Scale Computing | January 27, 2022
Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, announced that its HC3 for Video Surveillance has been selected as a finalist in TechTarget’s Storage Magazine and SearchStorage.com’s annual Products of the Year Awards for 2021. TechTarget named Scale Computing’s HC3 Video Surveillance, a Milestone validated solution, as a finalist in the Hyperconverged & Composable Infrastructures category.
In its announcement, SearchStorage highlighted that Scale Computing’s HC5250D-V appliance “is purpose-built to be the infrastructure for video management systems and building automation systems. The product combines the high availability, simplicity, and scalability of Scale Computing's popular HC3 family. Video surveillance is one of the most prevalent edge uses, and this product fits into a small footprint.”
There is a growing need for edge computing to support an application-driven world as technology continues to extend its way into every part of the business. The need for video surveillance implementations are critical to business security and monitoring, and traditional video management systems simply aren’t enough for organizations today. We are committed to delivering innovative solutions, like video surveillance and HC3 Edge technology, to bring simple, available, and affordable infrastructure for applications in places where IT resources are impossible.”
Jeff Ready, CEO and co-founder of Scale Computing
Organizational demands for video surveillance and security systems continue to evolve to ensure assets, facilities, and people are protected. Scale Computing solves the challenge and complexity of virtualization deployments of video surveillance and access control applications for both customers and systems integrators alike. Verified to run on the most popular VMS solutions including Milestone, Digital Watchdog, and Axis, the HC3 Video Surveillance solution combines the scalability, simplicity, and high availability of Scale Computing’s HC3 family.
This news follows exciting award wins for the company, including:
Scale Computing’s HC3 Video Surveillance named a winner for the 2021 CRN Tech Innovator Awards in the Edge Computing category.
Scale Computing named on CRN’s 2021 Edge Computing 100 list.
Winner in both the Edge Computing category and the Converged/Hyperconverged Infrastructure category, of the 2021 CRN Annual Report Card (ARC) Awards. This is the third consecutive year Scale Computing has been recognized as a CRN ARC Award winner.
Scale Computing HC3 received two TrustRadius 2021 Top Rated Awards, in Hyperconverged Infrastructure and Server Virtualization.
Scale Computing received a 5-Star rating in CRN’s 2021 Partner Program Guide.
The Storage Magazine 2021 Products of the Year Awards recognizes winners in five categories: Backup and Disaster Recovery Hardware, Software and Services; Cloud Storage; Disk and Disk Subsystems; Hyperconverged and Composable Infrastructures, and Storage System and Application Software. All enterprise storage products were judged based on technological innovation, performance, ease of integration, ease of use and manageability, functionality, and value.
About Scale Computing
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform.
VIRTUAL DESKTOP STRATEGIES
Tailscale | June 27, 2022
Tailscale has released Tailscale SSH to beta, which makes authentication and authorization trustworthy and effortless by replacing SSH keys with the Tailscale identity of any machine. With Tailscale, each server and user device gets its own identity and node key for authenticating and encrypting the Tailscale network connection, and uses access control lists defined in code for authorizing connections, making it a natural extension for Tailscale to now manage access for SSH connections in your network.
“SSH is an everyday tool for developers, but managing SSH keys for a server isn’t so simple or secure, SSH keys are difficult to protect and time consuming to manage. Protecting your network connections with SSH keys requires that admins spend significant resources managing, provisioning, or deprovisioning user access. Tailscale SSH removes the pain from SSH key management with the same powerful simplicity Tailscale offers for virtual private networks.”
Tailscale Product Manager Maya Kaczorowski
Kris Nóva, Senior Principal Engineer and published distributed systems expert used Tailscale to create a private network between her homelab in New York and a datacenter in Iceland: “Tailscale is seriously the best user experience of my life. I ran a Kubernetes 1.24 cluster on Tailscale with eBPF CNI networking on top of a tailnet, which connects my private subnet at home, across the Arctic ocean to a private subnet in a volcano-powered datacenter in Iceland. It blew my mind how easy and powerful it was to use. I’m excited to use their new SSH feature.”
With Tailscale SSH, users can now securely code from their iPad running Tailscale, across operating systems to a Linux workstation, without having to figure out how to get their SSH private key onto their iPad. Enterprise Tailscale customers will reduce churn and resources on SSH key management or bastion jump boxes, and avoid risk of exposing memory unsafe servers to the open internet. The beta release gives all users:
Authentication and encryption: Authenticate, authorize, and encrypt SSH connections using Tailscale. No need to generate, distribute, and manage SSH keys.
SSO and MFA: Use existing identity providers and multi-factor authentication to protect SSH connections the same way you authorize and protect application access.
Built-in key rotation: Tailscale makes it simple to rotate keys with a single command and manages key distribution. Node keys can be rotated by re-authenticating the device, as frequently as every day.
Re-verify SSH connections: Tailscale works with existing identity providers and re-verifies before SSH connections are established, and gives users the option to re-authenticate when establishing high-risk SSH connections.
Revoke SSH access easily: When an employee offboards, Tailscale allows admins to revoke access to SSH to a machine almost instantaneously with Tailscale ACLs.
Manage permissions as code: Define connections to devices using a standard syntax and understand SSH access controls in a centralized configuration file.
Reduced latency with point-to-point connections: Connect directly from a device to a server, without having to hairpin through a bastion. Developers can connect wherever they work, without slowing them down by routing their traffic through the main office.
Add a user or server painlessly: Maintain users and servers in a network without adding complexity. Tailscale ACLs to give the right people access and add it to a team's known hosts.
Tailscale makes network security accessible to teams of any scale and gives developers and DevOps teams the ability to connect to resources easily and securely in the cloud, on-premises, and everywhere in between. Tailscale uses the WireGuard® protocol, the open source, opinionated standard for secure connectivity. It is set up and configured in a matter of minutes on average, while other VPN solutions take weeks to fully implement and several hours a week to maintain.
Tailscale builds software that makes it easy to interconnect and secure devices, no matter where they are. Every day, banks and multinational companies use Tailscale to protect their corporate networks. Homelabs and start-ups trust Tailscale to collaborate and share access to tooling. We're building a future for the Internet that's easy, small and safe, like it used to be. Founded in 2019 and fully distributed, we’re backed by Accel, CRV, Heavybit, Insight Partners, and Uncork Capital.
NordVPN | December 15, 2021
NordVPN has officially launched the NordVPN extension for Microsoft Edge browser, available on all platforms compatible with Edge. The new extension is extremely light and fast so users can switch between locations within seconds.
Microsoft Edge browser is based on Chromium, which means users can install the NordVPN extension via the Chrome Web Store. With this release, NordVPN is unlocking full official support for people who were already using other NordVPN extensions on Edge.
We knew many users were installing the NordVPN extension for Chrome on the Microsoft Edge browser. That's why we decided to improve their experience by releasing an official NordVPN extension designed for Edge. In terms of functionality, the new extension works exactly the same way as the ones for Chrome and Firefox, giving users a seamless experience across browsers."
Vykintas Maknickas, Product Strategist at NordVPN
Apart from Edge, NordVPN has browser extensions for both Google Chrome and Mozilla Firefox.
"We're constantly looking for ways to enhance our user experience. For example, we recently added M1 Mac compatibility and increased our bug bounty program to $50K for all Nord brands, including NordPass, NordLocker, and NordLayer. As part of a broader effort to shift Nord Security and our brands into a broader cybersecurity suite, pushing all of these initiatives brings us closer to doing exactly this," says Vykintas Maknickas from NordVPN.
To stress the importance of privacy online, NordVPN recently released the findings of its research on browser cookies and how browsing habits create different privacy and security risks.
NordVPN is the first brand in the Nord Security family of products and was established in 2012. NordVPN became the premier VPN solution of choice worldwide throughout the years, now serving more than 14 million users. Nord Security has also expanded its scope to include security solutions for businesses and advanced encryption tools for consumers, including NordPass, NordLocker, and NordLayer.
NordVPN is the world's most advanced VPN service provider used by over 14 million internet users worldwide. NordVPN provides double VPN encryption, malware blocking, and Onion Over VPN. The product is very user-friendly, offers one of the best prices on the market, has over 5,000 servers in 60 countries worldwide. One of the key features of NordVPN is the zero-log policy.
D2iQ™ | April 22, 2022
D2iQ, the leading enterprise Kubernetes provider for smart cloud-native applications, today announced the newest release of the D2iQ Kubernetes Platform (DKP). With customer-led updates, DKP 2.2 gives enterprises more control and visibility when deploying and managing Kubernetes deployments in any environment, and enables customers to accelerate mission-critical production deployments.
DKP now provides VMware vSphere infrastructure provisioning using Cluster API to simplify lifecycle management, a unified DKP user interface to improve the user experience, and access to Kaptain AI/ML to better support artificial intelligence (AI) and machine learning (ML) workloads, streamlining the development of smart cloud-native applications.
D2iQ is kicking off a customer technology preview of DKP Insights, a self-service troubleshooting capability that embeds D2iQ's industry-leading expertise in Kubernetes operations. DKP Insights analyzes the alerts, metrics, logs, and events from Kubernetes clusters managed by DKP and generates heuristic analytics for potential issues and operational challenges. This enables infrastructure teams to quickly identify and proactively resolve issues on their own providing greater support productivity, speed, and reduced costs, while preventing downtime and loss of revenue.
In addition, DKP now includes access to Kaptain AI/ML as a catalog application that enables enterprises to deploy Kaptain to other Kubernetes distributions managed by DKP, including Amazon Elastic Kubernetes Service (EKS) and Azure Kubernetes Service (AKS). With Kaptain AI/ML, organizations can develop, deploy, and run AI and ML workloads in production at scale with consistency and reliability.
"As Kubernetes deployments begin to scale in production environments, complexity increases exponentially, often limiting the success and impact of cloud-native projects," said Tobi Knaup, CEO of D2iQ. "The latest release of DKP further enhances our customers' experience in running enterprise-grade Kubernetes. Customer-led innovations, such as DKP Insights for improved platform management, empower organizations to accelerate time-to-value and increase reliability for all Kubernetes deployments. As the industry's leading independent Kubernetes platform, DKP continues to power the cloud-native applications that have become a requirement in modern business operations."
About D2iQ ™
D2iQ accelerates Day 2 success for smart cloud-native applications on enterprise Kubernetes. The D2iQ Kubernetes Platform (DKP) includes everything needed to adopt Kubernetes easily and expand Kubernetes use to multiple clusters across any infrastructure, whether on-premise, in the cloud, in air-gapped environments, or at the edge, and to enable smart cloud-native applications. D2iQ eliminates roadblocks to success, such as lack of skills, with our Kubernetes and cloud-native expertise, alleviates operational complexity with a simpler and easy-to-use platform, and addresses security concerns with military-grade security. D2iQ is headquartered in San Francisco with additional offices in London and Hamburg. D2iQ investors include Andreessen Horowitz, Hewlett Packard Enterprise, Khosla Ventures, Koch Disruptive Technologies, Microsoft, and T.Rowe Price Associates, Inc.