Connect with us


Get ready for hybrid cloud challenges



Large cloud providers typically support on-premises workloads, and some offer IT administrators a way to manage multiple public clouds from a single location, but CIOs say it’s difficult to get a single view of an entire cloud hybrid environment, making IT more complex. control.

Most organizations have fully launched at least one major public cloud infrastructure as a service (IaaS) or platform as a service (PaaS) provider, and many are looking to add a second cloud provider to support additional applications, according to a Gartner analyst.

For example, one cloud provider may offer the best environment for machine learning workloads, while another may simply be more cost-effective. Some businesses may need to host certain data in their own data centers, which may be in a private cloud or a completely self-contained version of the public cloud infrastructure available to run on-premises.

Oracle, like other major public cloud providers, offers both multi-cloud support and the ability to run an Oracle cloud locally through OCI, the Oracle Cloud Infrastructure platform.

Vodafone uses both, as Pedro Sardo, director of Vodafone’s IT operations group, said: “New applications are easy to host in the cloud. We have been using the public cloud for five years now, but we want to migrate everything and modernize all of our business applications.”

He added that using the public cloud offers a much higher level of automation than what can be achieved locally, and features such as the OCI standalone database promise to automate the management and updating of Oracle relational databases. But because not all applications can be migrated to the public cloud, Vodafone is using the OCI Dedicated Region feature, which allows the telco to run the Oracle Cloud privately in its own data center.

As with Vodafone, many CIOs will find that not all of their workloads can run on the public cloud. They may be technically restricted or restricted by data processing rules that prohibit or severely restrict the ability to host publicly identifiable customer data in a data center that may be subject to the jurisdiction of a foreign power. This means that some workloads will remain on-premises IT infrastructure that needs to be managed and maintained along with applications hosted in the public cloud.

Whether they run on premises, in a private cloud, or in the public cloud, multi-cloud strategies are hybrid environments that offer IT leaders more flexibility than a public cloud infrastructure, but they also increase complexity and cost.

A recent Vanson Bourne survey for Nutanix, based on a survey of 1,500 IT decision makers, found that the majority of organizations surveyed (64%) plan to operate in a multi-cloud environment as their most used deployment model within three years.

This means almost doubling the proportion of organizations that have already migrated to a multi-cloud environment. In the UK, a Nutanix/Vanson Bourne survey found that UK companies lead the way in mixed IT infrastructure use, with 73% reporting using multiple IT environments compared to a global average of 60%.

Gartner recommends that IT leaders manage the cost and complexity of multi-cloud environments by defining a strategy for hosting cloud workloads. He encourages CIOs to start by selecting a primary, preferred vendor, and then, when an organization has business requirements that the vendor can’t meet, add additional vendors in an orderly fashion based on specific business needs.

But public cloud platforms are evolving, which means that over time, one cloud service provider may offer cloud services that better fit or provide a stronger business case for an existing application.

CIOs surveyed by Vanson Bourne said their organizations find it difficult to manage and move workloads across heterogeneous cloud environments. A majority (87%) agree that multi-vendor public cloud services need to be easier to manage and operate in order to be successful in multi-cloud infrastructure. This is because public cloud platforms use different management tools, dashboards, and customization approaches.

In addition, while 91% of organizations moved one or more applications to a new IT environment in the last 12 months, 80% agreed that migrating workloads to another cloud environment is currently costly and time consuming, and 77 % described workload tolerance. as a moderate or significant problem.

Nutanix’s approach to simplifying multicloud management is based on the NC2 platform. One of its clients, Forestry and Land Scotland, uses NC2 to create a hybrid cloud environment in the public cloud and its own on-premises IT environment.

Discussing the rollout, Nick Mahlitz, Senior Digital Infrastructure Manager, Forestry and Land Scotland, said: “One of the key benefits I found while working with NC2 was the ability to easily migrate our environment from on-premises to the cloud.

“We have a certain time pressure to leave our private data center, and what struck me initially is that NC2 could be a contingency plan to expand our data center and move workloads into it without the need for conversion them into their own cloud solutions.”

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *


Senators introduce bipartisan law to ban children under 13 from joining social media




A new federal bill unveiled on Wednesday sets a national minimum age for social media use and requires tech companies to get parental consent before creating teen accounts, reflecting a growing trend at all levels of government to restrict the use of Facebook, Instagram, TikTok and others. platforms interact with young users.

The bill, proposed by a bipartisan group of U.S. senators, aims to address what politicians, mental health advocates and critics of technology platforms are calling the mental health crisis fueled by social media.

Under the bill, known as the Child Social Media Protection Act, social media platforms will be prohibited from allowing children under the age of 13 to create accounts or interact with other users, although children will still be allowed to view content without logging into an account. , in accordance with draft text legislation.

Tech platforms subject to the law will also need to obtain the consent of a parent or guardian before creating new accounts for users under the age of 18. Companies will be prohibited from using teenagers’ personal information to target them with content or advertising, although they may still provide limited, targeted recommendations to teenagers based on other contextual cues.

This is the latest move by lawmakers to develop age limits for tech platforms after similar bills became law this year in states like Arkansas and Utah. But the law could also spark wider debate and possible future litigation, calling into question the privacy and constitutional rights of young Americans.

Speaking to reporters on Wednesday, Democratic Senator Brian Schatz of Hawaii, author of the federal bill, said Congress urgently needs to protect children from the harm caused by social media.

“Social media companies have stumbled upon a stubborn, disruptive fact,” Schatz said. “The way to get kids to linger on the platforms and maximize profits is to frustrate them—to cause resentment, excitement, fear, vulnerability, helplessness, anxiety. [and] depressed.”

Most of the major social networks already ban children under the age of 13 from using their platforms as a result of the federal Children’s Privacy Act known as COPPA. But enforcing the restriction was a problem.

Arkansas Senator Tom Cotton, the leading Republican funder, said existing ways to ensure kids aren’t underage online are too easy to circumvent. The two senators were joined by Connecticut Democratic Senator Chris Murphy and Alabama Republican Senator Kathy Britt.

The bill, which could be one of the most far-reaching changes in the tech landscape, aims to create a government age verification program that can certify users’ age or parental status based on an identity they upload to a government system or a third-party verifier.

Under the bill, this program will be a pilot project administered by the Department of Commerce, and participation and use of a federally administered age verifier will be voluntary. But it would mean a potentially significant expansion of the government’s role in regulating websites that require age verification.

Tech companies can still develop their own age verification technologies or hire third-party companies for verification, lawmakers said.

Violations of the proposed law could mean millions of dollars in FTC fines for social media companies. But this is not the case for a long list of tech products, including email services, teleconferencing providers, payment companies, video game stores, digital newsletter platforms, cloud storage services, travel websites and online directories like Wikipedia, or user review sites. , such as Yelp. .

The bill, passed on Wednesday, can be seen as competing with another separate bill being drafted by Connecticut Democratic Senator Richard Blumenthal and Tennessee Republican Senator Marsha Blackburn. The legislation, known as the Children’s Online Safety Act, will be reintroduced in the Senate “very soon,” Blumenthal said, raising concerns about the Schatz-Cotton bill.

“I welcome additional ideas,” Blumenthal said. But he added: “I have some concerns about an age identification system that will create a national database of personal information about children in the hands of big technology, which could lead to misuse or exploitation. I have other concerns about a bill that places responsibility on parents and not on Big Tech, as our legislation does.”

In response to the “Design It for Us” bill, a youth coalition advocating social media change in the face of mental health issues said lawmakers should focus on shaping the basic product design of social media platforms rather than imposing post-facto restrictions on .

“We believe that any legislation addressing the harms of social media should hold companies accountable for making their platforms safer, rather than prohibiting children and teens from using platforms altogether,” said Zamaan Qureshi, Co-Chair groups.

Opponents of such proposals, set out on Wednesday, also said the restrictions on teenagers threaten their constitutional rights. For example, the tech industry and digital rights advocates have argued that Utah’s legislation requiring age verification and parental consent would violate the First Amendment rights of young Americans to access information and limit the speech rights of all Americans.

“Requiring all users in Utah to link their accounts to their age and ultimately their identity will result in fewer people expressing opinions or searching for information online,” Electronic Frontier wrote last month. Foundation, a digital rights organization. “In addition, tens of millions of people in the United States do not have a government-issued ID. Those in Utah are likely to be age restricted offline.”

The Computer and Communications Industry Association, which represents companies including Google and Facebook parent Meta, said age verification rules would require consumers to disclose even more of their personal information to tech companies or third parties.

“This data collection poses additional privacy and security risks for everyone,” the CCIA wrote in a letter to the Governor of Utah. Spencer Cox last month. “This mandatory data collection will include the collection of very sensitive personal information about children, including the collection and storage of their geolocation to ensure they do not reside out of state while verifying that they are of age to use these services.” .

On Wednesday, however, Cotton dismissed privacy concerns, calling it not a “serious argument” when government agencies and online gambling sites use identity or age verification. He also said the bill would effectively reduce the amount of personal information technology platforms can effectively collect by blocking children under 13 from accessing their sites.

“If a child is, say, too small to sign a contract, or too small to open a bank account in the real world, they are too small to sign terms of service agreements and use social media in the digital world,” Cotton said. reporters.

Schatz added that the bill was not posted on social media for feedback, but predicted that the industry would soon deploy an “army of lobbyists” to fight it.

“The tech industry will pass this bill like any other child online safety bill, with everything it has,” Schatz said. “But the burden of proof is on those who want to defend the status quo, because the status quo makes an entire generation of users mentally ill.”

Continue Reading


Twitter verification fiasco could end in court



Twitter verification system Crash had more twists and turns than a Stephen King novel, which is fitting given that the author was caught in the middle of yet another storm on the platform. A confirmed “legacy” user due to his fame as a horror writer, King likely expected to lose his blue tick on April 20 when Twitter owner Elon Musk announced he planned to remove the demarcation for all legacy users.

But while others lost their blue ticks, King kept his. It soon emerged that Musk had chosen the writer and two others — NBA star LeBron James and Star Trek actor William Shatner — to receive a free blue check. These new blue checks come with a label that reads: “This account is verified because they follow Twitter Blue and have verified their phone number.” King objected. “My Twitter account says I follow Twitter Blue” hi tweeted. – No. My Twitter account says I gave out my phone number. I didn’t.”

More confusion ensued when Twitter abandoned Musk’s “peace or shut up” approach to verification. It now appears that any old Twitter user with over a million followers prior to April 20 has their tick back, along with a note that they paid for it. They don’t have many professions, which, if true, could lead to a lot of legal trouble on Twitter.

“There are a number of potential legal actions we could see on Twitter assigning blue checks to accounts that didn’t subscribe to them and don’t want to receive them,” says Alexandra Roberts, professor of law and media at Northeastern University. “Given that the blue checkmarks are for users who follow Twitter Blue and have verified their phone number.”

Laws that Twitter can violate include federal laws against false advertising or endorsements, and state laws against unfair competition lawsuits, as well as defamation and publicity misappropriation lawsuits, Roberts said. Any cases under these laws (“None of these are slam dunk,” according to Roberts) will need to prove that Twitter’s false claim that celebrities paid for Blue constitutes an endorsement of a service or commercial use of the platform, or that consumers seeing them would be misled.

Some scientists believe that this is possible.

“What Musk is doing by paying some celebrities to keep the blue tick can be seen as unfair or misleading because it gives the public, including consumers, the impression that those particular celebrities are supporting Twitter’s business models,” he says. Catalina Goant. , Associate Professor of the Department of Law, Economics and Management Faculty of Law, Utrecht University. “Only LeBron James or William Shatner have the right to use their own public personas and personas.”

The launch of Twitter Blue was not a resounding success. This reportedly resulting in Twitter receiving less than 1 percent of its targeted annual revenue. Twitter did not respond to a request for comment on this story, with the exception of sending an automatic response to the poop emoji.

By blue-checking unwilling users, Twitter may also have opened itself up to regulatory action.

“The US, EU and UK have similar rules in place in this regard, prohibiting unscrupulous and misleading practices that can manipulate consumers and influence markets,” says Goanta.

The Federal Trade Commission Act prohibits misleading or trade-influencing activities — countless celebrities and famous people are said to have paid to subscribe to Twitter Blue when they didn’t seem like a good example of it. “It is also possible that we will see some action by the agency,” she says. The FTC declined to comment.

The platform could face similar action in the UK under “grant” laws, says Andres Guadamoose, a law and technology academic specializing in intellectual property at the University of Sussex. Because the checkmark means the bearer has paid for the service, “this is misleading,” says Guadamuz.

Given the widespread contempt on Twitter for people who paid to be verified, celebrities can also claim that their reputation has been damaged.

“Any celebrities who want to troll Musk should seriously consider calling their lawyers,” Guadamuz says. “It could be a very strong case.”

Continue Reading


Apple Watch band and face for Pride 2023 revealed in leak



Continue Reading