Assessing a technology’s end game: weighing risks vs. benefits | #VTUG

While a product may look great on paper or in a demo, it’s a good idea to consider how much risk is involved. “We have to assume a certain amount of risk on behalf of our customers as we [explore] new technologies,” said Benedict. He explained that organizations need to avoid jumping at technologies just because they are perceived to be the latest and the greatest.

Spotlight

Finisar Corporation (NASDAQ: FNSR)

Finisar Corporation is a global technology leader of fiber optic subsystems and components that enable high-speed voice, video and data communications for networking, storage, wireless, and cable TV applications. For nearly three decades, Finisar has provided critical optics technologies to system manufacturers to meet the increasing demands for network bandwidth.

OTHER ARTICLES
VMware, Vsphere, Hyper-V

Digital Marketplace: The Future of E-commerce

Article | May 2, 2023

It is no surprise that e-commerce has grown dramatically in recent years. I don't want to be boring, but certainly the pandemic and a few other market factors have had a role. From ancient times, marketplaces of all shapes and sizes have served as the foundation for all types of business. As the world transforms and becomes more digital, the rise of digital marketplaces, e-commerce, and other types of online business is exploding. E-commerce marketplace platforms are rapidly expanding in the digital environment and are expected to acquire momentum as the future of e-commerce. This increase is because of the fact that online marketplaces combine user demand and provide customers with a broader selection of products. Digital Marketplaces Are the Way to the Future of E-Commerce Without a doubt, online marketplaces will dominate the e-commerce business in the coming years. According to Coresight Research, marketplace platform revenue will more than double, reaching around $40 billion in 2022. This means that by 2022, online marketplaces will account for 67% of worldwide e-Commerce revenues (Forrester). Today, the issue is not whether you sell online but how far you can reach. E-commerce offers limitless opportunities, and all you need to do is keep pace with the trends. What are you doing right now? How far can you go? Have you already made the transition from local to global? Digital marketplaces are indeed the way of the future of e-commerce. The earlier you realize this and integrate it into your sales and marketing approach, the better. I really mean it. The world is changing, and your competitors are not sleeping. You cannot overlook this trend if you really want to stay ahead. It's all about the people in business, as it has always been. Understanding who you're pitching to is critical to your success. You should be aware. Everything you do in business should get you closer to your target audience. Closing Lines: Digital marketplaces are indeed the future of commerce. People will inevitably start shopping online even more in the future. That implies methods and means will be developed to make such transactions easier for the common individual. Explore how your business might profit from these markets and trends that suggest the future of physical and online shopping.

Read More
Virtual Desktop Tools

Metasploitable: A Platform for Ethical Hacking and Penetration Testing

Article | August 12, 2022

Contents 1. Overview 2. Ethical Hacking and Penetration Testing 3. Metasploit Penetration Test 4. Why Choose Metasploit Framework for your Business? 5. Closing remarks 1. Overview Metasploitable refers to an intentionally vulnerable virtual machine that enables the learning and practice of Metasploit. Metasploit is one of the best penetration testing frameworks that helps businesses discover and shore up their systems' vulnerabilities before hackers exploit them. Security engineers use Metasploit as a penetration testing system and a development platform that allows the creation of security tools and exploits. Metasploit's various user interfaces, libraries, tools, and modules allow users to configure an exploit module, pair it with a payload, point it at a target, and launch it at the target system. In addition, Metasploit's extensive database houses hundreds of exploits and several payload options. 2. Ethical Hacking and Penetration Testing An ethical hacker is one who works within a security framework and checks for bugs that a malicious hacker might use to exploit networks. They use their experience and skills to render the cyber environment. To protect the infrastructure from the threat that hackers pose, ethical hacking is essential. The main purpose of an ethical hacking service is to report and assess the safety of the targeted systems and networks for the owner. Ethical hacking is performed with penetration test techniques to evaluate security loopholes. There are many techniques used to hack information, such as – Information gathering Vulnerability scanning Exploitation Test analysis Ethical hacking involves automatic methods. The hacking process without automated software is inefficient and time-consuming. There are several tools and methods that can be used for ethical hacking and penetration testing. The Metasploit framework eases the effort to exploit vulnerabilities in networks, operating systems, and applications and generates new exploits for new or unknown vulnerabilities. 3. Metasploit Penetration Test Reconnaissance: Integrate Metasploit with various reconnaissance tools to find the vulnerable spot in the system. Threat Modeling and Vulnerability Identification: Once a weakness is identified, choose an exploit and payload for penetration. Exploitation: The payload gets executed at the target if the exploit, a tool used to take advantage of system weakness, is successful, and the user gets a shell for interacting with the payload (a shellcode is a small piece of code used as the payload).The most popular payload, a set of malicious codes to attack Windows systems, is Meterpreter, an in-memory-only interactive shell. (Meterpreter is a Metasploit attack payload that provides an interactive shell for the attacker to explore the target machine and execute code.)Other payloads are: Static payloads (it enables port forwarding and communications between networks) Dynamic payloads (to evade antivirus software, it allows testers to generate unique payloads) Command shell payloads (enables users to run scripts or commands against a host) Post-Exploitation: Metasploit offers various exploitation tools for privilege escalation, packet sniffing, keyloggers, screen capture, and pivoting tools once on the target machine. Resolution and Re-Testing: Users set up a persistent backdoor if the target machine gets rebooted. These available features in Metasploit make it easy to configure as per the user's requirements. 4. Why Choose Metasploit Framework for your Business? Significant advantages of the Metasploit Framework are discussed below: Open-source: Metasploit Framework is actively developed as open-source software, so most companies prefer this to grow their businesses. Easy usage: It is very easy to use, defining an easy-naming conversation with the commands. This also facilitates the building of an extensive penetration test of the network. GUI Environment: It mainly provides third-party instances that are friendly. These interfaces ease the penetration testing projects by providing the facilities with services such as button clicks, over-the-fly vulnerability management, and easy-to-shift workspaces, among others. Cleaner Exits: Metasploit can cleanly exit without detection, even if the target system does not restart after a penetration test. Additionally, it offers various options for maintaining persistent access to the target system. Easy Switching Between Payloads: Metasploit allows testers to change payloads with the 'setpayload' command easily. It offers flexibility for system penetration through shell-based access or meterpreter. 5. Closing remarks From DevSecOps experts to hackers, everyone uses the Ruby-based open-source framework Metasploit, which allows testing via command-line alterations or GUI. Metasploitable is a vulnerable virtual machine ideally used for ethical hacking and penetration testing, in VM security. One trend likely to impact the future of Metasploitable is the increasing use of cloud-based environments for testing and production. It is possible that Metasploitable could be adapted to work in cloud environments or that new tools will be developed specifically for cloud-based penetration testing. Another trend that may impact the future of Metasploitable is the growing importance of automation in security testing. Thus, Metasploitable could be adapted to include more automation features. The future of Metasploitable looks bright as it continues to be a valuable tool for security professionals and enthusiasts. As the security landscape continues to evolve, it will be interesting to see how Metasploitable adapts to meet the community's changing needs.

Read More
Virtual Desktop Tools, Virtual Desktop Strategies

Boosting Productivity with Kubernetes and Docker

Article | June 8, 2023

Learn setting up a Docker and Kubernetes environment with the right considerations and choose the best-suited software from ten leading tools, softwares and platforms for your business needs. Contents The blog discusses how Kubernetes and Docker can boost software development and deployment productivity. In addition, it covers the benefits of the role of Kubernetes in orchestrating containerized applications and best practices for implementing these technologies to improve efficiency and streamline workflows. Docker and Kubernetes are both essential containerization ecosystem utilities. Kubernetes, an excellent DevOps solution, manages and automates containers' deployment and scaling, along with operating across clusters of hosts, whereas Docker is used for creating and operating containers. The blog covers tips to consider while choosing tools/platforms. It further enlists ten platforms providing Kubernetes and Docker, featuring their offerings. 1. Considerations While Setting Up a Development Environment with Kubernetes and Docker 1.1 Fluid app delivery A platform for application development must provide development teams with high velocity. Two factors contribute to high velocity: rapid application delivery and brief development cycles. Application platforms must support build processes that start with source code. The platforms must also facilitate the repetitive deployment of applications on any remote staging instance. 1.2 Polyglot support Consistency is the defining characteristic of an application platform. On-demand, repetitive, and reproducible builds must be supported by the platform. Extending a consistent experience across all languages and frameworks elevates the platform experience. The platform must support a native build process and the ability to develop and customize this build process. 1.3 Baked-in security Containerized environments are secured in a significantly different manner than conventional applications. A fundamental best practice is to utilize binaries compiled with all necessary dependencies. The build procedure should also include a directive to eliminate unnecessary components for the application's operation. Setting up a zero-trust architecture between platform components that orchestrate deployments significantly improves the workloads' security posture. 1.4 Adjustable abstractions A platform with paved paths and the flexibility to accommodate the requirements of software engineering teams has a greater chance of success. Open-source platforms score highly in this regard, particularly those with modular architectures that allow the team to swap out parts as they adjust. 2.Top Tips to Consider While Choosing Tools and Platforms for Kubernetes and Docker 2.1 Production-Readiness Configuring Kubernetes or Docker can be complex and resource-intensive. A production-ready platform will ensure having the necessary fully automated features without the need for configuration. Security is an essential aspect of production readiness. Additionally, automation is critical, as production readiness requires that the solution manage all cluster management duties. Automated backup, recovery, and restore capabilities must be considered. Also, ensure the high availability, scalability, and self-healing of the cluster's platform. 2.2 Future-Readiness As the cloud and software evolve, a system's hosting location may affect its efficacy. The current trend is a multi-cloud strategy. Ensure that the platform can support abstracting from cloud or data center providers and building a shared infrastructure across clouds, cloud regions, and data centers, as well as assist in configuring them if required. According to a recent study, nearly one-third of organizations are already collaborating with four or more cloud service providers. (Source: Microsoft and 451 Research) 2.3 Ease of Administration Managing a Docker or Kubernetes cluster is complex and requires various skill sets. Kubernetes generates a lot of unprocessed data, which must be interpreted to comprehend what's happening with the cluster. Early detection and intervention are crucial to disaster prevention. Identifying a platform that eliminates the issue of analyzing raw data is essential. By incorporating automated intelligent monitoring and alerts, such solutions can provide critical status, error, event, and warning data to take appropriate action. 2.4 Assistance and Training As the organization begins to acquire Kubernetesor Docker skills, it is essential to have a vendor that can provide 24/7 support and training to ensure a seamless transition. Incorrect implementation will add a layer of complexity to infrastructure management. Leverage automation tools that offer the support needed to use Kubernetes and Docker without the management burden. 3. 10 Tools and Platforms Providing Kubernetes and Docker 3.1 Aqua Cloud Native Security Platform: Aqua Security provides the Aqua Cloud Native Security Platform, a comprehensive security solution designed to protect cloud-native applications and microservices. Aqua offers end-to-end security for applications operating on Docker Enterprise Edition (Community Edition), protecting the DevOps pipeline and production workloads with complete visibility and control. It provides end-to-end security across the entire application lifecycle, from development to production, for both containerized and serverless workloads. In addition, it automates prevention, detection, and response across the whole application lifecycle to secure the build, cloud infrastructure, and operating workloads, regardless of where they are deployed. 3.2 Weave Gitops Enterprise Weave GitOps Enterprise, a full-stack, developer-centric operating model for Kubernetes, creates and contributes to several open-source projects. Its products and services enable teams to design, build, and operate their Kubernetes platform at scale. Built by the creators of Flux and Flagger, Weave GitOps allows users to deploy and manage Kubernetes clusters and applications in the public or private cloud or their own data center. Weave GitOps Enterprise helps simplify Kubernetes with fully automated continuous delivery pipelines that roll out changes from development to staging and production. Weaveworks has used Kubernetes in production for over eight years and has developed that expertise into Weave GitOps Enterprise. 3.3 Mirantis Kubernetes Engine Mirantis provides the Mirantis Kubernetes Engine, a platform designed to help organizations deploy, manage, and scale their Kubernetes clusters. It includes features such as container orchestration, automated deployment, monitoring, and high availability, all designed to help organizations build and run their applications at scale. Mirantis Kubernetes Engine also includes a set of tools for managing the lifecycle of Kubernetes clusters, including cluster deployment, upgrades, and patching. It also has security scanning and policy enforcement features, as well as integration with other enterprise IT systems such as Active Directory and LDAP. 3.4 Portworx by Pure Storage Portworx's deep integration into Docker gives Portworx container data services benefits directly through the Docker Swarm scheduler. Swarm service creation brings the management capability of Portworx to the Docker persistent storage layer to avoid complex tasks such as increasing the storage pool without container downtime and problems like stuck EBS drives. Portworx is also a multi-cloud-ready Kubernetes storage and administration platform designed to simplify and streamline data management in Kubernetes. The platform abstracts the complexity of data storage in Kubernetes. Additionally, it serves as a software-defined layer that aggregates Kubernetes nodes' data storage into a virtual reservoir. 3.5 Platform9 Platform9 provides a powerful IDE for developers for simplified in-context views of pods, logs, events, and more. Both development and operations teams can access the information they need in an instant, secured through SSO and Kubernetes RBAC. The industry’s first SaaS-managed approach combined with a best-in-class support and customer success organization with a 99.9% consistent CSAT rating delivers production-ready K8s to organizations of any size. It provides services to deploy a cluster instantly, achieve GitOps faster, and take care of every aspect of cluster management, including remote monitoring, self-healing, automatic troubleshooting, and proactive issue resolution, around the clock. 3.6 Kubernetes Network Security Sysdig provides Kubernetes Network Security, a solution that offers cloud security from source to run. The product provides network security for Kubernetes environments by monitoring and blocking suspicious traffic in real time. It helps organizations protect their Kubernetes clusters against advanced threats and attacks. The product and Sysdig Secure offer Kubernetes Network Monitoring to investigate suspicious traffic and connection attempts, Kubernetes-Native Microsegmentation to enable microsegmentation without breaking the application, and Automated Network Policies to save time by automating Kubernetes network policies. 3.7 Kubernetes Operations Platform for Edge Rafay delivers a production-ready Kubernetes Operations Platform for Edge, streamlining ongoing operations for edge applications. It provides centralized multi-cluster management to deploy, manage, and upgrade all Kubernetes clusters from a single console across all edge nodes. In addition, it offers comprehensive lifecycle management, with which users can quickly and easily provision Kubernetes clusters at the edge, where cluster updates and upgrades are seamless with no downtime. Furthermore, the KMC for Edge quickly integrates with enterprise-class SSO solutions such as Okta, Ping One, and Azure AD, among others. Other features include standardized clusters and workflows, integration and automation, and centralized logging and monitoring. 3.8 Opcito Technologies Opcito provides simplified container management with efficient provisioning, deployment, scaling, and networking. Its application containerization expertise helps containerize existing and new applications and dependencies. Opcito is well-versed in leading container orchestration platforms like Docker Swarm and Kubernetes. While it helps choose the container platform that best suits specific application needs, it also helps with the end-to-end management of containers so clients can release applications faster and focus on innovation and business. The container management and orchestration services include: building secured microservices, Enterprise-scale Container Management and Orchestration, Orchestration, and Container Monitoring. 3.9 D2iQ Kubernetes Platform (DKP) D2iQ (DKP) enables enterprises to take advantage of all the benefits of cloud-native Kubernetes while laying the groundwork for intelligent cloud-native innovation by simplifying Kubernetes deployment and maintenance. It simplifies and automates the most difficult parts of an enterprise Kubernetes deployment across all infrastructures. DKP helps enterprises easily overcome operational barriers and set them up in minutes and hours rather than weeks and months. In addition, DKP simplifies Kubernetes management through automation using GitOps workflow, observability, application catalog, real-time cost management, and more. 3.10 Spektra Spektra, by Diamanti, a multi-cluster management solution for DevOps and production teams, provides centralized multi-cluster management, a single control plane to deliver everything needed to provision and manage the lifecycle of multiple clusters. Spektra is built to cater to business needs, from air-gapped on-prem deployments to hybrid and multi-cloud infrastructures. It also enables stretching resources across different clusters within the tenant. Furthermore, it allows you to move workloads and their associated data from one cluster to another directly from its dashboard. Spektra integrates with lightweight directory access protocols (LDAP) and Active Directory (AD) to enable user authentication and streamline resource access. In addition, it offers application migration, data mobility, and reporting. 4. Conclusion It is evident that Kubernetes and Docker can significantly boost software development and deployment productivity. By adopting appropriate containerization platforms and leveraging Kubernetes for orchestration, organizations can streamline workflows, improve efficiency, and enhance the reliability of their applications. Furthermore, following the tips to choose the tools or platform carefully can further improve productivity.

Read More
Virtual Desktop Tools, Virtual Desktop Strategies

VM Applications for Software Development and Secure Testing

Article | June 8, 2023

Contents 1. Introduction 2. Software Development and Secure Testing 3. Using VMs in Software Development and Secure Testing 4. Conclusion 1. Introduction “Testing is an infinite process of comparing the invisible to the ambiguous in order to avoid the unthinkable happening to the anonymous.” —James Bach. Testing software is crucial for identifying and fixing security vulnerabilities. However, meeting quality standards for functionality and performance does not guarantee security. Thus, software testing nowadays is a must to identify and address application security vulnerabilities to maintain the following: Security of data history, databases, information, and servers Customers’ integrity and trust Web application protection from future attacks VMs provide a flexible and isolated environment for software development and security testing. They offer easy replication of complex configurations and testing scenarios, allowing efficient issue resolution. VMs also provide secure testing by isolating applications from the host system and enabling a reset to a previous state. In addition, they facilitate DevOps practices and streamline the development workflow. 2. Software Development and Secure Testing Software Secure Testing: The Approach The following approaches must be considered while preparing and planning for security tests: Architecture Study and Analysis: Understand whether the software meets the necessary requirements. Threat Classification: List all potential threats and risk factors that must be tested. Test Planning: Run the tests based on the identified threats, vulnerabilities, and security risks. Testing Tool Identification: For software security testing tools for web applications, the developer must identify the relevant security tools to test the software for specific use cases. Test-Case Execution: After performing a security test, the developer should fix it using any suitable open-source code or manually. Reports: Prepare a detailed test report of the security tests performed, containing a list of the vulnerabilities, threats, and issues resolved and the ones that are still pending. Ensuring the security of an application that handles essential functions is paramount. This may involve safeguarding databases against malicious attacks or implementing fraud detection mechanisms for incoming leads before integrating them into the platform. Maintaining security is crucial throughout the software development life cycle (SDLC) and must be at the forefront of developers' minds while executing the software's requirements. With consistent effort, the SDLC pipeline addresses security issues before deployment, reducing the risk of discovering application vulnerabilities while minimizing the damage they could cause. A secure SDLC makes developers responsible for critical security. Developers need to be aware of potential security concerns at each step of the process. This requires integrating security into the SDLC in ways that were not needed before. As anyone can potentially access source code, coding with potential vulnerabilities in mind is essential. As such, having a robust and secure SDLC process is critical to ensuring applications are not subject to attacks by hackers. 3. Using VMs in Software Development and Secure Testing: Snapshotting: Snapshotting allows developers to capture a VM's state at a specific point in time and restore it later. This feature is helpful for debugging and enables developers to roll back to a previous state when an error occurs. A virtual machine provides several operations for creating and managing snapshots and snapshot chains. These operations let users create snapshots, revert to any snapshots in the chain, and remove snapshots. In addition, extensive snapshot trees can be created to streamline the flow. Virtual Networking: It allows virtual machines to be connected to virtual networks that simulate complex network topologies, allowing developers to test their applications in different network environments. This allows expanding data centers to cover multiple physical locations, gaining access to a plethora of more efficient options. This empowers them to effortlessly modify the network as per changing requirements without any additional hardware. Moreover, providing the network for specific applications and needs offers greater flexibility. Additionally, it enables workloads to be moved seamlessly across the network infrastructure without compromising on service, security, or availability. Resource Allocation: VMs can be configured with specific resource allocations such as CPU, RAM, and storage, allowing developers to test their applications under different resource constraints. Maintaining a 1:1 ratio between the virtual machine processor and its host or core is highly recommended. It's crucial to refrain from over-subscribing virtual machine processors to a single core, as this could lead to stalled or delayed events, causing significant frustration and dissatisfaction among users. However, it is essential to acknowledge that IT administrators sometimes overallocate virtual machine processors. In such cases, a practical approach is to start with a 2:1 ratio and gradually move towards 4:1, 8:1, 12:1, and so on while bringing virtual allocation into IT infrastructure. This approach ensures a safe and seamless transition towards optimized virtual resource allocation. Containerization within VMs: Containerization within VMs provides an additional layer of isolation and security for applications. Enterprises are finding new use cases for VMs to utilize their in-house and cloud infrastructure to support heavy-duty application and networking workloads. This will also have a positive impact on the environment. DevOps teams use containerization with virtualization to improve software development flexibility. Containers allow multiple apps to run in one container with the necessary components, such as code, system tools, and libraries. For complex applications, both virtual machines and containers are used together. However, while containers are used for the front-end and middleware, VMs are used for the back-end. VM Templates: VM templates are pre-configured virtual machines that can be used as a base for creating new virtual machines, making it easier to set up development and testing environments. A VM template is an image of a virtual machine that serves as a master copy. It includes VM disks, virtual devices, and settings. By using a VM template, cloning a virtual machine multiple times can be achieved. When you clone a VM from a template, the clones are independent and not linked to the template. VM templates are handy when a large number of similar VMs need to be deployed. They preserve VM consistency. To edit a template, convert it to a VM, make the necessary changes, and then convert the edited VM back into a new template. Remote Access: VMs can be accessed remotely, allowing developers and testers to collaborate more effectively from anywhere worldwide. To manage a virtual machine, follow these steps: enable remote access, connect to the virtual machine, and then access the VNC or serial console. Once connected, full permission to manage the virtual machine is granted with the user's approval. Remote access provides a secure way to access VMs, as connections can be encrypted and authenticated to prevent unauthorized access. Additionally, remote access allows for easier management of VMs, as administrators can monitor and control virtual machines from a central location. DevOps Integration: DevOps is a collection of practices, principles, and tools that allow a team to release software quickly and efficiently. Virtualization is vital in DevOps when developing intricate cloud, API, and SOA systems. Virtual machines enable teams to simulate environments for creating, testing, and launching code, ultimately preserving computing resources. While commencing a bug search at the API layer, teams find that virtual machines are suitable for test-driven development (TDD). Virtualization providers handle updates, freeing up DevOps teams, to focus on other areas and increasing productivity by 50 –60%. In addition, VMs allow for simultaneous testing of multiple release and patch levels, improving product compatibility and interoperability. 4. Conclusion The outlook for virtual machine applications is highly promising in the development and testing fields. With the increasing complexity of development and testing processes, VMs can significantly simplify and streamline these operations. In the future, VMs are expected to become even more versatile and potent, providing developers and testers with a broader range of tools and capabilities to facilitate the development process. One potential future development is integrating machine learning and artificial intelligence into VMs. This would enable VMs to automate various tasks, optimize the allocation of resources, and generate recommendations based on performance data. Moreover, VMs may become more agile and lightweight, allowing developers and testers to spin up and spin down instances with greater efficiency. The future of VM applications for software development and security testing looks bright, with continued innovation and development expected to provide developers and testers with even more powerful and flexible tools to improve the software development process.

Read More

Spotlight

Finisar Corporation (NASDAQ: FNSR)

Finisar Corporation is a global technology leader of fiber optic subsystems and components that enable high-speed voice, video and data communications for networking, storage, wireless, and cable TV applications. For nearly three decades, Finisar has provided critical optics technologies to system manufacturers to meet the increasing demands for network bandwidth.

Related News

VMware

Dialpad Welcomes Prashanti Aduma as Chief Information Officer

Dialpad | January 12, 2022

Dialpad, Inc., the industry leader in AI-powered communication and collaboration, announced the appointment of Prashanti Aduma as the company’s first Chief Information Officer (CIO). With more than 20 years of demonstrated leadership and project management experience at high-growth startups and enterprises, Aduma will play a significant role in advancing the core business systems, data, and security framework in concert with Dialpad’s rapid growth and global scale. Aduma is a transformative leader who brings deep experience in building world-class IT organizations and driving global strategic initiatives to enable next-generation technologies. Aduma joins Dialpad from Salesforce where she served as Senior Director of Enterprise Services. Prior to Salesforce’s acquisition of Vlocity, Aduma served as Vice President of Business Applications at Vlocity and was responsible for the full suite of front and back-office business applications. Aduma has also held leadership positions at Rodan + Fields, SunPower, and VMware where she led the rollout of major IT and engineering initiatives. Work as we know it has been forever changed, driving the need for better methods to connect and collaborate. In order to succeed in this new world, businesses need cloud-first, customer-first solutions that can accommodate all forms of communication. As the only truly unified AI-powered enterprise cloud collaboration platform, Dialpad is uniquely positioned to fill this need. I could not be more thrilled to welcome Prashanti Aduma to the Dialpad executive team as we prepare for a tremendous year ahead. She is an insightful leader with a focus on building strong teams and trusted partnerships throughout the organization and with the external community. We have a huge opportunity in front of us and believe when the right people come together — anything is possible.” Craig Walker, CEO, Dialpad As CIO, Aduma will play a critical role in ensuring the company is well-positioned through its rapid global expansion. Aduma will lead the business technology group which focuses on digital transformation, establishing industry standards and securing end-to-end business processes through next-generation technology roadmaps, data-driven analytics, automations, security, mergers and acquisitions. In her role, Aduma will focus on creating an integrated operating model providing A+ customer service across all business functions. Beyond her technical acumen and work experience, Aduma is passionate about mentorship, promoting empathetic leadership, and encouraging youth in STEM education. “Dialpad has the only AI-powered cloud communications and collaboration platform that spans all modes of contact center, unified communications, distributed meetings, and text and team messaging. I could not be more excited to become a member of the amazing team at this important vector point for the company,” said Prashanti Aduma, Dialpad CIO. “This is the perfect time to embark on the digital transformation journey as we scale globally and get the company ready for the public markets.” About Dialpad Dialpad is the global leader in AI communications for business, transforming how the world works together. Dialpad customers benefit from truly unified business and customer communications, including a cloud business phone system, text and team messaging, video meetings, and the world’s most advanced AI-powered contact center — all in one beautiful app. More than 7,000 innovative brands and millions of people use Dialpad to connect their teams from anywhere including Motorola Solutions, Netflix, T-Mobile, Twitter, Uber and WeWork.

Read More

Server Virtualization

Red Hat Migration Toolkit for Virtualization Makes Cloud-Native Migration an Achievable Reality

Red Hat | June 18, 2021

Red Hat, Inc., the world’s leading provider of open source solutions, announced today the general availability of Red Hat’s migration toolkit for virtualization, which will assist organizations in accelerating available hybrid cloud strategies by making it easier to migrate existing workloads to modern infrastructure in a streamlined, wholesale manner. IT companies may have a faster, more scalable modernization experience while minimizing possible risks and downtime by bringing mission-critical applications based on virtual machines (VMs) to Red Hat OpenShift. As more companies start containers and cloud-native technologies, IT teams are being challenged with handling old systems and workloads, many of which may be running on infrastructure or resources incompatible with current computing realities. Without the proper tools, modernizing these deployments may be time-consuming, costly, and overwhelming for developers, IT operations teams, and business users. Red Hat introduced OpenShift Virtualization in 2020 to assist companies in breaking down application barriers between traditional and cloud-native workloads. Red Hat advanced traditional application stacks into a layer of open innovation with OpenShift Virtualization, allowing clients to transform at their own pace truly. As this trend continues, Red Hat collaborates with customers and partners to modernize and move projects to offer cloud-native capabilities via migration toolkits included with OpenShift. These services now feature Red Hat’s migration toolbox for virtualization, which helps convert VMs at scale to Red Hat OpenShift. This enables companies to access virtualized workloads while creating new cloud-native applications more easily. Migrations are carried out in a few easy steps, beginning with the provision of source and destination credentials, followed by mapping the source and destination infrastructure and creating a choreographed plan, and lastly, by the execution of the plan. About Red Hat, Inc. Red Hat is the world’s leading provider of enterprise open source software solutions, using a community-powered approach to deliver reliable and high-performing Linux, hybrid cloud, container, and Kubernetes technologies. Red Hat helps customers integrate new and existing IT applications, develop cloud-native applications, standardize our industry-leading operating system, and automate, secure, and manage complex environments. Award-winning support, training, and consulting services make Red Hat a trusted adviser to the Fortune 500. As a strategic partner to cloud providers, system integrators, application vendors, customers, and open source communities, Red Hat can help organizations prepare for the digital future.

Read More

VMware

AT&T Helping Small Businesses Virtualize, Survive and Thrive in Challenging Times

AT&T | October 29, 2020

What's the news? AT&T* is launching a new wireless service discount, waiving home internet data overage charges for AT&T Internet customers through December 31, and offering free expert guidance and other resources to help small and medium-sized businesses (SMBs) save money and virtualize their businesses to survive and thrive despite the impacts of COVID-19. How do small businesses benefit? Our new offer allows qualifying business customers to get $10/mo. off for the life of service on an eligible Unlimited plan1, when they purchase a new smartphone on installment and have qualifying AT&T Internet or AT&T Business Fiber Service.2 It's designed to help small businesses make the most out of their connectivity to keep their businesses up and running – whether they're in the office, or on the go.

Read More

VMware

Dialpad Welcomes Prashanti Aduma as Chief Information Officer

Dialpad | January 12, 2022

Dialpad, Inc., the industry leader in AI-powered communication and collaboration, announced the appointment of Prashanti Aduma as the company’s first Chief Information Officer (CIO). With more than 20 years of demonstrated leadership and project management experience at high-growth startups and enterprises, Aduma will play a significant role in advancing the core business systems, data, and security framework in concert with Dialpad’s rapid growth and global scale. Aduma is a transformative leader who brings deep experience in building world-class IT organizations and driving global strategic initiatives to enable next-generation technologies. Aduma joins Dialpad from Salesforce where she served as Senior Director of Enterprise Services. Prior to Salesforce’s acquisition of Vlocity, Aduma served as Vice President of Business Applications at Vlocity and was responsible for the full suite of front and back-office business applications. Aduma has also held leadership positions at Rodan + Fields, SunPower, and VMware where she led the rollout of major IT and engineering initiatives. Work as we know it has been forever changed, driving the need for better methods to connect and collaborate. In order to succeed in this new world, businesses need cloud-first, customer-first solutions that can accommodate all forms of communication. As the only truly unified AI-powered enterprise cloud collaboration platform, Dialpad is uniquely positioned to fill this need. I could not be more thrilled to welcome Prashanti Aduma to the Dialpad executive team as we prepare for a tremendous year ahead. She is an insightful leader with a focus on building strong teams and trusted partnerships throughout the organization and with the external community. We have a huge opportunity in front of us and believe when the right people come together — anything is possible.” Craig Walker, CEO, Dialpad As CIO, Aduma will play a critical role in ensuring the company is well-positioned through its rapid global expansion. Aduma will lead the business technology group which focuses on digital transformation, establishing industry standards and securing end-to-end business processes through next-generation technology roadmaps, data-driven analytics, automations, security, mergers and acquisitions. In her role, Aduma will focus on creating an integrated operating model providing A+ customer service across all business functions. Beyond her technical acumen and work experience, Aduma is passionate about mentorship, promoting empathetic leadership, and encouraging youth in STEM education. “Dialpad has the only AI-powered cloud communications and collaboration platform that spans all modes of contact center, unified communications, distributed meetings, and text and team messaging. I could not be more excited to become a member of the amazing team at this important vector point for the company,” said Prashanti Aduma, Dialpad CIO. “This is the perfect time to embark on the digital transformation journey as we scale globally and get the company ready for the public markets.” About Dialpad Dialpad is the global leader in AI communications for business, transforming how the world works together. Dialpad customers benefit from truly unified business and customer communications, including a cloud business phone system, text and team messaging, video meetings, and the world’s most advanced AI-powered contact center — all in one beautiful app. More than 7,000 innovative brands and millions of people use Dialpad to connect their teams from anywhere including Motorola Solutions, Netflix, T-Mobile, Twitter, Uber and WeWork.

Read More

Server Virtualization

Red Hat Migration Toolkit for Virtualization Makes Cloud-Native Migration an Achievable Reality

Red Hat | June 18, 2021

Red Hat, Inc., the world’s leading provider of open source solutions, announced today the general availability of Red Hat’s migration toolkit for virtualization, which will assist organizations in accelerating available hybrid cloud strategies by making it easier to migrate existing workloads to modern infrastructure in a streamlined, wholesale manner. IT companies may have a faster, more scalable modernization experience while minimizing possible risks and downtime by bringing mission-critical applications based on virtual machines (VMs) to Red Hat OpenShift. As more companies start containers and cloud-native technologies, IT teams are being challenged with handling old systems and workloads, many of which may be running on infrastructure or resources incompatible with current computing realities. Without the proper tools, modernizing these deployments may be time-consuming, costly, and overwhelming for developers, IT operations teams, and business users. Red Hat introduced OpenShift Virtualization in 2020 to assist companies in breaking down application barriers between traditional and cloud-native workloads. Red Hat advanced traditional application stacks into a layer of open innovation with OpenShift Virtualization, allowing clients to transform at their own pace truly. As this trend continues, Red Hat collaborates with customers and partners to modernize and move projects to offer cloud-native capabilities via migration toolkits included with OpenShift. These services now feature Red Hat’s migration toolbox for virtualization, which helps convert VMs at scale to Red Hat OpenShift. This enables companies to access virtualized workloads while creating new cloud-native applications more easily. Migrations are carried out in a few easy steps, beginning with the provision of source and destination credentials, followed by mapping the source and destination infrastructure and creating a choreographed plan, and lastly, by the execution of the plan. About Red Hat, Inc. Red Hat is the world’s leading provider of enterprise open source software solutions, using a community-powered approach to deliver reliable and high-performing Linux, hybrid cloud, container, and Kubernetes technologies. Red Hat helps customers integrate new and existing IT applications, develop cloud-native applications, standardize our industry-leading operating system, and automate, secure, and manage complex environments. Award-winning support, training, and consulting services make Red Hat a trusted adviser to the Fortune 500. As a strategic partner to cloud providers, system integrators, application vendors, customers, and open source communities, Red Hat can help organizations prepare for the digital future.

Read More

VMware

AT&T Helping Small Businesses Virtualize, Survive and Thrive in Challenging Times

AT&T | October 29, 2020

What's the news? AT&T* is launching a new wireless service discount, waiving home internet data overage charges for AT&T Internet customers through December 31, and offering free expert guidance and other resources to help small and medium-sized businesses (SMBs) save money and virtualize their businesses to survive and thrive despite the impacts of COVID-19. How do small businesses benefit? Our new offer allows qualifying business customers to get $10/mo. off for the life of service on an eligible Unlimited plan1, when they purchase a new smartphone on installment and have qualifying AT&T Internet or AT&T Business Fiber Service.2 It's designed to help small businesses make the most out of their connectivity to keep their businesses up and running – whether they're in the office, or on the go.

Read More

Events