The outlook for investing in a more rational VR/AR market

HTC | April 11, 2019

The outlook for investing in a more rational VR/AR market
Last week, I made my way to the Microsoft Reactor in San Francisco for the VR Arcade conference. I moderated a panel on investing in virtual reality, augmented reality, and mixed reality. It was a far different environment for that kind of conversation than in 2016 or earlier.The event itself represented a pivot. Since consumer VR hasn’t taken off as much as expected, companies have shifted gears in augmented reality on smartphones or the VR arcade market. We are holding our own GamesBeat Summit 2019 conference on April 23-24 in Los Angeles at a “micro-amusement park” dubbed Two Bit Circus. Such places are sprouting up all over.

Spotlight

Cloud computing is changing the way businesses and users interact with computers and mobile devices. Gone are the days of expensive data centers, racks of disk drives, and large IT support teams. In their place are software applications delivered to users on demand from the cloud, high-capacity, auto-replicated, secure cloud-based disk-storage and databases, virtualized-server and desktop environments, and cloud-based collaboration tools which support on-premise-, remote-, and hybrid-team success.

Related News

CLOUD

Broadband Forum Unveils New Ground-breaking CloudCO Capabilities

Broadband Forum | October 29, 2021

A cutting-edge Broadband Forum demonstration has showcased how operators can utilize industry standards and existing investments to achieve a virtualized infrastructure that enables zero touch provisioning, service activation and session steering within a multi-vendor and white box environment. Bringing together leading service providers, vendors and interoperability labs at this year’s Broadband World Forum, the Cloud Central Office (CloudCO) project enables dynamic use cases, including multi-vendor service creation and activation and a truly virtualized disaggregated multi-vendor network. In a world-first, the demonstration also presented a new gaming session steering application, demonstrating how operators can use CloudCO to detect a change in user traffic type, check network conditions against defined service levels and reprogram session steering to meet them and preserve the user experience. “Dynamic session steering brings numerous benefits to a service provider’s business, allowing them to provide new and competitive service offerings with assurance capabilities that can seamlessly act on the network in a timely manner to ensure the assurance objectives of the service being offered." Tim Carey, Chairman of the Broadband Forum's OB-BAA open source project The CloudCO project recasts the Central Office hosting infrastructure to utilize Software Defined Networking (SDN), Network Functions Virtualization (NFV) and cloud technologies. Key components include disaggregated control plane functions in the Access and Edge networks, dynamic session steering as well as subscriber session steering, a Broadband Access Abstraction (BAA) layer with disaggregated control and management plane functions. The flagship architecture brings network and services agility, automation and orchestration and a unified vision of interoperable and streamlined service deployments. Supporting this year’s CloudCO demonstration was consulting and system integrator Reply, and service providers BT, TIM, and Vodafone, alongside engineers from Altice Labs, Capgemini Engineering, Broadcom, EANTC, Nokia, ufiSpace, VMware, and the University of New Hampshire – InterOperability Laboratory. “This year’s CloudCO demonstration continues to highlight the great work across many of the Broadband Forum working groups, including Access and Transport Architecture (ATA) as well as the formidable work within the OB-BAA,” said Craig Thomas, Vice President Strategic Marketing and Business Development at Broadband Forum. “The demonstration emphasizes the importance of a truly virtualized disaggregated multi-vendor network, and how operators can take full advantage of all of the open source benefits by leveraging specification standards.” The CloudCO framework is built from the ground up with components from the vendor community. To ensure full accessibility for participants, the demonstration was hosted both virtually and in-person to encourage safe participation during the Coronavirus pandemic. About the Broadband Forum Broadband Forum is the communications industry’s leading open standards development organization focused on accelerating broadband innovation, standards, and ecosystem development. Our members’ passion – delivering on the promise of broadband by enabling smarter and faster broadband networks and a thriving broadband ecosystem. Broadband Forum is an open, non-profit industry organization composed of the industry’s leading broadband operators, vendors, thought leaders who are shaping the future of broadband, and observers who closely track our progress. Its work to date has been the foundation for broadband’s global proliferation and innovation. For example, the Forum’s flagship TR-069 CPE WAN Management Protocol has nearly 1 billion installations worldwide. Broadband Forum’s projects span across 5G, Connected Home, Cloud, and Access. Its working groups collaborate to define best practices for global networks, enable new revenue-generating service and content delivery, establish technology migration strategies, and engineer critical device, service & development management tools in the home and business IP networking infrastructure. We develop multi-service broadband packet networking specifications addressing architecture, device and service management, software data models, interoperability and certification in the broadband market.

Read More

SERVER VIRTUALIZATION

Scale Computing and Acronis Announce Business Resilience System for MSPs, Purpose Built for Acronis Cyber Protect Cloud

Scale Computing | October 25, 2021

Scale Computing, a market leader in edge computing, virtualization and hyperconverged solutions, and Acronis, the global leader in cyber protection, jointly announced the availability of Business Resilience System (BRS) for MSPs, Purpose Built for Acronis Cyber Protect Cloud - an easily scalable Business Resilience appliance that allows for instant recovery of all critical workloads in an environment, regardless of where those workloads are running. This hybrid cloud platform delivers MSPs everything they need to ensure clients avoid downtime, lost revenue, and fallout from cyber attacks. Tightly integrated with Acronis Cyber Protect Cloud, the BRS for MSPs solution delivers the agility of a hybrid cloud data protection platform, and gives service providers the confidence that they will meet Service Level Agreements (SLAs) and improve recovery times even under the most challenging circumstances. Scale Computing also announced today that CEO Jeff Ready is presenting at Acronis CyberFit Summit in Miami on Tuesday, October 26, 2021 at 12:15pm. Scale Computing and Acronis partnered closely on the integrated technology powering the BRS for MSPs appliance family to give service providers the flexibility to back up VMware, Hyper-V, Scale Computing HC3 or even physical workloads and endpoints, and then instantly power them on as virtual machines (VMs) on the local BRS appliance at a moment’s notice. Utilizing the convert to VM functionality in Acronis Cyber Protect Cloud, this allows BRS to function as a local backup and disaster recovery (DR) target for any environment, giving MSPs the ability to get critical workloads back up and running instantly on-premises at a fraction of the cost of other solutions. The Scale Computing Business Resilience System is a new line of HC3 appliances designed to work seamlessly with Acronis Cyber Protect Cloud and support end-to-end business continuity strategies such as backup and rapid local recoveries. With deeper and low cost storage, virtualization capability, and integration with Acronis, the Business Resilience System is a new breed of HC3 appliance purpose-built for the BCDR needs of MSPs. Scale Computing and Acronis are delivering a solution with simple management, easy scalability, and cost-effective pricing, thereby helping organizations standardize their production and business continuity systems while simultaneously improving business outcomes and resilience. “I have been waiting for a scalable, easy-to-manage, hybrid cloud platform like this for a while now. Combining Scale Computing HC3 with Acronis Cyber Protect Cloud allows us to deliver cybersecurity, data protection, and recovery services all in a single solution. We’ve found it the best way to meet all our clients’ SLAs and expectations when it comes to data protection. And at 20% less than other solutions on the market, it is the easy choice for a very cost-effective solution. The ability to backup VMware, Hyper-V, and HC3 VMs, as well as instantly start them on the BRS appliance when needed, allows us to provide our clients the flexibility and data security they expect from CCB Technology.” Jacob Turowski, Director of Enterprise Architecture, CCB Technology “Acronis Cyber Protect Cloud is rapidly becoming the go-to-platform for Managed Service Providers that are modernizing their stack of tools to protect their clients from downtime due to cyberattacks while at the same time addressing the growing list of requirements from a compliance and regulatory standpoint,” said Acronis Vice President and General Manager, Americas, Pat Hurley. “With the new Scale Computing BRS for MSPs, Acronis partners and their clients benefit from a hybrid cloud solution that delivers instant recovery for all workloads.” Scale Computing BRS for MSPs, Purpose Built for Acronis Cyber Protect Cloud, offers service providers the following benefits: Hybrid Cloud Not everything belongs in a public cloud, which is why so many forward-thinking MSPs offer a hybrid mixture of cloud services; hybrid clouds offer the benefits of both public and private clouds. Hybrid approach allows data and applications to interoperate across boundaries (for example, cloud versus on‐premises) Data Protection Provides active ransomware protection, granular-file level backups, disaster recovery, long-term archiving, and the ability to instantly spin up workloads on premises are central to the BRS for MSPs and Acronis Cyber Protect Cloud solution. When combining BRS and Cyber Protect Cloud, MSPs can virtually eliminate client downtime with a platform that easily scales out storage requirements, improving business outcomes and client satisfaction. Convert to VM - Any VM You Need Utilizing the convert to VM functionality in Acronis Cyber Protect Cloud, users can back up VMware, Hyper-V, Scale Computing HC3, or even physical workloads and instantly power them on as VMs on the BRS appliance at a moment’s notice. This allows BRS to function as a target for any environment, giving MSPs the ability to get critical work-loads back up and running instantly on-premises. Built for MSPs to Boost Recurring Revenue BRS for MSPs, Purpose Built for Acronis Cyber Protect Cloud was designed to improve the bottom line of service providers. Integrated platform utilizes Scale Computing’s award-winning interface, eliminating confusion and time-consuming management tasks. Lowers the cost of entry vs alternatives by 20% or more with even greater savings as your needs grow. “Scale Computing has a strong reputation for delivering organizations resiliency for their operations. The Business Resilience System for MSPs, Purpose Built for Acronis Cyber Protect Cloud, takes this to another level by giving MSPs everything they need to protect their clients from downtime, lost revenue, and fallout from cyber attacks. We integrated our HC3 technology with Acronis’ industry leading data protection and cybersecurity cloud solutions so MSPs can stay ahead of modern cyberthreats with award winning anti-ransomware,” explained Jeff Ready, CEO and co-founder, Scale Computing. “As an organization we are committed to the success of our channel partners, and the BRS for MSPs hybrid cloud solution will help service providers increase revenue through better service levels and new services. Scale Computing is a ‘Partner First’ organization, and this offering helps deliver on that promise.” About Scale Computing Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius. About Acronis Acronis unifies data protection and cybersecurity to deliver integrated, automated cyber protection that solves the safety, accessibility, privacy, authenticity, and security (SAPAS) challenges of the modern digital world. With flexible deployment models that fit the demands of service providers and IT professionals, Acronis provides superior cyber protection for data, applications, and systems with innovative next-generation antivirus, backup, disaster recovery, and endpoint protection management solutions powered by AI. With advanced anti-malware powered by cutting-edge machine intelligence and blockchain based data authentication technologies, Acronis protects any environment – from cloud to hybrid to on premises – at a low and predictable cost. Founded in Singapore in 2003 and incorporated in Switzerland in 2008, Acronis now has more than 1,700 employees in 34 locations in 19 countries. Its solutions are trusted by more than 5.5 million home users and 500,000 companies, and top-tier professional sports teams. Acronis products are available through over 50,000 partners and service providers in over 150 countries and 25 languages.

Read More

VIRTUAL DESKTOP STRATEGIES

Sangfor Releases Extended Detection, Defense and Response (XDDR) Application Containment

Sangfor Technologies | September 17, 2021

Sangfor Technologies announced the release of their long-awaited extended protection solution, XDDR Application Containment. Based on Sangfor's XDDR security framework, Application Containment allows the network and endpoints (both on-premise or in-cloud) to work together to identify, control, and report on all applications running on endpoints, or using the network to communicate. Sangfor's XDDR provides an integrated solution that protects against ransomware, malware, APTs, phishing websites and email, and potentially malicious applications. Controlling and enforcing internet access policies in the workplace has not been easy. Employees want access to the internet for personal use as well as their work, making overly restrictive security solutions difficult to implement and maintain. Organizations deploy proxy servers to control access to the internet and external applications. This access control is necessary to maintain productivity, ensure users do not access malicious sites and unknowingly download malware, and to maximize bandwidth utilization for critical business applications. Many users employ VPN (virtual private network) technology, anonymous browsers, and other proxy avoidance applications to bypass organizational security and content filtering policies enforced by the proxy servers. Sangfor XDDR Application Containment solutions enable the organization to quickly create Proxy Avoidance Protection policies for blocking usage of proxy avoidance tools and applications on the endpoint. Sangfor's NGAF (Next Generation Application Firewall), IAG (Internet Access Gateway) and Endpoint Secure products work cohesively to provide real-time visualization of all application communication throughout the entire network, quickly identifying proxy avoidance traffic. Proxy Avoidance Protection policies can quickly be built on the NGAF or IAG from Sangfor's extensive library of anti-proxy and proxy avoidance applications. These policies are then deployed by Endpoint Secure to block or monitor anti-proxy applications. Organizations can also create whitelists and blacklists of applications in Application Containment. This gives administrators granular control of applications running on PCs, laptops, and servers to prevent installation of malware and ransomware, especially with users working from home, to prevent infection of corporate, enterprise, or organizational networks, resources, and critical assets. Peripheral Control manages access to connected USB devices to prevent data leakage. Traditional extended detection and response (XDR) is network security technology designed to provide increased visibility, analysis functions and response to cyber-threats in the network, cloud, applications, and endpoints. XDR is positioned as the most sophisticated technology available but tends to be more marketing hype than reality, having been developed as the progression of EDR, or endpoint detection and response, to work with non-integrated network security products. Unlike XDR products, Sangfor XDDR Application Containment is the only true solution where network and endpoint work together to identify, control, and report on both allowed and malicious applications running on endpoints and communicating across the network. Sangfor NGAF, IAG and Endpoint Secure coordinate responses so Application Containment can provide real-time blocking and monitoring of unapproved or malicious applications. Control can be regained from rogue applications delivered by ransomware, malware and APTs that users bring into networks. Sangfor Application Containment blocks the bypassing of internet access controls and prevents users from bringing them in again. About Sangfor Technologies Sangfor Technologies is a leading global vendor of IT infrastructure and security solutions, specializing in Cloud Computing & Network Security with a wide range of products & services including Hyper-Converged Infrastructure, Virtual Desktop Infrastructure, Next-Generation Firewall, Internet Access Gateway, Endpoint Protection, Ransomware Protection, Managed Detection and Response, WAN Optimization, SD-WAN, and many others.

Read More

Spotlight

Cloud computing is changing the way businesses and users interact with computers and mobile devices. Gone are the days of expensive data centers, racks of disk drives, and large IT support teams. In their place are software applications delivered to users on demand from the cloud, high-capacity, auto-replicated, secure cloud-based disk-storage and databases, virtualized-server and desktop environments, and cloud-based collaboration tools which support on-premise-, remote-, and hybrid-team success.