Ransomware attacks are on the rise. After a surge in remote working and with employees accessing organisational networks in ways that aren’t always perfectly secured, cybercrime has spiked over the past few months as malicious parties have taken advantage of the sudden move to life in lockdown. Opportunistic hackers have found a particularly tender target to focus on: hospitals and healthcare providers.

The rapid and global business response to COVID-19 served to underscore the need for business continuity plans that include flexible, anywhere, anytime, secure remote access to any information, using any application on any device, and from any location - and at scale. But this wasn’t some radical departure from the direction business was already headed. It simply accelerated our transition to a more fluid, digital world.

Quarkus is driving Java-based applications and services into the future. More specifically, the Quarkus framework is helping to drive Java-coded assets into a future that is positively populated with the computing advantages that come from the use of serverless, cloud and Kubernetes environments.

Today, almost no discussion on any topic goes on for a long time without raising the topic of the pandemic in some way. this agenda dominates our entire lives in many ways today. of course, life will continue, but somewhat differently. companies have had to rethink their business models and adapt to the fact that in the near future fewer people will work in the office, many will continue their activities remotely. This situation has put pressure on IT departments, including new security issues.

Оборудование InfiniBand не пользуется высоким спросом на вторичке, поэтому цены на него в 5-10 раз ниже, чем на 10-гигабитное. При этом, скорость - выше, а сети можно строить вообще без коммутаторов.

When you look at how large companies are rowing everything that is bad in the world of protocols and network solutions, you do not immediately understand what is happening, so let's figure it out together.

Employees can pose a significant risk to the security of corporate networks and the data they hold. The severity of this problem is confirmed by research – 68% of organizations feel moderately or extremely vulnerable to insider attacks.

In recent years, we have seen an increase in the performance of data storage technologies, which eventually reached the physical limits due to outdated data exchange protocols in data centers. Despite the use of 100GbE and new networking technologies such as InfiniBand, these legacy protocols continue to slow down the performance of flash drives because they are isolated within devices. In this article, we will talk about the non-Volatile Memory Express (NVMe) specification. Next, we'll focus on NVMe over Fabrics (NVMe-oF) and NVMe over RDMA over Converged Ethernet (NVMe over RoCE), new Protocol specifications designed to address problem points in modern storage networks.

Operational technologies, or OT, are a critical segment of the network used by businesses that produce goods or engage in physical processes. Industries such as manufacturing, chemical, oil and gas, mining, transport and logistics use specialized technologies to manage facilities: Assembly and production sites and power systems. The control, monitoring, and management of these systems have been gradually automated over the past few decades, and the specialized systems that perform these tasks are called industrial control systems (ICS), dispatch control, and data acquisition (SCADA), or simply OT.

As the cloud business grows, so does its impact on the environment. Many companies aim for zero net emissions, but Microsoft goes even further: the company doesn't just reduce its emissions to zero, but seeks to remove the carbon it has been emitting into the atmosphere since 1975 in order to truly move to negative carbon emissions.