Exact copy of C9560-040 study guide are here to download

We receive reports from applicant on daily basis who sit for IBM IBM SmartCloud Control Desk V7.5 Change- Configuration- Release Management real exam and pass their exam with good score. Some of them are so excited that they apply for several next exams from killexams.com. We feel proud that we serve people improve their knowledge and pass their exams happily. Our job is done.

Exam Code: C9560-040 Practice test 2022 by Killexams.com team
IBM SmartCloud Control Desk V7.5 Change, Configuration, Release Management
IBM Configuration, approach
Killexams : IBM Configuration, approach - BingNews https://killexams.com/pass4sure/exam-detail/C9560-040 Search results Killexams : IBM Configuration, approach - BingNews https://killexams.com/pass4sure/exam-detail/C9560-040 https://killexams.com/exam_list/IBM Killexams : IBM Flash Storage and Cyber Resiliency

Flash storage has historically had a reputation for delivering large amounts of storage capacity and high performance in a relatively small package. But with the current threat landscape, it has become important to focus on the resilience of flash. 

IBM's 2021 Cost of a Data Breach Report found that the average cost of a customer data breach is more than four million dollars, and recovery from such an event can take days or even weeks. IBM is responding to the need for protection and rapid recovery from ransomware and other cyber threats by releasing new data resilience capabilities for its FlashSystem family of all-flash arrays.

Flash storage with the power of data protection

Even if your company has a robust security strategy, you still need to be prepared if and when an attack succeeds. IBM empowers organizations to recover from this eventuality by enhancing its FlashSystem storage with IBM Safeguarded Copy. 

Safeguarded Copy enables flash storage to play a role in recovery by automatically creating point-in-time snapshots on production storage on an administrator-defined schedule. Once snapshots have been created, they cannot be changed or deleted. These protections prevent malware and internal threats from tampering with backups.

With Safeguarded Copy, companies can recover from an attack quickly and completely. Safeguarded Copy snapshots reside on the same FlashSystem storage as operational data, which dramatically reduces recovery time when compared to tiered or offsite copy-based recovery solutions.

Rapid recovery with IBM FlashSystem Cyber Vault

IBM has also enhanced its FlashSystem storage with IBM FlashSystem Cyber Vault to enable it to quickly perform all three stages of the recovery process: detection, response and recovery. 

Cyber Vault runs continuously and monitors snapshots as Safeguarded Copy creates them and uses standard database tools and other software to ensure Safeguarded Copy snapshots haven't been compromised. If Cyber Vault finds the snapshots have been corrupted, it interprets that as a sign of an attack. Cyber Vault can reduce recovery time from days to hours by quickly determining which snapshots to use.

Flash storage designed for resiliency

IBM has added members to its FlashSystem family that are built to deliver on performance while also providing resilience: FlashSystem 9500 and 7300. 

The FlashSystem 9500 is IBM's flagship enterprise storage array, designed for environments that need the highest capability and resilience. It offers twice the performance, connectivity and capacity of its predecessor and 50 percent more cache. The 9500 also provides data resilience with numerous safeguards, including multi-factor authentication (MFA) and secure boot to help ensure only IBM-authorized software runs on the system. Additionally, IBM's FlashCore Modules (FCMs) offer real-time hardware-based encryption and up to 7x increase in endurance compared to commodity SSDs.

The IBM FlashSystem 7300 offers about 25 percent better performance than the previous generation of FlashSystem storage. It has a smaller footprint than the 9500 but runs the same software and features, including 3:1 real-time compression and hardware encryption. The FlashSystem 7300 supports up to 2.2PB effective capacity per 2U control enclosure. 

The IBM FlashSystem family offers two- and three-site replication along with configuration options that can include an optional 100 percent data availability guarantee for business continuity.

Explore next-generation flash storage

The IBM FlashSystem family is continuously evolving with expanded capabilities around capacity, performance and data protection. 

WWT can help your company evaluate and choose the right flash storage solution to meet your needs. WWT is an IBM-designated global and regional systems integrator (SI) and solution provider, and we know how important data protection is for modern companies. We encourage your organization to take a holistic approach to data resilience.

Sun, 24 Jul 2022 17:00:00 -0500 en text/html https://www.wwt.com/article/ibm-flash-storage-and-cyber-resiliency
Killexams : Nanosheet FETs Drive Changes In Metrology And Inspection

In the Moore’s Law world, it has become a truism that smaller nodes lead to larger problems. As fabs turn to nanosheet transistors, it is becoming increasingly challenging to detect line-edge roughness and other defects due to the depths and opacities of these and other multi-layered structures. As a result, metrology is taking even more of a hybrid approach, with some well-known tools moving from the lab to the fab.

Nanosheets are the successor to finFETs, an architecture evolution prompted by the industry’s continuing desire to increase speed, capacity, and power. They also help solve short-channel effects, which lead to current leakage. The great vulnerability of advanced planar MOSFET structures is that they are never fully “off.” Due to their configuration, in which the metal-oxide gate sits on top of the channel (conducting current between source and drain terminals), some current continues to flow even when voltage isn’t applied to the gate.

FinFETs raise the channel into a “fin.” The gate is then arched over that fin, allowing it to connect on three sides. Nevertheless, the bottom of the gate and the bottom of the fin are level with each other, so some current can still sneak through. The gate-all-around design turns the fin into multiple, stacked nanosheets, which horizontally “pierce” the gate, giving coverage on all four sides and containing the current. An additional benefit is the nanosheets’ width can be varied for device optimization.

Fig. 1: Comparison of finFET and gate-all-around with nanosheets. Source: Lam Research

Fig. 1: Comparison of finFET and gate-all-around with nanosheets. Source: Lam Research

Unfortunately, with one problem solved, others emerge. “With nanosheet architecture, a lot of defects that could kill a transistor are not line-of-sight,” said Nelson Felix, director of process technology at IBM. “They’re on the underside of nanosheets, or other hard-to-access places. As a result, the traditional methods to very quickly find defects without any prior knowledge don’t necessarily work.”

So while this may appear linear from an evolutionary perspective, many process and materials challenges have to be solved. “Because of how the nanosheets are formed, it’s not as straightforward as it was in the finFET generation to create a silicon-germanium channel,” Nelson said.

Hybrid combinations
Several techniques are being utilized, ranging from faster approaches like optical microscopy to scanning electron microscopes (SEMs), atomic force microscopes (AFMs), X-ray, and even Raman spectroscopy.

Well-known optical vendors like KLA provide the first-line tools, employing techniques such as scatterometry and ellipsometry, along with high-powered e-beam microscopes.

With multiple gate stacks, optical CD measurement needs to separate one level from the next according to Nick Keller, senior technologist, strategic marketing for Onto Innovation. “In a stacked nanosheet device, the physical dimensions of each sheet need to be measured individually — especially after selective source-drain recess etch, which determines drive current, and the inner spacer etch, which determines source-to-gate capacitance, and also affects transistor performance. We’ve done demos with all the key players and they’re really interested in being able to differentiate individual nanosheet widths.”

Onto’s optical critical dimension (OCD) solution combines spectroscopic reflectometry and spectroscopic ellipsometry with an AI analysis engine, called AI-Diffract, to provide angstrom-level CD measurements with superior layer contrast versus traditional OCD tools.

Fig. 2: A model of a GAA device generated using AI Diffract software, showing the inner spacer region (orange) of each nanosheet layer. Source: Onto Innovation

Fig. 2: A model of a GAA device generated using AI Diffract software, showing the inner spacer region (orange) of each nanosheet layer. Source: Onto Innovation

Techniques like spectroscopic ellipsometry or reflectometry from gratings (scatterometry) can measure CDs and investigate feature shapes. KLA describes scatterometry as using broadband light to illuminate a target to derive measurements. The reflected signal is fed into algorithms that compare the signal to a library of models created based on known material properties and other data to see 3D structures. The company’s latest OCD and shape metrology system identifies subtle variations (in CD, high k and metal gate recess, side wall angle, resist height, hard mask height, pitch walking) across a range of process layers. An improved stage and new measurement modules help accelerate throughput.

Chipmakers rely on AI engines and deep computing in metrology just to handle the data streams. “They do the modeling data for what we should be looking at that day, and that helps us out,” said Subodh Kulkarni, CEO of CyberOptics. “But they want us to give them speedy resolution and accuracy. That’s incredibly difficult to deliver. We’re ultimately relying on things like the resolution of CMOS and the bandwidth of GPUs to crunch all that data. So in a way, we’re relying on those chips to develop inspection solutions for those chips.”

In addition to massive data crunching, data from different tools must be combined seamlessly. “Hybrid metrology is a prevailing trend, because each metrology technique is so unique and has such defined strengths and weaknesses,” said Lior Levin, director of product marketing at Bruker. “No single metrology can cover all needs.”

The hybrid approach is well accepted. “System manufacturers are putting two distinct technologies into one system,” said Hector Lara, Bruker’s director and business manager for Microelectronics AFM. He says Bruker has decided against that approach based on real-world experience, which has shown it leads to sub-optimal performance.

On the other hand, hybrid tools can save time and allow a smaller footprint in fabs. Park Systems, for example, integrates AFM precision with white light interferometry (WLI) into a single instrument. Its purpose, according to Stefan Kaemmer, president of Park Systems Americas, is in-line throughput. While the WLI can quickly spot a defect, “You can just move the trial over a couple of centimeters to the AFM head and not have to take the time to unload it and then load it on another tool,” Kaemmer said.

Bruker, meanwhile, offers a combination of X-ray diffraction (XRD)/X-ray reflectometry (XRR) and X-ray fluorescence (XRF)/XRR for 3D logic applications. However, “for the vast majority of applications, the approach is a very specialized tool with a single metrology,” Levin said. “Then you hybridize the data. That’s the best alternative.”

What AFMs provide
AFMs are finding traction in nanosheet inspection because of their ability to distinguish fine details, a capability already proven in 3D NAND and DRAM production. “In AFM, we don’t really find the defects,” Kaemmer explained. “Predominantly, we read the defect map coming typically from some KLA tool and then we go to whatever the customer picks to closely examine. Why that’s useful is the optical tool tells you there’s a defect, but one defect could actually be three smaller defects that are so close together the optical tool can’t differentiate them.”

The standard joke about AFMs is that their operation was easier to explain when they were first developed nearly forty years ago. In 1985, when record players were in every home, it required little to imagine an instrument in which a sharp tip extended from a cantilevered arm felt its way along a surface to produce signals. With electromagnetic (and sometimes chemical) modifications, that is essentially the hardware design of all modern AFMs. There are now many variations of tip geometries, from pyramids to cones, in a range of materials including silicon, diamond, and tungsten.

In one mode of operation, tapping, the cantilever is put into oscillation at its natural resonant frequency, giving the AFM controlling systems greater precision of force control, resulting in a nanometer scale spatial topographic rendering of the semiconductor structure. The second sub-resonant mode enables greatest force control during tip/sample interaction. That approach becomes invaluable for high-aspect structures rendering high-accuracy depth measurements, and in some structures, sidewall angles and roughness.

Today’s commercial production tools are geared to specific applications, such as defect characterization or surface profile measurement. Unlike optical microscopes, where improvements center on improved resolution, AFMs are looking at subtle profile changes in bond pads for hybrid bonding, for instance, or to reveal defect characteristics like molecular adhesion.

“Bonding is really a sweet spot for AFM,” said Sean Hand, senior staff applications scientist at Bruker. “It’s really planar, it’s flat, we’re able to see the nanoscale roughness, and the nanoscale slope changes that are important.”

Additionally, because tips can exert enough force to move particles, AFMs can both find errors and correct them. They have been used in production to remove debris and make pattern adjustments on lithography masks for nearly two decades. Figure 3 (below) shows a probe-based particle removal during lithography process for advanced node development. Contaminants are removed from EUV masks, allowing the photomask to be quickly returned to production use. That extends the life of the reticle, and avoids surface degradation caused by wet cleaning.

AFM-based particle removal is a significantly lower-cost dry cleaning process and adds no residual contamination to the photomask surface, which can degrade mask life. Surface interaction is local to the defect, which minimizes the potential for contamination of other mask areas. The high precision of the process allows for cleaning within fragile mask features without risk of damage.

Fig. 3: Example of pattern repair. Source: Bruker

Fig. 3: Example of pattern repair. Source: Bruker

In advanced lithography, AFMs also are used to evaluate the many photoresist candidates for high-NA EUV, including metal oxide resists and more traditional chemically amplified resists. “With the thin resist evaluation of high NA EUV studies, now you have thin, resist trenches that are much more shallow,” said Anne-Laure Charley, R&D metrology manager at Imec. “And that becomes a very nice use case for AFM.”

The drawback to AFMs, however, is that they are limited to surface characterization. They cannot measure the thickness of layers, and can be limited in terms of deep 3D profile information. Charley recently co-authored a paper that explores a deep-learning-enabled correction for the problem of vertical (z) drift in AFMs. “If you have a structure with a small trench opening, but which is very deep, you will not be able to answer with the tip at the bottom of the trench, and you will not then be able to characterize the full edge depth and also the profile at the bottom of the trench,” she said.

Raman spectroscopy
Raman spectroscopy, which relies on the analysis of inelastically scattered light, is a well-established offline technique for materials characterization that is moving its way inline into fabs. According to IBM’s Felix, it is likely to come online to answer the difficult questions of 3D metrology. “There’s a suite of wafer characterization techniques that historically have been offline techniques. For example, Raman spectroscopy lets you really probe what the bonding looks like,” he said. “But with nanosheet, this is no longer a data set you can just spot-check and have it be only one-way information. We have to use that data in a much different way. Bringing these techniques into the fab and being able to use them non-destructively on a wafer that keeps moving is really what’s required because of the complexity of the material set and the geometries.”

In addition to AFM, other powerful techniques are being pulled into the nanosheet metrology arsenal. Bruker, for example, is employing X-ray diffraction (XRD), the crystallography technique with which Rosalind Franklin created the famous “Photograph 51” to show the helical structure of DNA in 1952.

According to Levin, during the height of finFET development, companies adopted XRD technology, but mainly for R&D. “It looks like in this generation of devices, X-ray metrology adoption is much higher.”

“For the gate all around, we have both XRD — the most advanced XRD, the high brightness source XRD, for measurement of the nanosheet stack — combined with XRF,” said Levin. “Both of them are to measure the residue part, making sure everything is connected, as well as those recessed edge steps. An XRF can give a very accurate volumetric measurement. It can measure single atoms. So in a very sensitive manner, you can measure the recessed edge of the material that is remaining after the recessed etch. And it’s a direct measurement that doesn’t require any calibration. The signal you get is directly proportional to what you’re looking to measure. So there’s significant adoption of these two techniques for GAA initial development.”

Matthew Wormington, chief technologist at Bruker Semi X-ray, gave more details: “High resolution X-ray diffraction and X-ray reflectometry are two techniques that are very sensitive to the individual layer thicknesses and to the compositions, which are key for controlling some of the x parameters downstream in the 3D process. The gate-all-around structure is built on engineered substrates. The first step is planar structures, a periodic array of silicon and silicon germanium layers. X-ray measurement is critical in that very key step because everything is built on top of that. It’s a key enabling measurement. So the existing techniques become much more valuable, because if you don’t get your base substrate correct — not just the silicon but the SiGe/Si multilayer structure — everything following it is challenged.”

The introduction of nanosheet transistors and other 3D structures is calling for wider usage of tools like AFM, X-ray systems, ellipsometry and Raman spectroscopy. And new processes, like hybrid bonding, leads to older processes being brought in for new applications. Imec’s Charley said, “There are some specific challenges that we see linked to stacking of wafers. You eventually need to measure through silicon because when you start to stack two wafers on top of each other, you need to measure or inspect through the backside and eventually you still have a relatively thick silicon. And that’s implies working with different wavelengths, in particular infrared. So vendors are developing specific overlay tools using infrared for these kinds of use cases.”

As for who will ultimately drive the research, it depends on when you ask that question. “The roadmap for technology is always bi-directional,” said Lior. “It’s hard to quantify, but roughly half comes from the technology side from what is possible, and half comes from what’s needed in the marketplace. Every two or three years we have a new generation of tools.”

D. Cerbu, et. al., “Deep Learning-Enabled Vertical Drift Artefact Correction for AFM Images,” Proc. SPIE Metrology, Inspection, and Process Control XXXVI, May 2022; doi: 10.1117/12.2614029

A.A. Sifat, J. Jahng, and E.O. Potma, “Photo-Induced Force Microscopy (PiFM) — Principles and Implementations,” Chem. Soc. Rev., 2022,51, 4208-4222. https://pubs.rsc.org/en/content/articlelanding/2022/cs/d2cs00052k

Mary A. Breton, Daniel Schmidt, Andrew Greene, Julien Frougier, and Nelson Felix, “Review of nanosheet metrology opportunities for technology readiness,” J. of Micro/Nanopatterning, Materials, and Metrology, 21(2), 021206 (2022). https://doi.org/10.1117/1.JMM.21.2.021206

Daniel Schmidt, Curtis Durfee, Juntao Li, Nicolas Loubet, Aron Cepler, Lior Neeman, Noga Meir, Jacob Ofek, Yonatan Oren, and Daniel Fishman, “In-line Raman spectroscopy for gate-all-around nanosheet device manufacturing,” J. of Micro/Nanopatterning, Materials, and Metrology, 21(2), 021203 (2022). https://doi.org/10.1117/1.JMM.21.2.021203

Related Stories
Speeding Up The R&D Metrology Process
The goal is to use fab-like methods in the lab, but that’s not easy.

Metrology Challenges For Gate-All-Around
Why future nodes will require new equipment and approaches.

Contact Mode versus Tapping Mode AFM

Mon, 08 Aug 2022 19:04:00 -0500 en-US text/html https://semiengineering.com/nanosheet-fets-drive-changes-in-metrology-and-inspection/
Killexams : Making Progress With Infrastructure As Code

It has been almost two years since infrastructure software maker Progress Software spent $220 million to buy Chef, the open source automation tech vendor Chef that was helping to fuel the “infrastructure as code” trend. The deal enables Progress to push deeper into the DevOps and DevSecOps space with a company that over a dozen years had raised more than $100 million, collected more than 700 customers, and created a business model where more than 95 percent of its revenue was recurring.

In a cloud-centric and increasingly services-based IT environment, all of that made Chef an attractive acquisition target. And as we noted earlier this year, when Perforce acquired Puppet Labs, such deals highlight the long-held attitude of hyperscalers, cloud builders, and other service providers that everything in the datacenter should be software-defined so IT configuration and management can be automated to drive down costs and drive up efficiencies.

The purchase of Chef by Progress Software came as others also saw the need to add automation and infrastructure-as-code to their evolving software stacks to adapt to the cloud, DevOps and the “shift-left” trend push to move testing and security to the earlier stages of software development. IBM in 2018 bought Red Hat for $34 billion, three years after Red Hat had acquired Ansible for $100 million. VMware bought SaltStack around the same time of the Progress-Chef deal and in May Perforce Software closed its acquisition of Puppet Labs.

HashiCorp also is still out there on its own in this rapidly changing space, building out its portfolio and going public.

All of this indicates the trend toward infrastructure-as-code continues to gain momentum, according to Prashanth Nanjundappa, vice president of product management at Progress Chef. It’s taken off, and Progress – with Chef – is steeped in one of the two key facets of infrastructure-as-code, Nanjundappa tells The Next Platform. The first is provisioning, which is done by others – HashiCorp and its Terraform technology, for example, or the cloud providers, including Amazon Web Services with CloudFormation service, Microsoft Azure with ARM (Azure Resource Manager) and Google Cloud (Resource Manager).

With Chef, Progress’ focus is on the second narrative, configuration management, which is becoming even more important with enterprises’ adoption of containers and the Kubernetes orchestration platform increasingly mingling with the virtual machines that organizations have had in place for years.

“If I go back maybe ten years ago, that’s where Chef and Puppet started,” he says, adding that enterprises are adding containers to the mix rather than replacing VMs with them. “At that point, containerization – containers, Kubernetes – these were very, very nascent. Those things – containers and serverless – tend to form an immutable architecture. Things change, but you don’t go and meddle with what is deployed.”

Over the past several years, organizations have embraced successive levels of abstraction, starting off with VMs as their core computing units. Now containers – more lightweight and easier to manage – are muscling their way into the architecture, particularly among more established enterprises, Nanjundappa says. Among the growing numbers of cloud-first companies, containers and serverless architectures tend to be the starting point.

“Although we see of a very clear trend of organizations adopting containers and serverless architectures, there is still a huge amount of global spend happening on virtual machines,” he says. “It’s not going to go away any time soon. But also, Kubernetes and containers aren’t a silver bullet. There are so many areas which cannot diverse, so even for organizations not having to have a cloud locked in, or there are certain use cases, especially on the edge and lightweight deployment instances, then Kubernetes and containers are extremely heavy. For these reasons I think VMs are going to stay around.”

Chef customers like Salesforce, Facebook, Slack, and Uber still use virtualization technology, and their use is growing. While cloud-first companies that are born using containers and Kubernetes may not need much configuration management, there is still a huge pool of customers with histories of using VMs while also adopting containers. To them, configuration management is key.

“Then there are instances that come out on that, which is compliance, security, and those are the reasons which become important for organizations like Progress, with Chef and Chef configuration management and continuous compliance, and we can focus our investment and make sure that we grow the company by addressing our customer needs and similar customers’ needs who are in that segment.”

Progress is looking to build out the capabilities of the Chef automation framework in the cloud world. The company in May launched Chef Cloud Security, giving DevSecOps teams a single policy-as-code platform that includes security controls for both multicloud and on-premises IT environments as well as compliance policies.

Nanjundappa says among the key capabilities is enabling organizations to codify their policies around security and compliance, which is becoming more important in a distributed IT model that reaches from the datacenter out to the cloud and edge. The Chef security platform is helping “organizations in implementing this policy much farther in the development cycle, helping them identifying the risks early on. This is kind of the shift-left phenomena. You have continuous compliance and also you get alerted whenever a new entity comes in the system which does not have the policy. That’s one of our differentiators.”

Progress chief executive officer Yogesh Gupta, on a call with analysts about the company’s second quarter financial numbers, noted the release of Chef Cloud Security, saying that “this product builds on our commitment to deliver a unified and scalable platform that enables our clients to accelerate the delivery of secure and compliant application releases in any kind of environment.”

At the same time, the vendor made other enhancements to Chef, including the Progress Chef InSpec security and compliance mechanism. There is new data source and host support to make it easier for enterprises to use the same DevOps practices to manage new assets, expanding benchmark profile coverage for AWS, Azure and Google Cloud with service and resource templates, and automated creation of code, test and documentation artifacts.

There also is policy-as-code for security and compliance as part of the Chef Enterprise Automation Stack, enabling DevOps workloads to combined infrastructure configuration processing and compliance audits and to ensure high availability. Progress has been working on the policy-as-code aspect for the last two years, Nanjundappa says.

“That has given us a clear understanding of some of the challenges mid-sized to large companies face, especially when cloud adoption is growing,” he says. “If you’re big, if you look back five or six years ago, it was hard. To get on any software you had to purchase, you had to go through a CIO, you had to go through vendor management process and all those things to get a software license to do a developer and then for them to use it there was auditing and other things. But cloud has changed that phenomenally. What has happened is almost every developer has their own access to AWS. They go to this AWS console, Azure console, and then they pick products which they want to use. From a CIO perspective, they have given the OK for AWS or Azure, but there are so many services under that, they have no freaking clue what is needed. This has created chaos in large organizations, including organizations like Progress. Progress does acquisitions. We integrate companies in our portfolio and also teams here are using multiple services. A CISO goes crazy when they look at the amount of potential problems and then they find this policy. These are the software components that they will be using and for this thing, you have to have a policy.”

In its earlier years, Progress helped build its capabilities through a steady series of acquisitions between 2002 and 2014. After a five-year break, the company in 2019 bought IT management software maker Ipswitch before buying Chef a year later. Last year, Progress bought Kemp, a load balancing company.

In his talk with analysts, Gupta said the acquisitions are key to expanding what Progress can do across all environments.

“We have acquired products like Chef, which are truly relevant in this modern cloud DevOps space, because of deployment and configuration management and secure infrastructure scalability,” he said. “When you look at what we have acquired with Ipswitch and Kemp around observability and high availability, and delivering performance and making sure that the infrastructure continues to perform well, resilience to failures, and those kind of things, those offerings are much more relevant today. But then again, all those offerings are also applicable not just on-prem but to cloud.”

Mon, 25 Jul 2022 02:39:00 -0500 Jeffrey Burt en-US text/html https://www.nextplatform.com/2022/07/25/making-progress-with-infrastructure-as-code/
Killexams : IT industry grapples with complexity and security as Kubernetes adoption grows

The information technology industry has a complexity problem, and it is leading to deeper conversations among thought leaders around how to solve it.

The days of building applications on one server using a monolithic architecture have transformed into developing numerous microservices, packaging them into containers, and orchestrating the entire production using Kubernetes in a distributed cloud.

It’s no wonder that in global survey results released by Pegasystems Inc. barely two months ago, three out of four employee respondents felt job complexity had continued to rise and they were overloaded with information, systems and processes. Nearly half singled out digital transformation as the cause.

Kubernetes has proven a great tool for driving modern IT infrastructure, yet it has also figured prominently in the design of overly complex systems. One of the tech industry’s most prominent thought leaders called attention to this issue in a latest interview during DockerCon 2022, with virtual coverage produced by theCUBE, SiliconANGLE Media’s livestreaming studio.

“The world is going to collapse on its own complexity,” noted development leader Kelsey Hightower said during a conversation with Docker Inc. Chief Executive Scott Johnston. “The number of teams I meet, and I won’t mention any names, say, ‘Kelsey, we’re going to show you our Kubernetes stack.’ Twenty minutes later, they are at piece number 275. Who’s going to maintain all of this? Why are you doing this?”

Move toward common interfaces

Hightower’s anecdote highlights the need for standardized tools within the Kubernetes developer community. As Kubernetes has matured, it has become a platform for building other platforms, and platform-as-a-service offerings such as CloudRun, OpenShift and Knative have enabled a great deal of operational management tasks for developers.

There has also been a move to create common interfaces within Kubernetes to enable adoption without requiring open-source community-wide agreement on implementation. These include Container Networking Interface, Container Runtime Interface and Custom Resource Definitions.

Despite the IT industry’s growing complexity, Hightower sees hope in the Kubernetes community’s ability to centralize around standardized tools.

“These contracts matter, and these standards are going to put complexity where it belongs,” Hightower said. “If you are a developer, yes, the world is complex, but it doesn’t mean that you have to learn all of that complexity. When you standardize you get to level the whole field up and move much faster. It’s got to happen.”

The challenge for many organizations is how to balance the requirements of running a data-driven business with the complexity that brings. While some enterprises have merely dipped their toes into the container deployment waters, others have jumped headfirst into the pool.

A Canonical Ltd. cloud operations report found that Kubernetes users commonly deploy two to five production clusters. The European Organization for Nuclear Research, known as CERN, is the largest particle physics laboratory in the world and runs approximately 210 clusters. Then there is Mercedes-Benz, which has pursued another model entirely. The global automaker gave a presentation at KubeCon Europe in May that described how it uses more than 900 Kubernetes clusters.

The German automaker was an early adopter of Kubernetes. It began experimenting with the container orchestration tool in 2015, only a year after Google LLC open-sourced the technology.

“We started small as a grassroots initiative,” Andrea Berg, manager of corporate communications at Mercedes-Benz North America Corp., said in comments provided to SiliconANGLE. “It was driven in a ‘from developers to developers’ mindset and became more and more successful. We helped change the mindset of our company towards cloud-native and free and open-source software.”

Mercedes-Benz Tech Innovation, the company’s subsidiary for overseeing company-wide technology, has grown its structure to support hundreds of application development teams. As the number of Kubernetes clusters grew, the company realized that it would need a tool to manage them. It turned to Cluster API on OpenStack, a Kubernetes-native way to manage clusters among different cloud providers.

The company also created a culture where developers would soon realize that as applications were completed, there would be no more ticket desks to run them. Automation tools would drive DevOps.

“We realized that a single shared cluster would not fit our needs,” Jens Erat, DevOps engineer at Mercedes-Benz, said during a KubeCon Europe presentation. “We had engineers with in-depth knowledge; we understood the tech and decided to create our own solution instead. You build it, you run it. There’s an API for that.”

Knative eases developer burden

The API path toward an easier approach for deploying Kubernetes in the enterprise received a boost in March when the Cloud Native Computing Foundation announced that it would accept Knative as an incubating project. Originally developed by Google, Knative is an open-source, Kubernetes-based platform for managing serverless and event-driven applications.

The concept behind severless technology is to bundle applications as functions, upload them to a platform, and have them automatically scaled and executed. Developers only have to deploy apps. They don’t have to worry about where they run or how a given network is handling them.

A number of major companies have a vested interest in seeing Knative become more widely used. Red Hat, IBM, VMware and TriggerMesh have worked with Google to Excellerate Knative’s ability to manage serverless and event-driven applications on top of the Kubernetes platform.

“We see a lot of interest,” Roland Huss, senior principal software engineer at Red Hat Inc., said in an interview with SiliconANGLE. “We heard before the move that many contributors were not looking into Knative because of not being part of a mutual foundation. We are still ramping up and really hope for more contributors.”

The road for Knative has been a bumpy one, which has exposed growing pains as the Kubernetes community has expanded. Google took some heat for previously deciding not to donate Knative, before announcing a change of heart in December.

Ahmet Alp Balkan, one of Google’s engineers who worked on different aspects of Knative prior to last year, penned a blog post that expressed concerns around how the serverless solution had been positioned within the developer community. Among Balkan’s concerns was the description of Knative as a building block for Kubernetes itself.

“I think we overestimated how many people on the planet want to build a Heroku-like platform-as-a-service layer on top of Knative,” Balkan wrote. “Our messaging revolved around these ‘platform engineers’ or operators who could take Knative and build their UI/CLI experience on top. This was the target audience for those building blocks Knative had to offer. However, this turned out to be a very small and niche audience.”

Need for greater security

Thought leaders in the Kubernetes community have also become more attuned to security for the container orchestration tool. Feedback from the user base has validated this focus.

In May, Red Hat published the results of a survey that found that 93% of respondents had experienced at least one security incident in their container or Kubernetes environments. More than half of respondents had delayed or slowed application deployment over security concerns. The report’s findings received additional credence in late June. Scanning tools used by the cybersecurity research firm Cyble Inc. uncovered 900,000 Kubernetes instances that were exposed online.

“Real DevSecOps requires breaking down silos between developers, operations and security, including network security teams,” said Kirsten Newcomer, director of cloud and DevSecOps strategy at Red Hat, during a KubeCon Europe interview with SiliconANGLE. “The Kubernetes paradigm requires involvement. It forces involvement of developers in things like network policy for things like the software-defined network layer.”

There is also an expanding list of open-source tools for hardening Kubernetes environments. KubeLinter is a static analysis tool that can identify misconfigurations in Kubernetes deployments. Security-Enhanced Linux, a default security feature implemented in Red Hat OpenShift, provides policy-based access control. And the CNCF project Falco acts as a form of security camera for containers, detecting unusual behavior or configuration changes in real time. Falco has reportedly been downloaded more than 45 million times.

With Kubernetes, it is easy to get caught up in metrics surrounding enterprise adoption, security and application deployments. Yet behind the increased dependence on containers can be found an important element that gets lost in the noise. Whether Kubernetes is complex or not, a lot of people now depend on this technology to work.

Near the end of his dialogue this spring with Docker’s Johnston, Hightower related a story about his previous work for a financial firm that processed shopping transactions for families needing government assistance. At one point, the transaction processor crashed and Hightower joined his colleagues in a “war room” as programmers followed a laborious set of steps to reboot the system and get the platform working.

“We’re just looking at this screen, some things were turning green and some were turning red, and the things turning red were the result of payments being declined,” Hightower recalled. “Each of those items turning red on the dashboard represented someone with their whole family trying to buy groceries. Their only option was to leave all of their groceries there. What we have to do as a community is remind ourselves that it’s people over technology, always.”

Image: distelAPPArath/Pixabay

Show your support for our mission by joining our Cube Club and Cube Event Community of experts. Join the community that includes Amazon Web Services and Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger and many more luminaries and experts.

Mon, 08 Aug 2022 09:27:00 -0500 en-US text/html https://siliconangle.com/2022/08/08/it-industry-grapples-with-issues-around-complexity-and-security-as-kubernetes-adoption-grows-kubecon/
Killexams : Forrester has a compelling vision for the future of endpoint management

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.

Bottom line: Getting endpoint security right for virtual workforces needs to include self-healing, native endpoint security integration and improved experiences that give employees the freedom to use their own devices.

Solving the paradox of providing anywhere-work workforces with endpoint security for their devices without adding more complexity to tech stacks is a challenging problem to solve. In addition, every endpoint with access to the corporate network is another potential attack surface.

CIOs and CISOs are aware of the agent sprawl already on company-owned and BYOD devices. More agents mean more potential for software conflicts, rendering the endpoint just as vulnerable as if there weren’t any installed.

Forrester’s recent report, The Future Of Endpoint Management, provides insights and useful suggestions to CISOs and their teams on how to modernize endpoint management. Forrester defines six characteristics of modern endpoint management, endpoint management challenges and the four trends defining the future of endpoint management in 2022 and beyond.

The report’s author, Andrew Hewitt, told VentureBeat that when clients ask how to get started with endpoint management, he says, ”the best place to start is always around enforcing multifactor authentication. This can go a long way towards ensuring that enterprise data is safe. From there, it’s enrolling devices and maintaining a strong compliance standard with the UEM tool.”

It’s time to modernize endpoint management 

Endpoint management is table-stakes for securing anywhere-work workforces. Forrester observes that rapidly growing virtual workforces are forcing endpoint management to modernize quickly to stay in sync with what enterprises need. Six characteristics that illustrate how endpoint management is improving due to virtual forces include the following:

1. Enabling management for all devices and apps on a unified platform.   

A single, unified platform to manage company-owned and BYOD devices is now essential for any endpoint strategy. For example, Forrester’s report explains how enterprise infrastructures support multiple operating systems, and one large food distributor “uses 55 versions of Microsoft Excel and 95 versions of Teams.” What’s needed is a unified endpoint management (UEM) platform that supports self-healing endpoints and can scale across company-owned and BYOD devices. Leaders in UEM include Blackberry, CrowdStrike, IBM, Ivanti, Microsoft, ManageEngine, VMWare and others.   

2. Cloud-based platforms have won the endpoint.

Cloud platforms are dominating the sales of endpoint management platforms today because they’re typically faster to implement, more effective at automating patching, and are structured to streamline remote support. CIOs have told VentureBeat often that using on-premises endpoint management as part of their tech stacks often leads to several or even a dozen corporate image configurations that all devices must be configured with. With cloud-based endpoint management, Forrester says enterprises purchase the devices they are standardizing on, configure them with cloud APIs and have them drop-shipped from the factory to the employees’ houses, where startup is completed without needing IT’s time.

3. Endpoint management platforms need to excel at self-service to grow adoption.

IT help desk and security support teams have been asking endpoint security platform vendors to have more self-service capabilities for years to alleviate the drain on their time. However, with anywhere-work workforces now becoming permanent, endpoint management platforms need to fast-track this aspect of their product strategies to gain greater adoption. 

4. More contextual awareness and less device-driven endpoint management are needed.

Modern endpoint management platforms must give employees the freedom to use their own devices while securing them as effectively as a corporate-issued one. Forrester says that’s where endpoint management platforms are progressing with user-centric data that can be used for customizing and then applying the configuration, adjusting policies per device and automatically keeping them in compliance.

5. Automating device configurations and deployment.

IT and security support teams spend a large percentage of their time configuring, reconfiguring and deploying devices remotely. Modern endpoint management platforms need to design in more automated support to streamline configuring and deploying third-party devices. Self-healing endpoint management platforms that have resilience designed can shut themselves off, automatically update device configurations, complete patch management updates, and then redeploy themselves without human interaction. 

Endpoint management platforms that can automate device configurations and deployment include CrowdStrike Falcon, Ivanti Neurons, which uses AI-based bots for self-healing, patching and protecting endpoints, and Microsoft Defender 365, which relies on one of the most advanced approaches to self-healing endpoints for correlating threat data from emails, endpoints, identities and applications.

Absolute Software’s approach relies on firmware-embedded persistence that provides self-healing endpoints and an undeletable digital tether to every PC-based endpoint. “Most self-healing firmware is embedded directly into the OEM hardware itself,” Hewitt told VentureBeat. 

“It’s worth asking about this in up-front procurement conversations when negotiating new terms for endpoints. What kinds of security are embedded in hardware? Which players are there? What additional management benefits can we accrue?” Hewitt advised. Forrester found that “one global staffing company is already embedding self-healing at the firmware level using Absolute Software’s Application Persistence capability to ensure that its VPN remains functional for all remote workers.”

6. Modern endpoint management needs to be analytics-driven.

Collecting telemetry data from endpoints is becoming increasingly useful for achieving more accurate end-user experience management (EUEM). Forrester is seeing the need for modern endpoint management platforms to collect and analyze end-user experience data that helps understand endpoints’ operational health, security, and performance. 

Endpoint security suites for malware prevention, detection, and remediation leads all PC and mobile technologies that firms plan to adopt in the next twelve months, according to Forrester’s Analytics Business Technographics Survey, 2021. Source: Forrester, The Future of Endpoint Management Report, June 6, 2022.

Endpoint management trends driving the market 

Forrester predicts endpoint management will evolve substantially over the next five years, with anywhere-work workforces being one of several catalysts driving its growth. Based on the interviews and research completed for the report, Forrester sees four dominant trends driving the market in 2022 and beyond.

Self-healing at multiple levels has become the market standard

AI is becoming more commonplace in endpoint management platforms to enable automatic remediation of endpoint issues without human involvement. In addition, AI brings greater resilience to self-healing endpoints, a trend that will accelerate in the years ahead.

Forrester’s Andrew Hewitt says that “self-healing will need to occur at multiple levels: 1) application; 2) operating system; and 3) firmware. Of these, self-healing embedded in the firmware will prove the most essential because it will ensure that all the software running on an endpoint, even agents that conduct self-healing at an OS level, can effectively run without disruption.”

Hewitt told VentureBeat that “firmware-level self-healing helps in a number of ways. First, it ensures that any corruptions to the firmware are healed in and of [themselves]. Secondarily, it also ensures that agents running on the devices are also healed. For example, if you have an endpoint security agent running on an endpoint, and it crashes or becomes corrupted in some way, firmware-level self healing can help to fix it quickly and get it properly functioning again.”

Modern endpoint management platforms need to provide self-healing across the three primary levels of applications, operating systems, and firmware to be effective, according to Forrester. Source: Forrester, The Future of Endpoint Management Report. June 6, 2022

Native endpoint security integration designed in

The trend of unified endpoint management platforms offering endpoint detection and response (EDR), vulnerability management, antiphishing and biometric authentication will increase in the coming years. CISOs have long told VentureBeat that they need a combined endpoint management and security platform that provides a unified view and real-time visibility across all endpoints. Leading endpoint management vendors are offering this today. Endpoint management platforms will accelerate the number of acquisitions they make in 2022 and beyond to strengthen this aspect of their product suites.

Experience management convergence or experience analysis

Endpoint management platforms will standardize more on collecting user experience telemetry data natively into their products. Forrester observes that the practice started with use cases that included how to reduce boot-up times but will expand in scope to include apps, networks, authentication mechanisms and more. The goal is to provide the most secure endpoint possible with little to no friction or inconveniences encountered by the user.  

Data protection without enrollment and privacy protection

With the growing demand that users have to protect their privacy, combined with the need to support BYOD models, endpoint management platforms need to focus more on data- and app-centric protections rather than full device enrollment, according to Forrester.

The research firm is also seeing a rise in stand-alone mobile application management (MAM­-only) approaches. For example, one CISO Forrester interviewed is currently using BlackBerry Access on personally owned laptops to separate work and personal data: “The solution provides more flexibility for employees and is saving us seven figures a year in device management costs because we don’t need to enroll the device into MDM.”

Self-healing endpoints are the future 

What’s most encouraging about the future of endpoint management is its focus on keeping the millions of anywhere-work employees productive while keeping their data and identity private. Every CIO and CISO wants to provide endpoint management that achieves those goals and gives users the freedom to use their own devices – and not force a change in their tech stacks in the process.

Forrester’s vision of the future of endpoint management is compelling, predicated on the needs of users globally, many of whom will rarely work full time in an office again, making their freedom, security and privacy the cornerstones that need to guide the development of endpoint management.

VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Learn more about membership.

Thu, 21 Jul 2022 07:20:00 -0500 Louis Columbus en-US text/html https://venturebeat.com/security/forrester-has-a-compelling-vision-for-the-future-of-endpoint-management/
Killexams : 5 top trends driving data infrastructure strategies, according to Gartner

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.

This is a busy year for many organizations when it comes to their data infrastructure. Many are implementing delayed upgrades and implementations made necessary by the pandemic. Some are looking to leap ahead of competitors with new investments. Others are seeking improved relationships with customers and employees through technology that enhances engagement.

Adam Ronthal, an analyst in the data management practice at Gartner, in an interview with VentureBeat, detailed where most organizations will be investing in data infrastructure for the remainder of 2022 and early 2023.

When we speak about data infrastructure investments, this involves all the infrastructure required to store and participate in supporting a wide range of data use cases, Ronthal said. This could be both operational and analytic use cases. It can also include operational or order processing transactional types of systems. 

“Every single use case for data requires successful management of that data to be successful. That is true whether we’re building applications, or doing data science, machine learning, visualization, advanced analytics, data marketplaces, exchanges, etc. Data underpins every adjacent area, and all of the business use cases that leverage that data,” Ronthal said.

Looking ahead, Ronthal sees the following as the top trends that will drive data infrastructure investments for the remainder of this year and heading into 2023.

Trend 1: Moving from an on-premises to a cloud-based world

“The cloud will be the top trend that underpins everything else. We’re seeing a shift in the market right now.” Ronthal said. He noted that last year was almost the tipping point away from on-premises, which is when 50% of revenue for the database management systems market goes to cloud providers. He expects 2022 to be the tipping point toward the cloud.

“Hopefully, in the process, we are transforming our systems and setting ourselves up for modernization,” he said.

Trend 2: Cloud deployments become more cohesive and holistic

“We’re starting to see cloud deployments done as cohesive and increasingly holistic data ecosystem approaches,” Ronthal said. To illustrate his point, he shared an example: 

In 2019, Microsoft redefined the next phase of analytics with what it called “synastry.” He explained that the new system “attempts to unify and merge different components of the analytic stack. This is done both for exploratory, data-lake types of components and for data warehousing.” Basically, it brought analytics, governance and security under one umbrella to work together in a holistic way.

Since then, Ronthal said that Microsoft has built things like natural links that make it easy to ingest data from operational sources. 

“Then we’ve got power business intelligence (BI). There are other ecosystems emerging as well,” he added.

The full ecosystem should enable an organization to understand how data is used and how it fits together. It should enable the organization to combine metadata, observability, governance, data integration and augmentation. 

“So we have a very rich and diverse ecosystem that can be procured from a single vendor. The expectation of customers is that it’s just going to work. They don’t expect to spend a lot of time messing with configuration,” Ronthal said. 

He stressed that the ecosystem should not be closed. 

“It should be open to third-party competitors,” Ronthal said. “If I decide I’m all in on Amazon Web Services (AWS), and I really like Snowflake as well, I can do that. If I’m in Azure, and I decide I would prefer to use the cleaver or deletion instead of purview, I can do that. Or I could use Informatica instead of Azure Data Factory.”

Trend 3: The emergence of finops

He went on to explain that there is an increased emergence of financial governance into a practice called “finops,” short for financial operations. This is a continuous and iterative approach to budget management, trying to get predictability from budgets in the cloud, he explained.

“The cost of individual workloads is now exposed with greater transparency than ever before,” Ronthal said. “It’s now possible for us to actually look at a collection of work or a set of workloads and say, ‘Hey, this cost me X dollars to run. Did I get business value from that?’”

“So we’re much more dynamic in how we approach budgeting capabilities,” Ronthal explains. “Contrast this with the on-premises world. Here we have a capital budget, we’d invest in the beginning of the year, and that was kind of it.” 

In the cloud, organizations have much greater latitude to reallocate funds on the fly, Ronthal emphasized.

“We can run things that maybe we didn’t run last month, add things to our mix, take things away, or change performance characteristics. It’s not so much about which service I should run from which cloud vendor. It’s about whether I can get the work done at the most optimal price,” Ronthal said.

Trend 4: A blanket approach to data fabric

The fourth trend Ronthal noted is an increased focus on data fabric.

Think of the data fabric as being built on the building blocks that Ronthal mentioned earlier — metadata, integration, governance, observability and augmentation. Data fabric looks at the design point and objective of a data environment. It will also look at the genuine usage patterns, how the data was created, how the environment is actually being used and how the data is consumed.

“Then we look at alignment and assumptions,” Ronthal explained.

The data fabric should also emerge from the data ecosystem, Ronthal said. It should enable an organization to build some business-oriented capabilities. That, in turn, enables the organization to connect all these things together and build a holistic view. 

“Ultimately, it will enable new business practices, such as finops, dataops and devops, as well as collaborative behaviors and marketplaces,” he said.

Trend 5: Managing and mastering a connected world

“Today we are looking at connecting everything,” Ronthal said. “As a result, we are creating mountains of streaming data that is coming at us in real-time. We may want to take action on it, such as performing analytics or building machine learning predictive models.”

“Then we’re looking to push those models out to the edge so that we can act on that streaming data in real-time,” Ronthal said. “There are components here that help us to do this. There’s an emerging class of database, which we call the distributed database.” 

There are several vendors now that work in this environment.

“What they can do is deploy databases that are spread out across diverse geographic boundaries, and all operate as a cohesive whole,” he said. “They support the connected-everything approach, regardless of where the data is generated or consumed. We’re looking at being able to split this around multiple environments and to link everything together.”

Just how good a job an organization does at incorporating new and emerging technologies into their systems and processes depends on the maturity level of that organization, Ronthal explained.

“Some organizations are great at it. They typically have entire teams looking at and evaluating emerging technology. Those organizations are probably well along the way in their cloud migration. They might not be fully there yet, but they are probably pretty far along the path,” he said.

“Other organizations are still trying to get their heads around it all. Maybe they’re still trying to figure out how to build their first data warehouse, or trying to figure out what a data lake is. Much of this remains fairly tactical, rather than strategic. That is especially true for the less mature organizations,” Ronthal notes.

Another key factor, he mentioned, is how well an organization is doing at reskilling its staff to handle new technology tools such as automation, artificial intelligence and machine learning technologies.

One important job role that will emerge is a cloud economist type role, Ronthal explained. This is somebody who understands cloud deployment models under dense cloud pricing models. They should also be able to work with multiple organizations to ensure that the use of the cloud is sufficient for the organization’s business model.

“There’s also going to be a need for strong collaboration between the CEO, the analytics officer, the CIO, the CFO, and line-of-business directors. That will be absolutely critical for success in this new cloud world,” Ronthal said.

VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Learn more about membership.

Mon, 01 Aug 2022 08:30:00 -0500 David Weldon en-US text/html https://venturebeat.com/data-infrastructure/5-top-trends-driving-data-infrastructure-strategies-according-to-gartner/
Killexams : 2022 ThinkPad X1 Carbon or MacBook Pro: Which Work Laptop Should You Push Your Boss to Buy You?

Maybe your work laptop is getting a bit slow. Maybe you’ve been closely watching our coverage, and have seen our reviews of the 2022 Lenovo ThinkPad X1 Carbon Gen 10 and the M2-based Apple MacBook Pro 13-Inch in latest weeks. Or maybe you just know that you want the best company-issued laptop you can get, and you don’t have it now. Well, if you’re making the case to your boss for a premium notebook, you’d better come prepared. 

Top performance and features often command top dollar, but getting the best business laptop isn’t just about scoring the model with the biggest price tag. If you want a more premium work machine, you also want to sell the boss on the productivity benefits you can get for that larger chunk of the budget.

We’re here to break down the specs, compare the features, and answer the questions you and your boss will have when making a choice between these two choice business laptops.

2022 MacBook Pro vs. ThinkPad X1 Carbon Gen 10: Spec Comparison

While the X1 Carbon and the MacBook Pro 13-Inch both offer top-of-the-line components, they’re far from identical.

The most obvious difference is the old Mac vs. PC debate. The MacBook Pro is an Apple machine, running Apple MacOS Monterey. The Lenovo ThinkPad X1 Carbon is a Windows laptop, running Windows 11 Pro. We’ll get to the key differences later, but if you’re already tied to one operating system, or your IT infrastructure allows for only one or the other, it makes your decision pretty easy.

The other major difference is Apple’s use of the M2 chip, the latest Apple Silicon processor. In test after test, we found the M2 offers great performance—just not better than the M1 Pro and M1 Max offered on the more premium 14-inch MacBook Pro. It’s all part of Apple’s move away from Intel processors, but it comes with complications around supported software, even for older Mac programs. The X1 Carbon, on the other hand, sticks with Intel, and is outfitted with the latest 12th Generation ("Alder Lake") Core i7 CPU, one of the best options available for any laptop.

2022 MacBook Pro vs. ThinkPad X1 Carbon Gen 10: Configuration and Pricing

It’s worth noting that while this comparison refers to the units we were able to test for our reviews, they aren’t the only options offered for either model. Both systems have a range of configuration options, and your choices for customizable features can dramatically change the price.

Apple offers several configurations of the 13-Inch MacBook Pro. Our test unit is stepped up from the base model, outfitted with 16GB of memory and 1TB of SSD storage, and sells for $1,899. The base model is a bit more modest, with the same Apple M2 eight-core processor and 10 GPU cores, but only 8GB of RAM and a 256GB SSD for storage. The price for that starter version is $1,299. The top model ($2,499) peaks with 24GB of memory and a 2TB drive.

With the 2022 Lenovo ThinkPad X1 Carbon Gen 10, you have a choice between the midrange Core i5 and the more powerful Core i7 in our review unit. Both options rely on integrated graphics—no discrete GPU option for this machine—but you have lots of other choices in hardware. 

Screenshot of Lenovo ThinkPad X1 Carbon configuration options

The base model, which starts at $1,439, has 8GB of RAM, but you can opt for more memory, like our 16GB model or the top 32GB system. Storage, similarly, starts at 256GB and scales up to 1TB of SSD storage. Display options abound, ranging from a simple 1,920-by-1,200-pixel IPS panel up to an OLED display or 4K IPS option, with several choices in between.

The Age-Old Question: Windows or Mac?

While we don’t want to stir up any old fights, the question of operating systems looms large over any comparison of Apple and Lenovo products. With the MacBook Pro using Apple’s latest version of macOS and the Lenovo running Windows 11 Pro, both machines offer the best respective versions of today’s Windows and Mac software.

It’s a discussion we’ve been having at PCMag since, well, forever, but despite technically being a PC, Apple’s Mac line has always been a different breed. Today the differences are less about the interface and more centered on app availability. 

Apple MacBook Pro 13-Inch (2022, M2)

Is one better than the other? It’s easier to answer whether one is better for you. We will say, however, that Apple’s tightly integrated approach to hardware and software makes it a formidable combination, provided you don’t need to use any Windows-only software. (Check out our take on which OS is really the best.)

And many businesses rely completely on Windows software, or at least they depend on Windows’ broad support for all sorts of programs, scripts, and customizations. If you work in an office where everything is Windows, your IT folks will appreciate you going with the flow, and it makes your decision easy: Just pick the X1 Carbon.

For graphics professionals, it’s even easier than that—Apple is the preferred choice for most photo and video editors and graphic designers, by far. That doesn’t mean much if you’re working in a Windows-powered shop, but it’s a pretty big deal when collaborating with others in the industry. If that sounds like you, then the MacBook Pro 13-Inch is the better choice.

2022 MacBook Pro vs. ThinkPad X1 Carbon Gen 10 Design: Thin Is In

Even at a cursory glance, these are very different machines. The designs are premium, but they speak to very different sensibilities, with the MacBook Pro sticking to its iconic bare-metal design and the X1 Carbon taking its name from the carbon fiber and magnesium alloy chassis it uses. Both are solid and sturdy designs, but only the Lenovo is rated to survive hazards like shock, vibration, and temperature extremes, passing MIL-STD 810H tests for ruggedness.

Apple MacBook Pro 13-Inch (2022, M2) closed

Both systems are impressively thin. Lenovo’s approach is all angles, with a geometric look that’s aggressive but professional. Apple’s design uses gentle curves instead, but is no less business-like. And while Apple uses the recognizable mirrored-fruit logo in the center of the lid, Lenovo keeps it subtle, with a demure ThinkPad logo in the corner of the X1 Carbon’s lid.

But the differences are more than chassis-deep. From the display to the keyboard, from ports to performance, these are very different and distinct laptops.

2022 MacBook Pro vs. ThinkPad X1 Carbon Gen 10: Screen Options

It’s hard to point to any one aspect of a display and declare it better than another, and both the X1 Carbon and the MacBook Pro offer some good-looking screens. The MacBook Pro is 13.3 inches, and it has Apple’s Retina display, a 2,560-by-1,600-pixel panel that has great brightness and covers the wide P3 color gamut.

Lenovo ThinkPad X1 Carbon Gen 10 (2022) display

The Lenovo ThinkPad Carbon X1, on the other hand, is a little larger, with a 14-inch panel available in your choice of resolutions. As is common with Windows machines, the Lenovo offers a touch screen as an option, while the MacBook Pro does not—instead, it has a narrow OLED strip called the Touch Bar forward of the keyboard for limited touch interaction.

X1 Carbon screen options include a higher-resolution 2,240-by-1,400-pixel IPS with anti-glare finish and low blue-light emissions for improved comfort and eye health, or a luxe 2,880-by-1,800-pixel OLED panel (albeit, one without touch capability). Or, you could ask your boss to go all-out with a 14-inch 3,840-by-2,400 IPS display with all the extras: anti-reflective, anti-smudge, Dolby Vision HDR, 500 nits of brightness, and low blue light.

2022 MacBook Pro vs. ThinkPad X1 Carbon Gen 10: Webcam, Keyboard and Touchpad

So much of our work life is now handled through apps like Zoom and Google Meet that looking your best for work is as much about camera quality as it is your wardrobe. A good webcam and decent lighting are the differences between looking alive in an important meeting or looking flat and dull. 

Here the Lenovo wins, with the ThinkPad X1 Carbon boasting a 1080p webcam that easily beats the lower-resolution 720p camera found in the MacBook Pro. But pixels aren’t the whole story, as both Apple and Lenovo apply image-enhancing processing to their webcams. The X1 Carbon also has a built-in privacy shutter, so you know hackers aren't snooping when you think the camera is off. 

Both the MacBook Pro and the X1 Carbon have multiple microphone arrays for clearer dialog in virtual meetings, but the Lenovo again leads the MacBook Pro by using a four-mic system with Dolby Voice to filter out ambient noise, while Apple outfits the MacBook Pro with three mics.

That answers the webcam question. Whether you wear pants while working from home is entirely up to you.

As for the traditional inputs, lots of people love Apple’s Magic Keyboard on the MacBook Pro. It’s a capable laptop keyboard, and the accompanying Force Touch haptic trackpad is very, very good.

Lenovo ThinkPad X1 Carbon Gen 10 (2022) keyboard

But Lenovo has the best laptop keyboards in the industry, offering a more comfortable typing experience, with better spring-back from key presses, more depth of key travel, and sculpted keycaps. Plus, the ThinkPad X1 Carbon boasts not one, but two pointing devices: a gesture-capable touchpad and the iconic red pointing stick in the middle of the keyboard, a constant since the earliest IBM ThinkPads. Not everyone uses the red stick, but those who do find it to be indispensable, especially in environments like airplane seating, where limited elbow room can make swiping around on a big trackpad less comfortable.

2022 MacBook Pro vs. ThinkPad X1 Carbon Gen 10: Ports and Connectivity

When it comes to physical ports and wireless connections, the ThinkPad is the winner. The X1 Carbon has two Thunderbolt 4 ports, a USB 3.2 Type-A port, and a full-size HDMI video output. A second USB-A port joins an audio jack, a nano SIM card slot, and a security lock slot on the right side of the laptop.

Lenovo ThinkPad X1 Carbon Gen 10 (2022) ports

The MacBook Pro offers only a pair of Thunderbolt 4 ports and a headphone jack, but by connecting any of our favorite MacBook docking stations, you can still get a full complement of USB-A ports and HDMI output, and even Ethernet, if the included Wi-Fi 6 doesn’t do it for you.

Apple MacBook Pro 13-Inch (2022, M2) ports

2022 MacBook Pro vs. ThinkPad X1 Carbon Gen 10: Weight and Portability

When it comes to the best work laptops, portability is essential. Whether you’re working from home, commuting to an office, or taking your work on the road, you need a laptop that can provide all the power you need, but that is also light, thin, and easy to pack around. And these are two of the best, with slim designs that won’t weigh you down.

Of the two, the X1 Carbon is the lighter option, due largely to the light-yet-strong materials used in the construction. Despite having a nearly identical thickness (0.6 inch for the Lenovo and 0.61 inch for the Apple), the X1 Carbon is a full half-pound lighter than the 3-pound MacBook Pro.

Lenovo ThinkPad X1 Carbon

The other part of the portability equation is battery life, which lets you work longer without having to also lug around the power brick and cables for charging the laptop. Here, the Apple MacBook Pro wins by a large margin, lasting nearly 22 hours in our battery test, compared with the Lenovo’s 12 hours. Granted, 12 hours of battery life should be plenty to get you through your workday and well into the evening on one charge, but it’s just over half of what the MacBook Pro provides.

Testing the 2022 X1 Carbon and MacBook Pro: A Productivity Performance Face-Off

Last, we have to consider performance when comparing the two business laptops. All the features or battery life in the world won’t mean much if you’re always waiting for a spreadsheet to finish running the numbers, or find yourself bogged down whenever you try to edit some photos to a presentation.

When it comes to everyday productivity, these are two very well-appointed machines, outclassing most of the competition without any trouble. But when you compare the numbers directly, there’s no denying that the Apple MacBook Pro 13-Inch has an advantage with its M2 chip. It lead in every test—or, at least, every test that it's possible to run on both Windows and Mac. (See how we test laptops.)

Whether it was our Handbrake video transcode tests, a processor-pushing rendering test like Cinebench R23, or a multitasking productivity gauntlet like Geekbench, the MacBook Pro maintained an edge over the X1 Carbon every step of the way.

The big asterisk in this comparison is our Photoshop trial. While the latest versions of Photoshop run natively on Apple Silicon (just as they do on Windows machines), our benchmark test does not, and it requires us to use an older version that supports the third-party testing macros we use to measure performance. For Apple machines, this makes it more of a test in running software with Apple’s Rosetta 2 emulation layer than a true photo-editing benchmark. But even with those caveats, the M2 MacBook Pro leads the Intel Core i7-powered X1 Carbon.

Graphics prowess is a similar story. While neither system uses a dedicated GPU—the Lenovo uses Intel’s Xe Graphics solution, and Apple’s M2 system-on-a-chip includes 10 GPU cores in our test configuration—they both offer superb support for basic visual processing. If you need more than these machines deliver, you’re probably better served by a mobile workstation, or just the higher-level processing choices offered on the 14-inch MacBook Pro.

But again, the M2 MacBook Pro squeezes more performance out of its wafer-thin silicon than the Lenovo does, even as both deliver category-leading results. One of the few graphics benchmarks that runs on both platforms is GFXBench, a cross-platform rendering test that runs on both OpenGL and Apple’s Metal API. Many Apple benchmarks don't offer Windows compatibility, and vice versa for the Windows tests we usually use. Compatibility is always a bit of a question mark for Apple products, but the performance lead is clear.

We've already discussed the MacBook Pro’s superior battery life, but it bears repeating: The ThinkPad X1 Carbon offers very good battery life, but the Apple MacBook Pro nearly doubles it with a fantastic 22 hours of endurance.

Aside from the battery, there's the question of the display. Setting aside questions of touch capability and screen size, the Apple MacBook Pro offers slightly better color quality and higher peak brightness than our Lenovo test unit does. However, panel performance on the Lenovo will depend entirely upon which screen option you choose (as noted in our review, for example, OLED's an option with the Gen 10 model), and everything we've seen is still very, very good.

Verdict: Should You Press for the ThinkPad X1 Carbon, or for the MacBook Pro?

The Lenovo ThinkPad X1 Carbon earned a perfect five-star score, making it one of the best laptops we’ve ever seen. The 2022 Apple MacBook Pro 13-Inch, on the other hand, scored a more modest four stars, despite the better performance, longer battery life, and equally impressive pedigree of past models.

Why? Because the MacBook Pro isn’t even the best MacBook to get the M2 chip—that honor goes to the redesigned Apple MacBook Air. And for better performance, we still recommend the 14-inch MacBook Pro mentioned earlier, or the truly premium (but less totable) 16-inch MacBook Pro. Both of those offer more potent processing and beefier graphics, along with updated designs.

Ultimately, the question of which premium business laptop is "better" is a question of which system is better for you. The issues of performance versus compatibility, or battery life versus portability, are questions that can only be answered in the context of your specific needs.

In fact, your best bet may be to pick the one that fits you best, and if your boss says no, suggest the other in its place. Regardless of which way the coin flip goes, you'll still be getting one of the best laptops on the market.

Wed, 20 Jul 2022 06:33:00 -0500 en-gb text/html https://uk.pcmag.com/laptops/141598/2022-thinkpad-x1-carbon-or-macbook-pro-which-work-laptop-should-you-push-your-boss-to-buy-you
Killexams : CrowdStrike Expands CNAPP Capabilities to Secure Containers and Help Developers Rapidly Identify and Remediate Cloud Vulnerabilities

Expansion of agent-based and agentless protection provides support for Amazon ECS allowing DevSecOps teams to build even more securely on AWS environments

AUSTIN, Texas & BOSTON, July 26, 2022--(BUSINESS WIRE)--AWS re:Inforce 2022CrowdStrike (Nasdaq: CRWD), a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, today announced powerful new Cloud Native Application Protection Platform (CNAPP) capabilities that build on its leading agent-based and agentless approach. These enhancements to CrowdStrike Cloud Security extend support to Amazon Elastic Container Service (ECS) within AWS Fargate, expand image registry scanning for eight new container registries and enable Software Composition Analysis (SCA) for open source software.

Containers have changed how applications are built, tested and used, enabling them to be instantly deployed at scale for any environment. As container adoption increases, it’s critical that organizations have access to tools that provide greater visibility into their containerized applications so they can operate more securely. With support for Amazon ECS alongside previously existing support for Amazon Elastic Kubernetes Service (Amazon EKS), organizations have access to more security tools to manage their AWS Fargate environment.

"By shifting left and proactively assessing containers, CrowdStrike customers will be able to identify any vulnerabilities, embedded malware, or stored secrets before they are deployed. Many of our customers rely on AWS as they modernize their IT infrastructure, making it critical to expand our support to services like Amazon ECS," said Amol Kulkarni, chief product and engineering officer at CrowdStrike. "We look forward to continuing to work with AWS to support our customers."

Only CrowdStrike delivers agent-based and agentless CNAPP capabilities through a unified, integrated platform. With this release, CrowdStrike extends these capabilities to include:

  • Support for AWS Fargate with Amazon ECS: Bring additional security controls to container environments by identifying rogue containers and drift detection. This capability extends functionality already available for AWS Fargate with Amazon EKS.

  • Software composition analysis: Excellerate application security and compliance by detecting and remediating vulnerabilities in open source components in the application codebase. Open language support includes Go, JavaScript, Java, Python and Ruby.

  • Image registry scanning for Docker Registry 2.0, IBM Cloud Container Registry, JFrog Artifactory, Oracle Container Registry, Red Hat OpenShift, Red Hat Quay, Sonatype Nexus Repository and VMware Harbor Registry: Enable the identification of hidden threats and configuration issues in containers to reduce the attack surface and secure continuous integration (CI)/continuous delivery (CD) pipelines. This capability extends existing functionality for Amazon Elastic Container Registry (ECR), Docker Registry and additional cloud registries.

"Given the growing adoption of open source and containers, organizations are seeking a CNAPP that enables them to gain full visibility into their development pipeline. It encourages a DevSecOps culture, where developers incorporate security as part of their daily workflow," said Doug Cahill, vice president, analyst services and senior analyst at Enterprise Strategy Group (ESG). "The addition of SCA and the expansion of new container registries within its image registry scanning tool are compelling additions to CrowdStrike’s CNAPP offering."

CrowdStrike’s adversary-focused approach to CNAPP provides both agent-based (Falcon CWP) and agentless (Falcon Horizon - CSPM) solutions delivered from the Falcon platform. This gives organizations the flexibility necessary to determine how best to secure their cloud applications across the continuous integration/continuous delivery (CI/CD) pipeline and cloud infrastructure across AWS and other cloud providers. The added benefit of an agent-based CWP solution is that it enables pre-runtime and runtime protection, compared to agentless-only solutions that only offer partial visibility and lack remediation capabilities.

Additional Resources

  • CrowdStrike was named a Strong Performer in The Forrester Wave™: Cloud Workload Security, Q1 2022 report.1

About CrowdStrike

CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with one of the world’s most advanced cloud-native platforms for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data.

Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.

Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.

CrowdStrike: We stop breaches.

Learn more: https://www.crowdstrike.com/
Follow us: Blog | Twitter | LinkedIn | Facebook | Instagram
Start a free trial today: https://www.crowdstrike.com/free-trial-guide/

© 2022 CrowdStrike, Inc. All rights reserved. CrowdStrike, the falcon logo, CrowdStrike Falcon and CrowdStrike Threat Graph are marks owned by CrowdStrike, Inc. and registered with the United States Patent and Trademark Office, and in other countries. CrowdStrike owns other trademarks and service marks, and may use the brands of third parties to identify their products and services.

1 The Forrester Wave™: Cloud Workload Security, Q1 2022

View source version on businesswire.com: https://www.businesswire.com/news/home/20220726005373/en/


Kevin Benacci
CrowdStrike Corporate Communications

Tue, 26 Jul 2022 00:00:00 -0500 en-US text/html https://finance.yahoo.com/news/crowdstrike-expands-cnapp-capabilities-secure-120000319.html
Killexams : Embedded Host Bridges Market In-Depth Analysis of Industry Share, Size, Growth Outlook up to 2028 with Top Countries Data

The MarketWatch News Department was not involved in the creation of this content.

Aug 03, 2022 (The Expresswire) -- "Embedded Host Bridges Market" Insights 2022 By Types, Applications, Regions and Forecast to 2028. The global Embedded Host Bridges market size is projected to reach multi million by 2028, in comparison to 2022, with unexpected CAGR during the forecast period, the Embedded Host Bridges Market Report Contains Many pages Including Full TOC, Tables and Figures, and Chart with In-depth Analysis Pre and Post COVID-19 Market Outbreak Impact Analysis and Situation by Region.

Embedded Host Bridges Market - Covid-19 Impact and Recovery Analysis:

We have been tracking the direct impact of COVID-19 on this market, as well as the indirect impact from other industries. This report analyzes the impact of the pandemic on the Embedded Host Bridges market from a Global and Regional perspective. The report outlines the market size, market characteristics, and market growth for Embedded Host Bridges industry, categorized by type, application, and consumer sector. In addition, it provides a comprehensive analysis of aspects involved in market development before and after the Covid-19 pandemic. Report also conducted a PESTEL analysis in the industry to study key influencers and barriers to entry.

Final Report will add the analysis of the impact of COVID-19 on this industry.


It also provides accurate information and cutting-edge analysis that is necessary to formulate an ideal business plan, and to define the right path for rapid growth for all involved industry players. With this information, stakeholders will be more capable of developing new strategies, which focus on market opportunities that will benefit them, making their business endeavours profitable in the process.

Get a trial PDF of report -https://www.360researchreports.com/enquiry/request-sample/20619587

Embedded Host Bridges Market - Competitive and Segmentation Analysis:

This Embedded Host Bridges Market report offers detailed analysis supported by reliable statistics on sale and revenue by players for the period 2017-2022. The report also includes company description, major business, Embedded Host Bridges product introduction, latest developments and Embedded Host Bridges sales by region, type, application and by sales channel.

The major players covered in the Embedded Host Bridges market report are:

● Renesas
● Cisco
● HP
● Vonage
● Marvell Technology
● Skyworks
● STMicroelectronics
● Infineon

Short Summery About Embedded Host Bridges Market :

The Global Embedded Host Bridges market is anticipated to rise at a considerable rate during the forecast period, between 2022 and 2028. In 2021, the market is growing at a steady rate and with the rising adoption of strategies by key players, the market is expected to rise over the projected horizon.

This report focuses on global and United States Embedded Host Bridges market, also covers the segmentation data of other regions in regional level and county level.

Due to the COVID-19 pandemic, the global Embedded Host Bridges market size is estimated to be worth USD million in 2022 and is forecast to a readjusted size of USD million by 2028 with a Impressive CAGR during the review period. Fully considering the economic change by this health crisis, by Type, Embedded Host Bridges accounting for % of the Embedded Host Bridges global market in 2021, is projected to value USD million by 2028, growing at a revised % CAGR in the post-COVID-19 period. While by Application, Embedded Host Bridges was the leading segment, accounting for over percent market share in 2021, and altered to an % CAGR throughout this forecast period.

The report on the "Embedded Host Bridges Market" covers the current status of the market including Embedded Host Bridges market size, growth rate, prominent players, and current competitive landscape. It also analyzes future opportunities and forecasts the market assessing the strategies of the key players in terms of merger and acquisitions, RandD investments, technological advancements. The report further provides key latest developments, profiling of key players, and market dynamics. The report further investigates and assesses the current landscape of the ever-evolving business sector and the present and future effects of COVID-19 on the Embedded Host Bridges market.

Global Embedded Host Bridges Scope and Market Size
Embedded Host Bridges market is segmented by region (country), players, by Type and by Application. Players, stakeholders, and other participants in the global Embedded Host Bridges market will be able to gain the upper hand as they use the report as a powerful resource. The segmental analysis focuses on revenue and forecast by region (country), by Type and by Application for the period 2017-2028.

Get a trial Copy of the Embedded Host Bridges Market Report 2022

Report further studies the market development status and future Embedded Host Bridges Market trend across the world. Also, it splits Embedded Host Bridges market Segmentation by Type and by Applications to fully and deeply research and reveal market profile and prospects.

On the basis of product typethis report displays the production, revenue, price, market share and growth rate of each type, primarily split into:

● Wireline
● Wireless

On the basis of the end users/applicationsthis report focuses on the status and outlook for major applications/end users, consumption (sales), market share and growth rate for each application, including:

● Aerospace and Military
● IT and Telecommunication
● Others

Embedded Host Bridges Market - Regional Analysis:

Geographically, this report is segmented into several key regions, with sales, revenue, market share and growth Rate of Embedded Host Bridges in these regions, from 2015 to 2027, covering

● North America (United States, Canada and Mexico) ● Europe (Germany, UK, France, Italy, Russia and Turkey etc.) ● Asia-Pacific (China, Japan, Korea, India, Australia, Indonesia, Thailand, Philippines, Malaysia and Vietnam) ● South America (Brazil, Argentina, Columbia etc.) ● Middle East and Africa (Saudi Arabia, UAE, Egypt, Nigeria and South Africa)

Some of the key questions answered in this report:

● What is the global (North America, Europe, Asia-Pacific, South America, Middle East and Africa) sales value, production value, consumption value, import and export of Embedded Host Bridges? ● Who are the global key manufacturers of the Embedded Host Bridges Industry? How is their operating situation (capacity, production, sales, price, cost, gross, and revenue)? ● What are the Embedded Host Bridges market opportunities and threats faced by the vendors in the global Embedded Host Bridges Industry? ● Which application/end-user or product type may seek incremental growth prospects? What is the market share of each type and application? ● What focused approach and constraints are holding the Embedded Host Bridges market? ● What are the different sales, marketing, and distribution channels in the global industry? ● What are the upstream raw materials and manufacturing equipment of Embedded Host Bridges along with the manufacturing process of Embedded Host Bridges? ● What are the key market trends impacting the growth of the Embedded Host Bridges market? ● Economic impact on the Embedded Host Bridges industry and development trend of the Embedded Host Bridges industry. ● What are the market opportunities, market risk, and market overview of the Embedded Host Bridges market? ● What are the key drivers, restraints, opportunities, and challenges of the Embedded Host Bridges market, and how they are expected to impact the market? ● What is the Embedded Host Bridges market size at the regional and country-level?

Our research analysts will help you to get customized details for your report, which can be modified in terms of a specific region, application or any statistical details. In addition, we are always willing to comply with the study, which triangulated with your own data to make the market research more comprehensive in your perspective.

Inquire more and share questions if any before the purchase on this report at -https://www.360researchreports.com/enquiry/pre-order-enquiry/20619587

Detailed TOC of Global Embedded Host Bridges Market Research Report 2022

1 Embedded Host Bridges Market Overview

1.1 Product Overview and Scope of Embedded Host Bridges
1.2 Embedded Host Bridges Segment by Type
1.2.1 Global Embedded Host Bridges Market Size Growth Rate Analysis by Type 2022 VS 2028
1.3 Embedded Host Bridges Segment by Application
1.3.1 Global Embedded Host Bridges Consumption Comparison by Application: 2022 VS 2028
1.4 Global Market Growth Prospects
1.4.1 Global Embedded Host Bridges Revenue Estimates and Forecasts (2017-2028)
1.4.2 Global Embedded Host Bridges Production Capacity Estimates and Forecasts (2017-2028)
1.4.3 Global Embedded Host Bridges Production Estimates and Forecasts (2017-2028)
1.5 Global Market Size by Region
1.5.1 Global Embedded Host Bridges Market Size Estimates and Forecasts by Region: 2017 VS 2021 VS 2028
1.5.2 North America Embedded Host Bridges Estimates and Forecasts (2017-2028)
1.5.3 Europe Embedded Host Bridges Estimates and Forecasts (2017-2028)
1.5.4 China Embedded Host Bridges Estimates and Forecasts (2017-2028)
1.5.5 Japan Embedded Host Bridges Estimates and Forecasts (2017-2028)

2 Market Competition by Manufacturers
2.1 Global Embedded Host Bridges Production Capacity Market Share by Manufacturers (2017-2022)
2.2 Global Embedded Host Bridges Revenue Market Share by Manufacturers (2017-2022)
2.3 Embedded Host Bridges Market Share by Company Type (Tier 1, Tier 2 and Tier 3)
2.4 Global Embedded Host Bridges Average Price by Manufacturers (2017-2022)
2.5 Manufacturers Embedded Host Bridges Production Sites, Area Served, Product Types
2.6 Embedded Host Bridges Market Competitive Situation and Trends
2.6.1 Embedded Host Bridges Market Concentration Rate
2.6.2 Global 5 and 10 Largest Embedded Host Bridges Players Market Share by Revenue
2.6.3 Mergers and Acquisitions, Expansion

3 Production Capacity by Region
3.1 Global Production Capacity of Embedded Host Bridges Market Share by Region (2017-2022)
3.2 Global Embedded Host Bridges Revenue Market Share by Region (2017-2022)
3.3 Global Embedded Host Bridges Production Capacity, Revenue, Price and Gross Margin (2017-2022)
3.4 North America Embedded Host Bridges Production
3.4.1 North America Embedded Host Bridges Production Growth Rate (2017-2022)
3.4.2 North America Embedded Host Bridges Production Capacity, Revenue, Price and Gross Margin (2017-2022)
3.5 Europe Embedded Host Bridges Production
3.5.1 Europe Embedded Host Bridges Production Growth Rate (2017-2022)
3.5.2 Europe Embedded Host Bridges Production Capacity, Revenue, Price and Gross Margin (2017-2022)
3.6 China Embedded Host Bridges Production
3.6.1 China Embedded Host Bridges Production Growth Rate (2017-2022)
3.6.2 China Embedded Host Bridges Production Capacity, Revenue, Price and Gross Margin (2017-2022)
3.7 Japan Embedded Host Bridges Production
3.7.1 Japan Embedded Host Bridges Production Growth Rate (2017-2022)
3.7.2 Japan Embedded Host Bridges Production Capacity, Revenue, Price and Gross Margin (2017-2022)

4 Global Embedded Host Bridges Consumption by Region
4.1 Global Embedded Host Bridges Consumption by Region
4.1.1 Global Embedded Host Bridges Consumption by Region
4.1.2 Global Embedded Host Bridges Consumption Market Share by Region
4.2 North America
4.2.1 North America Embedded Host Bridges Consumption by Country
4.2.2 United States
4.2.3 Canada
4.3 Europe
4.3.1 Europe Embedded Host Bridges Consumption by Country
4.3.2 Germany
4.3.3 France
4.3.4 U.K.
4.3.5 Italy
4.3.6 Russia
4.4 Asia Pacific
4.4.1 Asia Pacific Embedded Host Bridges Consumption by Region
4.4.2 China
4.4.3 Japan
4.4.4 South Korea
4.4.5 China Taiwan
4.4.6 Southeast Asia
4.4.7 India
4.4.8 Australia
4.5 Latin America
4.5.1 Latin America Embedded Host Bridges Consumption by Country
4.5.2 Mexico
4.5.3 Brazil

Get a trial Copy of the Embedded Host Bridges Market Report 2022

5 Segment by Type
5.1 Global Embedded Host Bridges Production Market Share by Type (2017-2022)
5.2 Global Embedded Host Bridges Revenue Market Share by Type (2017-2022)
5.3 Global Embedded Host Bridges Price by Type (2017-2022)
6 Segment by Application
6.1 Global Embedded Host Bridges Production Market Share by Application (2017-2022)
6.2 Global Embedded Host Bridges Revenue Market Share by Application (2017-2022)
6.3 Global Embedded Host Bridges Price by Application (2017-2022)

7 Key Companies Profiled
7.1 Company
7.1.1 Embedded Host Bridges Corporation Information
7.1.2 Embedded Host Bridges Product Portfolio
7.1. CEmbedded Host Bridges Production Capacity, Revenue, Price and Gross Margin (2017-2022)
7.1.4 Company’s Main Business and Markets Served
7.1.5 Company’s latest Developments/Updates

8 Embedded Host Bridges Manufacturing Cost Analysis
8.1 Embedded Host Bridges Key Raw Materials Analysis
8.1.1 Key Raw Materials
8.1.2 Key Suppliers of Raw Materials
8.2 Proportion of Manufacturing Cost Structure
8.3 Manufacturing Process Analysis of Embedded Host Bridges
8.4 Embedded Host Bridges Industrial Chain Analysis

9 Marketing Channel, Distributors and Customers
9.1 Marketing Channel
9.2 Embedded Host Bridges Distributors List
9.3 Embedded Host Bridges Customers

10 Market Dynamics
10.1 Embedded Host Bridges Industry Trends
10.2 Embedded Host Bridges Market Drivers
10.3 Embedded Host Bridges Market Challenges
10.4 Embedded Host Bridges Market Restraints

11 Production and Supply Forecast
11.1 Global Forecasted Production of Embedded Host Bridges by Region (2023-2028)
11.2 North America Embedded Host Bridges Production, Revenue Forecast (2023-2028)
11.3 Europe Embedded Host Bridges Production, Revenue Forecast (2023-2028)
11.4 China Embedded Host Bridges Production, Revenue Forecast (2023-2028)
11.5 Japan Embedded Host Bridges Production, Revenue Forecast (2023-2028)

12 Consumption and Demand Forecast
12.1 Global Forecasted Demand Analysis of Embedded Host Bridges
12.2 North America Forecasted Consumption of Embedded Host Bridges by Country
12.3 Europe Market Forecasted Consumption of Embedded Host Bridges by Country
12.4 Asia Pacific Market Forecasted Consumption of Embedded Host Bridges by Region
12.5 Latin America Forecasted Consumption of Embedded Host Bridges by Country

13 Forecast by Type and by Application (2023-2028)
13.1 Global Production, Revenue and Price Forecast by Type (2023-2028)
13.1.1 Global Forecasted Production of Embedded Host Bridges by Type (2023-2028)
13.1.2 Global Forecasted Revenue of Embedded Host Bridges by Type (2023-2028)
13.1.3 Global Forecasted Price of Embedded Host Bridges by Type (2023-2028)
13.2 Global Forecasted Consumption of Embedded Host Bridges by Application (2023-2028)
13.2.1 Global Forecasted Production of Embedded Host Bridges by Application (2023-2028)
13.2.2 Global Forecasted Revenue of Embedded Host Bridges by Application (2023-2028)
13.2.3 Global Forecasted Price of Embedded Host Bridges by Application (2023-2028)

14 Research Finding and Conclusion

15 Methodology and Data Source
15.1 Methodology/Research Approach
15.1.1 Research Programs/Design
15.1.2 Market Size Estimation
15.1.3 Market Breakdown and Data Triangulation
15.2 Data Source
15.2.1 Secondary Sources
15.2.2 Primary Sources
15.3 Author List
15.4 Disclaimer


Purchase this report (Price 3660 USD for a single-user license) -https://www.360researchreports.com/purchase/20619587

About Us:

360 Research Reports is the credible source for gaining the market reports that will provide you with the lead your business needs. At 360 Research Reports, our objective is providing a platform for many top-notch market research firms worldwide to publish their research reports, as well as helping the decision makers in finding most suitable market research solutions under one roof. Our aim is to provide the best solution that matches the exact customer requirements. This drives us to provide you with custom or syndicated research reports.

Contact Us:
Email: sales@360researchreports.com
Organization: 360 Research Reports
Phone: +44 20 3239 8187/ +14242530807

Our Other Reports :

Matuzumab Market 2022 : Top Countries Data with CAGR Status, Market Size, Comprehensive Research Methodology, Regional Study and Business Operation Data Analysis by 2028 | Latest 90 Pages Report

Commercial Boilers Market In 2022 : Top Countries Data, What are the growth opportunities in the Industry? | New Report Spreads In 103 Pages

Liquid Lenses Market Size 2022 : Top Countries Data with CAGR Status, Overview By Share, Industry Players, Revenue And Product Demand Forecast Till 2028 | 87 Pages Report

Press Release Distributed by The Express Wire

To view the original version on The Express Wire visit Embedded Host Bridges Market In-Depth Analysis of Industry Share, Size, Growth Outlook up to 2028 with Top Countries Data


Is there a problem with this press release? Contact the source provider Comtex at editorial@comtex.com. You can also contact MarketWatch Customer Service via our Customer Center.

The MarketWatch News Department was not involved in the creation of this content.

Tue, 02 Aug 2022 22:45:00 -0500 en-US text/html https://www.marketwatch.com/press-release/embedded-host-bridges-market-in-depth-analysis-of-industry-share-size-growth-outlook-up-to-2028-with-top-countries-data-2022-08-03
Killexams : Review: HP’s Omen 45L Desktop Is A Refreshing Desktop From A Major OEM

For a long time, boutique builders have been the only way to get a desktop PC that you could quickly service yourself. Over the last few years, HP’s Omen gaming brand has made considerable strides to incorporate easily upgradable and replaceable components and standardized parts into its line of gaming PCs. Admittedly, this approach inherently risks turning a computer into yet another beige box PC that look like every other desktop. For that reason, I was excited to hear that the upcoming Omen 45L would feature HP’s existing Omen design language, with a user-friendly, slightly custom design. On paper, the HP Omen 45L strikes a perfect balance between mainstream accessibility and unique compared to the rest of the field. HP sent me an Omen 45L for review, the first HP gaming desktop from a major OEM I’ve used in a very long time. Today I’ll share my main takeaways from my experience with the system.

The Specs

As configured, my HP Omen 45L was spec’d to the gills with an Intel i9-12900K, 64GB of HyperX DDR4 RAM, 2TB WD Black NVMe SSD and an NVIDIA RTX 3090 GPU. Regardless of the configuration, it ships with an 800W 80 Plus Gold-rated PSU and a case with a Cryo Chamber—one of the main reasons why I was excited about the desktop. The Cryo Chamber isolates the 12900K and the rest of the system components, allowing them to cool separately from the radiator. This design also allows plenty of airflow around the GPU and RAM to ensure the components don’t affect the CPU’s cooling. Additionally, I can attest that the gap between the Cryo chamber and the main chamber of the case serves nicely as a handle, making it easier to carry. As configured, the system’s MSRP was $4,049.99, but it is currently on sale for $3,549.99 (as of July 15th, 2022). It was an interesting choice to see HP go with DDR4 on this system as the Intel 12th Gen processors and Z690 motherboards are also capable of DDR5. I believe that HP likely made this decision mostly due to cost.

In addition to the desktop, HP completed the Omen gaming experience by sending me the Omen 27c monitor and HyperX keyboard and mouse. As far as the Omen 27c monitor’s specs go, I think it’s a very nice monitor. However, I do think HP should offer a higher tier monitor beyond the 1440P curved and 4K 27” monitors it offers today. The 27c monitor fits in with the 25L, 30L and 40L Omen PCs. HP needs a bigger, higher quality gaming monitor, like the Omen X Emperium it developed three years ago as a part of NVIDIA’s line of BFGD TVs. While those BFGDs were admittedly a bit overpriced and underwhelming, there are just so many epic gaming monitors out there now. I’d love to see HP throw its hat into the ring with a halo monitor product.

The Design and Build Quality

The overall design and build quality of the Omen 45L was quite good for a major OEM, though the bar admittedly isn’t very high. The nice thing is that HP designed the case itself for the Omen, allowing it to really fit nicely into the overall Omen design language. The Omen 45L is elegant, but simple. The same could be said for the 27c monitor, which had lots of very square and angular aspects to it. I love the nod to the Omen brand in the RGB logo on the front along with the 3 RGB ring fans. It was an interesting choice for HP to not go RGB on the rear exhaust fan while the other fans and CPU block have RGB and I think for a small increased cost it would Excellerate the complete system appearance. Overall, I think the design and integration of the Omen 27c monitor complements the desktop extremely well.

Featuring a blend of brushed metal with glass, the quality of the case itself felt extremely high. That said, I thought the power button was in an odd location and could have been larger and had a more tactile feel. I appreciated HP’s use of a GPU bracket to secure the GPU during shipping and to prevent sagging. However, I believe using the bracket to also route the power cables would have given the system a cleaner appearance. If not that, sleeved power cables would have been nice to Excellerate the premium feel of the system. The previously mentioned RGB Omen-branded CPU cooler is a very nice touch and fits in very well with the overall design language. Still, if you can see it, you end up seeing a lot of the other power and fan cables that aren’t sleeved. It looks a bit like something someone would have built at home without much attention paid to the appearance of cables. This has generally been a problem with many PC OEMs of varying sizes, but boutiques tend to get this part right most of the time. I would welcome HP to look at what boutique builder Maingear has done with its Stealth technology in collaboration with Gigabyte. HP could help it grow as a standard, making cleaner desktops a more cost-effective and common thing.

HP’s system design has four USB ports on the front with only two 5 Gbps ports and six USB ports on the back with two USB 2.0 Type-A ports, one 5 Gbps and one 10 Gbps Type-A ports and the same speed Type-C ports. I think that in this regard HP is just hitting the bare minimum of what’s necessary and should try to do better with that. Sure, I have seen many other major OEMs do the same thing on the rear I/O ports, but ultimately HP Omen should be different. As a gamer myself, I can never have enough USB ports on the back of my machine. Having just built my own Z690 system, the ASUS ROG board had considerably more and faster USB ports. I think a lot of users will be pretty disappointed once they find out how much slower their PC is compared to boutique and custom PCs and how many less ports they have in comparison.

Hands on Experience

The setup was extremely easy and simple, and I really liked that the system was up-to-date when it arrived. I also appreciated that it didn’t feel necessary to set up an account with the Omen Gaming Hub. Speaking of the Omen Gaming Hub, it was nice to have the ability to manage both the desktop and monitor from a single place. That includes the light controls, though I think they could be a little more user friendly and granular. As far as the Omen Light Studio specifically goes, I think it would be nice to have HyperX software built-in so that people who buy HyperX accessories for their HP Omen PC don’t need to load any additional software.

A system with these specs isn’t going to have any trouble playing the latest games, especially since it was attached to a 1440P 27” monitor. Honestly, the 3090 was almost overkill for every game at that resolution; I had no issues running all my games, including Battlefield 2042, at max settings without a single glitch. I would probably recommend the 4K Omen 27 monitor or a Samsung Odyssey G9 if you really want to push the NVIDIA RTX 3090 to its limits. The Omen 27c monitor that HP shipped to me with the system was a nice gaming display, but I was quite surprised by the amount of edge backlight bleed. I would have expected more from a high-end monitor.

The HP Omen overclocking utility uses Intel XTU to benchmark and set performance, with a single-click ‘Turbo Mode’ that allowed me to increase the RAM performance from 3200 MT/s to 3733 MT/s. This delivered a negligible performance increase compared to overclocking the CPU, which requires more granular and painstaking increases of the CPU clock speed. I don’t recommend overclocking a system you want to last you a long time; usually, the risk outweighs the benefits. That said, the Omen 45L has enough cooling for users to push the clock speed a little more; I’d like to see HP offer more automatic overclocking like we see from some of the motherboard vendors.

Regarding genuine gaming performance, I played Battlefield 2042 online in a 64-person server at ultra settings. I got an average of 105 fps, so I probably occasionally hit the limit of this monitor in less graphically intensive scenes. Overall, if you plan to max your games out at max settings, the 1440P monitor may be a great fit if you have a powerful GPU inside like an RTX 3080 or 3090 (HP Does not offer AMD GPUs on this system). Regarding temps during heavy gaming sessions, the GPU peaked at 73C and the CPU around 68C, which makes sense when you consider the sheer size of the radiator in the Omen 45L’s ‘Cryo Chamber.’ The design of the 45L enables the GPU to get ample fresh air without interfering with the CPU’s fresh air, enabling both to run cool and quiet during gaming sessions. I did not get to evaluate HP’s support as I did not encounter any issues, but I consider that to be a good thing for this review.

Final thoughts

HP’s Omen 45L impressed me on paper when it was first announced, and it’s quite clear that it is even more impressive in real life. While the Omen 45L is quite large, that is also what enables it to be such a powerful, cool and quiet gaming powerhouse. With a top-spec machine utilizing the latest and greatest chips from Intel and NVIDIA, it is a competent gaming machine that looks great and is reasonably priced for a major OEM. That said, I think that gamers will balk at the lack of I/O on the back of the machine, which is inferior to a boutique or custom-built machine. Even compared to Dell’s Alienware Aurora R13 and R14, it has considerably fewer and slower ports on the front and back. I would also like to see HP integrate HyperX more into the brand and user experience, so it is easier for users to manage all their hardware in one place. I’m genuinely excited about what HP has done with the Omen 45L, and it is among the top of my recommendations for a major OEM system but as always, there is still room for improvement.

Note: Moor Insights & Strategy writers and editors may have contributed to this article.

Moor Insights & Strategy, like all research and tech industry analyst firms, provides or has provided paid services to technology companies. These services include research, analysis, advising, consulting, benchmarking, acquisition matchmaking, and speaking sponsorships. The company has had or currently has paid business relationships with 8×8, Accenture, A10 Networks, Advanced Micro Devices, Amazon, Amazon Web Services, Ambient Scientific, Anuta Networks, Applied Brain Research, Applied Micro, Apstra, Arm, Aruba Networks (now HPE), Atom Computing, AT&T, Aura, Automation Anywhere, AWS, A-10 Strategies, Bitfusion, Blaize, Box, Broadcom, C3.AI, Calix, Campfire, Cisco Systems, Clear Software, Cloudera, Clumio, Cognitive Systems, CompuCom, Cradlepoint, CyberArk, Dell, Dell EMC, Dell Technologies, Diablo Technologies, Dialogue Group, Digital Optics, Dreamium Labs, D-Wave, Echelon, Ericsson, Extreme Networks, Five9, Flex, Foundries.io, Foxconn, Frame (now VMware), Fujitsu, Gen Z Consortium, Glue Networks, GlobalFoundries, Revolve (now Google), Google Cloud, Graphcore, Groq, Hiregenics, Hotwire Global, HP Inc., Hewlett Packard Enterprise, Honeywell, Huawei Technologies, IBM, Infinidat, Infosys, Inseego, IonQ, IonVR, Inseego, Infosys, Infiot, Intel, Interdigital, Jabil Circuit, Keysight, Konica Minolta, Lattice Semiconductor, Lenovo, Linux Foundation, Lightbits Labs, LogicMonitor, Luminar, MapBox, Marvell Technology, Mavenir, Marseille Inc, Mayfair Equity, Meraki (Cisco), Merck KGaA, Mesophere, Micron Technology, Microsoft, MiTEL, Mojo Networks, MongoDB, MulteFire Alliance, National Instruments, Neat, NetApp, Nightwatch, NOKIA (Alcatel-Lucent), Nortek, Novumind, NVIDIA, Nutanix, Nuvia (now Qualcomm), onsemi, ONUG, OpenStack Foundation, Oracle, Palo Alto Networks, Panasas, Peraso, Pexip, Pixelworks, Plume Design, PlusAI, Poly (formerly Plantronics), Portworx, Pure Storage, Qualcomm, Quantinuum, Rackspace, Rambus, Rayvolt E-Bikes, Red Hat, Renesas, Residio, Samsung Electronics, Samsung Semi, SAP, SAS, Scale Computing, Schneider Electric, SiFive, Silver Peak (now Aruba-HPE), SkyWorks, SONY Optical Storage, Splunk, Springpath (now Cisco), Spirent, Splunk, Sprint (now T-Mobile), Stratus Technologies, Symantec, Synaptics, Syniverse, Synopsys, Tanium, Telesign,TE Connectivity, TensTorrent, Tobii Technology, Teradata,T-Mobile, Treasure Data, Twitter, Unity Technologies, UiPath, Verizon Communications, VAST Data, Ventana Micro Systems, Vidyo, VMware, Wave Computing, Wellsmith, Xilinx, Zayo, Zebra, Zededa, Zendesk, Zoho, Zoom, and Zscaler. Moor Insights & Strategy founder, CEO, and Chief Analyst Patrick Moorhead is an investor in dMY Technology Group Inc. VI, Dreamium Labs, Groq, Luminar Technologies, MemryX, and Movandi.

Tue, 26 Jul 2022 04:53:00 -0500 Anshel Sag en text/html https://www.forbes.com/sites/moorinsights/2022/07/26/review-hps-omen-45l-desktop-is-a-refreshing-desktop-from-a-major-oem/
C9560-040 exam dump and training guide direct download
Training Exams List