Artificial Intelligence and the Future of Jobs

My role here at SAP is IoT Evangelist. It’s my job to go around and speak about how the Internet of Things is changing the way we live, work, and run our businesses. IoT Evangelist is a job title that didn’t exist 5 or 10 years ago – mainly because the Internet of Things wasn’t a “thing” 5 or 10 years ago. Today it is, so here I am. The fact is, technological change has a tremendous impact on the way we spend our working lives. Many of today’s jobs didn’t exist in the past. Of course, the reverse is true as well: a lot of jobs – mostly tedious/manual labor of some variety, think miners, lift operators, or similar – have gone away.

Spotlight

LTI Information Technology

LTI-IT provides technological solutions to help achieve your business goals and to alleviate the fear associated with applying technical solutions. Working closely with our clients, we use our extensive experience and certification to design, implement, and optimize a network of any size and complexity, and to support internal IT staff in obtaining the knowledge required to truly understand their network.

OTHER ARTICLES
Virtual Desktop Strategies, Server Hypervisors

Virtual Machine Security Risks and Mitigation in Cloud Computing

Article | April 27, 2023

Analyzing risks and implementing advanced mitigation strategies: Safeguard critical data, fortify defenses, and stay ahead of emerging threats in the dynamic realm of virtual machines in cloud. Contents 1. Introduction 2. 10 Security Risks Associated with Virtual Machines in Cloud Computing 3. Best Practices to Avoid Security Compromise 4. Conclusion 1. Introduction Cloud computing has revolutionized the way businesses operate by providing flexible, scalable, and cost-effective infrastructure for running applications and services. Virtual machines (VMs) are a key component of cloud computing, allowing multiple virtual machines to run on a single physical machine. However, the use of virtual machines in cloud computing introduces new security risks that need to be addressed to ensure the confidentiality, integrity, and availability of data and services. Effective VM security in the cloud requires a comprehensive approach that involves cloud providers and users working together to identify and address potential virtual machine security threats. By implementing these best practices and maintaining a focus on security, cloud computing can provide a secure and reliable platform for businesses to run their applications and services. 2. 10 Security Risks Associated with Virtual Machines in Cloud Computing Denial of Service (DoS) attacks: These are attacks that aim to disrupt the availability of a VM or the entire cloud infrastructure by overwhelming the system with traffic or resource requests. Insecure APIs: Cloud providers often expose APIs that allow users to manage their VMs. If these APIs are not properly secured, attackers can exploit them to gain unauthorized access to VMs or manipulate their configurations. Data leakage: Virtual machines can store sensitive data such as customer information or intellectual property. If not secured, this data can be exposed to unauthorized access or leakage. Shared resources: VMs in cloud environments often share physical resources such as memory, CPU, and network interfaces. If these resources are not isolated, a compromised VM can potentially affect the security and performance of other VMs running on the same physical host. Lack of visibility: Virtual machines in cloud environments can be more difficult to monitor than physical machines. This can make it harder to detect security incidents or anomalous behavior. Insufficient logging and auditing: If cloud providers do not implement appropriate logging and auditing mechanisms, it can be difficult to determine the cause and scope of a security incident. VM escape: This is when an attacker gains access to the hypervisor layer and then escapes into the host operating system or other VMs running on the same physical host. Side-channel attacks: This is when an attacker exploits the physical characteristics of the hardware to gain unauthorized access to a VM. Examples of side-channel attacks include timing attacks, power analysis attacks, and electromagnetic attacks. Malware attacks: VMs can be infected with malware, just like physical machines. Malware can be used to steal data, launch attacks on other VMs or systems, or disrupt the functioning of the VM. Insider threats: Malicious insiders can exploit their access to VMs to steal data, modify configurations, or launch attacks. 3. Best Practices to Avoid Security Compromise To mitigate these risks, there are several virtual machine security guidelines that cloud service providers and users can follow: Keep software up-to-date: Regularly updating software and security patches for virtual machines is crucial in preventing known vulnerabilities from being exploited by hackers. Software updates fix bugs and security flaws that could allow unauthorized access, data breaches, or malware attacks. According to a study, 60% of data breaches are caused by vulnerabilities that were not patched or updated in a timely manner.(Source: Ponemon Institute) Use secure hypervisors: A hypervisor is a software layer that enables multiple virtual machines to run on a single physical server. Secure hypervisors are designed to prevent unauthorized access to virtual machines and protect them from potential security threats. When choosing a hypervisor, it is important to select one that has undergone rigorous testing and meets industry standards for security. In 2018, a group of researchers discovered a new type of attack called "Foreshadow" (also known as L1 Terminal Fault). The attack exploits vulnerabilities in Intel processors and can be used to steal sensitive data from virtual machines running on the same physical host. Secure hypervisors that have implemented hardware-based security features can provide protection against Foreshadow and similar attacks. (Source: Foreshadow) Implement strong access controls: Access control is the practice of restricting access to virtual machines to authorized users. Multi-factor authentication adds an extra layer of security by requiring users to provide more than one type of authentication method before accessing VMs. Strong access controls limit the risk of unauthorized access and can help prevent data breaches. According to a survey, organizations that implemented multi-factor authentication saw a 98% reduction in the risk of phishing-related account breaches. (Source: Duo Security) Monitor VMs for anomalous behavior: Monitoring virtual machines for unusual or unexpected behavior is an essential security practice. This includes monitoring network traffic, processes running on the VM, and other metrics that can help detect potential security incidents. By monitoring VMs, security teams can detect and respond to security threats before they can cause damage. A study found that 90% of organizations that implemented a virtualized environment experienced security benefits, such as improved visibility into security threats and faster incident response times. (Source: VMware) Use Encryption: Encryption is the process of encoding information in such a way that only authorized parties can access it. Encrypting data both in transit and at rest protects it from interception or theft by hackers. This can be achieved using industry-standard encryption protocols and technologies. According to a report by, the average cost of a data breach in 2020 was $3.86 million. The report also found that organizations that implemented encryption had a lower average cost of a data breach compared to those that did not (Source: IBM) Segregate VMs: Segregating virtual machines is the practice of keeping sensitive VMs separate from less sensitive ones. This reduces the risk of lateral movement, which is when a hacker gains access to one VM and uses it as a stepping stone to gain access to other VMs in the same environment. Segregating VMs helps to minimize the risk of data breaches and limit the potential impact of a security incident. A study found that organizations that implemented a virtualized environment without adequate segregation and access controls were more vulnerable to VM security breaches and data loss. (Source: Ponemon Institute) Regularly Back-up VMs: Regularly backing up virtual machines is a critical security practice that can help mitigate the impact of malware attacks, system failures, or other security incidents. Backups should be stored securely and tested regularly to ensure that they can be restored quickly in the event of a security incident. A survey conducted found that 42% of organizations experienced a data loss event in 2020 with the most common cause being accidental deletion by an employee (29%). (Source: Veeam) 4. Conclusion The complexity of cloud environments and the shared responsibility model for security require organizations to adopt a comprehensive security approach that spans multiple infrastructure layers, from the physical to the application layer. The future of virtual machine security concern in cloud computing will require continued innovation and adaptation to new threats and vulnerabilities. As a result, organizations must remain vigilant and proactive in their security efforts, leveraging the latest technologies and best practices to protect their virtual machines, the sensitive data and resources they contain.

Read More
Virtual Desktop Tools, Server Hypervisors

Why Are Businesses Tilting Towards VDI for Remote Employees?

Article | June 8, 2023

Although remote working or working from home became popular during the COVID era, did you know that the technology that gives the best user experience (UX) for remote work was developed more than three decades ago? Citrix was founded in 1989 as one of the first software businesses to provide the ability to execute any program on any device over any connection. In 2006, VMware coined the term "virtual desktop infrastructure (VDI)" to designate their virtualization products. Many organizations created remote work arrangements in response to the COVID-19 pandemic, and the phenomenon will continue even in 2022. Organizations have used a variety of methods to facilitate remote work over the years. For businesses, VDI has been one of the most effective, allowing businesses to centralize their IT resources and give users remote access to a consolidated pool of computing capacity. Reasons Why Businesses Should Use VDI for their Remote Employees? Companies can find it difficult to scale their operations and grow while operating remotely. VDI, on the other hand, can assist in enhancing these efforts by eliminating some of the downsides of remote work. Device Agnostic As long as employees have sufficient internet connectivity, virtual desktops can accompany them across the world. They can use a tablet, phone, laptop, client side, or Mac to access the virtual desktop. Reduced Support Costs Since VDI setups can often be handled by a smaller IT workforce than traditional PC settings, support expenses automatically go down. Enhanced Security Data security is raised since data never leaves the datacenter. There's no need to be concerned about every hard disk in every computer containing sensitive data. Nothing is stored on the end machine while using the VDI workspace. It also safeguards intellectual property while dealing with contractors, partners, or a worldwide workforce. Comply with Regulations With virtual desktops, organizational data never leaves the data center. Remote employees that have regulatory duties to preserve client/patient data like function because there is no risk of data leaking out from a lost or stolen laptop or retired PC. Enhanced User Experience With a solid user experience (UX), employees can work from anywhere. They can connect to all of their business applications and tools from anywhere they want to call your workplace, exactly like sitting at their office desk, and even answer the phone if they really want to. Closing Lines One of COVID-19's lessons has been to be prepared for almost anything. IT leaders were probably not planning their investments with a pandemic in mind. Irrespective of how the pandemic plays out in the future, the rise of remote work is here to stay. If VDI at scale is to become a permanent feature of business IT strategies, now is the moment to assess where, when, and how your organization can implement the appropriate solutions. Moreover, businesses that use VDI could find that the added flexibility extends their computing refresh cycles.

Read More
Virtual Desktop Tools, Virtual Desktop Strategies

Network Virtualization: The Future of Businesses and Networks

Article | June 8, 2023

Network virtualization has emerged as the widely recommended solution for the networking paradigm's future. Virtualization has the potential to revolutionize networks in addition to providing a cost-effective, flexible, and secure means of communication. Network virtualization isn't an all-or-nothing concept. It can help several organizations with differing requirements, or it can provide a bunch of new advantages for a single enterprise. It is the process of combining a network's physical hardware into a single, virtual network. This is often accomplished by running several virtual guest machines in software containers on a single physical host system. Network virtualization is indeed the new gold standard for networking, and it is being embraced by enterprises of all kinds globally. By integrating their current network gear into a single virtual network, businesses can reduce operating expenses, automate network and security processes, and lay the groundwork for future growth. Network virtualization also enables organizations to simulate traditional hardware like servers, storage devices, and network resources. The physical network performs basic tasks like packet forwarding, while virtual versions handle more complex activities like networking service management and deployment. Addressing Network Virtualization Challenges Surprisingly, IT teams might encounter network virtualization challenges that are both technical and non-technical in nature. Let's look at some common challenges and discuss how to overcome them. Change in Network Architecture Practically, the first big challenge is shifting from an architecture that depends heavily on routers, switches, and firewalls. Instead, these services are detached from conventional hardware and put on hypervisors that virtualize these operations. Virtualized network services are shared, scaled, and moved as required. Migrating current LANs and data centers to a virtualized platform require careful planning. This migration involves the following tasks: Determine how much CPU, computation, and storage resources will be required to run virtualized network services. Determine the optimal approach for integrating network resilience and security services. Determine how the virtualized network services will be implemented in stages to avoid disrupting business operations. The key to a successful migration is meticulous preparation by architects who understand the business's network requirements. This involves a thorough examination of existing apps and services, as well as a clear knowledge of how data should move across the company most effectively. Moreover, a progressive approach to relocation is often the best solution. In this instance, IT teams can make changes to the virtualization platform without disrupting the whole corporate network. Network Visibility Network virtualization has the potential to considerably expand the number of logical technology layers that must collaborate. As a result, traditional network and data center monitoring technologies no longer have insight into some of these abstracted levels. In other circumstances, visibility can be established, but the tools fail to show the information correctly so that network operators can understand it. In either case, deploying and managing modern network visibility technologies is typically the best choice. When an issue arises, NetOps personnel are notified of the specific service layer. Automation and AI The enhanced level of automation and self-service operations that can be built into a platform is a fundamental aspect of network virtualization. While these activities can considerably increase the pace of network upgrades while decreasing management overhead, they need the documentation and implementation of a new set of standards and practices. Understand that prior network architectures were planned and implemented utilizing actual hardware appliances on a hop-by-hop basis. A virtualized network, on the other hand, employs a centralized control plane to govern and push policies to all sections of the network. Changes may occur more quickly in this aspect, but various components must be coordinated to accomplish their roles in harmony. As a result, network teams should move their attention away from network operations that are already automated. Rather, their new responsibility is to guarantee that the core automation processes and AI are in sync in order to fulfill those automated tasks. Driving Competitive Edge with Network Virtualization Virtualization in networking or virtual machines within an organization is not a new trend. Even small and medium businesses have realized the benefits of network virtualization, especially when combined with a hosted cloud service provider. Because of this, the demand for enterprise network virtualization is rising, driving higher end-user demands and the proliferation of devices and business tools. These network virtualization benefits can help boost business growth and gain a competitive edge. Gaining a Competitive Edge: Network Virtualization Benefits Cost-Savings on Hardware Faster Desktop and Server Provisioning and Deployment Improved Data Security and Disaster Recovery Increasing IT Operational Efficiency Small Footprint and Energy Saving Network Virtualization: The Path to Digital Transformation Business is at the center of digital transformation, but technology is needed to make it happen. Integrated clouds, highly modern data centers, digital workplaces, and increased data center security are all puzzle pieces, and putting them all together requires a variety of various products and services that are deployed cohesively. The cloud revolution is still having an influence on IT, transforming how digital content is consumed and delivered. This should come as no surprise that such a shift has influenced how we feel about current networking. When it boils down to it, the purpose of digital transformation for every company, irrespective of industry, is the same: to boost the speed with which you can respond to market changes and evolving business needs; to enhance your ability to embrace and adapt to new technology, and to improve overall security. As businesses realize that the underlying benefit of cloud adoption and enhanced virtualization isn't simply about cost savings, digital strategies are evolving, becoming more intelligent and successful in the process. Network virtualization is also a path toward the smooth digital transformation of any business. How does virtualization help in accelerating digital transformation? Combining public and private clouds, involving hardware-based computing, storage, and networking software definition. A hyper-converged infrastructure that integrates unified management with virtualized computing, storage, and networking could be included. Creating a platform for greater productivity by providing the apps and services consumers require when and when they utilize them. This should include simplifying application access and administration as well as unifying endpoint management. Improving network security and enhancing security flexibility to guarantee that quicker speed to market is matched by tighter security. Virtualization will also help businesses to move more quickly and safely, bringing products—and profits—to market faster. Enhancing Security with Network Virtualization Security has evolved as an essential component of every network architecture. However, since various areas of the network are often segregated from one another, it might be challenging for network teams to design and enforce network virtualization security standards that apply to the whole network. Zero trust can integrate such network parts and their accompanying virtualization activities. Throughout the network, the zero-trust architecture depends on the user and device authentication. If LAN users wish to access data center resources, they must first be authenticated. The secure connection required for endpoints to interact safely is provided by a zero-trust environment paired with network virtualization. To facilitate these interactions, virtual networks can be ramped up and down while retaining the appropriate degree of traffic segmentation. Access policies, which govern which devices can connect with one another, are a key part of this process. If a device is allowed to access a data center resource, the policy should be understood at both the WAN and campus levels. Some of the core network virtualization security features are: Isolation and multitenancy are critical features of network virtualization. Segmentation is related to isolation; however it is utilized in a multitier virtual network. A network virtualization platform's foundation includes firewalling technologies that enable segmentation inside virtual networks. Network virtualization enables automatic provisioning and context-sharing across virtual and physical security systems. Investigating the Role of Virtualization in Cloud Computing Virtualization in the cloud computing domain refers to the development of virtual resources (such as a virtual server, virtual storage device, virtual network switch, or even a virtual operating system) from a single resource of its type that also shows up as several personal isolated resources or environments that users can use as a separate individual physical resource. Virtualization enables the benefits of cloud computing, such as ease of scaling up, security, fluid or flexible resources, and so on. If another server is necessary, a virtual server will be immediately created, and a new server will be deployed. When we need more memory, we increase the virtual server configurations we currently have, and we now have the extra RAM we need. As a result, virtualization is the underlying technology of the cloud computing business model. The Benefits of Virtualization in Cloud Computing: Efficient hardware utilization Virtualization improves availability Disaster recovery is quick and simple Energy is saved by virtualization Setup is quick and simple Cloud migration has become simple Motivating Factors for the Adoption of Network Virtualization Demand for enterprise networks continues to climb, owing to rising end-user demands and the proliferation of devices and business software. Thanks to network virtualization, IT companies are gaining the ability to respond to shifting demands and match their networking capabilities with their virtualized storage and computing resources. In fact, according to a recent SDxCentral report, 88% of respondents believe it is "important" or "mission critical" to implement a network virtualization software over the next two to five years. Virtualization is also an excellent alternative for businesses that employ outsourced IT services, are planning mergers or acquisitions or must segregate IT teams owing to regulatory compliance. Reasons to Adopt Network Virtualization: A Business Needs Speed Security Requirements Are Rising Apps can Move Around Micro-segmentation IT Automation and Orchestration Reduce Hardware Dependency and CapEx: Adopt Multi-Tenancy Cloud Disaster Recovery mproved Scalability Wrapping-Up Network virtualization and cloud computing are emerging technologies of the future. As CIOs get actively involved in organizational systems, these new concepts will be implemented in more businesses. As consumer demand for real-time services expands, businesses will be driven to explore network virtualization as the best way to take their networks to the next level. The networking future is here. FAQ Why is network virtualization important for business? By integrating their current network gear into a single virtual network, businesses can reduce operating expenses, automate network and security processes, and set the stage for future growth. Where is network virtualization used? Network virtualization can be utilized in application development and testing to simulate hardware and system software realistically. Network virtualization in application performance engineering allows for the modeling of connections among applications, services, dependencies, and end users for software testing. How does virtualization work in cloud computing? Virtualization, in short, enables cloud providers to provide users alongside existing physical computer infrastructure. As a simple and direct process, it allows cloud customers to buy only the computing resources they require when they want them and to maintain those resources cost-effectively as the demand grows.

Read More

How virtualization helped Dell make a pandemic pivot

Article | April 14, 2021

Danny Cobb, fellow and vice president of engineering for Dell Technologies’ telco systems business, remembers his company cruising into early 2020: Kicking off a new fiscal year with its operating plan in place, supply chain nailed down and factories humming; people coming into the office each day to the usual routine of looking for parking spots and taking laptops down to the cafeteria. Then came March, and the first wave of the Covid-19 pandemic hit U.S. shores. In the course of one weekend, Dell pivoted to having more than 90% of its workforce working from home. That meant a dramatic shift in its network needs and operations – one that was only able to be accomplished so quickly because of virtualized infrastructure.

Read More

Spotlight

LTI Information Technology

LTI-IT provides technological solutions to help achieve your business goals and to alleviate the fear associated with applying technical solutions. Working closely with our clients, we use our extensive experience and certification to design, implement, and optimize a network of any size and complexity, and to support internal IT staff in obtaining the knowledge required to truly understand their network.

Related News

VMware

Lenovo Enhances Deep Partnership With VMware, Introducing New Edge-to-Cloud and AI Solutions

Lenovo | October 22, 2021

Lenovo Infrastructure Solutions Group (ISG) introduced new, first-to-market edge-to-cloud and AI solutions in partnership with VMware that provide massive scalability and enable business agility for VMware environments. At VMworld 2021, Lenovo showcased how businesses of all sizes can address the demand for a more agile IT infrastructure in response to business changes. Additionally, Lenovo highlighted the continued expansion of its Lenovo TruScale as-a-Service hybrid cloud solutions. New ThinkAgile VX Solution for SAP HANA and Enhanced ThinkAgile VX Integrated System Lenovo unveils the industry’s most scalable, vSAN-certified SAP HANA solution for HCI environments with its 8-Socket, ThinkAgile VX Certified Node. Running SAP applications in the cloud while keeping control of data is critical in today's hybrid cloud world. Working with SAP and VMware, Lenovo provides a massively scalable SAP HANA certified on VMware vSAN ReadyNode solution. Lenovo’s 12 TB 8S VX solution provides management simplicity, greater scalability, and cost savings, enabling enterprise customers with large SAP HANA databases to leverage hyper-converged infrastructure for their SAP HANA platform. Lenovo’s updated ThinkAgile VX Integrated System, fully integrated with vSphere Lifecycle Manager (VLCM), provides significant TCO savings for the customer’s vSAN environment. The newly enhanced ThinkAgile VX Integrated System provides operational transparency via simplified deployment to proactively monitor and manage cluster health and uptime. With zero touch automated updates and built-in intelligence for configuration setting, customers can experience 75% reduction in time to deploy vSAN. This smarter HCI solution provides greater intelligence, automation, agility and simplicity, enabling customers with more efficient hybrid cloud operations and management. Artificial Intelligence is Transforming Enterprises Lenovo delivers an expanded portfolio of ThinkSystem servers, designed for Analytics and AI workloads with NVIDIA AI Enterprise and VMware vSphere 7. The optimized Lenovo ThinkSystem AI-ready servers provide best-in-class performance for AI workloads – delivering up to 20x performance improvement over previous generation systems. Customers in manufacturing, retail, finance, healthcare and other industries, can deploy with confidence and scale without compromise. Expanding Lenovo TruScale Portfolio for VMware Recently announced at Lenovo Tech World 2021, Lenovo TruScale Hybrid Cloud with VMware HCI is a hyperconverged infrastructure cluster solution that hosts virtualized workloads and their storage in a hybrid environment that combines the security of on-premises infrastructure with cloud services. With this turn-key hybrid-cloud solution based on Lenovo's best-in-class ThinkAgile VX Integrated System HCI platform and industry-leading VMware Cloud Foundation full stack HCI software, enterprise customers can now benefit from a managed as-a-Service hybrid cloud for running their business applications, while leveraging a consumption-based price model. With this solution, Lenovo will become a VMware Cloud Provider Partner (VCPP), offering VMware Cloud Verified solutions. With VMware SaaS solutions included in our everything-as-a-service portfolio, Lenovo provides full as-a-service and software subscription consumption models for customers transitioning from perpetual license models to consumption models, but doing so at their own pace. To help customers implement local, hybrid, or multi-cloud solutions with optimal agility and flexibility, Lenovo is committed to delivering its everything-as-a-Service model from the device to the data center, from edge-to-cloud, while leveraging its global partner ecosystem and channel-first commitment. Extending Lenovo TruScale as-a-Service solutions, delivering Edge innovations, massively scalable SAP HANA on vSAN, Enterprise-Ready AI, and a new, game changing ThinkAgile VX appliance highlight the power of what Lenovo and VMware are doing together to help our customers transform their business for the next reality. LENOVO, TruScale, ThinkSystem and ThinkAgile are trademarks of Lenovo. VMware, VMworld, VMware vSAN, and vSAN ReadyNode are registered trademarks or trademarks of VMware, Inc. or its subsidiaries in the United States and other jurisdictions. NVIDIA is a trademark of NVIDIA Corporation. Inc. About Lenovo Lenovo is a US$60 billion revenue Fortune Global 500 company serving customers in 180 markets around the world. Focused on a bold vision to deliver smarter technology for all, we are developing world-changing technologies that power (through devices and infrastructure) and empower (through solutions, services, and software) millions of customers every day and together create a more inclusive, trustworthy, and sustainable digital society for everyone, everywhere.

Read More

SAP and Customers Innovate New Ways for Industry-Specific Parts Planning

SAP | September 10, 2019

These are the result of SAP’s intelligent supply chain for assets customer initiative, which brought together SAP and more than 45 customers to co-innovate in this mission-critical area. The announcement was made at the North American Supply Chain Executive Summit in Chicago.“Every business leader I meet is looking for new ways to procure, manage and maintain aging assets to ultimately deliver on the desires of their customers,” said Franz Hero, SAP senior vice president, Digital Supply Chain Development. “With this initiative, we went straight to the source, working directly with our valued customers to explore new techniques and come up with real-world answers. Together, we’ve found a fresh approach to supply-chain planning and asset management to benefit everyone.”The customer collaboration yielded two main scenarios that existing and new customers can take advantage of to help them plan spare parts to enhance these scenarios as part of SAP’s strategy for digital supply chain.

Read More

SAP Launches New Accelerator Program in Munich

SAP | September 16, 2019

SAP.iO Foundry Munich is part of SAP’s innovation strategy and is designed to provide the startups with access to curated mentorship, exposure to SAP technology and application programmable interfaces (APIs), and opportunities to collaborate with SAP customers.The startups in the Munich cohort were selected based on their ability to: Enhance customer experiences in commerce and marketing. Apply emerging technologies, such as machine learning, artificial intelligence, the Internet of Things (IoT) and augmented reality, that unlock enterprise data and drive outsized outcomes. Acquire customers and show readiness to scale.“The SAP.iO expansion to Munich is a signature commitment to the German startup ecosystem,” said Deepak Krishnamurthy, SAP chief strategy and transformation officer. “We will empower the startups to deliver value to our customers and, at the same time, build a compelling ecosystem around SAP C/4HANA and customer experience solutions.”

Read More

VMware

Lenovo Enhances Deep Partnership With VMware, Introducing New Edge-to-Cloud and AI Solutions

Lenovo | October 22, 2021

Lenovo Infrastructure Solutions Group (ISG) introduced new, first-to-market edge-to-cloud and AI solutions in partnership with VMware that provide massive scalability and enable business agility for VMware environments. At VMworld 2021, Lenovo showcased how businesses of all sizes can address the demand for a more agile IT infrastructure in response to business changes. Additionally, Lenovo highlighted the continued expansion of its Lenovo TruScale as-a-Service hybrid cloud solutions. New ThinkAgile VX Solution for SAP HANA and Enhanced ThinkAgile VX Integrated System Lenovo unveils the industry’s most scalable, vSAN-certified SAP HANA solution for HCI environments with its 8-Socket, ThinkAgile VX Certified Node. Running SAP applications in the cloud while keeping control of data is critical in today's hybrid cloud world. Working with SAP and VMware, Lenovo provides a massively scalable SAP HANA certified on VMware vSAN ReadyNode solution. Lenovo’s 12 TB 8S VX solution provides management simplicity, greater scalability, and cost savings, enabling enterprise customers with large SAP HANA databases to leverage hyper-converged infrastructure for their SAP HANA platform. Lenovo’s updated ThinkAgile VX Integrated System, fully integrated with vSphere Lifecycle Manager (VLCM), provides significant TCO savings for the customer’s vSAN environment. The newly enhanced ThinkAgile VX Integrated System provides operational transparency via simplified deployment to proactively monitor and manage cluster health and uptime. With zero touch automated updates and built-in intelligence for configuration setting, customers can experience 75% reduction in time to deploy vSAN. This smarter HCI solution provides greater intelligence, automation, agility and simplicity, enabling customers with more efficient hybrid cloud operations and management. Artificial Intelligence is Transforming Enterprises Lenovo delivers an expanded portfolio of ThinkSystem servers, designed for Analytics and AI workloads with NVIDIA AI Enterprise and VMware vSphere 7. The optimized Lenovo ThinkSystem AI-ready servers provide best-in-class performance for AI workloads – delivering up to 20x performance improvement over previous generation systems. Customers in manufacturing, retail, finance, healthcare and other industries, can deploy with confidence and scale without compromise. Expanding Lenovo TruScale Portfolio for VMware Recently announced at Lenovo Tech World 2021, Lenovo TruScale Hybrid Cloud with VMware HCI is a hyperconverged infrastructure cluster solution that hosts virtualized workloads and their storage in a hybrid environment that combines the security of on-premises infrastructure with cloud services. With this turn-key hybrid-cloud solution based on Lenovo's best-in-class ThinkAgile VX Integrated System HCI platform and industry-leading VMware Cloud Foundation full stack HCI software, enterprise customers can now benefit from a managed as-a-Service hybrid cloud for running their business applications, while leveraging a consumption-based price model. With this solution, Lenovo will become a VMware Cloud Provider Partner (VCPP), offering VMware Cloud Verified solutions. With VMware SaaS solutions included in our everything-as-a-service portfolio, Lenovo provides full as-a-service and software subscription consumption models for customers transitioning from perpetual license models to consumption models, but doing so at their own pace. To help customers implement local, hybrid, or multi-cloud solutions with optimal agility and flexibility, Lenovo is committed to delivering its everything-as-a-Service model from the device to the data center, from edge-to-cloud, while leveraging its global partner ecosystem and channel-first commitment. Extending Lenovo TruScale as-a-Service solutions, delivering Edge innovations, massively scalable SAP HANA on vSAN, Enterprise-Ready AI, and a new, game changing ThinkAgile VX appliance highlight the power of what Lenovo and VMware are doing together to help our customers transform their business for the next reality. LENOVO, TruScale, ThinkSystem and ThinkAgile are trademarks of Lenovo. VMware, VMworld, VMware vSAN, and vSAN ReadyNode are registered trademarks or trademarks of VMware, Inc. or its subsidiaries in the United States and other jurisdictions. NVIDIA is a trademark of NVIDIA Corporation. Inc. About Lenovo Lenovo is a US$60 billion revenue Fortune Global 500 company serving customers in 180 markets around the world. Focused on a bold vision to deliver smarter technology for all, we are developing world-changing technologies that power (through devices and infrastructure) and empower (through solutions, services, and software) millions of customers every day and together create a more inclusive, trustworthy, and sustainable digital society for everyone, everywhere.

Read More

SAP and Customers Innovate New Ways for Industry-Specific Parts Planning

SAP | September 10, 2019

These are the result of SAP’s intelligent supply chain for assets customer initiative, which brought together SAP and more than 45 customers to co-innovate in this mission-critical area. The announcement was made at the North American Supply Chain Executive Summit in Chicago.“Every business leader I meet is looking for new ways to procure, manage and maintain aging assets to ultimately deliver on the desires of their customers,” said Franz Hero, SAP senior vice president, Digital Supply Chain Development. “With this initiative, we went straight to the source, working directly with our valued customers to explore new techniques and come up with real-world answers. Together, we’ve found a fresh approach to supply-chain planning and asset management to benefit everyone.”The customer collaboration yielded two main scenarios that existing and new customers can take advantage of to help them plan spare parts to enhance these scenarios as part of SAP’s strategy for digital supply chain.

Read More

SAP Launches New Accelerator Program in Munich

SAP | September 16, 2019

SAP.iO Foundry Munich is part of SAP’s innovation strategy and is designed to provide the startups with access to curated mentorship, exposure to SAP technology and application programmable interfaces (APIs), and opportunities to collaborate with SAP customers.The startups in the Munich cohort were selected based on their ability to: Enhance customer experiences in commerce and marketing. Apply emerging technologies, such as machine learning, artificial intelligence, the Internet of Things (IoT) and augmented reality, that unlock enterprise data and drive outsized outcomes. Acquire customers and show readiness to scale.“The SAP.iO expansion to Munich is a signature commitment to the German startup ecosystem,” said Deepak Krishnamurthy, SAP chief strategy and transformation officer. “We will empower the startups to deliver value to our customers and, at the same time, build a compelling ecosystem around SAP C/4HANA and customer experience solutions.”

Read More

Events