SlideShare a Scribd company logo
Issue 17 // December 2017
Dell EMC and technology partners offer new products, solutions and services designed for
easier adoption, faster benefits from machine and deep learning.
NEW DELL EMC SOLUTIONS BRING
MACHINE AND DEEP LEARNING TO
MAINSTREAM ENTERPRISES
Continued on page 3
Continued on page 3
organizations to rethink how they
secure increasingly converged IT,
OT and IoT networks and devices.
Integrating distinct security tools
into a unified Security Fabric
enables organizations to collect
and correlate threat intelligence
in real time, identify abnormal
behavior and automatically
orchestrate a response anywhere
across this complex IoT attack
surface.
FortiGuard ISS protects the
most widely-used Industrial
Control System (ICS) and
Supervisory Control And Data
Acquisition (SCADA) devices
and applications. The new
service provides vulnerability
protection, deep visibility and
granular control over ICS and
Dell EMC has announced
new machine learning and
deep learning solutions,
continuing the company’s
work to bring high
performance computing
(HPC) and data analytics
capabilities to mainstream
enterprises worldwide.
This enables organizations
to take advantage of the
convergence of HPC and
data analytics and realize
advancements in areas
including fraud detection,
image processing,
financial investment
analysis and personalized
medicine, said the firm.
Combined with
knowledge from Dell
EMC experts, the new
Dell EMC Machine and
Deep Learning Ready
Bundles are part of a new
portfolio that delivers
on the commitment
of democratizing HPC
and helping customers
achieve faster, better
and deeper data insights.
These Ready Bundles
combine pre-tested and
validated servers, storage,
networking and services
optimized for machine
and deep learning
applications. The new
ready bundles enable
faster, better, deeper data
insights; include trusted
experts and maximizes
efficiency, security and
control.
Dell EMC Deep
Learning Ready Bundle
customers will benefit
from the introduction
of the new Dell EMC
PowerEdge C4140
server, supporting latest
generation NVIDIA Tesla
V100 GPU accelerators
with PCIe and NVLink
Traditionally, commercial and
industrial networks and their
IoT devices have operated in
isolation, but the mainstreaming
of things like smart cities and
connected homes have begun
to merge these devices within
local, national and global
infrastructures. This is requiring
Fortinet expands security fabric
visibility and protection to
Industrial Internet of Things
The vendor demonstrates IoT security momentum and industry-leading patent innovation
John Maddison, Fortinet
Armughan Ahmad, Dell EMC
Redington Value is a value added distributor for the following brands in parts of Middle East & Africa:
For more information, please write to sales.value@redingtonmea.com
● 10x increase in storage performance
● 99.9999% field-proven availability
● 3:1 data reduction guarantee
OceanStor Dorado V3 All Flash Storage
Lightning Fast, Rock Solid
For more information, please visit e.huawei.com
Leading New ICT, The Road to Digital Transformation
3
Oracle: Moving to IaaS fundamental
to remaining competitive
A global survey revealed that more than half of the respondents believe IaaS makes it
easier for businesses to innovate.
The proportion of businesses
reaping the rewards of embracing
cloud infrastructure services has
increased significantly in the last
quarter, according to a global
survey of 1,610 IT professionals,
said Oracle. Nearly three-quarters
of respondents (72 percent)
believe Infrastructure-as-a-
Service (IaaS) makes it easier
for businesses to innovate, a 10
percent increase over last quarter.
The research also found that 68
percent of businesses believe IaaS
delivers exceptional operational
performance in terms of speed and
availability, a 20 percent quarter-
over-quarter increase.
Over half of respondents (56
percent) found their organization
experienced improved productivity
from their migration to cloud,
while nearly half (46 percent)
found their IT teams have greater
scope to work on other value-
adding projects.
The study also revealed that
two-thirds of businesses (66
percent) believe that companies
not investing in IaaS will struggle
to keep up with those that are using
it. The index also highlighted that
moving to IaaS has significantly
cut time to deployment of new
applications and services and
slashed maintenance costs for
over two-thirds of respondents
(68 percent).
James Stanbridge, Vice President
IaaS Product Management EMEA
and APAC, Oracle said, “The
index confirms that investments
in cloud infrastructure are paying
off. Given the strong recognition
from respondents that IaaS can
help deliver on transformation
and innovation ambitions, we
expect this return on investment to
grow. However, for the minority of
businesses still holding back, the
research indicates the clear risk of
falling behind more agile rivals.”
In addition, 20 percent of
respondents say IaaS is helping
them disrupt their market and
competitors. The findings of the
survey echo the benefits that
Oracle’s Cloud Infrastructure
customers are already seeing as a
result of the high availability, high
performance and cost-effective
cloud-based infrastructure it
delivers, said the firm.
From page 1From page 1
Fortinet...Dell EMC...
The regional IT industry is
undergoing colossal changes with
the emergence of new trends and
evolution of customer demands.
Models are evolving from bulk
capital purchasing to OPEX,
IT-as-a-service, IT-in-the-cloud
and pay-as-you-grow. Market
advancements have also compelled
OEMs to gradually transform into
these newer models.
We are seeing that the pie for
the channel, between the OEM
and end customers, is shrinking in
terms of product delivery and sale.
For partners, reskilling is the need
of the hour. Those partners who
stay invested and have enough
working capital to manage this
transition and enhance credibility
in books of vendors and suppliers
will stand to emerge as winners in
this competitive market.
The challenge for channel is to
transform their organization into
the new models while maintaining
the current business profitability
and ensuring consistent growth.
It can come from partners
recognizing the need to reskill their
team and identifying opportunities
to contribute towards the new
models of business.
At Redington Value, we
believe that collaboration presents
a massive opportunity for
partners to flourish and remain
competitive in 2018. Many
partners have key accounts that
offer significant prospects for
other partners, and together
they can introduce innovative
solutions for customers. Going
forward, we will execute business
in a collaborative ecosystem.
Profitable
partnerships
By Rajesh Mathrani, GM Sales, MENA and
Director Operations, Redington Value
COLUMN: REDefined
high-speed interconnect
technology. This new offering is
an example of the Dell EMC and
NVIDIA strategic agreement for
joint development of new HPC,
data analytics, and artificial
intelligence products and
solutions announced at ISC’17
in June.
The new Dell EMC
PowerEdge C4140 server is
an ultra-dense, accelerator
optimized server platform with an
innovative systems design. The
PowerEdge C4140 features two
Intel Xeon Scalable Processors
and four NVIDIA Tesla GPUs to
deliver optimized performance
for demanding cognitive
workloads.
The Dell EMC Ready
Bundles for machine learning
SCADA systems and is backed
by real-time threat intelligence
updates – enabling organizations
to restrict access and minimize
the attack surface of their critical
IIoT infrastructures. FortiGuard
ISS complements Fortinet’s
industrial-strength security
appliances, which are designed to
run in harsh environments.
John Maddison, Senior
VP, Products and Solutions,
Fortinet, said, “The Fortinet
Security Fabric arms enterprises
with a comprehensive solution
that spans the entire IoT
attack surface, delivering
the performance and threat
intelligence required to learn,
segment, and ultimately protect
the varied attack surfaces created
by IoT.”
and deep learning will be
available in the first half of
2018 through Dell EMC and
its channel partners. Dell
EMC PowerEdge C4140 will
be available worldwide in
December 2017.
Armughan Ahmad,
Senior Vice President and
GM, Hybrid Cloud and Ready
Solutions, Dell EMC, said,
“Our customers consistently
tell us that one of their biggest
challenges is how to best
manage and learn from the
ever-increasing amount of
data they collect daily. With
Dell EMC’s high-performance
computing experience,
we’ve seen how our artificial
intelligence solutions can
deliver critical insights from
this data, faster than ever
before possible.
For more information, please write to sales.value@redingtonmea.com
4
Cambium Networks has
announced new connectivity
solutions to enable network
operators to meet the rapidly
Atul Bhatnagar, Cambium Networks
550 provides the capacity that
network operators need to
connect more subscribers and
reach new market opportunities.
“The PTP 550 is a complete
solution,” said Scott Imhoff,
Senior Vice President of Product
Management, Cambium
Networks. “Spectrum is a
precious commodity and the
non-adjacent asymmetric
channel aggregation capabilities
of the PTP 550 efficiently
consolidate limited blocks of
spectrum to deliver the capacity
demanded by advanced network
operators. LINKPlanner software
provides free network planning
Cambium Networks announces
new wireless broadband solutions
Gigabit long-range backhaul, cost-effective rural connectivity, rapidly deployable
enterprise Wi-Fi extend connectivity to reach new opportunities.
solutions tailored to the exact
source and destination points
on a Google Earth map, and
onboard dynamic spectrum
optimization enables the link
to monitor performance in
real time and automatically
make adjustments to maximize
throughput.”
The ePMP Force 300 provides
up to 500 Mbps headline data
rate at an affordable price
point. The new 802.11ac wave2
subscriber module operates
in the unlicensed 5.1-5.9 GHz
frequency band and has a 25
dBi reflector antenna to support
long-range connectivity.
growing demand for streaming
video and high throughput.
“Cambium Networks
continues to invest in developing
connectivity solutions that
extend and enrich the ‘wireless
fabric’ network,” said Atul
Bhatnagar, President and CEO,
Cambium Networks. “Our
latest developments provide
affordable, reliable connectivity
to extend connectivity to new
areas and distribute signal to
multiple locations and also
provide complete indoor and
outdoor Wi-Fi access.”
With up to 1.36 Gigabit
throughput capacity, the PTP
Huawei has released its Virtual
Reality (VR) OpenLab industry
cooperation plan, at Ultra-
Broadband Forum (UBBF
2017), to promote the prosperity
of Cloud VR, facilitate
technological innovations,
Huawei launches VR OpenLab
industry cooperation plan
The vendor aims to construct a comprehensive Cloud VR industry ecosystem.
incubate business scenarios,
and construct a comprehensive
Cloud VR industry ecosystem.
VR development in games,
videos, and live broadcast
will increase drastically in the
next two years, according to
Gartner’s 2017 Hype Cycle for
emerging technologies. Due
to the characteristics of Cloud
VR, which include lightweight
terminals, low costs, and cloud
rendering, deployment can
be achieved rapidly on a large
scale, making Cloud VR an
inevitable trend of future VR
development, said the firm.
However, Cloud VR
development is still in its
infancy and requires a joint
effort from the entire industry
for faster development. Cloud
VR poses higher latency and
bandwidth requirements on the
backhaul network, which means
current network architecture
and technologies are still
unable to effectively support
Cloud VR. Therefore, industry
partners must seek solutions
to create value and construct
business models.
The VR OpenLab industry
cooperation plan aims to help
upstream and downstream
partners jointly explore the
development path of the Cloud
VR industry. VR OpenLab
will focus on four research
directions: business application
scenarios, service solutions,
bearer network innovations,
and operators’ service
implementation. Through end-
to-end industry cooperation,
VR OpenLab bridges the
ecosystem breakpoints and
fully promotes the commercial
popularization of VR.
As the initiator of the VR
OpenLab industry cooperation
plan, Huawei will focus on
supporting the development of
the cooperation plan relying on
iLab. By providing a 1,000 m2
R&D lab, E2E network devices,
and dozens of experts, Huawei
will cooperate with industry
partners for joint innovations,
facilitating business success.
Currently, 30 partners have
already joined the VR OpenLab
industry cooperation plan.
THE VR OPENLAB
INDUSTRY
COOPERATION
PLAN AIMS TO
HELP UPSTREAM
AND DOWNSTREAM
PARTNERS JOINTLY
EXPLORE THE
DEVELOPMENT PATH
OF THE CLOUD VR
INDUSTRY.
For more information, please write to sales.value@redingtonmea.com
55
Malwarebytes.com/business
750,000,000
IT hours saved
10,000+
Business Protected
605,000
Threats blocked every hour
7
Malwarebytes has released new
data on the efficacy of traditional
antivirus (AV) solutions. The
research, Mapping Traditional
AV Detection Failures, details
how traditional AV solutions
performed from January through
June 2017, based on real-world
remediation scans done by
Malwarebytes. Nearly 40 percent
(39.18 percent) of all malware
attacks cleaned by Malwarebytes
on endpoints with an AV installed
occurred on endpoints that had
two or more of these AV solutions
registered. About 39 percent
(39.16 percent) of attacks on
Malwarebytes releases new data on the
efficacy of traditional AV solutions
Based on data from real-world scans of nearly 10 million endpoints, Malwarebytes discovered malware compromises where a
traditional antivirus solution (AV) was registered on the endpoint.
endpoints with a non-OS bundled
AV installed occurred on an
endpoint running one of the four
leading traditional AV solutions.
The firm consolidated
data from Malwarebytes scans
of approximately 10 million
endpoints, the vast majority
of which had one or more
traditional AV tools registered
on the Windows Security Center.
For comparative purposes, the
company also tracked the failure
rate of the four leading traditional
AV solutions recommended in a
recent industry analysis.
“The results of these scans
clearly indicate the ineffectiveness
of today’s traditional AV
solutions and, more importantly,
the unknown risks to users
that depend only on these AV
platforms to stay safe,” said Marcin
Kleczynski, CEO, Malwarebytes.
“Antiquated AV technology is
no longer enough to protect
from sophisticated cyberthreats.
It’s crucial that consumers and
businesses understand this now
AV failed to protect 39.21
percent of users from all
malware attacks. These
infected machines had two
or more traditional AV
solutions registered.
•	 The four leading
traditional AV players
are failing. 39.16 percent
of the total security
incidents caught among
machines with a non-OS
bundled AV installed were
detected on machines with
one of the four leading
traditional AV players
registered.
•	 Ransomware is no
match for four leading
traditional AV players.
More than 48 (48.59)
percent of Hidden Tear and
more than 26.78 percent of
Cerber events were found
on a compromised endpoint
with a non-OS bundled AV
installed that had at least one
of the four leading traditional
AV brands installed.
before they become a victim of the
next attack.”
Key findings from the report
include:
•	 The most common
forms of malware are
bypassing traditional
AV protections. The
top ransomware types
detected on compromised
machines with a traditional
AV installed were Hidden
Tear (41.65 percent) and
Cerber (18.26 percent).
Botnets most frequently
detected included IRCBot
(61.56 percent) and Kelihos
(26.95 percent). The most
prevalent trojan types
bypassing traditional AV
detections were Fileless
(17.76 percent) and
DNSChanger malware (17.51
percent).
•	 Deploying multiple
traditional AV solutions
is not enough. Real-world
deployments of traditional
Veeam releases new Availability Console
Management console for service providers and distributed enterprises brings all-in-one management and visibility for virtual,
physical and cloud workloads.
distributed enterprises operating
in an IT service delivery model and
wanting to offer efficient, centrally
managed backup, data protection
and disaster recovery services
across a distributed multi-cloud
environment including on-
premises or private cloud, public
cloud, remote and branch offices
(ROBO), as well as mobile or
home workforces.
“Veeam is dedicated to
our 16,700 service provider
partners who are delivering
BaaS and DRaaS services to their
customers,” said Danny Allan,
Vice President, Product Strategy,
Veeam. “Veeam Availability
Console makes it easy to deploy,
manage and monitor all of their
customers’ Veeam-powered
services, whether they provide
Availability for applications and
Danny Allan,Veeam
data in the cloud, in a virtual
environment, or on a physical
server or laptop. Our strategy is
to make it as easy as possible for
our partners to provide valuable
and profitable services to their
customers, and the release of
Veeam Availability Console is part
of delivering on that strategy.”
Veeam Availability Console
license is free, fully supported
for Veeam Cloud and Service
Provider (VCSP) partners. Service
providers interested in using the
free solution are invited to join the
VCSP program, which is free to
join and requires no obligation to
purchase paid Veeam solutions.
Veeam Software has announced
the immediate availability of the
new Veeam Availability Console,
a free management console for
service providers delivering
Veeam-powered services, such as
Backup-as-a-Service (BaaS) and
Disaster Recovery-as-a-Service
(DRaaS), to more efficiently
manage, track and invoice for these
services. In addition, the Veeam
console expands opportunities
for resellers and new managed
service providers (MSPs) looking to
launch a managed backup service
business to capture new revenue
streams. Veeam Availability
Console can also be used by
Marcin Kleczynski, Malwarebytes
For more information, please write to sales.value@redingtonmea.com
8
EVENTS
Cisco Customer Security Roundtable with Partner Carrel Technologies
- Kenya - 22 November
HPE Simplivity 380 Seminar - Nigeria - 23 November
Malwarebytes Security Seminar - Dubai - 12 November
Microsoft Partner Roundtable - Ghana - 13 November
Nokia Executive Roundtable - Dubai - 13 November
Fortinet Partner Workshop - Tanzania - 28 November
Fortinet Security Seminar with Partner Ixtel - Dubai - 20 November
Malwarebytes Security Seminar Kuwait - Kuwait - 20 November
Red Hat - Customer Event - Cairo - 23rd November
Red Hat Customer Executive Seminar with Partner Alpha Data
- Abu Dhabi - 27 November
For more information, please write to sales.value@redingtonmea.com
9
RSA - Partner Training - Riyadh - 22nd November
TCG Digital Launch Event - Nigeria - 21 November
Redington Value Proud Partner of Vee-
am ON Forum - Dubai - 15 November
Fortinet Customer Workshop -
Dubai - 13-14 November
Fortinet Partner Meet - Bahrain - 14 November
Shavlik Partner Bootcamp - Dubai - 19 November
Redington Value Proud Partner at Edutech Forum with Aruba Networks and
Partner Maxtouch - Dubai - 14 November
Tripplite Lunch and Learn Session - Uganda - 24 November
Veritas Partner Bootcamp - Nigeria - 16 November
Veritas Partner Workshop - Tanzania - 24 November
Splunk4Rookies Workshop - Dubai - 27 November
Cisco Customer Security
Roundtable with Partner
Carrel Technologies -
Kenya - 22 November
For more information, please write to sales.value@redingtonmea.com
10
SYMC_230x27
The vendor’s latest Global Threat Impact Index reveals influx of crypto mining in October, with CoinHive as the world’s
sixth most-used malware.
The vendor’s latest Global Threat
Impact Index reveals influx of
crypto mining in October, with
CoinHive as the world’s sixth
Check Point: Cryptocurrency mining
presents new threat to business
most-used malware.
Cybersecurity solutions
vendor Check Point Software
Technologies has revealed that
according to the company’s latest
Global Threat Impact Index,
cryptocurrency mining was an
increasingly prevalent form of
malware during October, as
organizations were targeted with
the CoinHive variant.
Following up on recent Check
Point research that found that
crypto-miners can fraudulently
use up to 65% of an end-user’s
total CPU resources without the
end-user’s approval, the CoinHive
variant entered the Index in 6th
place in October. The malware
is designed to mine the Monero
cryptocurrency when a user visits
a web page, without the user’s
approval. CoinHive implants
JavaScript, which then uses high
levels of the end-users’ CPU,
severely impact the machine’s
performance.
As in September, RoughTed
and Locky remained the two most
prevalent threats. However, there
was a new entry to the top three:
the ‘Seamless traffic redirector’
malware. This malware silently
redirects the victim to a malicious
web page, leading to infection
by an exploit kit. Successfully
infecting the target allows the
attacker to download additional
malware.
Maya Horowitz, Threat
Intelligence, Group Manager,
Check Point, said, “The
emergence of Seamless and
CoinHive once again highlights
the need for advanced threat
prevention technologies in
securing networks against cyber-
criminals. Crypto mining is a
new, silent, yet significant actor
in the threat landscape, allowing
threat actors to make significant
revenues while victims’ endpoints
and networks suffer from latency
and decreased performance.”
Amazon Web Services, (AWS),
an Amazon.com company, has
announced the availability of C5
instances, the next generation
of compute optimized instances
for Amazon Elastic Compute
Cloud (Amazon EC2). Designed
for compute-heavy applications,
C5 instances feature 3.0 GHz
Intel Xeon Scalable processors
(Skylake-SP) up to 72 vCPUs,
and 144 GiB of memory—
twice the vCPUs and memory
of previous generation C4
instances—providing the best
price-performance of any
Amazon EC2 instance.
Optimized to deliver the right
combination of CPU, memory,
storage, and networking capacity
for a wide range of workloads,
all latest generation Amazon
EC2 instance families—including
AWS announces availability of
C5 Instances for Amazon EC2
New generation of compute optimized instances include latest Intel Xeon Scalable
processors (Skylake-SP) and custom hardware to deliver a 25 percent improvement in
price-performance.
C5—feature AWS hardware
acceleration that delivers
consistent, high performance,
low latency networking and
storage resources. C5 instances
provide networking through the
Elastic Network Adapter (ENA),
a scalable network interface built
by AWS to provide direct access
to its networking hardware.
Additional dedicated hardware
and network bandwidth
for Amazon Elastic Block
Store (Amazon EBS) enables
C5 instances to offer high
performance storage through the
scalable NVM Express (NVMe)
interface. C5 instances introduce
a new, lightweight hypervisor
that allows applications to use
practically all of the compute and
memory resources of a server,
delivering reduced cost and even
better performance. C5 instances
are available in six sizes—with
the four smallest instance sizes
offering substantially more
Amazon EBS and network
bandwidth than the previous
generation of compute optimized
instances.
“Customers have been happily
using Amazon EC2’s unmatched
selection of instances for more
than 11 years, yet they’ll always
take higher and more consistent
performance if it could be
offered in a cost-effective
way. One of the challenges in
taking this next step is how to
leverage the cost efficiency of
virtualization while consuming
hardly any overhead for it,” said
Matt Garman, Vice President,
Amazon EC2, AWS. “We’ve
been working on an innovative
way to do this that comes to
fruition with Amazon EC2 C5
instances. Equipped with our
new cloud-optimized hypervisor,
C5 instances set a new standard
for consistent, high-performance
cloud computing, eliminating
practically any virtualization
overhead through custom AWS
hardware, and delivering a 25
percent improvement in compute
price-performance over C4
instances—with some customers
reporting improvements of well
over 50 percent.”
Equipped with our new cloud-optimized
hypervisor, C5 instances set a new standard for
consistent, high-performance cloud computing,
eliminating practically any virtualization
overhead through custom AWS hardware.”
For more information, please write to sales.value@redingtonmea.com
Copyright © 2017 Symantec Corporation. All rights reserved.
We Are The Cloud Generation. The
Cloud Generation is everyone who
lives and works in this unique era—
as computing breaks the boundaries
of desktops and data centers to
embrace the mobile, social, global,
crowd-sourced, always-on realities
of modern life. It’s a time when critical
data, applications and infrastructure
are shifting from “behind the firewall”
to “running on the cloud.” Some of us
are “all in.” Some are only 20% there.
Yes, it’s liberating. And yes, it’s chaotic.
Symantec is here to help.
Securing the
Cloud Generation
SYMC_230x275_PrintAd_EMEA.indd 1 8/29/17 7:21 A
Redington Value Journal - December 2017

More Related Content

What's hot

Value Journal - February 2021
Value Journal - February 2021Value Journal - February 2021
Value Journal - February 2021
Redington Value Distribution
 
Technology Trends 2012
Technology Trends 2012Technology Trends 2012
Technology Trends 2012
Software Park Thailand
 
Value Journal - June 2021
Value Journal - June 2021Value Journal - June 2021
Value Journal - June 2021
Redington Value Distribution
 
Pund-IT: Getting Things Right—Software and IBM’s Acquisition Strategy
Pund-IT: Getting Things Right—Software and IBM’s Acquisition StrategyPund-IT: Getting Things Right—Software and IBM’s Acquisition Strategy
Pund-IT: Getting Things Right—Software and IBM’s Acquisition Strategy
Mauricio Godoy
 
Redington Value Journal - September 2016
Redington Value Journal - September 2016Redington Value Journal - September 2016
Redington Value Journal - September 2016
Redington Value Distribution
 
Case Study - Microsemi Uses Microsoft Dynamics AX to Reduce Costs and Improve...
Case Study - Microsemi Uses Microsoft Dynamics AX to Reduce Costs and Improve...Case Study - Microsemi Uses Microsoft Dynamics AX to Reduce Costs and Improve...
Case Study - Microsemi Uses Microsoft Dynamics AX to Reduce Costs and Improve...
Armanino LLP
 
Cover Story_Digital Terminal copy
Cover Story_Digital Terminal copyCover Story_Digital Terminal copy
Cover Story_Digital Terminal copy
Garima Rai
 
TBytes Agile & AI Operations
TBytes Agile & AI OperationsTBytes Agile & AI Operations
TBytes Agile & AI Operations
EGBG Services
 
Value Journal - March 2021
Value Journal - March 2021Value Journal - March 2021
Value Journal - March 2021
Redington Value Distribution
 
Building Innovative Industry Solutions for System z
Building Innovative Industry Solutions for System zBuilding Innovative Industry Solutions for System z
Building Innovative Industry Solutions for System z
dkang
 
Benefiting from Semantic AI along the data life cycle
Benefiting from Semantic AI along the data life cycleBenefiting from Semantic AI along the data life cycle
Benefiting from Semantic AI along the data life cycle
Martin Kaltenböck
 
Redington Value Journal - April 2019
Redington Value Journal - April 2019Redington Value Journal - April 2019
Redington Value Journal - April 2019
Redington Value Distribution
 
E-Magazine September Issue 2021
E-Magazine September Issue 2021E-Magazine September Issue 2021
E-Magazine September Issue 2021
VARINDIA
 
Accenture 5 g-municipalities-become-smart-cities
Accenture 5 g-municipalities-become-smart-citiesAccenture 5 g-municipalities-become-smart-cities
Accenture 5 g-municipalities-become-smart-cities
Mustafa Kuğu
 
Oracle Social Welfare and the Cloud - WernbergTougaard
Oracle Social Welfare and the Cloud - WernbergTougaardOracle Social Welfare and the Cloud - WernbergTougaard
Oracle Social Welfare and the Cloud - WernbergTougaard
Christian Wernberg-Tougaard
 
Redington Value Journal - November 2017
Redington Value Journal - November 2017Redington Value Journal - November 2017
Redington Value Journal - November 2017
Redington Value Distribution
 
Value journal - August 2021
Value journal - August 2021Value journal - August 2021
Value journal - August 2021
Juned Parvez Attar
 
Value Journal _July 2020
Value Journal _July 2020Value Journal _July 2020
Value Journal _July 2020
Redington Value Distribution
 
Software-Defined Storage Accelerates Storage Cost Reduction and Service-Level...
Software-Defined Storage Accelerates Storage Cost Reduction and Service-Level...Software-Defined Storage Accelerates Storage Cost Reduction and Service-Level...
Software-Defined Storage Accelerates Storage Cost Reduction and Service-Level...
DataCore Software
 
Oracle cloud-predictions-2019-5244106
Oracle cloud-predictions-2019-5244106Oracle cloud-predictions-2019-5244106
Oracle cloud-predictions-2019-5244106
Jason Brazelton
 

What's hot (20)

Value Journal - February 2021
Value Journal - February 2021Value Journal - February 2021
Value Journal - February 2021
 
Technology Trends 2012
Technology Trends 2012Technology Trends 2012
Technology Trends 2012
 
Value Journal - June 2021
Value Journal - June 2021Value Journal - June 2021
Value Journal - June 2021
 
Pund-IT: Getting Things Right—Software and IBM’s Acquisition Strategy
Pund-IT: Getting Things Right—Software and IBM’s Acquisition StrategyPund-IT: Getting Things Right—Software and IBM’s Acquisition Strategy
Pund-IT: Getting Things Right—Software and IBM’s Acquisition Strategy
 
Redington Value Journal - September 2016
Redington Value Journal - September 2016Redington Value Journal - September 2016
Redington Value Journal - September 2016
 
Case Study - Microsemi Uses Microsoft Dynamics AX to Reduce Costs and Improve...
Case Study - Microsemi Uses Microsoft Dynamics AX to Reduce Costs and Improve...Case Study - Microsemi Uses Microsoft Dynamics AX to Reduce Costs and Improve...
Case Study - Microsemi Uses Microsoft Dynamics AX to Reduce Costs and Improve...
 
Cover Story_Digital Terminal copy
Cover Story_Digital Terminal copyCover Story_Digital Terminal copy
Cover Story_Digital Terminal copy
 
TBytes Agile & AI Operations
TBytes Agile & AI OperationsTBytes Agile & AI Operations
TBytes Agile & AI Operations
 
Value Journal - March 2021
Value Journal - March 2021Value Journal - March 2021
Value Journal - March 2021
 
Building Innovative Industry Solutions for System z
Building Innovative Industry Solutions for System zBuilding Innovative Industry Solutions for System z
Building Innovative Industry Solutions for System z
 
Benefiting from Semantic AI along the data life cycle
Benefiting from Semantic AI along the data life cycleBenefiting from Semantic AI along the data life cycle
Benefiting from Semantic AI along the data life cycle
 
Redington Value Journal - April 2019
Redington Value Journal - April 2019Redington Value Journal - April 2019
Redington Value Journal - April 2019
 
E-Magazine September Issue 2021
E-Magazine September Issue 2021E-Magazine September Issue 2021
E-Magazine September Issue 2021
 
Accenture 5 g-municipalities-become-smart-cities
Accenture 5 g-municipalities-become-smart-citiesAccenture 5 g-municipalities-become-smart-cities
Accenture 5 g-municipalities-become-smart-cities
 
Oracle Social Welfare and the Cloud - WernbergTougaard
Oracle Social Welfare and the Cloud - WernbergTougaardOracle Social Welfare and the Cloud - WernbergTougaard
Oracle Social Welfare and the Cloud - WernbergTougaard
 
Redington Value Journal - November 2017
Redington Value Journal - November 2017Redington Value Journal - November 2017
Redington Value Journal - November 2017
 
Value journal - August 2021
Value journal - August 2021Value journal - August 2021
Value journal - August 2021
 
Value Journal _July 2020
Value Journal _July 2020Value Journal _July 2020
Value Journal _July 2020
 
Software-Defined Storage Accelerates Storage Cost Reduction and Service-Level...
Software-Defined Storage Accelerates Storage Cost Reduction and Service-Level...Software-Defined Storage Accelerates Storage Cost Reduction and Service-Level...
Software-Defined Storage Accelerates Storage Cost Reduction and Service-Level...
 
Oracle cloud-predictions-2019-5244106
Oracle cloud-predictions-2019-5244106Oracle cloud-predictions-2019-5244106
Oracle cloud-predictions-2019-5244106
 

Similar to Redington Value Journal - December 2017

Redington Value Journal - March 2017
Redington Value Journal - March 2017Redington Value Journal - March 2017
Redington Value Journal - March 2017
Redington Value Distribution
 
Abi research over the edge
Abi research over the edgeAbi research over the edge
Abi research over the edge
myehuman
 
Redington Value Journal - May 2018
Redington Value Journal - May 2018Redington Value Journal - May 2018
Redington Value Journal - May 2018
Redington Value Distribution
 
Seven data storage & networking trends in 2020
Seven data storage & networking trends in 2020Seven data storage & networking trends in 2020
Seven data storage & networking trends in 2020
Abaram Network Solutions
 
Redington Value Journal - February 2018
Redington Value Journal - February 2018Redington Value Journal - February 2018
Redington Value Journal - February 2018
Redington Value Distribution
 
EMC APAC State of Hybrid Cloud
EMC APAC State of Hybrid CloudEMC APAC State of Hybrid Cloud
EMC APAC State of Hybrid Cloud
Ai-Ling See
 
Redington Value Journal - December 2016
Redington Value Journal - December 2016Redington Value Journal - December 2016
Redington Value Journal - December 2016
Redington Value Distribution
 
Value Journal January 2020
Value Journal January 2020Value Journal January 2020
Value Journal January 2020
Redington Value Distribution
 
Redington Value Journal - March 2018
Redington Value Journal - March 2018Redington Value Journal - March 2018
Redington Value Journal - March 2018
Redington Value Distribution
 
Redington Value Journal - August 2018
Redington Value Journal - August 2018Redington Value Journal - August 2018
Redington Value Journal - August 2018
Redington Value Distribution
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
Redington Value Distribution
 
Value Plus April014
Value Plus April014 Value Plus April014
Value Plus April014
aditya0312
 
Redington Value Journal - June 2016
Redington Value Journal - June 2016Redington Value Journal - June 2016
Redington Value Journal - June 2016
Redington Value Distribution
 
Industrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M OverviewIndustrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M Overview
Bryan Kester
 
Aricent Technology Vision 2016
Aricent Technology Vision 2016Aricent Technology Vision 2016
Aricent Technology Vision 2016
Aricent
 
Redington Value Journal - September 2018
Redington Value Journal - September  2018Redington Value Journal - September  2018
Redington Value Journal - September 2018
Redington Value Distribution
 
T-Byte Hybrid Cloud Infrastructure July 2021
T-Byte Hybrid Cloud Infrastructure July 2021T-Byte Hybrid Cloud Infrastructure July 2021
T-Byte Hybrid Cloud Infrastructure July 2021
EGBG Services
 
Dimension Data And EMC Expand Their Partnership With The Formation Of The Cat...
Dimension Data And EMC Expand Their Partnership With The Formation Of The Cat...Dimension Data And EMC Expand Their Partnership With The Formation Of The Cat...
Dimension Data And EMC Expand Their Partnership With The Formation Of The Cat...
Chandrakumar Natarajan
 
Cloud Computing and Edge Computing(CTO Kieun Park) - Edge Computing Seminar
Cloud Computing and Edge Computing(CTO Kieun Park) - Edge Computing SeminarCloud Computing and Edge Computing(CTO Kieun Park) - Edge Computing Seminar
Cloud Computing and Edge Computing(CTO Kieun Park) - Edge Computing Seminar
NAVER CLOUD PLATFORMㅣ네이버 클라우드 플랫폼
 
Redington Value Journal - August 2016
Redington Value Journal - August 2016Redington Value Journal - August 2016
Redington Value Journal - August 2016
Redington Value Distribution
 

Similar to Redington Value Journal - December 2017 (20)

Redington Value Journal - March 2017
Redington Value Journal - March 2017Redington Value Journal - March 2017
Redington Value Journal - March 2017
 
Abi research over the edge
Abi research over the edgeAbi research over the edge
Abi research over the edge
 
Redington Value Journal - May 2018
Redington Value Journal - May 2018Redington Value Journal - May 2018
Redington Value Journal - May 2018
 
Seven data storage & networking trends in 2020
Seven data storage & networking trends in 2020Seven data storage & networking trends in 2020
Seven data storage & networking trends in 2020
 
Redington Value Journal - February 2018
Redington Value Journal - February 2018Redington Value Journal - February 2018
Redington Value Journal - February 2018
 
EMC APAC State of Hybrid Cloud
EMC APAC State of Hybrid CloudEMC APAC State of Hybrid Cloud
EMC APAC State of Hybrid Cloud
 
Redington Value Journal - December 2016
Redington Value Journal - December 2016Redington Value Journal - December 2016
Redington Value Journal - December 2016
 
Value Journal January 2020
Value Journal January 2020Value Journal January 2020
Value Journal January 2020
 
Redington Value Journal - March 2018
Redington Value Journal - March 2018Redington Value Journal - March 2018
Redington Value Journal - March 2018
 
Redington Value Journal - August 2018
Redington Value Journal - August 2018Redington Value Journal - August 2018
Redington Value Journal - August 2018
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
 
Value Plus April014
Value Plus April014 Value Plus April014
Value Plus April014
 
Redington Value Journal - June 2016
Redington Value Journal - June 2016Redington Value Journal - June 2016
Redington Value Journal - June 2016
 
Industrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M OverviewIndustrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M Overview
 
Aricent Technology Vision 2016
Aricent Technology Vision 2016Aricent Technology Vision 2016
Aricent Technology Vision 2016
 
Redington Value Journal - September 2018
Redington Value Journal - September  2018Redington Value Journal - September  2018
Redington Value Journal - September 2018
 
T-Byte Hybrid Cloud Infrastructure July 2021
T-Byte Hybrid Cloud Infrastructure July 2021T-Byte Hybrid Cloud Infrastructure July 2021
T-Byte Hybrid Cloud Infrastructure July 2021
 
Dimension Data And EMC Expand Their Partnership With The Formation Of The Cat...
Dimension Data And EMC Expand Their Partnership With The Formation Of The Cat...Dimension Data And EMC Expand Their Partnership With The Formation Of The Cat...
Dimension Data And EMC Expand Their Partnership With The Formation Of The Cat...
 
Cloud Computing and Edge Computing(CTO Kieun Park) - Edge Computing Seminar
Cloud Computing and Edge Computing(CTO Kieun Park) - Edge Computing SeminarCloud Computing and Edge Computing(CTO Kieun Park) - Edge Computing Seminar
Cloud Computing and Edge Computing(CTO Kieun Park) - Edge Computing Seminar
 
Redington Value Journal - August 2016
Redington Value Journal - August 2016Redington Value Journal - August 2016
Redington Value Journal - August 2016
 

More from Redington Value Distribution

Value Journal - January 2021
Value Journal - January 2021Value Journal - January 2021
Value Journal - January 2021
Redington Value Distribution
 
Value Journal - December 2020
Value Journal - December 2020Value Journal - December 2020
Value Journal - December 2020
Redington Value Distribution
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
Redington Value Distribution
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
Redington Value Distribution
 
Value Journal - August 2020
Value Journal - August 2020Value Journal - August 2020
Value Journal - August 2020
Redington Value Distribution
 
Value journal June 2020
Value journal June 2020Value journal June 2020
Value journal June 2020
Redington Value Distribution
 
Value stories - 5th Issue
Value stories - 5th IssueValue stories - 5th Issue
Value stories - 5th Issue
Redington Value Distribution
 
Value journal March2020
Value journal March2020Value journal March2020
Value journal March2020
Redington Value Distribution
 
Value Journal February 2020
Value Journal February 2020Value Journal February 2020
Value Journal February 2020
Redington Value Distribution
 
Value Journal December 2019
Value Journal December 2019Value Journal December 2019
Value Journal December 2019
Redington Value Distribution
 
Value journal November_2019
Value journal November_2019Value journal November_2019
Value journal November_2019
Redington Value Distribution
 
Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019
Redington Value Distribution
 
Value journal October_2019
Value journal October_2019 Value journal October_2019
Value journal October_2019
Redington Value Distribution
 
Redington Value journal - August 2019
Redington Value journal - August 2019 Redington Value journal - August 2019
Redington Value journal - August 2019
Redington Value Distribution
 
Redington Value Journal - July 2019
Redington Value Journal - July 2019Redington Value Journal - July 2019
Redington Value Journal - July 2019
Redington Value Distribution
 
Redington Value Journal - June 2019
Redington Value Journal - June 2019Redington Value Journal - June 2019
Redington Value Journal - June 2019
Redington Value Distribution
 
Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019
Redington Value Distribution
 
Redington Value Journal - January 2019
Redington Value Journal - January 2019Redington Value Journal - January 2019
Redington Value Journal - January 2019
Redington Value Distribution
 
Value Stories - 2nd issue - October 2018
Value Stories - 2nd issue - October 2018Value Stories - 2nd issue - October 2018
Value Stories - 2nd issue - October 2018
Redington Value Distribution
 

More from Redington Value Distribution (19)

Value Journal - January 2021
Value Journal - January 2021Value Journal - January 2021
Value Journal - January 2021
 
Value Journal - December 2020
Value Journal - December 2020Value Journal - December 2020
Value Journal - December 2020
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
 
Value Journal - August 2020
Value Journal - August 2020Value Journal - August 2020
Value Journal - August 2020
 
Value journal June 2020
Value journal June 2020Value journal June 2020
Value journal June 2020
 
Value stories - 5th Issue
Value stories - 5th IssueValue stories - 5th Issue
Value stories - 5th Issue
 
Value journal March2020
Value journal March2020Value journal March2020
Value journal March2020
 
Value Journal February 2020
Value Journal February 2020Value Journal February 2020
Value Journal February 2020
 
Value Journal December 2019
Value Journal December 2019Value Journal December 2019
Value Journal December 2019
 
Value journal November_2019
Value journal November_2019Value journal November_2019
Value journal November_2019
 
Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019
 
Value journal October_2019
Value journal October_2019 Value journal October_2019
Value journal October_2019
 
Redington Value journal - August 2019
Redington Value journal - August 2019 Redington Value journal - August 2019
Redington Value journal - August 2019
 
Redington Value Journal - July 2019
Redington Value Journal - July 2019Redington Value Journal - July 2019
Redington Value Journal - July 2019
 
Redington Value Journal - June 2019
Redington Value Journal - June 2019Redington Value Journal - June 2019
Redington Value Journal - June 2019
 
Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019
 
Redington Value Journal - January 2019
Redington Value Journal - January 2019Redington Value Journal - January 2019
Redington Value Journal - January 2019
 
Value Stories - 2nd issue - October 2018
Value Stories - 2nd issue - October 2018Value Stories - 2nd issue - October 2018
Value Stories - 2nd issue - October 2018
 

Recently uploaded

Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 

Recently uploaded (20)

Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 

Redington Value Journal - December 2017

  • 1. Issue 17 // December 2017 Dell EMC and technology partners offer new products, solutions and services designed for easier adoption, faster benefits from machine and deep learning. NEW DELL EMC SOLUTIONS BRING MACHINE AND DEEP LEARNING TO MAINSTREAM ENTERPRISES Continued on page 3 Continued on page 3 organizations to rethink how they secure increasingly converged IT, OT and IoT networks and devices. Integrating distinct security tools into a unified Security Fabric enables organizations to collect and correlate threat intelligence in real time, identify abnormal behavior and automatically orchestrate a response anywhere across this complex IoT attack surface. FortiGuard ISS protects the most widely-used Industrial Control System (ICS) and Supervisory Control And Data Acquisition (SCADA) devices and applications. The new service provides vulnerability protection, deep visibility and granular control over ICS and Dell EMC has announced new machine learning and deep learning solutions, continuing the company’s work to bring high performance computing (HPC) and data analytics capabilities to mainstream enterprises worldwide. This enables organizations to take advantage of the convergence of HPC and data analytics and realize advancements in areas including fraud detection, image processing, financial investment analysis and personalized medicine, said the firm. Combined with knowledge from Dell EMC experts, the new Dell EMC Machine and Deep Learning Ready Bundles are part of a new portfolio that delivers on the commitment of democratizing HPC and helping customers achieve faster, better and deeper data insights. These Ready Bundles combine pre-tested and validated servers, storage, networking and services optimized for machine and deep learning applications. The new ready bundles enable faster, better, deeper data insights; include trusted experts and maximizes efficiency, security and control. Dell EMC Deep Learning Ready Bundle customers will benefit from the introduction of the new Dell EMC PowerEdge C4140 server, supporting latest generation NVIDIA Tesla V100 GPU accelerators with PCIe and NVLink Traditionally, commercial and industrial networks and their IoT devices have operated in isolation, but the mainstreaming of things like smart cities and connected homes have begun to merge these devices within local, national and global infrastructures. This is requiring Fortinet expands security fabric visibility and protection to Industrial Internet of Things The vendor demonstrates IoT security momentum and industry-leading patent innovation John Maddison, Fortinet Armughan Ahmad, Dell EMC Redington Value is a value added distributor for the following brands in parts of Middle East & Africa: For more information, please write to sales.value@redingtonmea.com
  • 2. ● 10x increase in storage performance ● 99.9999% field-proven availability ● 3:1 data reduction guarantee OceanStor Dorado V3 All Flash Storage Lightning Fast, Rock Solid For more information, please visit e.huawei.com Leading New ICT, The Road to Digital Transformation
  • 3. 3 Oracle: Moving to IaaS fundamental to remaining competitive A global survey revealed that more than half of the respondents believe IaaS makes it easier for businesses to innovate. The proportion of businesses reaping the rewards of embracing cloud infrastructure services has increased significantly in the last quarter, according to a global survey of 1,610 IT professionals, said Oracle. Nearly three-quarters of respondents (72 percent) believe Infrastructure-as-a- Service (IaaS) makes it easier for businesses to innovate, a 10 percent increase over last quarter. The research also found that 68 percent of businesses believe IaaS delivers exceptional operational performance in terms of speed and availability, a 20 percent quarter- over-quarter increase. Over half of respondents (56 percent) found their organization experienced improved productivity from their migration to cloud, while nearly half (46 percent) found their IT teams have greater scope to work on other value- adding projects. The study also revealed that two-thirds of businesses (66 percent) believe that companies not investing in IaaS will struggle to keep up with those that are using it. The index also highlighted that moving to IaaS has significantly cut time to deployment of new applications and services and slashed maintenance costs for over two-thirds of respondents (68 percent). James Stanbridge, Vice President IaaS Product Management EMEA and APAC, Oracle said, “The index confirms that investments in cloud infrastructure are paying off. Given the strong recognition from respondents that IaaS can help deliver on transformation and innovation ambitions, we expect this return on investment to grow. However, for the minority of businesses still holding back, the research indicates the clear risk of falling behind more agile rivals.” In addition, 20 percent of respondents say IaaS is helping them disrupt their market and competitors. The findings of the survey echo the benefits that Oracle’s Cloud Infrastructure customers are already seeing as a result of the high availability, high performance and cost-effective cloud-based infrastructure it delivers, said the firm. From page 1From page 1 Fortinet...Dell EMC... The regional IT industry is undergoing colossal changes with the emergence of new trends and evolution of customer demands. Models are evolving from bulk capital purchasing to OPEX, IT-as-a-service, IT-in-the-cloud and pay-as-you-grow. Market advancements have also compelled OEMs to gradually transform into these newer models. We are seeing that the pie for the channel, between the OEM and end customers, is shrinking in terms of product delivery and sale. For partners, reskilling is the need of the hour. Those partners who stay invested and have enough working capital to manage this transition and enhance credibility in books of vendors and suppliers will stand to emerge as winners in this competitive market. The challenge for channel is to transform their organization into the new models while maintaining the current business profitability and ensuring consistent growth. It can come from partners recognizing the need to reskill their team and identifying opportunities to contribute towards the new models of business. At Redington Value, we believe that collaboration presents a massive opportunity for partners to flourish and remain competitive in 2018. Many partners have key accounts that offer significant prospects for other partners, and together they can introduce innovative solutions for customers. Going forward, we will execute business in a collaborative ecosystem. Profitable partnerships By Rajesh Mathrani, GM Sales, MENA and Director Operations, Redington Value COLUMN: REDefined high-speed interconnect technology. This new offering is an example of the Dell EMC and NVIDIA strategic agreement for joint development of new HPC, data analytics, and artificial intelligence products and solutions announced at ISC’17 in June. The new Dell EMC PowerEdge C4140 server is an ultra-dense, accelerator optimized server platform with an innovative systems design. The PowerEdge C4140 features two Intel Xeon Scalable Processors and four NVIDIA Tesla GPUs to deliver optimized performance for demanding cognitive workloads. The Dell EMC Ready Bundles for machine learning SCADA systems and is backed by real-time threat intelligence updates – enabling organizations to restrict access and minimize the attack surface of their critical IIoT infrastructures. FortiGuard ISS complements Fortinet’s industrial-strength security appliances, which are designed to run in harsh environments. John Maddison, Senior VP, Products and Solutions, Fortinet, said, “The Fortinet Security Fabric arms enterprises with a comprehensive solution that spans the entire IoT attack surface, delivering the performance and threat intelligence required to learn, segment, and ultimately protect the varied attack surfaces created by IoT.” and deep learning will be available in the first half of 2018 through Dell EMC and its channel partners. Dell EMC PowerEdge C4140 will be available worldwide in December 2017. Armughan Ahmad, Senior Vice President and GM, Hybrid Cloud and Ready Solutions, Dell EMC, said, “Our customers consistently tell us that one of their biggest challenges is how to best manage and learn from the ever-increasing amount of data they collect daily. With Dell EMC’s high-performance computing experience, we’ve seen how our artificial intelligence solutions can deliver critical insights from this data, faster than ever before possible. For more information, please write to sales.value@redingtonmea.com
  • 4. 4 Cambium Networks has announced new connectivity solutions to enable network operators to meet the rapidly Atul Bhatnagar, Cambium Networks 550 provides the capacity that network operators need to connect more subscribers and reach new market opportunities. “The PTP 550 is a complete solution,” said Scott Imhoff, Senior Vice President of Product Management, Cambium Networks. “Spectrum is a precious commodity and the non-adjacent asymmetric channel aggregation capabilities of the PTP 550 efficiently consolidate limited blocks of spectrum to deliver the capacity demanded by advanced network operators. LINKPlanner software provides free network planning Cambium Networks announces new wireless broadband solutions Gigabit long-range backhaul, cost-effective rural connectivity, rapidly deployable enterprise Wi-Fi extend connectivity to reach new opportunities. solutions tailored to the exact source and destination points on a Google Earth map, and onboard dynamic spectrum optimization enables the link to monitor performance in real time and automatically make adjustments to maximize throughput.” The ePMP Force 300 provides up to 500 Mbps headline data rate at an affordable price point. The new 802.11ac wave2 subscriber module operates in the unlicensed 5.1-5.9 GHz frequency band and has a 25 dBi reflector antenna to support long-range connectivity. growing demand for streaming video and high throughput. “Cambium Networks continues to invest in developing connectivity solutions that extend and enrich the ‘wireless fabric’ network,” said Atul Bhatnagar, President and CEO, Cambium Networks. “Our latest developments provide affordable, reliable connectivity to extend connectivity to new areas and distribute signal to multiple locations and also provide complete indoor and outdoor Wi-Fi access.” With up to 1.36 Gigabit throughput capacity, the PTP Huawei has released its Virtual Reality (VR) OpenLab industry cooperation plan, at Ultra- Broadband Forum (UBBF 2017), to promote the prosperity of Cloud VR, facilitate technological innovations, Huawei launches VR OpenLab industry cooperation plan The vendor aims to construct a comprehensive Cloud VR industry ecosystem. incubate business scenarios, and construct a comprehensive Cloud VR industry ecosystem. VR development in games, videos, and live broadcast will increase drastically in the next two years, according to Gartner’s 2017 Hype Cycle for emerging technologies. Due to the characteristics of Cloud VR, which include lightweight terminals, low costs, and cloud rendering, deployment can be achieved rapidly on a large scale, making Cloud VR an inevitable trend of future VR development, said the firm. However, Cloud VR development is still in its infancy and requires a joint effort from the entire industry for faster development. Cloud VR poses higher latency and bandwidth requirements on the backhaul network, which means current network architecture and technologies are still unable to effectively support Cloud VR. Therefore, industry partners must seek solutions to create value and construct business models. The VR OpenLab industry cooperation plan aims to help upstream and downstream partners jointly explore the development path of the Cloud VR industry. VR OpenLab will focus on four research directions: business application scenarios, service solutions, bearer network innovations, and operators’ service implementation. Through end- to-end industry cooperation, VR OpenLab bridges the ecosystem breakpoints and fully promotes the commercial popularization of VR. As the initiator of the VR OpenLab industry cooperation plan, Huawei will focus on supporting the development of the cooperation plan relying on iLab. By providing a 1,000 m2 R&D lab, E2E network devices, and dozens of experts, Huawei will cooperate with industry partners for joint innovations, facilitating business success. Currently, 30 partners have already joined the VR OpenLab industry cooperation plan. THE VR OPENLAB INDUSTRY COOPERATION PLAN AIMS TO HELP UPSTREAM AND DOWNSTREAM PARTNERS JOINTLY EXPLORE THE DEVELOPMENT PATH OF THE CLOUD VR INDUSTRY. For more information, please write to sales.value@redingtonmea.com
  • 6.
  • 7. 7 Malwarebytes has released new data on the efficacy of traditional antivirus (AV) solutions. The research, Mapping Traditional AV Detection Failures, details how traditional AV solutions performed from January through June 2017, based on real-world remediation scans done by Malwarebytes. Nearly 40 percent (39.18 percent) of all malware attacks cleaned by Malwarebytes on endpoints with an AV installed occurred on endpoints that had two or more of these AV solutions registered. About 39 percent (39.16 percent) of attacks on Malwarebytes releases new data on the efficacy of traditional AV solutions Based on data from real-world scans of nearly 10 million endpoints, Malwarebytes discovered malware compromises where a traditional antivirus solution (AV) was registered on the endpoint. endpoints with a non-OS bundled AV installed occurred on an endpoint running one of the four leading traditional AV solutions. The firm consolidated data from Malwarebytes scans of approximately 10 million endpoints, the vast majority of which had one or more traditional AV tools registered on the Windows Security Center. For comparative purposes, the company also tracked the failure rate of the four leading traditional AV solutions recommended in a recent industry analysis. “The results of these scans clearly indicate the ineffectiveness of today’s traditional AV solutions and, more importantly, the unknown risks to users that depend only on these AV platforms to stay safe,” said Marcin Kleczynski, CEO, Malwarebytes. “Antiquated AV technology is no longer enough to protect from sophisticated cyberthreats. It’s crucial that consumers and businesses understand this now AV failed to protect 39.21 percent of users from all malware attacks. These infected machines had two or more traditional AV solutions registered. • The four leading traditional AV players are failing. 39.16 percent of the total security incidents caught among machines with a non-OS bundled AV installed were detected on machines with one of the four leading traditional AV players registered. • Ransomware is no match for four leading traditional AV players. More than 48 (48.59) percent of Hidden Tear and more than 26.78 percent of Cerber events were found on a compromised endpoint with a non-OS bundled AV installed that had at least one of the four leading traditional AV brands installed. before they become a victim of the next attack.” Key findings from the report include: • The most common forms of malware are bypassing traditional AV protections. The top ransomware types detected on compromised machines with a traditional AV installed were Hidden Tear (41.65 percent) and Cerber (18.26 percent). Botnets most frequently detected included IRCBot (61.56 percent) and Kelihos (26.95 percent). The most prevalent trojan types bypassing traditional AV detections were Fileless (17.76 percent) and DNSChanger malware (17.51 percent). • Deploying multiple traditional AV solutions is not enough. Real-world deployments of traditional Veeam releases new Availability Console Management console for service providers and distributed enterprises brings all-in-one management and visibility for virtual, physical and cloud workloads. distributed enterprises operating in an IT service delivery model and wanting to offer efficient, centrally managed backup, data protection and disaster recovery services across a distributed multi-cloud environment including on- premises or private cloud, public cloud, remote and branch offices (ROBO), as well as mobile or home workforces. “Veeam is dedicated to our 16,700 service provider partners who are delivering BaaS and DRaaS services to their customers,” said Danny Allan, Vice President, Product Strategy, Veeam. “Veeam Availability Console makes it easy to deploy, manage and monitor all of their customers’ Veeam-powered services, whether they provide Availability for applications and Danny Allan,Veeam data in the cloud, in a virtual environment, or on a physical server or laptop. Our strategy is to make it as easy as possible for our partners to provide valuable and profitable services to their customers, and the release of Veeam Availability Console is part of delivering on that strategy.” Veeam Availability Console license is free, fully supported for Veeam Cloud and Service Provider (VCSP) partners. Service providers interested in using the free solution are invited to join the VCSP program, which is free to join and requires no obligation to purchase paid Veeam solutions. Veeam Software has announced the immediate availability of the new Veeam Availability Console, a free management console for service providers delivering Veeam-powered services, such as Backup-as-a-Service (BaaS) and Disaster Recovery-as-a-Service (DRaaS), to more efficiently manage, track and invoice for these services. In addition, the Veeam console expands opportunities for resellers and new managed service providers (MSPs) looking to launch a managed backup service business to capture new revenue streams. Veeam Availability Console can also be used by Marcin Kleczynski, Malwarebytes For more information, please write to sales.value@redingtonmea.com
  • 8. 8 EVENTS Cisco Customer Security Roundtable with Partner Carrel Technologies - Kenya - 22 November HPE Simplivity 380 Seminar - Nigeria - 23 November Malwarebytes Security Seminar - Dubai - 12 November Microsoft Partner Roundtable - Ghana - 13 November Nokia Executive Roundtable - Dubai - 13 November Fortinet Partner Workshop - Tanzania - 28 November Fortinet Security Seminar with Partner Ixtel - Dubai - 20 November Malwarebytes Security Seminar Kuwait - Kuwait - 20 November Red Hat - Customer Event - Cairo - 23rd November Red Hat Customer Executive Seminar with Partner Alpha Data - Abu Dhabi - 27 November For more information, please write to sales.value@redingtonmea.com
  • 9. 9 RSA - Partner Training - Riyadh - 22nd November TCG Digital Launch Event - Nigeria - 21 November Redington Value Proud Partner of Vee- am ON Forum - Dubai - 15 November Fortinet Customer Workshop - Dubai - 13-14 November Fortinet Partner Meet - Bahrain - 14 November Shavlik Partner Bootcamp - Dubai - 19 November Redington Value Proud Partner at Edutech Forum with Aruba Networks and Partner Maxtouch - Dubai - 14 November Tripplite Lunch and Learn Session - Uganda - 24 November Veritas Partner Bootcamp - Nigeria - 16 November Veritas Partner Workshop - Tanzania - 24 November Splunk4Rookies Workshop - Dubai - 27 November Cisco Customer Security Roundtable with Partner Carrel Technologies - Kenya - 22 November For more information, please write to sales.value@redingtonmea.com
  • 10. 10 SYMC_230x27 The vendor’s latest Global Threat Impact Index reveals influx of crypto mining in October, with CoinHive as the world’s sixth most-used malware. The vendor’s latest Global Threat Impact Index reveals influx of crypto mining in October, with CoinHive as the world’s sixth Check Point: Cryptocurrency mining presents new threat to business most-used malware. Cybersecurity solutions vendor Check Point Software Technologies has revealed that according to the company’s latest Global Threat Impact Index, cryptocurrency mining was an increasingly prevalent form of malware during October, as organizations were targeted with the CoinHive variant. Following up on recent Check Point research that found that crypto-miners can fraudulently use up to 65% of an end-user’s total CPU resources without the end-user’s approval, the CoinHive variant entered the Index in 6th place in October. The malware is designed to mine the Monero cryptocurrency when a user visits a web page, without the user’s approval. CoinHive implants JavaScript, which then uses high levels of the end-users’ CPU, severely impact the machine’s performance. As in September, RoughTed and Locky remained the two most prevalent threats. However, there was a new entry to the top three: the ‘Seamless traffic redirector’ malware. This malware silently redirects the victim to a malicious web page, leading to infection by an exploit kit. Successfully infecting the target allows the attacker to download additional malware. Maya Horowitz, Threat Intelligence, Group Manager, Check Point, said, “The emergence of Seamless and CoinHive once again highlights the need for advanced threat prevention technologies in securing networks against cyber- criminals. Crypto mining is a new, silent, yet significant actor in the threat landscape, allowing threat actors to make significant revenues while victims’ endpoints and networks suffer from latency and decreased performance.” Amazon Web Services, (AWS), an Amazon.com company, has announced the availability of C5 instances, the next generation of compute optimized instances for Amazon Elastic Compute Cloud (Amazon EC2). Designed for compute-heavy applications, C5 instances feature 3.0 GHz Intel Xeon Scalable processors (Skylake-SP) up to 72 vCPUs, and 144 GiB of memory— twice the vCPUs and memory of previous generation C4 instances—providing the best price-performance of any Amazon EC2 instance. Optimized to deliver the right combination of CPU, memory, storage, and networking capacity for a wide range of workloads, all latest generation Amazon EC2 instance families—including AWS announces availability of C5 Instances for Amazon EC2 New generation of compute optimized instances include latest Intel Xeon Scalable processors (Skylake-SP) and custom hardware to deliver a 25 percent improvement in price-performance. C5—feature AWS hardware acceleration that delivers consistent, high performance, low latency networking and storage resources. C5 instances provide networking through the Elastic Network Adapter (ENA), a scalable network interface built by AWS to provide direct access to its networking hardware. Additional dedicated hardware and network bandwidth for Amazon Elastic Block Store (Amazon EBS) enables C5 instances to offer high performance storage through the scalable NVM Express (NVMe) interface. C5 instances introduce a new, lightweight hypervisor that allows applications to use practically all of the compute and memory resources of a server, delivering reduced cost and even better performance. C5 instances are available in six sizes—with the four smallest instance sizes offering substantially more Amazon EBS and network bandwidth than the previous generation of compute optimized instances. “Customers have been happily using Amazon EC2’s unmatched selection of instances for more than 11 years, yet they’ll always take higher and more consistent performance if it could be offered in a cost-effective way. One of the challenges in taking this next step is how to leverage the cost efficiency of virtualization while consuming hardly any overhead for it,” said Matt Garman, Vice President, Amazon EC2, AWS. “We’ve been working on an innovative way to do this that comes to fruition with Amazon EC2 C5 instances. Equipped with our new cloud-optimized hypervisor, C5 instances set a new standard for consistent, high-performance cloud computing, eliminating practically any virtualization overhead through custom AWS hardware, and delivering a 25 percent improvement in compute price-performance over C4 instances—with some customers reporting improvements of well over 50 percent.” Equipped with our new cloud-optimized hypervisor, C5 instances set a new standard for consistent, high-performance cloud computing, eliminating practically any virtualization overhead through custom AWS hardware.” For more information, please write to sales.value@redingtonmea.com
  • 11. Copyright © 2017 Symantec Corporation. All rights reserved. We Are The Cloud Generation. The Cloud Generation is everyone who lives and works in this unique era— as computing breaks the boundaries of desktops and data centers to embrace the mobile, social, global, crowd-sourced, always-on realities of modern life. It’s a time when critical data, applications and infrastructure are shifting from “behind the firewall” to “running on the cloud.” Some of us are “all in.” Some are only 20% there. Yes, it’s liberating. And yes, it’s chaotic. Symantec is here to help. Securing the Cloud Generation SYMC_230x275_PrintAd_EMEA.indd 1 8/29/17 7:21 A