IT Brief New Zealand logo
Technology news for New Zealand's largest enterprises
Story image

Automation: Invisibility at your service

By Contributor
Mon 14 Jan 2019
FYI, this story is more than a year old

Article by Nutanix vice president ASEAN, India and Australia and New Zealand, Neville Vincent.

There’s a certain comfort that comes with things being invisible.

For the most part, people are happy to not know how something works, just that it works. It's doubful that the everyday consumer understands the intricacies of how a smartphone operates, but most people are happy to rely on it and use the many on-demand services it brings.

With invisibility comes simplicity. Think about the way we pay for things has changed. People have gone from paying in cash to card and pin, to tap and go and now, increasingly, mobile payments.

Applications themselves add another layer of invisibility and simplicity. With ride-sharing applications such as Uber and Taxify, the transaction is more or less removed from the equation. You don’t pay the driver and they don’t accept money from you. It’s all done through an app and is out of sight, out of mind.

This is automation, and it has become an important part of our lives and desire to keep it simple.

Invisible technology in business

The craving for technological invisibility extends to businesses. There is a huge variety of Internet of Things (IoT) and smart city applications, data analytics, artificial intelligence (AI) services and more at our disposal. Like in our personal lives, most of us don’t need to know how it works, just that it will, and we’ll become reliant on it.

In truth, there are complex systems at play ensuring these applications and digital services work, and those of us behind the IT screens know how important it is and difficult it can be to manage and maintain these systems.

The trick in keeping these complex systems out of the typical user’s mind is spoiled as soon as an outage or downtime hits. People might not understand how Uber or their companies’ business intelligence applications work, but you can be assured they and you will know all about it if there’s an outage.

The consumerisation of IT has created certain expectations around technology being always on, and now more than ever it’s vital that CIOs and IT departments are doing everything to ensure the trick isn’t spoiled and all business benefits are felt from digital services.

Enter the cloud

Years ago, when these increased demands first fell at the feet of IT departments, cloud computing emerged as a solution to make IT infrastructure virtually invisible and serve as a platform to launch digital services with pace and ease.

However, despite their high-level security and resilience, even huge public data centers have fallen victim to ever-growing and increasingly sophisticated cybercriminals and suffered major outages, often resulting in thousands of services going offline in a heartbeat. For many hackers, such a large and seemingly impenetrable target might be considered a challenge.

This is making many businesses that have invested in the public cloud start to retreat, at least from using it as an all-in strategy. Instead, they’re finding the simplicity they crave all over again back in their own data centers.

While it might seem counterproductive, moving back to on-premises data centers, which were the root cause of the pain points IT departments took to the public cloud to avoid, the truth is that modern data centers aren’t what they used to be. They now operate in much the same way as public cloud, but with more control.

Want proof? Many of the same people who essentially invented public cloud are the ones who created this new modern data center, often referred to as private or enterprise cloud. They saw a greater opportunity for modern enterprises with this approach.

The hybrid model

Rather than committing to one cloud or another, businesses are starting to favour a hybrid approach. Nutanix conducted research recently which showed 91 per cent of IT leaders crave hybrid cloud. This is a concept that has long existed, but can only really now bear fruit with new tools that measure which applications work best in different cloud environments and move them back and forth with ease.

While overall, private cloud may be the preferred option as it keeps the invisibility within control and not on a renting model, public cloud is still the better option for flexible or ‘elastic’ workloads, which typically have a less predictable impact on IT resources. In that case, a test drive in the public cloud, with a view to moving it over to private in the long term when that impact is better understood, is likely the best approach.

This hybrid model will become the norm for most businesses in Australia and New Zealand, and it promises to unlock the long-awaited benefits of technology and digital services, all the while keeping the simplicity that allows most to go on, blissfully unaware of the complex systems keeping it all afloat.

Related stories
Top stories
Story image
Managed service provider
Barracuda MSP Day 2022 highlights MSP opportunities
Barracuda Networks has released a report showing global services-related MSP revenue is set to increase by more than a third in 2022 compared to 2021.
Story image
Kubernetes
Sysdig unveils new Kubernetes troubleshooting and cloud innovations
Sysdig has introduced two new innovations that look to help bolster cloud services and simplify Kubernetes troubleshooting.
Story image
Sustainability
Aligned Data Centers increases sustainability-linked loan
Aligned Data Centers has increased its sustainability-linked loan from $375 million to $1.75 billion to speed up the next phase of its strategic growth.
Story image
GapMaps
GapMaps Live to improve brand decisions on physical locations
GapMaps has released its latest service GapMaps Live, giving more insights and features to help brands make better decisions about physical locations.
Story image
Vodafone
Vodafone NZ buys remaining stake in retail joint venture
Vodafone New Zealand has purchased the remaining 50% stake in the specialist joint venture (JV) with private equity company Millennium Corp.
Story image
Microsoft
New Relic enters multi-year partnership with Microsoft Azure
New Relic has announced a strategic partnership with Microsoft to help enterprises accelerate cloud migration and multi-cloud initiatives. 
Story image
New Relic
New Relic launches vulnerability management platform
New Relic has introduced New Relic Vulnerability Management to help organisations find and address security risks faster and with greater precision.
Story image
Training
Trojan cyber attacks hitting SMBs harder than ever - Kaspersky
In 2022 the number of Trojan-PSW detections increased by almost a quarter compared to the same period in 2021 to reach 4,003,323.
Story image
Amazon Web Services / AWS
RedShield leverages AWS to scale cybersecurity services
"Working with AWS gives RedShield the ability to mitigate significant application layer DDoS attacks, helping leaders adopt best practices and security architectures."
Story image
Cyber attacks
Devastating cyber attacks expected to hit energy sector
Energy executives anticipate life, property, and environment-compromising cyber attacks on the sector within the next two years.
Story image
Multi Cloud
Red Hat updates dev tools, empowers use of hybrid and multicloud
Red Hat has unveiled updates across its portfolio of developer tools, designed to help organisations build and deliver applications faster.
Story image
Ransomware
APAC organisations fail to disclose ransomware breaches
85% of organisations in APAC were breached by ransomware at least once in the past five years, but only 28% publicly disclosed the incident.
Story image
Cybersecurity
Comcast to use ThreatQuotient for cybersecurity operations
Comcast, the parent company of NBC Universal and SKY Group, has chosen ThreatQ Platform and ThreatQ Investigations to meet their cybersecurity needs.
Story image
Cybersecurity
A10 Networks finds over 15 million DDoS weapons in 2021
A10 Networks notes that in the 2H 2021 reporting period, its security research team tracked more than 15.4 million Distributed Denial-of-Service (DDoS) weapons.
Story image
Innovation
Fastly acquires Glitch, enables faster developer innovation
"This acquisition brings together two of the worlds best ecosystems for application development into a single, seamless developer experience."
Story image
SaaS
Maintaining secure systems with expectations of flexible work
Most office workers feel they've proved they can work successfully from home, and as much as employers try, things aren't going back to the way they were anytime soon.
Story image
Vectra AI
Understanding the weight on security leader’s shoulders, and how to shift it
Millions of dollars of government funding and internal budgets are being funnelled into cybersecurity to build resilience against sophisticated threats, indicating how serious this issue has become.
Story image
Infrastructure
Nutanix study reveals financial services sector lagging with multicloud adoption
Nutanix has released new research that reveals the financial services sector is lagging behind when it comes to multicloud adoption.
Story image
Alteryx
Alteryx releases updates, empowers data insights for enterprise
Alteryx has released new advancements designed to aid enterprises with cloud analytics, democratise insights and ensure data governance.
Story image
Digital Marketing
Getty Images delves into the world of NFTs with Candy Digital
Getty Images and Candy Digital, the next-generation digital collectible company, have announced a new multi-year partnership agreement.
Story image
Apricorn
Data backup plans inadequate, data still at risk - study
The Apricorn 2022 Global IT Security Survey revealed that while the majority organisations have data backup plans in place, data for many are at risk.
Story image
Women in Technology
Huawei webinar emphasises the importance of women in tech
Industry findings by Coursera discussed as part of a webinar jointly organised by Huawei and Reuters Events found 6% more women enrolled in tech courses this year than in 2021.
Story image
Cybersecurity
Cybersecurity prompts upgrade for 1.3 billion electricity meters
ABI Research finds Advanced Metering Infrastructure (AMI) and cybersecurity concerns are prompting the upgrade of 1.3 billion electricity meters by 2027.
Story image
Digital Signage
MAXHUB's Digital Signage range to bolster boardroom productivity
The new MAXHUB Digital Signage technology is purpose-built to make every kind of team meeting more effective.
Story image
Employment
Tech job moves - Forcepoint, Malwarebytes, SolarWinds & VMware
We round up all job appointments from May 13-20, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Qualys
Qualys updates Cloud Platform solution with rapid remediation
The new update is designed to enable organisations to fix asset misconfigurations, patch OS and third-party applications, and deploy custom software.
Story image
Manhattan Associates
Shortening the click-to-customer cycle through smart technologies
Speed of delivery without accuracy is a dealbreaker for consumers. How can retailers operating in an omnichannel environment overcome the challenge of click-to-customer cycle times.
Story image
CrescoData
SPS network now available to CrescoData eCommerce customers
CrescoData, a Pitney Bowes Company and PaaS business in the commerce space, says its customers can now connect to the SPS Commerce Retail Network.
Booster
Booster Innovation Fund. A fund of Kiwi ingenuity – for Kiwi investors.
Link image
Story image
Sift
Sift shares crucial advice for preventing serious ATO breaches
Are you or your business struggling with Account Takeover Fraud (ATO)? One of the latest ebooks from Sift can provide readers with the tools and expertise to help launch them into the new era of account security.
Story image
Digital Transformation
The Huawei APAC conference kicks off with digital transformation
More than 1500 people from across APAC have gathered for the Huawei APAC Digital Innovation Congress to explore the future of digital innovation.
Exabeam
Find out how a behavioural analytics-driven approach can transform security operations with the new Exabeam commissioned Forrester study.
Link image
Story image
Ransomware
Alarming surge in Conti Ransomware Group activity - report
A new report has identified a 7.6 per cent increase in the number of vulnerabilities tied to ransomware in Q1 2022.
Story image
ChildFund
ChildFund launches new campaign to protect children online
ChildFund says WEB Safe & Wise aims to protect children from sexual exploitation and abuse online while also empowering them to become digitally savvy. 
Story image
Cybersecurity
More than 40% of banks worried about cloud security - report
Publicis Sapient's new report finds security and the lack of cloud skills and internal understanding of business benefits are big obstacles for banks moving to the cloud.
Story image
Digital Transformation
Pluralsight and Ingram Micro Cloud team up on cloud initiative
Pluralsight has teamed with Ingram Micro Cloud to build upon cloud competence and maturity internally, and externally support partners’ capabilities.
Story image
Customer experience
Gartner recognises Okta for abilities in Access Management
Okta has announced it has been recognised as a Customers' Choice for the fourth time in a row in the Gartner Peer Insights "Voice of the Customer" report.
Story image
Migration
Let’s clear the cloud visibility haze with app awareness
Increasingly, organisations are heading for the cloud, initiating new born-in-the-cloud architectures and migrating existing applications via ‘lift and shift’ or refactoring.
Story image
Data Center
Preventing downtime costs and damage with Distributed Infrastructure Management
Distributed Infrastructure Management (DIM) can often be a lifeline for many enterprises that work with highly critical ICT infrastructure and power sources.
Story image
Supply chain
Jetstack promotes better security with supply chain toolkit
The web-based resource is designed to help organisations evaluate and plan the crucial steps they need to establish effective software supply chain security.
Story image
Silver Peak
The path to an adaptive, modern network
Managing and securing the network looks different than it did just two years ago—especially given that most of these networks are made up of multi-generations of infrastructure stitched together over time.
Story image
Remote Working
Successful digital transformation in the hybrid work era is about embracing shifting goalposts
As organisations embraced remote working, many discovered they lacked the infrastructure needed to support history’s first global load test of remote work capabilities.
Darktrace
Threat actors are exploiting weaknesses in interconnected IT/OT ecosystems. Darktrace illuminates your entire business and takes targeted action to stop emerging attacks.
Link image
Story image
SaaS
Rubrik Security Cloud marks 'next frontier' in cybersecurity
"The next frontier in cybersecurity pairs the investments in infrastructure security with data security giving companies security from the point of data."