Today I’m excited to announce that VCE has partnered with Cisco and EMC to roll out an exciting new program designed to accelerate the cloud opportunity for partners. Our new Cloud Infrastructure Solutions Accelerator raises the bar for cloud builders, providing unique program benefits and rewards to partners who are helping move the industry forward by offering their customers converged (also called “integrated”) infrastructure solutions designed for the next wave of “born in the cloud” applications.It’s no secret that our industry continues to shift toward cloud-based computing models given CIOs today spend upwards of 70 percent of their time and resources on OPEX.Cloud computing offers a more simplified way of managing IT so that the effort they’ve been putting into keeping the lights on can be redirected toward innovation and driving value back into the business. Partners have been critical in driving this market forward, delivering cloud solutions for customers that keep them coming back for more.Converged infrastructure takes this a step further, having a transformative effect on the data center that not only simplifies operations and management, but is also packaged and delivered in a way that eliminates the guesswork when deploying new systems. This results in far quicker infrastructure and application deployments compared to traditional approaches, and in the end, faster time to market that enables customers to stay competitive.For partners, we’ve found that selling converged infrastructure isn’t just a one-off; it can create entirely new revenue streams. For example, one Vblock System sale can then lead to follow-on sales of additional applications, services and other products – up to and including deployment of additional Vblock Systems into the customer’s environment. Suddenly, a single engagement can lead to predictable recurring revenue in a matter of months.With a vast majority of VCE transactions flowing through the channel, our partner community is essential in growing this market to its true potential. And our new Cloud Infrastructure Solutions Accelerator presents an exciting opportunity for partners to build practices around delivering converged infrastructure to customers. Partners have told us their main priorities during this industry transition are:Differentiation of elite skillsets in which they’re investing, helping them become trusted advisers to customersUnification across VCE, Cisco and EMC to provide consistent positioning and enablement of converged infrastructureProfitability and competitive incentivesThe ability to future-proof their investments amid the evolution toward cloud-based ITConverged infrastructure solutions deliver on these priorities, enabling value well beyond the sum of their parts – partners can drive bigger deals and initiate long-lasting relationships with repeat customers while ensuring they can stay ahead of the curve.VCE, Cisco and EMC recognized the opportunity to enable our joint partner communities to accelerate their success as the converged infrastructure trend takes off. Our new program is focused on joint field engagement, custom enablement, joint marketing and profitability incentives that we believe will accelerate our partners’ success. Take a look at this video for additional commentary from VCE, Cisco and EMC on this exciting new initiative.http://youtu.be/Y5maNCtUb_0 IDC #231884 December, 2011. Survey of 300 IT decision makers.
In today’s uber-connected world, everyone has dealt with that little voice in the back of the head, asking if you are safe… Is your data safe? Is your “stuff” private and protected? Are your connections exposing you to security attacks? And rightly so. It is nearly impossible to predict all the ways in which crooked minds (i.e. hackers and thieves) will steal your everything in but a moment, given a chance.In the world of security, experts think in terms of “attack surfaces.” These are all the ways and methods, simply put, in which the bad guys can launch attacks that can hurt you. They can hurt an individual at a time, or a whole nation. The basic principles of security remain the same: identify all the attack surfaces. Turn off all access to the attack surfaces. Then monitor closely and monitor often for any suspicious activity. Rinse and repeat.This recipe, however, only works with the attack surfaces you are aware of, aka the “known unknowns.” What about the “unknown unknowns?”With 5G emerging—the hyper-connectivity, the bandwidth guarantees, the low-latency guarantee, the scale, and the expected ubiquity—there is potential for a huge number of unknown unknowns. For the first five years of 5G deployments, humanity is going to discover attack surfaces that we had never thought of before. If one contrasts 5G design and architecture with 4G, it definitely includes stronger and more robust security principles. However, compared to 4G, the risk profile of a 5G transport may be far worse as 5G is expected to carry more mission-critical services that 4G currently does, and as a scale far greater than 4G ever will.Here is an example: How about weird atmospheric phenomena that unpredictably open electromagnetic tunnels through layers of Earth’s atmosphere, exposing mobile networks to devices hundreds of miles away? When that happens, how will a physically remote hacker exploit the new large-scale, superfast 5G transport you just deployed? How about a rogue nation that wants to attack your critical IoT infrastructure riding on 5G? While this problem affects all uses of the electromagnetic spectrum (including 4G), 5G will have a lot more riding on it, including national critical infrastructures. I am sure you would prefer to just close the tunnels if you could, rather than find out the answers to these questions.Then there are the garden-variety of attack surface types to be expected, yet remain hidden until exploited and discovered. These are:Network fragility: A 5G network will be built on a foundation of virtualization, a technology proven in the data center, but less so in the telecom transport sphere where physical functions are the norm. Virtualization is great for cost and efficiency, but also requires careful and balanced pre-allocation of resources. By targeting resource imbalances in virtualized stacks, could hackers negatively impact 5G service delivery, and cause a cascade of such events? It’s not out of the question.Increased system complexity: The ambitious goals of 5G require the systems that implement to be quite complex. A complex system with more virtualized and sometimes dedicated parts such as accelerators can provide multiple ways to attack. This can adversely impact everything the system carries.Single points of failure: We know that there will be SPoFs. But where? And how do I know it will be the weakest link in the chain?Plain-old physics of it: The ionospheric tunnel is an example of what the physics of the spectrum can do. It may be hard but it’s certainly not impossible to hijack a part of the spectrum when such physical phenomena permit and exploit them with a denial-of-service (DoS) attack, and close up with not so much as a ripple on the pond.Layers of disaggregation: This is a fundamental principle on which 5G is based. While it enables elegant and efficient designs and implementations, it also opens opportunities for bad actors to hide or inject their agents between those layers of disaggregation. How will they use a beautiful design principle as an attack surface? We will only find out as it happens.Multi-actor networks: The disaggregated design opens up the possibility of multiple business entities collaborating to meet the goal of carrying your 5G-based services. The flip side? They will promise service levels to each other, but they must trust each other to be able to operate together. What, how and who might hijack a trust token (for example), and bring all actors down to some nefarious goals? When that happens, who is at fault? Who is on the hook to pay a price?3rd-party Applications: Many 5G-based services will be implemented via applications provided by 3rd The new openness and innovation that this ecosystem will enable could become a set of attack surfaces for hackers to exploit. It is near-impossible to check and test each and every 3rd party application for loopholes a priori, and may become attack surfaces that will significantly increase 5G security risk.Security experts are often heard saying that it’s not if you will be attacked, only when. With the emerging 5G world, we confess that we are only beginning to understand the how of it, i.e. the new and emerging unknown unknowns.At Dell Technologies, we provide infrastructure expertise to build scalable, dependable and secure 5G networks. In future blog entries on this topic, we will continue to provide more insights into how 5G and security are at once both scary and exciting to embrace for the 5G user. Stay tuned!About the authors: David Lake and Sumedh Sathaye are experts on 5G and security. They gave a talk on this topic at the Open Networking Forum Connect conference held in Santa Clara in Sept. 2019, from which this blog post was derived.
Increased rainfall in the summer opened the door to disease and drastically lowered individual size and quantity of pecans produced in Georgia this year. Added moisture throughout the state during June, July and August led to increased cases of pecan scab disease, a fungal pathogen that thrives in environments conducive to high moisture. Scab can reduce the quality and size of pecans, and in some cases, kill the nuts.“If you go from about Ashburn south, it’s actually fairly bad with scab on susceptible varieties. If you go north from there, it’s not quite as bad, but we will see some losses state-wide” said Lenny Wells, an Extension pecan horticulturist with the University of Georgia.One of the most vulnerable varieties is the most common — Desirable. According to Wells, a large percentage of commercial orchards are planted in Desirables. However, Desirables are very susceptible to scab, as are orchards that are more likely to hold moisture, such as those in low-lying areas. “We’ve had growers that have sprayed more than they ever have for scab this year. We were seeing growers that sprayed 20 times or more this year just for scab, and that’s about twice as much as normal,” Wells said. “They’re still suffering some losses from scab.”More cases of scab result in a sharp decrease in pecan production.“When this growing season first started, it looked like (the state) had the potential for around 90 million pounds or so. I’d say now that’s probably down to 65 or 70 million pounds,” Wells said. “That’s a big drop-off.”In each of the last two years, the total poundage for pecans exceeded 100 million.Places like Dougherty County, Lee County and Mitchell County, the top three pecan-producing counties in the state, were hit especially hard by the scab disease, added Wells.Poor pecan production isn’t the only disappointing reality facing pecan growers. Prices for small growers could hover around $1 per pound due to the weak domestic market, which generally uses nuts of smaller size than the export market. Larger commercial producers, on the other hand, could get a premium price of $2.75 to $3 for their best nuts. Wells believes those prices could increase later in the pecan season if predictions of low volume hold true.“It’s going to be interesting to see this year because the volume of the crop nationwide is not there like it has been,” Wells said. “I kind of suspect as harvest progresses and we really see how short this crop is, this may be one of those years we see the price increase late in the year.”What do these prices mean for the average consumer?“I don’t think prices for the consumer will be affected so much this year because there is some supply on the shelves from last season, but supply and demand is a large part of pricing for any product. With a short pecan crop, in-store prices may go up at some point in the future,” Wells said.Pecan prices will also hinge on exports to countries like China, where demand for pecans is high.“A lot of the Chinese demand for pecans is based on the Chinese New Year. They like to eat them around that time, just like we like to eat them around Thanksgiving and Christmas. The Chinese New Year date changes from one year to the next,” Wells said. “This year it’s a little earlier, so we’ve got to get those nuts over there earlier this year. We may have a smaller window for getting them there.”The Chinese New Year is Jan. 31, 2014.According to the UGA 2011 Georgia Farm Gate Value Report, pecans were a top-10 commodity in the state, generating $319 million in farm gate value.For more information about Georgia pecans, see the website, pecan.
The U.S. Department of Transportation has awarded $2,424,030 in recovery funding to the Burlington International Airport for taxiway rehabilitation and extension, Sens. Patrick Leahy (D-Vt.) and Bernie Sanders (I-Vt.) and Rep. Peter Welch (D-Vt.) announced. The funding will be used to rehabilitate and repave the intersection of two taxiways and to extend a third taxiway. The projects are part of the airport’s multi-phase South End Development program, which will enhance cargo, aircraft maintenance and general aviation capabilities. Airport officials estimate the program could create as many as 350 new jobs at the airport over the next 10 years.The award is the latest federal grant made possible by the American Recovery and Reinvestment Act of 2009, which was signed into law in February.Leahy, Sanders and Welch said, “This federal grant will help Burlington International Airport improve its ability to serve Vermont businesses and passengers alike. Not only will it create construction jobs in the short term, it will also lead to long-term economic development through the continued improvement of the airport.”Airport director Brian Searles said, “All three members of our congressional delegation have been such great partners in the development of this airport, and this grant will help ensure that we are part of the economic recovery. We are very grateful for their work on this much needed grant”. Source: Vermont Congressional delegation. THURSDAY, August 13, 2009 —
The speed and scope of broadcasting, the improved technique of filming and editing videos for mobilization, recruitment, education and persuasiveness from several public or organizations advertising these conflicts has turned into a real media war. *André Luís Woloszyn, Strategic Intelligence Analyst All with the intent of keeping up with the new utilization trends of internet users, as determined by the rapid growth of social networks, such as blogs, Twitter, and Facebook. Many of these media products are advertised by large communication companies that take advantage of factors such as cost and risks minimization for their employees. Excellent article, itâ€™s simple and direct. It presents a paradox. Media, through time, contributed for freedom and democracy. Today itâ€™s been used to destroy freedom and democracy. By Dialogo April 17, 2013 This strategy started with the so-called insurgents and terrorist groups in Iraq, who, aware of the importance of influencing the public opinion worldwide, started to film and photograph with their mobile phones, suicidal attacks involving coalition forces, especially the explosion of IEDs (improvised explosive devises). They would edit images and texts in Arabic and minutes later broadcast through some of the main international TV networks, as well as spread via the internet. Recently, social networks showed their efficiency when it was posted via Twitter the tactics used by an Israeli command in a confidential operation to approach the SV Estelle Finnish ship, that was breaking through the blockage toward the Gaza Strip. Also broadcasted live was the development of Operation Geronimo, which resulted in the capture of Al Qaeda terrorist leader in Pakistan. Although it is an irreversible trend, the danger lies in the inability to control and the misusage of virtual media, including the fraudulent manipulation, the lack of ethical commitment and, in many cases, the veracity of facts. During this war, the security forces are at a disadvantage, since the material collected by these forces requires prior approval, while the broadcast of images captured by other segments is almost immediate. The regular wars and asymmetric conflicts in the 21st Century, especially in Pakistan, Afghanistan, Iraq, and the Middle East region, have presented a new reality in terms of global media. This truly virtual revolution, as it has been called, is used by both military and terrorist groups and insurgents as a strength multiplying strategy that adds to the firepower. Aside from negatively influencing the morale of the troops and security forces, due to the degree of violence shown in the videos and because of the intimidation of possible collaborators, it turned out to be an excellent recruiting tool.
1SHARESShareShareSharePrintMailGooglePinterestDiggRedditStumbleuponDeliciousBufferTumblr I am sure that I am not the only one that has noticed that it has been a pretty eventful last few months when it comes to enforcement actions. My inbox has been filled with a variety of blog posts and news alerts that recap the most recent dropping of the proverbial enforcement hammer. Most of the time it is one of the “big dogs”, so I don’t really think anything of it and move on to the next topic. But last week I was a little shocked when one of those news alerts had the words “Credit Union” in the subject line. By now I am sure most of you are aware of the recent happenings with Navy Federal Credit Union so I won’t bore you with a recap, but it did make me wonder how this could have happened.Now I understand that Navy Federal has about $77 billion in assets which makes it a more robust institution than most, but that doesn’t mean it can’t happen to you “little guys” too. Just take a look at the recent settlement between the DOJ and Charter Bank of Corpus Christi over UDAPP violations in regard to auto lending pricing. We are talking about a much smaller financial institution with about $277 million in assets that fell into the shadow of the previously mentioned hammer. The DOJ found that this unfair practice went on for five years from 2009 to 2014. That is when the FDIC first noticed the practice and had referred the case to the DOJ. That means five years went by with no one questioning this practice or even noticing the impact it was having. continue reading »
ShareShareSharePrintMailGooglePinterestDiggRedditStumbleuponDeliciousBufferTumblr continue reading » NAFCU President and CEO Dan Berger, in an email Wednesday to members, updated credit unions on the latest tax reform developments, including the recently released House tax extenders and fixes package, H.R. 88, and NAFCU’s ongoing efforts to protect credit union interests.In his update, Berger noted the association’s work to protect credit union interests following the enactment of the Tax Cuts and Jobs Act (TCJA), including meeting with Capitol Hill leaders and the IRS. NAFCU has also opposed efforts to require all credit unions file a Form 990-T and continues to seek relief for credit unions from the new 21 percent excise tax imposed on certain not-for-profits.Also yesterday, NAFCU Vice President of Legislative Affairs Brad Thaler wrote the Joint Committee on Taxation (JCT) urging that a technical fix be provided to “grandfather” those employment contracts entered into on or before Nov. 2, 2017, for tax-exempt employers. The TCJA contained a provision allowing for-profits to grandfather in binding contracts in effect before that date, but did not include the same clause for not-for-profit tax-exempt organizations. The bipartisan JCT is generally responsible for identifying potential tax code fixes.
The sweeping omnibus bill will introduce several fiscal incentives to boost the development of downstream mining industries including mineral smelters, coal-fired power plants and coal gasification facilities. It will allow miners that invest downstream to operate their respective concessions until reserves run dry (Article 47). Otherwise, operational periods will be capped at 40 years maximum.The bill also exempts coal miners that invest downstream from paying royalties and from complying with Indonesia’s domestic market obligation (Article 28A) policy. Prevailing regulations require such miners to pay up to 7 percent of their net profit as royalty and sell 25 percent of their product domestically at US$70 per ton. Most of the price-capped coal goes to Indonesia’s largest power producer, state-owned electricity company PLN.United Overseas Bank (UOB) economist Enrico Tanuwidjaya wrote in a note last year that the government’s downstream plan “will be substantial in the long-term” but only with “consistent legal and policy certainties” and “sustained and immediate development of the processing and downstream industries.”Read also: Ban on unrefined nickel exports positive in long run: EconomistEnvironmental watchdog Mining Advocacy Network’s (Jatam) Merah Johansyah slammed the incentives, arguing that they would prolong environmental destruction.Contrary to Jatam’s argument, Indonesian Nickel Mining Association (APNI) secretary-general Meidy Katrin told the Post on Jan. 30 that “not many miners” had the financial muscle to exploit concessions beyond 40 years.Legal certainty for mining giantsThe government will provide some long-awaited certainty for coal miners and mineral miners, whose contracts are based on the now-defunct 1967 Mining Law. Article 169A of the bill allows such miners to resume operating their respective concessions as special mining permit (IUPK) holders instead of contract of work holders, whereby “IUPKs have to pay higher royalty fees”, Indonesian Mining Institute (IMI) chairman Irwandy Arif told the Post on Feb. 17.Indonesian Coal Mining Association (APBI) executive director Hendra Sinadia previously described the legal certainty issue as “very urgent” because seven coal mining giants’ contracts are slated to expire between 2020 and 2025, the earliest of which expires in November this year. The soon-to-expire contract belongs to Jakarta-based PT Arutmin Indonesia, a subsidiary of the country’s largest coal miner by output, PT Bumi Resources.Nickel mining activities at Sorowako PT Vale Indonesia Tbk. After being transported to trucks, nickel material in the form of land is placed in a temporary shelter, then put into a factory to be processed until it gets a matte nickel of 78 percent, and is exported to Japan. (JP/Ruslan Sangadji)Centralizing mining permitsThe omnibus bill aims to streamline the issuance of mining permits by centralizing the process with the government. At the moment, regional leaders have the power to issue mining permits and create regional mining regulations, many of which contradict national-level regulations.The government will scrap Mining Law articles 48 and 67 if the omnibus bill passes into law. Article 48 allows regional leaders to issue mining permits while Article 67 authorizes regents and mayors to issue cooperative mining permits.Watchdog leaders Robert Endi Jaweng and Maryati Abdullah, who respectively head think tanks Regional Autonomy Watch (KPPOD) and Publish What You Pay (PWYP) Indonesia, described the changes as a “recentralization” scheme that harks back to the country’s authoritarian New Order era.“From an autonomy standpoint, it’s drying up the spirit of regional autonomy. It’s going in the opposite direction,” Robert said, referring to the 2004 Regional Autonomy Law, which guarantees certain powers for regional administrations.Read also: Omnibus bill allows President to scrap bylaws, weakens regional administrations “The issue is not just opening the investment tap,” said Maryati. “Will local residents have a complaint-handling mechanism?”Law lecturer Ahmad Redi, who leads the drafting of the bill’s energy-related provisions, countered the argument, saying that, in the long run, downstream industry development “will increase the products’ values, which will add to state and regional incomes”.Expanding mining territory further offshoreThe omnibus bill will allow mining activities anywhere within Indonesian seas (Article 47A) whereas the existing Mining Law limits offshore activity to 12 kilometers beyond the coast (Article 6).The relaxation was needed to extract offshore tin reserves as “we are almost out of tin reserves onshore, so like it or not, we have to enter the sea,” IMI’s Irwandy told the Post.Indonesia is the world’s second-largest tin producer after China. A quarter of the global supply of tin, used for a range of products, from electronics to eyeglasses, comes from Indonesia, according to the US Geological Survey. Read also: Growth first, environment later. Proposed legal revision relaxes mining restrictions “What’s being discussed in the job creation bill is investment certainty, including how to boost downstream industry development,” Energy and Mineral Resources Ministry coal and mineral director general Bambang Gatot Ariyono told reporters in Jakarta last week.Indonesia wants to earn more money from its mineral wealth by having miners develop downstream industries, such as mineral smelters and coal-fired power plants. The government will enforce bans on exports of all metal ore by 2022 and coal by 2046 while at the same time promoting development by relaxing regulations and offering incentives.Downstream industry development Topics : An upcoming landmark bill on job creation is expected to streamline business and boost investment for miners in Indonesia, albeit at the expense of environmental protection and regional autonomy.The bill, a draft of which was obtained by The Jakarta Post, will introduce four major changes to the 2009 Coal and Mineral Mining Law. These changes aim to centralize the issuance of mining permits, provide legal certainty for mining giants, boost downstream industry development and expand the nation’s mining territory into the open seas.The changes are very similar to those being separately worked on by the House of Representatives.
Facebook Indonesia has a huge appetite for private capital to fund its infrastructure projects, especially in President Joko “Jokowi” Widodo’s administration, which puts infrastructure as his economic policy centerpiece to boost the archipelago nation’s connectivity and economic output.The National Development Planning Agency (Bappenas) has estimated that the country will need infrastructure investment worth US$429.7 billion between 2020 and 2024 to achieve the government’s National Medium-Term Development Plan (RPJMN) targets.Infrastructure Asia (IA), a Singapore-based infrastructure financing advisory group, understands the opportunities and plights of Indonesia’s infrastructure ambition, as the institution has been working alongside the government to attract private investors.The Jakarta Post’s Farida Susanty and Mardika Parama talked … Topics : executive-column Infrastructure-Asia infrastructure-development Jokowi Seth-Tan Singapore investment Google Log in with your social account Linkedin LOG INDon’t have an account? Register here Forgot Password ?
I hope you can tune to WRBI at 5:45 tonight for the final Coaches Corner of this season! Please note the early starting time which is necessary so that the Reds’ broadcast can be heard in its entirety. I have really enjoyed this season. I believe we had more guests this year than we have ever had before.Coaches Corner began in the early 80’s. I am not sure exactly how many years this makes, but I know it is over 30. We will start again in mid-August with the fall sports season.Thank you so much for your continued support! Hope to have all of you listening again in August.