Today the Xen Project announced eight security advisories: XSA-191 to XSA-198. The bulk of these security advisories were discovered and fixed during the hardening phase of the Xen Project Hypervisor 4.8 release (expected to come out in early December). The Xen Project has implemented a security-first approach when publishing new releases.
IT spend on innovation requires faster application development to keep up with business growth. Familiar approaches just don’t work. This is because companies are discovering that critical business applications are not just database or infrastructure, they’re really a combination storage, databases, and application servers.
The consequences of not choosing wisely when selecting new technology can be significant. By the time you tally up the cost of the software/hardware, the time spent implementing it, the effort on staff training, the migration away from legacy systems, and then any financial impact related to the new stuff not doing what you expected it to do… Well, it’s no surprise when upper management isn’t very polite about asking what the heck went wrong.
How many times have you been told that your IT budget was being cut? How often have you been told to do more with less? Perhaps not in so many words, but in resource reductions and in directives to optimize for cost.
I am pleased to announce the release of Xen 4.6.4 and 4.7.1. Xen Project Maintenance releases are released in line with our Maintenance Release Policy. We recommend that all users of the 4.6 and 4.7 stable series update to the latest point release.
From time to time, when vendors feel they have gotten exceptionally strong positive feedback from their customers, they ask IDC to study some of those customers and quantify their benefits. IDC follows a strict methodology for interviewing the customers, collecting quantifiable results, and calculating solution costs, return on investment, and business productivity gains realized from the products we look at.
At some point during the last decade, two-speed IT started gaining traction, and looked like the future of IT strategy for all companies. The need for it was undeniable: changing customer requirements and growing reliability on digitally-enabled processes increased the strain on IT infrastructures considerably, this no longer allowing for the slow responses legacy infrastructures returned.
Cybersecurity is no longer a task relegated to the CSO and IT department. A fully engaged and proactive C-suite can dramatically reduce risk. A recent report from The Economist Intelligence Unit and Oracle shed a light on best practices.