Simplivity attacks the ‘unbearable complexity’ of IT

Hyperconvergence is a relatively new buzzword but Westborough, Mass.,-based Simplivity is already boasting of creating version 3.0 of this emerging IT model. In this installment of the IDG CEO Interview Series, Simplivity CEO Doron Kempel talked with IDG US Media Chief Content Officer John Gallant about how Simplivity’s OmniStack outperforms competitors like Nutanix and claims customers deploying workloads on Simplivity can save 22% to nearly 50% compared to running them on Amazon Web Services. Kempel also talked about Simplivity’s partnerships with Cisco, VMware and Lenovo and explored why it took nearly four years to bring the company’s vision of hyperconvergence to reality. To read this article in full or to leave a comment, please click here(Insider Story)

A Russian hacker gave away millions of email credentials for social media votes

Tens of millions of stolen credentials for Gmail, Microsoft and Yahoo email accounts are being shared online by a young Russian hacker known as "the Collector" as part of a supposed larger trove of 1.17 billion records.That's according to Hold Security, which says it has looked at more than 272 million unique credentials so far, including 42.5 million it had never seen before. A majority of the accounts reportedly were stolen from users of Mail.ru, Russia's most popular email service, but credentials for other services apparently were also included.Hold discovered the breach when its researchers came across the hacker bragging in an online forum. Though the hacker initially asked Hold for 50 rubles for the initial 10GB stash -- that's equivalent to about 75 cents -- he eventually turned it over to them in exchange for likes and votes for him on social media.To read this article in full or to leave a comment, please click here

A Russian hacker gave away millions of email credentials for social media votes

Tens of millions of stolen credentials for Gmail, Microsoft and Yahoo email accounts are being shared online by a young Russian hacker known as "the Collector" as part of a supposed larger trove of 1.17 billion records.That's according to Hold Security, which says it has looked at more than 272 million unique credentials so far, including 42.5 million it had never seen before. A majority of the accounts reportedly were stolen from users of Mail.ru, Russia's most popular email service, but credentials for other services apparently were also included.Hold discovered the breach when its researchers came across the hacker bragging in an online forum. Though the hacker initially asked Hold for 50 rubles for the initial 10GB stash -- that's equivalent to about 75 cents -- he eventually turned it over to them in exchange for likes and votes for him on social media.To read this article in full or to leave a comment, please click here

A Russian hacker gave away millions of email credentials for social media votes

Tens of millions of stolen credentials for Gmail, Microsoft and Yahoo email accounts are being shared online by a young Russian hacker known as "the Collector" as part of a supposed larger trove of 1.17 billion records.That's according to Hold Security, which says it has looked at more than 272 million unique credentials so far, including 42.5 million it had never seen before. A majority of the accounts reportedly were stolen from users of Mail.ru, Russia's most popular email service, but credentials for other services apparently were also included.Hold discovered the breach when its researchers came across the hacker bragging in an online forum. Though the hacker initially asked Hold for 50 rubles for the initial 10GB stash -- that's equivalent to about 75 cents -- he eventually turned it over to them in exchange for likes and votes for him on social media.To read this article in full or to leave a comment, please click here

A Russian hacker gave away millions of email credentials for social media votes

Tens of millions of stolen credentials for Gmail, Microsoft and Yahoo email accounts are being shared online by a young Russian hacker known as "the Collector" as part of a supposed larger trove of 1.17 billion records.That's according to Hold Security, which says it has looked at more than 272 million unique credentials so far, including 42.5 million it had never seen before. A majority of the accounts reportedly were stolen from users of Mail.ru, Russia's most popular email service, but credentials for other services apparently were also included.Hold discovered the breach when its researchers came across the hacker bragging in an online forum. Though the hacker initially asked Hold for 50 rubles for the initial 10GB stash -- that's equivalent to about 75 cents -- he eventually turned it over to them in exchange for likes and votes for him on social media.To read this article in full or to leave a comment, please click here

The Future of SharePoint is All About You

This morning (May 4, 2016), I had the pleasure of being in San Francisco for Microsoft’s “Future of SharePoint” event, which coincided with the general availability date for SharePoint 2016. This is the second time I’ve been in San Francisco for a major SharePoint event. The last time was in 2003, for the launch of SharePoint 2003. It’s amazing how far things have come in the past 13 years! The future of SharePoint is now – and the future is all about you and me – and making it easier to connect and collaborate and get work done in a way that brings the information we need to make key decisions to the places we need it, in the format we need it in, and on the device we are currently using. The future of SharePoint is all about people – and there should be no doubt that Microsoft is continuing to invest in providing great people experiences with SharePoint. While I am super focused on user experiences in SharePoint, and Microsoft has shown users a whole lotta love in the announcements today, developers are going to be pretty happy too – along with the folks focused on security and Continue reading

Interop: NBase-T makes “low-speed” Ethernet splash

LAS VEGAS --The growing number of vendors supporting 2.5 and 5 Gigabit Ethernet over twisted pair copper cabling demonstrated the interoperability of a variety of new gear at the Interop event here.The NBase-T Alliance showed off an assortment of 2.5 and 5GBase-T products – from switches to NICs -- it says show new applications for NBase-T products, including the ability to aggregate data at 2.5G and 5G Ethernet data across 802.11ac Wave2 access points and improved speed links to network-attached storage devices. The Alliance noted that Dell’Oro Group predicted recently that there will be a doubling of ports shipped every year in the 2.5G and 5G Ethernet market over the next 3 years.To read this article in full or to leave a comment, please click here

Interop: NBase-T makes “low-speed” Ethernet splash

LAS VEGAS --The growing number of vendors supporting 2.5 and 5 Gigabit Ethernet over twisted pair copper cabling demonstrated the interoperability of a variety of new gear at the Interop event here.The NBase-T Alliance showed off an assortment of 2.5 and 5GBase-T products – from switches to NICs -- it says show new applications for NBase-T products, including the ability to aggregate data at 2.5G and 5G Ethernet data across 802.11ac Wave2 access points and improved speed links to network-attached storage devices. The Alliance noted that Dell’Oro Group predicted recently that there will be a doubling of ports shipped every year in the 2.5G and 5G Ethernet market over the next 3 years.To read this article in full or to leave a comment, please click here

Interop: NBase-T makes “low-speed” Ethernet splash

LAS VEGAS --The growing number of vendors supporting 2.5 and 5 Gigabit Ethernet over twisted pair copper cabling demonstrated the interoperability of a variety of new gear at the Interop event here.The NBase-T Alliance showed off an assortment of 2.5 and 5GBase-T products – from switches to NICs -- it says show new applications for NBase-T products, including the ability to aggregate data at 2.5G and 5G Ethernet data across 802.11ac Wave2 access points and improved speed links to network-attached storage devices. The Alliance noted that Dell’Oro Group predicted recently that there will be a doubling of ports shipped every year in the 2.5G and 5G Ethernet market over the next 3 years.To read this article in full or to leave a comment, please click here

Storage Performance Models Highlight Burst Buffers at Scale

For storage at scale, particularly for large scientific computing centers, burst buffers have become a hot topic for both checkpoint and application performance reasons. Major vendors in high performance computing have climbed on board and we will be seeing a new crop of big machines featuring burst buffers this year to complement the few that have already emerged.

The what, why, and how of burst buffers can be found in our interview with the inventor of the concept, Gary Grider at Los Alamos National Lab. But for centers that have already captured the message and are looking for the

Storage Performance Models Highlight Burst Buffers at Scale was written by Nicole Hemsoth at The Next Platform.

iPhone the most influential gadget of all time

When Steve Jobs first introduced the iPhone in 2007, he boldly exclaimed that it was a leapfrog product that was five years ahead of anything else on the market. And though Jobs was sometimes prone to hyperbole, his remarks about the iPhone were spot-on.Looking back, it's fair to say that Android didn't come close to reaching parity with the iPhone until about 2011 or 2012. Suffice it to say, the iPhone was a revolutionary device that completely changed the way the world interacts with technology.Not only did it quite literally put the internet in the pockets of millions of consumers, but it also ushered in the era of mobile apps—yet again changing the way consumers interact with technology. Today, I can use my iPhone to play games, listen to music, write reports, email with friends, pay for items at any number of stores, order food, track my exercise and much, much more. To read this article in full or to leave a comment, please click here