Cisco HyperFlex Anywhere

April 1, 2019 | 45 views

Cisco HyperFlex Anywhere extends the simplicity of hyperconvergence from core to edge and multicloud, putting IT at the center of rapid innovation in a world where data is everywhere. The latest innovations in HyperFlex with Cisco Intersight are engineered to meet the unique requirements for deploying hyperconverged infrastructure at the edge at a global scale.

Spotlight

Contino

Contino is a global Enterprise DevOps, Data and Cloud Transformation Consultancy. Our mission is to help highly-regulated enterprises transform faster, modernise their way of working so they can deliver high quality, secure and compliant software change. We operate with a dual delivery and up-skilling remit to enable our clients to build their own capability.

OTHER ARTICLES
AI TECH

The Revolutionary Power of 5G in Automation and Industry Digitization

Article | July 20, 2022

Fifth-generation (5G) mobile phone networks that can carry data up to 50 times faster than major carriers' current phone networks are now rolling out. But 5G promises to do more than just speed up our phone service and download times. The mobile industry's fifth-generation (5G) networks are being developed and are prepared for deployment. The expansion of IoT and other intelligent automation applications is being significantly fueled by the advancing 5G networks, which are becoming more widely accessible. For advancements in intelligent automation—the Internet of Things (IoT), Artificial Intelligence (AI), driverless cars, virtual reality, blockchain, and future innovations we haven't even considered yet—5 G's lightning-fast connectivity and low-latency are essential. The arrival of 5G represents more than simply a generational shift for the tech sector as a whole. Contributions by 5G Networks For a number of reasons, the manufacturing sector is moving toward digitalization: to increase revenue by better servicing their customers; to increase demand; to outperform the competition; to reduce costs by boosting productivity and efficiency; and to minimize risk by promoting safety and security. The main requirements and obstacles in the digitization industry were recently recognized by a study. Millions of devices with ultra-reliable, robust, immediate connectivity. Gadgets, which are expensive with a long battery life. Asset tracking along the constantly shifting supply chains. Carrying out remote medical operations. Enhancing the purchasing experience with AR/VR. Implementing AI to improve operations across the board or in various departments. The mobile telecommunications requirements of the Internet of Things cannot be met by the current 4G and 4G LTE networks. Compared to current 4G LTE networking technologies, 5G can also offer a solution to the problem and the quickest network data rate with a relatively low cost and greater communication coverage. The 5G network's quick speeds will lead to new technical developments. The upcoming 5G technology will support hundreds of billions of connections, offer transmission speeds of 10 Gbps, and have an extremely low latency of 1 ms. Additionally, it makes rural areas' services more dependable, minimizing service disparities between rural and urban areas. Even though the 5G network is a development of the 4G and 4G LTE networks, it has a whole new network design and features like virtualization that provide more than impressively fast data speeds.

Read More
AI TECH

AI's Impact on Improving Customer Experience

Article | July 20, 2022

To enhance the consumer experience, businesses all over the world are experimenting with artificial intelligenace (AI), machine learning, and advanced analytics. Artificial intelligence (AI) is becoming increasingly popular among marketers and salespeople, and it has become a vital tool for businesses that want to offer their customers a hyper-personalized, outstanding experience. Customer relationship management (CRM) and customer data platform (CDP) software that has been upgraded with AI has made AI accessible to businesses without the exorbitant expenses previously associated with the technology. When AI and machine learning are used in conjunction for collecting and analyzing social, historical, and behavioral data, brands may develop a much more thorough understanding of their customers. In addition, AI can predict client behavior because it continuously learns from the data it analyzes, in contrast to traditional data analytics tools. As a result, businesses may deliver highly pertinent content, boost sales, and enhance the customer experience. Predictive Behavior Analysis and Real-time Decision Making Real-time decisioning is the capacity to act quickly and based on the most up-to-date information available, such as information from a customer's most recent encounter with a company. For instance, Precognitive's Decision-AI uses a combination of AI and machine learning to assess any event in real-time with a response time of less than 200 milliseconds. Precognitive's fraud prevention product includes Decision-AI, which can be implemented using an API on a website. Marketing to customers can be done more successfully by using real-time decisioning. For example, brands may display highly tailored, pertinent content and offer to clients by utilizing AI and real-time decisioning to discover and comprehend a customer's purpose from the data they produce in real-time. By providing deeper insights into what has already happened and what can be done to facilitate a sale through suggestions for related products and accessories, AI and predictive analytics are able to go further than historical data alone. This increases the relevance of the customer experience, increases the likelihood that a sale will be made, and increases the emotional connection that the customer has with a brand.

Read More
FUTURE TECH

The Evolution of Quantum Computing and What its Future Beholds

Article | July 26, 2022

The mechanism of quantum computers will be entirely different from anything we humans have ever created or constructed in the past. Quantum computers, like classical computers, are designed to address problems in the real world. They process data in a unique way, though, which makes them a much more effective machine than any computer in use today. Superposition and entanglement, two fundamental ideas in quantum mechanics, could be used to explain what makes quantum computers unique. The goal of quantum computing research is to find a technique to accelerate the execution of lengthy chains of computer instructions. This method of execution would take advantage of a quantum physics event that is frequently observed but does not appear to make much sense when written out. When this fundamental objective of quantum computing is accomplished, and all theorists are confident works in practice, computing will undoubtedly undergo a revolution. Quantum computing promises that it will enable us to address specific issues that current classical computers cannot resolve in a timely manner. While not a cure-all for all computer issues, quantum computing is adequate for most "needle in a haystack" search and optimization issues. Quantum Computing and Its Deployment Only the big hyperscalers and a few hardware vendors offer quantum computer emulators and limited-sized quantum computers as a cloud service. Quantum computers are used for compute-intensive, non-latency-sensitive issues. Quantum computer architectures can't handle massive data sizes yet. In many circumstances, a hybrid quantum-classical computer is used. Quantum computers don't use much electricity to compute but need cryogenic refrigerators to sustain superconducting temperatures. Networking and Quantum Software Stacks Many quantum computing software stacks virtualize the hardware and build a virtual layer of logical qubits. Software stacks provide compilers that transform high-level programming structures into low-level assembly commands that operate on logical qubits. In addition, software stack suppliers are designing domain-specific application-level templates for quantum computing. The software layer hides complexity without affecting quantum computing hardware performance or mobility.

Read More
FUTURE TECH

Language Models: Emerging Types and Why They Matter

Article | July 7, 2022

Language model systems, often known as text understanding and generation systems, are the newest trend in business. However, not every language model is made equal. A few are starting to take center stage, including massive general-purpose models like OpenAI's GPT-3 and models tailored for specific jobs. There is a third type of model at the edge that is intended to run on Internet of Things devices and workstations but is typically very compressed in size and has few functionalities. Large Language Models Large language models, which can reach tens of petabytes in size, are trained on vast volumes of text data. As a result, they rank among the models with the highest number of parameters, where a "parameter" is a value the model can alter on its own as it gains knowledge. The model's parameters, which are made of components learned from prior training data, fundamentally describe the model's aptitude for solving a particular task, like producing text. Fine-tuned Language Models Compared to their massive language model siblings, fine-tuned models are typically smaller. Examples include OpenAI's Codex, a version of GPT-3 that is specifically tailored for programming jobs. Codex is both smaller than OpenAI and more effective at creating and completing strings of computer code, although it still has billions of parameters. The performance of a model, like its capacity to generate protein sequences or respond to queries, can be improved through fine-tuning. Edge Language Models Edge models, which are intentionally small in size, occasionally take the shape of finely tuned models. To work within certain hardware limits, they are occasionally trained from scratch on modest data sets. In any event, edge models provide several advantages that massive language models simply cannot match, notwithstanding their limitations in some areas. The main factor is cost. There are no cloud usage fees with an edge approach that operates locally and offline. As significant, fine-tuned, and edge language models grow in response to new research, they are likely to encounter hurdles on their way to wider use. For example, compared to training a model from the start, fine-tuning requires less data, but fine-tuning still requires a dataset.

Read More

Spotlight

Contino

Contino is a global Enterprise DevOps, Data and Cloud Transformation Consultancy. Our mission is to help highly-regulated enterprises transform faster, modernise their way of working so they can deliver high quality, secure and compliant software change. We operate with a dual delivery and up-skilling remit to enable our clients to build their own capability.

Related News

Cisco WiFi Routers Attacked After Code Hack Posted

SDxCentral | March 05, 2019

Hackers this week took advantage of online instructions to target some Cisco WiFi routers. The attacks come on the heels of the vendor issuing a software patch for the critical security vulnerabilities. The attacks occurred after security research firm Pen Test Partners posted a blog containing demonstration code on how to exploit the routers. The firm was involved in initially finding the vulnerability. Cisco noted that the vulnerability occurs in the web-based management interface of three routers: RV110W, RV130W and RV215W. It reportedly impacts about 12,000 devices in the U.S., Canada, India, Argentina, Poland, and Romania. The vulnerability, known as a Remote Command Execution (RCE) vulnerability, was ranked as “critical” by Cisco, with a 9.8 score (out of a possible 10) on the Common Vulnerability Scoring System. The high rating reflects the ease in attacking the devices remotely over the internet by hackers who also don’t need advanced coding skills. An unauthenticated remote attacker could use the vulnerability to execute arbitrary code, Cisco explained. It isn’t clear from Cisco’s report how attackers might take advantage of such access, but they presumably would be able to monitor secure personal data including passwords. Known Vulnerability: Three security researchers, including one from Pen Test Partners, announced the vulnerability at the GeekPwn Shanghai conference in late October. They didn’t provide technical details or mention the impacted products at the time, although Cisco thanked them for their work. In its blog post, Pen Test Partners criticized Cisco coders for using an insecure function in the C programminglanguage known as strcpy (shorthand for “string copy”) when the routers were first designed. Using strcpy left the authentication process in the routers open to a buffer overflow, allowing attackers to flood the password field and attach malicious commands. “It is well known – notorious even – that strcpy is a dangerous function to use,” the blog said. That blog entry, which was posted on Feb. 28, included code describing how an attack could happen.

Read More

Cisco Says Mobile Internet Traffic Will Reach Nearly a Zettabyte by 2022

SDxCentral | February 21, 2019

As usual, the Cisco Mobile Visual Networking Index points to huge increases in the amount of data being trafficked through networks. And, as usual, it’s a master class in exotic numbers. The report, which covers the 2017-2022 time frame, says that the annual run rate of mobile internet traffic will reach almost a zettabyte by the end of that period. Also by 2022, mobile will make up almost 20 percent of local IP traffic. That’s almost 113 times the amount that mobile traffic generated in 2012. “This Mobile VNI clearly shows that the growing demand for wireless networking is not just a preference (not wanting to be tethered to a landline), but for many it’s an expectation that some form of wireless access (cellular or Wi-Fi) needs to be available and of a suitable performance quality to meet their needs,” Thomas Barnett, director of thought leadership for Cisco’s Service Provider business, told SDxCentral in an email. “Consumers and businesses rely on mobile connectivity not only for their personal devices, but also for a growing number of IoTapplications that will expand and evolve as the 5G ecosystem takes shape (more apps, content, analytics, security, et al.)” Cisco has amassed the massive amount of data that comprises the VNI for more than a decade. This is the ninth mobile edition, which relies in part on data from a number of consultancies, regulators and other organizations. The latest wired VNI was released last November. The report says the number of mobile users will increase from 5 billion to 5.7 billion users, mobile connections from 8.6 billion to 12.3 billion, and average network speed from 8.7 Mbps to 28.5 Mbps, between 2017 and 2022. Video, which was 59 percent of traffic in 2017, will be 79 percent in 2022.

Read More

Cisco Patches High Severity Flaws in HyperFlex, Prime Infrastructure

SecurityWeek | February 21, 2019

Cisco this week released patches for more than a dozen vulnerabilities across its product portfolio, including high severity flaws in HyperFlex, Prime Infrastructure, and Prime Collaboration Assurance. Two High risk security bugs were addressed in HyperFlex software, namely a command injection issue in the cluster service manager of the application, and an unauthenticated root access flaw in the hxterm service of the software. Created by insufficient input validation and insufficient authentication controls, respectively, the vulnerabilities could allow an attacker to run commands as the root user or gain root access to all member nodes of the HyperFlex cluster. Tracked as CVE-2018-15380 and CVE-2019-1664, both vulnerabilities were found to impact HyperFlex software releases prior to 3.5(2a). Another High severity bug that Cisco addressed this week is a certificate validation bug in the Identity Services Engine (ISE) integration feature of Prime Infrastructure (PI). An unauthenticated, remote attacker could exploit the flaw to perform a man-in-the-middle attack against the Secure Sockets Layer (SSL) tunnel established between ISE and PI. Tracked as CVE-2019-1659, the issue is created by improper validation of the server SSL certificate when establishing the SSL tunnel with ISE. The flaw impacts Prime Infrastructure Software releases 2.2 through 3.4.0 when the PI server is integrated with ISE, which is disabled by default. Another High risk bug was found in the Quality of Voice Reporting (QOVR) service of Prime Collaboration Assurance (PCA) Software releases prior to 12.1 SP2. Tracked as CVE-2019-1662 and created due to insufficient authentication controls, the issue could allow an unauthenticated, remote attacker to access the system as a valid user.

Read More

Cisco WiFi Routers Attacked After Code Hack Posted

SDxCentral | March 05, 2019

Hackers this week took advantage of online instructions to target some Cisco WiFi routers. The attacks come on the heels of the vendor issuing a software patch for the critical security vulnerabilities. The attacks occurred after security research firm Pen Test Partners posted a blog containing demonstration code on how to exploit the routers. The firm was involved in initially finding the vulnerability. Cisco noted that the vulnerability occurs in the web-based management interface of three routers: RV110W, RV130W and RV215W. It reportedly impacts about 12,000 devices in the U.S., Canada, India, Argentina, Poland, and Romania. The vulnerability, known as a Remote Command Execution (RCE) vulnerability, was ranked as “critical” by Cisco, with a 9.8 score (out of a possible 10) on the Common Vulnerability Scoring System. The high rating reflects the ease in attacking the devices remotely over the internet by hackers who also don’t need advanced coding skills. An unauthenticated remote attacker could use the vulnerability to execute arbitrary code, Cisco explained. It isn’t clear from Cisco’s report how attackers might take advantage of such access, but they presumably would be able to monitor secure personal data including passwords. Known Vulnerability: Three security researchers, including one from Pen Test Partners, announced the vulnerability at the GeekPwn Shanghai conference in late October. They didn’t provide technical details or mention the impacted products at the time, although Cisco thanked them for their work. In its blog post, Pen Test Partners criticized Cisco coders for using an insecure function in the C programminglanguage known as strcpy (shorthand for “string copy”) when the routers were first designed. Using strcpy left the authentication process in the routers open to a buffer overflow, allowing attackers to flood the password field and attach malicious commands. “It is well known – notorious even – that strcpy is a dangerous function to use,” the blog said. That blog entry, which was posted on Feb. 28, included code describing how an attack could happen.

Read More

Cisco Says Mobile Internet Traffic Will Reach Nearly a Zettabyte by 2022

SDxCentral | February 21, 2019

As usual, the Cisco Mobile Visual Networking Index points to huge increases in the amount of data being trafficked through networks. And, as usual, it’s a master class in exotic numbers. The report, which covers the 2017-2022 time frame, says that the annual run rate of mobile internet traffic will reach almost a zettabyte by the end of that period. Also by 2022, mobile will make up almost 20 percent of local IP traffic. That’s almost 113 times the amount that mobile traffic generated in 2012. “This Mobile VNI clearly shows that the growing demand for wireless networking is not just a preference (not wanting to be tethered to a landline), but for many it’s an expectation that some form of wireless access (cellular or Wi-Fi) needs to be available and of a suitable performance quality to meet their needs,” Thomas Barnett, director of thought leadership for Cisco’s Service Provider business, told SDxCentral in an email. “Consumers and businesses rely on mobile connectivity not only for their personal devices, but also for a growing number of IoTapplications that will expand and evolve as the 5G ecosystem takes shape (more apps, content, analytics, security, et al.)” Cisco has amassed the massive amount of data that comprises the VNI for more than a decade. This is the ninth mobile edition, which relies in part on data from a number of consultancies, regulators and other organizations. The latest wired VNI was released last November. The report says the number of mobile users will increase from 5 billion to 5.7 billion users, mobile connections from 8.6 billion to 12.3 billion, and average network speed from 8.7 Mbps to 28.5 Mbps, between 2017 and 2022. Video, which was 59 percent of traffic in 2017, will be 79 percent in 2022.

Read More

Cisco Patches High Severity Flaws in HyperFlex, Prime Infrastructure

SecurityWeek | February 21, 2019

Cisco this week released patches for more than a dozen vulnerabilities across its product portfolio, including high severity flaws in HyperFlex, Prime Infrastructure, and Prime Collaboration Assurance. Two High risk security bugs were addressed in HyperFlex software, namely a command injection issue in the cluster service manager of the application, and an unauthenticated root access flaw in the hxterm service of the software. Created by insufficient input validation and insufficient authentication controls, respectively, the vulnerabilities could allow an attacker to run commands as the root user or gain root access to all member nodes of the HyperFlex cluster. Tracked as CVE-2018-15380 and CVE-2019-1664, both vulnerabilities were found to impact HyperFlex software releases prior to 3.5(2a). Another High severity bug that Cisco addressed this week is a certificate validation bug in the Identity Services Engine (ISE) integration feature of Prime Infrastructure (PI). An unauthenticated, remote attacker could exploit the flaw to perform a man-in-the-middle attack against the Secure Sockets Layer (SSL) tunnel established between ISE and PI. Tracked as CVE-2019-1659, the issue is created by improper validation of the server SSL certificate when establishing the SSL tunnel with ISE. The flaw impacts Prime Infrastructure Software releases 2.2 through 3.4.0 when the PI server is integrated with ISE, which is disabled by default. Another High risk bug was found in the Quality of Voice Reporting (QOVR) service of Prime Collaboration Assurance (PCA) Software releases prior to 12.1 SP2. Tracked as CVE-2019-1662 and created due to insufficient authentication controls, the issue could allow an unauthenticated, remote attacker to access the system as a valid user.

Read More

Events