Page 1,316«..1020..1,3151,3161,3171,318..1,3301,340..»

Park ‘N Fly Adopts Keepit for Microsoft Backup and Recovery – ITPro Today

Parking at the airport is one of lifes annoyances. Its crowded, expensive, and hard to find a spot near the entrance. Thats where Park N Fly comes in. The company shuttles customers from their cars to their terminals. Over the years, Park N Fly has expanded to include car washes, bag checks, and even pet boarding.

Related: How New Orleans Transformed Its Data Storage System After Cyberattack

While one might assume a parking company is fairly low-tech, thats not the case with Park N Fly. During its more than 50 years in business, the company has increasingly invested in technology. It launched its first booking engine in 2005 and uses a multichannel approach to drive sales. It also provides kiosks for flight check-in and has a full cadre of security protections for its back-office resources and customer information.

Park N Fly is a Microsoft shop, dependent on Office 365, SharePoint, Exchange, Active Directory, and Azure to remain productive. While the Microsoft technologies works well, CTO Ken Schirrmacher had long worried that Microsofts backup and recovery methods werent fully protecting data stored in the cloud.

With Office 365 you can do some Outlook-level archiving and, if you have the right license, a full backup of your entire inbox history, but those dont provide real full-service retention, Schirrmacher said. When you do a full Exchange deployment locally on-premises, it just backs up the Exchange server, but when you put everything into the cloud, youre missing that backup piece.

Microsofts backup shortcomings are common knowledge. For example, email backups in Outlook are restricted to 30 days, and the cloud server backing up that data could be lost if something happens to the servers stored in a specific area. Whats more, Microsoft doesnt guarantee retrieval of stored data or content during an outage. Microsoft itself recommends customers use third-party backups.

As a result, the company had added backup technologies into its mix, including Veritas to back up SharePoint drives. Backup processes became cumbersome over time, however. Transferring data required copying it to modular removable storage devices like solid-state drives, which employees could easily misplace.

Altogether, Park N Fly has between one and two terabytes of data that it cant afford to lose. Still, the company was mostly relying on Microsoft for backup, and Schirrmacher knew that had to change.

The thought just kept getting louder and louder until I finally listened to it, he said. I knew it would eventually bite us and that we needed to install some type of safety net.

When looking for a better way to back up Microsoft data, Schirrmacher wanted a cloud-based product that would be easy to implement, have a straightforward restore process, and offer strong security.

After asking around, a Park N Fly partner told him about Keepit, a cloud-based service that specializes in Microsoft and Azure AD backup and recovery. Keepit also encrypts data in transit and at rest using Transport Layer Security 1.2 and 256-bit Advanced Encryption Standard. The fine-grained user access controls also appealed to Schirrmacher.

I didnt want something with simple RSA 1024-bit encryption, because anybody with a decent security background could probably get around it, he said. And I really liked the idea of not having to swap keypairs with my coworkers.

After a successful trial, Park N Fly signed on the dotted line and rolled out Keepits service companywide. Schirrmacher noted that a 10-minute demo showedhis IT staff to how to use the service.

Once in use, Schirrmacher saw that the service performed fast, which he valued. Were constantly having things thrown at us, and we need to be able to focus, he said. If we have to tend to our backups or spend an entire day restoring files, we cant do our other tasks.

Today, Keepit is Park N Flys main backup and recovery technology, along with AWS S3 buckets for storage. The company also uses a small amount of on-premises storage for specific workloads.

Keepit has proven to be easy to work with. After signing in on Keepits web-based portal and adding an account, IT staff can log in with single sign-on via Office 365 non-interactively, which essentially means that sign-ins are done on behalf of users. The system then asks permission to access files. Once given that permission, Keepit asks staff to select areas to be backed up. Initially, Keepit backups took an entire day, but since then, Keepit takes snapshots continuously. The portal displays what has been backed up, using root-level trees that let staff navigate down to the file level.

Although Keepit has an API to enable organizations to work with data on Keepits platform, Park N Fly hasnt yet taken advantage of it. That will change eventually, Schirrmacher said. He plans to investigate building the API into the companys executive PowerBI dashboard. This would allow executives to quickly see uptime and endpoint management statistics, plus data from other tools like Mailchimp, Trustpilot, and ActiveCampaign.

Schirrmacher also is looking forward to an upcoming Keepit enhancement that will provide a self-service portal for users.

I look forward to the day when our users will be able to restore their own data, he said. That would really free up time for our IT staff.

About the author

See the rest here:
Park 'N Fly Adopts Keepit for Microsoft Backup and Recovery - ITPro Today

Read More..

The changing world of Java – InfoWorld

Vaadin recently released new research on the state of Java in the enterprise.Combined with other sources, this survey offers a good look into Javas evolution.The overall view is one of vitality, and even a resurgence of interest in Java, as it continues to provide a solid foundation for building applications of a wide range of sizes and uses.

I dug into Vaadin's 2023 State of Java in the Enterprise Report, along with a few others. This article summarizes what I think are the most significant developments in enterprise Java today.

Java has seen a long succession of incremental improvements over the last decade.We're currently on the cusp of more significant changes through the Java language refactor in Project Valhalla and Java concurrency updates in Project Loom.Those forthcoming changes, combined with security considerations, make staying up to date with Java versions especially important.

Vaadin's research indicates that developers using Java have kept up with version updates so far. Twenty-six percent of respondents report they are on version 17 or newer; 21% are in the process of upgrading; and 37% are planning to upgrade.

These results jive with research from New Relic showing that Java 11 is becoming the current LTS (long-term support) standard, gradually supplanting Java 8.Java 17 is the newest LTS release, replacing Java 11 under the two-year release cadence, and will soon become the baseline upgrade for Java. The next LTS release will be Java 21, currently targeted for September 2023.

Survey results indicate that security is a major concern for Java developers, and for good reason.Discovering the Log4j vulnerability shined a glaring spotlight on code vulnerabilities in Java applications and elsewhere. Cybersecurity is a slow-moving hurricane that seems to only gather strength as time goes on.

The Vaadin report indicates that 78% of Java developers see ensuring app security as a core concern; 24% describe it as a significant challenge; and 54% say it is somewhat of a challenge.

Java by itself is a very secure platform. But like any other language, it is open to third-party vulnerabilities. Writing and deploying secure Java applications requires maintaining good security practices across the entire application life cycle and technology stack.Even the federal government, through CISA, is taking securing open source software and tracking vulnerabilities seriously, and urging the adoption of zero-trust architectures.

Because Java is a solid, evolving platform, Java developers are well-positioned to take on the very real and changing universe of threats facing web applications. We just need to be aware of security concerns and integrate cybersecurity into our daily development activities.

According to the Vaadin research, 76% of respondents see hiring and retaining developers as either a significant challenge or somewhat of a challenge.This is, of course, an industry-wide problem, with developer burnout and dissatisfaction causing major difficulty in both attracting and retaining good software developers.

Perhaps the best way to think about developer retention is in light of the developer experience (or DX). Like other coders, Java programmers want to work in an environment that supports our efforts and allows us to use our skills and creativity.A supportive environment encompasses the development tools and processes and the overall culture of the organization.

One way to improve developer experience is through a robust devops infrastructure, which streamlines and brings consistency to otherwise stressful development phases like deployment.There is an interplay between devops and developer experience. Improving the tools and processes developers use makes it easier for us to maintain them and ensure adaptive correctness.

Deployment figures large in the Vaadin research.Cloud infrastructure and serverless platformscloud-native environmentsare seen as an essential evolution for Java applications.Right now, 55% of Java applications are deployed to public clouds.On-prem and private hosting still account for 70% of application deployments.Kubernetes and serverless account for 56% of deployments, spread between public cloud, on-prem and PaaS.

Of serverless providers, Amazon Web Services (AWS) leads the space, with 17% of respondents saying they deploy their Java applications using AWS Lambda.Microsoft Azure and Google Cloud Platform serverless both account for 4% of all deployments, according to survey responses.

After on-prem servers and virtual machines, on-prem Kubernetes is the most prevalent style of deployment, used by 29% of respondents.

These numbers point to a Java ecosystem that has continued to move toward cloud-native technology but still has a big chunk of functionality running on self-hosted servers.Many Java shops feel a sense of urgency to adopt cloud platforms. But some developers continue to prefer self-hosted platforms and frameworks to being locked into a cloud provider's compute-for-rent business model.

Not surprisingly, the lions share of Java applications are web applications, with desktop applications accounting for only 18% of all products in development at the time of the survey.As for the composition of new and existing applications that use Java, its a diverse group.The Vaadin research further distinguishes between current technology stacks and planned changes to the stack.

The continued strong focus on full-stack Java applications is particularly interesting.Fully 70% of respondents indicated that new full-stack Java applications were planned for upcoming projects.

Just behind full-stack applications is back-end development.Back-end APIs accounted for 69% of new investment plans, according to respondents.

After full-stack and back-end development, respondents' development efforts were spread between modernizing existing applications (57%); developing heterogenous (Java with JavaScript or TypeScript) full-stack applications (48%); migrating existing applications to the cloud (36%); and building new front ends for existing Java back ends (29%).

The survey also gives a sense for what front-end frameworks Java developers currently favor. Angular (37%) and React (32%) are in the lead, followed by Vue (16%).This is in contrast to the general industry where React is the most popular framework.Other frameworks like Svelte didnt make a strong enough showing to appear in the survey.

Given its popularity and utility, it is unsurprising that Spring is heavily used by Java developers.Of respondents, 79% reported using Spring Boot and 76% were using the general Spring framework.The forecast among developers is for them both to continue being used.

Fifty-seven percent of respondents to the Vaadin survey indicated that modernization was a chief concern for planned investment.The highest ranked reason given for modernization was maintainability.

Maintainability is a universal and perennial concern for developers of all stripes and stacks.With the huge volume of what we might term legacy codethat is, anything thats already been builtin Java, there is a strong sense that we need to upgrade our existing systems so that they can be worked on and brought into the future. It's a healthy impulse.To find the will and money to refactor and strengthen what is already there is key in any long-term project.

After maintainability comes security, which weve already discussed. In this case, though, security is seen as another reason for modernization, with20% of respondents ranking security as their number one cause, 16% in second place, and 21% in third.Security is once again a reasonable and healthy focus among developers.

Among all the challenges identified by Java developers, building an intuitive and simple UX appears to be the greatest.It is a significant challenge for 30% and somewhat of a challenge for 51% of developers.

The UI is a tricky part of any application.I get the sense that Java developers are strong with building back-end APIs and middleware and longing for a way to use their familiar technology to build across the stackjust notice the heavy emphasis on full-stack Java applications.One respondent commented in the survey, We want to use Java both for backend and frontend.Maybe with WASM that will be possible someday.

For the time being, Java developers are confronted with either building in a JavaScript framework like React, using a technology that allows for coding in Java and outputting in JavaScript (like JavaServer Faces or Google Web Toolkit), or using a framework that tries to encompass both Java and JavaScript under a single umbrella like Hilla or jHipster. (I've written about both here on InfoWorld.)

With the industry as a whole, Java developers have moved toward better devops practices like CI/CD as well as adopting third-party integrations.The Vaadin report identifies logging, observability, and single sign-on (SSO) solutions as the most popular tools in use.Kubernetes, business tools like enterprise resource planning (ERP) and customer relationship management (CRM), devops, and multi-factor authentication (MFA) solutions round out the rest of the most-used third-party tools in the Java ecosystem.

Like the State of JavaScript survey for JavaScript, Vaadin's State of Java in the Enterprise Report offers an expansive portrait of Java, both as it is and in where it is moving.Overall, Java appears to be riding a wave of stability coupled with an evolving dynamism. The two together indicate a vital technology that is ready for the future.

Go here to read the rest:
The changing world of Java - InfoWorld

Read More..

An intro to the IDMZ, the demilitarized zone for ICSes – TechTarget

To protect internal networks from untrusted networks, such as the internet, many organizations traditionally used a demilitarized zone. Derived from the military concept of an area that cannot be occupied or used for military means, a DMZ in networking is a physical or logical subnet that prevents external attacks from accessing confidential internal network resources and data.

Cloud adoption has largely negated the need for a DMZ, with zero trust and segmentation becoming more popular options amid the dissolving network perimeter. DMZs can still be useful, however, especially when it comes to the convergence of IT and operational technology (OT). Known as an industrial DMZ (IDMZ), it is key to keeping IT and industrial control system (ICS) environments separate.

Pascal Ackerman, author of Industrial Cybersecurity, Second Edition, was on hand to explain the IDMZ.

What is an IDMZ?

Pascal Ackerman: The name itself has been questioned, and I've had a couple people call me up and say, 'Can't you just call it a DMZ, please?' But it's different.

The concept was taken from the enterprise side. For decades, people connected enterprise environments to the internet through a DMZ. They had a shared server or web server exposed to the internet, but if they didn't want to easily allow access into their enterprise environment, they put a DMZ in place.

We took a page from that book and put a DMZ between the enterprise network and the industrial network.

Where things differ between an IT network and the internet and an IT network and OT network is with what we put in the DMZ. By design, it's supposed to be a middle ground for traffic to traverse from an insecure to a secure network -- with the insecure network being the enterprise and the secure network being the ICS. Where you typically do it on the IT side for web services, on the industrial side, you do it for industrial protocols and to make sure they don't have to traverse through the IDMZ. Rather, you have a way to broker or relay or translate industrial protocols and data into something easily available on the enterprise side -- this typically tends to be a web browser.

How does this relate to IT/OT convergence?

Ackerman: Until the late 1990s, IT -- the business network where you do email, ordering and shipping -- was separate from OT -- your production environment -- via segmentation. There was no communication between the two.

As managers and folks on the business side saw the benefits of using industrial data, more and more IT and OT environments connected. While the true controls engineer inside me wants to keep IT and OT separate -- it's really the most secure way -- companies want to get data out of an ICS to do better production and business overall. In order to do this securely, an IDMZ is the way to go.

We're not just putting a firewall in place and poking a bunch of holes in it -- because, eventually, there's no firewall because you've made so many exceptions. Instead, the IDMZ means traffic from the enterprise network is not allowed to go directly to the industrial side. It has to land in the IDMZ first.

Do you have an example of when you'd do this?

Ackerman: Say you want to remote desktop into one of your production servers. That would be initiated on the enterprise side. Instead of going straight into the industrial network and connecting to a server there, you're authenticating to a broker server in the IDMZ, which brokers that into the target server or workstation on the industrial environment.

How does IoT fit in? IoT deployments can be on either the enterprise or the industrial side -- or, sometimes, both.

Ackerman: One of the design goals for implementing industrial security is that industrial protocols need to stay in the industrial environment. If you have a smart camera or an IoT barcode scanner for your MES [manufacturing execution system] or ERP system, those should go on the enterprise network because they're communicating with enterprise systems.

On the other hand, if you have a smart meter that takes the temperature of a machine in the ICS, it might use industrial protocols and send information to a cloud service, where you can look at trends and monitor it. This type of IoT deployment would live in the OT network. Then, you have to deal with the connection to the cloud -- through the IDMZ.

I recommend setting up security zones within the IDMZ. Set up a separate segment for your remote access solution, for your file transfer solution and for your IoT devices.

What threats does an IDMZ prevent or mitigate?

Ackerman: Pretty much anything that will attack the enterprise network.

The fundamental goal with an IDMZ is to have any interactions with the ICS be initiated on the enterprise side. So, if a workstation on the enterprise network is infected by malware, the enterprise client is infected or crashes. The underlying HMI [human-machine interface] sitting on the industrial network is protected by the IDMZ. If the enterprise network is compromised, the compromise stays within the IDMZ and can't travel to the industrial environment.

Who is responsible for setting up and managing an IDMZ?

Ackerman: Companies that have separate IT and OT teams often have the IT team support and maintain the IDMZ. For companies that have converged IT and OT teams, it's usually a shared responsibility. This typically works better because each team understands the other and can build upon each other's knowledge.

How do you build an IDMZ?

Ackerman: You have two separate networks: the enterprise network with physical standalone hardware and the industrial network with physical standalone hardware. Put a firewall between them -- sometimes two -- one for the enterprise side and one for the industrial side. They should be separate brands, too -- that's the most secure. Most of the time, you'll see a three-legged firewall implementation with the IDMZ sitting in the middle.

From there, deploy the IDMZ service itself. The services often run on VMware or a hypervisor from Microsoft and Hyper-V -- some dedicated software. Further components depend on what you're looking to relay. Most of the time, there's a file-sharing mechanism and remote access solution.

Is zero trust ever implemented in an IDMZ?

Ackerman: Zero trust makes sense all the way down to Level 3 of the Purdue model. Levels 2, 1 and 0 -- which are your controls, HMIs and PLCs [programmable logic controllers] -- wouldn't make sense for zero trust. The devices on those levels don't have authentication mechanisms; they just respond to anything that tries to ping them.

Where zero trust does make sense is in Level 3 site operations, where you have servers, workstations, Windows domain, etc. Where you have authentication and authorization is where you can implement zero trust.

What are the challenges of implementing an IDMZ?

Ackerman: Support. An IDMZ is extra hardware and extra software for someone to support, and it's not always the easiest to do from the enterprise side. You have to go an extra step to log in to an industrial asset, and from there, you can support the IDMZ.

Another challenge is the services running on it. If you want to be really secure, you can't just extend your enterprise Windows domain into your industrial environment. You usually end up having a dedicated Windows domain for your industrial environment, which, again, has to be supported by someone.

It can be time-consuming and costly, but think of it another way: If something compromises your enterprise environment and can dig into your industrial environment, how much work and money are you going to spend to get everything up again?

About the authorPascal Ackerman is a seasoned industrial security professional with a degree in electrical engineering and more than 20 years of experience in industrial network design and support, information and network security, risk assessments, pen testing, threat hunting and forensics. His passion lies in analyzing new and existing threats to ICS environments, and he fights cyber adversaries both from his home base and while traveling the world with his family as a digital nomad. Ackerman wrote the previous edition of this book and has been a reviewer and technical consultant of many security books.

Continue reading here:
An intro to the IDMZ, the demilitarized zone for ICSes - TechTarget

Read More..

QISolutions Joins Center for Quantum Technologies to Aid in … – Campus Technology

Quantum Computing

QISolutions, a subsidiary of full-stack photonic-based quantum computing and solutions company Quantum Computing, is joining the Center for Quantum Technologies (CQT), an industry-university cooperative research center sponsored by the National Science Foundation.

CQT brings together engineers and scientists from Purdue University, Indiana University, the University of Notre Dame, and Indiana University Purdue University-Indianapolis to work with industry members such as the Air Force Research Laboratory, Amazon Web Services, Eli Lilly, Cummins, Toyota, Northrup Grumman, and IBM Quantum to "transfer foundational quantum knowledge into novel quantum technologies that address industry and defense challenges, " according to a news announcement. QISolutions will bring into the mix its expertise in quantum photonic communications, cryptography, computing, and sensing solutions, to assist CQT in advancing industry-relevant quantum devices, systems, and algorithms, the company explained.

"QiSolutions has strategically developed relationships with key partners and academic institutions to align resources to pursue and win federal contract opportunities, " said Sean Gabeler, president of QiSolutions, in a statement. "QiSolutions will be one of the key quantum technology providers for these partnerships and this alliance sets the foundation to pursue a number of US Government and DoD work that we expect to be awarded this fiscal year."

About the Author

About the author: Rhea Kelly is editor in chief for Campus Technology. She can be reached at [emailprotected].

Here is the original post:
QISolutions Joins Center for Quantum Technologies to Aid in ... - Campus Technology

Read More..

Quantum Computing in Drug Discovery Services Market is foreseen … – Digital Journal

PRESS RELEASE

Published April 6, 2023

New Jersey, N.J, April. 06, 2023 (Digital Journal) - Quantum computing is a computational technology that uses quantum-mechanical phenomena such as superposition and entanglement to perform complex calculations much faster than classical computers. Quantum computing has the potential to revolutionize drug discovery services by enabling researchers to simulate and analyze large and complex molecular systems more efficiently. Drug discovery involves identifying and designing new drugs that can target specific biomolecules, such as proteins or enzymes, and modify their activity to treat diseases. This process requires extensive computational modeling and simulations to predict the interactions between drugs and biomolecules.

Get PDF Sample Copy of this Report @:

https://a2zmarketresearch.com/sample-request/997575

The global Quantum Computing in Drug Discovery Services Market is expected to grow at a significant CAGR of +14% during the forecasting Period (2023 to 2030).

Quantum Computing in Drug Discovery Services Market research is an intelligence report with meticulous efforts undertaken to study the right and valuable information. The data that has been looked at considers both the existing top players and the upcoming competitors. Business strategies of the key players and the new entering market industries are studied in detail. Well explained SWOT analysis, revenue share and contact information are shared in this report analysis.

Top Companies of this Market includes:

? 1QBit? Accenture? Albert Einstein College of Medicine? Alibaba? Amazon Web Services? Anyon Systems? ApexQubit? Aqemia? Astex Pharmaceuticals? AstraZeneca? Atos? Auransa? Aurora Fine Chemicals? Automatski? Biogen? Bleximo? Boehringer Ingelheim? Cambridge Quantum

This report provides a detailed and analytical look at the various companies that are working to achieve a high market share in the global Quantum Computing in Drug Discovery Services market. Data is provided for the top and fastest-growing segments. This report implements a balanced mix of primary and secondary research methodologies for analysis. Markets are categorised according to key criteria. To this end, the report includes a section dedicated to the company profile. This report will help you identify your needs, discover problem areas, discover better opportunities, and help all your organization's primary leadership processes. You can ensure the performance of your public relations efforts and monitor customer objections to stay one step ahead and limit losses.

The report provides insights on the following pointers:

Market Penetration: Comprehensive information on the product portfolios of the top players in the Quantum Computing in Drug Discovery Services market.

Product Development and Innovation: Detailed insights on the upcoming technologies, R&D activities, and product launches in the market

Competitive Assessment: An in-depth assessment of the market strategies and geographic and business segments of the leading players in the market

Market Development: Comprehensive information about emerging markets This report analyses the market for various segments across geographies.

Market Diversification: Exhaustive information about new products, untapped geographies, recent developments, and investments in the Quantum Computing in Drug Discovery Services market.

For Any Query or Customization:

https://a2zmarketresearch.com/ask-for-customization/997575

The cost analysis of the global Quantum Computing in Drug Discovery Services market has been performed while keeping in mind manufacturing expenses, labour costs, raw materials, their market concentration rate, suppliers, and price trend. Other factors such as supply chain, downstream buyers, and sourcing strategy have been assessed to provide a complete and in-depth view of the market. Buyers of the report will also be exposed to a study on market positioning with factors such as target client, brand strategy, and price strategy taken into consideration.

Global Quantum Computing in Drug Discovery Services Market Segmentation:

Market Segmentation by Type:

Market segmentation by Application:

Reasons for buying this report:

Table of Contents

Global Quantum Computing in Drug Discovery Services Market Research Report 2020

Chapter 1 Quantum Computing in Drug Discovery Services Market Overview

Chapter 2 Global Economic Impact on Industry

Chapter 3 Global Market Competition by Manufacturers

Chapter 4 Global Production, Revenue (Value) by Region

Chapter 5 Global Supply (Production), Consumption, Export, Import by Regions

Chapter 6 Global Production, Revenue (Value), Price Trend by Type

Chapter 7 Global Market Analysis by Application

Chapter 8 Manufacturing Cost Analysis

Chapter 9 Industrial Chain, Sourcing Strategy and Downstream Buyers

Chapter 10 Marketing Strategy Analysis, Distributors/Traders

Chapter 11 Market Effect Factors Analysis

Chapter 12 Global Quantum Computing in Drug Discovery Services Market Forecast

Buy Exclusive Report @:

https://a2zmarketresearch.com/checkout/997575/single_user_license

If you have any special requirements, please let us know and we will offer you the report as you want.

Related Reports:

Bioanalytical Services Market 2023-2030 Worldwide Demand and Growth Analysis Report | PPD, ICON, AlgorithmeDNS Service Market Report Covers Future Trends with Research 2023 to 2030 | AWs, Cloudflare, GoogleSmart Hearing Aid Market Report 2023-2030: Recent Trends and Business Opportunities | William Demant, SonovaAutomobile Parts Recycle Market : Trends, Strategies, and Future Outlook 2030 | LKQ Corporation, Schnitzer Steel, SA RecyclingElectric Vehicles LiFePO4 Battery Market Trends and Opportunities 2023-2030 | Panasonic, Samsung SDI, LG ChemSmart Oilfield Market: Opportunities, Challenges, and Future Trends 2023-2030 | GE(Baker Hughes), China National Petroleum Corporation (CNPC), Halliburton CorporationNano-coated Glass Market is poised to grow a Robust CAGR of +20% by 2030 | Arkema, Covestro, Opticote

COMTEX_428522740/2769/2023-04-06T06:55:58

Excerpt from:
Quantum Computing in Drug Discovery Services Market is foreseen ... - Digital Journal

Read More..

IBMs Nataraj Nagaratnam on the cyber challenges facing cloud … – ComputerWeekly.com

Nataraj Nagaratnam, IBM fellow and cloud security CTO, has been with the supplier for nearly 25 years. Security has been his forte throughout this time, whether it be cloud security, hybrid cloud security or technology strategy.

Natarajs interest in security started when he was studying for his masters and PhD. One good, fine day, my professor walks in and says there will be this new thing, called Java, he recalls. He was already working with the core Java engineering team, which created Java at the time. Intrigued, I started to work on the security aspects of Java, and then my PhD was in security in distributed systems.

Following his studies, when Nataraj was looking for fresh challenges, IBM approached him with an opportunity to help shape the future of security. Just as the internet was going to change the world and how business was conducted, IBM offered him the chance to develop systems for how businesses could securely operate over the internet.

IBMs offer to lead enterprise web security for IBM products appealed to the young Nataraj, as the new technologies promised to be both disruptive to markets and enabling to the world. I jumped right onto the opportunity. And, as they say, the rest is history, he says. I was fortunate enough to be part of the way, with WebSphere shaping the industry, and working with industry on standard security specifications, such as web services security.

Technology, especially enterprise IT, has expanded massively throughout Natarajs career. While this has created opportunities for enterprise solutions, it also carries certain risks. In the history of computing, there are three major chapters mainframes, then web, and now there is cloud, says Nataraj. This is a defining moment in the entire IT space, and I am fortunate enough to define and lead the work on security from web to cloud.

Relying on data and services in the cloud can be challenging, as organisations need to ensure that data remains sharable across networks, while having sufficient protections in place to ensure data is confidential and protected. This is especially the case for heavily regulated industries, such as the defence, healthcare and financial sectors. This has become a defining moment for such industries, which are concerned about risk, security and compliance.

Rather than relying on the subjective term of trust, which implies that one can have faith in or rely on someone or something, Nataraj prefers to use technical assurance. Technical assurance demonstrates that technological and human processes have been put in place to ensure data is being protected.

Part of this is ensuring that identity and access management (IAM) is uniformly addressed across all of the organisations cloud platforms, from their cloud storage capabilities to their on-premise services. Given that no two cloud platforms are ever the same, this can complicate matters, as more than one platform is typically used.

The rapid expansion of the tech sector means there is a growing security skills gap, which needs to be addressed. This has left organisations struggling to fill vitally important roles and relying on external contractors instead. This adds further cost, especially if a significant amount of work is required, as contractors are expensive for long-term projects.

To address such concerns, organisations are turning to IAM tools to act as an overlay across their existing cloud infrastructure. If we standardise the access management and security overlay, and enable them with automation and continuous monitoring, we can solve complex problems, says Nataraj. Taking a hybrid multicloud approach with security and compliance automation addresses this with consistency and continuous monitoring.

Government policy is also evolving, as regulators become ever more technologically aware, with additional demands on data protection when sharing data between regions. There has, however, been greater collaboration between countries in this regard. For example, the European Unions (EUs) General Data Protection Regulation (GDPR) has effectively become a de facto global standard for data protection, as countries realise that trade is reliant on an unimpeded flow of data.

Lawmakers and regulators are starting to understand the impact of technology, and that policies and standards need to evolve in a way that accommodates those technologies, while also providing a level of risk and regulatory compliance. Standardisation needs to happen

Nataraj Nagaratnam, IBM

Laws, regulations and policies are becoming much more technology aware, says Nataraj. Lawmakers and regulators are starting to understand the impact of technology, and that policies and standards need to evolve in a way that accommodates those technologies, while also providing a level of risk and regulatory compliance. Standardisation needs to happen, as opposed to every country having its own regulatory requirements, because that will have its own complexity.

With information interchange between different countries being dependent on data sharing agreements, organisations are looking at approaches that allow them to meet the regulatory and technical requirements.

A few weeks back, when I was in India, we talked about this notion of data embassies the fundamental concept is if you run services within these datacentres and service providers, you get immunity from certain laws, says Nataraj. A country can have a data embassy in one country, and in reciprocity, they can have a data embassy in their country. There are innovative and creative ideas coming up in different parts of the world. Thats a reflection of a policy and a practical approach to solve this data sharing problem, and that is going to evolve.

These data embassies are similar to TikToks proposed Project Texas, which would see the social media platform storing all data in the US under the watch of American firm Oracle. These data embassies could evolve into independent third-party organisations.

One of the most significant future concerns facing organisations relying on cloud services will be the risk posed by quantum computing, which could disrupt encryption security. Reliance on existing encryption technologies is not an option, as the processing speeds offered by quantum computers would enable them to swiftly break encryption, especially as certain public key algorithms have proven to be susceptible to quantum computer attacks.

The most common public key infrastructure (PKI) technology used across the world is transport layer security (TLS), which secures the data in transit. As such, that should be considered the greatest risk, because if data is captured in transit today, the encryption could be broken in five years time, if quantum computing becomes commercially available. As such, we need to rethink the way we approach hybrid cloud, secure connectivity and TLS.

When it comes to quantum safe, I believe the first thing to fix is connectivity. Two years ago, we introduced support for quantum safe algorithms in IBM cloud, says Nataraj. When you do application transactions over the wire, that link can be quantum safe. You prepare for the threat. That has to be one of the first things, when it comes to cloud security, that one needs to work through.

With the increasing levels of functionality offered by artificial intelligence (AI) and machine learning (ML), automation will become a growing part of an organisations security posture. Automated monitoring of security and compliance posture allows for continuous security.

Furthermore, security deployment will become automated, thereby bridging the gap between the CISOs and CIOs and IT teams. This will ensure they are all consistent with each other and aligned with the organisations global security and compliance requirements.

There is more to be done in continuous security and compliance infused with automation, and how we change from a reference architecture that may be in a Visio diagram to something prescriptive, deployable and automated, says Nataraj.

Concerns surrounding data sovereignty and data privacy residency are likely to increase, given the regulatory compliance and geopolitical aspects of dealing with data. As such, there will be a need for more demonstrable controls and technologies that can help in protecting data and privacy, which will become infused with confidential computing.

Applications of confidential computing are still in their infancy and there is more to be done, because its not just a technology, but its use cases in confidential AI, says Nataraj. IBM has leveraged confidential computing technology to enable unique approach use cases around encryption key management called Keep Your Own Key, where a customer has technical assurance that only they have access to the keys, where keys are protected within hardware as well as within secure enclaves. This is now extended to hybrid multicloud key management through Unified Key.

The IT sector is undergoing a fundamental shift, as it transforms from a web-based model to one reliant on cloud services. This is being compounded by technological and regulatory issues coming to the fore. A multicloud system can enhance adaptability to shifting market trends, but this brings certain challenges. Automating network management policies enables swift and effective sharing of information within networks, regardless of location, while ensuring that compliance with shifting regulatory compliance is maintained.

We can help industry, governments and others move forward, concludes Nataraj. We will collaborate with governments and their policies to make that happen.

Follow this link:
IBMs Nataraj Nagaratnam on the cyber challenges facing cloud ... - ComputerWeekly.com

Read More..

Green Bay engineering firm merges with Reedsburg-based company – Green Bay Press Gazette

GREEN BAY Vierbicher, a multi-disciplined consulting and engineering firm, on March 31 merged with Mau & Associates, a privately owned civil engineering and land surveying company headquartered in Green Bay.

Vierbicher is a Reedsburg-based company that offers landscape architecture, planning and community development as well as economic, land surveying, civil and municipal engineering and water resource engineering.

Rodney Zubella, CEO of Vierbicher, said the acquisition of Mau & Associates will allow both companies to expand and take advantage of development opportunities in the northeast.

"We believe that the Green Bay area is a growing area that presents a lot of opportunities in the private and public sector," he said.

Vierbicher is behind such Wisconsin projects as the Wisconsin Dells river walk, the UW Health facility at Union Corners in Madison, the Haight Road on the UW-Madison campus and the New Glarus Brewery expansion.

More: This Green Bay woodworking business started as a hobby to help its owner overcome an addiction Streetwise

More: New, limited-time menu item coming to Culver's nationwide this month

Mau & Associates is a smaller firm that was founded in 1974. Some of its finished work includes the Orthopedic & Sports Medicine Specialists at 2223 Lime Kiln Road and the Broadway Ford-Hyundai dealership at 1010 Military Ave.

Zubella said this partnership fits into both companies' growth plan and expands the knowledge of their areas of operation.

"We'll be looking to expand our client base," he said. "But together we expect to grow that office (in Green Bay) and take advantage of those opportunities."

Vierbicher has 75 employees, which will rise to about 95 with the merger of Mau & Associates and its 20 employees.

Vierbicher will have offices in Madison, Reedsburg, Milwaukee, Prairie du Chien and Green Bay.

Ariel Perez is a business reporter for the Green Bay Press-Gazette. You can reach himatAPerez1@gannett.comor view hisTwitter profile at@Ariel_Perez85.

Original post:

Green Bay engineering firm merges with Reedsburg-based company - Green Bay Press Gazette

Read More..

LIs Cameron Engineering merges into national firm – Long Island Business News

Cameron Engineering & Associates, one of Long Islands most prolific planning and engineering firms, is merging with IMEG Corp., one of the nations largest engineering firms.

Camerons client base and presence in the New York region will add to IMEGs 75 offices located throughout the U.S.

The 100-percent employee-owned IMEG, which was founded in 2015 with the merger of Illinois-based KJWW Engineering and California-based TTG Engineers, has grown tremendously over the past several years, bringingmore than 30 formerly independent engineering and architectural firms under its umbrella. The Rock Island, Ill.-based company now has more than 2,000 employees.

Woodbury-based Camerons staff will continue with the new firm, including engineering professionals Nick Kumbatovic, Mike Hults, and Rich Zapolski. John Cameron and Joe Amato, who headed Cameron Engineering now become executive principals of IMEG.

The merger provides sustainability and growth potential for all our employees as well as our clients and teaming partners, Cameron said in a joint statement. IMEGs size and expertise also allows us to expand upon the innovative approaches and results-driven solutions we deliver to our clients.

Founded in Jan. 1985, Cameron Engineering has worked on thousands of area projects, including such high-profile developments as Wyandanch Village, Nassau Coliseum and the medical school, business school and science and innovation buildings at Hofstra University. The company has also designed more than 200 firehouse renovation projects for the FDNY and has worked on many Long Island wastewater and sewer projects.

Cameron will continue to chair the Long Island Regional Planning Council and IMEG will be the engineering firm for the proposed $2.6 billion Midway Crossing project in Ronkonkoma.

We are excited to continue our East Coast expansion and add Cameron Engineering & Associates to our team, IMEG President and CEO Paul VanDuyne said in the statement. Their full-service capabilities and market sector expertise align perfectly with IMEG, allowing us to serve more clients as a New York corporation.

See the rest here:

LIs Cameron Engineering merges into national firm - Long Island Business News

Read More..

UNT Names Pioneering Researcher, Inventor as New College of … – dallasinnovates.com

Paul S. Krueger [Sources: UNT, DI]

Paul S. Krueger has been named the new dean of the College of Engineering at The University of North Texas, effective June 1.

The College of Engineering is home to some of UNTs fastest growing programs, and I am excited to see the college continue to thrive under Dr. Kruegers leadership, Provost Michael McPherson said in a statement. His strategic vision for the future of STEM education and his ability to build strong relationships both within the university community and with partners all over the world will create extraordinary opportunities for our students and faculty.

Krueger succeeds Shengli Fu, who served as interim dean since July 2022.

UNT said its College of Engineering is a leader in research and education, with an expansive research enterprise that includes additive manufacturing, cybersecurity, and bioengineering, as well as government-funded initiatives in national defense, response analysis, and nuclear waste storage.

In his new post, Krueger will oversee the colleges local and global partnerships and its more-than 24 degree programs in areas ranging from biomedical engineering and computer science and engineering to information technology, electrical engineering, and materials science and engineering, UNT said.

Krueger comes to Denton from Southern Methodist University in Dallas, where most recently he was interim dean of the Lyle School of Engineering. He has been a faculty member in SMUs mechanical engineering department since 2002 and served as department chair from 2019 to 2022.

I am thrilled and honored to be joining UNT as the next dean of the College of Engineering, Krueger said in a statement. Engineering at UNT has developed into an amazing enterprise, with faculty and students conducting next-generation research that has the potential to impact not only their fields, but the world. It is a privilege to be part of the diverse UNT community and to lead the college in elevating its standing and impact in the North Texas region and beyond.

Krueger is a recipient of the Rolf D. Buhler Memorial Award in Aeronautics, the Richard Bruce Chapman Memorial Award for distinguished research in hydrodynamics, the Faculty Early Career Development (CAREER) Award from the National Science Foundation, the American Society of Mechanical Engineers North Texas Section Young Engineer of the Year Award, and the Ford Senior Research Fellowship.

UNT said his research spans a range of topics related to fluid flows, including unsteady hydrodynamics and aerodynamics, vortex dynamics, bio-fluid mechanics, bio-morphic propulsion, fluid-boundary and fluid-particle interactions, and fluid processes in additive manufacturing.

Krueger has conducted pioneering work related to the physics of squid locomotion, including development of a robotic squid (Robosquid) that was featured in a Science Flash Exhibit at the Perot Museum of Nature and Science.

He is the inventor or co-inventor on several issued patents and pending patents related to nontraditional propulsion, 3D printing, and drag reduction, the university said.

Sign up to keep your eye on whats new and next in Dallas-Fort Worth, every day.

Don't miss your chance to get our biggest-ever Dallas Innovates magazine. Request a complimentary copy of the once-a-year limited edition now.

Find your passion and give with purpose to support our community.

University of North Texas Workplace Inclusion & Sustainable Employment (UNT WISE), in partnership with Texas Workforce Commission, announced it will use a $12.7 million grant to create the Texas Beacons of Excellence to help employers enhance their skills in recruiting, retaining, and accommodating employees with disabilities. The goal is to educate employers who use subminimum wage contracts about the benefits of competitive, integrated employment, according to a statement. This project aligns directly with our mission to improve the quality of life for people with disabilities by researching innovative best practices, training professionals in effective and ethical service, and directly supporting

The once-a-year summit on September 22 and 23 is an innovation multiplier for capital, collaboration, and commercialization. Experts in the field will discuss strategy and exchange insightsand what's driving life science success across the region.

Want to map your innovation-to-market commercialization path or apply for federal money through the $4 billion America's Seed Fund program? Or maybe you're an entrepreneur seeking to validate your customer's needs. The Texas SBDC Technology Commercialization Center wants to help.

Here is the original post:

UNT Names Pioneering Researcher, Inventor as New College of ... - dallasinnovates.com

Read More..

Engineering students create medallion for chancellor’s investiture – University of Wisconsin-Madison

Mechanical Engineering undergraduate students Teekay Kowalewski (left) and Dylan Zinkgraf (right) present Chancellor Jennifer L. Mnookin with a larger-scale, recast version of the University of WisconsinMadison Numen Lumen medallion during a meeting with the Chancellor in her Bascom Hall office on April 6, 2023. The two undergraduate students made the medallion to celebrate Chancellor Mnookins investiture on April 14. Photo: Jeff Miller

The University of WisconsinMadison will hold an investiture ceremony on April 14 to formally install its 30th leader, Chancellor Jennifer L. Mnookin. And during this unique, celebratory event, the university will bestow a special medallion, created by two mechanical engineering undergraduate students, on Mnookin.

Students Dylan Zinkgraf and Teekay Kowalewski started working on the medallion as an extracurricular project in fall 2022, as they were taking Materials Science and Engineering 461: Advanced Metal Casting.

A big part of the draw was the opportunity to directly apply concepts that we were learning in MS&E 461, such as design for manufacturing processes, to a real project and gain relevant experience, says Zinkgraf, a fifth-year student from Appleton, Wisconsin.

The students overcame a variety of challenges to complete the project. To start with, they needed to transform two-dimensional images of the original medallion artwork into a full 3D design that would capture its intricate features.

Chancellor Mnookin met with Kowalewski and Zinkgraf in her office on April 6 to thank them for their work. The two began their extracurricular project in fall 2022 and overcame a variety of challenges to complete the medallion in time for the chancellors investiture. We wanted to make a contribution to campus that would have a lasting impact, and we achieved that with this project, says Kowalewski. Photo: Jeff Miller

Zinkgraf spent many hours using design software and other tools to create a highly detailed 3D model of the medallion.

After considering the various types of casting methods for making the medallion, Zinkgraf and Kowalewski chose an investment casting process that they could execute themselves in the foundry located in the Materials Science and Engineering Building. Before casting, they 3D-printed a test pattern in the colleges makerspace and created a ceramic mold.

But they were disappointed with the results when they cast the medallion out of aluminum. Some fine details in the artwork, such as the rays above the eye (also known as the Numen Lumen), were lost or didnt appear as they should.

Still, the students persevered. We discovered some of the limitations with this casting process, Zinkgraf says. We had to regroup and figure out a new approach for casting the medallion.

They discussed the issues with their advanced metal casting instructor, Kyle Metzloff, a professor of industrial studies at the University of WisconsinPlateville and an honorary associate in materials science and engineering at UWMadison.

Kowalewski and Zinkgraf first made a 3D-printed model before casting the medallion in aluminum. They were unsatisfied with the result. With help from their instructor, Kyle Metzloff, and foundry Valiant Enterprises, the two students presented Chancellor Mnookin with a pewter-cast medallion on April 6. The medallion is sometimes displayed by the Office of the Chancellor at official university ceremonies and events, including investitures, commencements and convocations. Photo: Jeff Miller

Metzloff recommended changing both the material and the casting method, and he suggested partnering with Valiant Enterprises, a Madison company specializing in pewter castings with fine details. In the process, Kowalewski and Zinkgraf got to tour the companys facility and receive feedback on their project. Valiant used the students 3D-printed patterns to make the molds and cast the final, 4-inch pewter medallion.

In all, Kowalewski and Zinkgraf completed 10 iterations of the medallion design, worked with two different casting processes and made many 3D-printed patterns. After all that work, the students say theyre very happy with the final product. And after the investiture ceremony, Chancellor Mnookin will wear the medallion at commencement, convocation and other events requiring academic regalia.

It will be really exciting to be at commencement and see the chancellor wearing the medallion that we made, says Kowalewski, a sophomore. We wanted to make a contribution to campus that would have a lasting impact, and we achieved that with this project.

Read this article:

Engineering students create medallion for chancellor's investiture - University of Wisconsin-Madison

Read More..