English

China strebt technologische Unabhängigkeit an

China strives for technological Independence

China strives for technological Independence

China is taking a new approach to its technology policy: Foreign hardware and software, including products from AMD, Intel and Microsoft, are being banned from government computers.

In an extraordinary move to strengthen the domestic technology industry and increase data security, the Chinese government has decided to ban foreign hardware and software from government computers. This particularly affects products from world-renowned giants such as AMD, Intel and Microsoft. The aim of this measure is, on the one hand, to reduce dependence on foreign technology. At the same time, local manufacturers are to be promoted.

Background of the Ban

A report by the Financial Times reveals: China is turning to its own secure technologies. This far-reaching step does not only include the work computers of civil servants. It also extends to the servers used by government departments above the municipal level. The message behind this is clear: Strengthening national security and technology independence.

Impact on the global Market

This decision could have a significant impact on the global technology market. AMD, Intel and Microsoft are among the world's leading providers of hardware and software. Exclusion from a market as large as China could not only lead to financial losses, but also shift the balance of power in the global technology industry.

Lists of permitted Technology

To facilitate the implementation of this new directive, lists of CPUs, operating systems and centralized databases classified as "secure and reliable" have been published, as reported by Reuters. Interestingly, all of the technologies listed are from Chinese companies. This underlines China's ambitions to turn its local technology industry into a global power.

Reactions

In response to inquiries from international news agencies such as Reuters and the Financial Times, the Chinese government and the hardware manufacturers concerned have not yet commented. This lack of communication raises questions about the potential long-term impact of this decision on international business and diplomatic relations.

Conclusion

China's decision to switch to domestic technologies marks a significant step towards technological self-reliance. It could serve as a model for other countries looking to strengthen their national security and local industries. It remains to be seen how this decision will affect the companies concerned and the global technology landscape.

Source: heise online


Cloud-Neuordnung: KKR übernimmt VMwares EUC-Geschäft

Cloud Reorganization: KKR acquires VMware's EUC Business

Cloud Reorganization: KKR acquires VMware's EUC Business

KKR acquires VMware's EUC division for four billion dollars. This strategic acquisition not only signals a new direction for VMware, but could also have a lasting impact on the cloud computing landscape.

Investment firm KKR has caused quite a stir in the cloud computing industry by acquiring VMware's End-User Computing (EUC) division for around four billion dollars. This sale is part of a larger restructuring process at VMware after the company was acquired by Broadcom. Broadcom's decision to divest parts of VMware that do not fit with its core strategy raises questions. What will the future of the software vendor and its position in the market look like?

VMware's EUC Division - New Era under KKR

VMware's EUC division, known for its advanced digital workspace solutions such as Horizon and Workspace ONE, is at the center of this transaction. These tools are essential for organizations that want to manage their applications, desktops and data seamlessly and securely across multiple devices and platforms. Under the leadership of Shankar Iyer, the EUC division will continue to operate as an independent company. The focus will be on supporting customer relationships through significant investment.

Industry Consequences of Restructuring

This development could have far-reaching consequences for the industry. Analysts are predicting a possible mass exodus of VMware customers, triggered by the takeover by Broadcom and the resulting changes. These concerns are not unfounded, as Broadcom has already started to reorganize the acquired divisions and has discontinued some products.

KKR's Strategic Moves in the Technology Market

KKR is no newcomer to the software business. Its successful acquisitions, such as that of BMC in 2018 and the subsequent acquisition of Compuware by BMC, demonstrate its expertise and ambitions in the technology sector. With the acquisition of VMware's EUC division, KKR could further strengthen its position in the cloud computing market and open up new opportunities for innovation and growth.

Impact on the Cloud Computing Landscape

The question that now arises is how these changes will affect the landscape of cloud computing. As the industry continues to grow and evolve rapidly, such strategic moves could be critical to meeting the needs of modern businesses while setting new standards for the delivery of digital workplace solutions.

Source: Computerwoche


Bildung für alle: Gratis Online-Kurse von Tech & Unis

Education for All: Free Online Courses from Tech & Universities

Education for All: Free Online Courses from Tech & Universities

Major technology companies and leading universities have launched an unprecedented initiative. They offer a wide range of online courses - free of charge and with certification. We show you which courses you should not miss.

Education and lifelong learning play a crucial role in our professional and personal development. Tech giants such as IBM, Meta (formerly known as Facebook) and Google as well as renowned universities have taken a remarkable initiative in this regard: they provide a variety of interesting online courses for free, which you can even complete with a certificate.

You should not miss these online courses in 2024:

Advanced Google Analytics

Provider: Google
Content: Google Data Analytics, certificate of professional qualification
Details and Registration: hier

Google Project Management

Provider: Google
Content: Google Project Management, certificate of professional qualification
Details and Registration: hier

Foundations of Project Management

Provider: Google
Content: Basics of project management
Details and Registration: hier

Google Data Analytics

Provider: Google
Content: Google Data Analytics, certificate of professional qualification
Details and Registration: hier

Web Applications for Everybody Specialization

Provider: University of Michigan
Content: Specialization Web applications for everyone
Details and Registration hier

Get Started with Python

Provider: University of Michigan
Content: Programming for everyone (First steps with Python)
Details and Registration: hier

Learn Python Basics for Data Analysis

Provider: Google
Content: Python crash course
Details and Registration: hier

Google Advanced Data Analytics Capstone

Provider: Google
Content: Google Advanced Data Analytics Capstone
Details and Registration: hier

Data Analysis with R Programming

Provider: Google
Content: Data analysis with R programming
Details and Registration: hier

IBM Full Stack Software Developer Professional Certificate

Provider: IBM
Content: IBM Full Stack Software Developer Certificate of Professional Qualification
Details and Registration: hier

Introduction to Web Development with HTML, CSS, JavaScript

Provider: IBM
Content: Introduction to web development with HTML, CSS, JavaScript
Details and Registration: hier

IBM Front-End Developer Professional Certificate

Provider: IBM
Content: IBM Front-End Developer Certificate of Professional Qualification
Details and Registration: hier

IBM Back-End Development Professional Certificate

Provider: IBM
Content: IBM Back-End Development Certificate of Professional Qualification
Details and Registration: hier

IBM Python for Data Science, AI & Development

Provider: IBM
Content: Python for data science, AI & development
Details and Registration: hier

IBM Developing Cloud Apps with Node.js and React

Provider: IBM
Content: Developing cloud apps with Node.js and React
Details and Registration: hier

Meta Front-End Developer Professional Certificate

Provider: Meta
Content: Start your career as a front-end developer. Acquire job-ready skills for an in-demand career and earn a degree from Meta.
Details and Registration: hier

Meta React Native Specialization

Provider: Meta
Content: Become a cross-platform mobile app developer. Learn in-demand skills to develop reliable, scalable and user-friendly mobile apps for multiple operating systems such as iOS and Android.
Details and Registration: hier

Introduction to Front-End Development

Provider: Meta
Content: Introduction to front-end development
Details and Registration: hier

Meta HTML and CSS in depth

Provider: Meta
Content: HTML and CSS in depth
Details and Registration: hier

Advanced React

Provider: Meta
Content: Advanced React
Details and Registration: hier

HTML, CSS, and Javascript for Web Developers

Provider: Johns Hopkins University
Content: HTML, CSS and Javascript for web developers
Details and Registration: hier

Web Design for Everybody: Basics of Web Development & Coding Specialization

Provider: University of Michigan
Content: Specialization web design for everyone: basics of web development and coding
Details and Registration: hier

Introduction to Web Development

Provider: UC Davis
Content: Introduction to web development
Details and Registration: hier

Responsive Website Development and Design Specialization

Provider: University of London
Content: Specialization Responsive website development and design
Details and Registration: hier

Full Stack Web Development en Español Specialization

Provider: Universidad Austral
Content: Specialization Full Stack Web Development in Spanish
Details and Registration: hier


Synaxon Study: IT Service Costs Exceed 100 Euro Mark

Synaxon Study: IT Service Costs Exceed 100 Euro Mark

IT service costs in Germany have reached a new high. The IT Service Price Index 2024 from Synaxon Academy reveals the current trends, regional differences and the influence of the shortage of skilled workers.

A significant financial threshold was recently crossed in the IT sector: The average hourly rate for standard IT services has broken the 100 euro barrier for the first time. According to the latest survey by the Synaxon association, the price is now 100.44 euros net. This corresponds to an increase of 3.7 percent compared to the previous year.

Detailed insights

However, Synaxon's latest analysis not only reveals the average increase in IT service costs. It also provides detailed insights into the specific hourly rates for different types of IT services:

  • Standard IT services: The average hourly rate for basic IT services has now exceeded the €100 mark and stands at €100.44 net. This shows that a significant price level has now been reached even for standard services in the IT sector.
  • Complex network and specialized IT solutions: For more sophisticated and specialized IT services, such as complex network solutions or specific IT projects, hourly rates increase significantly. An average value of EUR 111.14 per hour is estimated here, reflecting the increased requirements and the expertise needed in these areas.
  • 3rd level support services: Even more specific and demanding is 3rd level support, which deals with complex problem solving and technical advice at the highest level. An average of EUR 114.57 per hour is charged for this, which underlines the expertise and often critical role of these services.
  • Programming services: The development of software or individual applications requires a high level of expertise and experience. The average hourly rate for programming services is EUR 119.92, which reflects the value of this specialized work.
  • Advisory and consulting services: The hourly rate is even higher in the consulting and advisory sector, where strategic insights, planning and highly specialized knowledge are required. Companies have to budget an average of 126.94 euros per hour for such services, which underlines the importance and influence of these services on business success.
Regional price differences

The study, which is based on 750 participants from Germany and Austria, also reveals significant regional price differences. In Munich, for example, an average of 126.30 euros per hour is charged for IT services, while in the eastern regions of Germany the hourly rate is only 82.51 euros. Company size also plays a role: smaller service providers without employees charge 81.26 euros, whereas larger companies with over 50 employees charge an average of 116.93 euros.

Skills shortage in IT

Another key issue is the shortage of skilled workers in IT, which almost 60% of respondents see as the dominant problem. Despite advances in the field of artificial intelligence (AI) and new laws on the immigration of skilled workers, a permanent solution remains out of reach. However, AI offers relief through automation and allows IT departments to focus on priority tasks that require critical thinking.

Recommendations for action

Arnulf Koch from K&K Software emphasizes the importance of deep specialization for IT service providers in order to survive against AI and large competitors. The use of AI, such as in their ticket system and marketing with ChatGPT, shows the potential of automated customer support.

The Managed Service Provider (MSP) industry is also experiencing growth, driven by the need for external support due to the skills shortage. Migration to the cloud and outsourcing offer new business opportunities. Markus Rex from Synaxon sees automation as a major challenge, but advises the bold use of AI in all areas, from customer communication to marketing and sales.

In summary, the Synaxon Price Index 2024 reflects the dynamic changes in the IT industry, with rising service costs, regional differences and the inevitable influence of AI. These developments require IT service providers to continuously adapt and specialize in order to survive in an increasingly competitive environment.

Source: IT-Business


Nomination

Gartner Tech Trends 2024: A Guide for Companies

Gartner Tech Trends 2024: A Guide for Companies

Discover our Guide for the ten most important strategic technology trends for 2024 according to Gartner in our blog post and find out how these innovations can drive your company forward in the age of AI.

The world of technology is evolving rapidly, and with it the needs and opportunities of companies. In this context, Gartner has identified the ten most important strategic technology trends for 2024. These trends not only point the way forward, but also offer concrete approaches to help companies achieve their business goals faster and more efficiently. Here is an overview and how they can influence your company.

Overview of the Trends

 

  1. AI Trust, Risk and Security Management (AI TRiSM): This trend emphasizes the importance of trust, risk management and security when dealing with AI technologies. Companies must ensure that their AI applications are trustworthy and secure.
  2. Continuous Threat Exposure Management (CTEM): This involves the constant monitoring and management of threats to ensure the security of IT systems.
  3. Sustainable Technology: Sustainability is becoming increasingly important and companies need to use technologies that are environmentally friendly and sustainable.
  4. Platform Engineering: The development of user-friendly platforms that integrate various services and applications is another key trend.
  5. AI-Augmented Development: Integrating AI into the development process makes it possible to work faster and more efficiently and create innovative solutions.
  6. Industry Cloud Platforms: Specialized cloud platforms for various industries offer tailor-made solutions and services.
  7. Intelligent Applications: Applications that use AI to become smarter and more user-friendly are crucial to a company's success.
  8. Democratized Generative AI: Generative AI is becoming more accessible, which opens up new possibilities in content creation and design.
  9. Augmented Connected Workforce: The use of technology to support and network employees is crucial for efficiency and productivity.
  10. Machine Customers: This involves the development of algorithms that can make decisions independently and act as customers.

These trends cover a broad spectrum: from the management of AI risks to the development of platforms and applications driven by AI. Of particular note is the role of generative AI, which is expected to change 70% of the design and development effort for web applications and mobile apps by 2026.

Three Core Topics for the Integration of Trends

 

Topic 1: Protecting your Investment
To ensure the long-term success of your technology investments, it is crucial to act thoughtfully and realistically and to plan ahead. This includes considering risk and safety management in AI projects and the sustainable development of technologies.

Topic 2: The Rise of the Developers
Unleashing the creative potential of developers is a key element. This requires the use of suitable technologies and the development of roadmaps that also involve non-specialists in development.

Topic 3: Creating and delivering Value
Companies should constantly refine the user experience, adapt to changing customer requirements and explore new ways to increase sales. Algorithm-based customers and controlled access to digital tools play a central role here.

Use of the Technologies in Companies

The trends offer multiple opportunities to realize the goals of CEOs and CIOs. Through the right combination of these technologies, companies can improve their resilience, maximize the potential of data, successfully attract and retain talent, achieve ESG goals, drive growth and accelerate digital transformation.

Conclusion

The strategic technology trends identified by Gartner for 2024 provide a valuable basis for strategic planning in companies. The aim is to understand these trends, evaluate them in relation to the specific situation of your own company and integrate them accordingly. This not only protects and optimizes investments, but also paves the way for sustainable growth and innovation.

Source: Gartner


OpenAI

OpenAI: Scaling Kubernetes to 7,500 Nodes

OpenAI: Scaling Kubernetes to 7,500 Nodes

 

The American software company OpenAI has impressively scaled Kubernetes to 7,500 nodes to revolutionize its AI research (including projects like GPT-3 and DALL·E).

As an IT service provider, we keep a close eye on advanced technological developments in the industry. One notable example is the recent scaling of Kubernetes to 7,500 nodes at OpenAI. This step marks a significant advance in the infrastructure for AI research and development.

Challenges and Solutions

OpenAI's endeavor to scale a single Kubernetes cluster to 7,500 nodes is a rare and complex undertaking. The main task was to create an infrastructure suitable for both massive models such as GPT-3, CLIP and DALL-E as well as faster, smaller research projects. A key element here was the efficient use of hardware resources, especially GPUs.

Network Infrastructure

A crucial aspect of scaling was the network infrastructure. OpenAI had to move from flannel to native pod networking technologies to achieve the required throughput. The use of iptables for network monitoring was also an important step in optimizing performance.

Monitoring and Health Checks

For monitoring and analysis, OpenAI used Prometheus and Grafana. These tools were crucial for managing the growing number of metrics. Health checks, both passive and active, especially related to the GPU hardware, were critical to maintaining system performance.

Resource Allocation

The fair distribution of resources was made possible by innovative approaches such as team taints and CPU/GPU "balloons". A particularly interesting approach was the implementation of a gang scheduling plugin that enables efficient allocation and utilization of cluster resources.

Conclusion

Scaling Kubernetes to 7,500 nodes at OpenAI is an impressive milestone in the world of AI infrastructures. It demonstrates not only the power and flexibility of Kubernetes, but also how critical a carefully planned infrastructure is for success in AI research. From our point of view, this example provides valuable insights and inspiration for future IT projects and developments!

Source: OpenAI


Container-Sicherheit: 7 Strategien für IT-Verantwortliche

Container Security: 7 Strategies for IT Managers

Container Security: 7 Strategies for IT Managers

From the zero-trust approach to advanced monitoring and automation - in our blog post you can find out how to master the complex challenges of container security.

Container technologies are a cornerstone of modern IT structures. They offer a high degree of flexibility and efficiency, but also pose new challenges in terms of security. Below you will find seven strategies for effective security.

1. Implementing a Zero Trust approach

In the world of containers, data traffic between servers is more extensive and more complex. A zero-trust approach, where every machine-to-machine transaction is authenticated, is therefore essential. This approach replaces implicit trust, which is based on the location of a network or the authentication of a user in a known network, with explicit verification. In multi-cloud infrastructures, this is particularly important to effectively manage security policies and certificates.

2. Use of Monitoring Tools

Monitoring and evaluating network traffic in container environments is complex. However, modern Kubernetes monitoring tools can help to detect multi-stage and complex attacks at an early stage. They make it possible to identify attacks that occur via vulnerabilities in the network or in the services and offer protection against malware that is already in the system.

3. Use trusted Containers

The security of containers starts with onboarding. It is important to only install containers from trustworthy sources and to regularly check for security vulnerabilities. A separate, secure Docker registry can help to maintain control over the container images used and ensure that only checked and validated images are used.

4. Machine learning for Anomaly Detection

Machine learning can help detect unusual activity and anomalies in container environments. Learning algorithms and automation measures improve the ability to detect and prevent cyberattacks by analyzing behavioral patterns and highlighting conspicuous activities.

5. Automation of Container Security

The automation of security processes is of great importance in view of the large amount of data in container infrastructures. Automated and rule-based security solutions can intervene at the right moment to prevent or minimize damage. They make it possible to reduce false alarms and respond more efficiently to real threats.

6. Ensuring Up-to-dateness with Open Source

Open source technologies in container environments require continuous maintenance. Although security vulnerabilities are often fixed quickly, they also represent a large attack surface. It is therefore important to install operating system and kernel updates promptly and implement automated rollout processes.

7. Prefer integrated Cloud Solutions

An integrated cloud solution for container security is often more effective than individual open source tools. Such solutions are more up-to-date, adapt to new threats and make economic sense, especially for medium-sized companies.

Conclusion

Container security is a complex field that requires specific know-how. There is no universal strategy that fits every company. IT managers should therefore rely on experienced consultants to develop individual solutions. Containers remain an important technology for high flexibility and scalability in IT. With the right security measures, they can be used efficiently and securely.

Source: Plusserver


Cloud Computing 2024: Getting ready for the 10 leading Trends

Cloud Computing 2024: Getting ready for the 10 leading Trends

AI, hybrid cloud systems and sustainability are revolutionizing the business world. Immerse yourself in the cloud computing trends that will shape 2024 and beyond! Start getting ready for the 10 leading Trends.

Experts predict that global corporate spending on cloud computing infrastructure will exceed 1 trillion dollars for the first time in 2024. This impressive development is being driven by various factors, including the growing demand for new platforms and services "as-a-service", including artificial intelligence (AI).

Nevertheless, many companies are facing significant challenges, particularly in terms of security and data protection. However, new models, such as hybrid cloud and federated cloud systems, offer solutions that aim to combine the best aspects of different approaches and thus break down barriers.

For 2024, experts predict that the cloud will continue to be a dynamic and exciting driver of innovation and opportunity. Here are the most important trends in cloud computing:

1️⃣ AI-as-a-Service

In 2024, AI will no longer just be a niche topic. Companies will be able to access advanced AI services without having to invest in their own expensive infrastructure. These services will also enable smaller companies to benefit from AI-driven analysis, automation and customer interactions.

2️⃣ Hybrid and Multi-Cloud

The trend is moving towards a flexible combination of public and private cloud solutions. This allows companies to benefit from the advantages of both worlds: the security of private clouds and the scalability and cost efficiency of public clouds.

3️⃣ Real-time Cloud Infrastructure

Processing and analyzing data in real time is becoming increasingly important. Faster data flows and immediate insights are crucial for decision-making and customer engagement.

4️⃣ Cloud-driven Innovation and Transformation

Companies are using the cloud to develop new business models and strategies. The cloud is becoming a catalyst for entrepreneurial change and innovation.

5️⃣ Cloud Security and Resilience

As cyberattacks increase, so does the need to make cloud platforms more secure. The trends in 2024 show that companies will increasingly invest in advanced security systems and resilience strategies.

6️⃣ Sustainable Cloud Computing

In view of the global climate crisis, sustainability will also play a greater role in IT. More efficient data centers and the use of renewable energy are just some of the measures being taken in the cloud computing industry.

7️⃣ Simplified Cloud Computing

The user-friendliness of cloud services is being improved in order to reach a broader user base. This includes intuitive interfaces and simplified management tools.

8️⃣ Data Protection in the Cloud

As awareness of data protection increases, new standards and technologies are expected in 2024 to ensure the privacy and security of data in the cloud.

9️⃣ Serverless and pay-as-you-go Cloud

Flexible billing models are becoming increasingly popular. Companies only pay for the resources they actually use, which improves cost control and scalability.

🔟 Edge Computing everywhere

Edge computing brings data processing and analysis closer to where the data is generated. This leads to faster insights and lower latency, especially important for IoT devices and mobile applications.

To summarize, cloud computing in 2024 will not only be a tool to save time and reduce costs, but an essential component for companies' innovation and competitiveness. The emerging trends show that the future of the cloud is diverse, exciting and full of opportunities.

Source: Forbes


NIS2

NIS2 - An Introduction to the EU Directive

NIS2 - An Introduction to the EU Directive on Network and Information Security

The Network and Information Security Directive 2 (NIS2) is an EU directive that will be transposed into German legislation by the end of 2024. The full directive can be found at https://eur-lex.europa.eu/legal-content/DE/TXT/HTML/?uri=CELEX:32022L2555#ntr5-L_2022333DE.01008001-E0005. As the successor to NIS1, which came into effect on June 29, 2017 (see https://www.bsi.bund.de/DE/Das-BSI/Auftrag/Gesetze-und-Verordnungen/NIS-Richtlinie/nis-richtlinie_node.html), NIS2 aims to strengthen cybersecurity in businesses, minimize risks, and avoid damage from cyberattacks.

Although NIS1 has been in existence for many years, NIS2 is now gaining increased attention because the draft will significantly obligate a larger number of companies to implement the prescribed measures. Companies should assess early on whether they are affected, as the implementation of the directive may take several months to years.

centron provides support for the security of IT infrastructures by offering computing power and data storage from an ISO 27001 certified data center according to the BSI IT basic protection standard (https://www.centron.de/warum-iso-27001-zertifiziert/). As a strong partner, centron can help overcome one of the most significant hurdles in the implementation of a successful Information Security Management System (ISMS).

The Federal Office for Information Security (BSI) provides an introduction to the topic of ISMS at https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Grundschutz/BSI_Standards/standard_200_1.html?nn=440524. An ISMS includes basic components such as management principles, resources for information security, employee involvement in the security process, security process, security concept, and security organization.


Sustainability in the Cloud: Myth or Reality?

Sustainability in the Cloud: Myth or Reality?

As awareness of environmental issues increases, the sustainability of cloud operators is coming into focus. It is becoming increasingly important to understand the trend towards the "green" cloud - but what exactly does that mean?

Public cloud hyperscalers, with their enormous capacities and rapid growth, are at the center of environmental controversies. Their cumulative energy and water consumption makes many users feel guilty. Measures such as the use of renewable energies, greenhouse gas reduction and water conservation are therefore key aspects in the discussion about a more sustainable cloud.

"Green" Clouds - more than just a Promise?

Microsoft and Amazon claim that their cloud services are highly energy efficient. While Microsoft speaks of up to 93 percent higher energy efficiency, Amazon claims that its AWS infrastructure is up to five times more efficient than typical European data centers. However, these claims should be taken with a grain of salt, as they may be part of a self-promotion strategy.

Innovative Technologies to save Resources

Technologies such as immersion cooling at Microsoft and evaporative cooling at Amazon show that cloud providers are making serious efforts to minimize their environmental impact - not a myth? Particularly noteworthy are the efforts to reduce water consumption and the treatment of used cooling water.

Energy Sources and environmental Investment

One critical point is the origin of the energy. Amazon, for example, relies on wind and photovoltaic systems to achieve its sustainability goals. Microsoft is investing in clean energy storage and fuels, with hydrogen playing a central role.

Amazon and Microsoft are investing in projects to reduce their carbon footprint. For example, Amazon is researching CO2 reduction through algae cultivation, while Microsoft offers transparency in terms of environmental impact with its Cloud for Sustainability project.

German Cloud Providers - a Role Model for Sustainability?

In addition to the global players, efforts are also being made in Germany for a more sustainable cloud. Companies such as centron are focusing on environmentally friendly technologies and innovative approaches to cloud provision.

The new German Energy Efficiency Act (EEffG) and the EU Directive on the disclosure of non-financial information are setting new standards in terms of sustainability and energy efficiency. These developments are increasing the pressure on companies to reduce their environmental impact and make it transparent.

Conclusion: A necessary Discourse

It is clear that both leading hyperscalers and smaller cloud service providers are moving towards sustainability. However, the focus on different aspects of sustainability varies. A critical examination of the actual environmental impact and the transparency of measures therefore remains essential. Each individual is called upon to play an active role in the discourse and to critically scrutinize developments.

Source: IT-Business