Over the past year, questions about how emerging technologies will impact employment have taken on a new tenor. Will robots take over our jobs? One thing is indisputable: automation and artificial intelligence (AI) will displace workers in the IT and business process outsourcing services industry.
But this is not a new trend.
+ Also on Network World: The 6 hottest new jobs in IT +
Such tectonic shifts have occurred every few decades over the last two centuries. With each wave of new technology and each accompanying paradigm shift, jobs have disappeared. During the Industrial Revolution, people feared the loss of farm jobs. When industrial jobs went away, people flocked to the service sector. Then computers, telecom networks, ATMs and the internet made their way into the world, and people feared massive job loss in this sector. Manufacturing work moved to low-cost countries, such as China and Taiwan, and service-sector jobs soon moved to India and the Philippines.
To read this article in full or to leave a comment, please click here
Neutron networking open-source options are expanding for OpenStack, but users are still relying heavily on proprietary network virtualization solutions.
This is the second blog post in our Micro-segmentation Defined – NSX Securing “Anywhere” blog series. This blog post walks through security requirements that exist in environments with mixed workload deployment types. A mixed workload environment is one utilizing multiple application deployment models, including applications deployed on both virtual machines and legacy physical servers. We demonstrate how the necessary security requirements for mixed workload environments can be met through using VMware NSX as a platform for micro-segmentation and advanced security services. This blog focuses on the following:
Security Requirements Differ in Heterogeneous Environments
Due to the evolving threat landscape and growing sophistication of cyber-attacks and threat actors, a single static policy or blanket approach to securing modern data centers is no longer adequate. These types of policies are difficult to manage and take a narrow-focused approach to what needs to be a much broader solution. Today’s private cloud environments are comprised of a variety of workloads and deployment models, whether it be Continue reading