Why a Samsung tablet tops the tech gift list this holiday season

Posted in Commentary with tags on November 13, 2025 by itnerd

Did you know that 80% of Canadian Grade 4 students use a tablet or computer at home for schoolwork at least once a month? It’s clear that tablets are becoming essential tools, not just for adults, but for young learners too.

Just in time for the holidays, Samsung has introduced the new Galaxy Tab A11+, a powerful yet affordable tablet designed to inspire creativity, boost productivity, and make multitasking easier for Canadian youth (and their families).

Here’s what the Galaxy Tab A11+ can do:

Power that keeps up with them
Whether they’re gaming, streaming, creating, or tackling school projects, the Galaxy Tab A11+ offers smooth, optimized performance for every activity, making it easy for kids to stay engaged and productive.

Room for everything they love
With up to 8 GB of memory and 256 GB of storage, kids can download games, videos, and learning apps without worry. And for families that need even more space, storage can be expanded up to 2 TB with a microSD card.

Smarter learning and creativity with Galaxy AI
Built-in Galaxy AI gives young users an extra boost of creativity and curiosity, including live sharing with Gemini to get instant help with what’s on their screen.

The Galaxy Tab A11+ is available now at Samsung.com/ca and participating retailers.

Safe Software Ahead of Target to Reach $250M in Revenue by 2028

Posted in Commentary with tags on November 13, 2025 by itnerd

 Safe Software today announced strong business momentum and continued progress toward its goal of reaching $250M in revenue by 2028. Building on another year of record performance, Safe Software is ahead of its target, surpassing $100M in annual revenue in FY25, representing nearly 20% year-over-year growth.

The company’s employee base increased by 21.8% over the fiscal year, reflecting strategic investments in its people, culture, and innovation to meet global demand.

Internally, the growing Safe Software team has embraced AI, with over 600 active custom GPTs at the company, and over 40,000 messages per month sent to its enterprise GPT. Additionally, the company’s AI Champions Program has resulted in 20 internal demos posted for staff this quarter, covering a wide range of processes and tooling.

During the same period, Safe Software successfully expanded its international footprint with new operations in the UK and Ireland laying foundations for its next period of sustainable growth.

The business also introduced major product updates that further strengthened FME’s ability to connect and automate data across every system, including FME Realize and new Data Virtualization capabilities. Other major updates during the last fiscal year include: The launch of FME Multi-Language Availability24/7 global support for FME users and Safe Software being recognized as Customers’ Choice in the 2025 Gartner® Peer Insights™ ‘Voice of the Customer’ for third consecutive year in a row.

Earlier this month, the company also announced a new partnership with the Vancouver Canucks.

800M Credentials Analyzed – Which Breached Holiday Passwords Made the Naughty List?

Posted in Commentary with tags on November 13, 2025 by itnerd

With the holiday season rapidly approaching, Specops researchers wanted to find out how many people previously used this time of year as inspiration for passwords that ended up breached.

In analyzing 800 million compromised passwords, the researchers found 750,000 instances where end users picked memorable, festive passwords that ended up on breached lists creating security blind spots.

This research coincides with the latest addition of over 203 million new, unique compromised passwords to the Specops Breached Password Protection service. These passwords come from a combination of breached password lists, our honeypot network, and threat intelligence sources.

You can read the research here: Breached holiday passwords: Which made the naughty list?

Hacktivism in 2025: Where Politics Meets Cyberspace

Posted in Commentary with tags on November 13, 2025 by itnerd

Hacktivism has grown from small online protests into a regular part of the cyber world. What started as activism through hacking now often connects to larger political or strategic goals. 

In 2025, this has been truer than ever. Hacktivist activity is frequent and fast. Many attacks aim for attention more than damage. Leaks, DDoS, defacements, and ransomware now appear together. Telegram and X (Twitter) are key hubs for planning and spreading claims.

SOCRadar researchers have published an analysis on this very subject, diving into hacktivism in 2025, including the types of attacks most prevalent, the regions to watch going forward, and what to expect in 2026. 

You can read their analysis here: https://socradar.io/resources/whitepapers/hacktivism-in-2025-where-politics-meets-cyberspace/

2026 Predictions From Hammerspace

Posted in Commentary with tags on November 13, 2025 by itnerd

Molly Presley, SVP of Global Marketing at Hammerspace is sharing her prescient insights on emerging key trends in data management, storage, and AI for 2026.

The End of Data Fragmentation as AI’s Silent Killer

In 2026, enterprises will need to confront fragmented data estates. The industry will recognize that the biggest limiter to AI adoption isn’t GPU supply—it’s data access speed, consistency, and reach. Organizations will shift investment from more compute to unified data platforms that make existing infrastructure AI-ready.

By the end of 2026, AI deployments will rely on data orchestration layers that abstract away underlying storage silos and present a single, global view of data across hybrid environments. This approach will mark the beginning of the post-storage era—where AI agents, RAG workflows, and LLMs access information anywhere it resides, without copying or migrating it.

The winners of the AI race will be those who treat data fragmentation not as a symptom to be managed, but as a core architectural flaw to be eliminated. Performance, cost efficiency, and scalability will all flow from this unification—turning “AI Anywhere” from an aspiration into the new enterprise standard.

Sovereign AI Will be a Driving Function of Infrastructure Decisions

By 2026, organizations will increasingly pivot from relying on commercial APIs to deploying AI workloads on-premises. Security, compliance, and governance concerns will drive demand for AI environments built on enterprise infrastructure rather than public APIs. This shift ensures organizations retain complete control of their data, models, and intellectual property — a priority as generative AI moves deeper into regulated and mission-critical use cases.

A Unified Data Estate Becomes the Strategic Battleground

The era of focusing solely on GPU availability is coming to an end. The real competitive advantage lies in creating unified, global data estates that can power inference and generative AI at scale. Enterprises will realize that fast storage isn’t enough — orchestrating massive, decentralized, unstructured data into a single global namespace is now essential. In 2026, infrastructure players who can eliminate silos across sites, storage systems, and clouds will become the most strategic players in AI adoption.

Energy and Efficiency Drive Infrastructure Innovation

The sheer scale of inference and GenAI workloads will force a reckoning with power and efficiency. By 2026, new infrastructure technologies — from smarter data orchestration layers to energy-aware storage and compute systems — will emerge as enterprises seek to manage costs and sustainability pressures. We expect infrastructure vendors to compete not only on speed and scale, but also on their ability to tame energy consumption while maintaining enterprise-class performance.

The Year of the AI Factory — Where Efficiency Defines Intelligence (#2)

2026 will be remembered as the year AI moved from experimentation to industrialization — the dawn of the AI Factory. Across industries, organizations will shift their focus from simply training bigger models to operationalizing intelligence at scale. The frontier will no longer be just about model size, but about how efficiently those models are fed, reasoned with, and deployed.

The world’s compute capacity is now bounded by energy and data movement, not transistors. As a result, efficiency will become the new scoreboard of AI progress — measured in tokens-per-watt, throughput-per-rack, and time-to-insight. Enterprises will realize that GPUs sitting idle due to data fragmentation or latency are not just a technical problem, but an economic one.

In 2026, AI Factories will rise as the modern equivalent of industrial power plants — unifying data, compute, and automation into tightly orchestrated systems that transform raw information into actionable intelligence at unprecedented speed. These environments will blur the boundaries between cloud and on-premises, between inference and training, and between virtual and physical AI. AI Data platform exists… the AI Factory vision wasn’t possible until this technology was involved 

Exabyte Is the New Petabyte — and the Era of Open Flash Has Begun

In 2026, the scale of AI data will cross a historic threshold: exabytes will become the new unit of design for large-scale data infrastructure. Governments, hyperscalers, and emerging neocloud providers are building AI datacenters with training and inference pipelines that demand instant access to data that once would have been relegated to cold archives. The challenge is no longer just capacity — it’s how to keep exabytes of data hot, fast, and efficient within strict limits on power and floor space.

This struggle is driving a fundamental rethink of storage architecture. Traditional controller-based systems and proprietary flash arrays can’t scale linearly or efficiently enough to meet the needs of AI-driven workloads. The new frontier is open, software-defined flash platforms — architectures that embed compute directly with storage media, collapse layers of inefficiency, and operate on open standards.

The Open Flash Platform (OFP) movement embodies this shift. By unifying flash media, DPUs, and open protocols under a common, composable design, OFP enables 10–50× higher density, 90% lower power consumption, and rack-scale performance that aligns with the needs of AI factories operating at exabyte scale.

2026 will mark the beginning of a new design paradigm for AI infrastructure — where data, models, and compute are treated as one continuous system, not separate layers. Flash becomes the substrate, but the true architecture is data-centric: built around how information flows, learns, and evolves across GPU clusters. Open Flash Platform (OFP) technologies will underpin this transformation by delivering the performance, efficiency, and openness needed for exabyte-scale AI factories — where data pipelines, not storage boxes, define the architecture.

Hackers Lose Rhadamanthys Infostealer Server Access 

Posted in Commentary on November 12, 2025 by itnerd

And now for some good news for a change.

According to reports, law enforcement has interrupted the malware-as-a-service Rhadamanthys infostealer infrastructure, which steals credentials and authentication cookies, after hackers reveal they can no longer access their servers.

Henrique Teixeira, SVP of Strategy at Saviynt, commented:

“Back in 2022, I wrote research on identity threat detection and response (ITDR) at Gartner. We noted that Initial Access Brokers (IABs), which offer services similar to Rhadamanthys, were fueling identity breaches through a thriving market of stolen credentials, often harvested by infostealer malware. Fast forward to today, and infostealers have exploded, responsible for roughly three-quarters of stolen credentials worldwide. These tools don’t just grab passwords, they are able to extract tokens and cookies that can bypass MFA. 

“The continued proliferation of IABs and ‘Malware-as-a-Service’ sites, while seemingly unbelievable, is a persistent reality. Removing one only creates an opportunity for the next criminal enterprise to fill the gap. Modern enterprise cybersecurity, therefore, must move beyond mere prevention. Organizations must adopt a “assume breach” mindset, prioritizing rapid detection and response to identity-related incidents. This requires robust posture management, comprehensive visibility, and effective remediation processes to address security incidents as if a breach has already happened.”

The only thing that is bad about this is that some other ransomware gang will take the place of Rhadamanthys. Which is why there needs to be a concerted effort to make ransomware less profitable for these gangs.

DH2i to Showcase Expertise in SQL Server 2025, AI, and Container Modernization at PASS Data Community Summit 2025

Posted in Commentary with tags on November 12, 2025 by itnerd

 DH2i today announced DH2i CTO OJ Ngo will join with Microsoft Principal Product Manager Amit Khandelwal to present a series of sessions on: SQL Server modernization; building highly available, production AI apps with Azure AI and Microsoft SQL Server 2025; and achieving SQL Server scalability and cost-efficiency with containers in the cloud at the upcoming PASS Data Community Summit 2025, taking place November 17-21. 

In addition, DH2i and some of its technology partners will also feature a diverse array of demos at booth #204 during the event. Topics include: 

  1. How to unlock clustering/failover flexibility for SQL Server 2025 Availability Groups
  2. Migrating on-prem SQL Server workloads to Elastic Kubernetes Service
  3. Clustering Windows and Linux SQL Server together
  4. Mixed Kubernetes cloud AG deployments containing AKS, EKS, & GKE
  5. Setting up DR frameworks between on-prem, Azure, and EC2

Details on the joint DH2i and Microsoft expert-led sessions are as follows: 

Session Title: 

How to Migrate SQL Server Workloads to Red Hat OpenShift with DxEnterprise

When & Where: 

November 19, 10:15 AM-10:45 AM, Room 442

Session Abstract: 

As organizations seek to modernize their infrastructure and improve SQL Server scalability, many are turning to containerization and orchestration platforms like Red Hat OpenShift. Migrating existing SQL Server workloads to these new environments can be complex and daunting, especially when the task at-hand involves migrating cross-platform from Windows to Linux for the first time. 

In this step-by-step demonstration, we’ll show you how you can deploy a secure, cross-platform SQL Server Availability Group (AG) that seamlessly spans from an on-premises Windows Server node to a newly created OpenShift cluster in Azure. We’ll automate the deployment of this unique AG using DxEnterprise’s SQL Server Operator for Kubernetes, and be sure to demonstrate: 

  • AG customization – The ability to control # of replicas, async or sync replication, etc. 
  • The speedy workload migration from Windows to OpenShift using AG  
  • Fully automatic, database-level HA for the new OpenShift workload with DxEnterprise 

If your organization has any SQL Server modernization ambitions at all and is eyeing OpenShift as a potential hub for virtualization and container orchestration, make this session a priority. You’ll leave with an actionable understanding of an easy, secure, and highly available approach to OpenShift migration.

Session Title: 

How to Build a Secure & Resilient Data Estate for SQL Server-Backed AI Apps

When & Where: 

November 20, 10:15 AM-11:15 AM, Rooms 347-348

Session Abstract: 

The impending release of SQL Server 2025 and its support for vector databases unlocks a brand-new pathway into the ‘Age of AI’ for organizations across countless verticals. In the same way, it provides a robust and reliable database alternative for organizations that have already endeavored into the creation of their own AI applications. Regardless of the chosen technology, only AI databases architected with a keen focus on scalability, security, and resilience will meet the dynamic needs of modern enterprises. 

Join this demo-centric presentation to be shown step-by-step how your organization can leverage Azure AI, Microsoft SQL Server 2025, and DH2i to build a comprehensive solution for deploying enterprise AI at scale. We’ll show you how you can use a SQL Server Operator to automate the deployment of an Availability Group in Kubernetes, providing an optimally scalable, secure, and highly available database backbone for your AI applications. Additionally, we’ll demonstrate fully automatic failover of an AI workload between Kubernetes replicas—a non-negotiable capability for achieving maximum resiliency. 

Attendees will leave with a full, actionable framework for building highly available, production AI apps with Azure AI, Microsoft SQL Server 2025, and DH2i.

Session Title: 

How to Provision a SQL Server Availability Group Cluster in AKS/EKS

When & Where:

November 21, 11:30 AM-12:30 PM, Rooms 347-348

Session Abstract: 

The path to true high availability for critical SQL Server workloads in the cloud has never been for the faint of heart. For organizations pursuing further modernization by deploying containers in the cloud, the complexity is dialed up even further. Until now…

Join this presentation for a step-by-step demonstration showing you two different approaches your organization can employ to drastically simplify the deployment of secure and highly available SQL Server containers in the cloud:

  • Approach 1: Use a DxEnterprise Helm chart and StatefulSets to deploy a 3-replica AG in AKS/EKS.
  • Approach 2: Use DxEnterprise’s SQL Server Operator to automate the deployment of a customized Availability Group (AG) containing three replicas in AKS/EKS.

Both approaches to SQL Server container deployment in EKS/AKS are executable in minutes, and they integrate powerful proprietary benefits like:

  • SQL Server sidecar containers to avoid custom image/support headaches
  • Fully automatic failover for SQL Server Availability Groups in Kubernetes
  • Zero trust network access tunnels to securely connect any replica, anywhere

A clear path has been paved to peak SQL Server scalability and cost-efficiency with containers in the cloud. Join this session to see how you can get there without sacrificing network security and high availability.

About the Speakers: 

OJ Ngo, CTO, DH2i 

With over two decades of experience in IT, Thanh “OJ” Ngo is a seasoned technologist and inventor dedicated to streamlining processes and finding creative solutions to everyday technical problems. As co-founder and principal architect of DH2i Company’s core technology, OJ brings his unique blend of technical expertise and innovative thinking to the development of groundbreaking solutions that transform the way organizations approach IT challenges.

Amit Khandelwal, Principal Product Manager at Microsoft

Amit Khandelwal is a Principal Product Manager at Microsoft with over 15 years of experience. He has played a key role in the development of SQL Server on Linux, contributing significantly to Microsoft’s cross-platform solutions. Currently, he oversees SQL Server on Linux and containers. With over a decade of database experience, he has designed SQL Server-based data platforms for Tier 1 customers across diverse business segments.

Authentication Coercion Attacks Abuse Windows to Force Systems into Sending Credentials

Posted in Commentary with tags on November 12, 2025 by itnerd

Researchers have uncovered an upsurge in authentication coercion cyber-attacks that abuse Windows Remote Procedure Call (RPC) mechanisms that force systems into sending their credentials to an attacker-controlled system.

You can find out more via this Palo Alto Unit 42 Blog post:  https://unit42.paloaltonetworks.com/authentication-coercion/  

Jim Routh, Chief Trust Officer at Saviynt, commented:

Authentication coercion attacks represent a particularly challenging attack vector for enterprises that rely on extensive use of Microsoft architecture and products. These attacks enable lateral movement with limited visibility for the enterprise. There are several remediation steps recommended that generally require strict adherence to limits in how RPC (remote procedure call) is used within the enterprise. The larger and more complex the enterprise, the more difficult it is to enforce the limitations of RPC. 

“Enterprises should consider more maturity in how privileged access management (PAM) works, including the use of continuous validation techniques that compare attributes from data streams to established patterns.  These techniques measure the deviation from the established pattern mathematically. The deviation threshold (number or score) can trigger automated workflows that restrict access (lateral movement) within milliseconds of an attack attempt. This type of capability is not dependent on humans to detect the threats. It is similar to the way our body’s immune system operates when exposed to bacteria or a virus. Our body’s immune system automatically produces white blood cells and antibodies to attack the bacterial infection. Continuous validation techniques represent a digital immune system response that can take action in milliseconds when lateral movement is automatically identified.” 

This is another big hint that organizations need to look at making sure that users are only able to do what they need to do and nothing more. That would make attacks like these way less effective.

TELUS Living breaks ground on 55-unit Vancouver-Point Grey development

Posted in Commentary with tags on November 12, 2025 by itnerd

TELUS celebrated the official groundbreaking of a new TELUS Living development in Vancouver’s Point Grey neighbourhood. Located at 2608 Tolmie Street, the former Point Grey telephone exchange will be transformed by TELUS and its development partner, LPI Management Ltd., into a sustainable, mixed-use building featuring 55 purpose-built rental units and four retail spaces, helping to address the urgent housing needs in the community. The Vancouver-Point Grey development joins two other TELUS Living buildings under construction in Nanaimo and Sechelt, delivering 254 rental homes in early 2026. A further 18 properties are proposed to add more than 3,000 homes across British Columbia over the next six years, with plans to expand the program to Alberta and Quebec.

Located in the heart of Vancouver’s Point Grey, the site is uniquely positioned with proximity to UBC and other key facilities. The development will serve diverse housing needs, from students and young professionals starting out to established residents looking to downsize and remain close to the neighbourhood they love. 

Project Highlights: 

  • Six-storey mixed-use building featuring 55 purpose-built rental units and four ground-floor retail spaces 
  • Diverse unit mix with studio, one-bedroom and two-bedroom units to accommodate students, young professionals, families, and downsizers
  • Smart home technology powered by TELUS’ PureFibre network, offering seamless connectivity with smart home devices that enhance security, energy efficiency, and residents’ overall living experience
  • Climate conscious development promoting high energy efficiency to minimize environmental impact
  • Sustainable transportation based on proximity to transit and bike routes with one level of underground parking and robust cycling infrastructure 
  • Community-focused amenities including co-working and study areas, indoor and outdoor social lounges, bike storage with end-of-trip facilities, parcel lockers, and pet-friendly features

This groundbreaking marks a significant milestone in TELUS Living’s mission to transform existing real estate holdings into purpose-built rentals that bridge the housing gap with smart, sustainable, and community-focused developments. Through its copper-to-fibre network migration, TELUS has unlocked opportunities by repurposing central offices, which are buildings that once housed copper-based equipment and served as the backbone of British Columbia’s phone system. For more details on TELUS Living please visit telusliving.com.

Ridge Security Earns 95% Willingness to Recommend rating, Gartner Peer Insights

Posted in Commentary with tags on November 12, 2025 by itnerd

Ridge Security, leader in AI-powered offensive security for Continuous Threat Exposure Management (CTEM), today announced that it was the second highest vendor to score a willingness to recommend with 95% in the 2025 Gartner’s Peer Insights “Voice of the Customer” for Adversarial Exposure Validation.

Based on 22 reviews validated by Gartner as of August 2025 Ridge Security recently announced RidgeGen, a comprehensive Agentic AI framework designed to take security validation from automation to autonomy. Powered by RidgeGen, Ridge Security’s flagship product, RidgeBot, covers an organization’s IT infrastructure, including hosts, networks, applications, APIs, and LLMs, making it the platform with the most comprehensive offensive security framework ever developed. We feel like the willingness to recommend score from Gartner Peer Insights™ “Voice of the Customer” is evidence of the company’s growing demand for Adversarial Exposure Validation technology.

According to Gartner, Adversarial Exposure Validation represents a market segment focused on solutions that continuously test, validate, and measure an organization’s security posture by emulating real-world attacker behaviors. These technologies operationalize adversarial techniques to assess and prioritize exposures with precision and repeatability.

Within this framework, Gartner Peer Insights defines willingness to recommend as the percentage of verified end users who indicate they would endorse a vendor solution to their peers, a key measure of customer advocacy. Derived from 18 months of practitioner reviews, this metric offers an evidence-based view of user confidence and satisfaction with Ridge Security’s flagship product, RidgeBot.