware, Fortinet, Versa and HPE/Silver Peak and account for nearly 2/3rds of the market. Top reasons for adoption include auto-failover and redundancy (66.8%), simplified management (61%), and cost savings over MPLS (57.7%).
Tuesday, June 22
EVOTEK Cybersecurity Predictions - Hit or Miss?
EVOTEK leadership, Matt Stamper, CISO, Executive Advisor, and Macy Dennis, CSO, provided 2021 cybersecurity predictions to CSW. Now that we are halfway into the year, let’s look at whether industry movement matches expectations.
Matt Stamper - “2021 will be the year of SOAR and investments in enhanced detention technologies including deception. I am cautiously optimistic that the improvements in security automation, ...
Tuesday, May 25, 2021
Colonial Pipeline Attack &
Why You Should Not Hoard Gas in Plastic Tubs
A ransomware attack on Colonial Pipeline by hacking group DarkSide crippled gas and jet fuel supplies to nearly half the east coast. The pipeline is 5,500 miles long and can carry 3M barrels of fuel each day. The pipeline is owned by the Koch Industries (28%), South Korea’s National Pension Service and Keats Pipeline Investors LP (23.44%), CDPQ Colonial Partners, LP (16.55%), Shell Pipeline Company, LP (16.55%), and IFM Colonial Pipeline (15.8%).
Thursday, May 27, 2021
RSA Conference 2021
COVID & the Expanded Attack Surface
RSAC Virtual 2021 kicked off on Monday May 17th with a keynote titled “A Resilient Journey” from Rohit Ghai, RSA’s CEO. Unsurprisingly, one of the big themes of the keynote was how COVID-19 forced IT and IT security to rethink how we approach remote workers, trust, resiliency, and hacks when most of the workforce of a variety of companies were forced to work remotely.
Thursday, April 22, 2021
Fusion Centers:
Social Media, Blue Leaks, & Suspicious Activity Reporting
2 Views – ACLU versus NSA
Where there is collection of data, there is always the prospect of great use and/or bad abuse.
And, much of the data culled has been packaged and delivered directly from the individual user, via social posts about getting vaccinated, vacation plans, new purchases, 10 year challenge photos (assisting in AI facial recognition), attendance at protests, and check-ins at every restaurant, workout, and airport - complete with selfies, food photos, and Fitbit results.
Thursday, March 25, 2021
Building Storage Solutions for HPC
High-Performance Computing (HPC) originally started out in defense and research domains, such as universities and government agencies. The workloads that the initial HPC solutions were used for included particle physics, fluid dynamics, nuclear weapons modeling, and research and aerospace projects – and, obviously, the space program. What we have seen in the last several years is HPC being applied to new problems in commercial enterprises.
Wednesday, March 10, 2021
Security Hack of F-35 Results in J-31. DOD Says NO MORE in Cybersecurity Enforcement Push
China’s J-31’s is “modeled after” the F-35. That is a nice way of referring to the Chinese hack of F-35 data in 2007 through contractor Lockheed Martin, to build their jet fighter, J-31. Contractors are required to meet standards regarding security protocols but those requirements have not been verified in the past.
Friday, February 19, 2021
Flash or Cache?
Deep Dive on SSD versus HDD (plus cache) for Arrays
In storage systems (and in particular storage arrays), the conventional wisdom has been that flash storage in the form of solid-state drives (SSDs) are necessary for high performance, and NVMe® SSDs provide the highest performance of all storage media. However, a recent interview in Blocks and Files by Infinidat (started by a number of ex-EMC alumni) would like to be the start of a rewrite to this narrative.
Monday, February 8, 2021
AI & Stock Trading
High frequency and algorithm trading has moved from 60-70% of trading in 2010 to 90% in 2017.
While AI is being largely utilized, the proof seems far into the future Don’t we need a recession or major market correction to test the stock trading models?
Monday, February 1, 2021
Balancing Servers and SSDs
How can datacenter systems and application architects rebalance the relationship between server needs and storage capacity for typical enterprise workloads? Balancing the relationship between servers and SSDs is critical to datacenter cost, operational efficiency, and performance.
Saturday, January 9, 2021
U.S. Capitol Security Issues - January 6, 2021
Our AI & Cybersecurity Newsletter typically covers topics such as ransomware attacks, exploits, security issues facing major companies such as Zoom, & security breaches such as the Solarwinds attacks on Nuclear Labs, the U.S. Treasury, & Pentagon. However...
Wednesday, December 30, 2020
Will 2020's Hot Topics Still be Hot in 2021?
Here is a look at three topics for 2021 - storage-class memory, computational storage, and composable infrastructure - what they promised to deliver, to what extent they have lived up to their promise, and what to expect in the coming decade.