Skip to content

Scale Computing Customer Edge Data Center Project Named a Finalist in 2021 DCD>Awards

INDIANAPOLIS – December 7, 2021 – Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, today announced that Data Center Dynamics has named the company’s work with Ahold Delhaize NV and Econocom Products & Solutions as a finalist in the 2021 DCD>Awards, in the Edge Data Center Project of the Year category.

According to DCD, the edge is now moving from the era of promise to the era of delivery. Driven by higher standards of connectivity and increasing sophistication of systems and hardware, the Edge Data Center Project of the Year award category seeks to feature how edge is evolving and diversifying while redefining the opportunities that technology can represent.

Ahold Delhaize, a world-leading food retailer with 6,700 stores worldwide, needed a complete infrastructure refresh to replace aging hardware. They wanted a simple, cost effective edge computing solution with easy deployment. At phase one, Delhaize implemented Scale Computing HC3 Edge platform on Lenovo ThinkSystem SR250 and Scale Computing HE150 servers in their 800 stores in Belgium and Luxembourg. By doing so, Delhaize reduced management time by 75% and improved recovery time by 99.9%. Scale Computing HC3 Edge provides a comprehensive system that automates the overall IT management, saving organizations time, money, and resources. Delhaize experienced no downtime in any store where HC3 Edge is implemented.

Alongside simplified management, Scale Computing’s HC3 also offers a comprehensive range of recovery and Data Protection features which have enabled Delhaize to improve disaster recovery. With snapshots, replication and regular back up testing, the HC3 Edge platform also offers business continuity.

Technology is everywhere, and it’s increasingly important that edge computing be able to support applications anytime, anywhere

“Technology is everywhere, and it’s increasingly important that edge computing be able to support applications anytime, anywhere,” said Jeff Ready, CEO and co-founder of Scale Computing. “Edge computing plays a critical role in the retail industry’s IT innovation and digital transformation strategies. Made for the IT infrastructure demands of retail stores, HC3 Edge is a powerful, all-in-one software platform designed for running applications at the edge, and we’re thrilled that our work with Delhaize was named a finalist in the DCD Awards.”

This announcement comes on the heels of other recent industry recognition, including:

  • Scale Computing’s HC3 Video Surveillance named a winner for the 2021 CRN Tech Innovator Awards in the Edge Computing category.

  • Scale Computing named on CRN’s 2021 Edge Computing 100 list.

  • Winner in both the Edge Computing category and the Converged/ HyperConverged Infrastructure category, of the 2021 CRN Annual Report Card (ARC) Awards. This is the third consecutive year Scale Computing has been recognized as a CRN ARC Award winner.

  • Scale Computing HC3 received two TrustRadius 2021 Top Rated Awards, in Hyperconverged Infrastructure and Server Virtualization.

  • Scale Computing received a 5-Star rating in CRN’s 2021 Partner Program Guide.

  • Scale Computing’s HE150 was named to SearchStorage’s 2020 Storage Products of the Year.

An independent panel of judges reviewed hundreds of entries submitted from 35 different countries across 6 continents. Winners will be announced on December 8 at the 15th annual awards ceremony in London and broadcast live worldwide.

CyberLink’s facial recognition engine FaceMe® to power LILIN’s connected devices, providing businesses with contactless access control management and visitor analytics

TAIPEI, TAIWAN – July 28 2020 – CyberLink Corp. (5203.TW), a pioneer in AI and facial recognition technologies, today announced it has formed a partnership with surveillance solution provider LILIN, leveraging new facial recognition technologies to create comprehensive smart security and retail solutions. CyberLink will license its FaceMe® facial recognition engine to LILIN, powering its NAV Facial Recognition Recorder, creating an all-in-one smart security, data analysis and warning solution.

With the combined technologies, LILIN’s connected video devices can provide businesses with a series of contactless solutions, such as granting verified personnel access to restricted areas within offices, factories or residential buildings through an opt-in photo identification system. The new offering can also provide retailers and hospitality operators with anonymized customer demographics to better understand their customer experience, such as identifying trending emotions patrons may feel when engaged in specific activities or visiting certain areas of a venue.

As the coronavirus pandemic continues to develop across the globe, CyberLink’s and LILIN’s joint facial recognition system uniquely provides businesses seeking contactless solutions the underlying technology to reduce the need for people to touch highly shared surfaces by replacing key cards or PIN passwords with biometric data.

“If there was ever a field worthy of continued research and innovation, it’s security,” said Dr. Jau Huang, CEO of CyberLink. “Without a doubt, LILIN is a global leader and manufacturer of IoT devices, and CyberLink is a worldwide pioneer developing facial recognition applications for connected devices. Together, we are setting a new standard for what makes a place secure by bringing to market new technologies that make our customers safer, and our businesses smarter.”

“LILIN has many years of smart security experience, providing insight into the market’s needs for creating a comprehensive intelligent security solution. LILIN is pleased to partner with CyberLink and integrates FaceMe® into our facial recognition system to strengthen smart retail, smart healthcare, smart factory, and smart business applications. Through continued efforts, I believe that LILIN will provide the most advanced total security solution for global customers.” said Mr. C.C. Hsu, LILIN’s President.

CyberLink and LILIN will host a webinar titled “Facial Recognition x Smart Security

Empowering Smart AIoT Applications”” on August 13, 2020 from 14:00-15:00 (GMT+8/Taipei time), further describing the many use cases enabled through the new product offering. For detailed event information and a registration link, please visit: https://is.gd/SfXQ7l

FaceMe’s® edge-based architecture empowers powerful, efficient processing, and higher levels of security compared to Cloud-based solutions. It supports more than 10 operating systems, including Windows, Android, iOS, and various Linux distributions such as Ubuntu x86, Ubuntu ARM, RedHat, CentOS, Yocto, Debian and JetPack. FaceMe’s® high accuracy, flexibility and security makes it the leading facial recognition engine available on the market today, and it is one of the world’s most accurate engines as deemed by the global standard NIST Facial Recognition Vendor Test.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

You are a sinner (of data management)!

Let’s get to the point about data management: Businesses need data, but accumulating too much can be detrimental. Data overcrowding can corrupt IT professionals, turning them into greedy hoarders. Being indigestible with excessive repeated, outdated or banal information, the so-called ROT data, is bad. Companies of the world! The Devil tempts you with Big Data! Something that, if too much, could be harmful! We tell you all about it in this article.

The five mistakes we make in data management

The Liturgical Department of Pandora FMS, because yes, we have a Liturgical Department, right next to the Communication Department, has counted these past weeks the most despicable and sinful faults within data management. We counted up to five sins. Relax, they are not normally committed by a single offender, they are usually mini-points accumulated, over time, by several members of a team. However, we are going to list these vices so that you can count the ones you carry on your own. The scale is this:

  • One fault committed: Sinner.
  • Two faults committed: Great sinner.
  • Three faults committed: Excessive sinner.
  • Four: On the doorway to hell.
  • Five: You will burn in hell as the Great Grimoire points its tridents at you. 

First offense:

You and your company have an ungovernable desire for data. You end up collecting an immensity of them in the hope of achieving the greatest possible advance. However, unfortunately, finding something worthwhile among such a wealth of information is like finding the broom in a student flat: a very difficult task.

Second offense:

Do you know when you have had the lunch of your life in the trendiest burger joint and despite being full, you order the dessert menu to see what cheese cake they have? Well, data excess, and the consumption of all the data you may swallow without a planned purpose, is comparable.  That’s right, without a narrow archiving process, a company’s eager urge to fagotize data ends up in a bundle of unnecessary, outdated, and useless data.

Third offense:

Greed overcomes you! And you start hoarding and hoarding, carried away by greed. In the end, this leads to spending money on more hardware, the most cutting-edge on the market, to process and store all that mass of data you accumulate. You do that instead of finding a reliable process to classify, archive, and remove junk data.

Fourth offense:

Due to the massive amount of data that you have, you are lazily and slowly carrying out your queries and your processes. Indeed, the more data you accumulate, you and your company, the more time it will take to process it and make, for example, backups.

Fifth offense:

A company can feel more secure and stable the more data it has, however, the truth is different, the more data it has, the higher the concern. Having the barrel of data completely full does not mean anything if in fact those data are not used correctly.

Recovery Point Objective (RPO) and Recovery Time Objective (RTO)

How many faults/sins have you accumulated from this list? Have you raised your hand many times yelling “Yes, I am guilty”? Well, before you burn in hell, I want to tell you that there is a plan to escape its cauldrons: find and set a recovery point objective (RPO) and a recovery time objective (RTO). Yes, sir, that’s the first step! The RPO defines a tolerable amount of data loss before a company cannot recover. And the RTO, on the other hand, marks the time that data professionals need to recover the data without getting the business in an irreparable state. To give you an idea, one of the ways to expand the RPO is to backup data logs. However, large amounts of data can make backup times too long, putting our company in a bind again. That is why there is no need to accumulate so much useless data.

Do not mistake a recovery plan with a backup plan. You should first create a recovery plan and then prepare your backup plan. The backup plan will nuance your RTO and RPO goals, while the recovery plan will address disaster recovery and high availability objectives.

Conclusions

Today in this blog we learned that data excess can be an indication of a failed business plan and we have exposed the five mistakes that usually cause the increase of this unnecessary data. From everything we have concluded that the best thing is to have a purpose to reach with that data and to have a manageable amount of it, thus allowing professionals to operate in a simpler way.

Money is not the answer, paying for new hardware always seems like the solution but sometimes it is just a sign that your company is not competent enough. Knowing about these problems and finding a solution can save time and money.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

Simplifying Cyber Security for the Mining Industry

 

The COVID-19 pandemic has been detrimental to the world economy while flattening many industries. The mining industry was fortunate to be one of the very few industries to deliver exceptional growth throughout this period. Yet this growth has marked the mining industry out as a lucrative target for cybercriminals.

Continue reading