NC Feb-Mar 2023
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
NETWORKcomputing<br />
I N F O R M A T I O N A N D C O M M U N I C A T I O N S – N E T W O R K E D www.networkcomputing.co.uk<br />
DATA PERSPECTIVES<br />
A closer look at a secure, data-driven future<br />
HYBRID WORKING<br />
Bridging the employeremployee<br />
disconnect<br />
CLOUDS AND SILVER<br />
LININGS<br />
Forecasting the year ahead<br />
for networks<br />
QUANTUM FOR THE<br />
LONG TERM<br />
Quantum trends for<br />
<strong>2023</strong> and beyond<br />
FEBRUARY/MARCH <strong>2023</strong> VOL 32 NO 01
EVENT ORGANISERS:<br />
Do you have something coming up that may<br />
interest readers of Network Computing?<br />
Contact dave.bonner@btc.co.uk<br />
08-09<br />
MAR<br />
TECH SHOW LONDON<br />
ExCel, London<br />
www.techshowlondon.co.uk<br />
FORTHCOMING EVENTS<br />
<strong>2023</strong><br />
FORTHCOMING EVENTS<br />
FORTHCOMING EVENTS<br />
21-22<br />
MAR<br />
21-22<br />
MAR<br />
26-27<br />
SEPT<br />
15-16<br />
NOV<br />
COMMUNICATION TECHNOLOGY EXPO<br />
ExCel, London<br />
www.communicationtechnologyexpo.co.uk<br />
THE REMOTE WORKING EXPO<br />
ExCel, London<br />
www.businessrevivalseries.co.uk/<br />
the-remote-working-expo<br />
INTERNATIONAL CYBER EXPO<br />
Olympia, London<br />
www.internationalcyberexpo.com<br />
DATACENTRES IRELAND<br />
RDS Dublin<br />
www.datacentres-ireland.com
COMMENT<br />
COMMENT<br />
DRIVEN BY DATA<br />
We're delving deeper into data this issue with articles that explore ways to<br />
leverage and protect it to best benefit our businesses. First, Certes Networks'<br />
Simon Pamplin puts the case for abstracting data protection from infrastructure<br />
in order to ensure that it remains both secure and compliant with data regulations.<br />
"Attitudes to data security need to change fast because today's infrastructure-led<br />
model is creating too much risk," explains Simon. "According to the 2022 IBM Data<br />
Breach survey, 83% of companies confirm they expect a security breach - and many<br />
accept that breaches will occur more than once. Given this perception, the question<br />
has to be asked: why are businesses still reliant on a security posture focused on locking<br />
the infrastructure down?"<br />
Security and compliance issues are far from the only potential pitfalls when it comes<br />
to getting the most out of this prized asset. As Teradata's Ken Wood explains, network<br />
latency has long been an obstacle when it comes to leveraging data: "The race<br />
between network latency and data size has been a back-and-forth struggle throughout<br />
the history of computer networking. Even as the world gets digitally smaller, network<br />
latencies can make accessing data seem too far away to be efficiently analysed with<br />
high performance analytical databases engines which are already on the market." Read<br />
Ken's article to discover why keeping data-in-place - leaving "the original as the original"<br />
- might be the best solution to a problem as old as networks themselves.<br />
REVIEWS:<br />
Dave Mitchell<br />
DEPUTY EDITOR: <strong>Mar</strong>k Lyward<br />
(netcomputing@btc.co.uk)<br />
PRODUCTION: Abby Penn<br />
(abby.penn@btc.co.uk)<br />
DESIGN: Ian Collis<br />
(ian.collis@btc.co.uk<br />
SALES:<br />
David Bonner<br />
(david.bonner@btc.co.uk)<br />
Julie Cornish<br />
(julie.cornish@btc.co.uk)<br />
SUBSCRIPTIONS: Christina Willis<br />
(christina.willis@btc.co.uk)<br />
PUBLISHER: John Jageurs<br />
(john.jageurs@btc.co.uk)<br />
Published by Barrow & Thompkins<br />
Connexion Ltd (BTC)<br />
35 Station Square,<br />
Petts Wood, Kent, BR5 1LZ<br />
Tel: +44 (0)1689 616 000<br />
Fax: +44 (0)1689 82 66 22<br />
SUBSCRIPTIONS:<br />
UK £35/year, £60/two years,<br />
£80/three years;<br />
Europe:<br />
£48/year, £85/two years £127/three years;<br />
ROW:<br />
£62/year, £115/two years, £168/three years;<br />
Subscribers get SPECIAL OFFERS — see subscriptions<br />
advertisement; Single copies of<br />
Network Computing can be bought for £8;<br />
(including postage & packing).<br />
© <strong>2023</strong> Barrow & Thompkins<br />
Connexion Ltd.<br />
All rights reserved.<br />
No part of the magazine may be<br />
reproduced without prior consent, in<br />
writing, from the publisher.<br />
We also have an opinion piece from D55's Jonathan Rothwell on the prospects for<br />
data-first systems in the year ahead. According to Jonathan "A data-driven remodelling<br />
synergises systems for efficiency, moving businesses beyond the disjointed siloed data<br />
access commonly associated with antiquated legacy systems," and can potentially provide<br />
a competitive edge for companies seeking to integrate digital transformation. Will<br />
<strong>2023</strong> be the year of data-driven everything? Read Jonathan's article for more.<br />
And from data to dates for your diary with the news that nominations for the <strong>2023</strong><br />
Network Computing Awards are now open! This will be the 17th year of the Network<br />
Computing Awards, and you now only have until 9th <strong>Mar</strong>ch to nominate your finalists<br />
for this year. Voting to determine the winners will begin later in <strong>Mar</strong>ch and the awards<br />
ceremony itself will be held on 18th May, so be sure to visit https://networkcomputingawards.co.uk<br />
soon to make your selections heard. <strong>NC</strong><br />
GET FUTURE COPIES FREE<br />
BY REGISTERING ONLINE AT<br />
WWW.NETWORKCOMPUTING.CO.UK/REGISTER<br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 03
CONTENTS<br />
CONTENTS<br />
F E B R U A R Y / M A R C H 2 0 2 3<br />
CLOUDS AND SILVER LININGS..8<br />
From hybrid working and the cloud to the<br />
IT skills gap, Network Computing asked<br />
industry experts for their forecasts for the<br />
next twelve months<br />
COMMENT.....................................3<br />
Driven by data<br />
INDUSTRY NEWS.............................6<br />
The latest networking news<br />
ARTICLES<br />
THE TOP FIVE NETWORK TRENDS<br />
FOR <strong>2023</strong>.......................................12<br />
By Douglas Wadkins at Opengear<br />
SHADOW IT’S CLUE TO HYBRID<br />
WORKING ENGAGEMENT...............16<br />
By Jason Barker at IR<br />
A COLLABORATIVE EFFORT.............18<br />
By Carl Day at Apogee<br />
FILE SY<strong>NC</strong>HRONISATION CHALLENGES<br />
IN THE HYBRID WORKPLACE............20<br />
By Jason Kent at Open Seas<br />
ADREM NETCRU<strong>NC</strong>H 13......13<br />
Enterprises and SMBs are spoilt for choice<br />
with network monitoring products, but<br />
AdRem Software’s NetCrunch stands out<br />
from the crowd for many good reasons<br />
DATA PERSPECTIVES.............24<br />
We delve into data this issue with articles on<br />
removing network latency and abstracting<br />
data protection, and consider whether <strong>2023</strong><br />
will be the year of data-driven everything<br />
HYBRID WORKING.................16<br />
Our hybrid working feature this issue looks at<br />
ways of bridging the employer-employee<br />
disconnect while improving the hybrid<br />
working environment for the entire workforce<br />
QUANTUM MECHANICS.....30<br />
Dr Eric Holland, Director of Quantum<br />
Engineering Solutions at Keysight<br />
Technologies, explores six key quantum<br />
trends for <strong>2023</strong> and beyond<br />
THE YEAR OF DATA-DRIVEN<br />
EVERYTHING....................................24<br />
By Jonathan Rothwell at D55<br />
REMOVING THE MANAGEMENT<br />
COSTS OF NETWORK LATE<strong>NC</strong>Y......26<br />
By Ken Wood at Teradata<br />
ABSTRACTING DATA PROTECTION<br />
FROM INFRASTRUCTURE.................28<br />
By Simon Pamplin at Certes Networks<br />
DISCOVERING RULES THROUGH<br />
MACHINE LEARNING.......................32<br />
By Juras Juršenas at Oxylabs<br />
AWARDS<br />
NOW’S THE TIME TO NOMINATE...14<br />
With nominations now open for the <strong>2023</strong><br />
Network Computing Awards, ExaGrid share<br />
their experience of being a part of the awards<br />
CASE STUDIES<br />
SUPERMICRO BIGTWIN HAS A BIG<br />
IMPACT AT CERN.............................21<br />
Supermicro servers enable faster and more<br />
complex simulations at CERN Data Centre<br />
DIGITAL TRANSFORMATION PROVIDES<br />
QUANTIFIABLE TIME SAVING............34<br />
Tendring District Council, working with<br />
Espria, transitions to Sophos Central<br />
REVIEW<br />
ADREM NETCRU<strong>NC</strong>H 13.................13<br />
04 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
INDUSTRY NEWS<br />
NEWSNEWS<br />
NEWS NEWS<br />
NEWS NEWS NEWS NEWS<br />
NEWS NEWS<br />
Over half of IT pros have Kubernetes security concerns<br />
New research has found that 53% of developers are<br />
concerned about the security of Kubernetes. Taken from<br />
Civo's The Kubernetes State of Play 2022, the research found<br />
54% of 1000 cloud developers surveyed by Civo view the<br />
complexity around Kubernetes as slowing their use of<br />
containers, an increase of 7% from the previous year. Failure<br />
to manage this complexity can often leave organisations<br />
vulnerable. When asked about other motivating factors for<br />
their security concerns around Kubernetes, just over 50% said<br />
misconfigurations and exposure were driving their concerns.<br />
Many developers are also anxious about bad actors<br />
exploiting flaws in Kubernetes software. Almost two-thirds<br />
(66%) of developers said they were worried about the security<br />
concerns created by Kubernetes vulnerabilities. This comes at a<br />
time of concerted action by tech firms and government bodies<br />
to address this problem. Notably, the US Congress is pressing<br />
ahead with the Securing Open Source Software Act to create<br />
an industry-wide approach to tackling vulnerabilities connected<br />
to open-source software like Kubernetes.<br />
Despite these security concerns, they come at a time of<br />
increased usage of Kubernetes. Civo found that for the first<br />
time the majority of IT professionals are using Kubernetes and<br />
containers in their daily operations, with 57% of respondents<br />
seeing an increase in the amount of Kubernetes clusters<br />
running in their organisation over the last 12 months.<br />
Sophos expands firewall portfolio with new appliances<br />
Sophos has expanded its next-gen firewall portfolio with two<br />
new high-end, enterprise-grade XGS Series appliances.<br />
"Sophos is shaking up the competitive enterprise firewall<br />
landscape with these new high-performance appliances,<br />
providing best in class price per protected megabit per second<br />
(Mbps)," according to Daniel Cole, vp of network security<br />
product management at Sophos.<br />
The new XGS 7500 and 8500 models deliver industry-best<br />
modular connectivity; highly scalable SD-WAN features;<br />
trusted traffic and application acceleration; high performance<br />
Transport Layer Security (TLS) inspection; threat protection; and<br />
enterprise-grade, high-availability and redundancy<br />
capabilities. Featuring high performance Xstream flow<br />
processors and central processing units (CPUs) with enterprisegrade<br />
acceleration, the models offer roughly 50% faster<br />
throughput than industry averages in their class.<br />
Acronis nets cyber protection partnership with Fulham<br />
Acronis has announced a three-year partnership with<br />
London's oldest professional football club, Fulham FC.<br />
EveryCloud.co.uk will support Acronis as its 'Strategic<br />
#Cyberfit' delivery partner providing its cutting-edge cyber<br />
protection solutions and cloud backup service to the club.<br />
Under the Strategic #Cyberfit delivery partner<br />
EveryCloud.co.uk, Acronis will provide Premier League side<br />
Fulham FC with a full suite of cyber protection solutions.<br />
Arturs Banks, Head of IT of Fulham FC, said: "We are very<br />
pleased to be working with Acronis and EveryCloud UK, and<br />
we look forward to incorporating them into our cloud backup<br />
and file security infrastructure. Their support and expertise will<br />
be invaluable to Fulham FC and the Fulham FC Foundation as<br />
we continue to prioritise data and cyber security at the club."<br />
Half of software licenses going unused by employees<br />
Nexthink has released new findings from its report: Soft-<br />
WASTE: How Much Does IT Waste on Unused Software<br />
Licenses? The report uncovered that half (49.96%) of all software<br />
installed went unused by employees. These findings are informed<br />
by analysing more than 6 million customer environments across<br />
8 industries and 12 regions, looking at historical data of the first<br />
few months of Nexthink implementation to set the best standard<br />
of what an average business is dealing with when it comes to a<br />
lack of visibility around software licenses.<br />
"Shutting down licenses in a random or uninformed manner<br />
can lead to higher costs in the medium term. Only when IT has<br />
access to all the information about who is using what, what is not<br />
used, what is still performing and what needs to be repaired or<br />
replaced, can it see and take advantage of greater efficiencies in<br />
a sustainable and recurring manner," said Yassine Zaied, Chief<br />
Strategy and <strong>Mar</strong>keting Officer at Nexthink.<br />
06 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
INDUSTRY NEWS<br />
Looking at more than 30 popular software tools, the report<br />
used an averaging licensing fee per user per month (ranging<br />
from $8 per user to $83) and calculated that based on the<br />
unused software licenses found in their 6 million data set. It was<br />
discovered that it was costing those businesses about $45M per<br />
month, or roughly half a billion per year. The report also<br />
discovered that many knowledge workers are using multiple<br />
applications for the same purpose. For example, roughly 37%<br />
of employees use 3 browser applications to access their SaaS<br />
tools and the internet, and 31% use 2 collaboration tools.<br />
Keysight launches wireless test platform for 5G RedCap<br />
Keysight Technologies' new E7515R solution is based on its<br />
5G Network Emulation Solutions platform, a streamlined<br />
network emulator specifically designed for protocol, radio<br />
frequency (RF), and functional testing of all cellular internet of<br />
things (CIoT) technologies, including RedCap. The E7515R<br />
expands Keysight's 5G Network Emulation Solutions portfolio,<br />
twhich is used in mobile device validation across the workflow,<br />
from early design to acceptance and deployment.<br />
The 5G RedCap specification introduces support for wireless<br />
devices with reduced 5G capabilities. These devices are less<br />
complex, and consume less power, allowing them to address new<br />
CIoT use cases such as industrial sensors and wearables such as<br />
smartwatches. The Keysight E7515R addresses this need as a<br />
network emulation test platform designed specifically for 5G<br />
RedCap and supporting all CIoT technologies. The solution<br />
features streamlined capabilities for RedCap without the<br />
additional features needed to test a full-spec 5G device.<br />
The release of the E7515R solution builds on Keysight's<br />
ongoing RedCap device development, includingestablishing a<br />
data call using the 5G RedCap specification. Through this<br />
demonstration, Keysight's 5G Network Emulation Solutions<br />
validated RedCap connectivity on a 5G chipset.<br />
New firewalls for remote and distributed environments<br />
WatchGuard has released its new Firebox T25/T25-W,<br />
T45/T45-POE/T45-W-POE, and T85-POE tabletop<br />
firewall appliances. Powered by WatchGuard's Unified Security<br />
Platform architecture to deliver comprehensive security and<br />
simplified management through WatchGuard Cloud, the new<br />
firewalls are engineered to provide the performance that remote<br />
and distributed business environments need for better protection<br />
against the latest network security threats. "This new generation<br />
of Fireboxes takes full advantage of our Unified Security Platform<br />
architecture, enabling MSPs to provide the robust solutions and<br />
simplified management they require to meet the needs of a wide<br />
range of customers and deployment scenarios," according to<br />
Ryan Poutre, product manager at WatchGuard Technologies.<br />
With enterprise-class security services like APT Blocker (sandbox<br />
malware detection) and ThreatSync for shared knowledge<br />
between endpoint and network, the new Fireboxes are ideal for<br />
small businesses that lack a designated security team. Beyond<br />
providing advanced malware protection for distributed<br />
environments, they also include SD-WAN to optimise network<br />
performance by dynamically distributing network traffic across<br />
multiple connections based on defined policies. The new<br />
Fireboxes take advantage of the latest updates in WatchGuard<br />
Cloud to display a graphical real-time update of SD-WAN link<br />
status and any failovers, and also support the latest Fireware<br />
capabilities for load sharing across multiple links.<br />
Zero Trust security for operational technology<br />
In order to help companies keep their operational technology<br />
(OT) secure, Palo Alto Networks has introduced Zero Trust<br />
OT Security. A key component of the solution is the new clouddelivered<br />
Industrial OT Security service, which can be easily<br />
enabled - without the need to install additional sensors - by<br />
any of the 61,000+ active customers of Palo Alto Networks<br />
network security products: hardware and software Next-<br />
Generation Firewalls and Prisma SASE.<br />
Built on an AI-powered foundation with ease of deployment<br />
in mind, the new solution enables customers to secure their<br />
OT environments from the most sophisticated threats while<br />
simplifying their operations. Using the industry’s first MLpowered<br />
OT visibility engine, the Industrial OT Security<br />
service recognises hundreds of unique OT device profiles,<br />
over 1,000 OT/Industrial Control System applications, and<br />
has hundreds of distinct OT threat signatures to help protect<br />
hard-to-secure assets.<br />
NEWS NEWSNEWS<br />
NEWS<br />
NEWS NEWS NEWS NEWS NEWS<br />
NEWS<br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 07
FEATURE: <strong>2023</strong> PREDICTIONS<br />
CLOUDS AND SILVER LININGS<br />
FROM HYBRID WORKING AND THE CLOUD TO THE IT SKILLS GAP,<br />
NETWORK COMPUTING ASKED INDUSTRY EXPERTS TO GIVE US<br />
THEIR FORECASTS FOR THE YEAR AHEAD<br />
THE NETWORK<br />
ARUBA<br />
According to Aruba 20% of organisations<br />
will have adopted a network-as-a-service<br />
(NaaS) strategy by the end of this year:<br />
"With tightening economic conditions, IT<br />
requires flexibility in how network<br />
infrastructure is acquired, deployed, and<br />
operated to enable network teams to<br />
deliver business outcomes rather than just<br />
managing devices. Migration to a NaaS<br />
framework enables IT to accelerate network<br />
modernisation yet stay within budget, IT<br />
resource, and schedule constraints. In<br />
addition, adopting a NaaS strategy will<br />
help organisations meet sustainability<br />
objectives since leading NaaS suppliers<br />
have adopted carbon-neutral and recycling<br />
manufacturing strategies."<br />
Aruba also predicts that IT will consolidate<br />
operations onto a single, centralised<br />
network and security management<br />
platform, saying "More diverse digital<br />
technology (IoT) is being deployed by<br />
enterprises to improve user experiences<br />
and to streamline IT operations. At the<br />
same time, employees and customers<br />
expect a better integrated real life/digital<br />
experience no matter what the enterprises'<br />
business model is. These dynamics have<br />
added complexity to both the network and<br />
security and have made managing the<br />
infrastructure more complex. With an<br />
intensified focus on end user quality of<br />
experience while increasing protection from<br />
cyberattacks, IT will look to a single<br />
centralised management system with<br />
visibility across the network and the ability<br />
to configure edge-to-cloud QoS and<br />
security policies."<br />
ALLIED TELESIS<br />
Allied Telesis caution that businesses will<br />
need to evolve their approach to<br />
networking in the year ahead. "As mobile<br />
users expect more immersive experiences<br />
on their devices, the demand for bandwidth<br />
will continue to grow. Current IT devices are<br />
evolving to provide more throughput both<br />
on a wired network, moving from 1G to<br />
2.5/5 or 10G and on a wireless network<br />
with the full adoption of Wi-Fi 6 technology.<br />
"These two evolutions need to proceed in<br />
parallel. Wi-Fi 6 requires high speed wired<br />
08 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
FEATURE: <strong>2023</strong> PREDICTIONS<br />
devices with 2.5G or 5G to provide the<br />
full potential and the wired switches need<br />
to connect to Wi-Fi 6 Access Points to use<br />
all the available bandwidth. Companies<br />
will need to take a step-by-step network<br />
upgrade, starting from the wired device to<br />
build an infrastructure ready to deploy the<br />
new Wi-Fi 6 Access Point and then once<br />
ready, migrate the Wi-Fi from the current<br />
implementation to Wi-Fi 6."<br />
They add that Wi-Fi will continue to grow<br />
as the main access technology, and will<br />
require "a more powerful infrastructure<br />
and advanced feature-set to support the<br />
growing demands of the user. The<br />
capability to manage the mobility, device<br />
location, and the capability to adapt<br />
autonomously to environmental changes<br />
will be the main characteristics of new<br />
wireless solutions. To accommodate this<br />
increase in complexity, smart network<br />
management tools, incorporating<br />
elements of artificial intelligence, will<br />
become more widely adopted."<br />
ESPRIA<br />
Platform and Infrastructure-as-a-Service<br />
(PaaS/IaaS) represent one of the biggest<br />
opportunities for service providers in<br />
<strong>2023</strong> according to Espira, offering "the<br />
chance to host the services and<br />
infrastructure that are usually present in<br />
an on-premises data centre. This includes<br />
elements like hardware, software, storage,<br />
servers and networking components,<br />
along with the virtualisation layer and<br />
ready-made services such as database<br />
platforms, to help businesses scale<br />
quickly. It is a hugely attractive model as<br />
PaaS and IaaS also enable organisations<br />
to cut costs, reduce the time spent<br />
managing in-house infrastructure and<br />
services, and improve service levels for<br />
their end users.<br />
"This model eliminates wait times for<br />
hardware, other components, or on-site<br />
support and the subscription-based billing<br />
model of IaaS offers many advantages to<br />
clients in terms of scalability, cost, and<br />
security, often making enterprise-grade<br />
services available to organisations for<br />
whom they may previously have been out<br />
of reach."<br />
TELEHOUSE<br />
Telehouse caution that the energy crisis is<br />
also set to impact IT operations and cost<br />
efficiencies. "With the price of energy<br />
reaching unprecedented highs, many<br />
organisations will see their IT spend<br />
continue to rise next year. However, while<br />
budgets might be able to absorb these<br />
extra costs in the short term, it is not a<br />
sustainable financial option for most<br />
businesses. Decision-makers will therefore<br />
start to look towards other means of<br />
ensuring a reliable, secure energy supply<br />
and energy reduction schemes to<br />
minimise the impacts on operational costs<br />
to ensure current and future productivity."<br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 09
FEATURE: <strong>2023</strong> PREDICTIONS<br />
THE IT WORKFORCE<br />
ALLIED TELESIS<br />
What new skill sets will be required to deal<br />
with the latest IT innovations in the year<br />
ahead? According to Allied Telesis "There<br />
will be a need to evolve the skills of the IT<br />
team; IT engineers will need to be able to<br />
dovetail from network management to<br />
network security, but also to take control of<br />
all other services that run over the network<br />
(e.g., DVS or building automation). To<br />
enable this new skill, a new family of tools<br />
are required that can automate large parts<br />
of the IT activity and to provide a complete<br />
vision of any aspect of the network in a<br />
simple way and recommend the actions the<br />
human operators should take. Ultimately,<br />
these actions will also be automated once<br />
full intent-based management tools become<br />
mainstream."<br />
NERDIO<br />
For Nerdio while the future of work is still<br />
largely one of uncertainty it seems that<br />
hybrid working at least is here to stay. "Many<br />
different factors are impacting the workplace<br />
as it stands. Recession is slowly but surely<br />
kicking in, with many companies already<br />
starting layoffs, which could give employers<br />
more power to exercise over employees and<br />
pressure them into working from the office.<br />
On the flip side, increasing business costs<br />
can also result in WFH being incentivised:<br />
many companies still aren't prepared for the<br />
expenses that come with returning everyone<br />
into the office. From an employee<br />
perspective, rising interest rates and petrol<br />
prices might lower their willingness to<br />
commute, but as the costs of working from<br />
home also rise, the population will continue<br />
to be divided over this issue.<br />
"As a result, the tech we use also needs to<br />
remain adaptable to both situations. Newer<br />
features, such as single sign-on, W365<br />
offline mode, and bypassing the physical<br />
machine and logging directly into the virtual<br />
desktop, will drive the seamless adoption of<br />
DaaS and an easy transition between home<br />
and the office for a genuine WFA (workfrom-anywhere)<br />
experience."<br />
SHARP EUROPE<br />
Sharp Europe believe that the demand for<br />
hybrid working will continue this year. "The<br />
continued shift of workloads, processes, and<br />
data to the cloud and on-premises<br />
infrastructures has enabled businesses to<br />
offer more of a hybrid work environment to<br />
their employees. Hybrid working will<br />
continue to be popular as it offers greater<br />
flexibility and more control to employees not<br />
only in where they work, but also how they<br />
fulfil their duties. Having the right tech in<br />
place will be key to hiring and retaining the<br />
best staff possible."<br />
TELEHOUSE<br />
Telehouse predict that smart outsourcing<br />
will help plug the ever-widening IT skills<br />
gap: "With the IT skills gap set to continue<br />
through <strong>2023</strong> and beyond, organisations<br />
will need to embrace more innovative ways<br />
of attracting, developing, and retaining<br />
new talent. At the same time, more<br />
businesses will outsource their IT<br />
infrastructure to a trusted provider, leaning<br />
on the knowledge, experience, and<br />
expertise of colocation data centre<br />
operators. This will help fill IT skills gaps inhouse,<br />
whilst also providing greater levels<br />
of resilience, uptime, and cost efficiency<br />
during the challenging years ahead."<br />
CYRUSONE<br />
CyrusOne also forecast that the digital skills<br />
gap will continue to expand in the year<br />
ahead, and will remain "a central issue<br />
within the data centre industry, hampering its<br />
long-term development and growth. While<br />
notable progress has been made in recent<br />
years, the sector continues to grow on a<br />
steeper curve than the advancements made<br />
to-date. It's imperative that the data centre<br />
industry comes together in a meaningful<br />
way to address this gap, identifying<br />
additional ways to communicate the value<br />
and opportunity that this sector provides and<br />
educating on its broader societal impact.<br />
"We will see more urgency placed around<br />
this issue in the coming year as the industry<br />
struggles to compete and maintain demand,<br />
with many companies widening their net to<br />
include recruits in unrelated disciplines who<br />
can be trained."<br />
SECURITY<br />
GLOBALDATA<br />
GlobalData caution that "There is a<br />
simmering level of frustration among<br />
security professionals that, despite important<br />
strides in security technology, they still can't<br />
keep ahead of the threat volume. The move<br />
to hybrid work operations has presented<br />
cybercriminals with an opportunity they have<br />
been quick to exploit. Although there has<br />
been considerable work done in areas such<br />
as endpoint detection and response (EDR) to<br />
close some security gaps, hackers are<br />
finding ways to navigate around protections.<br />
"In <strong>2023</strong>, GlobalData expects to see more<br />
concerted efforts around integrating security<br />
into network services through wider Secure<br />
Access Service Edge (SASE) technology<br />
deployments - even as organisations<br />
grapple to understand exactly what<br />
constitutes SASE. Zero Trust Architecture<br />
implementations will also gain more traction<br />
as organisations seek to mirror work already<br />
done by entities such as the US Federal<br />
Government, which is in the midst of a<br />
multi-year migration to deploy a Zero Trust<br />
Architecture. However, ongoing geopolitical<br />
tensions and related threats from both statesponsored<br />
actors and related organized<br />
cybercrimnals continue to loom large as<br />
organisations try to mount effective defenses<br />
against hackers."<br />
ARUBA<br />
Aruba predict that we'll see built-in security<br />
increasingly replacing bolt-on security in the<br />
very near future: "Transformation to a more<br />
automated security architecture is an IT<br />
imperative. No longer can organisations<br />
10 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
FEATURE: <strong>2023</strong> PREDICTIONS<br />
bolt-on perimeter firewalls around the<br />
network to protect against threats and<br />
vulnerabilities. Security must be built-in to<br />
every aspect of the network infrastructure<br />
from Wi-Fi Access Points to LAN, campus<br />
and data centre switches, WAN gateways,<br />
and extending into the cloud. Zero trust and<br />
SASE frameworks will become more<br />
intertwined, not only to protect from threats<br />
but to apply micro-segmentation across the<br />
complete IT stack including users,<br />
connected devices, applications, network<br />
services, compute, and storage platforms."<br />
ALLIED TELESIS<br />
Allied Telesis see networks and security<br />
delivering an ever-stronger combination this<br />
year. "The network is the route attackers use<br />
to reach their target. Protecting the network<br />
means protecting the first line of attack, and<br />
this will become more and more important.<br />
Firewall and AI-based systems, able to<br />
detect attacks together with autonomous<br />
security systems able to take immediate<br />
action and create a self-defending network,<br />
will become the obvious way to protect<br />
company assets."<br />
COHESITY<br />
Updating legacy data protection technology<br />
must be a priority for IT and business<br />
decision makers this year, according to<br />
Cohesity. "Cybercriminals are actively<br />
preying on outdated infrastructure as they<br />
know it cannot protect or recover data in<br />
today's dispersed, multicloud environments.<br />
Cohesity research found that half of UK<br />
respondents depend on outdated, legacy<br />
backup and recovery infrastructure to<br />
manage and protect their data. In some<br />
cases, this technology is more than 20 years<br />
old and was designed long before today's<br />
multicloud era or the type of sophisticated<br />
cyberattacks that now plague enterprises.<br />
"In <strong>2023</strong>, possibly as an outcome of<br />
budgetary pressures, we expect to see IT<br />
and SecOps teams align to co-own cyber<br />
resilience outcomes, including infrastructure<br />
used for data identification, protection,<br />
detection, response, and recovery."<br />
CLOUDSTRIKE<br />
Cloudstrike caution that security budgets will<br />
also feel the squeeze with a seemingly<br />
unavoidable recession on the horizon.<br />
"Many countries across the globe expect<br />
their economies to approach recession<br />
during the coming year. Cost-cutting will be<br />
discussed at many companies, and<br />
cybersecurity budgets, having risen - on<br />
average - for many successive years, will<br />
certainly be under scrutiny. Reducing and<br />
consolidating the number of licensed<br />
products in the area may well make sense,<br />
although maintaining the best levels of<br />
security is not negotiable at any company.<br />
"Notwithstanding, many companies have far<br />
more tools than they need. Our own<br />
discussions with CISOs suggest it's not<br />
uncommon for companies to have multiple<br />
licensed cybersecurity products at their<br />
disposal. This isn't rendering them immune to<br />
attack and, in fact, security levels and team<br />
performance are suffering at many<br />
organisations due to redundant or excessive<br />
notifications and checks. Working towards a<br />
consolidated single point of truth through a<br />
united platform will not only yield cost<br />
savings, but also productivity and<br />
performance gains for cybersecurity analysts."<br />
THE CLOUD<br />
LA<strong>NC</strong>OM SYSTEMS<br />
The future of network management lies in<br />
the cloud. This is according to LA<strong>NC</strong>OM<br />
Systems, who cite a recent survey which<br />
found that 85 percent of those who<br />
currently rely on hybrid and on-premises<br />
solutions are planning to move to cloudnative<br />
network management in the next four<br />
years. "Networks have changed significantly<br />
in recent years with increasing numbers of<br />
devices and new data-intensive applications<br />
that need to be used from anywhere. This<br />
all increases the demands on the<br />
infrastructure. Reliable protection,<br />
transparency, and automation are key to<br />
keeping this complexity manageable.<br />
Cloud-based network management can<br />
make a significant contribution here."<br />
NERDIO<br />
Cloud computing will be near the top of the<br />
priority list for IT teams in <strong>2023</strong>, say Nerdio.<br />
"Whilst it is an investment, it's a flexible one<br />
that can change with the business. In the<br />
current economic climate, companies are<br />
moving towards more service-based costs,<br />
and public cloud providers can facilitate cost<br />
efficiencies as they often offer a 'pay for what<br />
you need' monthly model. We expect the<br />
move from private cloud to public cloud to<br />
continue at pace - with the large providers<br />
on the public side having a greater ability to<br />
weather energy price pressures and deal<br />
with evolving security threats.<br />
"With a younger workforce, cloud is here<br />
to stay. Employees are now demanding the<br />
latest tools and technology and legacy, slow<br />
on-premise solutions are no longer fit for<br />
purpose. In response, cloud providers will<br />
need to provide higher levels of reliability<br />
and performance at a lower cost - and we<br />
expect to see more solutions partners<br />
supporting organisations to fill in the gaps<br />
of their knowledge of how to manage and<br />
generate the best efficiencies from their<br />
public cloud usage."<br />
SHARP EUROPE<br />
Sharpe Europe also see cloud looming<br />
large in our hybrid working future. "One<br />
trend we have seen develop in recent years<br />
that shows no signs of slowing is SMEs<br />
moving more of their work, services, and<br />
processes into the public cloud. Already<br />
over 40% of EU organisations use public<br />
cloud services in some form, mostly for<br />
hosting their email systems and storing files<br />
in electronic form. This is a trend we shall<br />
continue to see steadily rise. especially the<br />
move to Microsoft 365 public cloud,<br />
which for the SMEs is by far the dominant<br />
player in the market." <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 11
FEATURE: <strong>2023</strong> PREDICTIONS<br />
THE TOP FIVE NETWORK TRENDS FOR <strong>2023</strong><br />
WITH DISPERSED WORKFORCES STILL IN PLACE AND SECURITY<br />
THREATS CONTINUING TO GROW, DOUGLAS WADKINS, VICE<br />
PRESIDENT, PRODUCT MANAGEMENT & STRATEGY, OPENGEAR,<br />
IDENTIFIES THE TRENDS BUSINESSES MUST CONSIDER IN <strong>2023</strong> TO<br />
ENSURE THEIR NETWORK IS OPERATIONALLY FIT-FOR-PURPOSE<br />
THE NETWORK WILL BE A DRIVER<br />
FOR INNOVATION<br />
We're now seeing applications that are being<br />
enhanced through virtual or augmented reality,<br />
which could be more accurately described as<br />
functional metaverses. In <strong>2023</strong>, there will be<br />
more instances of this technology being used<br />
to design entire data centres for example, as it<br />
will become even easier for users to visualise<br />
the physical parts and pieces that go together<br />
to construct these premises. These innovative<br />
solutions will be fundamentally dependent on<br />
the underlying network to provide value, both<br />
in the virtual and physical sense. Expect to see<br />
more professionals in the industry discussing<br />
their digital immune system and the health of<br />
their network to support innovation.<br />
IT BUDGETS WILL BE SQUEEZED<br />
As looser monetary policies tighten up<br />
following the end of the pandemic, the IT<br />
budget is likely to be earmarked for the chop.<br />
What organisations will need to do in <strong>2023</strong> is<br />
ensure efficiency in network investment by<br />
deploying more automated solutions.<br />
However, to gain efficiencies through<br />
automation the network needs to be designed<br />
for automation, and network professionals<br />
need to possess the skills to design and<br />
manage an automated network.<br />
Out of band networks provide resilient,<br />
secure, remote access, for management of the<br />
production network. As an out<br />
of band network is connected<br />
to every device and is an<br />
independent network, it can be used to<br />
automate the provisioning and configuring of<br />
new physical or virtual network resources,<br />
before a production network exists without<br />
sending an engineer on site. Zero touch<br />
provisioning (ZTP) removes the need for<br />
manual device configuration from the get-go.<br />
While no business is completely immune from<br />
the negative effects of a recession, automation<br />
will help enable efficiency and utilisation to<br />
help dampen its impact.<br />
HYBRID ENVIRONMENTS WILL<br />
REMAIN CRUCIAL<br />
Both hybrid working environments and hybrid<br />
cloud environments will take precedence in<br />
<strong>2023</strong>. Not every piece of data will go into the<br />
public cloud, whether it's for latency, resiliency<br />
or privacy reasons. Multi-cloud deployments<br />
will proliferate, with local applications in use to<br />
protect against network outages and enable<br />
greater agility. Hybrid working environments<br />
devised from the remote arrangements that<br />
became a necessity during the pandemic will<br />
also continue to be popular. As people work<br />
from home, a key consideration will be around<br />
how businesses make remote branch offices a<br />
key part of the enterprise.<br />
Critical to both will be the underlying network<br />
and the increasing value of out of band to<br />
enhance the user experience from any location<br />
and add resiliency to multi-cloud deployments.<br />
SECURITY WILL BE AN ONGOING<br />
CO<strong>NC</strong>ERN<br />
The methods that bad actors use to breach<br />
networks are growing in sophistication, and as<br />
the criticality of the network goes up, it will<br />
become more of a target. However,<br />
organisations will be better placed to add<br />
layers of security to their setups in <strong>2023</strong>. With<br />
compute and storage capabilities being added<br />
to devices, this has opened up the opportunity<br />
for third party applications to be run through<br />
Docker containers.<br />
For example, a configuration file for an<br />
application can be integrated with a TPM<br />
chip. This makes it a trusted module from a<br />
hardware perspective, and very difficult to<br />
crack thanks to encryption capabilities, even<br />
for a state actor. Organisations can also<br />
revert to a last known configuration if the<br />
worst case scenario happens. This can be<br />
made possible by utilising a file store that sits<br />
with an edge device, and can significantly<br />
reduce downtime.<br />
THE PROMISE OF 5G WILL COME<br />
TO FRUITION<br />
In <strong>2023</strong>, the promise of 5G will begin to be<br />
realised. More businesses are going to explore<br />
how to move data and applications to the edge<br />
to reduce latency and deploy out of-band to<br />
manage these networks. 5G connections can<br />
for example be utilised to enable dual<br />
connectivity and build redundancy for remote<br />
networks in the event of any outages.<br />
This connectivity will also become more<br />
accessible to smaller businesses next year, with<br />
the big mobile network operators and the tech<br />
giants previously holding the monopoly on<br />
resources. Companies will tap into automated<br />
capabilities to bring 5G-driven networks to<br />
the plate, particularly as skills shortages<br />
continue to present challenges in<br />
bringing in the right staff and<br />
talent to drive efficiency. <strong>NC</strong><br />
12 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
PRODUCT REVIEW<br />
AdRem NetCrunch 13<br />
PRODUCT REVIEW<br />
PRODUCT<br />
REVIEWPRODUCT RE<br />
Enterprises and SMBs are spoilt for choice<br />
with network monitoring products but<br />
AdRem Software's NetCrunch stands out<br />
from the crowd for many good reasons. It<br />
offers an impressive set of network monitoring<br />
tools integrated seamlessly into a single<br />
console and teams them up with extreme ease<br />
of use and great value.<br />
This latest version introduces a raft of new<br />
features designed to make it even easier for<br />
support staff to quickly identify and diagnose<br />
network pain points. Automated rule-based<br />
device management allows hundreds of nodes<br />
to be configured together instead of<br />
individually, and NetCrunch 13 enables<br />
flexible visualisations that focus on presenting<br />
live data of business processes, network activity<br />
and services for simplified troubleshooting.<br />
One feature of NetCrunch we've always liked<br />
is its lightning-quick deployment, and v13 is no<br />
exception. We loaded the Server and Console<br />
components on a Windows Server 2022 host,<br />
followed the discovery wizard and were<br />
presented with a complete readout of our lab<br />
network in only 15 minutes.<br />
The NetCrunch console opens with a highly<br />
informative Atlas overview page which uses<br />
colour-coded icons of all monitored devices,<br />
so you can see at a glance which ones have<br />
problems or are down. Custom views take this<br />
further, as they automatically present details<br />
based on the content selected in the left pane<br />
and full search facilities apply your criteria to<br />
nodes, the Atlas view, program settings and<br />
even blog posts, making it easy to find a<br />
device of interest.<br />
Once monitoring accounts had been<br />
provided to the Credential Manager, we could<br />
use NetCrunch's Monitoring Packs to keep a<br />
close eye on our systems. These are a great<br />
idea as they group together performance data<br />
and alerts for specific devices and services.<br />
AdRem provides over 270 Monitoring Packs<br />
including ones for Windows systems, Active<br />
Directory, Hyper-V and VMware hosts and<br />
Linux. You have Packs for Microsoft apps such<br />
as SharePoint, Exchange and SQL Server and<br />
the cloud comes into the equation with options<br />
including Amazon Web Services, Microsoft<br />
Azure and 365, Google and even the Zoom<br />
conferencing service.<br />
The best part is you don't have to do anything<br />
as the most appropriate Monitoring Packs are<br />
automatically assigned to systems, devices and<br />
services during the discovery phase.<br />
NetCrunch is clearly capable of presenting a<br />
wealth of information but keeps it very well<br />
organised, as tabs across the top offer displays<br />
of all nodes with colour-coded status icons<br />
and quick views of Windows, Linux, VMware<br />
and Hyper-V hosts.<br />
The Top Charts tab shows graphical views of<br />
nodes with the most alerts and systems with the<br />
highest CPU, memory plus storage usage. Any<br />
NetFlow and sFlow data coming into<br />
NetCrunch will also be broken down into<br />
graphs of apps with detailed flow analytics.<br />
The new Active Alerts console page in<br />
NetCrunch 13 is a welcome addition as it<br />
presents real time views of all the latest<br />
alerts, which can be filtered on their severity.<br />
Move to the analytics page and you can see<br />
all alerts over the last day, week or month<br />
and drill down to selected items for more<br />
detailed information.<br />
Alerting features are extensive and<br />
NetCrunch creates scripts for you and assigns<br />
them to all relevant Monitoring Packs. These<br />
are easy to customise and you can create<br />
escalation scripts that assign a sequence of<br />
alerts and actions to critical devices if they<br />
have problems.<br />
AdRem's NetCrunch 13 takes all the hard<br />
work out of network monitoring and its flexible<br />
licensing schemes make it affordable for<br />
businesses of all sizes. It's incredibly easy to<br />
deploy and the highly informative central<br />
console ensures support staff are always one<br />
step ahead of network issues. <strong>NC</strong><br />
Product: NetCrunch 13<br />
Supplier: AdRem Software<br />
Web site: www.adremsoft.com<br />
Price: 100 nodes/interfaces, from £860 per<br />
year exc VAT<br />
WWW.NETWORKCOMPUTING.CO.UK FEBRUARY/MARCH <strong>2023</strong> 13<br />
NETWORKcomputing<br />
@<strong>NC</strong>MagAndAwards
AWARDS <strong>2023</strong><br />
The Network Computing Awards <strong>2023</strong>: now's the time to nominate!<br />
We're pleased to announce that<br />
nominations for the <strong>2023</strong><br />
Network Computing Awards<br />
are now open, with this year's awards<br />
ceremony set to take place on 18th May.<br />
You now have until 9th <strong>Mar</strong>ch to<br />
nominate the networking companies,<br />
solutions and services that have<br />
impressed you the most in the past<br />
twelve months, so please visit the awards<br />
website to make your choices heard!<br />
The results will once again be revealed<br />
at an evening awards ceremony in<br />
central London in May. A drinks<br />
reception, dinner and entertainment will<br />
also be provided as part of the evening,<br />
which is always an excellent opportunity<br />
to network with your networking peers!<br />
While the majority of awards categories<br />
are decided by nominating and voting<br />
we also have two judged categories: the<br />
Bench Tested Product of the Year, open<br />
to all solutions that have been<br />
independently reviewed for Network<br />
Computing Magazine in 2022, and the<br />
Network Project of the Year, which<br />
recognises the impressive work that<br />
vendors and their partners have carried<br />
out for customers.<br />
If you would like to enter a project for<br />
the Network Project of the Year award<br />
then please submit a case study to<br />
dave.bonner@btc.co.uk. Projects should<br />
ideally have been completed in the past<br />
12 months. However, if work is still<br />
ongoing, a project can still be entered<br />
provided it can reference some benefits<br />
that the customer has already seen.<br />
https://networkcomputingawards.co.uk<br />
14 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
AWARDS <strong>2023</strong><br />
EXAGRID EXCEL AT THE NETWORK COMPUTING AWARDS<br />
WITH NOMINATIONS NOW OPEN FOR THE <strong>2023</strong> NETWORK COMPUTING AWARDS, EXAGRID,<br />
WINNERS OF COMPANY OF THE YEAR FOR THREE CONSECUTIVE YEARS, SHARE THEIR EXPERIE<strong>NC</strong>E<br />
OF BEING A PART OF THE AWARDS<br />
2022 was a successful year for<br />
ExaGrid; it marked a record year of<br />
revenue growth with positive cash,<br />
P&L and EBITDA for the Tiered Backup<br />
Storage company, and its 4th consecutive<br />
win at the annual Network Computing<br />
Awards. The company is looking forward to<br />
another strong year in <strong>2023</strong>.<br />
ExaGrid provides Tiered Backup Storage<br />
with a unique disk-cache Landing Zone<br />
that enables fastest backups and restores,<br />
a Repository Tier that offers the lowest cost<br />
for long-term retention and enables<br />
ransomware recovery, and scale-out<br />
architecture for a fixed - length backup<br />
window as data grows and scalability with<br />
full appliances up to 2.7PB full backup in a<br />
single scale-out system. ExaGrid is the only<br />
solution with a non-network facing tier with<br />
delayed deletes and immutable data<br />
objects for the industry's best ransomware<br />
recovery solution.<br />
ExaGrid continues to gain recognition for<br />
its Tiered Backup Storage appliances,<br />
winning six industry awards in 2022,<br />
including three at the Network Computing<br />
Awards ceremony in July 2022. The Bench<br />
Tested Product of the Year award was<br />
chosen by the editorial team at Network<br />
Computing Magazine based on an<br />
independent product review of ExaGrid's<br />
largest appliance. The Company of the<br />
Year and Storage Product of the Year<br />
awards are determined by public vote,<br />
which further sets ExaGrid Tiered Backup<br />
Storage apart as a leader in its sector, due<br />
it is differentiated product architecture, as<br />
ExaGrid offers the largest scale-out system<br />
in the industry-comprised of 32 EX84<br />
appliances that can take in up to a 2.7PB<br />
full backup in a single system, which is<br />
50% larger than any other solution with<br />
aggressive deduplication, in addition to<br />
ExaGrid's innovative channel programs and<br />
its exceptional customer support.<br />
"We were honoured to win these three<br />
Network Computing awards," said Bill<br />
Andrews, President and CEO of ExaGrid.<br />
"Our company is solely focused on offering<br />
the best backup storage in the industry by<br />
improving the performance, scalability,<br />
security and economics of backup storage,<br />
and offering the best customer support in the<br />
industry. Many thanks to everyone who voted<br />
for us in 2022, and to the editorial team at<br />
Network Computing, we are truly grateful."<br />
ExaGrid has more than 3,750 active<br />
upper mid-market to large enterprise<br />
customers that use ExaGrid Tiered Backup<br />
Storage to protect their data. ExaGrid's<br />
growth is accelerating, and the company is<br />
hiring in all aspects of the business<br />
worldwide. ExaGrid recently announced its<br />
highlights for 2022, which included a year<br />
with record quarters of bookings growth<br />
and with the company remaining Cash,<br />
EBITDA, and P&L positive for the past nine<br />
quarters in a row.<br />
ExaGrid is solely focused on backup<br />
storage, and is constantly driving<br />
improvements in five key areas: ingest<br />
performance for the fastest backups and<br />
shortest backup window; fastest restores to<br />
keep up user productivity; scalability to<br />
ensure a fixed-length backup window as<br />
data grows, as well as no forklift upgrades<br />
and no planned product obsolescence;<br />
lowest cost up front and over time; and a<br />
strong security story including the ability to<br />
recover after a security attack, such as<br />
ransomware.<br />
In 2022, ExaGrid released Version 6.2<br />
which improved integration and features<br />
with industry-leading backup applications<br />
and also improved the performance and<br />
scalability of ExaGrid's Cloud Tier, which<br />
supports disaster recovery to Amazon AWS<br />
and Microsoft Azure public clouds.<br />
ExaGrid is looking forward to <strong>2023</strong>, with<br />
goals to further expand into new regions,<br />
grow its sales team to expand global<br />
coverage, as well as strengthen its<br />
relationships in the channel and grow its<br />
partnerships with more resellers, all with a<br />
continued focus to offer organizations the<br />
best backup storage in the industry with<br />
regular improvements and updates, and<br />
more announcements to come in <strong>2023</strong>. <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards<br />
FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 15
FEATURE: HYBRID WORKING<br />
SHADOW I.T.'S CLUE TO HYBRID WORKING ENGAGEMENT<br />
WITH THE RIGHT TO WFH SET TO BECOME ENSHRINED IN UK EMPLOYMENT LAW EMPLOYEE EXPERIE<strong>NC</strong>E<br />
MANAGEMENT IS NOW CRITICAL, AND BUSINESSES NEED TO BOTH UNDERSTAND AND IMPROVE THE<br />
QUALITY OF THE HYBRID WORKING ENVIRONMENT, INSISTS JASON BARKER, SVP EMEA & APAC, IR<br />
Shadow IT has plagued organisations for<br />
years - long before hybrid working<br />
became firmly established. With the shift<br />
to Working from Home (WFH), the use of<br />
personal devices and applications that fail to<br />
adhere to corporate standards has exploded -<br />
even for those companies that have<br />
accelerated the deployment of Unified<br />
Communications (UC) solutions over the last<br />
couple of years.<br />
Yet, while the security and compliance risks<br />
associated with shadow IT are well known,<br />
how many companies are actively considering<br />
the implications for employee productivity,<br />
collaboration and morale? Are employees<br />
using new corporate solutions at home or still<br />
preferring their own work around options?<br />
Are they frustrated because performance<br />
drops off every afternoon, or feeling isolated<br />
because the new corporate platform lacks<br />
features they have previously used to connect<br />
with colleagues? Without the ability to<br />
monitor the entire, end to end infrastructure,<br />
including WFH, an enterprise will be blind to<br />
the true extent of shadow IT and, critically,<br />
key indicators of employee engagement.<br />
HYBRID EXPERIE<strong>NC</strong>E CRISIS<br />
Elon Musk et al may be adamant that staff<br />
must return to the office, but the reality for<br />
the majority of UK businesses is that<br />
employees now expect hybrid working.<br />
The problem for large enterprises is<br />
that hybrid working environments<br />
are still not meeting the needs of<br />
employees. For example, almost<br />
60% of women who work in<br />
hybrid environments feel they<br />
have been excluded from<br />
important meetings; stress levels<br />
are rising, and burnout is<br />
driving high levels of attrition.<br />
Trends such as 'Acting their<br />
Wage' may be a TikTok Gen<br />
Z cliché; but lack of<br />
productivity and<br />
engagement of the<br />
younger WFH workforce is a huge issue.<br />
Businesses clearly have an array of cultural<br />
and operational challenges to address to<br />
create a hybrid working model that engages<br />
all employees, but too few have recognised<br />
the impact of Shadow IT and a company's<br />
lack of control over the UC tools preferred by<br />
diverse individuals across the business. Over<br />
the past few years, employees have taken a<br />
proactive and often innovative approach to<br />
making WFH work for them. And while<br />
companies have fast-tracked UC deployments<br />
to improve the overall employee experience,<br />
from Zoom to Dropbox and WhatsApp, many<br />
still prefer the 'emergency' options to the new<br />
corporate standard.<br />
The result is a not just a significant shadow<br />
IT problem - with the associated security and<br />
compliance risks - but a complete lack of<br />
corporate understanding about employee<br />
activity. Are individuals engaged with the<br />
business? Are they productive? Motivated?<br />
Or about to leave? With the UK still suffering<br />
a significant lack of skills - access to labour<br />
(75%) and skills (72%) continue to top<br />
business' labour market concerns, according<br />
to the CBI - the hybrid working experience is<br />
fast becoming a critical component in<br />
employee engagement and retention.<br />
UNDERSTANDING HYBRID<br />
PERFORMA<strong>NC</strong>E<br />
With employees returning to the office for a<br />
few days each week, the hybrid experience<br />
should be seamless. Individuals should feel<br />
productive, engaged and motivated<br />
irrespective of working location, whether<br />
home, head office or local satellite hub. Few<br />
businesses know if this is the case. While IT<br />
16 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
FEATURE: HYBRID WORKING<br />
teams routinely monitor UC performance<br />
across the organisation, information is<br />
collected on each individual system. With<br />
10,000s, even 100,000s of employees using<br />
multiple solutions, it is impossible to gain an<br />
accurate and complete picture of system<br />
usage or performance.<br />
Furthermore, this monitoring rarely extends<br />
outside the core office environment, leaving<br />
the business completely blind to the WFH<br />
experience. From calls dropping out when<br />
children return from school and plug into<br />
games and streaming services, to a<br />
widespread resistance to adopting the new<br />
corporate UC standard, a lack of visibility<br />
across the entire hybrid environment is<br />
creating significant business risk.<br />
MONITORING UC EXPERIE<strong>NC</strong>E<br />
A single view of the entire UC environment is<br />
now critical to both accelerate problem<br />
resolution and better understand the hybrid<br />
employee experience. Understanding how,<br />
when and where individuals are using different<br />
aspects of the UC solution set will provide<br />
companies with new insight into the way staff<br />
are adapting to the hybrid experience - and<br />
quickly flag up potential problems.<br />
Monitoring every aspect of the infrastructure<br />
and providing a single view of performance<br />
enables IT to rapidly understand - and resolve<br />
- issues that are affecting workers in any<br />
location. From underperforming Wi-Fi, to<br />
problems with local network providers, or<br />
specific application glitches, better visibility is<br />
key to improving the timeliness of IT support.<br />
But it also will quickly highlight issues with<br />
UC adoption and shadow IT that could<br />
impact the employee experience. If<br />
employees are failing to engage with the<br />
company's preferred platform - 85% of<br />
businesses use two or more meeting<br />
platforms (according to Cisco) - questions<br />
can be raised about the education and<br />
training process. With native monitoring tools<br />
providing<br />
information limited to a<br />
single solution, it is impossible to<br />
gain a clear picture of the way individuals<br />
are interacting with different systems. Are<br />
employees able to personalise the platform to<br />
work in a way that they prefer? Is one<br />
department creating significantly fewer calls<br />
via the platform than the rest of the business -<br />
indicating a reliance on an unauthorised<br />
solution? Or is it just poor Wi-Fi that is<br />
affecting performance, not the UC at all?<br />
Granular understanding of UC usage can<br />
help the IT Operations team prioritise<br />
investment and drive strategic investment.<br />
STRATEGIC HYBRID PLANNING<br />
Monitoring the entire end to end UC<br />
environment also provides useful information<br />
for other parts of the business, including both<br />
Human Resources (HR) and Facilities<br />
Management. For HR teams, for example,<br />
early insight into IT problems that could be<br />
affecting employee morale can enable<br />
proactive intervention and support. In<br />
addition to segmenting information by<br />
geography or business group, it could be<br />
analysed by age, allowing HR to understand<br />
how different generations are experiencing<br />
and engaging with the hybrid environment.<br />
With so many companies now offering hot<br />
desking options, this information is<br />
increasingly used by Facilities Management<br />
teams tasked with ensuring a building is not<br />
only safe and secure, but also as productive<br />
as possible. Infrastructure and collaboration<br />
platform management are now Key<br />
Performance<br />
Indicators, with UC usage<br />
information providing essential insight to<br />
support business decisions.<br />
Are employees avoiding certain buildings,<br />
putting pressure on space in other<br />
locations? And, if so, is that because calls<br />
keep dropping out or the Wi-Fi is too slow?<br />
If employees have to work in an office<br />
location one, two or three days each week,<br />
it is important that the office is designed to<br />
support a truly effective collaboration. Any<br />
frustration about the quality of the working<br />
environment, in any location, will rapidly<br />
affect morale. Providing Facilities<br />
Management teams with fast insight to<br />
usage information will give early indications<br />
of problems and allow essential<br />
infrastructure change.<br />
CO<strong>NC</strong>LUSION<br />
Hybrid working, in one form or another, is<br />
here to stay. Organisations must ensure the<br />
quality of the employee experience to<br />
safeguard productivity and collaboration and,<br />
critically, boost staff retention through<br />
enhanced morale. Proactively monitoring the<br />
entire corporate environment provides not<br />
only insight into immediate UC performance<br />
issues that need to be urgently addressed; but<br />
also vital understanding of how, where and<br />
when different groups and individuals are<br />
engaging with the business. <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 17
FEATURE: HYBRID WORKNG<br />
A COLLABORATIVE EFFORT<br />
CARL DAY, CHIEF SALES OFFICER AT APOGEE, ON BRIDGING THE EMPLOYER-EMPLOYEE<br />
DISCONNECT IN <strong>2023</strong><br />
Alot can happen in three years. The<br />
impact of the Covid-19 pandemic has<br />
irrevocably shaped the future of work,<br />
with flexible, hybrid workspaces opening a<br />
world of opportunity for newly distributed<br />
workforces. But the sheer pace of change has<br />
come with its own challenges - not least for<br />
employers. At the height of the pandemic in<br />
2020, many companies were all too happy to<br />
have their staff working from home, especially<br />
as the level of business they were previously<br />
accustomed to was temporarily paused.<br />
Now, as the 'new normal' of work becomes<br />
firmly embedded in the psyche of employees, a<br />
disconnect is growing between what<br />
companies want and what their workforce<br />
wants. Employers are starting to recognise the<br />
loss of troubleshooting and collaboration<br />
opportunities that come with having people<br />
grouped together in an office. Meanwhile, the<br />
workforce balance of power continues to shift<br />
in favour of employees, transforming workers'<br />
relationships with their jobs and fuelling the<br />
expectation for more flexible and mobile<br />
working options.<br />
Left unaddressed, the gap between what is<br />
best for an organisation and what is best for<br />
individual employees will only widen. At a time<br />
when the Great Resignation and 'quiet quitting'<br />
continues to permeate the workplace,<br />
companies can ill afford to lose both existing<br />
and prospective talent. Therefore, business<br />
leaders need to strive to reach a compromise -<br />
and technology is poised to play a critical role<br />
in bridging the divide between remote and<br />
office-based working.<br />
THE RISE OF COLLABORATIVE TECH<br />
Collaborative teamwork has always been<br />
important, but never more so than in today's<br />
increasingly global, complex, and competitive<br />
workplace. The long-term move to hybrid<br />
means that good communication amongst<br />
geographically dispersed teams is a requisite<br />
for business success, so employers must have<br />
the flexibility to provide new, innovative ways<br />
for their employees to collaborate productively<br />
from any place, time, or device.<br />
In this way, technological innovation serves<br />
as a win-win for both employer and<br />
employee. Workers have come to expect<br />
18 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
FEATURE: HYBRID WORKNG<br />
technology without frustration: they want the<br />
latest digital tools that seamlessly fit around<br />
the job they do without slowing them down or<br />
getting in their way. As the war for talent<br />
heats up - and a new generation of digital<br />
natives join the workforce in ever-growing<br />
numbers - businesses must continually<br />
modernise to attract and retain great<br />
employees. Therefore, organisations in <strong>2023</strong><br />
simply cannot afford to frustrate their staff<br />
with outdated, inflexible technology.<br />
This year will see businesses increasingly<br />
turn to collaborative technological tools to<br />
close the gap between office-based working<br />
and remote working. Offices will be fitted<br />
with technologies that allow for the best<br />
blend between physical and virtual<br />
participation, ensuring a seamless, highquality<br />
audio-visual experience that enables<br />
everyone to feel included in a shared working<br />
environment. When remote employees feel<br />
just as comfortable, productive, and<br />
supported working virtually as they would in<br />
an office, the most inspiring collaborative<br />
work can take shape.<br />
EFFECTIVE COMMUNICATION IS KEY<br />
However, it is not enough just to kit employees<br />
with the right digital tools. Business leaders<br />
will also need to think carefully about how<br />
they can communicate effectively with an<br />
employee base that's more fluid, mobile, and<br />
geographically dispersed than before.<br />
As new ways of working continue to blur the<br />
lines between work life and home life, the<br />
expansion of the virtual workforce means that<br />
many businesses now rely more heavily on<br />
email interaction than on face-to-face<br />
communication. This is resulting in remote<br />
and hybrid workers getting their inboxes<br />
flooded with emails. In fact, the average office<br />
worker is said to receive more than 120<br />
emails daily - and many remote employees<br />
are feeling compelled to check their work<br />
emails multiple times outside of their<br />
contracted hours.<br />
The simple truth is that by<br />
overcommunicating with their employees,<br />
businesses risk not communicating at all. The<br />
process of wading through a mountain of<br />
emails just to find that one message that<br />
needs dealing with is a frustration that most<br />
workers can relate to, and email overload<br />
threatens to fuel the employer-employee<br />
disconnect. Employers need to ensure that<br />
their most important correspondence with<br />
employees is not diluted or drowned in all of<br />
the noise.<br />
This is why process efficiency and stronger<br />
communication will be key management<br />
priorities in the months ahead. Technology<br />
plays a pivotal role in establishing a more<br />
streamlined and clear communication process<br />
in a hybrid working environment. For example,<br />
group chat software can be a helpful tool for<br />
managers to keep themselves available, be<br />
transparent about expectations, and share<br />
regular updates with physically dispersed<br />
teams, ensuring that everybody is consistently<br />
in the loop.<br />
GOING BESPOKE<br />
This year will also see the development of<br />
apps that allow organisations to create<br />
efficiency and be more flexible - on their own<br />
terms. Many of these applications will be<br />
custom-made to meet specific business<br />
processes and needs.<br />
While off-the-shelf applications offer<br />
organisations some useful functions, such as<br />
simple task tracking or calendar management,<br />
they are increasingly being recognised as a<br />
quick-fix solution to much longer-term<br />
business needs. In contrast, bespoke apps are<br />
custom built to support businesses with each<br />
of their specific requirements, adapting<br />
alongside the company as their needs evolve<br />
over time. This flexibility empowers<br />
organisations to meet more complex<br />
objectives, such as improving employee<br />
engagement and enhancing collaboration<br />
across departments.<br />
Therefore, to bridge the employeremployee<br />
gap, businesses are set to<br />
prioritise the need to quickly scale and adapt<br />
to meet current and future challenges. In<br />
many cases, this will bring about a shift away<br />
from off-the-shelf applications and towards<br />
more bespoke solutions to support their own<br />
ways of working.<br />
THE POWER OF SMART<br />
OUTSOURCING<br />
So, how can businesses seize these<br />
opportunities and navigate the complexity of<br />
the workplace in <strong>2023</strong>? With skills shortages<br />
across the IT sector bringing additional<br />
challenges around securing the future of<br />
hybrid working, companies are now looking<br />
towards new solutions to plug the gaps.<br />
As a result, businesses are increasingly<br />
leveraging specialist outsourcing services.<br />
Bringing in a trusted third party to take care of<br />
the entire IT lifecycle - from procurement and<br />
imaging to end-of-life support, data erase,<br />
and repurposing - can give organisations the<br />
breathing space to focus on making the new<br />
normal of work truly work for all employees -<br />
no matter where they are located. Not only<br />
does this process allow companies to<br />
repurpose their in-house capability, but it also<br />
helps to establish and maintain a more<br />
sustainable circular economy - something that<br />
employees are increasingly coming to expect<br />
from the businesses they work for.<br />
Smart outsourcing is helping to relieve the<br />
pressures on internal IT teams, stretching<br />
budgets and resources at a time when both<br />
are under strain. But regardless of whether a<br />
businesses opts to outsource or to keep their<br />
workplace services entirely in-house, the role<br />
of technology in shaping the future of work is<br />
beyond dispute. With the right investment and<br />
support in place, organisations can ensure<br />
that digital tools continue to bring out the best<br />
in their hybrid workforces, setting up both<br />
employers and employees for sustained<br />
success through <strong>2023</strong> and beyond. <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 19
FEATURE: HYBRID WORKING<br />
FILE SY<strong>NC</strong>HRONISATION CHALLENGES IN TODAY'S HYBRID WORKPLACE<br />
JASON KENT, DIRECTOR AT OPEN SEAS, DISCUSSES TWO OF THE MOST SIGNIFICANT ISSUES THAT ARISE<br />
WITH MICROSOFT'S DISTRIBUTED FILE SYSTEM REPLICATION (DFS-R) AND HOW THEY CAN BE MITIGATED<br />
File synchronisation and replication is a<br />
critical component of modern network<br />
infrastructures, allowing companies to<br />
effectively distribute and share information<br />
between remote offices and disaster recovery<br />
data centres. However, the increased number<br />
of users and data processed on these<br />
networks has resulted in several common<br />
issues that IT staff must contend with.<br />
One of the main issues with DFS-R is its<br />
method of handling multiple updates to the<br />
same file by different users. The service only<br />
provides one solution: the newest file will<br />
overwrite the older file, effectively losing the<br />
changes made by the first user. Although DFS-<br />
R saves a copy of the older file locally and<br />
writes an error message in the event log, an<br />
administrator must manually retrieve it.<br />
For environments with multiple users<br />
working from different locations and servers,<br />
a solution that minimises the issue of multiple<br />
updates is necessary. One such solution is file<br />
locking, where when a user opens a file, all<br />
other copies on other devices are<br />
locked and the user is<br />
given<br />
read-only access. Once the user saves and<br />
closes the file, it is synced to other machines<br />
and the lock is released, allowing other users<br />
to edit the file.<br />
However, this approach may not suit all<br />
needs for large enterprises. For these<br />
organisations, it is advisable to look for<br />
solutions that offer collaborative file sharing<br />
between offices and with a variety of one-way<br />
and multi-way rule methods. For instance, if<br />
files are distributed from a central source, a<br />
multi-directional rule should not be used, as it<br />
could potentially cause damage to the master<br />
set of data.<br />
BALA<strong>NC</strong>ING USER NEEDS AND<br />
BANDWIDTH IN FILE REPLICATION<br />
Another common problem with DFS-R is the<br />
issue of throttling. The service can throttle<br />
bandwidth usage based on a per connection<br />
basis, which means that if bandwidth usage<br />
increases, DFS-R does not automatically<br />
adapt to changing network conditions.<br />
Bandwidth throttling is a common issue<br />
faced by businesses and organisations when<br />
too many users access a network at the same<br />
time. This results in slow download speeds,<br />
buffering, and other frustrating issues that<br />
can drive customers away. To address<br />
this problem, many<br />
organisations have turned to<br />
bandwidth throttling as a solution.<br />
This involves limiting the amount<br />
of data that can be transmitted<br />
over a network in a given time<br />
period, which helps to reduce<br />
congestion and improve overall<br />
performance.<br />
However, bandwidth throttling can also<br />
have negative effects. It can slow down<br />
important business processes, affect customer<br />
satisfaction, and even impact the bottom line.<br />
To address these issues, it is important to<br />
implement bandwidth throttling solutions that<br />
are both effective and fair. This might include<br />
implementing usage limits, prioritising critical<br />
applications and processes, or using more<br />
advanced solutions like traffic shaping or<br />
quality of service (QoS) policies. An even<br />
better solution is a system with advanced,<br />
dynamic throttling, where bandwidth usage is<br />
based on the percentage of bandwidth<br />
available. For example, a system using 50%<br />
of the connection would reduce its usage<br />
when other processes consume bandwidth<br />
Ultimately, the key to successful bandwidth<br />
throttling is finding the right balance between<br />
performance and fairness. By carefully<br />
considering the needs of all users,<br />
organisations can ensure that their networks<br />
run smoothly, even during periods of high<br />
usage. With the right approach, businesses<br />
can enjoy the benefits of a fast and reliable<br />
network, while avoiding the drawbacks of<br />
over-restrictive throttling policies.<br />
FINAL THOUGHTS<br />
DFS-R provides limited reporting options,<br />
limited ability to synchronise encrypted files,<br />
and no ability to synchronise files stored on<br />
FAT or ReFS volumes, making it challenging to<br />
operate efficiently in today's hybrid workplace.<br />
IT staff must adapt systems for users working<br />
from different locations while also managing<br />
varying bandwidth speeds at different times.<br />
The two common issues discussed in this<br />
article - the Last Writer Wins Algorithm and<br />
Bandwidth Throttling - highlight the need for<br />
IT staff to evaluate their file synchronisation<br />
and replication systems and determine if<br />
alternative solutions are required to meet their<br />
organisation's needs. <strong>NC</strong><br />
20 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
CASE STUDY<br />
BIGTWIN HAS A BIG IMPACT AT CERN<br />
SUPERMICRO SERVERS ENABLE FASTER AND MORE COMPLEX<br />
SIMULATIONS AT CERN DATA CENTRE<br />
CERN, the European Organisation for<br />
Nuclear Research, operates the largest<br />
particle physics laboratory in the world.<br />
It's where researchers are uncovering what the<br />
universe consists of and how it works. At<br />
CERN, physicists and engineers use extremely<br />
complex scientific instruments, including the<br />
largest and most powerful particle accelerator<br />
in the world - the Large Hadron Collider<br />
(LHC). These studies into subatomic particles<br />
are advancing the boundaries of human<br />
knowledge by delving into the smallest<br />
building blocks of our universe. Many of the<br />
discoveries already made at CERN have had a<br />
powerful impact on several areas of everyday<br />
life, ranging from medicine to computing.<br />
As such, this is one of the most highly<br />
demanding and challenging computing<br />
environments in research. The World Wide<br />
Web was originally conceived and developed<br />
at CERN to meet the demand for automated<br />
information-sharing between scientists in<br />
universities and institutes dotted around the<br />
world. From software development to data<br />
processing and storage, networks, support for<br />
the LHC and non-LHC experimental<br />
programmes, automation and controls, as well<br />
as services for the accelerator complex and for<br />
the whole laboratory and its users, computing<br />
is at the heart of CERN's infrastructure.<br />
As a long-standing supplier to CERN,<br />
Supermicro provides accelerated enterprise<br />
computing technology that supports cuttingedge<br />
explorations in particle physics. As the<br />
search for understanding the universe's origins<br />
expands, new computing resources are<br />
constantly being evaluated and updated.<br />
The partnership between CERN and<br />
Supermicro serves to introduce new<br />
technologies to the high-performance compute<br />
cluster that processes data from the LHC.<br />
CERN scientists continue to explore enterprise<br />
innovations for CERN in collaboration with<br />
other global technology manufacturers.<br />
ADDING COMPUTE POWER WHILE<br />
MONITORING POWER CONSUMPTION<br />
To understand the results of the research<br />
experiments conducted by scientists and<br />
engineers at CERN, a significant amount of<br />
computing power is required. Therefore, it<br />
must be updated with the latest advancements<br />
in server, storage, and networking<br />
technologies, while keeping an eye on the<br />
total power consumption of the entire<br />
computing environment.<br />
CERN's infrastructure technical team worked<br />
meticulously over many months before any<br />
procurement in assessing the market for the<br />
latest technological advances. It is a<br />
qualification process that, although it can be<br />
very time-consuming, is an absolute necessity<br />
in keeping CERN at the forefront of global<br />
scientific research and, more importantly,<br />
allows for collaboration with suitable partners<br />
to assess solutions around performance, cost,<br />
operational costs, power, density, and so on.<br />
CERN selected the Supermicro AMD BigTwin<br />
A+ 2124BT-HNTR server following a lengthy<br />
evaluation process. As a result, CERN<br />
acquired over 900 Supermicro BigTwin<br />
systems, each with four nodes, for a total of<br />
approximately 3,600 server nodes. Many types<br />
of simulations and workloads take place at<br />
CERN. Most of them are used for running<br />
batch computing jobs related to physics-event<br />
reconstruction, data analysis, and simulation.<br />
In addition, part of them is used as front-ends<br />
to disk storage, collecting physics data from<br />
the experiments.<br />
Supermicro BigTwin servers are smart yet<br />
affordable investments for enterprises and<br />
institutions that need to build, expand, or<br />
future-proof advanced computing<br />
infrastructures. The high-performance, highdensity<br />
systems feature optimum airflow for<br />
energy-efficient cooling, easy maintenance,<br />
and high availability with hot-swappable nodes<br />
and redundant power supply modules.<br />
HIGH DENSITY RESULTS IN LOWER<br />
POWER CONSUMPTION<br />
CERN saw an increase in the performance of<br />
many simulation applications. In addition, with<br />
the high density of the Supermicro BigTwin<br />
systems with AMD EPYC processors, the power<br />
usage was lower than expected due to the<br />
shared cooling and power systems. With the<br />
AMD EPYC 7XXX CPU, applications ran faster<br />
than previous generations of CPUs, helping<br />
scientists perform more research to understand<br />
more about the world we live in.<br />
"We have worked alongside Supermicro for<br />
many years, and their attention to the design<br />
and engineering of the Supermicro BigTwin<br />
architecture has constantly increased.<br />
Thousands of compute nodes of the latest<br />
AMD EPYC based Supermicro BigTwin<br />
platform were deployed in the CERN<br />
computing facilities. This illustrates the highquality<br />
of these systems, both in terms of<br />
performance and reliability", said Eric<br />
Bonfillou, CERN IT Facility Planning and<br />
Procurement. <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK FEBRUARY/MARCH <strong>2023</strong> 21<br />
NETWORKcomputing<br />
@<strong>NC</strong>MagAndAwards
JOIN US<br />
AT THE<br />
COMMUNICATION<br />
TECHNOLOGY<br />
EXPO!<br />
15th & 16th <strong>Mar</strong>ch <strong>2023</strong> | ExCeL London<br />
FREE TICKETS AT BUSINESSREVIVALSERIES.CO.UK
EXPERT-LED<br />
WORKSHOPS<br />
CPD-ACCREDITED<br />
SEMINARS<br />
SPEED NETWORKING<br />
WORLD-LEADING<br />
KEYNOTE SPEAKERS<br />
FREE TICKETS!<br />
15th & 16th <strong>Mar</strong>ch <strong>2023</strong> | ExCeL London<br />
FREE TICKETS AT BUSINESSREVIVALSERIES.CO.UK
FEATURE: DATA PERSPECTIVES<br />
THE YEAR OF DATA-DRIVEN EVERYTHING<br />
JONATHAN ROTHWELL, CEO & CO-FOUNDER OF D55, ON THE VALUE OF DATA-FIRST SYSTEMS IN <strong>2023</strong><br />
The ever-evolving deployment of<br />
technology has put pressure on<br />
businesses to adapt, adopt and<br />
innovate. Integrating these advancements,<br />
and applying them effectively, is now<br />
considered imperative for obtaining a<br />
competitive edge. Geared toward efficiency,<br />
speed to market, and scale-up, data-driven<br />
solutions stand to benefit all sectors. However,<br />
with solutions rolled-out at increasingly<br />
impressive rates, many businesses do not<br />
understand the nuances of new systems.<br />
Business leaders are often unsure about what<br />
tech to invest in and how to get the most<br />
effective ROI from newly installed solutions.<br />
This is a pain point commonly seen by digital<br />
transformation specialists, who understand<br />
effective business transformations rarely require<br />
every solution available; businesses need to<br />
dictate solutions, not the other way around.<br />
And so, as the landscape shifts towards datadriven<br />
everything, senior decision-makers must<br />
understand this dynamic and the impact of this<br />
on operations and data-driven investments.<br />
WHAT IS DATA-DRIVEN EVERYTHING?<br />
Put simply, data-driven everything is the<br />
process of using actionable data analysis and<br />
interpretation to produce more effective<br />
strategic business decisions. A data-driven<br />
approach, which utilises a combination of<br />
connected technologies including databases,<br />
data systems, AI and ML, enables businesses<br />
to more accurately optimise the way they serve<br />
customers and employees by using the<br />
freshest data possible. The benefits of<br />
realignment are myriad, with intra-team<br />
cohesion and increased day-to-day efficiency<br />
advantages gained.<br />
A data-driven remodelling synergises systems<br />
for efficiency, moving businesses beyond the<br />
disjointed siloed data access commonly<br />
associated with antiquated legacy systems. This<br />
distinction is well-known within the<br />
transformation sector, with leading providers,<br />
such as AWS, providing public resources for<br />
businesses to better understand the next wave<br />
of system innovation.<br />
OUT WITH THE OLD<br />
Businesses reliant on legacy systems are often<br />
unaware of what they're missing out on. This is<br />
because systems have usually been in place for<br />
a long time, becoming part and parcel of a<br />
company's operations. There is a harmful<br />
perception that sticking with current systems is<br />
less hassle than switching to modern solutions.<br />
In the immediate term this may be correct but<br />
eventually legacy systems will do more harm<br />
than good. Businesses across sectors have<br />
recognised this, sparking 'the great cloud<br />
migration' over the last decade.<br />
When compared to modern cloud solutions,<br />
legacy systems are more costly and less<br />
efficient. They are normally located on-premise,<br />
draining space from physical stores and<br />
24 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
FEATURE: DATA PERSPECTIVES<br />
warehouses. Legacy systems are also finite by<br />
design, meaning with scaleup additional<br />
storage is required; business growth, therefore,<br />
comes with the problem of increased<br />
hardware investment. At the time these systems<br />
were built when green initiatives were not<br />
commonplace either, so hardware cannot be<br />
significantly optimised for sustainability goals.<br />
They are also more costly to maintain, with<br />
breakdowns the sole responsibility of the<br />
business. Hardware systems represent a single<br />
point of failure, if severe breakdowns or<br />
external issues such as damage occur,<br />
business operations come to a standstill.<br />
Considering this, businesses must seek<br />
modern data-driven solutions, to decide<br />
which strategy is most applicable a whole host<br />
of technologies must be explained.<br />
THE SYSTEMS OF DATA-DRIVEN<br />
EVERYTHING<br />
Cloud systems often form the base of a<br />
company's digital transformation. When<br />
compared to legacy systems, cloud is a more<br />
resilient, cost-effective, faster, greener solution.<br />
Cloud providers place connected data houses<br />
in various locations, nullifying breakdown or<br />
damage risks. Cloud can also be optimised<br />
quicker and more minutely, meaning<br />
optimisations for speed of processing are<br />
more easily made. Cost efficiency is a key<br />
component, cloud providers such as AWS<br />
scale cloud computing costs based entirely on<br />
usage, meaning businesses only pay for what<br />
they need and are ready for scale-up at any<br />
given moment. Providers also cover all<br />
optimisation and problem fixes internally.<br />
Most cloud providers also run operations on<br />
green energy, aiming for carbon neutrality by<br />
2050, benefitting cloud-based businesses'<br />
green credentials.<br />
All of these benefits provide a foundation for<br />
faster data collation and access, allowing<br />
businesses to act on data insights in real time.<br />
Cloud systems are also exceptional at<br />
removing unnecessary manpower resources<br />
away from maintaining IT systems, meaning<br />
resources can instead be directed toward<br />
diligent data analysis.<br />
DATA LAKES<br />
Businesses reliant on legacy systems collect<br />
data from various siloed systems, the adverse<br />
effect of this is data mismanagement and an<br />
overall lacking of the 'bigger picture'.<br />
Naturally, storing data in siloed systems<br />
reduces the speed and accuracy of which<br />
data can be acted on. A data lake removes<br />
these issues by collating structured and<br />
unstructured data regardless of scale. From<br />
here, the now-centralised data can be utilised<br />
for machine learning, big data processing<br />
and real-time analytics.<br />
The effect of implementing a data lake on<br />
bottom lines can be considerable, with<br />
research showing companies with data lakes<br />
boasted 9% more organic growth revenue<br />
compared to competitors that had siloed data<br />
systems. The reasons for this are likely that<br />
data lakes offer speedier, more accessible and<br />
accurate insights; research details that 87% of<br />
companies with a data lake believe decisionmaking<br />
markedly improved. Additionally, 92%<br />
of leaders trust data lakes to be the most<br />
effective solution for centralising data. In<br />
comparison to data warehouses - data lake's<br />
predecessor - the modernised solution also<br />
comes with a lower cost of ownership.<br />
Ultimately, data lakes are a foundational<br />
component for businesses realigning to a<br />
data-driven perspective. The centralised data<br />
system enables quicker reactivity to market<br />
changes, synergised collaboration between<br />
separate departments and more informed,<br />
impactful business decisions.<br />
AI AND ML<br />
With AI and Machine Learning (ML) you get<br />
what you put in, literally. The more a business<br />
gears itself toward AI and ML the stronger data<br />
outcomes will be. Likely, businesses are already<br />
leveraging AI in back-end and customer-facing<br />
applications, but the importance of continuous<br />
efforts toward ML can be neglected. Once<br />
businesses have a firm grasp on centralised<br />
data collation and analysis, they can begin to<br />
input this data into ML. As this process<br />
continues, ML becomes intelligent enough to<br />
impact the sophistication of AI because data<br />
interpretation can be used to create highquality<br />
insights.<br />
Businesses that produce an effective databased<br />
system to nurture ML and AI will<br />
produce a high detail analysis of how a<br />
business is operating and how clientele utilise<br />
the company's service. Ultimately, this allows<br />
businesses to accurately optimise areas they<br />
have identified as inefficient.<br />
A DATA-DRIVEN FUTURE<br />
The opportunities available to businesses<br />
willing to realign to data-first systems and ways<br />
of working are clearly demonstrated. Efficiency,<br />
accuracy and future-proofing are key benefits<br />
of data-driven investment. Businesses shouldn't<br />
focus on adopting the whole breadth of digital<br />
transformation technologies, but a carefully<br />
curated digital transformation plan will give<br />
them the best chance of market<br />
competitiveness, the edge over more stubborn<br />
competitors, and an overall more effective and<br />
diligent operation. The technology and<br />
expertise are in place to transform whole<br />
sectors in <strong>2023</strong> - businesses leveraging data<br />
to empower decisions will gain advantages in<br />
the immediate future and beyond. <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 25
FEATURE: DATA PERSPECTIVES<br />
NETWORK LATE<strong>NC</strong>Y: HOW CAN THE<br />
MANAGEMENT COSTS BE REMOVED?<br />
KEN WOOD, TECHNICAL PRODUCT MANAGER AT TERADATA,<br />
OFFERS A SOLUTION TO THE ONGOING PROBLEM OF<br />
NETWORK LATE<strong>NC</strong>Y<br />
Across the globe there are a number<br />
of regulations, compliance laws<br />
and privacy restrictions which<br />
businesses need to navigate through.<br />
Although these rules are all designed to<br />
protect humanity and societies in different<br />
cultures, global businesses are subjected<br />
to spending massive amounts of time and<br />
money to overcome these obstacles in<br />
order to do business across borders.<br />
Yet, for businesses to gain competitive<br />
business insight, they must access<br />
sensitive data which is sometimes located<br />
in different countries. In this, businesses<br />
will also need to weave through different<br />
country's regulations, to access this<br />
critical data. This sensitive data must be<br />
protected, traced, and tracked in order to<br />
keep all the information safe.<br />
WHAT IS DATA LINEAGE AND HOW<br />
DOES THIS IMPACT BUSINESSES?<br />
To begin with the definition of data<br />
lineage, it involves the curation of the<br />
original data - the original truth. No<br />
matter how many times this data is moved<br />
or copied, its origins and in all its<br />
locations and forms is removed. Now,<br />
when this requirement is multiplied by<br />
26 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
FEATURE: DATA PERSPECTIVES<br />
petabytes of data globally within an<br />
enterprise and for most, the challenge can<br />
seem daunting. Successful enterprises can<br />
navigate through these requirements,<br />
however - but it can be costly.<br />
Businesses in regulated industries must<br />
prove that they can effectively store a<br />
certain type of sensitive data, but also<br />
must be able to prove that, when<br />
permitted, this data no longer exists<br />
anywhere. If this data has been deleted,<br />
but still shows up in any form or location,<br />
the data can still be recalled, which can<br />
bring on litigation cases against the<br />
business. It does not matter whether the<br />
enterprise is aware of the existence of the<br />
rogue data or not, they are still liable. The<br />
Data Life Cycle Management process is<br />
the sequence of the creation, use,<br />
retention, and eventual erasure of data. In<br />
some industries, the duration of this life<br />
cycle can span decades or more.<br />
The associated costs and burden which<br />
businesses have of managing data,<br />
tracking its movements, replication, and<br />
its locations, can place a massive strain<br />
on the ability of an organisation to<br />
conduct the business they need to do. The<br />
issue is the "use" phase of the data's life<br />
cycle - how do businesses make data<br />
useful, accessible, and analysable across<br />
a vast web of multinational regulations,<br />
without losing track of it? The answer is<br />
perhaps simpler than expected - leave the<br />
data in place, where it is safe and<br />
controllable - leave the original as the<br />
original.<br />
Even though analysing data-in-place<br />
sounds like an easy solution to this<br />
industry problem, it is not the first time this<br />
approach has been tried. The problem of<br />
network latency comes into play - it is not<br />
sufficient to just access the original data<br />
where it persists from anywhere. The race<br />
between network latency and data size<br />
has been a back-and-forth struggle<br />
throughout the history of computer<br />
networking. Even as the world gets<br />
digitally smaller, network latencies can<br />
make accessing data seem too far away<br />
to be efficiently analysed with high<br />
performance analytical databases engines<br />
which are already on the market.<br />
WHAT IS THE SOLUTION TO<br />
NETWORK LATE<strong>NC</strong>Y?<br />
There are three primary types of network<br />
latency which are; latency caused by<br />
distance, latency caused by congestion,<br />
and latency caused by the network design<br />
itself, intentionally or by accident.<br />
Combinations of these latency types in the<br />
same network, makes the issue much<br />
worse. All three types can, however, cause<br />
analytic access to data to be too slow to<br />
be useful, which reduces the usable<br />
throughput, which is required to gain<br />
insight from critical data, to outright<br />
intolerable.<br />
The instinctive solution is to place the<br />
data near the processing engines, where it<br />
is needed. This means copying data to<br />
local storage locations to give the data<br />
local performance access. However, this<br />
creates a whole new set of issues.<br />
Needing to keep track of where all of<br />
these data copies are located and when<br />
the use of the data is completed and<br />
removing the data from all locations, can<br />
be difficult and costly. This includes<br />
tracking down potential locally backed up<br />
copies and any off-site media copies, and<br />
local disaster recovery replicas in those<br />
remote locations.<br />
The simplest and most practical<br />
solution is to leave the original data in<br />
place. This is possible today with the<br />
combination of technologies<br />
which are already on the<br />
market. When businesses<br />
choose the right<br />
combination, they could optimise<br />
latencies in Wide Area Networks (WAN)<br />
and potentially increase throughput by<br />
over seven-times when directly compared<br />
to the same WAN by itself.<br />
Businesses could be able to use as much<br />
as 95 percent of the WAN connection to<br />
analyse data where it is stored versus<br />
copying and staging the data closer to<br />
their analytic engines. That is global<br />
analytics with data-in-place and at scale.<br />
This frees up IT teams to solve bigger<br />
issues, rather than needing to keep track<br />
of where sensitive data is being copied.<br />
They can manage and control data where<br />
they need to. This also has the potential<br />
to minimise regulatory requirements as<br />
some regulations allow the transient<br />
inflight use of data versus the persistence<br />
of data in other countries.<br />
The cost savings and reduced<br />
management spent could also play a role<br />
in planning data access methods.<br />
Combining the right technology is perfect<br />
for on-premises, private, hybrid, public<br />
and multi-cloud environments where long<br />
network latency might halt enterprises<br />
from being able to fully leverage access to<br />
their sensitive data. <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 27
FEATURE: DATA PERSPECTIVES<br />
ABSTRACTING DATA PROTECTION FROM INFRASTRUCTURE<br />
SIMON PAMPLIN, CTO, CERTES NETWORKS, INSISTS IT IS NOW ESSENTIAL TO STOP RELYING ON<br />
INFRASTRUCTURE SECURITY AND USE LAYER 4 E<strong>NC</strong>RYPTION TO PROACTIVELY PROTECT BUSINESS<br />
SENSITIVE DATA, IRRESPECTIVE OF LOCATION<br />
The cybersecurity threat has risen so<br />
high in recent years that most<br />
companies globally now accept that a<br />
data breach is almost inevitable. But what<br />
does this mean for data protection and<br />
compliance officers, as well as senior<br />
managers, now personally liable for<br />
protecting sensitive company, customer and<br />
partner data?<br />
Investing in security infrastructure is not<br />
enough to demonstrate compliance in<br />
protecting data. Software Defined Wide<br />
Area Networks (SD-WAN), Firewalls and<br />
Virtual Private Networks (VPN) play a role<br />
within an overall security posture but they<br />
are infrastructure solutions and do not<br />
safeguard data. What happens when the<br />
data crosses outside the network to the<br />
cloud or a third-party network? How is the<br />
business data on the LAN side protected if<br />
an SD-WAN vulnerability or<br />
misconfiguration is exploited? What<br />
additional vulnerability is created by relying<br />
on the same network security team to both<br />
set policies and manage the environment, in<br />
direct conflict with Zero Trust guidance? The<br />
only way to ensure the business is protected<br />
and compliant is to abstract data protection<br />
from the underlying infrastructure.<br />
ACKNOWLEDGING ESCALATING RISK<br />
Attitudes to data security need to change fast<br />
because today's infrastructure-led model is<br />
creating too much risk. According to the 2022<br />
IBM Data Breach survey, 83% of companies<br />
confirm they expect a security breach - and<br />
many accept that breaches will occur more<br />
than once. Given this perception, the question<br />
has to be asked: why are businesses still reliant<br />
on a security posture focused on locking the<br />
infrastructure down?<br />
Clearly that doesn't work. While not every<br />
company will experience the catastrophic<br />
impact of the four-year-long data breach that<br />
28 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
FEATURE: DATA PERSPECTIVES<br />
ultimately affected 300 million guests of<br />
<strong>Mar</strong>riott Hotels, attackers are routinely<br />
spending months inside businesses looking for<br />
data. In 2022, it took an average of 277 days<br />
-a bout nine months - to identify and contain a<br />
breach. Throughout this time, bad actors have<br />
access to corporate data; they have the time<br />
to explore and identify the most valuable<br />
information. And the chance to copy and/or<br />
delete that data - depending on the attack's<br />
objective.<br />
The costs are huge: the average cost of a<br />
data breach in the US is now $9.44 million<br />
($4.35 is the average cost globally). From<br />
regulatory fines - which are increasingly<br />
punitive across the globe - to the impact on<br />
share value, customer trust, even business<br />
partnerships, the long-term implications of a<br />
data breach are potentially devastating.<br />
MISPLACED TRUST IN INFRASTRUCTURE<br />
Yet these affected companies have ostensibly<br />
robust security postures. They have highly<br />
experienced security teams and an extensive<br />
investment in infrastructure. But they have<br />
bought into the security industry's long<br />
perpetuated myth that locking down<br />
infrastructure, using VPNs, SD-WANs and<br />
firewalls, will protect a business' data.<br />
As breach after breach has confirmed,<br />
relying on infrastructure security fails to provide<br />
the level of control needed to safeguard data<br />
from bad actors. For the vast majority of<br />
businesses, data is rarely restricted to the<br />
corporate network environment. It is in the<br />
cloud, on a user's laptop, on a supplier's<br />
network. Those perimeters cannot be<br />
controlled, especially for any business that is<br />
part of supply chain and third-party networks.<br />
How does Vendor A protect third party<br />
Supplier B when the business has no control<br />
over their network? Using traditional,<br />
infrastructure dependent security, it can't.<br />
Furthermore, while an SD-WAN is a more<br />
secure way of sending data across the Internet,<br />
it only provides control from the network<br />
egress point to the end destination. It provides<br />
no control over what happens on an<br />
organisation's LAN side. It cannot prohibit<br />
data being forwarded on to another location<br />
or person. Plus, of course, it is accepted that<br />
SD-WAN misconfiguration can add a risk of<br />
breach, which means the data is exposed - as<br />
shown by the public CVE's (Common<br />
Vulnerabilities and Exposures) available to<br />
review on most SD-WAN vendors' websites.<br />
And while SD-WANs, VPNs and firewalls use<br />
IPSEC as an encryption protocol, their<br />
approach to encryption is flawed: the<br />
encryption keys and management are<br />
handled by the same group, in direct<br />
contravention of accepted zero trust<br />
standards of "Separation of Duties".<br />
PROTECT THE DATA<br />
It is, therefore, essential to take another<br />
approach, to focus on protecting the data. By<br />
wrapping security around the data, a<br />
business can safeguard this vital asset<br />
irrespective of infrastructure. Adopting Layer<br />
4, policy-based encryption ensures the data<br />
payload is protected for its entire journey -<br />
whether it was generated within the business<br />
or by a third party.<br />
If it crosses a misconfigured SD-WAN, the<br />
data is still safeguarded: it is encrypted,<br />
making it valueless to any hacker. However<br />
long an attack may continue, or however long<br />
an individual or group can be camped out in<br />
the business looking for data to use in a<br />
ransomware attack, if the sensitive data is<br />
encrypted there is nothing to work with. The<br />
fact that the payload data only is encrypted,<br />
while header data remains in the clear means<br />
minimal disruption to network services or<br />
applications, as well as making<br />
troubleshooting an encrypted network easier.<br />
This mindset shift protects not only the data<br />
and, by default, the business, but also the<br />
senior management team responsible - indeed<br />
personally liable - for security and information<br />
protection compliance. Rather than placing<br />
the burden of data protection onto network<br />
security teams, this approach realises the true<br />
goal of zero trust: separating policy setting<br />
responsibility from system administration. The<br />
security posture is defined from a business<br />
standpoint, rather than a network security and<br />
infrastructure position - and that is an essential<br />
and long overdue mindset change.<br />
CO<strong>NC</strong>LUSION<br />
This mindset change is becoming critical -<br />
from both a business and regulatory<br />
perspective. Over the past few years,<br />
regulators globally have increased their focus<br />
on data protection. From punitive fines,<br />
including the maximum with its 20 million<br />
euros (or 25% of global revenue, whichever is<br />
the higher) per breach of European Union's<br />
General Data Protection Regulation (GDPR) to<br />
the risk of imprisonment, the rise in regulation<br />
across China and the Middle East reinforces<br />
the global clear recognition that data loss has<br />
a material cost to businesses.<br />
Until recently, however, regulators have not<br />
been prescriptive about the way in which that<br />
data is secured - an approach that has<br />
allowed the 'lock down infrastructure' security<br />
model to continue. This attitude is changing.<br />
In North America, new laws demand<br />
encryption between Utilities' Command and<br />
Control centres to safeguard national<br />
infrastructure. This approach is set to expand<br />
as regulators and businesses recognise that<br />
the only way to safeguard data crossing<br />
increasingly dispersed infrastructures, from SD-<br />
WAN to the cloud, is to encrypt it - and do so<br />
in a way that doesn't impede the ability of the<br />
business to function.<br />
It is now essential that companies<br />
recognise the limitations of relying on SD-<br />
WANs, VPNs and firewalls. Abstracting data<br />
protection from the underlying infrastructure<br />
is the only way to ensure the business is<br />
protected and compliant. <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 29
OPINION: QUANTUM<br />
QUANTUM FOR THE LONG TERM<br />
DR ERIC HOLLAND, DIRECTOR<br />
OF QUANTUM ENGINEERING<br />
SOLUTIONS, KEYSIGHT<br />
TECHNOLOGIES, EXPLORES SIX<br />
KEY QUANTUM TRENDS FOR<br />
<strong>2023</strong> AND BEYOND<br />
Quantum mechanics offers an<br />
entirely new way of processing<br />
information. It has the potential<br />
to be faster and more resource-efficient<br />
than any other solution, which could<br />
transform our capabilities in sectors such<br />
as cybersecurity, pharmaceuticals, and<br />
manufacturing.<br />
However, as it stands, quantum<br />
mechanics is still in its infancy. We are<br />
fundamentally limited by the stability and<br />
30 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
OPINION: QUANTUM<br />
accuracy of existing systems. To take<br />
quantum computing from its current state<br />
and make it fit for purpose in the<br />
mainstream, there is a need to reduce<br />
errors and add the ability to scale.<br />
If such improvements can be made,<br />
quantum will be able to push beyond the<br />
boundaries of classical physics and offer<br />
solutions to calculations that have<br />
previously been deemed impossible.<br />
With this in mind, and as quantum<br />
continues its development, here, I have<br />
put together my top trends:<br />
1: Quantum poised to accelerate<br />
complex design processes<br />
In the airline industry, it is not<br />
uncommon for companies to spend 25<br />
years designing a new polymer that will<br />
make aircraft more fuel efficient and<br />
resistant to extreme temperatures.<br />
Quantum will significantly accelerate<br />
this and other material science design<br />
timelines. Rather than spending their<br />
entire career on one design cycle,<br />
employees will be able to complete the<br />
process in a matter of years.<br />
2: Taking a quantum leap in the<br />
climate change battle<br />
Once quantum demonstrates advantage,<br />
it will increasingly be channeled to help<br />
fight climate change. For example,<br />
improving decision-making through<br />
complex modeling and predictions and<br />
helping ensure compliance with<br />
emission standards.<br />
3: Reducing the impact of hurricanes<br />
and weather events<br />
Before the end of the next decade,<br />
quantum will enable meteorologists to<br />
better predict the trajectory of<br />
hurricanes, winter storms, and other<br />
weather events. This will allow<br />
communities to better plan and remove<br />
any element of guesstimates in<br />
determining whether to mandate<br />
evacuations or shelter in place. As a<br />
result, the loss of life associated with<br />
hurricanes and other natural weatherdriven<br />
disasters will be reduced.<br />
4: Quantum navigation will<br />
illuminate remote areas<br />
Quantum technology can facilitate<br />
navigation in remote areas with minimal<br />
satellite coverage, but cost is currently a<br />
barrier to adoption. This will begin to<br />
change as quantum becomes more<br />
prevalent and affordable. I believe that<br />
we will see emergency vehicles equipped<br />
with quantum sensors within the next<br />
decade, with consumer vehicles<br />
eventually following suit.<br />
5: Europe is hot on US' heels with<br />
quantum adoption<br />
The US is currently leading the quantum<br />
computing industry, but by the end of the<br />
decade, Europe will reach parity.<br />
Increasing privacy regulations is one<br />
major driver behind Europe's growth, as<br />
having quantum computing capabilities<br />
in the region will make it significantly<br />
easier to comply with these mandates.<br />
In addition, European quantum<br />
companies have seen the largest venture<br />
rounds and a plethora of universities<br />
throughout the continent provide a talent<br />
pipeline that can be tapped to fuel new<br />
quantum opportunities and use cases. As<br />
a result, the US quantum industry will<br />
feel increasing pressure to maintain its<br />
competitive advantage.<br />
6: Building the foundation for<br />
quantum<br />
After decades-long hype around<br />
quantum computing and quantum<br />
systems, the industry will start to realise<br />
its potential for creating new<br />
opportunities in fields spanning<br />
cybersecurity, materials creation,<br />
financial analysis, and military receivers.<br />
Proactive companies will start investing<br />
in quantum, fostering quantum talent<br />
within the next generation of workers<br />
through university partnerships,<br />
hackathons, and other projects. This will<br />
create an ancillary boost to DEI<br />
initiatives resulting in much-needed<br />
diversity in the tech workforce.<br />
Recent research revealed 74% of<br />
companies believe they will fall behind if<br />
they fail to adopt quantum. As a result,<br />
organisations will begin to shift their<br />
thinking from that of quantum being a<br />
futuristic technology and begin<br />
addressing key challenges, including<br />
financial resources and operations, and<br />
developing real enterprise applications<br />
of quantum by 2026, if not sooner.?<br />
WHEN WILL QUANTUM ENTER THE<br />
MAINSTREAM?<br />
There is still much to be learned about<br />
quantum mechanics and the power it<br />
harnesses. However, it's clear the<br />
opportunities it presents in fields such as<br />
research and industry. It's not<br />
unreasonable to think that quantum<br />
computing could be in mainstream use<br />
within the next ten years, though for this<br />
to happen there needs to be significant<br />
innovation in hardware and software<br />
development.<br />
What is certain is the multitude of<br />
possibilities quantum mechanics offers,<br />
and it goes beyond the trends we've<br />
discussed in this article. The power of<br />
quantum has the potential to transform<br />
everything from how pharmaceutical<br />
companies develop drugs for serious<br />
illness to how businesses protect<br />
themselves from cybersecurity threats. It<br />
may be in its early years now, but<br />
quantum is coming sooner than we<br />
think. <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 31
OPINION: MACHINE LEARNING<br />
DISCOVERING RULES THROUGH MACHINE LEARNING<br />
JURAS JURŠENAS, COO AT OXYLABS EXPLORES THE WAYS IN<br />
WHICH WE CAN TAKE EFFICIENT STRATEGIES FROM MACHINE<br />
LEARNING MODELS AND APPLY THEM TO RULE-BASED SYSTEMS<br />
Back in 1868, George Boole's wife<br />
paraphrased his thoughts on the<br />
capabilities of machines: "Between<br />
them they have conclusively proved, by<br />
unanswerable logic of facts, that<br />
calculation and reasoning, like weaving<br />
and plowing, are work, not for human<br />
souls, but for clever combinations of iron<br />
and wood. If you spend time in doing<br />
work that a machine could do faster than<br />
yourselves, it should only be for<br />
exercise."<br />
We've come a long way since Claude<br />
Shannon applied Boole's work to build<br />
the first circuit board, heralding the age<br />
of computers. Just as he had predicted,<br />
most calculations and reasoning chains<br />
are now done by "clever combinations of<br />
iron and wood." We just realised that<br />
silicon might be a bit better at doing the<br />
job. What Boole himself did throughout<br />
his life would be something he'd not have<br />
thought possible for a machine. He was<br />
investigating the rules that governed<br />
thought itself. In other words, he was<br />
moving towards a higher level of<br />
reasoning, above the regular calculations<br />
of daily life.<br />
While we're still far away from<br />
artificial intelligence that would be<br />
able to make use of philosophy<br />
in a similar fashion to Boole<br />
and others, we're coming close<br />
to a more subtle form of<br />
computational thinking.<br />
Machine learning can be used<br />
to discover unintuitive rules in<br />
some areas of life.<br />
MACHINE<br />
LEARNING'S<br />
CAPABILITIES<br />
Much has been written about<br />
how machine learning is going to<br />
replace all other modes of solving<br />
problems. One of the most popular<br />
suggestions is that we should forgo rulebased<br />
approaches for machine learning.<br />
Such a view, in my eyes, is overly<br />
idealistic. Solving problems with machine<br />
learning that could be solved with a<br />
rule-based approach is a waste of<br />
resources. Models, especially more<br />
complicated ones, can be prohibitively<br />
expensive and require much<br />
maintenance to keep them accurate.<br />
In an ideal world with unlimited<br />
resources, both computing and fiscal,<br />
these differences wouldn't matter. In<br />
business, however, we're always working<br />
32 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
OPINION: MACHINE LEARNING<br />
within tightly<br />
defined boundaries,<br />
as any usage of resources<br />
also means an opportunity cost.<br />
Preferably, then, we would opt to solve all<br />
problems with rule-based approaches.<br />
However, that runs into other complicated<br />
issues, such as not all problems having<br />
defined boundaries that can be solved<br />
through rules.<br />
Machine learning is great at solving<br />
two types of challenges. Any problem<br />
that requires a probabilistic answer is<br />
likely much better done by a model<br />
rather than anything rule-based. Another<br />
area where machine learning is<br />
immensely valuable is when the rules are<br />
not clear.<br />
In business, we might sometimes not be<br />
sure on how to answer specific questions.<br />
For example, what rules should govern a<br />
self-checkout process? There are nearly<br />
infinite possibilities for structuring such a<br />
feature, but we're always looking to<br />
maximise the outcome. In other words,<br />
we'd prefer that a self-checkout would<br />
lead to the most conversions.<br />
INFERE<strong>NC</strong>ES FROM MACHINE<br />
LEARNING MODELS<br />
A common objection might be that some<br />
machine learning models, such as Deep<br />
Neural Networks, are essentially black<br />
boxes. We're never quite sure what's<br />
going on under the hood, so extracting<br />
rules from them is as much guesswork as<br />
without them. Fortunately, in business<br />
applications, we don't need to be as<br />
exact as logicians or scientists who<br />
attempt to uncover the foundational<br />
blocks of minds, language, or the<br />
universe. Insights that point us in the<br />
right direction are enough to create a<br />
case for doing things one way or<br />
another.<br />
In other words, when building a model<br />
that predicts the best outcome for a selfservice<br />
customer system, we're not trying<br />
to define some immutable laws of human<br />
behavior. We're simply looking at an<br />
admittedly ever-changing set of<br />
circumstances and attempting to wrestle<br />
out the best way to go about them.<br />
So, going back to the same example, a<br />
Random Forest algorithm, fed with<br />
enough data from event sessions and<br />
user activities, could outline the most<br />
predictive outputs. These would indicate<br />
what users are most influenced by during<br />
the self-service process. These outputs<br />
might not be ground-breaking or even<br />
wide-ranging as they only work in a fairly<br />
confined space of circumstances. But<br />
they're more than enough for the<br />
engineers, designers, and content writers<br />
to perform optimisation that would lead<br />
to better conversions.<br />
These insights can then be turned into<br />
rule-based algorithms. As such, machine<br />
learning models can give us a way to<br />
discover circumstantial rules that we can<br />
implement in our business practices.<br />
CO<strong>NC</strong>LUSION<br />
Hopes that machine learning will<br />
replace rule-based systems are illfounded.<br />
The latter is often much more<br />
efficient and cheaper to build and<br />
maintain than complicated machine<br />
learning models. As businesses are<br />
always turning one eye to efficiency,<br />
rule-based systems are here to stay.<br />
Machine learning, unlike commonly<br />
thought, can be used to supplement<br />
rule-based systems. While there are<br />
possible ways of combining one into a<br />
single system, the former can also be<br />
used to garner insights that can then be<br />
implemented into the latter.<br />
In the end, machine learning shouldn't<br />
be thought of as the cure-all for technical<br />
problems. It's one of the many possibilities<br />
that should be used thoughtfully. One of<br />
those is to ensure we make better<br />
decisions in other systems. <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2023</strong> NETWORKcomputing 33
CASE STUDY<br />
UTILISING DIGITAL TRANSFORMATION TO PROVIDE QUANTIFIABLE TIME SAVINGS<br />
TENDRING DISTRICT COU<strong>NC</strong>IL, WORKING WITH ESPRIA, HAS OPTED TO TRANSITION TO THE<br />
CLOUD-BASED SOPHOS CENTRAL<br />
Tendring District Council, based in Essex,<br />
have worked with Sophos and Espria for<br />
their IT security needs since 2014. Sophos<br />
is a world leader in next-generation<br />
cybersecurity, protecting more than 500,000<br />
organisations and millions of consumers in<br />
more than 150 countries from today's most<br />
advanced cyber threats. Espria is an awardwinning<br />
expert in the delivery of IT services and<br />
a trusted provider of IT solutions, managed and<br />
integrated services to a wide range of UK<br />
organisations of all sizes.<br />
BUSINESS CHALLENGES<br />
Several years ago, Tendring District Council<br />
implemented on-premise Sophos Endpoint<br />
Protection Advanced and was happy with the<br />
solution. More recently, the council has focused<br />
on further digital transformation, moving all<br />
services and servers to a cloud environment.<br />
With this in mind, and working with Espria, the<br />
council opted to transition to the cloud-based<br />
Sophos Central. Completed in May 2020,<br />
Espria supported the organisation in working<br />
remotely with an ongoing priority for IT security<br />
after a minor ransomware incident caused the<br />
team to be highly aware of the prevalence of<br />
attacks in their sector.<br />
THE TECHNICAL SOLUTION<br />
The council moved to Sophos Central for cloudbased<br />
IT security for endpoints and servers with<br />
the added benefit of ransomware protection<br />
from Intercept X Advanced with EDR. The<br />
council also called in Sophos Professional<br />
Services to assist with the installation.<br />
Throughout the project, the team at the council<br />
used each step as a way of learning about the<br />
solutions, which included:<br />
Sophos Central: a unified console for<br />
managing Sophos products<br />
Intercept X Advanced for Server with EDR<br />
which protects virtual and physical servers<br />
without sacrificing performance, including<br />
one-click Server Lockdown<br />
Intercept X Advanced with EDR: a<br />
signatureless anti-exploit, anti-ransomware<br />
and root cause analysis tool that protects<br />
endpoints from advanced threats<br />
Professional Services: consultation,<br />
implementation and configuration of<br />
solutions aligned with security needs and<br />
Sophos best practices.<br />
BUSINESS BENEFITS<br />
Sam Wright is Cyber Security & Systems<br />
Manager at Tendring District Council. He lists<br />
the benefits of the Sophos/Espria partnership<br />
and moving to Sophos Central as being:<br />
Automation: the automation in Sophos<br />
Central when detecting and alerting potential<br />
threats eases the pressure on the IT team<br />
The interface: the team finds the Sophos<br />
Central interface very easy to use and issuefree,<br />
particularly when working remotely<br />
Threat analysis: Sam was impressed with the<br />
Sophos Endpoint Detection and Response<br />
(EDR) threat analysis in Intercept X Advanced<br />
with top threat indicators, live discovery and<br />
multiple categories and queries<br />
Behaviour analysis: Intercept X Advanced<br />
examines the behaviour of attacks rather<br />
than definition - a different approach that<br />
provides heightened security<br />
Data security: Device Control within Sophos<br />
Central keeps data safe and the council<br />
compliant with GDPR<br />
Price: Sam believes he got a good deal from<br />
Sophos with customer-specific pricing<br />
Service: "The council is pleased with the<br />
service it has received from Sophos and<br />
Espria who are there to help whenever it's<br />
needed."<br />
Sam is so pleased with Sophos' services and<br />
the solutions provided that he has<br />
recommended them to his peers in the Essex<br />
Online Partnership - a collaboration of<br />
authorities including emergency services - and<br />
he also ran a demo for them.<br />
"I'm always happy to recommend Sophos &<br />
Espria," he says. "It's easy to use, makes<br />
complete sense and empowers our technicians.<br />
Plus, Sophos is a well-established and trusted<br />
company that's here for the long term. Sophos<br />
has definitely played a key role in our digital<br />
transformation project. Our technicians are very<br />
happy with Espria & Sophos Central. It makes it<br />
easy for them to drill down, review and<br />
investigate any issues that arise. It just makes<br />
sense, and it empowers our team." <strong>NC</strong><br />
34 NETWORKcomputing FEBRUARY/MARCH <strong>2023</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
Performance Redefined<br />
Introducing 15 New Server Families That Redefine Modern Workload Performance With<br />
4 th Gen Intel ® Xeon ® Scalable Processors (formerly codenamed Sapphire Rapids)<br />
Learn More at www.supermicro.com/X13