97% of Canadian consumer goods leaders say AI is essential for survival says Salesforce

Posted in Commentary on September 16, 2025 by itnerd

With 97% of Canadian consumer goods leaders saying AI agents will be essential within two years, Salesforce’s latest Consumer Goods Industry Insights Report shows brands are turning to AI to survive rising tariffs and growing economic instability.

The report finds that 60% of Canadian consumer good leaders expect profitable growth to be harder to achieve this year, and 63% anticipate more instability. Price hikes and generic promotions are no longer effective, forcing companies to rethink their strategies, especially when it comes to adopting AI and new technologies.

You can read the insights here: Salesforce Consumer Goods Industry Insights Report Announcement 2025 – Salesforce

Dispersive Announces Integration with the CrowdStrike Falcon Platform

Posted in Commentary with tags on September 16, 2025 by itnerd

Dispersive today at Fal.Con 2025 announced a new integration with the AI-native CrowdStrike Falcon® platform. The joint solution unifies endpoint, identity, and network context to help customers contain threats faster, strengthen zero trust security, and reduce complexity.

The Dispersive Continuous Trust Authorization Network extends CrowdStrike’s best-in-class endpoint and identity protection into the network layer. By continuously monitoring CrowdStrike device and user identity scores via API, Dispersive dynamically adjusts access rights, segments network activity, and can instantly isolate risky users or devices when behavior indicates elevated risk. This identity-aware networking capability enables organizations to enforce adaptive, real-time authorization across the entire user journey.

Key benefits of the integration include:

  • Predictive Patient Zero Isolation – Proactively contain potential threats by combining endpoint, identity, and network context.
  • On-Demand Endpoint Isolation – Instantly segment or disconnect risky devices and users.
  • Dynamic Authorization – Adjust access rights in real time based on current risk posture.
  • Granular Policy Enforcement – Apply attribute- and score-based controls for sensitive networks, applications, and services.

The integration will be showcased live at Fal.Con 2025 Europe, with demonstrations of real-time authorization and identity attack prevention.

To learn more about the Dispersive and CrowdStrike partnership, visit the CrowdStrike Marketplace listing.

VDURA and AMD Launch Scalable Reference Architecture for AI and HPC 

Posted in Commentary with tags on September 16, 2025 by itnerd

VDURA has announced the launch of its first scalable AMD Instinct™ GPU reference architecture in collaboration with AMD. The new validated blueprint defines how compute, storage and networking should be configured for efficient, repeatable large-scale GPU implementations. The design combines the VDURA V5000 storage platform with AMD Instinct™ MI300 Series Accelerators to eliminate performance bottlenecks and simplify deployment for the most demanding AI and high-performance computing (HPC) environments. 

AI and HPC pipelines are increasingly limited by storage that cannot keep pace with growing data volumes. This slows GPU utilization, increases energy costs and reduces overall efficiency. The new reference architecture is engineered to keep AMD Instinct™ GPUs fully utilized, delivering sustained performance with a design that is efficient, expandable and simple to operate. 

Following a technical evaluation, AMD selected VDURA for its AMD Instinct™ GPU-optimized performance, low client overhead and proven ability to scale. The solution has already been chosen for a U.S. federal systems integrator AI supercluster, demonstrating its readiness for mission-critical workloads. 

The reference architecture provides compute, storage and networking at scale. It supports 256 AMD Instinct GPUs per scalable unit, achieves throughput of up to 1.4 TB/s and 45 million IOPS in an all-flash layout, and delivers around 5 PB of usable capacity in a 3 Director and 6 V5000 node configuration. Data durability is assured through multi-level erasure coding, while networking options include dual-plane 400 GbE and optional NDR/NDR200 InfiniBand. 

Built to grow with demand, the modular design allows organizations to add Director Nodes for extra performance, expand with all-flash storage for more bandwidth, or combine flash and HDD capacity for cost-effective growth, all within a single namespace.  

For further information, the full 20-page architecture reference guide is available for download at: https://www.vdura.com/wp-content/uploads/2025/07/VDURA_AMD_AI_Reference-Architecture-2.pdf 

Today Is IT Professionals Day

Posted in Commentary on September 16, 2025 by itnerd

Today is IT Professionals Day (or IT Pro Day). As you may already know, it was started in 2015 by the tech company SolarWinds to recognize and show appreciation for the often-unsung heroes — all the IT Professionals across the many disciplines — who keep our systems protected, secure, and running smoothly.

Here’s a few fun IT Facts:

  1. The first actual case of bug being found – was a real bug (a moth). (https://www.computerhistory.org/tdih/september/9/)
  2. The first computer password was invented in 1961. (https://cybernews.com/security/first-computer-password/
  3. The first email was just “QWERTYUIOP.” (https://www.youtube.com/watch?v=xYn9l1IXTU4

I also have some commentary from a pair of executives from Leaseweb:

Richard Copeland, CEO, Leaseweb USA – IT Professionals Day Commentary:

“The best IT people I’ve worked with aren’t just here to fix things — they’re here to make the business stronger. They’re connecting dots the rest of us don’t even see, figuring out how technology can give us an edge. Here’s the thing — if they’re buried in tickets and day-to-day maintenance, they can’t provide their full potential. My job as a leader is to get the noise out of their way so they can focus on the big stuff that actually moves the business forward.

IT Professionals Day is a reminder to give these folks the room to be strategic. They’re not just support — they’re problem solvers, innovators, and a huge part of how we grow. The more we clear the small stuff off their plates, the more they can deliver the kind of results that change the trajectory of a company.”

Roger Brulotte, CEO, Leaseweb Canada – IT Professionals Day Commentary:

“Our IT pros are the people who quietly keep this whole thing running — and when you give them the chance, they can take it to the next level. They’re securing our data, keeping us online, and at the same time, finding ways to make tech work harder for the business. But if all they do is put out fires, we’re wasting their talent. I want them spending their time building what’s next, not just fixing what’s broken.”

“That’s why, especially on IT Professionals Day, I think about how to protect their time. When we take low-value work off their hands, they get to lean into the high-impact, forward-looking projects. And that’s when the magic happens — not just for IT, but for the whole company.”

UPDATE: Bruce Kornfeld, Chief Product Officer at StorMagic adds this: 

“IT professionals are the steady hands keeping systems online when hardware fails, when cloud services slow down or when costs suddenly rise due to shifting trade policies. They help ensure resilient infrastructure and find ways to deliver more with less, even as new demands like AI, virtualization changes and real-time data processing at the edge emerge. 

The reality is that IT teams are often asked to stretch budgets, rethink infrastructure strategies and deliver efficiency without compromising reliability. Whether it’s reducing server sprawl, exploring alternatives to costly software or simplifying management at remote sites, IT professionals are solving problems that most of us never see.

That dedication can even come at a personal cost—systems don’t always operate 24/7 or as smoothly as we’d hope, and it’s not unusual for IT professionals to miss family dinners, weekends or holidays to keep everything running.

Their work is not only technical, it’s strategic. By keeping applications running smoothly, they give businesses the flexibility to innovate and the confidence to face whatever comes next. On National IT Professionals Day, we should take time to recognize the people who keep our digital world moving forward. Today we thank them for their dedication, their creativity and their commitment to keeping organizations running smoothly in an unpredictable world.”

Gucci, Balenciaga and Alexander McQueen Have Been Pwned And The Details Of Millions Has Been Swiped

Posted in Commentary with tags on September 15, 2025 by itnerd

Cyber criminals have stolen the private details of potentially millions of Balenciaga, Gucci and Alexander McQueen customers in an attack. The stolen data includes names, email addresses, phone numbers, addresses and the total amount spent in the luxury stores around the world.

Brian Higgins, Security Specialist at Comparitech had this to say:

“This is a rather alarming step in a growing trend of attacks on high value retail brands. Aside from all of the usual advice surrounding digital security measures, the most obvious threat to customers here lies in the value of the stolen data. Regardless of whether or not financial information has been compromised, the potential aggregation of names, addresses and overall spend could provide a significant target list for further cyber or indeed real-life criminality. One would hope that those most affected have the resources to target-harden their virtual and physical security but the threat should not be ignored. In the majority of data theft cases changing passwords, monitoring online activity and boosting cybersecurity is sufficient to ride out the threat. I would suggest that in this case more offline measures are appropriate too.” 

Chris Hauk, Consumer Privacy Champion at Pixel Privacy follows with this:

“Unfortunately, cyber-attacks on retailers are on the increase. While Kering refuses to say how many customers were affected by the data breach, the bad actors behind the attack, Shiny Hunters, claims to have harvested data linked to 7.4 million email addresses, meaning the numbers of customers affected by the breach is easily in the millions. Since this information includes names, email addresses, phone numbers, addresses and the total amount spent in Balenciaga, Gucci and Alexander McQueen stores around the world, the data could be used for phishing attacks, and could be sold for a nice piece of change to other bad actors.”

“Customers affected by the hack need to stay alert for suspicious texts, emails, and other communications, claiming to be from a Kerif-owned store, the customer’s bank, and other organizations. Customers should immediately change the password on related accounts and should enable two-factor authentication if available. Actually, they should do this for all of their online accounts.”

Roger Grimes, data-driven defense evangelist at KnowBe4 commented:

“The biggest risk to individual customers is that a very targeted spear phishing attack can be used that more realistically tricks a potential victim into thinking they are dealing with someone legitimate. A very common scheme is for a scammer to pretend to be one of the legitimate brands, and get the potential victim to provide updated credit card information under the guise that their existing or old credit card information must be quickly updated or else they will be at great likelihood to lose money. By the scammer having access to the user’s past history, they can include real details that happened in the past to make potential victims think they are dealing with the legitimate vendor and be more likely to fall for scams.”

DoD Greenlights Parallel Works Hybrid Multi-Cloud HPC Platform with ATO Approval, Now Ready for Defense and Industry Use

Posted in Commentary with tags on September 15, 2025 by itnerd

 Parallel Works today announced its ACTIVATE High Security Platform (HSP) has achieved a historic milestone as the first-ever hybrid multi-cloud computing solution to receive the Authority to Operate (ATO) by the Department of Defense (DoD). Granted by the High Performance Computing Modernization Program (HPCMP), the IL-5 ATO authorization enables more agile, cloud-enabled defense computing capabilities to modernize defense infrastructure through scalable, secure and high-performance cloud solutions.

The designation opens the door for partners, integrators, DoD civilians and military end users to utilize Parallel Works ATO through two options:

  1. ACTIVATE HSP can be used as a shared service on NIPRnet through HPCMP.
  2. Organizations can leverage the ACTIVATE HSP software stack and inherit the required compliance and security boundaries to operate within the government ecosystem.

The ATO authorization provides immediate access to a secure, IL5-authorized HPC platform, thereby shortening the time to market for DoD agencies, defense contractors, national labs, system integrators and AI/ML teams.

The DoD’s demand for automated computing solutions is skyrocketing as technology advances to support AI-driven wargaming, digital and model-based systems. Parallel Works ACTIVATE HSP advances the transition with turnkey HPC integration across DoD and commercial clouds, providing advanced orchestration for real-time simulation and AI analytics.

The Parallel Works hybrid, multi-cloud computing HSP is one of only three software programs approved to handle export-controlled workload environments, including International Traffic in Arms (ITAR), DoD IL5 and the Federal Risk and Authorization Management Program (FedRAMP).

Availability

The Parallel Works ACTIVATE hybrid, multi-cloud HSP is available immediately. Interested technology partners can connect at info@parallelworks.com. For more information on Parallel Works ACTIVATE HSP and the opportunities the ATO provides click here

AI cuts energy waste by up to 30% in buildings says KPMG

Posted in Commentary with tags on September 15, 2025 by itnerd

KPMG has recently released a report on “How AI is helping to improve energy efficiency and management in real estate.” It says that traditional retrofits are too slow and costly to deliver the scale of cuts required to reach net-zero goals of 2050, and instead points out that artificial intelligence is a faster route, but only together with the Strategic Energy Management (SEM) framework.

Exergio, a company that developed an AI-based tool for energy efficiency in commercial buildings, says that findings reflect what is already visible in real-world cases.

KPMG states that SEM should track how buildings use energy and assign clear responsibility for fixing problems. According to Karčiauskas, this usually means facility managers or energy officers are tasked with day-to-day oversight. However, certain tasks such as changing parameters in sensors should be automatically assigned to AI and machine learning models to adjust in real-time, with experts overseeing the process.

On its own, implementing a SEM mindset typically delivers 5-7% savings per year. But when used with AI, they rise to around 20%-30% state energy efficiency experts.

There are three tiers of SEM, according to the report. The first tier focuses on getting more out of what is already in place: engineers have to tune HVAC, lighting, and control systems so they run more efficiently day to day. This, according to Karčiauskas, is “a task of AI at the moment as we want to achieve faster savings”.

The second step is replacing worn or outdated equipment, for instance, boilers, chillers, or pumps, with models that use less energy. The third adds renewables or long-term power contracts, but only once the building’s basic energy consumption has been brought under control.

The authors of the paper stress that renewables should come last, since they deliver limited value if the building’s consumption has not already been optimised.

The study also indicates that efficiency depends less on new hardware and more on how existing systems are managed.

SEM has a five-step cycle. It includes assessment, planning, implementation, building capability, and monitoring. Within this setup, AI could regulate HVAC concurrently based on occupancy, weather, and usage, while managers define energy-saving goals, set comfort ranges, and review results.

Kids & Data: How Apps Invade Children’s Privacy

Posted in Commentary with tags on September 15, 2025 by itnerd

Safety Detectives has conducted recently based on how apps designed for children invade their privacy. While conducting our research they identified some concerning privacy related points such as:

  • 70% of the reviewed apps collect identifiers, data usage and biometric information, often without parental consent.
  • Several apps openly admit sharing kids’ data for marketing and ad tracking.
  • To date, regulators have issued over $1 billion in penalties for children’s privacy violations.
  • Some apps had conflicting disclosures across platforms.

 You can check the full report here: https://www.safetydetectives.com/blog/blog-kids-apps-privacy-research/

Major security flaw exposed in enterprise chatbot maker Yellow.ai 

Posted in Commentary with tags on September 15, 2025 by itnerd

Cybernews has just released a report about enterprise chatbot maker Yellow.ai. It reveals that Yellow.ai’s customer service chatbot allowed users to steal cookies and execute malicious code upon request, with zero pushback.

The flaw highlights multiple security issues, such as improper user input sanitization, improper chatbot output sanitization, the web server not verifying content produced by the chatbot, running unverified code, and loading content from arbitrary web resources. This leaves many options for Cross-Site Scripting (XSS) attacks.

Cybernews reached out to Yellow.ai before publishing the research, and the company fixed the issue by sanitizing the generated code, ensuring that it would not get executed. However, the bot still generates malicious code if asked.

Yellow.ai customers include major companies like Sony, Logitech, Hyundai, Domino’s, and hundreds of other brands. It is unclear whether the chatbots used by Yellow.ai’s clients have the same security flaw as the customer service bot had, so Cybernews urges all Yellow.ai clients to be wary.

For more information, here’s the full report: https://cybernews.com/security/yellowai-customer-chatbot-cookies-flaw

What You Should Do Before Upgrading To macOS Tahoe….. And Why You Shouldn’t Upgrade Just Yet

Posted in Commentary with tags on September 15, 2025 by itnerd

Apple is expected to release their latest OS which is macOS Tahoe today. Before we go on, here’s a list of what macOS Tahoe will run on:

  • iMac 2019 and later
  • Mac Pro 2019 and later
  • Mac Studio 2022 and later
  • MacBook Air with Apple Silicon 2020 and later
  • Mac mini 2020 and later
  • MacBook Pro with Apple Silicon 2020 and later
  • MacBook Pro (16‑inch, 2019)
  • MacBook Pro (13‑inch, 2020, Four Thunderbolt 3 ports)

You should note that some features of Tahoe won’t work on Intel Macs. And on top of that, this is the last year that Intel Macs will be supported. So if you haven’t made the move to Apple Silicon, now would be a really good time to dump your Intel Mac.

Related to the above, here’s list of features that Tahoe includes.

If your Mac isn’t on this list, you’re out of luck. But assuming that it is, here’s some tips on what you might want to do before you pull that trigger and upgrade. And a couple reasons why you shouldn’t.

  1. Don’t Upgrade… At least not yet. Part 1 : The reason why you shouldn’t upgrade is that Apple’s initial releases tend to be buggy. But they usually get better after they release an update or two. Though that wasn’t the case with Sequoia as they never fixed the Time Machine issues that this specific OS had. So you may want to wait until at least the .1 update hits the streets before making the jump. Or better yet, wait until the .2 release to be extra safe. 
  2. Don’t Upgrade… At least not yet. Part 2: Your apps that you depend upon may not be ready for Tahoe. Thus out may be a better strategy to confirm whether they are ready or not. And if they’re not, wait for them to be compatible with Tahoe before you upgrade.
  3. If you Must Upgrade, Make A Backup: Needless to say, making a backup of your current setup is vital before upgrading. That way you have a way to go back to where you were if things don’t work out. There’s plenty of backup solutions out there from Apple’s own Time Machine to third party utilities such as Carbon Copy Cloner that can be used for this purpose.
  4. Upgrade Your Software BEFORE You Upgrade: Assuming your apps are going to be compatible with Tahoe, you should ensure that all your apps are up to date before you pull the trigger on upgrading. That will reduce the risk that something might go sideways during the upgrade.
  5. Run Disk Utility BEFORE You Upgrade: The last thing I would do is boot of the Recovery Partition and run Disk Utility to verify the volume that you plan to install the upgrade on. It likely wouldn’t hurt to do a permission repair as well.

At this point you should be good to go. Key word being SHOULD. Upgrading an operating system isn’t a trivial process. But if you take these steps beforehand, you should reduce the risk of any issues. Or you can take my first couple of suggestions which is to wait for a bit before upgrading. Then follow the rest of my advice. In my case, I am not planning on upgrading to Tahoe. At least not yet given my experience with Sequoia. But I may upgrade in the future depending on what problems do or do not surface in the coming weeks.