Why Are Businesses Tilting Towards VDI for Remote Employees?

Aashish Yadav | June 24, 2022 | 945 views | Read Time : 05 min

Businesses Tilting Towards VDI for Remote

Although remote working or working from home became popular during the COVID era, did you know that the technology that gives the best user experience (UX) for remote work was developed more than three decades ago?


Citrix was founded in 1989 as one of the first software businesses to provide the ability to execute any program on any device over any connection. In 2006, VMware coined the term "virtual desktop infrastructure (VDI)" to designate their virtualization products.

Many organizations created remote work arrangements in response to the COVID-19 pandemic, and the phenomenon will continue even in 2022. Organizations have used a variety of methods to facilitate remote work over the years. For businesses, VDI has been one of the most effective, allowing businesses to centralize their IT resources and give users remote access to a consolidated pool of computing capacity.


Reasons Why Businesses Should Use VDI for their Remote Employees?

Companies can find it difficult to scale their operations and grow while operating remotely. VDI, on the other hand, can assist in enhancing these efforts by eliminating some of the downsides of remote work.


Device Agnostic

As long as employees have sufficient internet connectivity, virtual desktops can accompany them across the world. They can use a tablet, phone, laptop, client side, or Mac to access the virtual desktop.


Reduced Support Costs

Since VDI setups can often be handled by a smaller IT workforce than traditional PC settings, support expenses automatically go down.


Enhanced Security

Data security is raised since data never leaves the datacenter. There's no need to be concerned about every hard disk in every computer containing sensitive data. Nothing is stored on the end machine while using the VDI workspace. It also safeguards intellectual property while dealing with contractors, partners, or a worldwide workforce.


Comply with Regulations

With virtual desktops, organizational data never leaves the data center. Remote employees that have regulatory duties to preserve client/patient data like function because there is no risk of data leaking out from a lost or stolen laptop or retired PC.


Enhanced User Experience

With a solid user experience (UX), employees can work from anywhere. They can connect to all of their business applications and tools from anywhere they want to call your workplace, exactly like sitting at their office desk, and even answer the phone if they really want to.


Closing Lines

One of COVID-19's lessons has been to be prepared for almost anything. IT leaders were probably not planning their investments with a pandemic in mind.

Irrespective of how the pandemic plays out in the future, the rise of remote work is here to stay. If VDI at scale is to become a permanent feature of business IT strategies, now is the moment to assess where, when, and how your organization can implement the appropriate solutions. Moreover, businesses that use VDI could find that the added flexibility extends their computing refresh cycles.

Spotlight

S2IT

We are a company formed by more than two hundred restless and committed people, incessant in the search for innovation and technology. We always offer the best solution, so we strive at all times to improve our services and exceed the expectations of our customers. Here "we" always prevails over "self," because we are passionate about people, driven by technology, and inspired by innovation.

OTHER ARTICLES
VIRTUAL DESKTOP TOOLS

Network Virtualization: The Future of Businesses and Networks

Article | July 26, 2022

Network virtualization has emerged as the widely recommended solution for the networking paradigm's future. Virtualization has the potential to revolutionize networks in addition to providing a cost-effective, flexible, and secure means of communication. Network virtualization isn't an all-or-nothing concept. It can help several organizations with differing requirements, or it can provide a bunch of new advantages for a single enterprise. It is the process of combining a network's physical hardware into a single, virtual network. This is often accomplished by running several virtual guest machines in software containers on a single physical host system. Network virtualization is indeed the new gold standard for networking, and it is being embraced by enterprises of all kinds globally. By integrating their current network gear into a single virtual network, businesses can reduce operating expenses, automate network and security processes, and lay the groundwork for future growth. Network virtualization also enables organizations to simulate traditional hardware like servers, storage devices, and network resources. The physical network performs basic tasks like packet forwarding, while virtual versions handle more complex activities like networking service management and deployment. Addressing Network Virtualization Challenges Surprisingly, IT teams might encounter network virtualization challenges that are both technical and non-technical in nature. Let's look at some common challenges and discuss how to overcome them. Change in Network Architecture Practically, the first big challenge is shifting from an architecture that depends heavily on routers, switches, and firewalls. Instead, these services are detached from conventional hardware and put on hypervisors that virtualize these operations. Virtualized network services are shared, scaled, and moved as required. Migrating current LANs and data centers to a virtualized platform require careful planning. This migration involves the following tasks: Determine how much CPU, computation, and storage resources will be required to run virtualized network services. Determine the optimal approach for integrating network resilience and security services. Determine how the virtualized network services will be implemented in stages to avoid disrupting business operations. The key to a successful migration is meticulous preparation by architects who understand the business's network requirements. This involves a thorough examination of existing apps and services, as well as a clear knowledge of how data should move across the company most effectively. Moreover, a progressive approach to relocation is often the best solution. In this instance, IT teams can make changes to the virtualization platform without disrupting the whole corporate network. Network Visibility Network virtualization has the potential to considerably expand the number of logical technology layers that must collaborate. As a result, traditional network and data center monitoring technologies no longer have insight into some of these abstracted levels. In other circumstances, visibility can be established, but the tools fail to show the information correctly so that network operators can understand it. In either case, deploying and managing modern network visibility technologies is typically the best choice. When an issue arises, NetOps personnel are notified of the specific service layer. Automation and AI The enhanced level of automation and self-service operations that can be built into a platform is a fundamental aspect of network virtualization. While these activities can considerably increase the pace of network upgrades while decreasing management overhead, they need the documentation and implementation of a new set of standards and practices. Understand that prior network architectures were planned and implemented utilizing actual hardware appliances on a hop-by-hop basis. A virtualized network, on the other hand, employs a centralized control plane to govern and push policies to all sections of the network. Changes may occur more quickly in this aspect, but various components must be coordinated to accomplish their roles in harmony. As a result, network teams should move their attention away from network operations that are already automated. Rather, their new responsibility is to guarantee that the core automation processes and AI are in sync in order to fulfill those automated tasks. Driving Competitive Edge with Network Virtualization Virtualization in networking or virtual machines within an organization is not a new trend. Even small and medium businesses have realized the benefits of network virtualization, especially when combined with a hosted cloud service provider. Because of this, the demand for enterprise network virtualization is rising, driving higher end-user demands and the proliferation of devices and business tools. These network virtualization benefits can help boost business growth and gain a competitive edge. Gaining a Competitive Edge: Network Virtualization Benefits Cost-Savings on Hardware Faster Desktop and Server Provisioning and Deployment Improved Data Security and Disaster Recovery Increasing IT Operational Efficiency Small Footprint and Energy Saving Network Virtualization: The Path to Digital Transformation Business is at the center of digital transformation, but technology is needed to make it happen. Integrated clouds, highly modern data centers, digital workplaces, and increased data center security are all puzzle pieces, and putting them all together requires a variety of various products and services that are deployed cohesively. The cloud revolution is still having an influence on IT, transforming how digital content is consumed and delivered. This should come as no surprise that such a shift has influenced how we feel about current networking. When it boils down to it, the purpose of digital transformation for every company, irrespective of industry, is the same: to boost the speed with which you can respond to market changes and evolving business needs; to enhance your ability to embrace and adapt to new technology, and to improve overall security. As businesses realize that the underlying benefit of cloud adoption and enhanced virtualization isn't simply about cost savings, digital strategies are evolving, becoming more intelligent and successful in the process. Network virtualization is also a path toward the smooth digital transformation of any business. How does virtualization help in accelerating digital transformation? Combining public and private clouds, involving hardware-based computing, storage, and networking software definition. A hyper-converged infrastructure that integrates unified management with virtualized computing, storage, and networking could be included. Creating a platform for greater productivity by providing the apps and services consumers require when and when they utilize them. This should include simplifying application access and administration as well as unifying endpoint management. Improving network security and enhancing security flexibility to guarantee that quicker speed to market is matched by tighter security. Virtualization will also help businesses to move more quickly and safely, bringing products—and profits—to market faster. Enhancing Security with Network Virtualization Security has evolved as an essential component of every network architecture. However, since various areas of the network are often segregated from one another, it might be challenging for network teams to design and enforce network virtualization security standards that apply to the whole network. Zero trust can integrate such network parts and their accompanying virtualization activities. Throughout the network, the zero-trust architecture depends on the user and device authentication. If LAN users wish to access data center resources, they must first be authenticated. The secure connection required for endpoints to interact safely is provided by a zero-trust environment paired with network virtualization. To facilitate these interactions, virtual networks can be ramped up and down while retaining the appropriate degree of traffic segmentation. Access policies, which govern which devices can connect with one another, are a key part of this process. If a device is allowed to access a data center resource, the policy should be understood at both the WAN and campus levels. Some of the core network virtualization security features are: Isolation and multitenancy are critical features of network virtualization. Segmentation is related to isolation; however it is utilized in a multitier virtual network. A network virtualization platform's foundation includes firewalling technologies that enable segmentation inside virtual networks. Network virtualization enables automatic provisioning and context-sharing across virtual and physical security systems. Investigating the Role of Virtualization in Cloud Computing Virtualization in the cloud computing domain refers to the development of virtual resources (such as a virtual server, virtual storage device, virtual network switch, or even a virtual operating system) from a single resource of its type that also shows up as several personal isolated resources or environments that users can use as a separate individual physical resource. Virtualization enables the benefits of cloud computing, such as ease of scaling up, security, fluid or flexible resources, and so on. If another server is necessary, a virtual server will be immediately created, and a new server will be deployed. When we need more memory, we increase the virtual server configurations we currently have, and we now have the extra RAM we need. As a result, virtualization is the underlying technology of the cloud computing business model. The Benefits of Virtualization in Cloud Computing: Efficient hardware utilization Virtualization improves availability Disaster recovery is quick and simple Energy is saved by virtualization Setup is quick and simple Cloud migration has become simple Motivating Factors for the Adoption of Network Virtualization Demand for enterprise networks continues to climb, owing to rising end-user demands and the proliferation of devices and business software. Thanks to network virtualization, IT companies are gaining the ability to respond to shifting demands and match their networking capabilities with their virtualized storage and computing resources. In fact, according to a recent SDxCentral report, 88% of respondents believe it is "important" or "mission critical" to implement a network virtualization software over the next two to five years. Virtualization is also an excellent alternative for businesses that employ outsourced IT services, are planning mergers or acquisitions or must segregate IT teams owing to regulatory compliance. Reasons to Adopt Network Virtualization: A Business Needs Speed Security Requirements Are Rising Apps can Move Around Micro-segmentation IT Automation and Orchestration Reduce Hardware Dependency and CapEx: Adopt Multi-Tenancy Cloud Disaster Recovery mproved Scalability Wrapping-Up Network virtualization and cloud computing are emerging technologies of the future. As CIOs get actively involved in organizational systems, these new concepts will be implemented in more businesses. As consumer demand for real-time services expands, businesses will be driven to explore network virtualization as the best way to take their networks to the next level. The networking future is here. FAQ Why is network virtualization important for business? By integrating their current network gear into a single virtual network, businesses can reduce operating expenses, automate network and security processes, and set the stage for future growth. Where is network virtualization used? Network virtualization can be utilized in application development and testing to simulate hardware and system software realistically. Network virtualization in application performance engineering allows for the modeling of connections among applications, services, dependencies, and end users for software testing. How does virtualization work in cloud computing? Virtualization, in short, enables cloud providers to provide users alongside existing physical computer infrastructure. As a simple and direct process, it allows cloud customers to buy only the computing resources they require when they want them and to maintain those resources cost-effectively as the demand grows.

Read More
VIRTUAL DESKTOP TOOLS

Virtualization can transform your company’s IT infrastructure

Article | August 12, 2022

For many companies in today’s highly competitive, rapidly digitizing world, data center transformation is not merely a one-time project – it’s a constant challenge. No corporate IT leader should be content merely to revamp their data infrastructure once, then call it a day. Instead, they should always be looking for ways to make their approach to data more dynamic and easier to scale. Ideally, they’d do so in a way that maximizes resource utilization while minimizing costs. Luckily, that’s exactly the idea behind virtualization, which involves creating a new infrastructure that’s capable of rapidly scaling and facilitating workload development. IT leaders are quickly coming to realize that with virtualization in their toolbox, they’re able to make their operations more agile than ever, and without increasing costs. This is why over 80% of enterprise server workloads today are running on virtual machines, and the market for data center virtualization is expected to reach a total value of $10 billion by 2023.

Read More
VIRTUAL DESKTOP TOOLS

Best Practices for vSphere 6.7 Tagging

Article | July 7, 2022

vSphere Tags were introduced in version 5.1 as a way to organize inventory objects such as VMs, Hosts, Datastores, etc., a much-needed feature for helping search for or group objects within vSphere. A Tag is basically a label that can be applied to vSphere inventory objects. When an administrator creates a tag, it is then assigned to a tag category. Categories allow the grouping of related tags. When a Category is created, you can specify associations of object types (such as; VM or Datastore) as well as whether more than one tag in a category can be applied to an object (ex; One Tag or Many Tags).

Read More

How to automate the creation multiple routable VLANs on single L2 network using VyOS

Article | February 12, 2020

My personal homelab has a very simple network topology, everything is connected to a single flat network. This has served me well over the years, but sometimes it can prevent me from deploying more complex scenarios. Most recently while working with NSX-T and Project Pacific, I had a need for additional VLANs which my home router does not support. There are a number of software solutions that can be used including the popular pfSense, which I have used before. Over the Winter break, a colleague introduced me to VyOS, which is another popular software firewall and router solution. I had not heard of VyOS before but later realized it was derived from Vyatta, which I had heard of, but development of that solution had stopped and VyOS is now the open source version of that software. Having never played with VyoS before, I thought this might be a good learning opopournity and started to dabble with VyOS over the holiday.

Read More

Spotlight

S2IT

We are a company formed by more than two hundred restless and committed people, incessant in the search for innovation and technology. We always offer the best solution, so we strive at all times to improve our services and exceed the expectations of our customers. Here "we" always prevails over "self," because we are passionate about people, driven by technology, and inspired by innovation.

Related News

VIRTUAL DESKTOP TOOLS

Dell Technologies Strengthens Cyber Resiliency with Multicloud Data Protection and Security Innovations

Dell Technologies | November 18, 2022

Dell Technologies is expanding its industry leadership in data protection appliances and software1 to help customers protect their data on premises, in public clouds and at the edge. The Dell PowerProtect Data Manager Appliance leads a series of advancements for multicloud data protection that are simple to use and easy to consume. Dell innovation in AI-powered resilience and operational security accelerates the adoption of Zero Trust architectures, helping protect organizations from the increasing threat of cyberattacks. The new solutions help address rising data protection challenges facing organizations. According to the 2022 Dell Global Data Protection Index (GDPI) survey, organizations have experienced higher levels of natural and modern disasters than in previous years, resulting in more data loss, downtime and recovery costs. In the past year, cyberattacks accounted for 48% of all disasters (up from 37% in 2021), leading all other causes of data disruption. The survey also revealed 85% of organizations using multiple data protection vendors see a benefit in reducing their number of vendors. Furthermore, it revealed that organizations using a single data protection vendor incurred 34% less cost recovering from cyberattacks or other cyber incidents than those who used multiple vendors. "With virtually everything connected to the internet in today's digital world, the need to protect valuable data is more important than ever, This digital landscape requires a modern data protection and security strategy to address cyber threats. Point solutions don't go deep or wide enough to help protect organizations. Dell helps customers strengthen cyber resiliency by offering integrated data protection software, systems and services to help ensure data and applications are protected and resilient wherever they live." Jeff Boudreau, president and general manager, Infrastructure Solutions Group, Dell Technologies The GDPI survey found that 91% of organizations are either aware of or planning to deploy a Zero Trust architecture – a cybersecurity model that shifts how organizations approach security from relying solely on perimeter defenses to a proactive strategy that only allows known, authorized traffic across system boundaries and data pipelines. However, only 23% are deploying a Zero Trust model and 12% are fully deployed. With embedded security features designed into the hardware, firmware and security control points, Dell's holistic approach helps organizations achieve Zero Trust architectures to strengthen cyber resiliency and help reduce security complexity. The simplest path to modern data protection Dell continues to deliver innovation for its data protection software, Dell PowerProtect Data Manager, to help organizations simplify their IT operations and reduce risk. PowerProtect Data Manager software addresses the increasing need for cyber resiliency and supports Zero Trust principles with new built-in operational security capabilities, such as multifactor authentication, dual authorization, and role-based access controls. The Dell PowerProtect Data Manager Appliance offers a simple path to adopt modern data protection. The debut system is ideal for small and mid-sized use cases with support that scales from 12 to 96 terabytes of data. The appliance offers customers a: Modern, software-defined architecture: Allows automated discovery and protection of assets and delivers unique VMware protection with Transparent Snapshots to ensure the availability of all VMs without business disruption. Secure, cyber resilient solution: Provides more secure access to restricted functions with Identity and Access Management to strengthen cyber resiliency. Simple, unified user experience: Delivers software-defined data protection, making it easy to deploy and use. "Dell PowerProtect Data Manager simplifies our backup environment, giving us the business agility needed to protect our data as we digitally transform," said James McNair, vice president, distributed systems manager, Trustmark Bank. "With the new PowerProtect Data Manager Appliance, we can more simply deploy Data Manager across our infrastructure, helping us be more efficient and strengthening our cyber resiliency." Dell expands cyber recovery for fast, easy-to-deploy public cloud vaults PowerProtect Cyber Recovery for Google Cloud enables customers to deploy an isolated cyber vault in Google Cloud to more securely separate and protect data from a cyberattack. Unlike standard cloud-based backup solutions, access to management interfaces is locked down by networking controls and can require separate security credentials and multi-factor authentication for access. Organizations can use their existing Google Cloud subscription for purchasing PowerProtect Cyber Recovery through the Google Cloud Marketplace, and the service can be acquired directly from Dell and its channel partners. The new offering marks the latest expansion of Dell's cyber recovery capabilities for public clouds, following this year's introduction of Dell PowerProtect for Microsoft Azure and CyberSense for Dell PowerProtect Cyber Recovery for AWS. Dell APEX simplifies backup storage with flexible consumption options Dell APEX Data Storage Services is expanding to offer a Backup Target option to provide more secure backup storage in a pay-per-use, flexible consumption model. The Backup Target service is easy for customers to adopt and streamlines the process of purchasing, deploying and maintaining backup storage. Building on Dell's leadership in data protection appliances and software1, the Backup Target helps reduce a customer's storage footprint and can increase data availability. The new Dell APEX Data Storage Services Backup Target offer will support the increasing reliance on as-a-Service offerings to help overcome data protection challenges. Nearly every GDPI respondent (99%) identified at least one as-a-Service offering as a high priority to help overcome challenges for their organization. Storage as-a-Service (44%), Cyber Recovery as-a-Service (41%), and Backup as-a-Service (40%) ranked as the top three as-a-Service priorities. Dell expands Future-Proof Program with new Cyber Recovery Guarantee With cyber threats increasing and data becoming more valuable than ever, Dell plans to introduce in January a new Cyber Recovery Guarantee2 to provide assurance to customers that their data will be recoverable following a cyberattack. Dell will provide customers up to $10 million in reimbursement for qualifying expenses to assist in the recovery of data from ransomware and other cyber incidents in the event restoring data is not possible with Dell solutions. The guarantee is designed to increase customer comfort and confidence in choosing Dell Data Protection Solutions, whether for data in production or, more securely, in a cyber vault. This new cyber recovery guarantee expands the Dell Technologies Future-Proof Program, which also includes a Data Protection Deduplication Guarantee3. Additional quote Seife Teklu, senior solutions architect, Arrow Electronics "The integrated Dell PowerProtect Data Manager Appliance is easy to use and quick to deploy. This system will be a compelling option for our small to medium-sized customers needing to modernize data protection to help reduce risk and ensure business continuity." Availability Dell PowerProtect Data Manager Appliance is globally available this month in more than 30 countries across North America, Latin America, Europe and Asia Pacific. Dell PowerProtect Data Manager software is globally available today. Dell PowerProtect Cyber Recovery for Google Cloud Platform is globally available today. Dell APEX Data Storage Services Backup Target will be globally available in the first quarter of 2023 in 16 countries across North America, Europe and Asia Pacific. Dell's new Cyber Recovery Guarantee will be available in the US starting in January 2023. About Dell Technologies Dell Technologies helps organizations and individuals build their digital future and transform how they work, live and play. The company provides customers with the industry's broadest and most innovative technology and services portfolio for the data era.

Read More

VPN

VIAVI and VMware Announce Testbed as a Service for RAN Intelligent Controller Testing

Viavi | November 25, 2022

Viavi Solutions Inc.today announced that it has signed a partnership agreement with VMware to drive standardized frameworks and metrics for RAN Intelligent Controller (RIC) testing. This testbed as a service will enable mobile operators to introduce programmability to the RAN and help accelerate the adoption of Open RAN. The RIC is a cloud-native central component of an open and virtualized RAN network, enabling the optimization of RAN resources through analytic processing and adaptation recommendations. The RIC takes advantage of native and third-party xApps and rApps – microservice-based applications operating in near-real time (near-RT) and non-real-time (non-RT), respectively – to enable operators to automate and optimize RAN operations at scale to reduce the operator's total cost of ownership, and to introduce innovative new services. VMware is focused on attracting and collaborating with a vibrant ecosystem of partners to help its operator customers adopt Open RAN with complete confidence. VIAVI has the most comprehensive portfolio of Open RAN test solutions in the industry and plays a leading role in defining test processes in the O-RAN ALLIANCE and Telecom Infra Project (TIP). The two companies will work together to demonstrate compliance with RIC-related requirements, assisting CSPs in validating the solution in the lab and scaling the solution to production. The industry-leading VIAVI TeraVM RIC Test and the VMware RIC will form a joint testbed as a service for testing, profiling, and validating third-party xApps and rApps. In addition to the framework, the two companies will work together to drive industry consensus around testing methodology and performance metrics. By having pre-built test cases and a standardized test method for the RIC and xApp/rApp, operators can reduce the time it takes to validate the solution in their lab, meaning they can move to a production environment faster. "Open RAN, by definition, depends on strong collaboration to drive innovation, and that's a perfect way to think about this partnership between leaders in their respective fields, The RIC represents a huge opportunity to the industry: Applying AI/ML techniques allows operators to simplify the management of complex 5G configurations and dynamically optimize the network to cater for new use cases, energy efficiency, and changing traffic patterns." Ian Langley, Senior Vice President and General Manager, Wireless Business, VIAVI "We're excited to work with VIAVI on helping move the industry forward to accelerate the adoption of Open RAN," said Lakshmi Mandyam, vice president, Service Provider Product Management and Partner Ecosystem, VMware. "Our companies share a vision of what it will take to address the challenges hindering adoption by simplifying the path for CSPs to test, profile, and certify third-party xApps and rApps through a common framework. VIAVI's leadership in Open RAN testing and VMware's leadership in RIC make this an ideal collaboration." About VIAVI VIAVI (NASDAQ: VIAV) is a global provider of network test, monitoring and assurance solutions for communications service providers, hyperscalers, equipment manufacturers, enterprises, government and avionics. VIAVI is also a leader in light management technologies for 3D sensing, anti-counterfeiting, consumer electronics, industrial, automotive, government and aerospace applications. Together with our customers and partners we are United in Possibility, finding innovative ways to solve real-world problems.

Read More

VIRTUAL DESKTOP TOOLS

Andes Announces the N25F-SE Processor, the World First RISC-V CPU IP with ISO 26262 Full Compliance

Andes Technology | October 31, 2022

Andes Technology, a leading supplier of high efficiency, low-power 32/64-bit RISC-V processor cores and founding premier member of RISC-V International, today announces its safety-enhanced AndesCore N25F-SE is the first RISC-V CPU IP certified to be fully compliant with ISO 26262 functional safety standards for the development of automotive applications. SGS-TÜV Saar GmbH, an independent functional safety certification body, has assessed and completed product audit process for N25F-SE with achieved functional safety for ASIL B (Automotive Safety Integrity Level B) applications, according to all applicable ISO 26262 series of standards including Parts 2, 4, 5, 8 and 9. AndesCore N25F-SE. The N25F-SE is a 32-bit RISC-V CPU core that supports standard IMACFD extensions, including efficient integer instructions and single/double precision floating point instructions. It incorporates the Andes V5 extension instructions to further boost performance and reduce code size. The efficient 5-stage pipeline of the N25F-SE provides a good balance of high operating frequency and compact design. Its flexible interfaces greatly simplify SoC designs. Like its sought-after cousin the N25F, the N25F-SE comes with rich configurable options, all of which are fully certified, and thus SoC design teams are not limited by one fixed CPU configuration when offering automotive solutions. ISO 26262 and ASIL-B Applications. ISO 26262 defines functional safety as the “absence of unreasonable risk due to hazards caused by malfunctioning behavior of electrical/electronic systems”. To enforce functional safety with a reasonable cost structure, proper safety measures for desired ASIL levels should be applied, from the least stringent ASIL A to the most stringent ASIL D. Examples of electronic systems where ASIL B is sufficient are dashboard, in-car monitoring, keyless entry, lighting control, tire pressure monitoring, vision ADAS, and window control. Either to incorporate new electronic systems on board, or to upgrade existing ones without ISO 26262 compliance, the N25F-SE is well suited for the wide range of applications requiring ASIL B compliance. Leader of RISC-V Functional Safety. “Andes is the first RISC-V CPU vendor certified, for the development process of automotive processor cores, to be compliant with ISO 26262 standards up to ASIL D in 2020. With the certified development process in place, we formally started our functional safety roadmap to deliver at least one ISO 26262 compliant core every year to cover all segments of performance and features,” said Dr. Charlie Su, President and CTO of Andes Technology. “Andes has developed a wide range of AndesCore processors, from driving cost sensitive MCUs to accelerating datacenter AI/ML computations. We are excited to announce our first safety-enhanced AndesCore the N25F-SE based on the most popular and mature CPU IP family, the 25-series." ISO 26262 Full Compliance. The ASIL B fully compliant N25F-SE was developed under considerations on all applicable requirements of ISO 26262 standards by defining tailored safety activities with solid rationales, from the fundamental specification, analysis, and design to verification and many more. It comes with the Safety Package which includes Safety manual, Safety analysis report (FMEDA and more), and Development Interface Outline. Together, the N25F-SE and its Safety Package offer an effective, efficient, and flexible automotive solution. It greatly reduces the time for SoC design teams to certify their ISO 26262 compliant SoCs. In comparison, an ASIL B “ready” solution is without certifying all required ISO 26262 Parts (2, 4, 5, 8 and 9) and thus provides incomplete support for the SoC’s certification; as a result, SoC design teams must go through all the work the CPU IP vendors are supposed to do. In addition, the N25F-SE helps reduce the cost and power consumption for SoCs requiring only an ASIL B processor IP without forcing them to use a double-sized dual-core lock-step solution with ASIL D. “As the only public RISC-V CPU IP company and a leader in the RISC-V ecosystem, we want to raise the awareness of the importance of ISO 26262 full compliance.” Dr. Su stressed. Cidana. “Consumer experience is shaping expectations for In-Vehicle Infotainment (IVI) systems. It is one of the segments evolving rapidly in the automotive industry. Cidana offers the optimized LC3+ codec and makes it available on Andes ISO 26262 compliance platform. Other mainstream audio codecs can be supported based on the required performance,” said Chinn Chin, the Chief Executive Officer of Cidana. “We are looking forward to collaborating with Andes and bringing the Cidana solutions to automotive SoCs powered by the N25F-SE.” Green Hills Software. “We are pleased to expand our production-ready automotive safety solutions to support the safety-certified AndesCore 25-Series RISC-V IP core family from the technology leader, Andes Technology,” said Dan Mender, Vice President, Business Development, Green Hills Software. “This combined hardware-software solution for the AndesCore N25F-SE gives SoC providers a valuable head-start in offering integrated and optimized production-proven platforms for next-generation vehicle ECUs that require the highest performance and lowest power, with advanced tools that reduce their customers’ time to market and development costs.” IAR Systems. “RISC-V is being adopted at a remarkable speed in applications from the edge to the cloud and now it is entering the automotive market. IAR Systems support the mature and popular Andes RISC-V 25-series processors since its release a few years back in the IAR Embedded Workbench for RISC-V, Functional Safety edition. We are glad to learn that Andes N25F-SE has been certified for full ISO 26262 compliance,” said Rafael Taubinger, Sr. Product Marketing Manager at IAR Systems. “We are looking forward to extending our collaboration with Andes to support its Safety Enhanced processors starting from the N25F-SE enabling our mutual customers to speed up the path to using RISC-V in automotive safety-critical applications.” Parasoft. “We would sincerely congrats on Andes Technology's N25F-SE been certified to the ISO 26262 functional safety standard,” said Yue Liu, the President of Parasoft Greater China. "Andes is a leading provider of RISC-V processors, and PARASOFT, a solution provider that helps enterprises deliver defect-free software, is pleased to partner with Andes to further deliver RISC-V ecosystem solutions to our customers. I am confident that we will be able to provide a complete suite of testing solutions for the automotive safety lifecycle in the near future, helping customers improve their ability to develop and deliver high quality software.” Virtual Open Systems. “At Virtual Open Systems we are working with Andes to enable hypervisor-less mixed criticality virtualization supporting concurrent execution of a certified real time operating system (OS) with a general purpose OS using our VOSySmonitoRV, a low level firmware developed with ASIL certification in mind," said Daniel Raho, Virtual Open Systems SAS CEO. "We are excited to extend VOSySmonitoRV with support for Andes Safety Enhanced processors starting from the N25F-SE.” The AndesCore N25F-SE is available for licensing now. Over half of a dozen leading SoC companies are already developing in-vehicle applications with the N25F-SE. Following the N25F-SE, the D25F-SE with DSP/SIMD extension and Bit Manipulation extension is expected to be available in early 2023. About Andes Technology Seventeen years in business and a Founding Premier member of RISC-V International, Andes is publicly-listed company and a leading supplier of high-performance/low-power 32/64-bit embedded processor IP solutions, and the driving force in taking RISC-V mainstream. Andes’ fifth-generation AndeStar™ architecture adopted the RISC-V as the base. Its V5 RISC-V CPU families range from tiny 32-bit cores to advanced 64-bit cores with DSP, FPU, Vector, Linux, superscalar, and/or multicore capabilities. The annual volume of Andes-Embedded SoCs has exceeded 3 billion in 2021 and continues to rise. By the end of 2021, the cumulative volume of Andes-Embedded™ SoCs has surpassed 10 billion

Read More

VIRTUAL DESKTOP TOOLS

Dell Technologies Strengthens Cyber Resiliency with Multicloud Data Protection and Security Innovations

Dell Technologies | November 18, 2022

Dell Technologies is expanding its industry leadership in data protection appliances and software1 to help customers protect their data on premises, in public clouds and at the edge. The Dell PowerProtect Data Manager Appliance leads a series of advancements for multicloud data protection that are simple to use and easy to consume. Dell innovation in AI-powered resilience and operational security accelerates the adoption of Zero Trust architectures, helping protect organizations from the increasing threat of cyberattacks. The new solutions help address rising data protection challenges facing organizations. According to the 2022 Dell Global Data Protection Index (GDPI) survey, organizations have experienced higher levels of natural and modern disasters than in previous years, resulting in more data loss, downtime and recovery costs. In the past year, cyberattacks accounted for 48% of all disasters (up from 37% in 2021), leading all other causes of data disruption. The survey also revealed 85% of organizations using multiple data protection vendors see a benefit in reducing their number of vendors. Furthermore, it revealed that organizations using a single data protection vendor incurred 34% less cost recovering from cyberattacks or other cyber incidents than those who used multiple vendors. "With virtually everything connected to the internet in today's digital world, the need to protect valuable data is more important than ever, This digital landscape requires a modern data protection and security strategy to address cyber threats. Point solutions don't go deep or wide enough to help protect organizations. Dell helps customers strengthen cyber resiliency by offering integrated data protection software, systems and services to help ensure data and applications are protected and resilient wherever they live." Jeff Boudreau, president and general manager, Infrastructure Solutions Group, Dell Technologies The GDPI survey found that 91% of organizations are either aware of or planning to deploy a Zero Trust architecture – a cybersecurity model that shifts how organizations approach security from relying solely on perimeter defenses to a proactive strategy that only allows known, authorized traffic across system boundaries and data pipelines. However, only 23% are deploying a Zero Trust model and 12% are fully deployed. With embedded security features designed into the hardware, firmware and security control points, Dell's holistic approach helps organizations achieve Zero Trust architectures to strengthen cyber resiliency and help reduce security complexity. The simplest path to modern data protection Dell continues to deliver innovation for its data protection software, Dell PowerProtect Data Manager, to help organizations simplify their IT operations and reduce risk. PowerProtect Data Manager software addresses the increasing need for cyber resiliency and supports Zero Trust principles with new built-in operational security capabilities, such as multifactor authentication, dual authorization, and role-based access controls. The Dell PowerProtect Data Manager Appliance offers a simple path to adopt modern data protection. The debut system is ideal for small and mid-sized use cases with support that scales from 12 to 96 terabytes of data. The appliance offers customers a: Modern, software-defined architecture: Allows automated discovery and protection of assets and delivers unique VMware protection with Transparent Snapshots to ensure the availability of all VMs without business disruption. Secure, cyber resilient solution: Provides more secure access to restricted functions with Identity and Access Management to strengthen cyber resiliency. Simple, unified user experience: Delivers software-defined data protection, making it easy to deploy and use. "Dell PowerProtect Data Manager simplifies our backup environment, giving us the business agility needed to protect our data as we digitally transform," said James McNair, vice president, distributed systems manager, Trustmark Bank. "With the new PowerProtect Data Manager Appliance, we can more simply deploy Data Manager across our infrastructure, helping us be more efficient and strengthening our cyber resiliency." Dell expands cyber recovery for fast, easy-to-deploy public cloud vaults PowerProtect Cyber Recovery for Google Cloud enables customers to deploy an isolated cyber vault in Google Cloud to more securely separate and protect data from a cyberattack. Unlike standard cloud-based backup solutions, access to management interfaces is locked down by networking controls and can require separate security credentials and multi-factor authentication for access. Organizations can use their existing Google Cloud subscription for purchasing PowerProtect Cyber Recovery through the Google Cloud Marketplace, and the service can be acquired directly from Dell and its channel partners. The new offering marks the latest expansion of Dell's cyber recovery capabilities for public clouds, following this year's introduction of Dell PowerProtect for Microsoft Azure and CyberSense for Dell PowerProtect Cyber Recovery for AWS. Dell APEX simplifies backup storage with flexible consumption options Dell APEX Data Storage Services is expanding to offer a Backup Target option to provide more secure backup storage in a pay-per-use, flexible consumption model. The Backup Target service is easy for customers to adopt and streamlines the process of purchasing, deploying and maintaining backup storage. Building on Dell's leadership in data protection appliances and software1, the Backup Target helps reduce a customer's storage footprint and can increase data availability. The new Dell APEX Data Storage Services Backup Target offer will support the increasing reliance on as-a-Service offerings to help overcome data protection challenges. Nearly every GDPI respondent (99%) identified at least one as-a-Service offering as a high priority to help overcome challenges for their organization. Storage as-a-Service (44%), Cyber Recovery as-a-Service (41%), and Backup as-a-Service (40%) ranked as the top three as-a-Service priorities. Dell expands Future-Proof Program with new Cyber Recovery Guarantee With cyber threats increasing and data becoming more valuable than ever, Dell plans to introduce in January a new Cyber Recovery Guarantee2 to provide assurance to customers that their data will be recoverable following a cyberattack. Dell will provide customers up to $10 million in reimbursement for qualifying expenses to assist in the recovery of data from ransomware and other cyber incidents in the event restoring data is not possible with Dell solutions. The guarantee is designed to increase customer comfort and confidence in choosing Dell Data Protection Solutions, whether for data in production or, more securely, in a cyber vault. This new cyber recovery guarantee expands the Dell Technologies Future-Proof Program, which also includes a Data Protection Deduplication Guarantee3. Additional quote Seife Teklu, senior solutions architect, Arrow Electronics "The integrated Dell PowerProtect Data Manager Appliance is easy to use and quick to deploy. This system will be a compelling option for our small to medium-sized customers needing to modernize data protection to help reduce risk and ensure business continuity." Availability Dell PowerProtect Data Manager Appliance is globally available this month in more than 30 countries across North America, Latin America, Europe and Asia Pacific. Dell PowerProtect Data Manager software is globally available today. Dell PowerProtect Cyber Recovery for Google Cloud Platform is globally available today. Dell APEX Data Storage Services Backup Target will be globally available in the first quarter of 2023 in 16 countries across North America, Europe and Asia Pacific. Dell's new Cyber Recovery Guarantee will be available in the US starting in January 2023. About Dell Technologies Dell Technologies helps organizations and individuals build their digital future and transform how they work, live and play. The company provides customers with the industry's broadest and most innovative technology and services portfolio for the data era.

Read More

VPN

VIAVI and VMware Announce Testbed as a Service for RAN Intelligent Controller Testing

Viavi | November 25, 2022

Viavi Solutions Inc.today announced that it has signed a partnership agreement with VMware to drive standardized frameworks and metrics for RAN Intelligent Controller (RIC) testing. This testbed as a service will enable mobile operators to introduce programmability to the RAN and help accelerate the adoption of Open RAN. The RIC is a cloud-native central component of an open and virtualized RAN network, enabling the optimization of RAN resources through analytic processing and adaptation recommendations. The RIC takes advantage of native and third-party xApps and rApps – microservice-based applications operating in near-real time (near-RT) and non-real-time (non-RT), respectively – to enable operators to automate and optimize RAN operations at scale to reduce the operator's total cost of ownership, and to introduce innovative new services. VMware is focused on attracting and collaborating with a vibrant ecosystem of partners to help its operator customers adopt Open RAN with complete confidence. VIAVI has the most comprehensive portfolio of Open RAN test solutions in the industry and plays a leading role in defining test processes in the O-RAN ALLIANCE and Telecom Infra Project (TIP). The two companies will work together to demonstrate compliance with RIC-related requirements, assisting CSPs in validating the solution in the lab and scaling the solution to production. The industry-leading VIAVI TeraVM RIC Test and the VMware RIC will form a joint testbed as a service for testing, profiling, and validating third-party xApps and rApps. In addition to the framework, the two companies will work together to drive industry consensus around testing methodology and performance metrics. By having pre-built test cases and a standardized test method for the RIC and xApp/rApp, operators can reduce the time it takes to validate the solution in their lab, meaning they can move to a production environment faster. "Open RAN, by definition, depends on strong collaboration to drive innovation, and that's a perfect way to think about this partnership between leaders in their respective fields, The RIC represents a huge opportunity to the industry: Applying AI/ML techniques allows operators to simplify the management of complex 5G configurations and dynamically optimize the network to cater for new use cases, energy efficiency, and changing traffic patterns." Ian Langley, Senior Vice President and General Manager, Wireless Business, VIAVI "We're excited to work with VIAVI on helping move the industry forward to accelerate the adoption of Open RAN," said Lakshmi Mandyam, vice president, Service Provider Product Management and Partner Ecosystem, VMware. "Our companies share a vision of what it will take to address the challenges hindering adoption by simplifying the path for CSPs to test, profile, and certify third-party xApps and rApps through a common framework. VIAVI's leadership in Open RAN testing and VMware's leadership in RIC make this an ideal collaboration." About VIAVI VIAVI (NASDAQ: VIAV) is a global provider of network test, monitoring and assurance solutions for communications service providers, hyperscalers, equipment manufacturers, enterprises, government and avionics. VIAVI is also a leader in light management technologies for 3D sensing, anti-counterfeiting, consumer electronics, industrial, automotive, government and aerospace applications. Together with our customers and partners we are United in Possibility, finding innovative ways to solve real-world problems.

Read More

VIRTUAL DESKTOP TOOLS

Andes Announces the N25F-SE Processor, the World First RISC-V CPU IP with ISO 26262 Full Compliance

Andes Technology | October 31, 2022

Andes Technology, a leading supplier of high efficiency, low-power 32/64-bit RISC-V processor cores and founding premier member of RISC-V International, today announces its safety-enhanced AndesCore N25F-SE is the first RISC-V CPU IP certified to be fully compliant with ISO 26262 functional safety standards for the development of automotive applications. SGS-TÜV Saar GmbH, an independent functional safety certification body, has assessed and completed product audit process for N25F-SE with achieved functional safety for ASIL B (Automotive Safety Integrity Level B) applications, according to all applicable ISO 26262 series of standards including Parts 2, 4, 5, 8 and 9. AndesCore N25F-SE. The N25F-SE is a 32-bit RISC-V CPU core that supports standard IMACFD extensions, including efficient integer instructions and single/double precision floating point instructions. It incorporates the Andes V5 extension instructions to further boost performance and reduce code size. The efficient 5-stage pipeline of the N25F-SE provides a good balance of high operating frequency and compact design. Its flexible interfaces greatly simplify SoC designs. Like its sought-after cousin the N25F, the N25F-SE comes with rich configurable options, all of which are fully certified, and thus SoC design teams are not limited by one fixed CPU configuration when offering automotive solutions. ISO 26262 and ASIL-B Applications. ISO 26262 defines functional safety as the “absence of unreasonable risk due to hazards caused by malfunctioning behavior of electrical/electronic systems”. To enforce functional safety with a reasonable cost structure, proper safety measures for desired ASIL levels should be applied, from the least stringent ASIL A to the most stringent ASIL D. Examples of electronic systems where ASIL B is sufficient are dashboard, in-car monitoring, keyless entry, lighting control, tire pressure monitoring, vision ADAS, and window control. Either to incorporate new electronic systems on board, or to upgrade existing ones without ISO 26262 compliance, the N25F-SE is well suited for the wide range of applications requiring ASIL B compliance. Leader of RISC-V Functional Safety. “Andes is the first RISC-V CPU vendor certified, for the development process of automotive processor cores, to be compliant with ISO 26262 standards up to ASIL D in 2020. With the certified development process in place, we formally started our functional safety roadmap to deliver at least one ISO 26262 compliant core every year to cover all segments of performance and features,” said Dr. Charlie Su, President and CTO of Andes Technology. “Andes has developed a wide range of AndesCore processors, from driving cost sensitive MCUs to accelerating datacenter AI/ML computations. We are excited to announce our first safety-enhanced AndesCore the N25F-SE based on the most popular and mature CPU IP family, the 25-series." ISO 26262 Full Compliance. The ASIL B fully compliant N25F-SE was developed under considerations on all applicable requirements of ISO 26262 standards by defining tailored safety activities with solid rationales, from the fundamental specification, analysis, and design to verification and many more. It comes with the Safety Package which includes Safety manual, Safety analysis report (FMEDA and more), and Development Interface Outline. Together, the N25F-SE and its Safety Package offer an effective, efficient, and flexible automotive solution. It greatly reduces the time for SoC design teams to certify their ISO 26262 compliant SoCs. In comparison, an ASIL B “ready” solution is without certifying all required ISO 26262 Parts (2, 4, 5, 8 and 9) and thus provides incomplete support for the SoC’s certification; as a result, SoC design teams must go through all the work the CPU IP vendors are supposed to do. In addition, the N25F-SE helps reduce the cost and power consumption for SoCs requiring only an ASIL B processor IP without forcing them to use a double-sized dual-core lock-step solution with ASIL D. “As the only public RISC-V CPU IP company and a leader in the RISC-V ecosystem, we want to raise the awareness of the importance of ISO 26262 full compliance.” Dr. Su stressed. Cidana. “Consumer experience is shaping expectations for In-Vehicle Infotainment (IVI) systems. It is one of the segments evolving rapidly in the automotive industry. Cidana offers the optimized LC3+ codec and makes it available on Andes ISO 26262 compliance platform. Other mainstream audio codecs can be supported based on the required performance,” said Chinn Chin, the Chief Executive Officer of Cidana. “We are looking forward to collaborating with Andes and bringing the Cidana solutions to automotive SoCs powered by the N25F-SE.” Green Hills Software. “We are pleased to expand our production-ready automotive safety solutions to support the safety-certified AndesCore 25-Series RISC-V IP core family from the technology leader, Andes Technology,” said Dan Mender, Vice President, Business Development, Green Hills Software. “This combined hardware-software solution for the AndesCore N25F-SE gives SoC providers a valuable head-start in offering integrated and optimized production-proven platforms for next-generation vehicle ECUs that require the highest performance and lowest power, with advanced tools that reduce their customers’ time to market and development costs.” IAR Systems. “RISC-V is being adopted at a remarkable speed in applications from the edge to the cloud and now it is entering the automotive market. IAR Systems support the mature and popular Andes RISC-V 25-series processors since its release a few years back in the IAR Embedded Workbench for RISC-V, Functional Safety edition. We are glad to learn that Andes N25F-SE has been certified for full ISO 26262 compliance,” said Rafael Taubinger, Sr. Product Marketing Manager at IAR Systems. “We are looking forward to extending our collaboration with Andes to support its Safety Enhanced processors starting from the N25F-SE enabling our mutual customers to speed up the path to using RISC-V in automotive safety-critical applications.” Parasoft. “We would sincerely congrats on Andes Technology's N25F-SE been certified to the ISO 26262 functional safety standard,” said Yue Liu, the President of Parasoft Greater China. "Andes is a leading provider of RISC-V processors, and PARASOFT, a solution provider that helps enterprises deliver defect-free software, is pleased to partner with Andes to further deliver RISC-V ecosystem solutions to our customers. I am confident that we will be able to provide a complete suite of testing solutions for the automotive safety lifecycle in the near future, helping customers improve their ability to develop and deliver high quality software.” Virtual Open Systems. “At Virtual Open Systems we are working with Andes to enable hypervisor-less mixed criticality virtualization supporting concurrent execution of a certified real time operating system (OS) with a general purpose OS using our VOSySmonitoRV, a low level firmware developed with ASIL certification in mind," said Daniel Raho, Virtual Open Systems SAS CEO. "We are excited to extend VOSySmonitoRV with support for Andes Safety Enhanced processors starting from the N25F-SE.” The AndesCore N25F-SE is available for licensing now. Over half of a dozen leading SoC companies are already developing in-vehicle applications with the N25F-SE. Following the N25F-SE, the D25F-SE with DSP/SIMD extension and Bit Manipulation extension is expected to be available in early 2023. About Andes Technology Seventeen years in business and a Founding Premier member of RISC-V International, Andes is publicly-listed company and a leading supplier of high-performance/low-power 32/64-bit embedded processor IP solutions, and the driving force in taking RISC-V mainstream. Andes’ fifth-generation AndeStar™ architecture adopted the RISC-V as the base. Its V5 RISC-V CPU families range from tiny 32-bit cores to advanced 64-bit cores with DSP, FPU, Vector, Linux, superscalar, and/or multicore capabilities. The annual volume of Andes-Embedded SoCs has exceeded 3 billion in 2021 and continues to rise. By the end of 2021, the cumulative volume of Andes-Embedded™ SoCs has surpassed 10 billion

Read More

Events