How converged systems revenue has reached $12.5 billion

Worldwide converged systems market revenue increased 9.1 percent year-over -year to $3.6 billion during the fourth quarter of 2017 (4Q17), according to the latest market study by International Data Corporation (IDC).

Full-year sales surpassed $12.5 billion in 2017, representing a 9.4 percenet increase over the previous year and the first time the market surpassed $12 billion in a calendar year.

Converged systems market development

"The number of organizations deploying converged systems continued to expand through 2017," said Eric Sheppard, research vice president at IDC.

Growing demand drove the total market value. While not all market segments increased during the year, those that did grow were able to provide considerable benefits related to the most core infrastructure challenges facing today's data centers.

IDC's converged systems market view offers three segments: certified reference systems & integrated infrastructure, integrated platforms, and hyperconverged systems. Certified reference systems & integrated infrastructure are pre-integrated, vendor-certified systems containing server hardware, disk storage systems, networking equipment, and basic element or systems management software.

Integrated platforms are integrated systems that are sold with additional pre-integrated packaged software and customized system engineering optimized to enable such functions as application development software, databases, testing, and integration tools. Hyperconverged systems collapse core storage and compute functionality into a single, highly virtualized solution.

A key characteristic of hyperconverged systems that differentiate these solutions from other integrated systems is their scale-out architecture and their ability to provide all compute and storage functions through the same x86 server-based resources. Market values for all three segments includes hardware and software but excludes services and support.

The certified reference systems & integrated infrastructure market generated $1.7 billion in revenue during the fourth quarter, which represents a 3.4 percent year-over-year decline and 47.1 percent of the total converged systems market value.

Revenue from hyperconverged systems sales grew 69.4 percent year over year to $1.25 billion during the fourth quarter of 2017. This amounted to 34.3 percent of the total converged systems market. Full-year sales of hyperconverged systems surpassed $3.7 billion in 2017 — that's up by 64.3 percent from 2016.

Integrated platforms sales declined 18.1 percent year over year during the fourth quarter of 2017, generating revenues of $675.5 million. This amounted to 18.6 percent of the total converged systems market value.

How to Easily Optimize Parallels Desktop for Mac

With millions of users around the world, Parallels Desktop® for Mac has been a popular Mac application for more than a decade. To serve the specific needs of this large user base, over the years we have added preferences and settings to Parallels Desktop—lots of preference and settings. This has resulted in an application that […]

The post How to Easily Optimize Parallels Desktop for Mac appeared first on Parallels Blog.

Pivotal launches IPO


Clare Hopping

10 Apr, 2018

Dell’s Pivotal offshoot has launched its IPO, with an anticipated share value of up to $592 million (£420 million) if its 37 million Class A shares sell for the estimated $14 (£10) to $16 (£11) per share. It will also free up 5.6 million more shares for its underwriters to buy if it takes their fancy.

The company will trade under the ticker symbol “PVTL” with Goldman Sachs and Citigroup leading the sales. Bank of America Merrill Lynch, Barclays, Credit Suisse, RBC Capital Markets, UBS Investment Bank and Wells Fargo Securities are also involved as book-running managers.

Pivotal filed for IPO back in March and although its major motivation behind going public is to raise some desperately needed funds to stop it being sold, Dell will keep its controlling share through its other subsidiary companies such as VMware.

If Pivotal doesn’t raise the capital needed to bring it back from the edge, Dell may be forced to sell it, as the giant hopes to claw back some money from its rather large splurge on EMC two years ago. Pivotal posted a net loss of $163.5 million (£116 million) last financial year, which although is an improvement on its previous year’s losses of $232.9 million (£165 million), it’s still not as buoyant as Dell would like.

Another option for Dell is to de-merge with VMware, although the company denied that was an option back in February.

Dell and Silver Lake Partners bought the software firm back in 2013 for a cool $25 billion (£18 billion), although alongside its purchase of EMC, it left the company in $38 billion (£27 billion) up to February this year.

Move over VMs, the future of app deployment is in containers


Davey Winder

10 Apr, 2018

Containerisation is fast becoming one of the most popular methods of deploying applications in a virtual environment, and is widely considered to be making ‘virtual machines’ a thing of the past.

Yet what exactly are containers and why should you bother moving from a tried and trusted VM?

Containers? You mean like boxes for moving our computer gear?

Not exactly – we’re not talking about packaging up physical appliances here. But in the IT operational sense, containers are pretty much the same idea, only for applications. Docker, which is the best-known proponent of the technology, defines a container as a “lightweight, standalone, executable package of a piece of software that includes everything needed to run it: code, runtime, system tools, system libraries and settings”.

Is ‘container’ just a fashionable term for VM?

Containers and virtual machines do share some similarities, particularly to do with resource isolation. But they’re not the same thing. A virtual machine is primarily an abstraction of a hardware platform – an approach that makes it easy to turn one physical server into lots of independent virtual ones. In a setup like this, each VM runs its own operating system and application stack.

Containers, by contrast, focus on virtualising an operating environment. Multiple containers can run concurrently under a single OS, just like regular applications. It’s a more efficient technology, and much more portable.

And we need this why, exactly?

Containers are tremendously useful when it comes to moving software between different computing environments – for example, moving an application from testing into production, or from physical hardware into the cloud.

You can be confident that things will continue to work as expected, even if the supporting software environment has a completely different network topology, security policy or hardware configuration. And since containers don’t require a complete OS installation, you can fit more containerised apps than VMs onto a single server.

So containers are only good for porting applications?

Containers are also very useful for development. They’re a great fit for the microservices, modular way of doing things. The key is that you don’t need to run everything within a single container: you can connect together multiple containers to build an application out of known quantities.

This is a huge help when it comes to management and development, as individual modules can be updated individually – and it’s efficient too, as each container is only initiated (in an almost instant, “just in time” fashion) when it’s needed.

That sounds good. But do we have to tie ourselves to Docker?

Not at all – containers have been built directly into Linux for years now, under the umbrella of the LXC user space interface for kernel containment features (you can read more on this here). Another free, open source container system is Kubernetes. However, if flexibility and support are priorities, Docker is probably the biggest and best-known cross-platform container technology vendor.

Will we be locking ourselves into the framework we choose?

You’re right to raise the question: app container images can be proprietary. For example, Docker and CoreOS have had differing specifications in the past. However, since 2015 the Linux Foundation’s Open Container Initiative (OCI) has been working on a standard container format. Both Docker and CoreOS are sponsors, along with the likes of AWS, Google, HP, IBM, Microsoft, Oracle, Red Hat and VMware. So things are only going to get easier.

So are containers more secure than VMs?

One aspect of container technology that seems to cause endless debate is security. The concern is that, because multiple containers can run on one host platform, a single compromise could affect a whole stack of containers. That’s less of a concern with virtual machines, since each one is completely isolated from the other VMs running on the same hardware. What’s more, hypervisors don’t expose the entire functionality of the Linux kernel, so the attack surface of a VM is smaller, which again reduces the risk.

But containers have security strengths too. The model allows for a microservices approach, which modularises an application into a well-defined interface and limited package services – making it hard for anything to slip through the cracks.

Containers can also be scanned on access, and network segmentation can be used to isolate application clusters. In all, a well configured, properly deployed container should be just as secure as a virtual machine; the only catch is that you need to ensure that your containers meet those standards.

So, the big question: how do we get management to buy in?

As we’ve mentioned, containers can save money versus virtual machines, as the hardware demands are lesser. There’s also the potential for quicker deployment: when you need to roll out application updates, it’s much easier to replace a few containers than to update an entire virtual machine.

Containers also bring flexibility to the party: your developers can write in almost any language, and deploy painlessly to both Windows and Linux, so they’re not wasting time adapting to the idiosyncrasies of your environment. And, of course, since test, staging and deployment environments are identical, bugs are much less likely to make it into the final production code.

Should we just ditch our VMs and switch entirely to containers?

If you need to run a big stack of apps on a modest allocation of resources then containers probably make more sense than VMs. But even the container vendors admit that virtualisation and containers work best when used together.

One option is to run your containers within VMs: this provides even better isolation and better security, as well as allowing you to easily manage your virtual hardware infrastructure management – so for many scenarios it’s the best of both worlds.

Image: Shutterstock

Office 365 outage: Users struggle to sign in


Gabriella Buckner

9 Apr, 2018

Microsoft said it has fixed an Office 365 outage across Europe that angered thousands of users last Friday.

The outage hit the UK around 9am BST, creating login and server connection failures that stopped users from signing into the 365 portal and accessing services.

DownDetector, which allows people to log technical issues with various services, said 44% of those reporting problems with 365 said they were unable to log in, with the issue particularly affecting the UK, France, the Netherlands and Belgium. Customers on Twitter said they were unable to send or receive emails and could only log in to certain interfaces – or none at all.

Redmond’s Office 365 Status page on Twitter told followers they should check the preliminary Post Incident Report (PIR) under MO133518, but tweeters quickly pointed out that they could not log in to the admin centre to find out why they couldn’t log in in the first place.

Microsoft said it had “completed all recovery actions related to MO133518 and this issue is fully resolved as of Friday, April 6, 2018, at 11:30 AM UTC [12.30pm BST]. Thanks to everyone who confirmed service restoration.”

However, this stirred up outrage among users on Twitter, who bombarded Microsoft about persisting outages in London, Singapore, Australia, and many other locations.

One commenter said: “Microsoft, please don’t try to sweep this under the carpet and treat the issue as resolved.”

Another complained: “After so many hours no update!!! Please do what you promised to your client next time.”

As Office 365 returned to some businesses, Microsoft added later that day that it was not aware of any other issues with the service. It plans to publish a full report into the issue within five days of the incident. 

Pete Banham, cyber resilience expert at Mimecast, claimed the incident demonstrates that businesses shouldn’t rely on any one cloud.

“Microsoft Office 365 was hit with major downtime on Friday, with customers around the world unable to access their services or admin portals,” he said. “An operational dependency on the Microsoft environment creates business risks that need be addressed. Anyone outsourcing a critical service like email needs to consider who will suffer most from reputational damage, internal operational issues and financial loss. Mimecast is urging organisations to consider a cyber resilience strategy that assures the ability to recover and continue with business as usual.”

Alibaba Cloud expands to Turkey with new partnership

Alibaba’s cloud expansion continues: the company has announced an expansion into Turkey alongside E-Glober.

E-Glober, the only authorised agent and business partner of Alibaba.com in Turkey, will provide their local connections and insights with Alibaba Cloud’s global infrastructure to ‘provide a compelling offering to meet the digitalisation and international expansion needs of local companies’, as the press materials put it.

Alibaba is pushing its Elastic Compute Service (ECS) with this, citing an IDC study which found the public cloud market was worth almost $97 million in 2017. The company also sees Turkey as a ‘gateway’ nation between the East and the West.

Last month, Alibaba Cloud opened data centre facilities in Indonesia, while in February the company chose Mobile World Congress – its stand proclaiming the company was the fastest growing cloud provider in the world – as the basis for several pieces of Europe-focused product news. These included announcements around infrastructure, big data and artificial intelligence (AI), and a hybrid cloud services platform.  

“Alibaba Cloud has always been dedicated to making our future-proof technology inclusive within the markets in which we operate,” said Yeming Wang, deputy general manager of Alibaba Cloud Global in a statement. “We aim to become the preferred cloud service provider for all sizes of business in Turkey by providing a full range of cloud solutions and combining this with E-Glober’s local expertise.

“Working with knowledgeable and well-connected local partners such as E-Glober will help mitigate language and cultural barriers, as well as reinforce Alibaba Cloud’s foothold within the market when it comes to helping Turkish companies internationalise and seize opportunities in this digital age,” he added.

Learning from the masters of DevSecOps: Getting security right at scale

With the relentless 24/7 nature of the digital economy, many customers I talk to are under pressure to continually release and update their apps. Making this happen is a challenge in itself. But keeping those apps secure can be even more problematic – especially when security is left to the end of the development cycle.

That may seem an unlikely approach in today’s heightened IT security climate. But in my experience, it’s all too common. Under pressure to get their apps out fast, firms often compromise security.

It’s an issue underlined by research on app security, carried out by Freeform Dynamics with executives in large global businesses.

Only 20 percent of them strongly agree that their security testing is up to the demands of continual app development. And only 25 percent strongly agree they have a robust approach to continuously testing for security vulnerabilities.

At the same time, the threats due to mobile and web-based apps continues to grow – 74 percent say security threats due to software/code issues is a growing concern

The era of DevSecOps

So what is the path forward? Given the enormous security threats we now face, organisations must embed security into the very DNA of their software development processes. That means weaving it into every step of the development process: design, coding, release, operation and updating.

Ironically, business leaders know this. Almost all of them (91 percent) agree that making security a more integrated part of software development is a key priority. Some 76 percent believe it’s critical to integrate security practices earlier in the software development lifecycle. 

The evolving process for doing this, DevSecOps, however, it is not as straight-forward to implement as we’d all like.

As the name suggests, DevSecOps means “shifting left” and bringing security into the DevOps fold, so that security testing becomes a natural part of the development process. This puts pressure on an organisation’s people, processes and tools.

That probably explains why only about a third of executives (32 percent) say their IT function is “very effective” at integrating security into the software development cycle early on. And why only 24 percent strongly agree their firm’s culture and practices support the necessary collaboration between development, operations and security.

Most troubling: there may also be a lack of support for implementing DevSecOps at the top. Only 24 percent of respondents strongly agree that senior management understands the importance of not compromising security in favor of speed-to-market. This is truly an alarming statistic, and very surprising in this era of growing security breaches associated with mobile and web-based apps.

Look to the masters

Despite these barriers, the research identified a group of businesses that excel at DevSecOps practices. These ‘Software Security Masters’ represent about 34 percent of the businesses surveyed, globally.

Not only do these firms make security an implicit part of how they work, they take a much broader view of security than their peers. A full 45 percent of the masters strongly agree that security is an enabler of new business opportunities in addition to helping protect a company’s data and systems, versus only 19 percent of their peers in the “mainstream”. As an executive at one such organisation explains: “We work with security early on, so that we’re not architecting in security flaws.”

Not surprisingly, the study found that the masters are also seeing significant business benefits as compared to the mainstream:

  • Accelerated time-to-market: Masters are 2.6x more likely to say their security testing can keep up with the demand to release frequent app updates
  • Improved competitive advantage: Masters are 2.5x more likely to say they are moving fast enough to out-pace their competitors
  • Healthier top and bottom lines:  Masters have a 40 percent higher rate of revenue growth and a 50 percent higher rate of profit growth than their peers in the mainstream

The business case for DevSecOps couldn’t be clearer. It drives business performance because, in the words of another of our masters, “security cannot be an afterthought”.

Five ways machine learning can save your company from a security breach meltdown

  • $86bn was spent on security in 2017, yet 66% of companies have still been breached an average of five or more times.
  • Just 55% of CEOs say their organizations have experienced a breach, while 79% of CTOs acknowledge breaches have occurred. One in approximately four CEOs (24%) aren’t aware if their companies have even had a security breach.
  • 62% of CEOs inaccurately cite malware as the primary threat to cybersecurity.
  • 68% of executives whose companies experienced significant breaches in hindsight believe that the breach could have been prevented by implementing more mature identity and access management strategies.

These and many other fascinating findings are from the recently released Centrify and Dow Jones Customer Intelligence study, CEO Disconnect is Weakening Cybersecurity (31 pp, PDF, opt-in).

One of the most valuable findings from the study is how CEOs can reduce the risk of a security breach meltdown by rethinking their core cyber defense strategy by maturing their identity and access management strategies.

However, 62% of CEOs have the impression that multi-factor authentication is difficult to manage. Thus, their primary security concern is primarily driven by how to avoid delivering poor user experiences. In this context, machine learning can assist in strengthening the foundation of a multi-factor authentication platform to increase effectiveness while streamlining user experiences.

Five ways machine learning saves companies from security breach meltdowns

Machine learning is solving the security paradox all enterprises face today. Spending millions of dollars on security solutions yet still having breaches occur that are crippling their ability to compete and grow, enterprises need to confront this paradox now. There are many ways machine learning can be used to improve enterprise security. With identity being the primary point of attacks, the following are five ways machine learning can be leveraged in the context of identity and access management to minimize the risk of falling victim to a data breach.

Thwarting compromised credential attacks by using risk-based models that validate user identity based on behavioral pattern matching and analysis

Machine learning excels at using constraint-based and pattern matching algorithms, which makes them ideal for analyzing behavioral patterns of people signing in to systems that hold sensitive information. Compromised credentials are the most common and lethal type of breach. Applying machine learning to this challenge by using a risk-based model that “learns’ behavior over time is stopping security breaches today.

Attaining Zero Trust Security (ZTS) enterprise-wide using risk scoring models that flex to a businesses’ changing requirements

Machine learning enables Zero Trust Security (ZTS) frameworks to scale enterprise-wide, providing threat assessments and graphs that scale across every location. These score models are invaluable in planning and executing growth strategies quickly across broad geographic regions. CEOs need to see multi-factor authentication as a key foundation of ZTS frameworks that can help them grow faster. Machine learning enables IT to accelerate the development of Zero Trust Security (ZTS) frameworks and scale them globally. Removing security-based roadblocks that get in the way of future growth needs to be the highest priority CEOs address. A strong ZTS framework is as much a contributor to revenue as is any distribution or selling channel.

Streamlining security access for new employees by having persona-based risk model profiles that can be quickly customized by IT for specific needs

CEOs most worry about security’s poor user experience and its impacts on productivity. The good news is that the early multi-factor authentication workflows that caused poor user experiences are being redefined with contextual insights and intelligence based on more precise persona-based risk scoring models. As the models “learn” the behaviors of employees regarding access, the level of authentication changes and the experience improves. By learning new behavior patterns over time, machine learning is accelerating how quickly employees can gain access to secured services and systems.

Provide predictive analytics and insights into which are the most probable sources of threats, what their profiles are and what priority to assign to them

CIOs and the security teams they manage need to have enterprise-wide visibility of all potential threats, ideally prioritized by potential severity. Machine learning algorithms are doing this today, providing threat assessments and defining which are the highest priority threats that CIOs and their teams need to address.

Stop malware-based breaches by learning how hackers modify the code bases in an attempt to bypass multi-factor authentication

One of the favourite techniques for hackers to penetrate an enterprise network is to use impersonation-based logins and passwords to pass malware onto corporate servers. Malware breaches can be extremely challenging to track. One approach that is working is when enterprises implement a ZTS framework and create specific scenarios to trap, stop and destroy suspicious malware activity.

UK Cloud Awards 2018 shortlist announced


Cloud Pro

9 Apr, 2018

The UK Cloud Awards 2018 judging process has now finished and the shortlist of contenders for the accolades have been unveiled.

The awards, which are designed to recognise talent, achievement and innovation in the UK cloud industry, are now in their fifth year.

Winners will be announced at the awards ceremony, which will take place at County Hall, London on 16 May.

Alex Hilton, CEO of CIF, said: “This is the fifth year we have run the UK Cloud Awards and we are delighted to announce that we had a record number of entries this year, confirming our belief that the UK Cloud Awards are now a recognised feature of the technology industry’s awards calendar.

“Over the past decade we have witnessed phenomenal innovation and the truly transformational use of cloud services. The depth, strength and maturity of the cloud industry in the UK is apparent. It’s going to be extremely difficult to pick the winners in each and every category and we would like to congratulate everyone that has got this far. I would like to take the opportunity to wish everyone that has made the cut the best of luck on the night.”

The shortlist for the UK Cloud Awards 2018 is as follows:

BEST IN CLASS

Security Solution of the Year

Alienvault USM Anywhere by Alienvault
Amazon GuardDuty by AWS
CipherTrust Cloud Key Manager by Thales eSecurity
Darktrace Cloud by Darktrace
Verify by Aspect Software

Storage Solution of the Year

Ceph Storage 3 by Red Hat
FlashBlade by Pure Storage
Rubrik
Scality RING7 by Scality

Collaboration Solution of the Year

BlueJeans with Dolby Voice
Freshdesk
Lifesize App by Lifesize

Business Continuity Solution of the Year

Druva Cloud Platform
iland Secure DRaaS by iland Cloud
SolarWinds Backup by Solarwinds MSP

Most Innovative Enterprise Product

Adaptive Insights Business Planning Cloud
Apttus ”Max” by Apttus
Boomi by DELL
Interoute Edge by Interoute
iPortalis Control Portal
New Relic by New Relic
Rubrik
Silver Peak Unity EdgeConnect SD-WAN solution

Most Innovative SMB Product

Advanced Voice Services by Natterbox
CloudMigrator Go by Cloud Technology Solutions
GoSimpleTax by GoSimple Software Limited

Unified Communications Product of the Year

Advanced Voice Services by Natterbox
Global Office by RingCentral
storm DTA by Content Guru

Fintech Solution of the Year

AccountsIQ
Expenses by Selenity
FreeAgent
GoSimple Tax by GoSimple Software Limited
Mambu
Sage Business Cloud Financials (formerly known as Sage Live

Cloud Platform Solution of the Year

Anypoint Platform
Crowd Release by MuleSoft
Boomi by DELL
Cloud Platform Solution by Box
Cloud Protection Manager by N2W Software
OpenShift Container Platform 3.7 by Red Hat
Spotinst
ThousandEyes

BEST DIGITAL TRANSFORMATION PROJECTS

Best Public Sector Project

CityVerve supported by Chime-Tech
Health and Social Care digital meal planning with Kafoodle Kare
Manchester City Council supported by Cloud Technology Solutions
NHS in association with Kahootz
storm® Citizen Engagement Hub with Content Guru

Best Private Sector Project (SMB)

Brother International Europe supported by Ensono
Stephen James Group supported by Charterhouse Voice & Data

Best Private Sector Project(Enterprise)

Big Data European Concept Platform (UK) supported by ANS
Nuffield Health supported by Silver Peak
The Lidl UK Winebot supported by Aspect Software
SYNLAB Laboratory Services and Ancoris
Ubisoft supported by Aspect

Most Innovative Emerging Technology

Project Freq by Amido
Pulse by FinancialForce

CLOUD SERVICE PROVIDER

Best Cloud Managed Service Provider (MSP)

4D Data Centres
CenturyLink
Claranet
Databarracks
Ensono

Best Cloud Service Provider (CSP)

CSI Limited
Content Guru
Ingram Micro Cloud
Interoute
Sesui Ltd
TechQuarters
UKCloud Ltd

Best G-Cloud Public Sector Provider

Kahootz
UKCloud Ltd

ACHIEVEMENT AWARDS

Cloud Visionary of the Year

Apay Obang-Oyway,Ingram Micro
Craig Joseph,intY
Simon Ratcliffe,Ensono

Cloud Entrepreneur of the Year

Geoffroy De Cooman, Proxyclick
Mitchell Feldman, RedPixie
Simon Hansford, UKCloud Ltd

Internet Explorer for Mac

Globally, there are millions of users who are required to use Microsoft Internet Explorer for banking, human resources, tax systems, and many other corporate intranets. Google Chrome, Mozilla Firefox, Opera, and even Microsoft Edge are free browsers that are more stable and secure than IE. However, Internet Explorer is still the second most popular web […]

The post Internet Explorer for Mac appeared first on Parallels Blog.