Page 1,303«..1020..1,3021,3031,3041,305..1,3101,320..»

Radware wins two golds for application security in 2023 … – iTWire

COMPANY NEWS: Radware, a leading provider of cyber security and application delivery solutions, today announced that it is the winner of two 2023 Cybersecurity Excellence Awards.

The company's API Discovery and Protection solution received gold honours in the API Security category and the Radware SecurePath architecture won gold in the Web Application Security category.

The 2023 Cybersecurity Excellence Awards honour individuals and companies that demonstrate excellence, innovation, and leadership in information security. The 2023 awards program, which is produced by Cybersecurity Insiders and the Information Security Community on LinkedIn, included more than 800 entries.

"We are proud to be recognised among the industry's top innovators," said Radware chief marketing officer Sharon Trachtman. "At a time when the cyber security talent shortage is at an all-time high, our application security solutions offer consistent, high-grade protection across complex hybrid environments while helping companies reduce overhead and administration.

"It's a combination that's core to the value proposition we deliver for our customers every day."

Radware's API Discovery capabilities enable security teams to automatically identify and secure undocumented APIs without relying on human intervention or application and security expertise.

Using advanced machine-learning algorithms, Radware's API protection works in real time to detect and block a broad range of threats. This includes defence against access violations, data leakage, automated bot-based threats, and DDoS and embedded attacks.

Radware's Cloud Application Protection Services uniquely leverage Radware SecurePath architecture to safeguard today's multi-cloud application environments, while maintaining consistent, comprehensive protection for applications regardless of where they're deployed.

Radware's application security architecture can be deployed either as an "inline" or API-based out-of-path SaaS service, enabling coverage of any data centre and cloud platform with minimal latency, interruptions, and risks to uptime and availability.

The 2023 Cybersecurity Excellence Awards add to Radware's other industry recognitions. Industry analysts such as Aite-Novarica Group, Forrester Research, Gartner, GigaOm, KuppingerCole and Quadrant Knowledge Solutions continue to recognise Radware as a market leader in cyber security. The company has received numerous awards for its application and API protection, web application firewall, bot management, and DDoS mitigation solutions.

About Radware

Radware is a global leader of cyber security and application delivery solutions for physical, cloud, and software defined data centres. Its award-winning solutions portfolio secures the digital experience by providing infrastructure, application, and corporate IT protection, and availability services to enterprises globally. Radware's solutions empower enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity, and achieve maximum productivity while keeping costs down. For more information, please visit the Radware website.

Reducing WAN latency is one of the biggest issues with hybrid cloud performance. Taking advantage of compression and data deduplication can reduce your network latency.

Research firm, Markets and Markets, predicted that the hybrid cloud market size is expected to grow from US$38.27 billion in 2017 to US$97.64 billion by 2023.

Colocation facilities provide many of the benefits of having your servers in the cloud while still maintaining physical control of your systems.

Cloud adjacency provided by colocation facilities can enable you to leverage their low latency high bandwidth connections to the cloud as well as providing a solid connection back to your on-premises corporate network.

Download this white paper to find out what you need to know about enabling the hybrid cloud in your organisation.

DOWNLOAD NOW!

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

Read this article:
Radware wins two golds for application security in 2023 ... - iTWire

Read More..

Serverless Security Market to Hit USD 15.69 Billion by 2030 due to … – GlobeNewswire

Pune, March 27, 2023 (GLOBE NEWSWIRE) -- The SNS Insider reported that the size for Serverless Security Market was valued at USD 1.79 billion in 2022, and it is projected to reach USD 15.69 billion by 2030, with a compound annual growth rate (CAGR) of 31.12% during the forecast period of 2023 to 2030.

Market Overview

With serverless computing, your code and data are stored on third-party servers. Therefore, it is critical to ensure that these servers are secure and that your data is protected. Data breaches and other security incidents can damage an organization's reputation. By implementing serverless security measures, organizations can demonstrate that they take their security responsibilities seriously, which can help build trust with customers and partners.

Market Analysis

The key driver for the serverless security market is the rapid adoption of serverless computing technology by organizations of all sizes. Serverless computing offers several benefits, including scalability, cost efficiency, and reduced operational overhead. As a result, it has become a popular choice for developing and deploying cloud-native applications. Another key driver for the market is the increasing number of regulations and compliance standards that organizations must adhere to. These regulations often require strict security measures to be implemented, and serverless security solutions can help organizations meet these requirements.

Get a Sample Report of Serverless Security Market@ https://www.snsinsider.com/sample-request/2578

Key Company Profiles Listed in this Report Are:

Impact of Recession on Serverless Security Market Growth

A recession is likely to have both positive and negative impacts on the serverless security market. While some businesses may delay or cancel serverless security projects, the overall demand for serverless architecture is likely to remain strong. The key for vendors will be to offer cost-effective solutions that meet the needs of businesses looking to cut costs without sacrificing base level margin.

Serverless Security Market Report Scope:

Key Regional Developments

North America is expected to dominate the serverless security market during the forecast period. The region's significant market share can be attributed to the presence of major IT businesses, including cloud service providers and technology giants, which are driving the adoption of serverless security solutions. The United States and Canada, two of the largest economies in North America, have a strong financial position and a thriving technology industry, which enable them to invest heavily in leading services of the market. This has led to the development of innovative serverless security solutions that cater to the specific needs of North American businesses.

Enquiry about Report@ https://www.snsinsider.com/enquiry/2578

Key Takeaway from Serverless Security Market Study

Recent Developments Related to Serverless Security Market

Table of Contents

1. Introduction

2. Research Methodology

3. Market Dynamics

4. Impact Analysis

5. Value Chain Analysis

6. Porters 5 Forces Model

7. PEST Analysis

8. Serverless SecurityMarket Segmentation, By Service Model

9. Serverless Security Market Segmentation, By Security Type

10. Serverless Security MarketSegmentation, By Organization Size

11. Serverless Security Market Segmentation, By Verticals

12. Regional Analysis

13. Company Profiles

14. Competitive Landscape

15. Conclusion

Buy Single-User PDF of Serverless Security Market Report@ https://www.snsinsider.com/checkout/2578

About Us:

SNS Insider is one of the leading market research and consulting agencies that dominate the market research industry globally. Our company's aim is to give clients the knowledge they require in order to function in changing circumstances. In order to give you current, accurate market data, consumer insights, and opinions so that you can make decisions with confidence, we employ a variety of techniques, including surveys, video talks, and focus groups around the world.

Access Complete Report Details@ https://www.snsinsider.com/reports/serverless-security-market-2578

Read the original post:
Serverless Security Market to Hit USD 15.69 Billion by 2030 due to ... - GlobeNewswire

Read More..

Why IT operations are evolving in a multi-cloud environment – IT Brief Australia

As the usage of cloud platforms and resources has increased in recent years, the approach being taken by organisations to their IT operations (ITOps) has needed to evolve.

Techniques and strategies that worked when IT resources were housed in on-premise datacentres are not suited to a world where workloads are often spread across multiple cloud platforms. In many cases, the focus now needs to be on how to streamline and automate management tasks.

The role of ITOps

By definition, ITOps is a discipline that covers the actions and decisions made by an organisations operations team that is responsible for its IT infrastructure. It refers to the process of acquiring, designing, deploying, configuring, and maintaining equipment and services that support business functions.

The main goal of ITOps is to provide a high-performing and consistent IT environment. To achieve this, different members of the team are given responsibility for specific tasks.

For example, a system administrator will be charged with configuring servers, installing applications, and monitoring the overall health of the infrastructure. At the same time, a network administrator will deploy and manage network links, create and authorise user profiles, and monitor secure access.

Some ITOps team members will focus their attention on the management of physical servers and associated equipment, while others will be responsible for cloud computing platforms and services.

Having a well-resourced ITOps team in place is critical for any organisation, especially as growing numbers of workloads are being shifted to cloud platforms. This is because complexity can quickly increase, especially when multiple platforms are linked to legacy on-premise resources.

Delivering business value

When functioning properly, ITOps can help an organisation to achieve its business goals, improve product delivery, and plan for future growth. Its value can be assessed by considering four key factors:

1. Usability: Assess how well the ITOps team is managing the performance of key applications and ensuring optimal user experiences at all times.

2. Functionality: Examine whether all core systems are functioning as they should across the organisation.

3. Reliability: Monitor the number of system failures that occur and the time that is required to restore normal function.

4. Performance: Maintain oversight of the overall performance of the entire IT infrastructure and any changes in configuration that may be required.

Differentiating between ITOps, DevOps, and DevSecOps

Its worth taking the time to understand the key differences between the three groups that exist within many organisations: ITOps, DevOps, and DevSecOps.

ITOps is responsible for all IT operations, including the end users, while DevOps is focused on agile integration and delivery practices and improving workflows. DevOps works in conjunction with IT. However, it has a different broad visibility of the entire technology stack, as is the case for ITOps.

Many organisations are also integrating application security into their DevOps teams and renaming them DevSecOps. The goal of this shift is to improve application security during development and in runtime while also promoting greater security awareness overall.

Further evolution

Within some organisations, there are even further changes being made to the structure and function of IT departments. As workloads increasingly shift to public, private, and hybrid cloud environments, CloudOps teams are being created to help IT, and DevOps manage the resulting increased complexity.

In other cases, AIOps (Artificial Intelligence for IT Operations) teams are also being created. Their task is to combine big data, AI algorithms, and machine learning to deliver actionable, real-time insights that help the ITOps team to continuously improve operations.

These teams can use data collected from both virtual and non-virtual environments in multiple feeds. This data can then be normalised, structured, and aggregated to produce alerts.

AIOps teams can also apply AI and machine learning to identify normal behavioural patterns and topologies within data, correlate relationships, and detect anomalies. Teams can also use automation tools to continuously gather high-fidelity data in context without manual configuration or scripting.

While ITOps relies on manual correlations and dashboards for analysis, AIOps uses AI and machine learning for automatic analysis and insights. AIOps also provides contextual understanding of anomalies and event correlation in relation to an organisations IT infrastructure, systems, and applications.

Having an understanding of how these different groups both function and work together is important to ensure the proper operation of any large IT department. They demonstrate that, as the nature of IT infrastructures evolves, the traditional lines of demarcation are also changing.

Go here to read the rest:
Why IT operations are evolving in a multi-cloud environment - IT Brief Australia

Read More..

Critical flaw in AI testing framework MLflow can lead to server and data compromise – CSO Online

MLflow, an open-source framework that's used by many organizations to manage their machine-learning tests and record results, received a patch for a critical vulnerability that could allow attackers to extract sensitive information from servers such as SSH keys and AWS credentials. The attacks can be executed remotely without authentication because MLflow doesn't implement authentication by default and an increasing number of MLflow deployments are directly exposed to the internet.

"Basically, every organization that uses this tool is at risk of losing their AI models, having an internal server compromised, and having their AWS account compromised," Dan McInerney, a senior security engineer with cybersecurity startup Protect AI, told CSO. "It's pretty brutal."

McInerney found the vulnerability and reported it to the MLflow project privately. It was fixed in version 2.2.1 of the framework that was released three weeks ago, but the release notes don't mention any security fix.

MLflow is written in Python and is designed to automate machine-learning workflows. It has multiple components that allow users to deploy models from various ML libraries; manage their lifecycle including model versioning, stage transitions and annotations; track experiments to record and compare parameters and results; and even package ML code in a reproducible form to share with other data scientists. MLflow can be controlled through a REST API and command-line interface.

All these capabilities make the framework a valuable tool for any organization experimenting with machine learning. Scans using the Shodan search engine reinforce this, showing a steady increase of publicly exposed MLflow instances over the past two years, with the current count sitting at over 800. However, it's safe to assume that many more MLflow deployments exist inside internal networks and could be reachable by attackers who gain access to those networks.

"We reached out to our contacts at various Fortune 500's [and] they've all confirmed they're using MLflow internally for their AI engineering workflow,' McInerney tells CSO.

The vulnerability found by McInerney is tracked as CVE-2023-1177 and is rated 10 (critical) on the CVSS scale. He describes it as local and remote file inclusion (LFI/RFI) via the API, where a remote and unauthenticated attackers can send specifically crafted requests to the API endpoint that would force MLflow to expose the contents of any readable files on the server.

For example, the attacker can include JSON as part of the request where they modify the source parameter to be whatever file they want on the server and the application will return it. One such file can be the ssh keys, which are usually stored in the .ssh directory inside the local user's home directory. However, knowing the user's home directory in advance is not a prerequisite for the exploit because the attacker can first read /etc/passwd file, which is available on every Linux system and which lists all the available users and their home directories. None of the other parameters sent as part of the malicious request need to exist and can be arbitrary.

What makes the vulnerability worse is that most organizations configure their MLflow instances to use Amazon AWS S3 for storing their models and other sensitive data. According to Protect AI's review of the configuration of the publicly available MLflow instances, seven out of ten used AWS S3. This means that attackers can set the source parameter in their JSON request to be the s3:// URL of the bucket used by the instance to steal models remotely.

It also means that AWS credentials are likely stored locally on the MLflow server so the framework can access S3 buckets, and these credentials are typically stored in a folder called ~/.aws/credentials under the user's home directory. Exposure of AWS credentials can be a serious breach because depending on the IAM policy, it can give attackers lateral movement capabilities into an organization's AWS infrastructure.

Requiring authentication for accessing the API endpoint would prevent exploitation of this flaw, but MLflow does not implement any authentication mechanism. Basic authentication with a static username and password can be added by deploying a proxy server like nginx in front of the MLflow server and forcing authentication through that. Unfortunately, almost none of the publicly exposed instances use such a setup.

"I can hardly call this a safe deployment of the tool, but at the very least, the safest deployment of MLflow as it stands currently is to keep it on an internal network, in a network segment that is partitioned away from all users except those who need to use it, and put behind an nginx proxy with basic authentication," McInerney says. "This still doesn't prevent any user with access to the server from downloading other users' models and artifacts, but at the very least it limits the exposure. Exposing it on a public internet facing server assumes that absolutely nothing stored on the server or remote artifact store server contains sensitive data."

See the original post here:
Critical flaw in AI testing framework MLflow can lead to server and data compromise - CSO Online

Read More..

Progress offers free developer training – iTWire

Application development and infrastructure software provider Progress is offering free online training and certification for users of its OpenEdge application development platform.

"Throughout the pandemic, we saw the IT skills gap become wider and more prominent due to enterprises' heightened reliance on technology. This gap not only impacts the people looking for meaningful careers but the companies seeking qualified professionals," said Progressexecutive vice president and application and data platform general manager John Ainsworth.

"For over 40 years, Progress has enabled developers to build their own applications and turn their ideas into business reality. Our training and certification program will help expand the IT talent pool and allow future developers and entrepreneurs to see how quickly they can create applications that will have an impact."

The training program comprises eight self-paced courses and a final certification exam, which Progress suggests will take around 73 hours to complete. No previous knowledge of coding is required.

Those successfully finishing the program will be able to build enterprise applications using OpenEdge 12.

Enrolments are open here.

Reducing WAN latency is one of the biggest issues with hybrid cloud performance. Taking advantage of compression and data deduplication can reduce your network latency.

Research firm, Markets and Markets, predicted that the hybrid cloud market size is expected to grow from US$38.27 billion in 2017 to US$97.64 billion by 2023.

Colocation facilities provide many of the benefits of having your servers in the cloud while still maintaining physical control of your systems.

Cloud adjacency provided by colocation facilities can enable you to leverage their low latency high bandwidth connections to the cloud as well as providing a solid connection back to your on-premises corporate network.

Download this white paper to find out what you need to know about enabling the hybrid cloud in your organisation.

DOWNLOAD NOW!

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

Visit link:
Progress offers free developer training - iTWire

Read More..

Smart DC, Building the Green Future: Huawei Unveils Top 10 … – iTWire

Chinese tech giant Huawei recently held the Top 10 Trends of Data Center Facilities conference, themed "Smart DC, Building the Green Future".

The conference coincided with Fei Zhenfu, President of Huawei Data Center Facility Domain, releasing a white paper outlining Huawei's insights on data center facility trends that aim to promote sustainable development in the data center industry.

According to Fei Zhenfu, as global computing demand continues to grow exponentially in the digital intelligence era, there will be a surge in data center construction - and to achieve carbon neutrality, the industry must prioritise energy conservation, carbon emission reduction, and green transformation.

He said this presents both challenges and opportunities and, drawing from its experience and industry insights, Huawei has identified the following 10 trends:

Trend 1: Low CarbonData centers will adopt green, low-carbon solutions and utilize clean energy sources like PV, wind, and hydropower to minimize their carbon footprint. By 2027, green power utilization is expected to exceed 50%. Advanced energy conservation solutions and technologies, such as waste heat recovery, will be implemented to improve data center energy efficiency and recovery rates.

Trend 2: SustainabilityNew sustainability indicators for data centers will be introduced, including renewable energy utilization, water usage effectiveness (WUE), carbon usage effectiveness (CUE), space usage effectiveness (SUE), grid usage effectiveness (GUE), material recovery rate, and lifetime contaminant emissions, in addition to the existing power usage effectiveness (PUE).

Trend 3: Fast DeploymentData centers must be rapidly deployed to meet skyrocketing computing demands, with construction periods decreasing from 12 months to six months or less.

Trend 4: High DensityAs chip performance and power consumption improve, the demand for high-density data centers will increase. Cloud data centers will become mainstream, and diversified computing collaboration will become the norm. Standard power density per IT rack will increase from 68 kW to 1215 kW by 2027. Power density in supercomputing and intelligent computing centers will reach 30 kW or higher.

Trend 5: ElasticityFuture data centers will be more flexible regarding upgrades, with one generation of facilities supporting power evolution over two to three generations of IT equipment. A standard design will facilitate on-demand deployment and elastic capacity expansion.

Trend 6: PrefabricationThe prefabricated and simple architecture will tackle challenges like long construction periods and complex O&M faced by traditional data centers. In the future, a data center building will house over 1000 racks, and a campus will accommodate over 10,000 racks. The prefabricated design will shorten the construction period for a 1000-rack data center from 12 months to 6 months, enabling rapid delivery and on-demand deployment.

Trend 7: Storage and Backup IntegrationRenewable energy and energy storage will be necessary for power-hungry data centers. Energy storage systems (ESSs) deployments in data centers will integrate short-term backup power systems to participate in frequency regulation and peak shaving, enhancing power grid stability. Peak shaving will also improve the grid usage effectiveness (GUE) so that more IT racks can be deployed to increase revenue.

Trend 8: Distributed CoolingA distributed cooling system uses cooling sources for each data hall and adopts a redundancy configuration as required. In the future, distributed cooling systems will gradually replace centralized cooling as the preferred solution for large data centers due to their flexible architecture and high reliability.

Trend 9: Smart O&MSmart O&M is crucial for enhancing data center resource utilization and reliability. Intelligent operations will automatically determine data center asset statuses to maximize asset value. Intelligent maintenance will identify faults and optimize energy conservation in real time to improve O&M efficiency, achieving predictive maintenance and optimal energy efficiency.

Trend 10: Security & TrustworthinessAs digitalization and intelligence advance, data centers will strengthen their hardware reliability, software security, system resilience, safety, privacy, and availability. AI technologies will implement predictive maintenance on components, devices, and systems at the hardware level. The hierarchical defense will be provided at the software level. A combination of software and hardware measures will boost data center reliability.

Moving forward, Huawei says it will strengthen technological innovation to lead industry development and offer more competitive products and solutions to build a solid digital foundation for a greener, low-carbon future for the data center industry.

For more information, download the Huawei' White Paper on the Top 10 Trends of Data Center Facilities at https://digitalpower.huawei.com/attachments/index/06be6a70172444d1a84f88b8e0db5c29.pdf

See more here:
Smart DC, Building the Green Future: Huawei Unveils Top 10 ... - iTWire

Read More..

Why health care will benefit the most from AI revolution – The Week

CIM HAS NOT attended medical college. It is not even human. But the AI-based engine is way more equipped to give a better diagnosis than you googling your symptoms and hoping to play doctor. Recently integrated into the clinics at Apollo Hospitals, CIM, or Clinical Intelligence Machine, analyses symptoms, determines causes and recommends the best course of action for a patient.

The engine is only part of the many AI-based initiatives implemented by Apollo across the country to improve diagnosis, doctor productivity and patient satisfaction, said Sangita Reddy, joint managing director of Apollo Hospitals. We have moved a step forward for better patient experience. Technology is transforming the face of healthcare, making it more patient-centric and also reducing the burden on health care professionals.

Startups and tech companies have been devising AI and ML tools that can assist in healthcare, both preventive and curative. From the perspective of AI for social impact, health care is an immediate beneficiary, said Soma Dhavala, director, machine learning at Wadhwani AI, an institute which studies how AI can be used to improve lives and livelihood.

Apollo has launched many AI initiatives. AI-CVD, for instance, is an intelligent platform to predict heart attacksdesigned specifically keeping Indians in mind. It is developing similar AI-based algorithms for diabetes, cancer and other non-communicable diseases, too. Besides CIM, it uses ProHealth platform, an AI-enabled personalised predictive health-risk assessor that uses data and functions to personally guide individuals to manage their own health.

With adoption and implementation of AI in the health care sector, medical experts are now being able to deliver a customised and more precise health care services to the patients, said Reddy. The AI initiatives at the hospital chain range from better diagnosis and better monitoring (smart in-patient room automation with AI-powered triaging system that continuously monitors the patients heart rate and respiratory rate) to even in radiology.

Many health care startups are looking at including predictive analysis, where a patients condition is compared both with data of hundreds of thousands of other similar patient records (available through cloud servers) and the patients own status, or predict whether the patient is likely to have a recurrence. Such techs are increasingly in demand in many countries where immediate re-admission of an insured patient comes with government penalties.

Of course, the age of goodbye doc, hello app may still have to wait, but progress in medical AI has reached a stage where tech companies, in India and abroad, are investing big in coming up with tailor-made solutions. Harman, a subsidiary of Samsung, recently came up with two offeringsone, a media suite that can track a patient to alert the nursing station or doctor the moment the patient behaves abnormally, and second, an Intelligent Healthcare Platform (IHP), targeted at making players right from insurance companies and pharma majors to the hospitals and their ancillaries systems interoperable.

Built at its Bengaluru centre and made for the world, these new AI tools could reimagine patient care. In reality, patient data is only based on info from one company, whereas you can get much better decision matrices if you bring in data from the patients records in other systems too, said Jai Ganesh, chief technology officer of Harman.

The proliferation of AI in the medical sector depends on how well its appetite for data is satiated, though that could bring with it its own set of issues. To some extent it will be scary if you dont implement a lot of the control mechanisms, said Ganesh. Responsible AI is important, the model should be explainable, bias free, trustworthy and ethical. The data scientists and machine learning engineers should be trained on some of these aspects, rather than (just) bytes and coding.

While patient care is one area where AI could work its magic, it could save billions of dollars in the drug industry. Bringing a new drug to the market is an expensive process, with the drug discovery alone costing a third of the total cost. With AI designing drugs for various purposes, pharma can substantially cut costs and the time required for drug discovery, said Mayank Mathur, academic director of the Institute of Data Science at Indian School of Business in Hyderabad.

The World Economic Forum predicted that AI could sort Indias acute shortage of doctors (64 for one lakh people compared with a global average of 150). The governments Integrated Disease Surveillance Programme last year onward started using automated disease monitoring right down to local levels to filter and collate events of interest, giving advance notice to a possible infectious outbreak. It is now leveraged by the verification cell of the National Centre for Disease Control.

Medical science could gain more once AI technologies evolve and advance. AI techniques are being employed to solve complex problems such as predicting protein properties, designing molecules, optimising synthetic routes, and visualising protein-drug interactions and protein-protein interactions, said Soharab Hossain Shaikh, assistant professor at BMU. In the days to come, we may witness the integration of AI with tissue engineering, promoting bone regeneration and advancing the field of regenerative medicine.

Visit link:
Why health care will benefit the most from AI revolution - The Week

Read More..

Rackspace Technology Assists Switchfly in Migrating to AWS, with … – StreetInsider.com

Get inside Wall Street with StreetInsider Premium. Claim your 1-week free trial here.

SAN ANTONIO, March 27, 2023 (GLOBE NEWSWIRE) -- Rackspace Technology (NASDAQ: RXT), a leading end-to-end, multicloud technology solutions company, recently completed an engagement with Switchfly, a leading travel loyalty, rewards, and packaging solution for airlines, financial service companies, and HR Tech Rewards & Recognition vendors. Working closely with the Switchfly team, Rackspace Technology was able to successfully migrate the organization to Amazon Web Services (AWS), allowing them to maintain constant uptime and achieve a 4x improvement in agent booking retrieval time.

Founded in 2003, Denver-based Switchfly connects all aspects of travel from flights and hotels to car rentals, traveler support, customer loyalty, and employee rewards programs into one seamless experience that integrates with rewards and loyalty platforms. As a leader in the travel rewards industry, Switchfly processes roughly $3 billion in bookings annually.

Rackspace Technology was able to help us achieve our objective of eliminating data centers and modernizing our tech stack selectively to ensure that we hit our aggressive timeline, said Ed Estabrook, Chief Technology Officer, Switchfly. As to performance of the application, pulling up an agent booking, which happens every time someone calls, went from 20 seconds down to five seconds. Bringing down that response time was incredibly powerful.

Because Switchfly's primary focuses are constant uptime and rapid uptime, a high degree of responsiveness is critical to customer success. The company also needed a solution that could allow for future expansion and ease the addition of new services and features without making changes to a monolithic application. Switchfly had to decide whether it wanted to re-commit to on-premises hardware management or move to a cloud environment through the AWS Migration Acceleration Program (MAP), a comprehensive and proven cloud migration program based upon AWSs experience on migrating thousands of enterprise customers to the cloud. Migration became the priority.

The migration, led by Rackspace Technology, included 20 clients, 70 services, 700 servers and 16 terabytes of data to modern tech stack running on AWS, including Amazon Relational Database Service (Amazon RDS), a collection of managed services that makes it simple to set up, operate, and scale databases in the cloud. This migration also freed the performance of the application for certain activities that had previously been bound by Switchflys own infrastructure. Switchfly also used Rackspace Optimizer+ to reduce costs.

We are proud to have helped Switchfly adopt the significantly faster and more resilient Amazon RDS managed database solution, said Vikram Reddy Kosanam Director, Data Services Delivery, Rackspace Technology. We were also able to help them successfully migrate their clients and determine the right amount of computing power, saving money through Rackspace Optimizer+.

To learn more about the Rackspace Technology and Switchfly partnership, watch theirvideoor clickherefor their case study.

About Rackspace TechnologyRackspace Technology is a leading end-to-end multicloud technology services company. We can design, build and operate our customers' cloud environments across all major technology platforms, irrespective of technology stack or deployment model. We partner with our customers at every stage of their cloud journey, enabling them to modernize applications, build new products and adopt innovative technologies.

Media ContactNatalie Silva[emailprotected]

View original post here:
Rackspace Technology Assists Switchfly in Migrating to AWS, with ... - StreetInsider.com

Read More..

Overcoming legal talent crunch requires the right tools – iTWire

GUEST OPINION: Australias legal profession is faced with a new and intersecting set of challenges.

International conflict and inflation have raised expenses for firms, while the poaching and turnover of staff is at an all-time high.

Such is the talent crunch that local firms have introduced fertility and parental leave, recharge days and flexible hours to attract and retain employees.

Adding to the challenge is the fact most of Australias legal professionals work in the capital cities. In NSW, for instance, recent figures revealed 48% of lawyers work in Sydney city, compared with 12% in the regions.

This is significant because a record number of Australians have re-located to the regions, which includes potential lawyers of the future. Also, clients in the country have historically preferred local legal firms that understand their unique, cultural and familial issues, which often span generations.

The considerable distance between regional locations and cities can also be a deterrent for people seeking legal services, particularly for those experiencing abuse. In fact, partly due to skills shortages, there have been reports of people in remote indigenous communities representing themselves in court without proper legal knowledge.

There is a clear and urgent need for legal organisations to accelerate hybrid work investments. By allowing lawyers to work reliably from any location, and providing autonomy over their working hours and arrangements, firms will have their best shot at boosting productivity retention. This is evidenced by a recent survey finding that flexibility over office hours is one of the top considerations for Australias legal professionals when theyre looking for work.

Building on existing hybrid work arrangements will also let firms properly onboard and collaborate staff across a wider range of physical locations, bringing big law firm expertise into the under-resourced regions, and nurturing the workforce of the future. As we know, lawyers, particularly those early in their careers, develop and learn best when they regularly communicate with clients and co-workers.

Additionally, the use of secure and authorised hybrid work platforms allows lawyers to do their jobs as intended, gives bosses assurance client information can be retained when people leave the organisation, and grants clients the confidence their private data is being stored and exchanged safely.

Brisbane law firm invests in hybrid work and reaps benefitsIn recent years, Brisbane-based McCarthy Durie Lawyers (MDL), which has 70 employees, faced challenges due to technology limitations. Notably, for around a day per month, the phone systems would go down, forcing the team to revert to manual workarounds. A lot of calls died or didnt go anywhere, resulting in lost business.

According to CEO Shane McCarthy, when pandemic lockdowns were mandated, the firm also wanted to roll out hybrid work in a way that enabled staff to work in a way that suited their life. Wellbeing was a priority, and MDL wanted to prevent staff from chewing into their personal time to make up for technical shortcomings.

By renewing its hybrid work strategy, including giving staff the ability to work across locations from their personal devices, MDL has reported both improved staff and customer retention.

McCarthy said this is largely to do with the ease with which staff can collaborate in one place, which has also provided assurances around the security of private client information, and ensures continuity of services if people leave the organisation.

Staff can now also be recruited from locations outside Brisbane, and train themselves, negating the resource-draining endeavour of onboarding new members. This has allowed MDL to bring city-quality legal services to regional hubs around Australia, and to collaborate and share expertise across the business when additional cases arise.

In the case of MDL, the boosted productivity resulting from enhanced work arrangements, and its ability to operate like large-sized firm and tackle large client accounts as a result, is clear to see.

Australias legal sector is navigating unchartered waters. The course needs urgent correction so Australians have uninterrupted access to an essential service, and professionals can develop and thrive in their careers, unencumbered by technological shortcomings.

By prioritising flexibility and choice for staff by putting the right technology in their corner, local firms will have their best chance at meeting todays challenges and setting themselves up for the future.

Visit link:
Overcoming legal talent crunch requires the right tools - iTWire

Read More..

Exclusive Interview with Check Point’s Harish Kumar: Insights on India’s Cybersecurity Landscape and Plans for – Times Now

Updated Mar 27, 2023 | 06:53 PM IST

Harish Kumar GS, Head, Enterprise & Government, Check Point Software Technologies, India & SAARC

Excerpts:

Siddharth: There has been news of a lot of cyberattacks lately in the country. More companies are getting targeted, so whats your outlook on the current cybersecurity landscape in India?

Siddharth: Do you see state sponsored threats becoming a trend this year?

Siddharth: How is Checkpoint positioned? In what all areas is the company currently present in and how is the Indian market shaping for Check Point?

Harish: India is one of our very important markets in the world. We've invested significantly in the country. If you look at it, we operate the network protection, which is where we invented the state full inspection firewall concept. We were one of the early proponents of protection as a mechanism in the world. As we complete 30 years of existence, we are proud to share that we are one of the oldest cybersecurity companies in the world, which has survived and flourished.

Apart from the network, Cloud is another big focus area for us and our product is called Cloud Guard. Nowadays, if a customer or an organization wants to move into the cloud, security must be a priority right from the start. We are one of the first prevention based CNAPP architecture and we cater to the four Cs of the cloud. Gone are the days when servers and storage were installed in a data center and one could physically view them, now even infrastructure is on a code and Check Point protects the code, the Kubernetes clusters, containers, and the cloud hosting war.

We also manage access and access points. Post-pandemic, with the remote workforce endpoint and access protection has grown big. We provide secure access to corporate networks and applications. Hence, SSE or SASE is a very fast-growing area for us. Another big area is EDR- XDR which is to protect your devices in the network, whether it is remote or on the premise, and drawing out the intelligence from what's happening in each of these devices. That host of products is called as Harmony, and we are doing well in that segment.

Overall, the key differentiator for us is the single pane view we offer to our customers. If you take any organization, theres the network, workload on the cloud, and a mobile workforce. In such a scenario, having a single pane of view across these three aspects of your organization becomes crucial and we provide that to our customers. We refer to this architecture as Infinity and we are seeing a lot of positivity in the market around such an offering.

Siddharth: You have a lot of solutions and products for the industry what do you think is the current awareness levels and requirement and demand for cybersecurity in India?

Harish: The awareness is quite high, even small and medium organizations are aware of threats online. However, one of the barriers to cybersecurity adoption has been the high cost. For instance- For an organization of 1000 - 2000 employees that has a turnover of around 200 crores. If you have to protect yourself and invest in all the technologies which are available. In such a scenario, two issues arise. Firstly, cybersecurity is a very fractured market, and there are multiple products for accomplishing multiple things which makes it a big challenge. Secondly, if a company is setting up a basic SOC for an organization, it's going to cost you anything upwards of one and a half million dollars a year and a team of four to five people. There are additional products and licenses that will have to be bought, investments in SIEM, endpoints, and so on and so forth. All these pose the biggest barrier in the path of widespread cybersecurity adoption.

To cater to this issue, Checkpoint offers managed direction and response service for such organizations. Companies dont have to invest in separate products, we monitor and track all the fields. This service has seen a great demand amongst mid-sized corporates in India.

Siddharth: With newer emerging technologies like 5G, IoT, and Metaverse coming in, the threat landscape has widened. How is Check Point addressing this emerging landscape?

Harish: With the introduction of advanced technology like 5G, Web 3.0, metaverse, AI generative software and IoT adoption, we can expect that this is going to make the industry more prone to sophisticated Gen V and Gen VI attacks. These advanced technologies are going to decentralize the data, shift the physical infrastructure to cloud-based platforms and operate on edge computing. Therefore, the cyber security posture for companies is going to be more pronounced than ever with the expansion of multiple attack vectors for organisations.

In India, the stage is set for the launch of 5G technology. Consumers and companies are at high risk as the dynamic software-based systems of 5G include many more access points for traffic routing than the current centralized hub-and-spoke structures of 4G. Apart from this, security for IoT devices is intrinsically weak and simple to hack. Therefore, companies need to deploy a prevention-based response system rather than an incident-driven response system.

Siddharth: India is up there in software development but how is it in terms of skilling and re-skilling people for cybersecurity?

Siddharth: What are Check Points plans for 2023?

Harish: We have launched a host of products including the next Generation Management or Titan which gives you a single pane of view across network, cloud and endpoint. We also launched a new set of branch devices called as Spark Pro, which gives better bandwidth and comes with 5G and Wi-Fi. We launched our own SD-WAN portfolio which will run on top of the quantum devices which we already have. We also launched the MDR services and repackaged them as Horizon. Horizon is a service that can be used for threat hunting and to look at what's happening inside companys network packet by packet.

Overall, it's quite an exciting time for us. We promised the four Cs of cloud to be covered, the no prevention based CNAPP to be launched, it's already being adopted by clients. Similarly, our newer products will be immediately adopted by clients in the next couple of months.

More here:
Exclusive Interview with Check Point's Harish Kumar: Insights on India's Cybersecurity Landscape and Plans for - Times Now

Read More..