For Sale – PC Core i7 920, Asus MB, 4870×2, 6Gb OCZ, BD/HDDVD-rom, BFG PSU

I have for sale my slightly old but still very capable gaming PC. This was built by myself as I couldn’t find the specific spec I wanted. PLEASE NOTE THIS DOES NOT INCLUDE A MONITOR, MOUSE OR KEYBOARD) The spec is as follows:

Intel Core i7 920
Noctua NH-U12P SE2 Cooling Fan
Asus P6T Deluxe V2 – Latest Firmware (v1202)
6Gb (3 x 2Gb) OCZ 12800 (1600) Platinum DDR3
Sapphire 4870×2 2Gb GDDR5 (Latest driver, Dual processor graphics – Crossfire enabled)
BFG ES-800 800w PSU
Maxtor Diamondmax 10 300Gb SATA 1.5Gb/s 7200rpm
LG Blu-Ray/DVD Writer/HD-DVD rom
Antec Nine Hundred Two Case
Genuine Windows 7 Home Premium – All of the latest updates have been downloaded and installed.
Includes 3 additional SATA cables, MB instruction manual, SSD caddy for Antec case

All the above were top of the range or close to top of the range parts and while compared with some of today’s gaming PCs (Costing an arm and a leg more) it’s not the most powerful, I still consider it a very capable machine. Having run a benchmark test through “Heaven Benchmark” I have found that this PC is still getting 30fps in Full HD and High quality.
I have recently taken the whole system apart, dusted the inside and out, lubricated any noisy fans and reapplied the thermal compound to the CPU and GPUs. I have also put a fresh install of Windows 7 Home Premium and downloaded/installed all available updates. I have downloaded a few choice programs such as VLC and MSI Afterburner (Allows for some overclocking and keeps the GPU cool), but have kept the system as clear as possible. I am more than happy to install any further programs on request before collection. Also, while the HDD is more than capable, I think this system is begging for a SSD to really breathe more life. I cannot supply a SSD, but if you want to source one (At your own cost) I am again more than happy to install the drive and migrate the operating system. Same goes for adding USB 3.0 connections via the installation of a PCIe card onto the motherboard.

Pictures are attached. Please do not hesitate to ask any questions. 400 ONO for the whole unit (I priced up the system based on what people were selling the individual components second hand for). Please feel free to make an offer though. Collection only please due to the size and weight.

Thank you for reading!

Price and currency: 400 GBP
Delivery: Goods must be exchanged in person
Payment method: Cash or bank transfer
Location: Stanwell, Middlesex
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I prefer the goods to be collected

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Powered by WPeMatico

For Sale – MacBook Pro 13″ Early 2011 i5 / 250GB SSD / 2.3GHz / 8GB RAM – Very Very Low Cycle Count

Here I have for sale my MacBook Pro, Early 2011 model, i5, 2.3Ghz with Upgraded Samsung 850 Evo 250Gb and 2x4GB (total 8Gb) Ram and comes with latest OS Sierra installed.

Full spec can be found here:

MacBook Pro “Core i5″ 2.3 13″ Early 2011 Specs (Early 2011 13”, MC700LL/A, MacBookPro8,1, A1278, 2419*) @ EveryMac.com

This is the model that the memory, hard drive and battery can be changed quite easily and you can also remove the DVD drive to fit another SSD/HDD in its place, even use RAID0 too! – Technically if you take care of this MacBook it should last for ever …replacing the parts as and when you need too.

The MacBook screen is untouched, the keyboard is like new and the trackpad and palm rest area is untouched.

The top case and bottom case have some micro scratches which the camera can’t capture but are also not very noticeable, there are no dents or any physical damage at all, it has never been dropped, grazed against anything.

For its age the MacBook is in great condition and still passes my OCD test :), the new owner will not be disappointed.

Battery Cycle count is just 16!, I have included some screenshots of the condition of the battery and it lasts ages. (count may go up one digit when I reformat the drive and reinstall Sierra)

all ports, DVD drive, camera, backlit keyboard and Apple Logo Light work fine (the Retro Logo sticker can be taken off if you wish), Charger also included

With the upgraded 250Gb SSD, it flies!

Only selling as I fancy buying a MacBook Air as I’m no power user by any means.

We are a Smoke Free, Pet Free Household

Loads of Pics!:

[​IMG]

[​IMG]

[​IMG]

[​IMG]

[​IMG]

[​IMG]

[​IMG]

[​IMG]

[​IMG]

[​IMG]

[​IMG]

[​IMG]

[​IMG]

[​IMG]

[​IMG]

[​IMG]

[​IMG]

[​IMG]

[​IMG]

more pics on next post…

Postage is included which will be quite hefty to cover insurance etc

Price: £380 Delivered

Price and currency: £380
Delivery: Delivery cost is included within my country
Payment method: Paypal (please add fees), Bank Transfer or Cash on Collection
Location: Manchester
Advertised elsewhere?: Advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Powered by WPeMatico

For Sale – Apple MacBook Air 2009 13 inch model Offers??

Need to shift this now. So open to sensible offers!!

Apple MacBook Air mid 2009 model purchased the end of 2010
Please read fully as no refund is given.
Internal HD included (needs fitting!)

However, I have got the Laptop to boot via a USB 500GB hard drive.
It works just fine!

I have had it on charge with my daughters MacBook Pro charger, although, that is not included and you will have to source your own charger.

There is no PSU
There is no box

Ask for more detail if needed, I will be completely upfront as once sold it is your responsibility.

See image pictures posted.

There is the odd bop and bump her and there and a few cosmetic issues. But to be honest, it doesn’t look too bad and when you open it up, it looks pretty damn good!

Collection is welcome.

Price and currency: Offers?? £160
Delivery: Delivery cost is not included
Payment method: BACS PPG
Location: Bolton
Advertised elsewhere?: Advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Powered by WPeMatico

Wanted – HP Microserver or Dell T20

How much are you looking to spend?

I picked up a gen 8 with an i3 and 8gb ram (including ILO activated) the other day to do some work training at home and have since found out they are willing to let me have some of our work kit so it’s likely to be surplus to requirements.

Would be £275 tho so a fiat bit more than the entry level one after cashback

Powered by WPeMatico

Hacking voting machines takes center stage at DEFCON

LAS VEGAS — “Anyone who says they’re un-hackable is either a fool or a liar.”

Jake Braun, CEO of Cambridge Global Advisors and one of the main organizers of the DEFCON Voting Village, said the U.S. election industry has an attitude similar to what had been seen with the air and space industry and financial sectors. Companies in those sectors, Braun said, would often say they were un-hackable their machines didn’t touch the internet and their databases were air-gapped —  until they were attacked by nation-states with unlimited resources and organized cybercrime syndicates and they realized they were “sitting ducks.”

The fear of threat actors hacking voting machines and tampering with election results has been stoked in the wake of the 2016 U.S. presidential election and growing questions about Russia interference. That false sense of security that governments may have had about election infrastructure received yet another blow at this year’s DEFCON, where attendees gathered in the conference’s Voting Village to successfully penetrate different types of e-voting machines.

“This idea that’s being perpetuated in the elections industry, whether it be government or vendors, that these are un-hackable machines because they don’t touch the internet or voter registration databases that are un-hackable because they’re air-gapped is just ridiculous. If you said something like that here, you’d be laughed at,” Braun told SearchSecurity in an interview at DEFCON. “The sin isn’t the fact that some secretary of state or clerk gets hacked or some vendor’s machine gets hacked. The sin is not asking for help and saying that you’re un-hackable, both of which things are ridiculous.”

DEFCON hacking voting machines

Braun said that everyone at DEFCON assumed hacking the voting machines would be successful from the start. Ultimately, Braun said the participants were able to get into two systems an hour and a half after starting, and it has since been reported that all of the machines at DEFCON were hacked in less than two and a half days “without inside or domain-specific knowledge.”

“The guys in here literally have the database of a poll book — they’ve already accessed it — and they’re able to go in and say people have already voted, so that if you showed up to your precinct it would say you already voted so you couldn’t vote,” Braun said. “They were able to uncheck people as voting, which would enable people to vote multiple times. They were one of the ones who got in within the first hour and forty minutes.”

Hackers were also able to pull off some more unconventional tricks, such as analyzing unintentional radio signals created by the cables connecting a voting machine to a printer, as well as installing Windows Media Player on the AVSWinVote system in order to “Rick-roll” DEFCON attendees by playing Rick Astley’s 1980s pop song “Never Gonna Give You Up.”

If we don’t improve the security of our voting systems, we’re basically handing the keys to the backdoor of our democracy over to the Russians and whoever else wants to mess with us.
Jake BraunCEO, Cambridge Global Advisors

Even pulling together the Voting Village proved an impressive feat as Braun said he called Jeff Moss, founder of DEFCON, in February or March 2017 to suggest hacking voting machines. Braun got the go-ahead in April to create the Voting Village where attendees from around the world would be given a chance at hacking voting machines.

“So, all of this came together in about two and a half months. We’ve got about two dozen machines, a couple poll books, and we got an elections clerk to give us the specs of their network and we built it on a virtual cyber range in there,” Braun said. “So, we’ve got guys and gals who are able to sit there and attack and defend a clerk’s network, including voter registration databases and all that stuff.”

All of the machines used in this year’s DEFCON Voting Village were purchased second-hand, but Braun is optimistic the companies that make official voting equipment will donate systems in future years. Braun said the Voting Village has already been slated as a permanent fixture at DEFCON.

Responding to election hacking

Candice Hoke, law professor and co-director of the Center for Cybersecurity and Privacy Protection, said in a DEFCON talk the laws surrounding investigations of potential election hacking were troublesome.

“In some states, you need evidence of election hacking in order to begin an investigation … This is an invitation to hackers,” Hoke said. “We all know in the security world that you can’t run a secure system if no one is looking.”

Barbara Simons, former president of the Association for Computing Machinery and current board chair for Verified Voting, said the push towards paperless ballots has made it very difficult or impossible for election officials to perform recounts if it suspected there was hacking of voting machines.

“We need to get paper ballots everywhere, but we also need get people to look at them because those paper ballots, by-and-large, are being counted by computers in optical scans, and those computers are computers,” Simons said. “We need to get laws passed, or requirements, that after every election, before the votes are certified a manual random post-election ballot audit is conducted as a check against the computers and the scanners.”

Simons said there were currently 14 states that have electronic-only voting, meaning there is no way to perform a proper recount and many states have retrofitted electronic voting machines with paper copies printed on thermal rolls, which are typically seen in supermarket receipt printers.

“Those retrofits are really bad designs. Most people don’t look at them. They can be very hard to read because the font can be very small. It can be designed to print out everything a voter does with no summary page, making it difficult to see who someone voted for. And they’re hard to recount because it’s a continuous roll,” Simons said. “If you want to count something, the easiest way to do it — like you do with money or cards — is you sort it into piles and count each pile. But if it’s a continuous roll, you can’t do that.”

Improving election security

Awareness of election security issues has been on the rise, according to Braun. Outside of the voting machine hacks at DEFCON, the words of General Doug Lute, former U.S. Ambassador to NATO, who spoke at the conference, the various local election officials at DEFCON and former U.S. intelligence chief James Clapper, should help push awareness even more. 

Braun said a common argument from election officials is there is a need for physical access when hacking voting machines, but he noted that a motivated nation-state with enough intelligence operatives could gain that access relatively easily.

“The fact that they can drive around — they only have to go to a handful of counties around the country — the machines are kept in warehouses with padlocks, essentially,” Braun said.

Braun said there is a need to fundamentally rethink how people are trying to solve this problem. He said that for the last decade or so the focus has been on the approximately 3,000 county clerks and the 50 secretaries of state urging better security, upgrades and audits.

“But the thing is: A) you’re not going to get to all of those people and B) actually about 20 percent of them change every year because they’re elected or appointed, so you have high levels of turnover. So it’s literally an unsolvable problem if you approach it that way,” Braun said. “Instead what needs to happen is governors need to take ownership of this.”

Braun said state governors were perfectly placed to organize the county clerks and secretaries of state and implement better election security procedures as well as to petition the federal government for more funding and resources to put towards new systems, upgrades and risk limiting audits.

“I think the only way that the governors take ownership of this and work together with Homeland Security is if the national security elite in this country — leaders in the intelligence community, military, foreign policy — say what is true, which is that this is a direct existential threat to the United States from a foreign adversary,” Braun said. “And if we don’t improve the security of our voting systems, we’re basically handing the keys to the backdoor of our democracy over to the Russians and whoever else wants to mess with us.”

Powered by WPeMatico

Cohesity converged data protection bulks up hyper-convergence

Cohesity’s converged data protection expanded its hyper-converged secondary storage platform by adding NAS support beyond NetApp and hypervisor support beyond VMware.

Cohesity DataProtect 5 (code-named “Orion”) software also now supports data deduplication for object storage, global indexing and file system quotas with audit logs.

DataProtect is part of the Cohesity DataPlatform that integrates software on disk appliances to converge backup, archiving and other secondary storage functions. Cohesity first launched its DataPlatform in 2015, and has since been building out enterprise-level features for the converged data protection.

Cohesity now supports Microsoft Hyper-V, Linux KVM and Nutanix AHV hypervisors. It began with support only for VMware hypervisors. And while earlier versions backed up NetApp NAS devices, the Orion release protects data on Dell EMC Isilon, Pure Storage FlashBlade, and any NFS and SMB file systems.

The newest DataProtect also supports global deduplication for Amazon S3 object storage.

We are able to back up any hypervisor, any NAS device.
Patrick Rogersvice president of marketing, Cohesity

“We are able to back up any hypervisor, any NAS device,” said Patrick Rogers, vice president of marketing at Cohesity. “We are extending our scope. We now offer multiprotocol access, which is important because people use NFS, SMB or S3. It’s all globally deduplicated at a variable block level. Nobody offers globally deduped object storage. [Dell EMC] Data Domain does it in one appliance. We do it across appliances.”

Cohesity has added a higher capacity 2U appliance, the C3000 storage node. The C3000 holds up to 183 TB of raw capacity for hyper-converged secondary storage, compared to the C2000 node that holds up to 25 TB. Customers can mix and match the C3000 and C2000 nodes in clusters.

Cohesity said the Cloud Edition of its converged data protection for hyper-converged secondary storage has become generally available.

Cohesity platform ‘simplifies the management’

Cohesity aims to be the platform for converging all non-primary storage. It sells its DataPlatform as the underlying file system that manages storage across the Cohesity storage nodes. It handles features such as data deduplication, compression, encryption and tiering across hard disk drives, solid-state drives and the cloud for hyper-converged secondary storage.

DataProtect can replace backup software so the Cohesity storage appliances work as integrated backup boxes without the need for separate backup applications and media servers. The converged data protection software is packaged with Cisco UCS servers and Hewlett Packard Enterprise ProLiant servers.

Cohesity use cases include data protection, test and development, archiving, search and analytics for hyper-converged secondary storage.

Henry Baltazar, research director of storage at 451 Research, said Cohesity stands out among the competition for its global deduplication for object storage. This allows administrators to both cull redundant data and manage the deduped data from a single pool rather than multiple silos.

“As data gets bigger, the commonalities increase,” Baltazar said. “This simplifies the management. It’s kind of rare to do global deduplication on object storage. It has some [deduplication] efficiencies, but this expands the efficiencies.”

Arun Taneja, founder of analyst firm Taneja Group, said Cohesity’s support for “any NAS” means customers don’t have to use network data management protocol (NDMP) to back up data between NAS and backup devices. Previously, the Cohesity converged data protection software worked only with NetApp systems, which required NDMP.

“In NetApp, you have to use NDMP to get into a protective device,” Taneja said. “NDMP is a very heavy protocol and it takes forever to get out of [systems]. Now, Cohesity announced they can pull data out of anything that uses NFS or SMB. It’s a speed issue. NFS supports any NAS device; not every NAS device supports NDMP.

“Multiprotocol access is common these days, but it’s done through gateways,” he said. “These guys do it clean, with no gateways.”

Powered by WPeMatico

For Sale – iMac 24″ Mid 2007

I have for sale an a 24″ mid 2007 iMac.

The specs are:

Running El Capitan
2.4GHz Intel Core 2 Duo
320GB hard disk
2GB DDR2 RAM
ATI Radeon HD 2600

The iMac is in reasonable condition for it’s age with the usual scuffs and marks you would expect. The screen works fine but does appear to have some dark patches at the edges something I believe is a common thing.

There is no box and there are no accessories (keyboard, mouse etc) included.

I don’t know what this is worth so I have put £200 collected.

Price and currency: £200
Delivery: Goods must be exchanged in person
Payment method: BT or PPG
Location: Manchester
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I prefer the goods to be collected

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Powered by WPeMatico

ONC focuses on creating interoperability between health systems

Efforts to create interoperability between health systems and stop data blocking have been going on for some time now. Although there are some isolated examples of interoperability in healthcare, in general, experts agree it still is not widely happening.

In a call with reporters, officials from the Office of the National Coordinator for Health IT (ONC) discussed the federal entity’s role in promoting and creating interoperability between health systems.

Donald Rucker, M.D., national coordinator for health information technology at ONC, said the agency is focused on three interoperability use cases. The first is enabling health information to move from point A to point B, regardless of location or IT system. The second is enterprise accountability. This use case mainly addresses “complaints about ‘I can’t get my data out of a system,'” Rucker said. “That bulk transferability, that sort of fundamental data liquidity and … data in bulk so you can actually do analytics on it and see what’s going on overall.” And the third is competition and modernity. “And that’s open APIs,” Rucker said. “You look at Silicon Valley, you look at modern computing, if you go to any of the modern computer science conferences it’s all about APIs.”

The challenge is a lot of these things are far more than just standards.
Donald Rucker, M.D.national coordinator for health information technology, ONC

Genevieve Morris, principal deputy national coordinator for health information technology at ONC, explained that, because of the use cases Rucker cited, ONC is tweaking its interoperability roadmap.

“The way that we’re thinking about interoperability right now is basically four targets: technical, trust, financial and workforce,” she said.

The roadmap to interoperability

“The challenge is a lot of these things are far more than just standards,” Rucker said, explaining that business relationships tend to complicate things as well.

Rucker used problem lists — a list of patient’s ailments — as an example.

“It can accrue over time. [For example, the patient] had a cold in 1955, right? Do they still have a cold? Probably not. So you have to curate it,” Rucker said. “It’s often said, ‘I don’t have a shareable problem list. I don’t have an interoperable problem list’. … We don’t have a business model to keep the problem list up to date and meaningful.”

Rucker’s point is that, when people talk about interoperability between health systems, they’re often talking about many different issues. “They’re often asking for a whole bunch of other stuff as well,” Rucker said. “They’re asking for data curation, and maybe a part of the goal of ACOs and HMOs and value-based payments is to provide incentives for these things, but we’re not there yet.”

Underneath all of this is one question, Rucker said: “Are we going to pay for structure?”

“Is it going to be free text and maybe we throw in natural language processing or machine learning or you just read it?” Rucker said. “We’re trying to be mindful of that, we’re trying to be mindful, if you will, of the physics of information and what is plausible to regulate, what society has to sort out, what payment mechanisms we have to sort out.”

APIs: It’s complicated

Some laud APIs as the key to interoperability between health systems. But Rucker says it’s a bit more complicated.

“Two things to consider: One is the API on the vendor level, right? The technical support for the EMR vendor. The second is what does an open API mean at the provider level? Open API sort of gets thrown around, but potentially they are very different approaches,” he said.

Rucker explained that while an open API from a vendor, for example, is a set of tools enabling access to information, that information actually sits in the databases of the healthcare providers. And this is where the complexities come into play, despite APIs enabling access to information.

“So if I’m a Silicon Valley app developer, I can’t hook up to some large national EMR vendor because they don’t actually have any of the clinical data,” he said. “The data is all sitting in, you know, pick your hospital system, pick your provider. So that’s really the dichotomy.”

ONC’s role in preventing data blocking

From a regulatory point of view, creating boundaries around data blocking can be tough, Rucker said.

“A large part of our work is coming up with language that meets everyone’s needs here and that’s a difficult task,” Rucker said.

He added that ONC can’t simply mandate everyone throw away whatever systems they’re currently using and implement a totally new IT system. “We have to be mindful of what’s out there and what can be done,” Rucker said.

Rucker pointed out, however, that the 21st Century Cures Act, a U.S. law enacted in December 2016, does include a data blocking reporting requirement. Meaning that when healthcare organizations experience or come across any instance of data blocking, they must report it to ONC.

“To the extent that information blocking exists, we’re presumably going to see some set of reports from some folks on that,” he said.

Powered by WPeMatico

Red Hat takes Permabit for inline data deduplication

Red Hat acquired the assets of data reduction software vendor Permabit this week, around the same time that Red Hat Enterprise Linux 7.4 became generally available. Permabit’s inline data deduplication, inline compression and thin provisioning didn’t make it into RHEL 7.4, but Red Hat executives plan to add those features to future releases.

Red Hat on Monday finalized its acquisition of 17-year-old data reduction Permabit for an undisclosed sum. Red Hat plans to incorporate Permabit’s data reduction into future commercial distributions of the Red Hat Enterprise Linux operating system. RHEL provides the base platform that supports Ceph, Gluster, OpenShift containers and OpenStack cloud storage.

Permabit began as an archiving vendor in 2000. Its first commercial offering in 2004 was Permeon content-addressable storage for long-term data retention. The name changed to Permabit Technology Corp. following a management buyout in 2007, and the company switched its focus to inline data deduplication following the first wave of dedupe products into the market.

Permabit launched its Albireo suite of data efficiency software suite in 2010 aimed at storage array vendors, claiming design wins that included Dell, Hitachi Data Systems and NetApp. It released a Linux-based version of Albireo Virtual Data Optimizer (VDO) in 2016, targeting Ceph and Gluster systems running direct-attached block storage. That makes it a fit for RHEL.

Since Permabit first started selling deduplication software, the technology has gone from strictly for secondary storage to a key enhancement of primary storage. Dedupe and compression allow customers to use less storage for their data, which helps mitigate the cost of flash media.

“It’s not a secret that inline data deduplication and compression have made the transition from nice-to-have technologies to something that customers typically expect. Especially with the advent of solid-state drives, getting control of the actual amount of physical storage that’s required is important,” said Gunnar Hellekson, director of product management for RHEL and Red Hat Enterprise Virtualization.

Hellekson said 16 Permabit employees will join Red Hat, including Founder and CTO Jered Floyd and Vice President of Product Louis Imershein. Hellekson said Red Hat has not yet decided whether to maintain the Permabit branding and marketing.

We have to wait and see what Red Hat does with the Permabit technology, but boy, I sure do see the potential.
Dave Russellanalyst, Gartner

Permabit’s VDO inline data deduplication for Linux gives the integration a head start, said Dave Russell, a distinguished Gartner analyst.

“We have to wait and see what Red Hat does with the Permabit technology, but boy, I sure do see the potential. This isn’t a science fair exhibit they’re acquiring. Permabit has a mature technology that should make Red Hat a more credible storage supplier,” Russell said.

Easing the integration is the fact that Red Hat’s engineering team is in western Massachusetts and Permabit’s headquarters is in Cambridge, Mass.

Red Hat’s Hellekson said the goal is to continue supporting Permabit’s existing customers. Still, Permabit’s OEM partnerships could be in jeopardy.

“OEMs should assume the Albireo platform is at the end of development,” Gartner’s Russell said. “The code in their OEM solutions will continue to work, but they should assume that updates and things like compatibility checking may not continue going forward.”

Powered by WPeMatico

Level 3 offers Amazon cloud collaboration tool as a service

Level 3 Communications has launched Amazon Chime as a managed service — the latest sign that the cloud collaboration tool is capable of competing with Microsoft’s Skype for Business and Cisco’s WebEx.

Last week’s introduction of the Level 3 service demonstrates progress in Amazon’s goal of becoming an enterprise communications provider, said Ira Weinstein, an analyst at Wainhouse Research, based in Duxbury, Mass.

“If I was advising one of my large enterprise clients, I would tell them you now have a very reputable vendor’s product in Chime, and you’ve got it wrapped in Level 3’s production-friendly, managed environment,” he said. “Second, Chime is more than sufficient for the typical enterprise, and when you wrap it in Level 3’s managed services, it becomes better supported.”

Level 3, a multinational telecommunications and internet service provider, hopes to tap into the large enterprise customer base of Amazon Web Services, the retailer’s platform-as-a-service business, said Jon Arnold, an analyst at the Canadian firm J Arnold & Associates. In the second quarter, AWS generated $4.1 billion in net sales.

 “You can’t ignore Amazon,” Arnold said. “They’re too big.”

Other Amazon partners in Chime cloud collaboration tool

Amazon, however, is not big enough to succeed in the crowded UC and collaboration market on its own. Along with Level 3, Amazon has partnered with UC vendor Vonage, which offers Chime as a feature in all business communications plans.

Level 3 is targeting medium to large businesses with a pay-per-use model. The company is also willing to bundle its PSTN service with the cloud collaboration tool.

Chime is based on technology Amazon obtained last year through the acquisition of online meeting provider Biba.

Powered by WPeMatico