Mendix expands support with private, dedicated cloud options

Low-code platform provider Mendix has its cloud bases covered after introducing new private and dedicated cloud offerings this week.

Mendix for Private Cloud and Mendix Dedicated Cloud join the Mendix Public Cloud service and expand the company’s offerings across public, private and hybrid cloud deployment options.

These tools will help enterprises use low-code development in any cloud environment of their choice, as well as on premises, said Jon Scolamiero, manager of architecture and governance at Mendix.

Mendix is bucking the trend where low-code pure-plays offer their solutions as PaaS deployments, responding to enterprises’ adoption of Kubernetes-based hybrid cloud strategies.

Charlotte DunlapCharlotte Dunlap

“Increasingly, leading public cloud providers are offering their own versions of low-code and automation technologies to complement their Kubernetes offerings — for instance, Microsoft with Power Automate and Google’s acquisition of AppSheet in January, which poses a competitive threat to Mendix,” said Charlotte Dunlap, an analyst at GlobalData in Santa Cruz, Calif.

Mendix for Private Cloud runs on Kubernetes in any privately configured location or data center. Its target is any enterprise with specialized security, compliance or data integration needs.

Meanwhile, the company said the Mendix Dedicated Cloud is aimed at enterprises that have more than 100 Mendix applications as well as customers operating in highly regulated environments. This cloud is built, managed and configured by Mendix exclusively for the customer. Mendix Public Cloud runs managed and hosted by Mendix or hosted on AWS, SAP or IBM public clouds.

Multi-cloud in demand

Some 86% of respondents to a recent Forrester Research survey said they may deploy workloads on hybrid cloud or multi-cloud environments. One-third of that group said they will use private cloud as part of their development strategy. In addition, 23% of respondents planned to deploy on-premises workloads together with public cloud deployment.

Increasingly, leading public cloud providers are offering their own versions of low-code and automation technologies to complement their Kubernetes offerings.
Charlotte DunlapAnalyst, GlobalData

Forrester’s survey focused on the general IT landscape and not specifically low-code vendors such as Mendix. But Mendix’s cloud options could appeal to existing customers such as Kermit, a firm based in Hunt Valley, Md., that offers a spend management platform for hospitals to track the amount spent on implantable medical devices. The analytics-based platform helps medical institutions track physician preference items, which account for about 60% of a hospital’s spending for supplies.

Kermit developed its cloud-based platform with Mendix. In fact, the CEO and two of his co-founders found Mendix so approachable that they downloaded a Mendix modeler and were able to construct a running application, said Richard Palarea, CEO and co-founder of Kermit.

“I am very comfortable with the paradigm of having control over the code and wanting to actually hard-code everything, versus having an environment where you can stitch together a business process and go into the app store and grab widgets that you need to bring your idea about,” he said. “That, to me, just has always seemed like a better way of doing things.”

The Kermit analytics platform, which was built by one core developer in nine months, enables hospitals to track and manage contracts, billings, and vendor compliance.

The company has primarily offered its platform to hospitals in Maryland, where Kermit manages 40% of the total spending on medical implants, Palarea said. Kermit began taking its platform nationwide at the end of last year.

“Healthcare analytics are a huge game right now,” Palarea said. “Every CIO in hospitals these days is looking at these kinds of tools to manage the business better because lower reimbursements from both Medicare primarily and also third-party insurers mean the payment that they get for their surgeries are going down.”

While it is too early for Kermit to consider using these new editions of the Mendix platform, company officials said that once use of the Kermit offering goes nationwide, they might take another look.

Go to Original Article
Author:

For Sale – Nvidia MSI RTX 2070 ARMOR 8G

Nvidia MSI RTX 2070 ARMOR 8G bought from Scan October 2018 and still under warranty until October 2020,

–– ADVERTISEMENT ––​

–– ADVERTISEMENT ––​

Not seen too much use as only game 4/5 times a year on a LAN weekend so in good condition and boxed.IMG_20200310_224051.jpg

Location
Hornchurch
Price and currency
£300
Delivery cost included
Delivery is NOT included
Prefer goods collected?
I have no preference
Advertised elsewhere?
Advertised elsewhere
Payment method
PPG/BT

Last edited:

Go to Original Article
Author:

Wanted – 980Ti, GTX1070 or equivalents

Europe’s busiest forums, with independent news and expert reviews, for TVs, Home Cinema, Hi-Fi, Movies, Gaming, Tech and more.

AVForums.com is owned and operated by M2N Limited,
company number 03997482, registered in England and Wales.

Powered by Xenforo, Hosted by Nimbus Hosting, Original design Critical Media Ltd.
This website uses the TMDb API but is not endorsed or certified by TMDb.

Copyright © 2000-2020 E. & O.E.

Go to Original Article
Author:

For Sale – Asus PG279Q & 7x 1TB SSDs (Crucial and Samsung)

6x Crucial MX500 1TB & 1x Samsung 860 EVO 1TB SSDs

These drives were bought to be used in my home dev server & as cache for my NAS.

1 of the Crucials is brand new in box, it was left as a cold spare.
All others have seen very light use… sub-2TB written to each disk, so not far off brand new.

Crucial – £60 posted each
Samsung – £70 posted each

Go to Original Article
Author:

Wanted – Nvidia GPU – RTX 2060 Super or 2070 base or Super.

Europe’s busiest forums, with independent news and expert reviews, for TVs, Home Cinema, Hi-Fi, Movies, Gaming, Tech and more.

AVForums.com is owned and operated by M2N Limited,
company number 03997482, registered in England and Wales.

Powered by Xenforo, Hosted by Nimbus Hosting, Original design Critical Media Ltd.
This website uses the TMDb API but is not endorsed or certified by TMDb.

Copyright © 2000-2020 E. & O.E.

Go to Original Article
Author:

Ori and the Will of the Wisps now available with Xbox Game Pass and for Xbox One, Windows 10 PC and Steam | Windows Experience Blog

Xbox Game Studios on Wednesday welcomed gamers to a brand new adventure as Ori and the Will of the Wisps celebrated its worldwide release with Xbox Game Pass and for Xbox One, Windows 10 PC and Steam.
“Ori and the Will of the Wisps is a game that everyone at Moon Studios has poured their hearts and souls into developing over the last five years so that our community can play the best version of the game possible,” said Thomas Mahler, Co-Founder of Moon Studios. “We believe we’ve delivered on that promise to players and are looking forward to the response from the community.”
Players will be immersed in the beautiful visuals the Ori series is known for, all with music composed by Gareth Coker. Along Ori’s journey, an improved combat system with new spirit weapons, skills and a new shard system will allow players to customize Ori’s powers in a unique way, making each playthrough unique.
For more details on what to expect in the game, news about the launch and more, head over to Xbox Wire.

For Sale – Dell E7450 14″ Ultrabook Laptop (Intel i5-5300 8GB 512GB SSD)

I’m not the original owner. I’ve had for about 13 months. According to Dell website it was made in March 2016.
The i7 one mentioned above has less RAM, no SSD and is in much worse condition (cracked case in corner).
I think my price is fair given the condition and I even accepted an offer of £225 from vrackdc above but they withdrew.

Go to Original Article
Author:

For Sale – Custom gaming pc

evga 1070 ftw
asus z170 aurora mobo
intel i5 6600k
corsair vengence led ram 16gb
nzxt kraken cpu cooler
phanteks enthoo case with custom leg lighting
evga bronse psu

Location
Newbury
Price and currency
750
Delivery cost included
Delivery is NOT included
Prefer goods collected?
I prefer the goods to be collected
Advertised elsewhere?
Advertised elsewhere
Payment method
btt

Go to Original Article
Author:

Mammoth March Patch Tuesday lands on Windows admins

For the second month in a row, Microsoft doled out a hefty batch of fixes for its products on March Patch Tuesday, resolving 115 unique vulnerabilities that center mostly around the Windows OS and its various web browser applications.

This month’s slate of fixes eclipsed the 99 vulnerabilities Microsoft addressed last month. All told, March Patch Tuesday corrected 26 critical vulnerabilities and 88 bugs rated important. Affected products include Windows, both the HTML-based and Chromium-based Edge browsers, the ChakraCore JavaScript engine, Internet Explorer, Exchange Server, Microsoft Office, Azure DevOps and Azure, Windows Defender, Visual Studio, Microsoft Dynamics and open source projects.

Despite the sheer number of flaws to address, administrators do not have to worry about any zero-day exploits or public disclosures this month. The other good news is most of the bugs are clustered in the Windows and browser products. Of the 115 vulnerabilities, 18 are in the browser and 79 are in the Windows OS.

Now that Microsoft packages its patches in a single monthly rollup rather than individual updates, administrators now have a simpler “all or nothing” choice with patch deployment. In the previous servicing model, which Microsoft ended in late 2016, administrators had the flexibility to choose which patches to apply to different systems. 

“The cumulative model plugs those gaps effectively, so that’s the positive. There are fewer holes in the average environment because one thing people overlook is most of the exploits that are happening are in software that’s months, if not years old,” said Chris Goettl, director of product management and security at Ivanti, a security and IT management vendor based in South Jordan, Utah. 

Chris Goettl, director of product management and security, IvantiChris Goettl

The monthly rollup contains fixes for security flaws, corrections for web browsers and quality updates. Each monthly rollup supersedes the previous month. The downside to the cumulative model is a faulty patch can disable a system, which makes administrators more likely to hold off on deployment until they can do a thorough test.

“Microsoft’s cumulative model makes it more of an all-or-nothing, especially for the OS. It does force people to update it. The challenge comes into play in those cases where companies have more sensitive environments to patching where they let time be more of an element,” Goettl said. 

Microsoft Outlook preview pane could be a threat launchpad

Aside from the browser and OS vulnerabilities, administrators will want to focus on a critical remote code execution vulnerability (CVE-2020-0852) in Microsoft Word which uses the Microsoft Outlook preview pane as the attack vector, Goettl said. In one scenario, an attacker could send a specially crafted document in an email to a user who, if they view the file in the Outlook preview pane, would run code at the security level of that user. 

“That [vulnerability is] a piece of low-hanging fruit for a threat actor if they can exploit the preview pane. That makes their job a lot easier,” Goettl said. 

Administrators will also want to look at a moderate information disclosure vulnerability (CVE-2020-0765) in the Remote Desktop Connection Manager. There are no fixes for this bug because Microsoft no longer develops this application. Microsoft recommends users switch to a supported Microsoft Remote Desktop client version. 

In addition to the March Patch Tuesday updates, administrators should be aware that most of the supported Windows OSes on the client and server side have a servicing stack update. Microsoft does not include these with the monthly rollups and recommends installing servicing stack updates before applying the latest cumulative update.  

Vulnerability from February rears its head

Administrators of organizations that use on-premises Exchange Server for email and have a lengthy test and deploy for patching might want to pick up the pace if they haven’t installed February’s security updates for the messaging product. Microsoft fixed a remote-code execution bug (CVE-2020-0688) in Exchange Server in its February Patch Tuesday releases, but companies that lag in their patching efforts could find themselves in trouble if a persistent hacker finds a way to get inside their systems to launch an exploit.  

On Feb. 25, Simon Zuckerbraun, a security researcher at Trend Micro’s Zero Day Initiative, posted a blog that offered deeper insights into how the vulnerability worked with an accompanying video that demonstrated how to trigger the exploit. 

“Microsoft rated this as Important in severity, likely because an attacker must first authenticate. It should be noted, however, that within an enterprise, most any user would be allowed to authenticate to the Exchange server,” wrote Zuckerbraun. “Similarly, any outside attacker who compromised the device or credentials of any enterprise user would be able to proceed to take over the Exchange server. Having accomplished this, an attacker would be positioned to divulge or falsify corporate email communications at will.”

The same day, another security researcher, Kevin Beaumont — who recently joined Microsoft to work on its Microsoft Threat Protection product — tweeted about Zuckerbraun’s blog and posted updates showing an uptick in threat actors scanning for susceptible internet-facing Exchange servers. 

This caught has caught the attention of the U.S. government. Not only did the National Security Agency issue a warning from its Twitter account on March 6 but the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) reinforced the importance of patching in a bulletin released on March Patch Tuesday.

“Although Microsoft disclosed the vulnerability and provided software patches for the various affected products in February 2020, advanced persistent threat actors are targeting unpatched servers, according to recent open source reports,” wrote the CISA. 

This type of vulnerability and the groundswell of attention it picked up online shows administrators not only need to be technical experts but also social media savants to pick up what’s trending online to steer their patching priorities.

“Knowing things like what’s actively being exploited and keeping more continuous cycle around evaluating and resolving vulnerabilities is definitely more important nowadays,” Goettl said.

Go to Original Article
Author: