Skip to content

An unknown problem in the data center industry

The current global pandemic of Covid-19 has brought us a few gifts: global desolation, earaches from the rigid rubber bands of the FFP2 masks, applause for Health at eight in the afternoon on the balconies, fear of infected ones and staff shortage in the data center industry and shortage of IT professionals. In this article we will delve into this last topic.

*We will already devote a double-page report to the saw rubbers of the FFP2

Lack of staff in the data center industry

It is like that how our beloved pandemic has turned the world upside down, at so many levels that even the data center sector has noticed it. Data centers have received an unexpected amount of work due to the reinterpretation of the labor system and telecommuting. In fact, the size of the global data center industry has grown dramatically. This is a direct consequence of higher exposure and need for the Internet, which has come hand in hand with the confinement imposed by governments around the world to fight against infections. That way, it is estimated that the size of the world data center market will reach in the near future (2021-2026), nothing more and nothing less, than 251,000 million dollars.

Source: Uptime Institute Intelligence

And what is the growth of the global data center market leading to? Well, to a proportionally direct and parallel need of professionals in the sector. Estimates from the Uptime Institute, the long-standing champion of digital infrastructure performance, suggest that the number of staff required to manage data centers across the globe will rise from about two million today to nearly 2.3 million in three years.

This turns into countless new technical jobs for the data center industry. Of all types and sizes. With different requirements. From design to operation. And around the world.

You still don’t want to go send resumes?

Why the shortage of IT professionals and other personnel in the data center sector?

Well, just as remote regions are fighting for the repopulation of their villages, this sector is already dealing with the lack of personnel. It is not an easy subject. According to the Uptime Institute, it is very difficult to find suitable candidates for vacant positions at the moment, so if you want to look for a job in your domain, you must be prepared. Although, as it is often the case, in most positions, work experience, internships or work-study training may make up for a certain lack of skill and experience.

With much of the tech industry currently struggling to find qualified staff, data centers are finding it a bit more difficult to locate and hire professionals in high-demand roles. Like power systems technicians and analysts, facilities control specialists, or robotics technologists, or as I call them “Robotechnologists.”

If you’re serious about it and want to be one of the data centers, success in your quest requires a combination of special skills. Yes, exactly, like when you want to be a ninja or a neo noir detective. First, extensive infrastructure knowledge is required. If you have boards with mechanical or electrical equipment, the better. Programming, platform management, specific technological tools… Basic technological knowledge is also very important. In addition, as in the ninja world or in neo-noir crimes, data centers need specialists with practical determination and ample capacity to solve problems, critical thinking, a drive for business objectives, and, not least to know how to behave, both in teamwork and customer service. For all this string of skills and qualities it is making it difficult for them, in the data center industry, to find personnel. But, well, what can we do? There have also been few Fujibayashi Nagato (ninja) and Sam Spade (detective).

As a result, many data centers today are understaffed. They are overloaded, with more job vacancies than people ready to apply for them. And this without taking into account the high demand, outside the data center sector, for professionals with knowledge of computer science and software. The reality is like this, everyone needs a tech expert among their ranks, and sometimes you have to fight for them.

Source: Uptime Institute Intelligence

Debido al cataclismo mundial del Covid-19 y la recesión que ha traído, el estilo de trabajo ha cambiado, trayéndonos de súbito el teletrabajo y las operaciones remotas. Esto ha supuesto que los servicios de los centros de datos incrementen su rendimiento para que las empresas de todo el planeta pudieran operar. Los centros de datos están en un punto crítico. Tienen más trabajo pero menos personal especializado para realizarlo. Además, en estos tiempos, resulta bastante difícil encontrar a una plantilla a la altura. Quizá con la adopción de La Nube y nuevos avances en la tecnología digital se pueda cimentar un sistema,  post-Covid-19, que lleve a las empresas hacia un futuro próspero.

Some conclusions

Due to the global cataclysm of Covid-19 and the recession it has brought, work style has changed, suddenly bringing us telecommuting and remote operations. This has meant that data center services increase their performance so that companies around the world could operate. Data centers are at a critical point. They have more work but less specialized personnel to do it. In addition, these days, it is quite difficult to find a team to match. Perhaps with the adoption of the Cloud and new advances in digital technology, a system, post-Covid-19, can be established that will lead companies towards a prosperous future.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

HIPAA: Five Tips for Complying with The Certificate

What is HIPAA? Currently, this is one of the most frequently asked questions by many professionals working in the healthcare industry, especially in times of the Covid-19 pandemic.

But why is it so important and what are its benefits for healthcare companies? First, it is critical to comply with HIPAA to ensure that more secure procedures are in place regarding the handling of some critical information.

However, it must be emphasized that this law is North American. Based on this, there is no document or certificate in Brazil capable of attesting that your company is working following HIPAA.

Thus, working following HIPAA means working in accordance with the standards established by foreign law.

But following these guidelines is a movement that, fortunately, has been gaining many followers in Brazil.

It must be taken into account that HIPAA is extremely important, as it aims to ensure information security in all companies operating in the healthcare industry.

With that in mind, we have prepared an article with five fundamental tips to help your company work in compliance with this law. Check it out!

1. Know HIPAA in Detail

Why is it important to know all the details of HIPAA? To make sure all its points are met.

As mentioned, the Health Insurance Portability and Accountability Act (HIPAA) is a law of foreign origin and applicable in the United States.

So, it can be described as a group of standards aimed at companies in the healthcare industry.

The aim is to ensure data protection. Although HIPAA is legally applicable to the North American territory, this law has inspired many entities around the globe that are part of the healthcare universe.

These companies use various resources to adapt to the rules and guidelines set forth by this law.

The intention is to practice the procedures that guarantee enhanced security in relation to information that circulates in the healthcare sector.

As a result, customers are more confident in doing business with companies that adapt to this foreign law.

Therefore, you can increase the credibility of your brand in a market that is increasingly competitive.

Requirements to Be HIPAA Compliant

Certain requirements must be followed by all companies that aim to comply with HIPAA.

After all, they indicate the standards necessary to protect the electronic medical records of doctors and patients.

Based on this, one could say this law was created to cover several objectives, such as:

  • Offer improvements to the healthcare industry;
  • Ensure a high level of security of patient information and privacy;
  • Determine that healthcare companies provide medical records to patients whenever requested;

2. Assess Your Company’s Infrastructure According to HIPAA

One of the key issues for companies looking to comply with HIPAA standards is a thorough analysis of their IT structure.

For that, they must have a broad vision of the possible vulnerabilities and risks that may appear during the activities.

In this way, it will be possible to identify sensitive loopholes to fully comply with this law.

Another interesting aspect is to assess the information security practices present in the organization and understand if the level of security provided by them is within the ideal.

Thus, analyze whether these practices are capable of guaranteeing the confidentiality of health information, as well as the security of data considered more sensitive.

An effective tip is to observe the procedures being performed to obtain the resources capable of correcting current threats, thus conforming to HIPAA guidelines.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

Absolutely no one is safe from security attacks

Software developers and manufacturers around the world are under attack by cybercriminals. It is not like we are in a time of the year in which they spread more and they barricade themselves in front of the offices, with their evil laptops seeking to blow everything up, no. They are actually always there, trying to violate information security, and in this article we are going to give you a little advice on the subject.

No one is safe from all threats

Whether it is a middling attack or sophisticated and destructive (as it happened to our competitors Solarwinds and Kaseya) evil never rests. The whole industry faces an increasingly infuriating threat landscape. Almost every day we wake up with some news of an unforeseen cyber attack that brings with it the consequent wave of urgent and necessary updates so that our system is safe… Nobody is spared, real giants have fallen over. The complexity of the current software ecosystem means that a vulnerability in a small library affects hundreds of applications. It happened in the past (openssh, openssl, zlib, glibc…) and it will continue to happen.

As we pointed out, these attacks can be very sophisticated or they can be the result of a combination of third-party weaknesses that make the client vulnerable, not because of the software, but because of some of the components in its environment. That’s why IT professionals should demand that their software vendors take security seriously, both from an engineering standpoint and from vulnerability management.

We repeat: No one is safe from all threats. The software vendor that took others out of business yesterday may very likely be tomorrow’s new victim. Yes, the other day it was Kaseya, tomorrow it could be us. No matter what we do, there is no 100% security, no one can guarantee it. The question is not to prevent something bad from happening, the question is how to manage that situation and get out of it.

Pandora FMS and ISM ISO 27001

Any software vendor can be attacked and each vendor must take the necessary additional measures to protect itself and its users. Pandora FMS encourages our current and future clients to ask their suppliers for more consideration in this matter. We include ourselves.

Pandora FMS has always taken security very seriously, so much so that for years we have had a public policy of “Vulnerability disclosure policy” and Artica PFMS as a company, is certified with the ISO 27001. We periodically employ code audit tools and maintain some modified versions of common libraries locally.

In 2021, in face of the security demand, we decided to go one step further, and make ourselves CNA of CVE, to give a much more direct response to software vulnerabilities reported by independent auditors.

Decalogue of PFMS for better information security

When a client asks us whether Pandora FMS is safe, sometimes we remind them of all this information, but it is not enough. Therefore, today we want to go further and prepare a decalogue of revealing questions on the subject. Because some software developers take security a little more seriously than others. Relax, these questions and their corresponding answers are valid for both Microsoft and Frank’s Software or whatever thing you may have. Since security does not distinguish between big, small, shy or marketing experts.

Is there a specific space for security within your software life cycle?

At Pandora FMS, we have an AGILE philosophy with sprints (releases) every four weeks, and we have a specific category for security tickets. These have a different priority, a different validation cycle (QA) and of course, a totally different management, since they involve external actors in some cases (through CVE).

Is your CICD and code versioning system located in a safe environment and do you have specific security measures to ensure it?

We use Gitlab internally, on a server in our physical offices in Madrid. People with name and surname, and unique username and password have access to it. No matter what country they are in, their access through VPN is individually controlled and this server cannot be accessed any other way. Our office is protected by a biometric access system and the server room with a key that only two people have.

Does the developer have an ISMS? (Security Incident Management System)

Artica PFMS, the company behind Pandora FMS, is certified with ISO 27001 almost from its beginnings. Our first certification was in 2009. ISO 27001 certifies that there is an ISMS as such in the organization.

Does the developer have a contingency plan?

We not only have one, we have had to use it several times. With COVID, we went from 40 people working in an office in Gran Via (Madrid) to each and everyone of them working at home. We had power outages (for weeks), server fires and many other incidents that put us to the test.

Does the developer company have a security incident communication plan that includes its customers?

It has not happened many times, but we have had to release an urgent security patch, and we have notified our clients in a timely manner.

Is there an atomic and nominal traceability on code changes?

The good thing about code repositories, like GIT, is that these kinds of issues have been solved for a long time. It is impossible to develop software professionally today if tools like GIT are not fully integrated into the organization, and not only into the development team, but also into the QA, support, engineering… teams.

Do you have a reliable update distribution system with digital certifications?

Our update system (Update Manager) distributes packages with digital certificates. It is a private system, duly secured and with its own technology. 

Do you have an open public vulnerability disclosure policy?

In our case, it is published on our website.

Do you have an Open Source policy that allows the customer to see and audit the application code if necessary?

Our code is open, anyone can review it at https://github.com/pandorafms/pandorafms. In addition, some of our customers ask us to audit the source code of the Enterprise version and we are delighted to be able to do so.

Do the components/third-party purchases meet the same standards as the rest of the parts of the application?

Yes they do, and when they do not comply, we maintain them ourselves.

BONUS TRACK:

Does the company have any ISO Quality certification?

ISO 27001 

Does the company have any specific safety certification?

National Security Scheme, basic level.

Conclusion

Pandora FMS is ready for EVERYTHING! Just kidding, as we have said, everyone in this sector is vulnerable, and of course the questions in this decalogue are elaborated with certain cunning, after all, we had solid and truthful answers prepared in advance for them, however, the real question is: Do all software vendors have answers to those questions?

Would you like to find out more about what Pandora FMS can offer you? Find out clicking here . If you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Installation in Cloud or On-Premise, you choose !! 

Last but not least, remember that if you have a reduced number of devices to monitor, you may use Pandora FMS OpenSource version. Find more information here .

Do not hesitate to send your questions. The great team behind Pandora FMS will be happy to assist you! And if you want to keep up with all our news and you like IT, release and, of course, monitoring, we are waiting for you in our blog and in our different social networks, from Linkedin to Twitter through the unforgettable Facebook . We even have a YouTube channel , and with the best storytellers. Ah well, we also have a new Instagram channel ! Follow our account, we still have a long way to go to match that of Billie Eilish.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

How Does The LGPD Impact Companies?

Due to the growing technological development in the market, we can clearly see how much how consumers tend to buy products and services has changed. Through more practical technologies, such as cellphones, laptops, and tablets, for example, they are just a click away to connect with companies over the internet.

Realizing this new consumer behavior, brands uncovered the need to ensure a digital presence in order to conquer new audiences. As a result of this migration, there was a need to have digital marketing strategies to capture customers, and the collection of user information is among the most used strategies to generate conversions.

However, the LGPD was sanctioned in 2018 to make sure that this data collected by companies — whether an email, CPF, or telephone number — was stored and used securely and transparently.

Do you want to learn more about it? So, check out our post until the end and answer all your questions about the LGPD and how it can impact your business.

After All, What Is The LGPD?

Law 13.709/2018, popularly known as LGPD — an acronym for General Data Protection Law — ended up entering into force in 2018. Therefore, it was created so that the personal data users make available to companies become even more secure, that is, efficiently collected and stored.

In a practical way, it is known that this law offers users power over their data. In other words, it can define how companies can dispose of their sensitive data, and how it should be treated. Furthermore, these users can also simply deny sharing their information as they are not obligated to do so.

There is also a European law, popularly known as GDPR. It was from there that the LGPD based its main premises regarding the security of data and shared user information.

Following the LGPD’s practical line, users must be aware of how their personal information will be used and handled by the companies that collected it. Also, users can choose to remove their data from the database of such companies.

Do you want to stay on top of this subject? Download our free e-book right now and get access to exclusive information.

How Does The LGPD Impact Companies?

Looking at the business side, these new processes guided by the Law will insist that businesses be extremely careful and meticulous about the terms of use of the respective data. Therefore, brands need to explain very well all forms of use in relation to the information provided by users. Not to mention that these businesses must also promote actions so that the user can manage their information.

For these activities to be carried out efficiently, and above all, following the guidelines imposed by the LGPD, each company must pay attention to the main rules it guides regarding the collected data.

What has happened a lot in the business world is that brands have hired professionals to deal specifically with these processes, making the internal sectors that need personal data of customers and leads can work even more securely, and within the law.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

訊連 FaceMe® eKYC解決方案獲幣託採用 打造全台首創,具備數位實名驗證之加密貨幣交易所

【2021年11月30日,台北訊】— AI人工智慧領導廠商訊連科技(5203.TW)宣布,旗下FaceMe® Fintech  eKYC解決方案獲幣託採用, 整合至幣託之加密貨幣交易服務中,快速進行數位實名身分驗證( eKYC, Electronic Know Your Customer)。透過訊連FaceMe®所提供的身分證真偽辨識、人臉辨識及比對,用戶可於使用幣託服務時,透過刷臉開戶及交易認證,可大幅提升用戶開戶及驗證速度,打造更加的使用者體驗。透過整合FaceMe®技術,幣託成為全台第一家提供eKYC的合法加密貨幣交易所,為台灣金融科技(Fintech)應用樹立全新里程碑。

訊連 FaceMe® eKYC解決方案獲幣託採用 打造全台首創,具備數位實名驗證之加密貨幣交易所

幣託科技成立於2014年,是一家提供加密貨幣交易所平台的台灣企業,為全球行業信心評級前50大之加密貨幣交易平台,用戶可於幣託平台購買、儲存與交易加密貨幣。透過整合訊連FaceMe® Fintech 之eKYC解決方案,幣託開放用戶透過刷臉完成註冊,僅需於開戶驗證流程中,使用手機鏡頭掃描身分證之正、反面進行真偽辨識,並進行用戶之活體辨識及人臉比對,即可快速完成開戶流程,無需等待人工審核。而於後續交易時,也可透過刷臉方式進行交易認證,大幅提升開戶、交易之效率。

「以往消費者想要在加密貨幣交易所註冊帳號時,必須準備身分證、上傳相關文件,還要拍攝手持證件照片,這一連串傳統 KYC 流程加上審核,平均耗時 10 個工作天。對消費者而言,傳統註冊流程十分不便,繁瑣的流程甚至降低註冊意願。」幣託集團創辦人暨執行長鄭光泰表示:「透過整合訊連的FaceMe®技術,幣託導入的eKYC認證流程不僅優化使用者介面及用戶體驗,同時也落實幣託對於普惠金融(Financial Inclusion)的願景。」

「eKYC技術為近年來金融科技之重要應用,涵蓋生物辨識、活體辨識、身分證件比對等主要功能。透過eKYC技術的導入,可大幅提升金融科技之易用及便捷性。」訊連科技執行長黃肇雄表示:「訊連科技FaceMe®為全球頂尖、台灣開發的人臉辨識技術,提供安全、可靠、精準的生物辨識eKYC技術,協助金融業者快速打造刷臉服務。很榮幸能與幣託合作,打造出全台首個具備數位實名驗證之加密貨幣交易服務。」

FaceMe® Fintech解決方案提供的eKYC SDK包含了身分證真偽辨識、活體辨識、人臉比對等功能。身分證真偽辨識功能係透過手機、平板拍攝身分證正、反面,透過AI辨識浮雕及其他特徵,確認身分證為真。而活體辨識功能則可透過2D鏡頭或iPhone之3D結構光鏡頭偵測鏡頭前是否為真人,或是使用相片、影片等進行身分冒用。而透過FaceMe® 之人臉辨識技術,可比對身分證上的照片,與鏡頭實拍之真人是否相符。FaceMe® Fintech完整的eKYC解決方案提供了iOS及Android之SDK,可快速刷臉功能整合至線上開戶、身分驗證等多種金融科技服務。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

關於幣託科技
幣託為台灣進入區塊鏈加密貨幣技術領導業者,2014年成立幣託集團致力於區塊鏈普惠金融,同年,BitoEX成立,提供比特幣買賣服務,並於7月拓展通路至超商,提供超商購買比特幣,為全球首創,超商買幣的便利性更讓華爾街媒體蜂擁而至台灣採訪幣託。2018年 BitoPro 法幣虛擬貨幣交易所上線,除打造便捷交易環境外,為產業奠定典範,讓政府能安心放行,因此在實名認證上打下基礎,為全台第一家獲得會計師事務所資誠會計(PwC)簽核實名制認證。同時,幣託集團也陸續推出加密貨幣債權、平台幣以及獨家禮物卡等多元衍生產品。

如欲了解更多資訊,請造訪:https://company.bitoex.com/

×

Hello!

Click one of our contacts below to chat on WhatsApp

×