01.03.2023 Views

NC Feb-Mar 2023

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NETWORKcomputing<br />

I N F O R M A T I O N A N D C O M M U N I C A T I O N S – N E T W O R K E D www.networkcomputing.co.uk<br />

DATA PERSPECTIVES<br />

A closer look at a secure, data-driven future<br />

HYBRID WORKING<br />

Bridging the employeremployee<br />

disconnect<br />

CLOUDS AND SILVER<br />

LININGS<br />

Forecasting the year ahead<br />

for networks<br />

QUANTUM FOR THE<br />

LONG TERM<br />

Quantum trends for<br />

<strong>2023</strong> and beyond<br />

FEBRUARY/MARCH <strong>2023</strong> VOL 32 NO 01


EVENT ORGANISERS:<br />

Do you have something coming up that may<br />

interest readers of Network Computing?<br />

Contact dave.bonner@btc.co.uk<br />

08-09<br />

MAR<br />

TECH SHOW LONDON<br />

ExCel, London<br />

www.techshowlondon.co.uk<br />

FORTHCOMING EVENTS<br />

<strong>2023</strong><br />

FORTHCOMING EVENTS<br />

FORTHCOMING EVENTS<br />

21-22<br />

MAR<br />

21-22<br />

MAR<br />

26-27<br />

SEPT<br />

15-16<br />

NOV<br />

COMMUNICATION TECHNOLOGY EXPO<br />

ExCel, London<br />

www.communicationtechnologyexpo.co.uk<br />

THE REMOTE WORKING EXPO<br />

ExCel, London<br />

www.businessrevivalseries.co.uk/<br />

the-remote-working-expo<br />

INTERNATIONAL CYBER EXPO<br />

Olympia, London<br />

www.internationalcyberexpo.com<br />

DATACENTRES IRELAND<br />

RDS Dublin<br />

www.datacentres-ireland.com


COMMENT<br />

COMMENT<br />

DRIVEN BY DATA<br />

We're delving deeper into data this issue with articles that explore ways to<br />

leverage and protect it to best benefit our businesses. First, Certes Networks'<br />

Simon Pamplin puts the case for abstracting data protection from infrastructure<br />

in order to ensure that it remains both secure and compliant with data regulations.<br />

"Attitudes to data security need to change fast because today's infrastructure-led<br />

model is creating too much risk," explains Simon. "According to the 2022 IBM Data<br />

Breach survey, 83% of companies confirm they expect a security breach - and many<br />

accept that breaches will occur more than once. Given this perception, the question<br />

has to be asked: why are businesses still reliant on a security posture focused on locking<br />

the infrastructure down?"<br />

Security and compliance issues are far from the only potential pitfalls when it comes<br />

to getting the most out of this prized asset. As Teradata's Ken Wood explains, network<br />

latency has long been an obstacle when it comes to leveraging data: "The race<br />

between network latency and data size has been a back-and-forth struggle throughout<br />

the history of computer networking. Even as the world gets digitally smaller, network<br />

latencies can make accessing data seem too far away to be efficiently analysed with<br />

high performance analytical databases engines which are already on the market." Read<br />

Ken's article to discover why keeping data-in-place - leaving "the original as the original"<br />

- might be the best solution to a problem as old as networks themselves.<br />

REVIEWS:<br />

Dave Mitchell<br />

DEPUTY EDITOR: <strong>Mar</strong>k Lyward<br />

(netcomputing@btc.co.uk)<br />

PRODUCTION: Abby Penn<br />

(abby.penn@btc.co.uk)<br />

DESIGN: Ian Collis<br />

(ian.collis@btc.co.uk<br />

SALES:<br />

David Bonner<br />

(david.bonner@btc.co.uk)<br />

Julie Cornish<br />

(julie.cornish@btc.co.uk)<br />

SUBSCRIPTIONS: Christina Willis<br />

(christina.willis@btc.co.uk)<br />

PUBLISHER: John Jageurs<br />

(john.jageurs@btc.co.uk)<br />

Published by Barrow & Thompkins<br />

Connexion Ltd (BTC)<br />

35 Station Square,<br />

Petts Wood, Kent, BR5 1LZ<br />

Tel: +44 (0)1689 616 000<br />

Fax: +44 (0)1689 82 66 22<br />

SUBSCRIPTIONS:<br />

UK £35/year, £60/two years,<br />

£80/three years;<br />

Europe:<br />

£48/year, £85/two years £127/three years;<br />

ROW:<br />

£62/year, £115/two years, £168/three years;<br />

Subscribers get SPECIAL OFFERS — see subscriptions<br />

advertisement; Single copies of<br />

Network Computing can be bought for £8;<br />

(including postage & packing).<br />

© <strong>2023</strong> Barrow & Thompkins<br />

Connexion Ltd.<br />

All rights reserved.<br />

No part of the magazine may be<br />

reproduced without prior consent, in<br />

writing, from the publisher.<br />

We also have an opinion piece from D55's Jonathan Rothwell on the prospects for<br />

data-first systems in the year ahead. According to Jonathan "A data-driven remodelling<br />

synergises systems for efficiency, moving businesses beyond the disjointed siloed data<br />

access commonly associated with antiquated legacy systems," and can potentially provide<br />

a competitive edge for companies seeking to integrate digital transformation. Will<br />

<strong>2023</strong> be the year of data-driven everything? Read Jonathan's article for more.<br />

And from data to dates for your diary with the news that nominations for the <strong>2023</strong><br />

Network Computing Awards are now open! This will be the 17th year of the Network<br />

Computing Awards, and you now only have until 9th <strong>Mar</strong>ch to nominate your finalists<br />

for this year. Voting to determine the winners will begin later in <strong>Mar</strong>ch and the awards<br />

ceremony itself will be held on 18th May, so be sure to visit https://networkcomputingawards.co.uk<br />

soon to make your selections heard. <strong>NC</strong><br />

GET FUTURE COPIES FREE<br />

BY REGISTERING ONLINE AT<br />

WWW.NETWORKCOMPUTING.CO.UK/REGISTER<br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 03


CONTENTS<br />

CONTENTS<br />

F E B R U A R Y / M A R C H 2 0 2 3<br />

CLOUDS AND SILVER LININGS..8<br />

From hybrid working and the cloud to the<br />

IT skills gap, Network Computing asked<br />

industry experts for their forecasts for the<br />

next twelve months<br />

COMMENT.....................................3<br />

Driven by data<br />

INDUSTRY NEWS.............................6<br />

The latest networking news<br />

ARTICLES<br />

THE TOP FIVE NETWORK TRENDS<br />

FOR <strong>2023</strong>.......................................12<br />

By Douglas Wadkins at Opengear<br />

SHADOW IT’S CLUE TO HYBRID<br />

WORKING ENGAGEMENT...............16<br />

By Jason Barker at IR<br />

A COLLABORATIVE EFFORT.............18<br />

By Carl Day at Apogee<br />

FILE SY<strong>NC</strong>HRONISATION CHALLENGES<br />

IN THE HYBRID WORKPLACE............20<br />

By Jason Kent at Open Seas<br />

ADREM NETCRU<strong>NC</strong>H 13......13<br />

Enterprises and SMBs are spoilt for choice<br />

with network monitoring products, but<br />

AdRem Software’s NetCrunch stands out<br />

from the crowd for many good reasons<br />

DATA PERSPECTIVES.............24<br />

We delve into data this issue with articles on<br />

removing network latency and abstracting<br />

data protection, and consider whether <strong>2023</strong><br />

will be the year of data-driven everything<br />

HYBRID WORKING.................16<br />

Our hybrid working feature this issue looks at<br />

ways of bridging the employer-employee<br />

disconnect while improving the hybrid<br />

working environment for the entire workforce<br />

QUANTUM MECHANICS.....30<br />

Dr Eric Holland, Director of Quantum<br />

Engineering Solutions at Keysight<br />

Technologies, explores six key quantum<br />

trends for <strong>2023</strong> and beyond<br />

THE YEAR OF DATA-DRIVEN<br />

EVERYTHING....................................24<br />

By Jonathan Rothwell at D55<br />

REMOVING THE MANAGEMENT<br />

COSTS OF NETWORK LATE<strong>NC</strong>Y......26<br />

By Ken Wood at Teradata<br />

ABSTRACTING DATA PROTECTION<br />

FROM INFRASTRUCTURE.................28<br />

By Simon Pamplin at Certes Networks<br />

DISCOVERING RULES THROUGH<br />

MACHINE LEARNING.......................32<br />

By Juras Juršenas at Oxylabs<br />

AWARDS<br />

NOW’S THE TIME TO NOMINATE...14<br />

With nominations now open for the <strong>2023</strong><br />

Network Computing Awards, ExaGrid share<br />

their experience of being a part of the awards<br />

CASE STUDIES<br />

SUPERMICRO BIGTWIN HAS A BIG<br />

IMPACT AT CERN.............................21<br />

Supermicro servers enable faster and more<br />

complex simulations at CERN Data Centre<br />

DIGITAL TRANSFORMATION PROVIDES<br />

QUANTIFIABLE TIME SAVING............34<br />

Tendring District Council, working with<br />

Espria, transitions to Sophos Central<br />

REVIEW<br />

ADREM NETCRU<strong>NC</strong>H 13.................13<br />

04 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


INDUSTRY NEWS<br />

NEWSNEWS<br />

NEWS NEWS<br />

NEWS NEWS NEWS NEWS<br />

NEWS NEWS<br />

Over half of IT pros have Kubernetes security concerns<br />

New research has found that 53% of developers are<br />

concerned about the security of Kubernetes. Taken from<br />

Civo's The Kubernetes State of Play 2022, the research found<br />

54% of 1000 cloud developers surveyed by Civo view the<br />

complexity around Kubernetes as slowing their use of<br />

containers, an increase of 7% from the previous year. Failure<br />

to manage this complexity can often leave organisations<br />

vulnerable. When asked about other motivating factors for<br />

their security concerns around Kubernetes, just over 50% said<br />

misconfigurations and exposure were driving their concerns.<br />

Many developers are also anxious about bad actors<br />

exploiting flaws in Kubernetes software. Almost two-thirds<br />

(66%) of developers said they were worried about the security<br />

concerns created by Kubernetes vulnerabilities. This comes at a<br />

time of concerted action by tech firms and government bodies<br />

to address this problem. Notably, the US Congress is pressing<br />

ahead with the Securing Open Source Software Act to create<br />

an industry-wide approach to tackling vulnerabilities connected<br />

to open-source software like Kubernetes.<br />

Despite these security concerns, they come at a time of<br />

increased usage of Kubernetes. Civo found that for the first<br />

time the majority of IT professionals are using Kubernetes and<br />

containers in their daily operations, with 57% of respondents<br />

seeing an increase in the amount of Kubernetes clusters<br />

running in their organisation over the last 12 months.<br />

Sophos expands firewall portfolio with new appliances<br />

Sophos has expanded its next-gen firewall portfolio with two<br />

new high-end, enterprise-grade XGS Series appliances.<br />

"Sophos is shaking up the competitive enterprise firewall<br />

landscape with these new high-performance appliances,<br />

providing best in class price per protected megabit per second<br />

(Mbps)," according to Daniel Cole, vp of network security<br />

product management at Sophos.<br />

The new XGS 7500 and 8500 models deliver industry-best<br />

modular connectivity; highly scalable SD-WAN features;<br />

trusted traffic and application acceleration; high performance<br />

Transport Layer Security (TLS) inspection; threat protection; and<br />

enterprise-grade, high-availability and redundancy<br />

capabilities. Featuring high performance Xstream flow<br />

processors and central processing units (CPUs) with enterprisegrade<br />

acceleration, the models offer roughly 50% faster<br />

throughput than industry averages in their class.<br />

Acronis nets cyber protection partnership with Fulham<br />

Acronis has announced a three-year partnership with<br />

London's oldest professional football club, Fulham FC.<br />

EveryCloud.co.uk will support Acronis as its 'Strategic<br />

#Cyberfit' delivery partner providing its cutting-edge cyber<br />

protection solutions and cloud backup service to the club.<br />

Under the Strategic #Cyberfit delivery partner<br />

EveryCloud.co.uk, Acronis will provide Premier League side<br />

Fulham FC with a full suite of cyber protection solutions.<br />

Arturs Banks, Head of IT of Fulham FC, said: "We are very<br />

pleased to be working with Acronis and EveryCloud UK, and<br />

we look forward to incorporating them into our cloud backup<br />

and file security infrastructure. Their support and expertise will<br />

be invaluable to Fulham FC and the Fulham FC Foundation as<br />

we continue to prioritise data and cyber security at the club."<br />

Half of software licenses going unused by employees<br />

Nexthink has released new findings from its report: Soft-<br />

WASTE: How Much Does IT Waste on Unused Software<br />

Licenses? The report uncovered that half (49.96%) of all software<br />

installed went unused by employees. These findings are informed<br />

by analysing more than 6 million customer environments across<br />

8 industries and 12 regions, looking at historical data of the first<br />

few months of Nexthink implementation to set the best standard<br />

of what an average business is dealing with when it comes to a<br />

lack of visibility around software licenses.<br />

"Shutting down licenses in a random or uninformed manner<br />

can lead to higher costs in the medium term. Only when IT has<br />

access to all the information about who is using what, what is not<br />

used, what is still performing and what needs to be repaired or<br />

replaced, can it see and take advantage of greater efficiencies in<br />

a sustainable and recurring manner," said Yassine Zaied, Chief<br />

Strategy and <strong>Mar</strong>keting Officer at Nexthink.<br />

06 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


INDUSTRY NEWS<br />

Looking at more than 30 popular software tools, the report<br />

used an averaging licensing fee per user per month (ranging<br />

from $8 per user to $83) and calculated that based on the<br />

unused software licenses found in their 6 million data set. It was<br />

discovered that it was costing those businesses about $45M per<br />

month, or roughly half a billion per year. The report also<br />

discovered that many knowledge workers are using multiple<br />

applications for the same purpose. For example, roughly 37%<br />

of employees use 3 browser applications to access their SaaS<br />

tools and the internet, and 31% use 2 collaboration tools.<br />

Keysight launches wireless test platform for 5G RedCap<br />

Keysight Technologies' new E7515R solution is based on its<br />

5G Network Emulation Solutions platform, a streamlined<br />

network emulator specifically designed for protocol, radio<br />

frequency (RF), and functional testing of all cellular internet of<br />

things (CIoT) technologies, including RedCap. The E7515R<br />

expands Keysight's 5G Network Emulation Solutions portfolio,<br />

twhich is used in mobile device validation across the workflow,<br />

from early design to acceptance and deployment.<br />

The 5G RedCap specification introduces support for wireless<br />

devices with reduced 5G capabilities. These devices are less<br />

complex, and consume less power, allowing them to address new<br />

CIoT use cases such as industrial sensors and wearables such as<br />

smartwatches. The Keysight E7515R addresses this need as a<br />

network emulation test platform designed specifically for 5G<br />

RedCap and supporting all CIoT technologies. The solution<br />

features streamlined capabilities for RedCap without the<br />

additional features needed to test a full-spec 5G device.<br />

The release of the E7515R solution builds on Keysight's<br />

ongoing RedCap device development, includingestablishing a<br />

data call using the 5G RedCap specification. Through this<br />

demonstration, Keysight's 5G Network Emulation Solutions<br />

validated RedCap connectivity on a 5G chipset.<br />

New firewalls for remote and distributed environments<br />

WatchGuard has released its new Firebox T25/T25-W,<br />

T45/T45-POE/T45-W-POE, and T85-POE tabletop<br />

firewall appliances. Powered by WatchGuard's Unified Security<br />

Platform architecture to deliver comprehensive security and<br />

simplified management through WatchGuard Cloud, the new<br />

firewalls are engineered to provide the performance that remote<br />

and distributed business environments need for better protection<br />

against the latest network security threats. "This new generation<br />

of Fireboxes takes full advantage of our Unified Security Platform<br />

architecture, enabling MSPs to provide the robust solutions and<br />

simplified management they require to meet the needs of a wide<br />

range of customers and deployment scenarios," according to<br />

Ryan Poutre, product manager at WatchGuard Technologies.<br />

With enterprise-class security services like APT Blocker (sandbox<br />

malware detection) and ThreatSync for shared knowledge<br />

between endpoint and network, the new Fireboxes are ideal for<br />

small businesses that lack a designated security team. Beyond<br />

providing advanced malware protection for distributed<br />

environments, they also include SD-WAN to optimise network<br />

performance by dynamically distributing network traffic across<br />

multiple connections based on defined policies. The new<br />

Fireboxes take advantage of the latest updates in WatchGuard<br />

Cloud to display a graphical real-time update of SD-WAN link<br />

status and any failovers, and also support the latest Fireware<br />

capabilities for load sharing across multiple links.<br />

Zero Trust security for operational technology<br />

In order to help companies keep their operational technology<br />

(OT) secure, Palo Alto Networks has introduced Zero Trust<br />

OT Security. A key component of the solution is the new clouddelivered<br />

Industrial OT Security service, which can be easily<br />

enabled - without the need to install additional sensors - by<br />

any of the 61,000+ active customers of Palo Alto Networks<br />

network security products: hardware and software Next-<br />

Generation Firewalls and Prisma SASE.<br />

Built on an AI-powered foundation with ease of deployment<br />

in mind, the new solution enables customers to secure their<br />

OT environments from the most sophisticated threats while<br />

simplifying their operations. Using the industry’s first MLpowered<br />

OT visibility engine, the Industrial OT Security<br />

service recognises hundreds of unique OT device profiles,<br />

over 1,000 OT/Industrial Control System applications, and<br />

has hundreds of distinct OT threat signatures to help protect<br />

hard-to-secure assets.<br />

NEWS NEWSNEWS<br />

NEWS<br />

NEWS NEWS NEWS NEWS NEWS<br />

NEWS<br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 07


FEATURE: <strong>2023</strong> PREDICTIONS<br />

CLOUDS AND SILVER LININGS<br />

FROM HYBRID WORKING AND THE CLOUD TO THE IT SKILLS GAP,<br />

NETWORK COMPUTING ASKED INDUSTRY EXPERTS TO GIVE US<br />

THEIR FORECASTS FOR THE YEAR AHEAD<br />

THE NETWORK<br />

ARUBA<br />

According to Aruba 20% of organisations<br />

will have adopted a network-as-a-service<br />

(NaaS) strategy by the end of this year:<br />

"With tightening economic conditions, IT<br />

requires flexibility in how network<br />

infrastructure is acquired, deployed, and<br />

operated to enable network teams to<br />

deliver business outcomes rather than just<br />

managing devices. Migration to a NaaS<br />

framework enables IT to accelerate network<br />

modernisation yet stay within budget, IT<br />

resource, and schedule constraints. In<br />

addition, adopting a NaaS strategy will<br />

help organisations meet sustainability<br />

objectives since leading NaaS suppliers<br />

have adopted carbon-neutral and recycling<br />

manufacturing strategies."<br />

Aruba also predicts that IT will consolidate<br />

operations onto a single, centralised<br />

network and security management<br />

platform, saying "More diverse digital<br />

technology (IoT) is being deployed by<br />

enterprises to improve user experiences<br />

and to streamline IT operations. At the<br />

same time, employees and customers<br />

expect a better integrated real life/digital<br />

experience no matter what the enterprises'<br />

business model is. These dynamics have<br />

added complexity to both the network and<br />

security and have made managing the<br />

infrastructure more complex. With an<br />

intensified focus on end user quality of<br />

experience while increasing protection from<br />

cyberattacks, IT will look to a single<br />

centralised management system with<br />

visibility across the network and the ability<br />

to configure edge-to-cloud QoS and<br />

security policies."<br />

ALLIED TELESIS<br />

Allied Telesis caution that businesses will<br />

need to evolve their approach to<br />

networking in the year ahead. "As mobile<br />

users expect more immersive experiences<br />

on their devices, the demand for bandwidth<br />

will continue to grow. Current IT devices are<br />

evolving to provide more throughput both<br />

on a wired network, moving from 1G to<br />

2.5/5 or 10G and on a wireless network<br />

with the full adoption of Wi-Fi 6 technology.<br />

"These two evolutions need to proceed in<br />

parallel. Wi-Fi 6 requires high speed wired<br />

08 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


FEATURE: <strong>2023</strong> PREDICTIONS<br />

devices with 2.5G or 5G to provide the<br />

full potential and the wired switches need<br />

to connect to Wi-Fi 6 Access Points to use<br />

all the available bandwidth. Companies<br />

will need to take a step-by-step network<br />

upgrade, starting from the wired device to<br />

build an infrastructure ready to deploy the<br />

new Wi-Fi 6 Access Point and then once<br />

ready, migrate the Wi-Fi from the current<br />

implementation to Wi-Fi 6."<br />

They add that Wi-Fi will continue to grow<br />

as the main access technology, and will<br />

require "a more powerful infrastructure<br />

and advanced feature-set to support the<br />

growing demands of the user. The<br />

capability to manage the mobility, device<br />

location, and the capability to adapt<br />

autonomously to environmental changes<br />

will be the main characteristics of new<br />

wireless solutions. To accommodate this<br />

increase in complexity, smart network<br />

management tools, incorporating<br />

elements of artificial intelligence, will<br />

become more widely adopted."<br />

ESPRIA<br />

Platform and Infrastructure-as-a-Service<br />

(PaaS/IaaS) represent one of the biggest<br />

opportunities for service providers in<br />

<strong>2023</strong> according to Espira, offering "the<br />

chance to host the services and<br />

infrastructure that are usually present in<br />

an on-premises data centre. This includes<br />

elements like hardware, software, storage,<br />

servers and networking components,<br />

along with the virtualisation layer and<br />

ready-made services such as database<br />

platforms, to help businesses scale<br />

quickly. It is a hugely attractive model as<br />

PaaS and IaaS also enable organisations<br />

to cut costs, reduce the time spent<br />

managing in-house infrastructure and<br />

services, and improve service levels for<br />

their end users.<br />

"This model eliminates wait times for<br />

hardware, other components, or on-site<br />

support and the subscription-based billing<br />

model of IaaS offers many advantages to<br />

clients in terms of scalability, cost, and<br />

security, often making enterprise-grade<br />

services available to organisations for<br />

whom they may previously have been out<br />

of reach."<br />

TELEHOUSE<br />

Telehouse caution that the energy crisis is<br />

also set to impact IT operations and cost<br />

efficiencies. "With the price of energy<br />

reaching unprecedented highs, many<br />

organisations will see their IT spend<br />

continue to rise next year. However, while<br />

budgets might be able to absorb these<br />

extra costs in the short term, it is not a<br />

sustainable financial option for most<br />

businesses. Decision-makers will therefore<br />

start to look towards other means of<br />

ensuring a reliable, secure energy supply<br />

and energy reduction schemes to<br />

minimise the impacts on operational costs<br />

to ensure current and future productivity."<br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 09


FEATURE: <strong>2023</strong> PREDICTIONS<br />

THE IT WORKFORCE<br />

ALLIED TELESIS<br />

What new skill sets will be required to deal<br />

with the latest IT innovations in the year<br />

ahead? According to Allied Telesis "There<br />

will be a need to evolve the skills of the IT<br />

team; IT engineers will need to be able to<br />

dovetail from network management to<br />

network security, but also to take control of<br />

all other services that run over the network<br />

(e.g., DVS or building automation). To<br />

enable this new skill, a new family of tools<br />

are required that can automate large parts<br />

of the IT activity and to provide a complete<br />

vision of any aspect of the network in a<br />

simple way and recommend the actions the<br />

human operators should take. Ultimately,<br />

these actions will also be automated once<br />

full intent-based management tools become<br />

mainstream."<br />

NERDIO<br />

For Nerdio while the future of work is still<br />

largely one of uncertainty it seems that<br />

hybrid working at least is here to stay. "Many<br />

different factors are impacting the workplace<br />

as it stands. Recession is slowly but surely<br />

kicking in, with many companies already<br />

starting layoffs, which could give employers<br />

more power to exercise over employees and<br />

pressure them into working from the office.<br />

On the flip side, increasing business costs<br />

can also result in WFH being incentivised:<br />

many companies still aren't prepared for the<br />

expenses that come with returning everyone<br />

into the office. From an employee<br />

perspective, rising interest rates and petrol<br />

prices might lower their willingness to<br />

commute, but as the costs of working from<br />

home also rise, the population will continue<br />

to be divided over this issue.<br />

"As a result, the tech we use also needs to<br />

remain adaptable to both situations. Newer<br />

features, such as single sign-on, W365<br />

offline mode, and bypassing the physical<br />

machine and logging directly into the virtual<br />

desktop, will drive the seamless adoption of<br />

DaaS and an easy transition between home<br />

and the office for a genuine WFA (workfrom-anywhere)<br />

experience."<br />

SHARP EUROPE<br />

Sharp Europe believe that the demand for<br />

hybrid working will continue this year. "The<br />

continued shift of workloads, processes, and<br />

data to the cloud and on-premises<br />

infrastructures has enabled businesses to<br />

offer more of a hybrid work environment to<br />

their employees. Hybrid working will<br />

continue to be popular as it offers greater<br />

flexibility and more control to employees not<br />

only in where they work, but also how they<br />

fulfil their duties. Having the right tech in<br />

place will be key to hiring and retaining the<br />

best staff possible."<br />

TELEHOUSE<br />

Telehouse predict that smart outsourcing<br />

will help plug the ever-widening IT skills<br />

gap: "With the IT skills gap set to continue<br />

through <strong>2023</strong> and beyond, organisations<br />

will need to embrace more innovative ways<br />

of attracting, developing, and retaining<br />

new talent. At the same time, more<br />

businesses will outsource their IT<br />

infrastructure to a trusted provider, leaning<br />

on the knowledge, experience, and<br />

expertise of colocation data centre<br />

operators. This will help fill IT skills gaps inhouse,<br />

whilst also providing greater levels<br />

of resilience, uptime, and cost efficiency<br />

during the challenging years ahead."<br />

CYRUSONE<br />

CyrusOne also forecast that the digital skills<br />

gap will continue to expand in the year<br />

ahead, and will remain "a central issue<br />

within the data centre industry, hampering its<br />

long-term development and growth. While<br />

notable progress has been made in recent<br />

years, the sector continues to grow on a<br />

steeper curve than the advancements made<br />

to-date. It's imperative that the data centre<br />

industry comes together in a meaningful<br />

way to address this gap, identifying<br />

additional ways to communicate the value<br />

and opportunity that this sector provides and<br />

educating on its broader societal impact.<br />

"We will see more urgency placed around<br />

this issue in the coming year as the industry<br />

struggles to compete and maintain demand,<br />

with many companies widening their net to<br />

include recruits in unrelated disciplines who<br />

can be trained."<br />

SECURITY<br />

GLOBALDATA<br />

GlobalData caution that "There is a<br />

simmering level of frustration among<br />

security professionals that, despite important<br />

strides in security technology, they still can't<br />

keep ahead of the threat volume. The move<br />

to hybrid work operations has presented<br />

cybercriminals with an opportunity they have<br />

been quick to exploit. Although there has<br />

been considerable work done in areas such<br />

as endpoint detection and response (EDR) to<br />

close some security gaps, hackers are<br />

finding ways to navigate around protections.<br />

"In <strong>2023</strong>, GlobalData expects to see more<br />

concerted efforts around integrating security<br />

into network services through wider Secure<br />

Access Service Edge (SASE) technology<br />

deployments - even as organisations<br />

grapple to understand exactly what<br />

constitutes SASE. Zero Trust Architecture<br />

implementations will also gain more traction<br />

as organisations seek to mirror work already<br />

done by entities such as the US Federal<br />

Government, which is in the midst of a<br />

multi-year migration to deploy a Zero Trust<br />

Architecture. However, ongoing geopolitical<br />

tensions and related threats from both statesponsored<br />

actors and related organized<br />

cybercrimnals continue to loom large as<br />

organisations try to mount effective defenses<br />

against hackers."<br />

ARUBA<br />

Aruba predict that we'll see built-in security<br />

increasingly replacing bolt-on security in the<br />

very near future: "Transformation to a more<br />

automated security architecture is an IT<br />

imperative. No longer can organisations<br />

10 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


FEATURE: <strong>2023</strong> PREDICTIONS<br />

bolt-on perimeter firewalls around the<br />

network to protect against threats and<br />

vulnerabilities. Security must be built-in to<br />

every aspect of the network infrastructure<br />

from Wi-Fi Access Points to LAN, campus<br />

and data centre switches, WAN gateways,<br />

and extending into the cloud. Zero trust and<br />

SASE frameworks will become more<br />

intertwined, not only to protect from threats<br />

but to apply micro-segmentation across the<br />

complete IT stack including users,<br />

connected devices, applications, network<br />

services, compute, and storage platforms."<br />

ALLIED TELESIS<br />

Allied Telesis see networks and security<br />

delivering an ever-stronger combination this<br />

year. "The network is the route attackers use<br />

to reach their target. Protecting the network<br />

means protecting the first line of attack, and<br />

this will become more and more important.<br />

Firewall and AI-based systems, able to<br />

detect attacks together with autonomous<br />

security systems able to take immediate<br />

action and create a self-defending network,<br />

will become the obvious way to protect<br />

company assets."<br />

COHESITY<br />

Updating legacy data protection technology<br />

must be a priority for IT and business<br />

decision makers this year, according to<br />

Cohesity. "Cybercriminals are actively<br />

preying on outdated infrastructure as they<br />

know it cannot protect or recover data in<br />

today's dispersed, multicloud environments.<br />

Cohesity research found that half of UK<br />

respondents depend on outdated, legacy<br />

backup and recovery infrastructure to<br />

manage and protect their data. In some<br />

cases, this technology is more than 20 years<br />

old and was designed long before today's<br />

multicloud era or the type of sophisticated<br />

cyberattacks that now plague enterprises.<br />

"In <strong>2023</strong>, possibly as an outcome of<br />

budgetary pressures, we expect to see IT<br />

and SecOps teams align to co-own cyber<br />

resilience outcomes, including infrastructure<br />

used for data identification, protection,<br />

detection, response, and recovery."<br />

CLOUDSTRIKE<br />

Cloudstrike caution that security budgets will<br />

also feel the squeeze with a seemingly<br />

unavoidable recession on the horizon.<br />

"Many countries across the globe expect<br />

their economies to approach recession<br />

during the coming year. Cost-cutting will be<br />

discussed at many companies, and<br />

cybersecurity budgets, having risen - on<br />

average - for many successive years, will<br />

certainly be under scrutiny. Reducing and<br />

consolidating the number of licensed<br />

products in the area may well make sense,<br />

although maintaining the best levels of<br />

security is not negotiable at any company.<br />

"Notwithstanding, many companies have far<br />

more tools than they need. Our own<br />

discussions with CISOs suggest it's not<br />

uncommon for companies to have multiple<br />

licensed cybersecurity products at their<br />

disposal. This isn't rendering them immune to<br />

attack and, in fact, security levels and team<br />

performance are suffering at many<br />

organisations due to redundant or excessive<br />

notifications and checks. Working towards a<br />

consolidated single point of truth through a<br />

united platform will not only yield cost<br />

savings, but also productivity and<br />

performance gains for cybersecurity analysts."<br />

THE CLOUD<br />

LA<strong>NC</strong>OM SYSTEMS<br />

The future of network management lies in<br />

the cloud. This is according to LA<strong>NC</strong>OM<br />

Systems, who cite a recent survey which<br />

found that 85 percent of those who<br />

currently rely on hybrid and on-premises<br />

solutions are planning to move to cloudnative<br />

network management in the next four<br />

years. "Networks have changed significantly<br />

in recent years with increasing numbers of<br />

devices and new data-intensive applications<br />

that need to be used from anywhere. This<br />

all increases the demands on the<br />

infrastructure. Reliable protection,<br />

transparency, and automation are key to<br />

keeping this complexity manageable.<br />

Cloud-based network management can<br />

make a significant contribution here."<br />

NERDIO<br />

Cloud computing will be near the top of the<br />

priority list for IT teams in <strong>2023</strong>, say Nerdio.<br />

"Whilst it is an investment, it's a flexible one<br />

that can change with the business. In the<br />

current economic climate, companies are<br />

moving towards more service-based costs,<br />

and public cloud providers can facilitate cost<br />

efficiencies as they often offer a 'pay for what<br />

you need' monthly model. We expect the<br />

move from private cloud to public cloud to<br />

continue at pace - with the large providers<br />

on the public side having a greater ability to<br />

weather energy price pressures and deal<br />

with evolving security threats.<br />

"With a younger workforce, cloud is here<br />

to stay. Employees are now demanding the<br />

latest tools and technology and legacy, slow<br />

on-premise solutions are no longer fit for<br />

purpose. In response, cloud providers will<br />

need to provide higher levels of reliability<br />

and performance at a lower cost - and we<br />

expect to see more solutions partners<br />

supporting organisations to fill in the gaps<br />

of their knowledge of how to manage and<br />

generate the best efficiencies from their<br />

public cloud usage."<br />

SHARP EUROPE<br />

Sharpe Europe also see cloud looming<br />

large in our hybrid working future. "One<br />

trend we have seen develop in recent years<br />

that shows no signs of slowing is SMEs<br />

moving more of their work, services, and<br />

processes into the public cloud. Already<br />

over 40% of EU organisations use public<br />

cloud services in some form, mostly for<br />

hosting their email systems and storing files<br />

in electronic form. This is a trend we shall<br />

continue to see steadily rise. especially the<br />

move to Microsoft 365 public cloud,<br />

which for the SMEs is by far the dominant<br />

player in the market." <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 11


FEATURE: <strong>2023</strong> PREDICTIONS<br />

THE TOP FIVE NETWORK TRENDS FOR <strong>2023</strong><br />

WITH DISPERSED WORKFORCES STILL IN PLACE AND SECURITY<br />

THREATS CONTINUING TO GROW, DOUGLAS WADKINS, VICE<br />

PRESIDENT, PRODUCT MANAGEMENT & STRATEGY, OPENGEAR,<br />

IDENTIFIES THE TRENDS BUSINESSES MUST CONSIDER IN <strong>2023</strong> TO<br />

ENSURE THEIR NETWORK IS OPERATIONALLY FIT-FOR-PURPOSE<br />

THE NETWORK WILL BE A DRIVER<br />

FOR INNOVATION<br />

We're now seeing applications that are being<br />

enhanced through virtual or augmented reality,<br />

which could be more accurately described as<br />

functional metaverses. In <strong>2023</strong>, there will be<br />

more instances of this technology being used<br />

to design entire data centres for example, as it<br />

will become even easier for users to visualise<br />

the physical parts and pieces that go together<br />

to construct these premises. These innovative<br />

solutions will be fundamentally dependent on<br />

the underlying network to provide value, both<br />

in the virtual and physical sense. Expect to see<br />

more professionals in the industry discussing<br />

their digital immune system and the health of<br />

their network to support innovation.<br />

IT BUDGETS WILL BE SQUEEZED<br />

As looser monetary policies tighten up<br />

following the end of the pandemic, the IT<br />

budget is likely to be earmarked for the chop.<br />

What organisations will need to do in <strong>2023</strong> is<br />

ensure efficiency in network investment by<br />

deploying more automated solutions.<br />

However, to gain efficiencies through<br />

automation the network needs to be designed<br />

for automation, and network professionals<br />

need to possess the skills to design and<br />

manage an automated network.<br />

Out of band networks provide resilient,<br />

secure, remote access, for management of the<br />

production network. As an out<br />

of band network is connected<br />

to every device and is an<br />

independent network, it can be used to<br />

automate the provisioning and configuring of<br />

new physical or virtual network resources,<br />

before a production network exists without<br />

sending an engineer on site. Zero touch<br />

provisioning (ZTP) removes the need for<br />

manual device configuration from the get-go.<br />

While no business is completely immune from<br />

the negative effects of a recession, automation<br />

will help enable efficiency and utilisation to<br />

help dampen its impact.<br />

HYBRID ENVIRONMENTS WILL<br />

REMAIN CRUCIAL<br />

Both hybrid working environments and hybrid<br />

cloud environments will take precedence in<br />

<strong>2023</strong>. Not every piece of data will go into the<br />

public cloud, whether it's for latency, resiliency<br />

or privacy reasons. Multi-cloud deployments<br />

will proliferate, with local applications in use to<br />

protect against network outages and enable<br />

greater agility. Hybrid working environments<br />

devised from the remote arrangements that<br />

became a necessity during the pandemic will<br />

also continue to be popular. As people work<br />

from home, a key consideration will be around<br />

how businesses make remote branch offices a<br />

key part of the enterprise.<br />

Critical to both will be the underlying network<br />

and the increasing value of out of band to<br />

enhance the user experience from any location<br />

and add resiliency to multi-cloud deployments.<br />

SECURITY WILL BE AN ONGOING<br />

CO<strong>NC</strong>ERN<br />

The methods that bad actors use to breach<br />

networks are growing in sophistication, and as<br />

the criticality of the network goes up, it will<br />

become more of a target. However,<br />

organisations will be better placed to add<br />

layers of security to their setups in <strong>2023</strong>. With<br />

compute and storage capabilities being added<br />

to devices, this has opened up the opportunity<br />

for third party applications to be run through<br />

Docker containers.<br />

For example, a configuration file for an<br />

application can be integrated with a TPM<br />

chip. This makes it a trusted module from a<br />

hardware perspective, and very difficult to<br />

crack thanks to encryption capabilities, even<br />

for a state actor. Organisations can also<br />

revert to a last known configuration if the<br />

worst case scenario happens. This can be<br />

made possible by utilising a file store that sits<br />

with an edge device, and can significantly<br />

reduce downtime.<br />

THE PROMISE OF 5G WILL COME<br />

TO FRUITION<br />

In <strong>2023</strong>, the promise of 5G will begin to be<br />

realised. More businesses are going to explore<br />

how to move data and applications to the edge<br />

to reduce latency and deploy out of-band to<br />

manage these networks. 5G connections can<br />

for example be utilised to enable dual<br />

connectivity and build redundancy for remote<br />

networks in the event of any outages.<br />

This connectivity will also become more<br />

accessible to smaller businesses next year, with<br />

the big mobile network operators and the tech<br />

giants previously holding the monopoly on<br />

resources. Companies will tap into automated<br />

capabilities to bring 5G-driven networks to<br />

the plate, particularly as skills shortages<br />

continue to present challenges in<br />

bringing in the right staff and<br />

talent to drive efficiency. <strong>NC</strong><br />

12 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


PRODUCT REVIEW<br />

AdRem NetCrunch 13<br />

PRODUCT REVIEW<br />

PRODUCT<br />

REVIEWPRODUCT RE<br />

Enterprises and SMBs are spoilt for choice<br />

with network monitoring products but<br />

AdRem Software's NetCrunch stands out<br />

from the crowd for many good reasons. It<br />

offers an impressive set of network monitoring<br />

tools integrated seamlessly into a single<br />

console and teams them up with extreme ease<br />

of use and great value.<br />

This latest version introduces a raft of new<br />

features designed to make it even easier for<br />

support staff to quickly identify and diagnose<br />

network pain points. Automated rule-based<br />

device management allows hundreds of nodes<br />

to be configured together instead of<br />

individually, and NetCrunch 13 enables<br />

flexible visualisations that focus on presenting<br />

live data of business processes, network activity<br />

and services for simplified troubleshooting.<br />

One feature of NetCrunch we've always liked<br />

is its lightning-quick deployment, and v13 is no<br />

exception. We loaded the Server and Console<br />

components on a Windows Server 2022 host,<br />

followed the discovery wizard and were<br />

presented with a complete readout of our lab<br />

network in only 15 minutes.<br />

The NetCrunch console opens with a highly<br />

informative Atlas overview page which uses<br />

colour-coded icons of all monitored devices,<br />

so you can see at a glance which ones have<br />

problems or are down. Custom views take this<br />

further, as they automatically present details<br />

based on the content selected in the left pane<br />

and full search facilities apply your criteria to<br />

nodes, the Atlas view, program settings and<br />

even blog posts, making it easy to find a<br />

device of interest.<br />

Once monitoring accounts had been<br />

provided to the Credential Manager, we could<br />

use NetCrunch's Monitoring Packs to keep a<br />

close eye on our systems. These are a great<br />

idea as they group together performance data<br />

and alerts for specific devices and services.<br />

AdRem provides over 270 Monitoring Packs<br />

including ones for Windows systems, Active<br />

Directory, Hyper-V and VMware hosts and<br />

Linux. You have Packs for Microsoft apps such<br />

as SharePoint, Exchange and SQL Server and<br />

the cloud comes into the equation with options<br />

including Amazon Web Services, Microsoft<br />

Azure and 365, Google and even the Zoom<br />

conferencing service.<br />

The best part is you don't have to do anything<br />

as the most appropriate Monitoring Packs are<br />

automatically assigned to systems, devices and<br />

services during the discovery phase.<br />

NetCrunch is clearly capable of presenting a<br />

wealth of information but keeps it very well<br />

organised, as tabs across the top offer displays<br />

of all nodes with colour-coded status icons<br />

and quick views of Windows, Linux, VMware<br />

and Hyper-V hosts.<br />

The Top Charts tab shows graphical views of<br />

nodes with the most alerts and systems with the<br />

highest CPU, memory plus storage usage. Any<br />

NetFlow and sFlow data coming into<br />

NetCrunch will also be broken down into<br />

graphs of apps with detailed flow analytics.<br />

The new Active Alerts console page in<br />

NetCrunch 13 is a welcome addition as it<br />

presents real time views of all the latest<br />

alerts, which can be filtered on their severity.<br />

Move to the analytics page and you can see<br />

all alerts over the last day, week or month<br />

and drill down to selected items for more<br />

detailed information.<br />

Alerting features are extensive and<br />

NetCrunch creates scripts for you and assigns<br />

them to all relevant Monitoring Packs. These<br />

are easy to customise and you can create<br />

escalation scripts that assign a sequence of<br />

alerts and actions to critical devices if they<br />

have problems.<br />

AdRem's NetCrunch 13 takes all the hard<br />

work out of network monitoring and its flexible<br />

licensing schemes make it affordable for<br />

businesses of all sizes. It's incredibly easy to<br />

deploy and the highly informative central<br />

console ensures support staff are always one<br />

step ahead of network issues. <strong>NC</strong><br />

Product: NetCrunch 13<br />

Supplier: AdRem Software<br />

Web site: www.adremsoft.com<br />

Price: 100 nodes/interfaces, from £860 per<br />

year exc VAT<br />

WWW.NETWORKCOMPUTING.CO.UK FEBRUARY/MARCH <strong>2023</strong> 13<br />

NETWORKcomputing<br />

@<strong>NC</strong>MagAndAwards


AWARDS <strong>2023</strong><br />

The Network Computing Awards <strong>2023</strong>: now's the time to nominate!<br />

We're pleased to announce that<br />

nominations for the <strong>2023</strong><br />

Network Computing Awards<br />

are now open, with this year's awards<br />

ceremony set to take place on 18th May.<br />

You now have until 9th <strong>Mar</strong>ch to<br />

nominate the networking companies,<br />

solutions and services that have<br />

impressed you the most in the past<br />

twelve months, so please visit the awards<br />

website to make your choices heard!<br />

The results will once again be revealed<br />

at an evening awards ceremony in<br />

central London in May. A drinks<br />

reception, dinner and entertainment will<br />

also be provided as part of the evening,<br />

which is always an excellent opportunity<br />

to network with your networking peers!<br />

While the majority of awards categories<br />

are decided by nominating and voting<br />

we also have two judged categories: the<br />

Bench Tested Product of the Year, open<br />

to all solutions that have been<br />

independently reviewed for Network<br />

Computing Magazine in 2022, and the<br />

Network Project of the Year, which<br />

recognises the impressive work that<br />

vendors and their partners have carried<br />

out for customers.<br />

If you would like to enter a project for<br />

the Network Project of the Year award<br />

then please submit a case study to<br />

dave.bonner@btc.co.uk. Projects should<br />

ideally have been completed in the past<br />

12 months. However, if work is still<br />

ongoing, a project can still be entered<br />

provided it can reference some benefits<br />

that the customer has already seen.<br />

https://networkcomputingawards.co.uk<br />

14 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


AWARDS <strong>2023</strong><br />

EXAGRID EXCEL AT THE NETWORK COMPUTING AWARDS<br />

WITH NOMINATIONS NOW OPEN FOR THE <strong>2023</strong> NETWORK COMPUTING AWARDS, EXAGRID,<br />

WINNERS OF COMPANY OF THE YEAR FOR THREE CONSECUTIVE YEARS, SHARE THEIR EXPERIE<strong>NC</strong>E<br />

OF BEING A PART OF THE AWARDS<br />

2022 was a successful year for<br />

ExaGrid; it marked a record year of<br />

revenue growth with positive cash,<br />

P&L and EBITDA for the Tiered Backup<br />

Storage company, and its 4th consecutive<br />

win at the annual Network Computing<br />

Awards. The company is looking forward to<br />

another strong year in <strong>2023</strong>.<br />

ExaGrid provides Tiered Backup Storage<br />

with a unique disk-cache Landing Zone<br />

that enables fastest backups and restores,<br />

a Repository Tier that offers the lowest cost<br />

for long-term retention and enables<br />

ransomware recovery, and scale-out<br />

architecture for a fixed - length backup<br />

window as data grows and scalability with<br />

full appliances up to 2.7PB full backup in a<br />

single scale-out system. ExaGrid is the only<br />

solution with a non-network facing tier with<br />

delayed deletes and immutable data<br />

objects for the industry's best ransomware<br />

recovery solution.<br />

ExaGrid continues to gain recognition for<br />

its Tiered Backup Storage appliances,<br />

winning six industry awards in 2022,<br />

including three at the Network Computing<br />

Awards ceremony in July 2022. The Bench<br />

Tested Product of the Year award was<br />

chosen by the editorial team at Network<br />

Computing Magazine based on an<br />

independent product review of ExaGrid's<br />

largest appliance. The Company of the<br />

Year and Storage Product of the Year<br />

awards are determined by public vote,<br />

which further sets ExaGrid Tiered Backup<br />

Storage apart as a leader in its sector, due<br />

it is differentiated product architecture, as<br />

ExaGrid offers the largest scale-out system<br />

in the industry-comprised of 32 EX84<br />

appliances that can take in up to a 2.7PB<br />

full backup in a single system, which is<br />

50% larger than any other solution with<br />

aggressive deduplication, in addition to<br />

ExaGrid's innovative channel programs and<br />

its exceptional customer support.<br />

"We were honoured to win these three<br />

Network Computing awards," said Bill<br />

Andrews, President and CEO of ExaGrid.<br />

"Our company is solely focused on offering<br />

the best backup storage in the industry by<br />

improving the performance, scalability,<br />

security and economics of backup storage,<br />

and offering the best customer support in the<br />

industry. Many thanks to everyone who voted<br />

for us in 2022, and to the editorial team at<br />

Network Computing, we are truly grateful."<br />

ExaGrid has more than 3,750 active<br />

upper mid-market to large enterprise<br />

customers that use ExaGrid Tiered Backup<br />

Storage to protect their data. ExaGrid's<br />

growth is accelerating, and the company is<br />

hiring in all aspects of the business<br />

worldwide. ExaGrid recently announced its<br />

highlights for 2022, which included a year<br />

with record quarters of bookings growth<br />

and with the company remaining Cash,<br />

EBITDA, and P&L positive for the past nine<br />

quarters in a row.<br />

ExaGrid is solely focused on backup<br />

storage, and is constantly driving<br />

improvements in five key areas: ingest<br />

performance for the fastest backups and<br />

shortest backup window; fastest restores to<br />

keep up user productivity; scalability to<br />

ensure a fixed-length backup window as<br />

data grows, as well as no forklift upgrades<br />

and no planned product obsolescence;<br />

lowest cost up front and over time; and a<br />

strong security story including the ability to<br />

recover after a security attack, such as<br />

ransomware.<br />

In 2022, ExaGrid released Version 6.2<br />

which improved integration and features<br />

with industry-leading backup applications<br />

and also improved the performance and<br />

scalability of ExaGrid's Cloud Tier, which<br />

supports disaster recovery to Amazon AWS<br />

and Microsoft Azure public clouds.<br />

ExaGrid is looking forward to <strong>2023</strong>, with<br />

goals to further expand into new regions,<br />

grow its sales team to expand global<br />

coverage, as well as strengthen its<br />

relationships in the channel and grow its<br />

partnerships with more resellers, all with a<br />

continued focus to offer organizations the<br />

best backup storage in the industry with<br />

regular improvements and updates, and<br />

more announcements to come in <strong>2023</strong>. <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards<br />

FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 15


FEATURE: HYBRID WORKING<br />

SHADOW I.T.'S CLUE TO HYBRID WORKING ENGAGEMENT<br />

WITH THE RIGHT TO WFH SET TO BECOME ENSHRINED IN UK EMPLOYMENT LAW EMPLOYEE EXPERIE<strong>NC</strong>E<br />

MANAGEMENT IS NOW CRITICAL, AND BUSINESSES NEED TO BOTH UNDERSTAND AND IMPROVE THE<br />

QUALITY OF THE HYBRID WORKING ENVIRONMENT, INSISTS JASON BARKER, SVP EMEA & APAC, IR<br />

Shadow IT has plagued organisations for<br />

years - long before hybrid working<br />

became firmly established. With the shift<br />

to Working from Home (WFH), the use of<br />

personal devices and applications that fail to<br />

adhere to corporate standards has exploded -<br />

even for those companies that have<br />

accelerated the deployment of Unified<br />

Communications (UC) solutions over the last<br />

couple of years.<br />

Yet, while the security and compliance risks<br />

associated with shadow IT are well known,<br />

how many companies are actively considering<br />

the implications for employee productivity,<br />

collaboration and morale? Are employees<br />

using new corporate solutions at home or still<br />

preferring their own work around options?<br />

Are they frustrated because performance<br />

drops off every afternoon, or feeling isolated<br />

because the new corporate platform lacks<br />

features they have previously used to connect<br />

with colleagues? Without the ability to<br />

monitor the entire, end to end infrastructure,<br />

including WFH, an enterprise will be blind to<br />

the true extent of shadow IT and, critically,<br />

key indicators of employee engagement.<br />

HYBRID EXPERIE<strong>NC</strong>E CRISIS<br />

Elon Musk et al may be adamant that staff<br />

must return to the office, but the reality for<br />

the majority of UK businesses is that<br />

employees now expect hybrid working.<br />

The problem for large enterprises is<br />

that hybrid working environments<br />

are still not meeting the needs of<br />

employees. For example, almost<br />

60% of women who work in<br />

hybrid environments feel they<br />

have been excluded from<br />

important meetings; stress levels<br />

are rising, and burnout is<br />

driving high levels of attrition.<br />

Trends such as 'Acting their<br />

Wage' may be a TikTok Gen<br />

Z cliché; but lack of<br />

productivity and<br />

engagement of the<br />

younger WFH workforce is a huge issue.<br />

Businesses clearly have an array of cultural<br />

and operational challenges to address to<br />

create a hybrid working model that engages<br />

all employees, but too few have recognised<br />

the impact of Shadow IT and a company's<br />

lack of control over the UC tools preferred by<br />

diverse individuals across the business. Over<br />

the past few years, employees have taken a<br />

proactive and often innovative approach to<br />

making WFH work for them. And while<br />

companies have fast-tracked UC deployments<br />

to improve the overall employee experience,<br />

from Zoom to Dropbox and WhatsApp, many<br />

still prefer the 'emergency' options to the new<br />

corporate standard.<br />

The result is a not just a significant shadow<br />

IT problem - with the associated security and<br />

compliance risks - but a complete lack of<br />

corporate understanding about employee<br />

activity. Are individuals engaged with the<br />

business? Are they productive? Motivated?<br />

Or about to leave? With the UK still suffering<br />

a significant lack of skills - access to labour<br />

(75%) and skills (72%) continue to top<br />

business' labour market concerns, according<br />

to the CBI - the hybrid working experience is<br />

fast becoming a critical component in<br />

employee engagement and retention.<br />

UNDERSTANDING HYBRID<br />

PERFORMA<strong>NC</strong>E<br />

With employees returning to the office for a<br />

few days each week, the hybrid experience<br />

should be seamless. Individuals should feel<br />

productive, engaged and motivated<br />

irrespective of working location, whether<br />

home, head office or local satellite hub. Few<br />

businesses know if this is the case. While IT<br />

16 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


FEATURE: HYBRID WORKING<br />

teams routinely monitor UC performance<br />

across the organisation, information is<br />

collected on each individual system. With<br />

10,000s, even 100,000s of employees using<br />

multiple solutions, it is impossible to gain an<br />

accurate and complete picture of system<br />

usage or performance.<br />

Furthermore, this monitoring rarely extends<br />

outside the core office environment, leaving<br />

the business completely blind to the WFH<br />

experience. From calls dropping out when<br />

children return from school and plug into<br />

games and streaming services, to a<br />

widespread resistance to adopting the new<br />

corporate UC standard, a lack of visibility<br />

across the entire hybrid environment is<br />

creating significant business risk.<br />

MONITORING UC EXPERIE<strong>NC</strong>E<br />

A single view of the entire UC environment is<br />

now critical to both accelerate problem<br />

resolution and better understand the hybrid<br />

employee experience. Understanding how,<br />

when and where individuals are using different<br />

aspects of the UC solution set will provide<br />

companies with new insight into the way staff<br />

are adapting to the hybrid experience - and<br />

quickly flag up potential problems.<br />

Monitoring every aspect of the infrastructure<br />

and providing a single view of performance<br />

enables IT to rapidly understand - and resolve<br />

- issues that are affecting workers in any<br />

location. From underperforming Wi-Fi, to<br />

problems with local network providers, or<br />

specific application glitches, better visibility is<br />

key to improving the timeliness of IT support.<br />

But it also will quickly highlight issues with<br />

UC adoption and shadow IT that could<br />

impact the employee experience. If<br />

employees are failing to engage with the<br />

company's preferred platform - 85% of<br />

businesses use two or more meeting<br />

platforms (according to Cisco) - questions<br />

can be raised about the education and<br />

training process. With native monitoring tools<br />

providing<br />

information limited to a<br />

single solution, it is impossible to<br />

gain a clear picture of the way individuals<br />

are interacting with different systems. Are<br />

employees able to personalise the platform to<br />

work in a way that they prefer? Is one<br />

department creating significantly fewer calls<br />

via the platform than the rest of the business -<br />

indicating a reliance on an unauthorised<br />

solution? Or is it just poor Wi-Fi that is<br />

affecting performance, not the UC at all?<br />

Granular understanding of UC usage can<br />

help the IT Operations team prioritise<br />

investment and drive strategic investment.<br />

STRATEGIC HYBRID PLANNING<br />

Monitoring the entire end to end UC<br />

environment also provides useful information<br />

for other parts of the business, including both<br />

Human Resources (HR) and Facilities<br />

Management. For HR teams, for example,<br />

early insight into IT problems that could be<br />

affecting employee morale can enable<br />

proactive intervention and support. In<br />

addition to segmenting information by<br />

geography or business group, it could be<br />

analysed by age, allowing HR to understand<br />

how different generations are experiencing<br />

and engaging with the hybrid environment.<br />

With so many companies now offering hot<br />

desking options, this information is<br />

increasingly used by Facilities Management<br />

teams tasked with ensuring a building is not<br />

only safe and secure, but also as productive<br />

as possible. Infrastructure and collaboration<br />

platform management are now Key<br />

Performance<br />

Indicators, with UC usage<br />

information providing essential insight to<br />

support business decisions.<br />

Are employees avoiding certain buildings,<br />

putting pressure on space in other<br />

locations? And, if so, is that because calls<br />

keep dropping out or the Wi-Fi is too slow?<br />

If employees have to work in an office<br />

location one, two or three days each week,<br />

it is important that the office is designed to<br />

support a truly effective collaboration. Any<br />

frustration about the quality of the working<br />

environment, in any location, will rapidly<br />

affect morale. Providing Facilities<br />

Management teams with fast insight to<br />

usage information will give early indications<br />

of problems and allow essential<br />

infrastructure change.<br />

CO<strong>NC</strong>LUSION<br />

Hybrid working, in one form or another, is<br />

here to stay. Organisations must ensure the<br />

quality of the employee experience to<br />

safeguard productivity and collaboration and,<br />

critically, boost staff retention through<br />

enhanced morale. Proactively monitoring the<br />

entire corporate environment provides not<br />

only insight into immediate UC performance<br />

issues that need to be urgently addressed; but<br />

also vital understanding of how, where and<br />

when different groups and individuals are<br />

engaging with the business. <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 17


FEATURE: HYBRID WORKNG<br />

A COLLABORATIVE EFFORT<br />

CARL DAY, CHIEF SALES OFFICER AT APOGEE, ON BRIDGING THE EMPLOYER-EMPLOYEE<br />

DISCONNECT IN <strong>2023</strong><br />

Alot can happen in three years. The<br />

impact of the Covid-19 pandemic has<br />

irrevocably shaped the future of work,<br />

with flexible, hybrid workspaces opening a<br />

world of opportunity for newly distributed<br />

workforces. But the sheer pace of change has<br />

come with its own challenges - not least for<br />

employers. At the height of the pandemic in<br />

2020, many companies were all too happy to<br />

have their staff working from home, especially<br />

as the level of business they were previously<br />

accustomed to was temporarily paused.<br />

Now, as the 'new normal' of work becomes<br />

firmly embedded in the psyche of employees, a<br />

disconnect is growing between what<br />

companies want and what their workforce<br />

wants. Employers are starting to recognise the<br />

loss of troubleshooting and collaboration<br />

opportunities that come with having people<br />

grouped together in an office. Meanwhile, the<br />

workforce balance of power continues to shift<br />

in favour of employees, transforming workers'<br />

relationships with their jobs and fuelling the<br />

expectation for more flexible and mobile<br />

working options.<br />

Left unaddressed, the gap between what is<br />

best for an organisation and what is best for<br />

individual employees will only widen. At a time<br />

when the Great Resignation and 'quiet quitting'<br />

continues to permeate the workplace,<br />

companies can ill afford to lose both existing<br />

and prospective talent. Therefore, business<br />

leaders need to strive to reach a compromise -<br />

and technology is poised to play a critical role<br />

in bridging the divide between remote and<br />

office-based working.<br />

THE RISE OF COLLABORATIVE TECH<br />

Collaborative teamwork has always been<br />

important, but never more so than in today's<br />

increasingly global, complex, and competitive<br />

workplace. The long-term move to hybrid<br />

means that good communication amongst<br />

geographically dispersed teams is a requisite<br />

for business success, so employers must have<br />

the flexibility to provide new, innovative ways<br />

for their employees to collaborate productively<br />

from any place, time, or device.<br />

In this way, technological innovation serves<br />

as a win-win for both employer and<br />

employee. Workers have come to expect<br />

18 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


FEATURE: HYBRID WORKNG<br />

technology without frustration: they want the<br />

latest digital tools that seamlessly fit around<br />

the job they do without slowing them down or<br />

getting in their way. As the war for talent<br />

heats up - and a new generation of digital<br />

natives join the workforce in ever-growing<br />

numbers - businesses must continually<br />

modernise to attract and retain great<br />

employees. Therefore, organisations in <strong>2023</strong><br />

simply cannot afford to frustrate their staff<br />

with outdated, inflexible technology.<br />

This year will see businesses increasingly<br />

turn to collaborative technological tools to<br />

close the gap between office-based working<br />

and remote working. Offices will be fitted<br />

with technologies that allow for the best<br />

blend between physical and virtual<br />

participation, ensuring a seamless, highquality<br />

audio-visual experience that enables<br />

everyone to feel included in a shared working<br />

environment. When remote employees feel<br />

just as comfortable, productive, and<br />

supported working virtually as they would in<br />

an office, the most inspiring collaborative<br />

work can take shape.<br />

EFFECTIVE COMMUNICATION IS KEY<br />

However, it is not enough just to kit employees<br />

with the right digital tools. Business leaders<br />

will also need to think carefully about how<br />

they can communicate effectively with an<br />

employee base that's more fluid, mobile, and<br />

geographically dispersed than before.<br />

As new ways of working continue to blur the<br />

lines between work life and home life, the<br />

expansion of the virtual workforce means that<br />

many businesses now rely more heavily on<br />

email interaction than on face-to-face<br />

communication. This is resulting in remote<br />

and hybrid workers getting their inboxes<br />

flooded with emails. In fact, the average office<br />

worker is said to receive more than 120<br />

emails daily - and many remote employees<br />

are feeling compelled to check their work<br />

emails multiple times outside of their<br />

contracted hours.<br />

The simple truth is that by<br />

overcommunicating with their employees,<br />

businesses risk not communicating at all. The<br />

process of wading through a mountain of<br />

emails just to find that one message that<br />

needs dealing with is a frustration that most<br />

workers can relate to, and email overload<br />

threatens to fuel the employer-employee<br />

disconnect. Employers need to ensure that<br />

their most important correspondence with<br />

employees is not diluted or drowned in all of<br />

the noise.<br />

This is why process efficiency and stronger<br />

communication will be key management<br />

priorities in the months ahead. Technology<br />

plays a pivotal role in establishing a more<br />

streamlined and clear communication process<br />

in a hybrid working environment. For example,<br />

group chat software can be a helpful tool for<br />

managers to keep themselves available, be<br />

transparent about expectations, and share<br />

regular updates with physically dispersed<br />

teams, ensuring that everybody is consistently<br />

in the loop.<br />

GOING BESPOKE<br />

This year will also see the development of<br />

apps that allow organisations to create<br />

efficiency and be more flexible - on their own<br />

terms. Many of these applications will be<br />

custom-made to meet specific business<br />

processes and needs.<br />

While off-the-shelf applications offer<br />

organisations some useful functions, such as<br />

simple task tracking or calendar management,<br />

they are increasingly being recognised as a<br />

quick-fix solution to much longer-term<br />

business needs. In contrast, bespoke apps are<br />

custom built to support businesses with each<br />

of their specific requirements, adapting<br />

alongside the company as their needs evolve<br />

over time. This flexibility empowers<br />

organisations to meet more complex<br />

objectives, such as improving employee<br />

engagement and enhancing collaboration<br />

across departments.<br />

Therefore, to bridge the employeremployee<br />

gap, businesses are set to<br />

prioritise the need to quickly scale and adapt<br />

to meet current and future challenges. In<br />

many cases, this will bring about a shift away<br />

from off-the-shelf applications and towards<br />

more bespoke solutions to support their own<br />

ways of working.<br />

THE POWER OF SMART<br />

OUTSOURCING<br />

So, how can businesses seize these<br />

opportunities and navigate the complexity of<br />

the workplace in <strong>2023</strong>? With skills shortages<br />

across the IT sector bringing additional<br />

challenges around securing the future of<br />

hybrid working, companies are now looking<br />

towards new solutions to plug the gaps.<br />

As a result, businesses are increasingly<br />

leveraging specialist outsourcing services.<br />

Bringing in a trusted third party to take care of<br />

the entire IT lifecycle - from procurement and<br />

imaging to end-of-life support, data erase,<br />

and repurposing - can give organisations the<br />

breathing space to focus on making the new<br />

normal of work truly work for all employees -<br />

no matter where they are located. Not only<br />

does this process allow companies to<br />

repurpose their in-house capability, but it also<br />

helps to establish and maintain a more<br />

sustainable circular economy - something that<br />

employees are increasingly coming to expect<br />

from the businesses they work for.<br />

Smart outsourcing is helping to relieve the<br />

pressures on internal IT teams, stretching<br />

budgets and resources at a time when both<br />

are under strain. But regardless of whether a<br />

businesses opts to outsource or to keep their<br />

workplace services entirely in-house, the role<br />

of technology in shaping the future of work is<br />

beyond dispute. With the right investment and<br />

support in place, organisations can ensure<br />

that digital tools continue to bring out the best<br />

in their hybrid workforces, setting up both<br />

employers and employees for sustained<br />

success through <strong>2023</strong> and beyond. <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 19


FEATURE: HYBRID WORKING<br />

FILE SY<strong>NC</strong>HRONISATION CHALLENGES IN TODAY'S HYBRID WORKPLACE<br />

JASON KENT, DIRECTOR AT OPEN SEAS, DISCUSSES TWO OF THE MOST SIGNIFICANT ISSUES THAT ARISE<br />

WITH MICROSOFT'S DISTRIBUTED FILE SYSTEM REPLICATION (DFS-R) AND HOW THEY CAN BE MITIGATED<br />

File synchronisation and replication is a<br />

critical component of modern network<br />

infrastructures, allowing companies to<br />

effectively distribute and share information<br />

between remote offices and disaster recovery<br />

data centres. However, the increased number<br />

of users and data processed on these<br />

networks has resulted in several common<br />

issues that IT staff must contend with.<br />

One of the main issues with DFS-R is its<br />

method of handling multiple updates to the<br />

same file by different users. The service only<br />

provides one solution: the newest file will<br />

overwrite the older file, effectively losing the<br />

changes made by the first user. Although DFS-<br />

R saves a copy of the older file locally and<br />

writes an error message in the event log, an<br />

administrator must manually retrieve it.<br />

For environments with multiple users<br />

working from different locations and servers,<br />

a solution that minimises the issue of multiple<br />

updates is necessary. One such solution is file<br />

locking, where when a user opens a file, all<br />

other copies on other devices are<br />

locked and the user is<br />

given<br />

read-only access. Once the user saves and<br />

closes the file, it is synced to other machines<br />

and the lock is released, allowing other users<br />

to edit the file.<br />

However, this approach may not suit all<br />

needs for large enterprises. For these<br />

organisations, it is advisable to look for<br />

solutions that offer collaborative file sharing<br />

between offices and with a variety of one-way<br />

and multi-way rule methods. For instance, if<br />

files are distributed from a central source, a<br />

multi-directional rule should not be used, as it<br />

could potentially cause damage to the master<br />

set of data.<br />

BALA<strong>NC</strong>ING USER NEEDS AND<br />

BANDWIDTH IN FILE REPLICATION<br />

Another common problem with DFS-R is the<br />

issue of throttling. The service can throttle<br />

bandwidth usage based on a per connection<br />

basis, which means that if bandwidth usage<br />

increases, DFS-R does not automatically<br />

adapt to changing network conditions.<br />

Bandwidth throttling is a common issue<br />

faced by businesses and organisations when<br />

too many users access a network at the same<br />

time. This results in slow download speeds,<br />

buffering, and other frustrating issues that<br />

can drive customers away. To address<br />

this problem, many<br />

organisations have turned to<br />

bandwidth throttling as a solution.<br />

This involves limiting the amount<br />

of data that can be transmitted<br />

over a network in a given time<br />

period, which helps to reduce<br />

congestion and improve overall<br />

performance.<br />

However, bandwidth throttling can also<br />

have negative effects. It can slow down<br />

important business processes, affect customer<br />

satisfaction, and even impact the bottom line.<br />

To address these issues, it is important to<br />

implement bandwidth throttling solutions that<br />

are both effective and fair. This might include<br />

implementing usage limits, prioritising critical<br />

applications and processes, or using more<br />

advanced solutions like traffic shaping or<br />

quality of service (QoS) policies. An even<br />

better solution is a system with advanced,<br />

dynamic throttling, where bandwidth usage is<br />

based on the percentage of bandwidth<br />

available. For example, a system using 50%<br />

of the connection would reduce its usage<br />

when other processes consume bandwidth<br />

Ultimately, the key to successful bandwidth<br />

throttling is finding the right balance between<br />

performance and fairness. By carefully<br />

considering the needs of all users,<br />

organisations can ensure that their networks<br />

run smoothly, even during periods of high<br />

usage. With the right approach, businesses<br />

can enjoy the benefits of a fast and reliable<br />

network, while avoiding the drawbacks of<br />

over-restrictive throttling policies.<br />

FINAL THOUGHTS<br />

DFS-R provides limited reporting options,<br />

limited ability to synchronise encrypted files,<br />

and no ability to synchronise files stored on<br />

FAT or ReFS volumes, making it challenging to<br />

operate efficiently in today's hybrid workplace.<br />

IT staff must adapt systems for users working<br />

from different locations while also managing<br />

varying bandwidth speeds at different times.<br />

The two common issues discussed in this<br />

article - the Last Writer Wins Algorithm and<br />

Bandwidth Throttling - highlight the need for<br />

IT staff to evaluate their file synchronisation<br />

and replication systems and determine if<br />

alternative solutions are required to meet their<br />

organisation's needs. <strong>NC</strong><br />

20 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


CASE STUDY<br />

BIGTWIN HAS A BIG IMPACT AT CERN<br />

SUPERMICRO SERVERS ENABLE FASTER AND MORE COMPLEX<br />

SIMULATIONS AT CERN DATA CENTRE<br />

CERN, the European Organisation for<br />

Nuclear Research, operates the largest<br />

particle physics laboratory in the world.<br />

It's where researchers are uncovering what the<br />

universe consists of and how it works. At<br />

CERN, physicists and engineers use extremely<br />

complex scientific instruments, including the<br />

largest and most powerful particle accelerator<br />

in the world - the Large Hadron Collider<br />

(LHC). These studies into subatomic particles<br />

are advancing the boundaries of human<br />

knowledge by delving into the smallest<br />

building blocks of our universe. Many of the<br />

discoveries already made at CERN have had a<br />

powerful impact on several areas of everyday<br />

life, ranging from medicine to computing.<br />

As such, this is one of the most highly<br />

demanding and challenging computing<br />

environments in research. The World Wide<br />

Web was originally conceived and developed<br />

at CERN to meet the demand for automated<br />

information-sharing between scientists in<br />

universities and institutes dotted around the<br />

world. From software development to data<br />

processing and storage, networks, support for<br />

the LHC and non-LHC experimental<br />

programmes, automation and controls, as well<br />

as services for the accelerator complex and for<br />

the whole laboratory and its users, computing<br />

is at the heart of CERN's infrastructure.<br />

As a long-standing supplier to CERN,<br />

Supermicro provides accelerated enterprise<br />

computing technology that supports cuttingedge<br />

explorations in particle physics. As the<br />

search for understanding the universe's origins<br />

expands, new computing resources are<br />

constantly being evaluated and updated.<br />

The partnership between CERN and<br />

Supermicro serves to introduce new<br />

technologies to the high-performance compute<br />

cluster that processes data from the LHC.<br />

CERN scientists continue to explore enterprise<br />

innovations for CERN in collaboration with<br />

other global technology manufacturers.<br />

ADDING COMPUTE POWER WHILE<br />

MONITORING POWER CONSUMPTION<br />

To understand the results of the research<br />

experiments conducted by scientists and<br />

engineers at CERN, a significant amount of<br />

computing power is required. Therefore, it<br />

must be updated with the latest advancements<br />

in server, storage, and networking<br />

technologies, while keeping an eye on the<br />

total power consumption of the entire<br />

computing environment.<br />

CERN's infrastructure technical team worked<br />

meticulously over many months before any<br />

procurement in assessing the market for the<br />

latest technological advances. It is a<br />

qualification process that, although it can be<br />

very time-consuming, is an absolute necessity<br />

in keeping CERN at the forefront of global<br />

scientific research and, more importantly,<br />

allows for collaboration with suitable partners<br />

to assess solutions around performance, cost,<br />

operational costs, power, density, and so on.<br />

CERN selected the Supermicro AMD BigTwin<br />

A+ 2124BT-HNTR server following a lengthy<br />

evaluation process. As a result, CERN<br />

acquired over 900 Supermicro BigTwin<br />

systems, each with four nodes, for a total of<br />

approximately 3,600 server nodes. Many types<br />

of simulations and workloads take place at<br />

CERN. Most of them are used for running<br />

batch computing jobs related to physics-event<br />

reconstruction, data analysis, and simulation.<br />

In addition, part of them is used as front-ends<br />

to disk storage, collecting physics data from<br />

the experiments.<br />

Supermicro BigTwin servers are smart yet<br />

affordable investments for enterprises and<br />

institutions that need to build, expand, or<br />

future-proof advanced computing<br />

infrastructures. The high-performance, highdensity<br />

systems feature optimum airflow for<br />

energy-efficient cooling, easy maintenance,<br />

and high availability with hot-swappable nodes<br />

and redundant power supply modules.<br />

HIGH DENSITY RESULTS IN LOWER<br />

POWER CONSUMPTION<br />

CERN saw an increase in the performance of<br />

many simulation applications. In addition, with<br />

the high density of the Supermicro BigTwin<br />

systems with AMD EPYC processors, the power<br />

usage was lower than expected due to the<br />

shared cooling and power systems. With the<br />

AMD EPYC 7XXX CPU, applications ran faster<br />

than previous generations of CPUs, helping<br />

scientists perform more research to understand<br />

more about the world we live in.<br />

"We have worked alongside Supermicro for<br />

many years, and their attention to the design<br />

and engineering of the Supermicro BigTwin<br />

architecture has constantly increased.<br />

Thousands of compute nodes of the latest<br />

AMD EPYC based Supermicro BigTwin<br />

platform were deployed in the CERN<br />

computing facilities. This illustrates the highquality<br />

of these systems, both in terms of<br />

performance and reliability", said Eric<br />

Bonfillou, CERN IT Facility Planning and<br />

Procurement. <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK FEBRUARY/MARCH <strong>2023</strong> 21<br />

NETWORKcomputing<br />

@<strong>NC</strong>MagAndAwards


JOIN US<br />

AT THE<br />

COMMUNICATION<br />

TECHNOLOGY<br />

EXPO!<br />

15th & 16th <strong>Mar</strong>ch <strong>2023</strong> | ExCeL London<br />

FREE TICKETS AT BUSINESSREVIVALSERIES.CO.UK


EXPERT-LED<br />

WORKSHOPS<br />

CPD-ACCREDITED<br />

SEMINARS<br />

SPEED NETWORKING<br />

WORLD-LEADING<br />

KEYNOTE SPEAKERS<br />

FREE TICKETS!<br />

15th & 16th <strong>Mar</strong>ch <strong>2023</strong> | ExCeL London<br />

FREE TICKETS AT BUSINESSREVIVALSERIES.CO.UK


FEATURE: DATA PERSPECTIVES<br />

THE YEAR OF DATA-DRIVEN EVERYTHING<br />

JONATHAN ROTHWELL, CEO & CO-FOUNDER OF D55, ON THE VALUE OF DATA-FIRST SYSTEMS IN <strong>2023</strong><br />

The ever-evolving deployment of<br />

technology has put pressure on<br />

businesses to adapt, adopt and<br />

innovate. Integrating these advancements,<br />

and applying them effectively, is now<br />

considered imperative for obtaining a<br />

competitive edge. Geared toward efficiency,<br />

speed to market, and scale-up, data-driven<br />

solutions stand to benefit all sectors. However,<br />

with solutions rolled-out at increasingly<br />

impressive rates, many businesses do not<br />

understand the nuances of new systems.<br />

Business leaders are often unsure about what<br />

tech to invest in and how to get the most<br />

effective ROI from newly installed solutions.<br />

This is a pain point commonly seen by digital<br />

transformation specialists, who understand<br />

effective business transformations rarely require<br />

every solution available; businesses need to<br />

dictate solutions, not the other way around.<br />

And so, as the landscape shifts towards datadriven<br />

everything, senior decision-makers must<br />

understand this dynamic and the impact of this<br />

on operations and data-driven investments.<br />

WHAT IS DATA-DRIVEN EVERYTHING?<br />

Put simply, data-driven everything is the<br />

process of using actionable data analysis and<br />

interpretation to produce more effective<br />

strategic business decisions. A data-driven<br />

approach, which utilises a combination of<br />

connected technologies including databases,<br />

data systems, AI and ML, enables businesses<br />

to more accurately optimise the way they serve<br />

customers and employees by using the<br />

freshest data possible. The benefits of<br />

realignment are myriad, with intra-team<br />

cohesion and increased day-to-day efficiency<br />

advantages gained.<br />

A data-driven remodelling synergises systems<br />

for efficiency, moving businesses beyond the<br />

disjointed siloed data access commonly<br />

associated with antiquated legacy systems. This<br />

distinction is well-known within the<br />

transformation sector, with leading providers,<br />

such as AWS, providing public resources for<br />

businesses to better understand the next wave<br />

of system innovation.<br />

OUT WITH THE OLD<br />

Businesses reliant on legacy systems are often<br />

unaware of what they're missing out on. This is<br />

because systems have usually been in place for<br />

a long time, becoming part and parcel of a<br />

company's operations. There is a harmful<br />

perception that sticking with current systems is<br />

less hassle than switching to modern solutions.<br />

In the immediate term this may be correct but<br />

eventually legacy systems will do more harm<br />

than good. Businesses across sectors have<br />

recognised this, sparking 'the great cloud<br />

migration' over the last decade.<br />

When compared to modern cloud solutions,<br />

legacy systems are more costly and less<br />

efficient. They are normally located on-premise,<br />

draining space from physical stores and<br />

24 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


FEATURE: DATA PERSPECTIVES<br />

warehouses. Legacy systems are also finite by<br />

design, meaning with scaleup additional<br />

storage is required; business growth, therefore,<br />

comes with the problem of increased<br />

hardware investment. At the time these systems<br />

were built when green initiatives were not<br />

commonplace either, so hardware cannot be<br />

significantly optimised for sustainability goals.<br />

They are also more costly to maintain, with<br />

breakdowns the sole responsibility of the<br />

business. Hardware systems represent a single<br />

point of failure, if severe breakdowns or<br />

external issues such as damage occur,<br />

business operations come to a standstill.<br />

Considering this, businesses must seek<br />

modern data-driven solutions, to decide<br />

which strategy is most applicable a whole host<br />

of technologies must be explained.<br />

THE SYSTEMS OF DATA-DRIVEN<br />

EVERYTHING<br />

Cloud systems often form the base of a<br />

company's digital transformation. When<br />

compared to legacy systems, cloud is a more<br />

resilient, cost-effective, faster, greener solution.<br />

Cloud providers place connected data houses<br />

in various locations, nullifying breakdown or<br />

damage risks. Cloud can also be optimised<br />

quicker and more minutely, meaning<br />

optimisations for speed of processing are<br />

more easily made. Cost efficiency is a key<br />

component, cloud providers such as AWS<br />

scale cloud computing costs based entirely on<br />

usage, meaning businesses only pay for what<br />

they need and are ready for scale-up at any<br />

given moment. Providers also cover all<br />

optimisation and problem fixes internally.<br />

Most cloud providers also run operations on<br />

green energy, aiming for carbon neutrality by<br />

2050, benefitting cloud-based businesses'<br />

green credentials.<br />

All of these benefits provide a foundation for<br />

faster data collation and access, allowing<br />

businesses to act on data insights in real time.<br />

Cloud systems are also exceptional at<br />

removing unnecessary manpower resources<br />

away from maintaining IT systems, meaning<br />

resources can instead be directed toward<br />

diligent data analysis.<br />

DATA LAKES<br />

Businesses reliant on legacy systems collect<br />

data from various siloed systems, the adverse<br />

effect of this is data mismanagement and an<br />

overall lacking of the 'bigger picture'.<br />

Naturally, storing data in siloed systems<br />

reduces the speed and accuracy of which<br />

data can be acted on. A data lake removes<br />

these issues by collating structured and<br />

unstructured data regardless of scale. From<br />

here, the now-centralised data can be utilised<br />

for machine learning, big data processing<br />

and real-time analytics.<br />

The effect of implementing a data lake on<br />

bottom lines can be considerable, with<br />

research showing companies with data lakes<br />

boasted 9% more organic growth revenue<br />

compared to competitors that had siloed data<br />

systems. The reasons for this are likely that<br />

data lakes offer speedier, more accessible and<br />

accurate insights; research details that 87% of<br />

companies with a data lake believe decisionmaking<br />

markedly improved. Additionally, 92%<br />

of leaders trust data lakes to be the most<br />

effective solution for centralising data. In<br />

comparison to data warehouses - data lake's<br />

predecessor - the modernised solution also<br />

comes with a lower cost of ownership.<br />

Ultimately, data lakes are a foundational<br />

component for businesses realigning to a<br />

data-driven perspective. The centralised data<br />

system enables quicker reactivity to market<br />

changes, synergised collaboration between<br />

separate departments and more informed,<br />

impactful business decisions.<br />

AI AND ML<br />

With AI and Machine Learning (ML) you get<br />

what you put in, literally. The more a business<br />

gears itself toward AI and ML the stronger data<br />

outcomes will be. Likely, businesses are already<br />

leveraging AI in back-end and customer-facing<br />

applications, but the importance of continuous<br />

efforts toward ML can be neglected. Once<br />

businesses have a firm grasp on centralised<br />

data collation and analysis, they can begin to<br />

input this data into ML. As this process<br />

continues, ML becomes intelligent enough to<br />

impact the sophistication of AI because data<br />

interpretation can be used to create highquality<br />

insights.<br />

Businesses that produce an effective databased<br />

system to nurture ML and AI will<br />

produce a high detail analysis of how a<br />

business is operating and how clientele utilise<br />

the company's service. Ultimately, this allows<br />

businesses to accurately optimise areas they<br />

have identified as inefficient.<br />

A DATA-DRIVEN FUTURE<br />

The opportunities available to businesses<br />

willing to realign to data-first systems and ways<br />

of working are clearly demonstrated. Efficiency,<br />

accuracy and future-proofing are key benefits<br />

of data-driven investment. Businesses shouldn't<br />

focus on adopting the whole breadth of digital<br />

transformation technologies, but a carefully<br />

curated digital transformation plan will give<br />

them the best chance of market<br />

competitiveness, the edge over more stubborn<br />

competitors, and an overall more effective and<br />

diligent operation. The technology and<br />

expertise are in place to transform whole<br />

sectors in <strong>2023</strong> - businesses leveraging data<br />

to empower decisions will gain advantages in<br />

the immediate future and beyond. <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 25


FEATURE: DATA PERSPECTIVES<br />

NETWORK LATE<strong>NC</strong>Y: HOW CAN THE<br />

MANAGEMENT COSTS BE REMOVED?<br />

KEN WOOD, TECHNICAL PRODUCT MANAGER AT TERADATA,<br />

OFFERS A SOLUTION TO THE ONGOING PROBLEM OF<br />

NETWORK LATE<strong>NC</strong>Y<br />

Across the globe there are a number<br />

of regulations, compliance laws<br />

and privacy restrictions which<br />

businesses need to navigate through.<br />

Although these rules are all designed to<br />

protect humanity and societies in different<br />

cultures, global businesses are subjected<br />

to spending massive amounts of time and<br />

money to overcome these obstacles in<br />

order to do business across borders.<br />

Yet, for businesses to gain competitive<br />

business insight, they must access<br />

sensitive data which is sometimes located<br />

in different countries. In this, businesses<br />

will also need to weave through different<br />

country's regulations, to access this<br />

critical data. This sensitive data must be<br />

protected, traced, and tracked in order to<br />

keep all the information safe.<br />

WHAT IS DATA LINEAGE AND HOW<br />

DOES THIS IMPACT BUSINESSES?<br />

To begin with the definition of data<br />

lineage, it involves the curation of the<br />

original data - the original truth. No<br />

matter how many times this data is moved<br />

or copied, its origins and in all its<br />

locations and forms is removed. Now,<br />

when this requirement is multiplied by<br />

26 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


FEATURE: DATA PERSPECTIVES<br />

petabytes of data globally within an<br />

enterprise and for most, the challenge can<br />

seem daunting. Successful enterprises can<br />

navigate through these requirements,<br />

however - but it can be costly.<br />

Businesses in regulated industries must<br />

prove that they can effectively store a<br />

certain type of sensitive data, but also<br />

must be able to prove that, when<br />

permitted, this data no longer exists<br />

anywhere. If this data has been deleted,<br />

but still shows up in any form or location,<br />

the data can still be recalled, which can<br />

bring on litigation cases against the<br />

business. It does not matter whether the<br />

enterprise is aware of the existence of the<br />

rogue data or not, they are still liable. The<br />

Data Life Cycle Management process is<br />

the sequence of the creation, use,<br />

retention, and eventual erasure of data. In<br />

some industries, the duration of this life<br />

cycle can span decades or more.<br />

The associated costs and burden which<br />

businesses have of managing data,<br />

tracking its movements, replication, and<br />

its locations, can place a massive strain<br />

on the ability of an organisation to<br />

conduct the business they need to do. The<br />

issue is the "use" phase of the data's life<br />

cycle - how do businesses make data<br />

useful, accessible, and analysable across<br />

a vast web of multinational regulations,<br />

without losing track of it? The answer is<br />

perhaps simpler than expected - leave the<br />

data in place, where it is safe and<br />

controllable - leave the original as the<br />

original.<br />

Even though analysing data-in-place<br />

sounds like an easy solution to this<br />

industry problem, it is not the first time this<br />

approach has been tried. The problem of<br />

network latency comes into play - it is not<br />

sufficient to just access the original data<br />

where it persists from anywhere. The race<br />

between network latency and data size<br />

has been a back-and-forth struggle<br />

throughout the history of computer<br />

networking. Even as the world gets<br />

digitally smaller, network latencies can<br />

make accessing data seem too far away<br />

to be efficiently analysed with high<br />

performance analytical databases engines<br />

which are already on the market.<br />

WHAT IS THE SOLUTION TO<br />

NETWORK LATE<strong>NC</strong>Y?<br />

There are three primary types of network<br />

latency which are; latency caused by<br />

distance, latency caused by congestion,<br />

and latency caused by the network design<br />

itself, intentionally or by accident.<br />

Combinations of these latency types in the<br />

same network, makes the issue much<br />

worse. All three types can, however, cause<br />

analytic access to data to be too slow to<br />

be useful, which reduces the usable<br />

throughput, which is required to gain<br />

insight from critical data, to outright<br />

intolerable.<br />

The instinctive solution is to place the<br />

data near the processing engines, where it<br />

is needed. This means copying data to<br />

local storage locations to give the data<br />

local performance access. However, this<br />

creates a whole new set of issues.<br />

Needing to keep track of where all of<br />

these data copies are located and when<br />

the use of the data is completed and<br />

removing the data from all locations, can<br />

be difficult and costly. This includes<br />

tracking down potential locally backed up<br />

copies and any off-site media copies, and<br />

local disaster recovery replicas in those<br />

remote locations.<br />

The simplest and most practical<br />

solution is to leave the original data in<br />

place. This is possible today with the<br />

combination of technologies<br />

which are already on the<br />

market. When businesses<br />

choose the right<br />

combination, they could optimise<br />

latencies in Wide Area Networks (WAN)<br />

and potentially increase throughput by<br />

over seven-times when directly compared<br />

to the same WAN by itself.<br />

Businesses could be able to use as much<br />

as 95 percent of the WAN connection to<br />

analyse data where it is stored versus<br />

copying and staging the data closer to<br />

their analytic engines. That is global<br />

analytics with data-in-place and at scale.<br />

This frees up IT teams to solve bigger<br />

issues, rather than needing to keep track<br />

of where sensitive data is being copied.<br />

They can manage and control data where<br />

they need to. This also has the potential<br />

to minimise regulatory requirements as<br />

some regulations allow the transient<br />

inflight use of data versus the persistence<br />

of data in other countries.<br />

The cost savings and reduced<br />

management spent could also play a role<br />

in planning data access methods.<br />

Combining the right technology is perfect<br />

for on-premises, private, hybrid, public<br />

and multi-cloud environments where long<br />

network latency might halt enterprises<br />

from being able to fully leverage access to<br />

their sensitive data. <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 27


FEATURE: DATA PERSPECTIVES<br />

ABSTRACTING DATA PROTECTION FROM INFRASTRUCTURE<br />

SIMON PAMPLIN, CTO, CERTES NETWORKS, INSISTS IT IS NOW ESSENTIAL TO STOP RELYING ON<br />

INFRASTRUCTURE SECURITY AND USE LAYER 4 E<strong>NC</strong>RYPTION TO PROACTIVELY PROTECT BUSINESS<br />

SENSITIVE DATA, IRRESPECTIVE OF LOCATION<br />

The cybersecurity threat has risen so<br />

high in recent years that most<br />

companies globally now accept that a<br />

data breach is almost inevitable. But what<br />

does this mean for data protection and<br />

compliance officers, as well as senior<br />

managers, now personally liable for<br />

protecting sensitive company, customer and<br />

partner data?<br />

Investing in security infrastructure is not<br />

enough to demonstrate compliance in<br />

protecting data. Software Defined Wide<br />

Area Networks (SD-WAN), Firewalls and<br />

Virtual Private Networks (VPN) play a role<br />

within an overall security posture but they<br />

are infrastructure solutions and do not<br />

safeguard data. What happens when the<br />

data crosses outside the network to the<br />

cloud or a third-party network? How is the<br />

business data on the LAN side protected if<br />

an SD-WAN vulnerability or<br />

misconfiguration is exploited? What<br />

additional vulnerability is created by relying<br />

on the same network security team to both<br />

set policies and manage the environment, in<br />

direct conflict with Zero Trust guidance? The<br />

only way to ensure the business is protected<br />

and compliant is to abstract data protection<br />

from the underlying infrastructure.<br />

ACKNOWLEDGING ESCALATING RISK<br />

Attitudes to data security need to change fast<br />

because today's infrastructure-led model is<br />

creating too much risk. According to the 2022<br />

IBM Data Breach survey, 83% of companies<br />

confirm they expect a security breach - and<br />

many accept that breaches will occur more<br />

than once. Given this perception, the question<br />

has to be asked: why are businesses still reliant<br />

on a security posture focused on locking the<br />

infrastructure down?<br />

Clearly that doesn't work. While not every<br />

company will experience the catastrophic<br />

impact of the four-year-long data breach that<br />

28 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


FEATURE: DATA PERSPECTIVES<br />

ultimately affected 300 million guests of<br />

<strong>Mar</strong>riott Hotels, attackers are routinely<br />

spending months inside businesses looking for<br />

data. In 2022, it took an average of 277 days<br />

-a bout nine months - to identify and contain a<br />

breach. Throughout this time, bad actors have<br />

access to corporate data; they have the time<br />

to explore and identify the most valuable<br />

information. And the chance to copy and/or<br />

delete that data - depending on the attack's<br />

objective.<br />

The costs are huge: the average cost of a<br />

data breach in the US is now $9.44 million<br />

($4.35 is the average cost globally). From<br />

regulatory fines - which are increasingly<br />

punitive across the globe - to the impact on<br />

share value, customer trust, even business<br />

partnerships, the long-term implications of a<br />

data breach are potentially devastating.<br />

MISPLACED TRUST IN INFRASTRUCTURE<br />

Yet these affected companies have ostensibly<br />

robust security postures. They have highly<br />

experienced security teams and an extensive<br />

investment in infrastructure. But they have<br />

bought into the security industry's long<br />

perpetuated myth that locking down<br />

infrastructure, using VPNs, SD-WANs and<br />

firewalls, will protect a business' data.<br />

As breach after breach has confirmed,<br />

relying on infrastructure security fails to provide<br />

the level of control needed to safeguard data<br />

from bad actors. For the vast majority of<br />

businesses, data is rarely restricted to the<br />

corporate network environment. It is in the<br />

cloud, on a user's laptop, on a supplier's<br />

network. Those perimeters cannot be<br />

controlled, especially for any business that is<br />

part of supply chain and third-party networks.<br />

How does Vendor A protect third party<br />

Supplier B when the business has no control<br />

over their network? Using traditional,<br />

infrastructure dependent security, it can't.<br />

Furthermore, while an SD-WAN is a more<br />

secure way of sending data across the Internet,<br />

it only provides control from the network<br />

egress point to the end destination. It provides<br />

no control over what happens on an<br />

organisation's LAN side. It cannot prohibit<br />

data being forwarded on to another location<br />

or person. Plus, of course, it is accepted that<br />

SD-WAN misconfiguration can add a risk of<br />

breach, which means the data is exposed - as<br />

shown by the public CVE's (Common<br />

Vulnerabilities and Exposures) available to<br />

review on most SD-WAN vendors' websites.<br />

And while SD-WANs, VPNs and firewalls use<br />

IPSEC as an encryption protocol, their<br />

approach to encryption is flawed: the<br />

encryption keys and management are<br />

handled by the same group, in direct<br />

contravention of accepted zero trust<br />

standards of "Separation of Duties".<br />

PROTECT THE DATA<br />

It is, therefore, essential to take another<br />

approach, to focus on protecting the data. By<br />

wrapping security around the data, a<br />

business can safeguard this vital asset<br />

irrespective of infrastructure. Adopting Layer<br />

4, policy-based encryption ensures the data<br />

payload is protected for its entire journey -<br />

whether it was generated within the business<br />

or by a third party.<br />

If it crosses a misconfigured SD-WAN, the<br />

data is still safeguarded: it is encrypted,<br />

making it valueless to any hacker. However<br />

long an attack may continue, or however long<br />

an individual or group can be camped out in<br />

the business looking for data to use in a<br />

ransomware attack, if the sensitive data is<br />

encrypted there is nothing to work with. The<br />

fact that the payload data only is encrypted,<br />

while header data remains in the clear means<br />

minimal disruption to network services or<br />

applications, as well as making<br />

troubleshooting an encrypted network easier.<br />

This mindset shift protects not only the data<br />

and, by default, the business, but also the<br />

senior management team responsible - indeed<br />

personally liable - for security and information<br />

protection compliance. Rather than placing<br />

the burden of data protection onto network<br />

security teams, this approach realises the true<br />

goal of zero trust: separating policy setting<br />

responsibility from system administration. The<br />

security posture is defined from a business<br />

standpoint, rather than a network security and<br />

infrastructure position - and that is an essential<br />

and long overdue mindset change.<br />

CO<strong>NC</strong>LUSION<br />

This mindset change is becoming critical -<br />

from both a business and regulatory<br />

perspective. Over the past few years,<br />

regulators globally have increased their focus<br />

on data protection. From punitive fines,<br />

including the maximum with its 20 million<br />

euros (or 25% of global revenue, whichever is<br />

the higher) per breach of European Union's<br />

General Data Protection Regulation (GDPR) to<br />

the risk of imprisonment, the rise in regulation<br />

across China and the Middle East reinforces<br />

the global clear recognition that data loss has<br />

a material cost to businesses.<br />

Until recently, however, regulators have not<br />

been prescriptive about the way in which that<br />

data is secured - an approach that has<br />

allowed the 'lock down infrastructure' security<br />

model to continue. This attitude is changing.<br />

In North America, new laws demand<br />

encryption between Utilities' Command and<br />

Control centres to safeguard national<br />

infrastructure. This approach is set to expand<br />

as regulators and businesses recognise that<br />

the only way to safeguard data crossing<br />

increasingly dispersed infrastructures, from SD-<br />

WAN to the cloud, is to encrypt it - and do so<br />

in a way that doesn't impede the ability of the<br />

business to function.<br />

It is now essential that companies<br />

recognise the limitations of relying on SD-<br />

WANs, VPNs and firewalls. Abstracting data<br />

protection from the underlying infrastructure<br />

is the only way to ensure the business is<br />

protected and compliant. <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 29


OPINION: QUANTUM<br />

QUANTUM FOR THE LONG TERM<br />

DR ERIC HOLLAND, DIRECTOR<br />

OF QUANTUM ENGINEERING<br />

SOLUTIONS, KEYSIGHT<br />

TECHNOLOGIES, EXPLORES SIX<br />

KEY QUANTUM TRENDS FOR<br />

<strong>2023</strong> AND BEYOND<br />

Quantum mechanics offers an<br />

entirely new way of processing<br />

information. It has the potential<br />

to be faster and more resource-efficient<br />

than any other solution, which could<br />

transform our capabilities in sectors such<br />

as cybersecurity, pharmaceuticals, and<br />

manufacturing.<br />

However, as it stands, quantum<br />

mechanics is still in its infancy. We are<br />

fundamentally limited by the stability and<br />

30 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


OPINION: QUANTUM<br />

accuracy of existing systems. To take<br />

quantum computing from its current state<br />

and make it fit for purpose in the<br />

mainstream, there is a need to reduce<br />

errors and add the ability to scale.<br />

If such improvements can be made,<br />

quantum will be able to push beyond the<br />

boundaries of classical physics and offer<br />

solutions to calculations that have<br />

previously been deemed impossible.<br />

With this in mind, and as quantum<br />

continues its development, here, I have<br />

put together my top trends:<br />

1: Quantum poised to accelerate<br />

complex design processes<br />

In the airline industry, it is not<br />

uncommon for companies to spend 25<br />

years designing a new polymer that will<br />

make aircraft more fuel efficient and<br />

resistant to extreme temperatures.<br />

Quantum will significantly accelerate<br />

this and other material science design<br />

timelines. Rather than spending their<br />

entire career on one design cycle,<br />

employees will be able to complete the<br />

process in a matter of years.<br />

2: Taking a quantum leap in the<br />

climate change battle<br />

Once quantum demonstrates advantage,<br />

it will increasingly be channeled to help<br />

fight climate change. For example,<br />

improving decision-making through<br />

complex modeling and predictions and<br />

helping ensure compliance with<br />

emission standards.<br />

3: Reducing the impact of hurricanes<br />

and weather events<br />

Before the end of the next decade,<br />

quantum will enable meteorologists to<br />

better predict the trajectory of<br />

hurricanes, winter storms, and other<br />

weather events. This will allow<br />

communities to better plan and remove<br />

any element of guesstimates in<br />

determining whether to mandate<br />

evacuations or shelter in place. As a<br />

result, the loss of life associated with<br />

hurricanes and other natural weatherdriven<br />

disasters will be reduced.<br />

4: Quantum navigation will<br />

illuminate remote areas<br />

Quantum technology can facilitate<br />

navigation in remote areas with minimal<br />

satellite coverage, but cost is currently a<br />

barrier to adoption. This will begin to<br />

change as quantum becomes more<br />

prevalent and affordable. I believe that<br />

we will see emergency vehicles equipped<br />

with quantum sensors within the next<br />

decade, with consumer vehicles<br />

eventually following suit.<br />

5: Europe is hot on US' heels with<br />

quantum adoption<br />

The US is currently leading the quantum<br />

computing industry, but by the end of the<br />

decade, Europe will reach parity.<br />

Increasing privacy regulations is one<br />

major driver behind Europe's growth, as<br />

having quantum computing capabilities<br />

in the region will make it significantly<br />

easier to comply with these mandates.<br />

In addition, European quantum<br />

companies have seen the largest venture<br />

rounds and a plethora of universities<br />

throughout the continent provide a talent<br />

pipeline that can be tapped to fuel new<br />

quantum opportunities and use cases. As<br />

a result, the US quantum industry will<br />

feel increasing pressure to maintain its<br />

competitive advantage.<br />

6: Building the foundation for<br />

quantum<br />

After decades-long hype around<br />

quantum computing and quantum<br />

systems, the industry will start to realise<br />

its potential for creating new<br />

opportunities in fields spanning<br />

cybersecurity, materials creation,<br />

financial analysis, and military receivers.<br />

Proactive companies will start investing<br />

in quantum, fostering quantum talent<br />

within the next generation of workers<br />

through university partnerships,<br />

hackathons, and other projects. This will<br />

create an ancillary boost to DEI<br />

initiatives resulting in much-needed<br />

diversity in the tech workforce.<br />

Recent research revealed 74% of<br />

companies believe they will fall behind if<br />

they fail to adopt quantum. As a result,<br />

organisations will begin to shift their<br />

thinking from that of quantum being a<br />

futuristic technology and begin<br />

addressing key challenges, including<br />

financial resources and operations, and<br />

developing real enterprise applications<br />

of quantum by 2026, if not sooner.?<br />

WHEN WILL QUANTUM ENTER THE<br />

MAINSTREAM?<br />

There is still much to be learned about<br />

quantum mechanics and the power it<br />

harnesses. However, it's clear the<br />

opportunities it presents in fields such as<br />

research and industry. It's not<br />

unreasonable to think that quantum<br />

computing could be in mainstream use<br />

within the next ten years, though for this<br />

to happen there needs to be significant<br />

innovation in hardware and software<br />

development.<br />

What is certain is the multitude of<br />

possibilities quantum mechanics offers,<br />

and it goes beyond the trends we've<br />

discussed in this article. The power of<br />

quantum has the potential to transform<br />

everything from how pharmaceutical<br />

companies develop drugs for serious<br />

illness to how businesses protect<br />

themselves from cybersecurity threats. It<br />

may be in its early years now, but<br />

quantum is coming sooner than we<br />

think. <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 31


OPINION: MACHINE LEARNING<br />

DISCOVERING RULES THROUGH MACHINE LEARNING<br />

JURAS JURŠENAS, COO AT OXYLABS EXPLORES THE WAYS IN<br />

WHICH WE CAN TAKE EFFICIENT STRATEGIES FROM MACHINE<br />

LEARNING MODELS AND APPLY THEM TO RULE-BASED SYSTEMS<br />

Back in 1868, George Boole's wife<br />

paraphrased his thoughts on the<br />

capabilities of machines: "Between<br />

them they have conclusively proved, by<br />

unanswerable logic of facts, that<br />

calculation and reasoning, like weaving<br />

and plowing, are work, not for human<br />

souls, but for clever combinations of iron<br />

and wood. If you spend time in doing<br />

work that a machine could do faster than<br />

yourselves, it should only be for<br />

exercise."<br />

We've come a long way since Claude<br />

Shannon applied Boole's work to build<br />

the first circuit board, heralding the age<br />

of computers. Just as he had predicted,<br />

most calculations and reasoning chains<br />

are now done by "clever combinations of<br />

iron and wood." We just realised that<br />

silicon might be a bit better at doing the<br />

job. What Boole himself did throughout<br />

his life would be something he'd not have<br />

thought possible for a machine. He was<br />

investigating the rules that governed<br />

thought itself. In other words, he was<br />

moving towards a higher level of<br />

reasoning, above the regular calculations<br />

of daily life.<br />

While we're still far away from<br />

artificial intelligence that would be<br />

able to make use of philosophy<br />

in a similar fashion to Boole<br />

and others, we're coming close<br />

to a more subtle form of<br />

computational thinking.<br />

Machine learning can be used<br />

to discover unintuitive rules in<br />

some areas of life.<br />

MACHINE<br />

LEARNING'S<br />

CAPABILITIES<br />

Much has been written about<br />

how machine learning is going to<br />

replace all other modes of solving<br />

problems. One of the most popular<br />

suggestions is that we should forgo rulebased<br />

approaches for machine learning.<br />

Such a view, in my eyes, is overly<br />

idealistic. Solving problems with machine<br />

learning that could be solved with a<br />

rule-based approach is a waste of<br />

resources. Models, especially more<br />

complicated ones, can be prohibitively<br />

expensive and require much<br />

maintenance to keep them accurate.<br />

In an ideal world with unlimited<br />

resources, both computing and fiscal,<br />

these differences wouldn't matter. In<br />

business, however, we're always working<br />

32 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


OPINION: MACHINE LEARNING<br />

within tightly<br />

defined boundaries,<br />

as any usage of resources<br />

also means an opportunity cost.<br />

Preferably, then, we would opt to solve all<br />

problems with rule-based approaches.<br />

However, that runs into other complicated<br />

issues, such as not all problems having<br />

defined boundaries that can be solved<br />

through rules.<br />

Machine learning is great at solving<br />

two types of challenges. Any problem<br />

that requires a probabilistic answer is<br />

likely much better done by a model<br />

rather than anything rule-based. Another<br />

area where machine learning is<br />

immensely valuable is when the rules are<br />

not clear.<br />

In business, we might sometimes not be<br />

sure on how to answer specific questions.<br />

For example, what rules should govern a<br />

self-checkout process? There are nearly<br />

infinite possibilities for structuring such a<br />

feature, but we're always looking to<br />

maximise the outcome. In other words,<br />

we'd prefer that a self-checkout would<br />

lead to the most conversions.<br />

INFERE<strong>NC</strong>ES FROM MACHINE<br />

LEARNING MODELS<br />

A common objection might be that some<br />

machine learning models, such as Deep<br />

Neural Networks, are essentially black<br />

boxes. We're never quite sure what's<br />

going on under the hood, so extracting<br />

rules from them is as much guesswork as<br />

without them. Fortunately, in business<br />

applications, we don't need to be as<br />

exact as logicians or scientists who<br />

attempt to uncover the foundational<br />

blocks of minds, language, or the<br />

universe. Insights that point us in the<br />

right direction are enough to create a<br />

case for doing things one way or<br />

another.<br />

In other words, when building a model<br />

that predicts the best outcome for a selfservice<br />

customer system, we're not trying<br />

to define some immutable laws of human<br />

behavior. We're simply looking at an<br />

admittedly ever-changing set of<br />

circumstances and attempting to wrestle<br />

out the best way to go about them.<br />

So, going back to the same example, a<br />

Random Forest algorithm, fed with<br />

enough data from event sessions and<br />

user activities, could outline the most<br />

predictive outputs. These would indicate<br />

what users are most influenced by during<br />

the self-service process. These outputs<br />

might not be ground-breaking or even<br />

wide-ranging as they only work in a fairly<br />

confined space of circumstances. But<br />

they're more than enough for the<br />

engineers, designers, and content writers<br />

to perform optimisation that would lead<br />

to better conversions.<br />

These insights can then be turned into<br />

rule-based algorithms. As such, machine<br />

learning models can give us a way to<br />

discover circumstantial rules that we can<br />

implement in our business practices.<br />

CO<strong>NC</strong>LUSION<br />

Hopes that machine learning will<br />

replace rule-based systems are illfounded.<br />

The latter is often much more<br />

efficient and cheaper to build and<br />

maintain than complicated machine<br />

learning models. As businesses are<br />

always turning one eye to efficiency,<br />

rule-based systems are here to stay.<br />

Machine learning, unlike commonly<br />

thought, can be used to supplement<br />

rule-based systems. While there are<br />

possible ways of combining one into a<br />

single system, the former can also be<br />

used to garner insights that can then be<br />

implemented into the latter.<br />

In the end, machine learning shouldn't<br />

be thought of as the cure-all for technical<br />

problems. It's one of the many possibilities<br />

that should be used thoughtfully. One of<br />

those is to ensure we make better<br />

decisions in other systems. <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 33


CASE STUDY<br />

UTILISING DIGITAL TRANSFORMATION TO PROVIDE QUANTIFIABLE TIME SAVINGS<br />

TENDRING DISTRICT COU<strong>NC</strong>IL, WORKING WITH ESPRIA, HAS OPTED TO TRANSITION TO THE<br />

CLOUD-BASED SOPHOS CENTRAL<br />

Tendring District Council, based in Essex,<br />

have worked with Sophos and Espria for<br />

their IT security needs since 2014. Sophos<br />

is a world leader in next-generation<br />

cybersecurity, protecting more than 500,000<br />

organisations and millions of consumers in<br />

more than 150 countries from today's most<br />

advanced cyber threats. Espria is an awardwinning<br />

expert in the delivery of IT services and<br />

a trusted provider of IT solutions, managed and<br />

integrated services to a wide range of UK<br />

organisations of all sizes.<br />

BUSINESS CHALLENGES<br />

Several years ago, Tendring District Council<br />

implemented on-premise Sophos Endpoint<br />

Protection Advanced and was happy with the<br />

solution. More recently, the council has focused<br />

on further digital transformation, moving all<br />

services and servers to a cloud environment.<br />

With this in mind, and working with Espria, the<br />

council opted to transition to the cloud-based<br />

Sophos Central. Completed in May 2020,<br />

Espria supported the organisation in working<br />

remotely with an ongoing priority for IT security<br />

after a minor ransomware incident caused the<br />

team to be highly aware of the prevalence of<br />

attacks in their sector.<br />

THE TECHNICAL SOLUTION<br />

The council moved to Sophos Central for cloudbased<br />

IT security for endpoints and servers with<br />

the added benefit of ransomware protection<br />

from Intercept X Advanced with EDR. The<br />

council also called in Sophos Professional<br />

Services to assist with the installation.<br />

Throughout the project, the team at the council<br />

used each step as a way of learning about the<br />

solutions, which included:<br />

Sophos Central: a unified console for<br />

managing Sophos products<br />

Intercept X Advanced for Server with EDR<br />

which protects virtual and physical servers<br />

without sacrificing performance, including<br />

one-click Server Lockdown<br />

Intercept X Advanced with EDR: a<br />

signatureless anti-exploit, anti-ransomware<br />

and root cause analysis tool that protects<br />

endpoints from advanced threats<br />

Professional Services: consultation,<br />

implementation and configuration of<br />

solutions aligned with security needs and<br />

Sophos best practices.<br />

BUSINESS BENEFITS<br />

Sam Wright is Cyber Security & Systems<br />

Manager at Tendring District Council. He lists<br />

the benefits of the Sophos/Espria partnership<br />

and moving to Sophos Central as being:<br />

Automation: the automation in Sophos<br />

Central when detecting and alerting potential<br />

threats eases the pressure on the IT team<br />

The interface: the team finds the Sophos<br />

Central interface very easy to use and issuefree,<br />

particularly when working remotely<br />

Threat analysis: Sam was impressed with the<br />

Sophos Endpoint Detection and Response<br />

(EDR) threat analysis in Intercept X Advanced<br />

with top threat indicators, live discovery and<br />

multiple categories and queries<br />

Behaviour analysis: Intercept X Advanced<br />

examines the behaviour of attacks rather<br />

than definition - a different approach that<br />

provides heightened security<br />

Data security: Device Control within Sophos<br />

Central keeps data safe and the council<br />

compliant with GDPR<br />

Price: Sam believes he got a good deal from<br />

Sophos with customer-specific pricing<br />

Service: "The council is pleased with the<br />

service it has received from Sophos and<br />

Espria who are there to help whenever it's<br />

needed."<br />

Sam is so pleased with Sophos' services and<br />

the solutions provided that he has<br />

recommended them to his peers in the Essex<br />

Online Partnership - a collaboration of<br />

authorities including emergency services - and<br />

he also ran a demo for them.<br />

"I'm always happy to recommend Sophos &<br />

Espria," he says. "It's easy to use, makes<br />

complete sense and empowers our technicians.<br />

Plus, Sophos is a well-established and trusted<br />

company that's here for the long term. Sophos<br />

has definitely played a key role in our digital<br />

transformation project. Our technicians are very<br />

happy with Espria & Sophos Central. It makes it<br />

easy for them to drill down, review and<br />

investigate any issues that arise. It just makes<br />

sense, and it empowers our team." <strong>NC</strong><br />

34 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


Performance Redefined<br />

Introducing 15 New Server Families That Redefine Modern Workload Performance With<br />

4 th Gen Intel ® Xeon ® Scalable Processors (formerly codenamed Sapphire Rapids)<br />

Learn More at www.supermicro.com/X13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!