In the extended Edge-to-Cloud

Discover tools, trends, and innovations in eu data.
Post Reply
rakhirhif8963
Posts: 702
Joined: Mon Dec 23, 2024 3:15 am

In the extended Edge-to-Cloud

Post by rakhirhif8963 »

At the end of the year, it is planned to provide new infrastructure services under the Silicon on Demand brand, developed jointly with Intel and allowing for the prompt activation and payment as you use of the addition of new capacities that are initially installed on the client's computer, at the level of processor cores and permanent memory (in particular, Intel Optane). This will make it possible to more accurately assess the volumes of resources consumed, keep records of them, and issue invoices for hardware and software (for example, to more accurately coordinate the cost of licensing with the actual use of processor cores).

environment, information security risks germany mobile database significantly, which the Aurora project is designed to counter. Today, the gold standard in the cloud is the zero trust model, which means that by default there is no trust in anything, ever. Each object, be it a person, a software object (container, virtual machine), server, storage system, switch, etc., must have a provable and regularly verified identity before it participates in a particular transaction. This is what Aurora is designed to provide in a distributed hybrid Edge-to-Cloud environment. It is claimed that the time to detect threats is reduced from tens of days to several seconds.

At the same time, Aurora does not replace the customer's existing information security tools, but only complements and enhances them. By the end of the year, the Aurora project will be expanded to include GreenLake and Lighthouse services, and through interaction with Ezmeral software, a platform-independent method for setting and applying zero-trust security policies in a hybrid Edge-to-Cloud environment will be implemented.
Post Reply