Page 3«..2345..1020..»

Cloud Computing – Articles & Whitepapers | Oracle Technology …

Cloud Computing Recent Articles

Oracle Identity Cloud Service: AD Bridge High-Availability Configuration Using Docker and Windows Containers [October 2017]by Ricardo GutierrezPart of the IDCS Deep Dive series exploring hybrid scenarios, this article focuses on integration with Microsoft Active Directory, an on-premise infrastructure present in most organizations.

Introduction to Oracle Messaging Cloud Service [August 2017]by Phil Wilkins This article examines the Oracle Messaging Cloud Service (OCMS) web API that sits over that messaging engine, and also looks at the cool moves OMCS can throw that give messaging a 21st century shine.

Oracle Java Cloud Service, Oracle JET and ADF BC REST Production Experience – Technical Tips and Tricks [May 2017]by Andrejus Baranovskis Oracle ACE Director Andrejus Baranovskis and his team recently used Oracle Java Cloud Service, Oracle JET, and ADF BC REST to develop an application for a Lithuanian start-up. This article describes the development experience in deep technical detail.

Sample Chapter: Integrations Between SaaS Applications [April 2017]by Robert van Molken and Phil WilkinsThis sample chapter from Implementing Oracle Integration Cloud Service (2017, Packt Publishing) explores how to integrate SaaS solutions, and shows how you can test your integration without affecting a live system.

Docker in the Cloud: Oracle Container Cloud Service [Feb 2017]by Dr. Frank MunzGet deep background on Docker and its use, and a technical introduction to the Oracle Container Cloud Service (OCCS) and its key components.

Oracle Cloud Integration [February 2016]by Joel Perez and Arturo ViverosThis four-part series by Oracle ACE Director Joel Perez and Oracle ACE Associate Arturo Viveros focuses on cloud integration and is directed towards IT managers and architects, particularly those who are hungry for knowledge related to cloud solutions and the dynamics involved when attempting to integrate them effectively into established business architectures.

SOA Cloud Service in a Nutshell [February 2016]by Arturo Viveros, Robert van Molken, and Rolando CarrascoIn this article Oracle ACE Associates Arturo Viveros and Robert van Molken, and Oracle ACE Rolando Carraso discuss Oracle SOA Cloud Service in detail, together with its implications, possible use cases and scenarios. The authors also attempt to clarify some potentially confusing elements and draw some first-hand conclusions on the present and future of the product.

Building and Testing Databound Web Applications using JCS, DCS and JDeveloper 12c [October 2015]by Kumar ShahiThis article showcases the simplicity of using Oracle Java Cloud Service (JCS), Oracle Database Cloud Service (DCS) and JDeveloper 12c to develop, deploy and test Web Applications.

Sample Chapter: CIO’s Guide to Oracle Cloud Computing (August 2014]by Jessica KeyesThis sample chapter from The CIO’s Guide to Oracle Products and Solutions focuses on “features and benefits; management best practices; user/developer lessons learned; management considerations; compliance and security considerations, and management metrics.”

Sample Chapter: eCommerce in the Cloud [April 2014]by Kelly GoetscheCommerce in the Cloud author Kelly Goetsch shows you “how you can quickly and incrementally adopt cloud computing for any ecommerce platforms, whether packaged or custom, new or legacy.”

SOA and Cloud Computing [April 2014]by Jrgen Kress, Berthold Maier, Hajo Normann, Danilo Schmeidel, Guido Schmutz, Bernd Trops, Clemens Utschig-Utschig, Torsten WinterbergThe final article in the Industrial SOA article series takes a look at the relationship between SOA and Cloud Computing, and offers insight into how SOA principles can help to insure the long-term success and business value of the migration to the Cloud.

SOA, Cloud, and Service Technologies [August 2012]Best selling SOA author Thomas Erl and Oracle SOA experts Tim Hall and Demed L’Her explore the evolution of IT architecture and the emerging role of the IT architect in this edited transcript of an OTN ArchBeat podcast.

The Role of the Cloud Architect [July 2012]by Bob Rhubart Cloud architects talk about the role’s unique challenges and the skills needed to meet them.

Software Architecture for High Availability in the Cloud [June 2012]by Brian JimersonA look at the paradigm shifts in designing fault tolerance from machine-based architectures to cloud-based architectures, and how enterprise applications need to be engineered to ensure the highest level of availability in the cloud.

Discussion: Public, Private, and Hybrid Clouds [June 2012]by Bob RhubartA panel of leading Oracle experts on cloud computing compares and contrasts the various flavors of cloud computing in this transcript of an OTN ArchBeat Podcast.

Community Roundtable: Agility versus Architecture [May 2012]by Bob RhubartWhat happens to architecture in the rush to deliver solutions? A community panel discusses finding a balance.

Community Roundtable: Architecture, Confidence, and the Cloud [May 2012]by Bob RhubartCloud computing may be a new take on not-so-new concepts, but getting it right still requires an architectural approach.

Are You Ready to Compete Against the Public Cloud? [January 2012]by Robert Covington and Brad GoodwinA look at two companies that have embarked on a transformational journey that embraces many core aspects of cloud architecture.

Everything is PaaSible (from InfoQ) [December 2011]by William VambenepeWilliam Vambenepe takes a look at PaaS as an enabler especially in the enterprisethat will afford business advantages in terms of cost, time to market and choice of tools.

Using Oracle Coherence with Spring Batch for High-Performance Data Processing [December 2011]by Vijay NairHow using the Spring Batch framework, in combination with a multithreaded approach to data loading, can improve the manageability and performance Coherence-based applications

A Brief Introduction on Migrating to an Oracle-based Cloud Environment (from Syngress) [November 2011] by Tom LaszewskiAddressing multi-tenancy and other key cloud considerations.

Migrating to the Cloud: Methodology and Design [Sept 2011]by Tom Laszewski and Prakash NauduriA sample chapter from Migrating to the Cloud.

The Cloud Computing Pre-Nup [May 2011]by Bob RhubartThe cloud represents a relationship. Know how to get out before you jump in.

More Cloud Computing articles…

Simplifying Cloud Integration [January 2014]by David Baum, Rajesh Raheja, Bruce Tierney, Ram Menon, and Vijay PawaThis white paper describes the role Oracle SOA Suite and Oracle data integration products can play in integrating on-premise and cloud applications, such as Oracle Fusion Applications, Salesforce.com, and Workday.

Accelerate the Journey to Enterprise Cloud with Oracle Database 12c [July 2013]by Burt ClouseThis paper examines the new features in Oracle Database 12c and how those features can accelerate the implementation of an enterprise cloud.

Consolidation Best Practices: Oracle Database 12c [July 2013]by Troy AnthonyThis paper provides and overview of Oracle Database 12c’s capabilities for consolidating application workloads.

Service Catalogs: Defining Standardized Database Services [November 2013]by Burt ClouseThe first step in the transition from silod, purpose-built IT practices to a modern cloud is standardization. The key deliverable that supports standardization is a service catalog. This paper explores service catalogs and how they create and enforce effective standardization.

Enterprise Cloud Infrastructure on SPARC: An Oracle Optimized Solution [June 2012]by Roger BitarRecommendations and best practices for optimizing virtualization infrastructures when deploying the Oracle Optimized Solution for Enterprise Cloud Infrastructure on SPARC.

Network Isolation in Private Database Clouds [April 2012]This white paper focuses on the options and features that can be used to provide network isolation in an Oracle Private Database Cloud configuration.

Candidate Selection Tool: Guiding Cloud Adoption [Dec. 2011]by Bob HensleThis white paper describes an evaluation framework created to help IT organizations determine which applications, services, modules, components, etc., are appropriate for deployment to a public or private cloud.

Cloud Computing Maturity Model: Guiding Success with Cloud Capabilities [Dec. 2011]by Scott Mattoon, Bob Hensle, and James BatySuccessful adoption of a Cloud model depends on careful planning that addresses the full range of capabilities implied by a comprehensive Cloud Computing strategy.

Database as a Service – Reference Architecture Overview [Sept. 2011]This white paper introduces and defines the concept of Database as a Service and elaborates on the benefits of implementing a DBaaS strategy.

Advancing Business Innovation through the Cloud [June 2011]by Saugatuck TechnologyWinners in the new competitive landscape will be those businesses that adopt Cloud solutions to fundamentally change their business models, not simply to improve the efficiency of IT.

Oracle Optimized Solution for Enterprise Cloud Infrastructure [May 2011]This paper provides recommendations and best practices for optimizing virtualization infrastructures when deploying the Oracle Enterprise Cloud Infrastructure.

More Cloud Computing white papers…

More here:
Cloud Computing – Articles & Whitepapers | Oracle Technology …

Read More..

Cloud Computing: Theory and Practice: Dan C. Marinescu …

‘).appendTo(flyout.elem());var panelGroup=flyout.getName()+’SubCats’;var hideTimeout=null;var sloppyTrigger=createSloppyTrigger($parent);var showParent=function(){if(hideTimeout){clearTimeout(hideTimeout);hideTimeout=null;} if(visible){return;} var height=$(‘#nav-flyout-shopAll’).height(); $parent.css({‘height’: height});$parent.animate({width:’show’},{duration:200,complete:function(){$parent.css({overflow:’visible’});}});visible=true;};var hideParentNow=function(){$parent.stop().css({overflow:’hidden’,display:’none’,width:’auto’,height:’auto’});panels.hideAll({group:panelGroup});visible=false;if(hideTimeout){clearTimeout(hideTimeout);hideTimeout=null;}};var hideParent=function(){if(!visible){return;} if(hideTimeout){clearTimeout(hideTimeout);hideTimeout=null;} hideTimeout=setTimeout(hideParentNow,10);};flyout.onHide(function(){sloppyTrigger.disable();hideParentNow();this.elem().hide();});var addPanel=function($link,panelKey){var panel=dataPanel({className:’nav-subcat’,dataKey:panelKey,groups:[panelGroup],spinner:false,visible:false});if(!flyoutDebug){var mouseout=mouseOutUtility();mouseout.add(flyout.elem());mouseout.action(function(){panel.hide();});mouseout.enable();} var a11y=a11yHandler({link:$link,onEscape:function(){panel.hide();$link.focus();}});var logPanelInteraction=function(promoID,wlTriggers){var logNow=$F.once().on(function(){var panelEvent=$.extend({},event,{id:promoID});if(config.browsePromos&&!!config.browsePromos[promoID]){panelEvent.bp=1;} logEvent(panelEvent);phoneHome.trigger(wlTriggers);});if(panel.isVisible()&&panel.hasInteracted()){logNow();}else{panel.onInteract(logNow);}};panel.onData(function(data){renderPromo(data.promoID,panel.elem());logPanelInteraction(data.promoID,data.wlTriggers);});panel.onShow(function(){var columnCount=$(‘.nav-column’,panel.elem()).length;panel.elem().addClass(‘nav-colcount-‘+columnCount);showParent();var $subCatLinks=$(‘.nav-subcat-links > a’,panel.elem());var length=$subCatLinks.length;if(length>0){var firstElementLeftPos=$subCatLinks.eq(0).offset().left;for(var i=1;i’+ catTitle+”);panel.elem().prepend($subPanelTitle);}} $link.addClass(‘nav-active’);});panel.onHide(function(){$link.removeClass(‘nav-active’);hideParent();a11y.disable();sloppyTrigger.disable();});panel.onShow(function(){a11y.elems($(‘a, area’,panel.elem()));});sloppyTrigger.register($link,panel);if(flyoutDebug){$link.click(function(){if(panel.isVisible()){panel.hide();}else{panel.show();}});} var panelKeyHandler=onKey($link,function(){if(this.isEnter()||this.isSpace()){panel.show();}},’keydown’,false);$link.focus(function(){panelKeyHandler.bind();}).blur(function(){panelKeyHandler.unbind();});panel.elem().appendTo($parent);};var hideParentAndResetTrigger=function(){hideParent();sloppyTrigger.disable();};for(var i=0;i

Enter your mobile number or email address below and we’ll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer – no Kindle device required.

ISBN-13: 978-0128128107

ISBN-10: 0128128100

This bar-code number lets you verify that you’re getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.

The rest is here:
Cloud Computing: Theory and Practice: Dan C. Marinescu …

Read More..

VIPRE Internet Security Review & Comparison

by Kevin R. Smith, Co-Editor

VIPRE Internet Security had the most impressive performance during our battery of tests with only two minor issue.

For our first round of intensive tests, we infected our testing PCs with a wide array of malware, such as viruses, trojans, adware, rogueware, and more. We then activated VIPRE on our test computers and ran a full-system scan on each to see how well it would measure up against these threats.

VIPRE Internet Security did well. After the first scan and reboot, only one piece of malware remained in the background. When the malware tried to run, VIPRE quickly caught it and shut it down.

We’re not sure why VIPRE couldn’t remove it in the first place, but having only one partially get by VIPRE is the best we saw from any other Internet Security suite this year.

The only other minor issue were a few dead desktop items left over from some of the adware. Since none of them would launch since VIPRE had neutralized them it wasn’t a big deal.

Yes, we would have like to see them all gonewho wouldn’t but since we ended up with virtually clean PCs in the end it was a success.

VIPRE Internet Security

SCORE: 97%

Original:

$54.99

Discount:

$38.99

VIPRE was so fast at deleting each one, we couldn’t even open them fast enough. In fact, we thought something went wrong, so we tried again.

Same story: VIPRE was identifying and deleting them before they could even do any harm to our computers. Nice.

As we raced to open these multiple malware, we were able to finally open a couple of them on our older test PCs with older versions of Windows. But the moment we tried to install them, they were immediately blocked by VIPRE.

Curiously, after reboot, which we always do, there were a couple files that VIPRE hadn’t deleted for some reason.

We tried to open them, but they failed to launch because VIPRE had rendered them inoperable.

It would’ve been better for VIPRE to just delete the files, but given that there was no threat and that we ended up with otherwise squeaky clean computers in the end, it was ultimately a success. Nice job.

VIPRE antiphishing was one of the best antiphishing filters of the year. It’s one of the few that scored a perfect 100% in blocking phishing attempts.

And, unlike some competitors who make it easy to miss phishing alerts, VIPRE Internet Security completely blocks the page. There’s no chance you’ll miss it, and accidentally enter any sensitive information.

(Thankfully, most other antivirus and Internet Security suites have mimicked VIPRE’s behavior here and do similar obvious web page blocks.)

Further, while some other Internet Security suites require you to install a separate browser add-on to block phishing sites OR they leave it off by default, there’s no such rigamarole with VIPER Internet Security. One you install it, phishing protection is enabled automatically and without any extra steps.

Despite being the cornerstone of a good Internet Security Suite, firewall software remains one of the most misunderstood and under-appreciated components.

It’s also important to note here that an integrated software firewall is one of the single most important components that’s included in Internet security software that isn’t in nearly any basic antivirus program.

When we test the firewall, we first conduct “port scans” of the test PCs to see what the computer looks like to a hacker or worm (a malicious virus that automatically wanders the Internet looking for vulnerable PCs.) We expect to see no open access points (ports), which is what we got.

VIPRE Internet Security is the only firewall we tested that correctly blocked and identified 100% of our malicious connection attempts while also allowing legitimate web traffic to pass through.

The two most important things in this test are that the firewall block these threats and that outbound Internet access to web pages, email, and other services remains functional.

We do this to see if it’s possible for a suspected trojan that the antivirus filter might miss to get stopped by the firewall. In some cases, doing this is a last resort to ferret out malware.

In comparison, some of VIPRE’s Internet Security Software competitors caught some and missed some; some missed all of these threats; and some caught the threats but only at the expense of a complete loss of all Internet access.

As far as we’re concerned, VIPRE’s firewall is in a league of its own.

During our resource usage tests, VIPRE Internet Security proved to be both fast and lightweight, without any significant system drag.

When running idle in the background, VIPRE was imperceptible.

During a full-system scan, VIPRE only affected our test PCs with approximately 11% resource usage on average, which is within norms.

Interestingly though, it was able to complete scans faster than most competitors (in some cases by about ~35%) with similar resource demands.

Overall, we didn’t notice any system drag when doing routine things like downloading large files, or web surfing, even when multiple browsers and tabs were being used.

It’s unchanged from last year, which isn’t great considering it’s our least favorite part of VIPRE.

And, although it’s easy to use, and although everything is well labeled, the interface is one place where the best competitors are doing a better job.

That said, VIPRE’s user interface is easy to use, with a good balance between usability and robust control.

Over the years VIPRE has consistently lead the way with their tech support.

We think highly of it because it’s:

Whether or not you’re a computer whiz, this kind of help can be huge.

Also, very few companies have tech support teams within the U.S., with nearly all outsourcing support to India or Eastern Europe.

Who among us doesn’t know the frustration of dealing with outsource/offshore support? It’s miserable.

Whether or not you’re in the U.S., when you call VIPRE, you’re routed to a technician in the U.S.

Throughout the year, we repeatedly test each company’s tech support.

Our average wait with VIPRE is about five minutes. (Full disclosure: we have had it go as high as nine.)

We did this because while as rigorous as we try to be in our testing, the opinions of a huge group of people in the real world makes the results even better.

Since those first surveys went out, VIPRE is the only company to always score above a 6.

The competitors for the most part park themselves in the mid 4s with ESET and one or two others each year breaking into the 5+ range.

So, across the board it seems like VIPRE fundamentally “gets” support where most competitors just don’t.

(The only downside with ESET’s support is that if you get a virus before you’re an ESET customer, ESET charges a $50 one-time fee for removal assistance if help is needed.)

With VIPRE, virus removal is free anytime.

VIPRE Internet Security

SCORE: 97%

Original:

$54.99

Discount:

$38.99

No antivirus software or Internet Security suite is perfect, but VIPRE earned the highest scores among the competitors in the space.Performance was excellent, resource usage was low, and our test PCs were still usable even during a full system scan.

Its real-time virus protection, firewall, and antiphishing are all top-notch.

Add to that 100% free, U.S.-based technical support with no hidden fees, and VIPRE Internet Security wins our Editors Choice Award.

Read more from the original source:
VIPRE Internet Security Review & Comparison

Read More..

Internet Security Suite | Verizon Internet

Verizon Internet Security Suite (VISS) is a set of software and services that helps protect your computer from hackers, viruses, spyware, and other threats. Verizon Internet Security Suite is automatically updated to keep the user protected from new threats online.

Verizon Internet Security Suite includes the following tools:

McAfee Active Protection: McAfee Active Protection technology provides immediate protection against malicious threats to your PC. A new threat can be analyzed and blocked in milliseconds, rather than waiting hours using traditional techniques.

Anti-Virus & Anti-Spyware: Anti-Virus helps protect your files and hardware from viruses, worms, and Trojan horses. Anti-Virus runs transparently and provides real-time protection against virus attacks. Our Anti-Virus engine includes Anti-Spyware protection as part of the core scanning technology. Spyware programs are put on your computer to secretly gather your personal information, which is then relayed to advertisers or other third parties.

Firewall: Firewall patrols incoming and outgoing connections and alerts you to unauthorized attempts to connect to your computer. It reduces the risk of external threats, such as hackers, from remotely accessing your computer without your knowledge. Firewall tools help you control how your Internet-enabled programs connect to and share files over the Internet. The firewall also provides wi-fi security, which helps ensure your wireless connection stays secure and keeps computers outside your home network from accessing your wireless connection.

Identity Protection: Identity Protection helps protect you from online fraud by alerting you when you attempt to access a potentially fraudulent website, such as phishing sites. Verizon SiteAdvisor Powered by McAfee displays a warning whenever you are accessing a known phishing website.

Family Protection – parental controls: Family Protection protects children of all ages from exposure to inappropriate content, social networking risks, strangers, and other threats. You can set filters for email, block your child from looking at inappropriate websites, monitor instant message conversations, block objectionable YouTube videos, block access to certain programs or applications, and create schedules to manage the time that your child spends surfing the Internet. In addition, you can configure instant alerts to let you know that your child has attempted to access a blocked website.

PC Optimization Tools: PC Optimization Tools improve and maintain your computer’s performance by providing easy to use disk defragmenter and cleanup tools.

WebAdvisor: Verizon WebAdvisor Powered by McAfee adds safety ratings to sites and search engine results based on comprehensive spam, adware, and online scam safety tests. Simple indicators of green (safe), yellow (caution) and red (stop) alert users to potentially harmful websites.

Home Network: Provides a network map of your network and information on the protection status of your computers.

Spam Protection: Keeps offensive, annoying and harmful spam messages out of your inbox.

System Requirements: For complete and up-to-date information, visit Verizon Internet Security Suite System Requirements. Verizon Internet Security Suite supports 32-bit and 64-bit systems.

For ordering and troubleshooting information, visit VISS General Support

Verizon Internet Security is not compatible with other anti-virus software. During installation, the VISS Install Integrator will scan your machine, identify any incompatible software, and request you remove it. Once all incompatible programs are removed the VISS installation will continue.

You can order the Verizon Internet Security Suite Multi-Device subscription. This subscription provides unlimited security licenses for all of your PCs, Macs as well as Android Smartphones and Tablets. The Verizon Internet Security Suite Multi-Device product must be installed on each device separately.

Yes, Verizon Internet Security Suite Multi-Device is now available for the Macintosh for MAC OS X version 10.5 and above. VISS for Macintosh includes anti-virus, firewall, family protection/parental controls and more.

Microsoft Windows:

Apple Macintosh Mac OS X:

Memory:

Storage Available:

Processor:

Minimum screen resolution:

Internet Connection Required:

Supported Browsers for Anti-phishing:

See original here:
Internet Security Suite | Verizon Internet

Read More..

Antivirus Security Software & Internet Security – Newegg.com

Software downloads are available from Newegg.com for all your software needs, from applications to utilities. Hundreds of programs can be downloaded and you can avoid the cost of shipping with just a few clicks of the mouse. It usually only takes a few minutes, depending on the speed of your computer, to have your program of choice on your computer and ready to use.

We have over 500 application software downloads to choose from. This includes music downloads, children’s interests, instructional software, office tools, legal forms, and many more. One of the best helps for office work, whether for a small office or a large corporation, is the availability of templates for everyday tasks. We have a large selection of software with hundreds of different types of templates that you can start using in just a matter of minutes.

Some of the most popular software downloads right now are our security and utilities software. The threat of viruses and spyware is growing every day. You must have adequate protection to safeguard the integrity of your computer. Instant use of downloadable software is crucial if you suspect you have been invaded by a virus. You can immediately start the process of removing the intruder and protecting your system from future attacks.

Digital imaging and editing is a favorite pastime as well as a great occupational tool. Photographers, designers, and many other occupations utilize the help that is available from some great software for enhancing, editing, and printing digital images. Whatever your need for software might be, you can buy online at low prices at newegg.com.

Read the original:
Antivirus Security Software & Internet Security – Newegg.com

Read More..

Cryptocurrency price plunge worse than bursting of dotcom …

Cryptocurrency prices that reached dizzying heights in late 2017 and into 2018 have plunged back to earth this year, bolstering the arguments of skeptics that the scorching hot market for digital money was an economic bubble due to burst.

According to Bloomberg News, the MVIS CryptoCompare Digital Assets 10 Index has fallen 80 percent from its January high — worse than the Nasdaq Composite index’s 78 percent peak-to-trough plunge following the dotcom-stock bust in 2000.

Bitcoin, the most widely used cryptocurrency, started the year priced above $17,000. It recently changed hands on $6,261, a drop of more than 60 percent, according to CoinDesk.Rival cryptocurrency ethereum recently traded at $173.25, down nearly 90 percent from its January high of $1,414.90. The total value of the top 100 cryptocurrencies tracked by CoinMarketCap, once nearly a trillion dollars, was pegged most recently at $188.5 billion, near its all-time low of $187 billion.

To be sure, fans of cryptocurrency have claimed that, much like the early Internet, digital money is an idea that will catch on eventually. They also note that prices have rebounded from steep sell-offs in the past. Indeed, there likely are bitcoin holders still in the black from the 1,500 percent price increase they experienced in 2017.

Bitcoin, which was first proposed by a person or persons who used the pseudonym Satoshi Nakamoto in 2009, has gained popularity among some investors as an alternative to conventional, or “fiat,” currency. The digital version is “mined” electronically by solving complicated mathematical equations. Converting cryptocurrency into “real” money can be tricky since it isn’t widely accepted.

Some of the leading figures in the investing world, including Warren Buffett, who likened bitcoin to “rat poison,” and JPMorgan Chase CEO Jamie Dimon, have urged investors to avoid the cryptocurrency market. The view, however, isn’t unanimous on Wall Street.

In a recent interview with CNBC, Mohamed El-Erian of Allianz Capital noted that the underlying blockchain technology behind cryptocurrencies, has some long-term potential and that bitcoin itself could be a buy if it falls below $5,000.

2018 CBS Interactive Inc.. All Rights Reserved.

See the original post:
Cryptocurrency price plunge worse than bursting of dotcom …

Read More..

US takes first step toward a quantum computing workforce …

Quantum computers promise to transform computer security, finance, and many other fields by solving certain problems far faster than conventional machines. To unlock that potential, the US government has just passed a bill to foster a viable quantum computing industry.

Christopher Monroe ofthe University of Maryland told the audience at EmTech, a conference organized by MIT Technology Review, that the US needs a new generation of engineers, schooled in the quirks of quantum physics as well as the principles of computer engineering, to help create quantum computers that can tackle real-world problems.

That is why Monroe helped draft the National Quantum Initiative Act, a bill just passed today that would establish a federal program for accelerating research and training in quantum computing. The act will release $1.275 billion to help fund several centers of excellence that should help train many quantum engineers.

Monroe is also the cofounder of IonQ, one of several startups now racing to develop usable quantum computers. It is hard for these companies to find engineers to help them develop and commercialize scalable systems. We need quantum systems engineers, Monroe said. We need that workforce.

Quantum computers operate in a totally different wayfrom conventional machines.In an ordinary computer, bits of information are represented using either a 1 or a 0. But in the quantum realm, matter behaves in bizarre ways. Quantum bits, or qubits, created and manipulated using superposition and entanglement, can perform certain types of calculation very rapidly on vast amounts of data.

In theory, a quantum machine with just a few hundred qubits should be able to run calculations that would be inconceivable using traditional hardware.

In practice, though, it is devilishly tricky to scale these systems up, because they are terribly sensitive to interference. Quantum computers were first proposed decades ago, but research on the technology has progressed at a glacial pace.

Startups and big tech companies are currently racing to develop more powerful quantum computers. IonQ is building its computers using ions trapped with electric fields. Several others, including Google, IBM, and Rigetti, are developing quantum computers using superconducting circuits. Rigetti recently demonstrated a new quantum cloud service (see Running quantum algorithms in the cloud just got a lot faster).

Monroe said the new national plan should also help the US compete internationally. China is pouring billions of dollars into its own quantum computing projects. The international picture is especially significant because these technologies promise to be useful for breakingbut also securingcommunications channels.

Within five years, quantum computers would be capable of calculations that could never be run using conventional hardware, Monroe predicts. But it remains unclear precisely how useful theseearlysystems will be, since they will only be capable of certain types of computation.

Figuring out how to use these machines will then be up to the quantum software engineers. When we build them, they will be useful for something, Monroe said.

Continue reading here:
US takes first step toward a quantum computing workforce …

Read More..

China bet big on quantum computing. Now the … – money.cnn.com

The US House of Representatives unanimously passed a bill Thursday to help it match China in quantum computing capabilities. Quantum computers promise to be orders of magnitude faster than the traditional computers we use today.

The bill was passed shortly after the Center for New American Security, a Washington, DC-based think tank of former Pentagon officials, warned in a new report China’s focus on quantum technologies could help it to surpass the United States military.

Traditional computers store data as a binary digit, like a light switch that’s on or off. Quantum computing relies on qubits, which can be in many positions at once.

This creates new possibilities for more powerful computers, and quantum advocates speak excitedly of new options such as more secure communications and improved cancer treatments.

“Quantum may be the compute technology of the next 100 years,” Jim Clarke, the director of quantum hardware at Intel told CNNMoney earlier this year. “This is something like a space race, it comes around once in a generation.”

Related: China leads the world in drones. US companies want to change that.

Intel, Google and IBM are among several American companies that are developing quantum technologies. But China stands out globally for its energy and investments.

“They have a quantum satellite no one else has done, a communications network no one else has done, and workforce development program to bring new Chinese quantum engineers online,” said Paul Stimers, founder of Quantum Industry Coalition, which lobbies on behalf of the American makers of quantum technologies. “You start to say, that’s worrisome.”

US stealth technology, a long-running military edge, could become obsolete due to quantum technologies, the Center for New American Security researchers caution. It could also become hard to keep an eye on China, and more difficult to guard sensitive US information.

For the first time in recent history, the United States faces the danger of being surprised by technologies another country possesses, Elsa Kania, one of the report’s authors, told CNNMoney. But predicting how powerful quantum technologies will become, and how fast they will do so is difficult, she added.

Congress isn’t alone in embracing quantum computing. In June, the White House announced a new subcommittee in the National Science and Technology Council to coordinate quantum information science research and development.

There’s significant hype in the quantum computing industry, and reasons to be overly concerned with possible dangers. A world-changing quantum computer is likely 10 years away, according to Clarke. Today, there are no guarantees quantum technologies will succeed. Qubits fail a lot, and they need to be kept at extremely cold temperatures a fraction of a degree above absolute zero.

China has launched a quantum satellite, but its abilities are extremely limited when compared with the superpowers quantum advocates expect the technology will one day perform.

“The satellite is absolutely useless in terms of doing anything right now, but it demonstrates a capability right now that’s fairly impressive,” Stimers said.

CNNMoney (Washington) First published September 14, 2018: 4:30 PM ET

Go here to see the original:
China bet big on quantum computing. Now the … – money.cnn.com

Read More..

5 Common Encryption Algorithms and the Unbreakables of the Future

Mchten Sie diesen Beitrag in Deutsch zu lesen? Lesen Sie die Deutsch-Version hier.

While security is an afterthought for many PC users, its a major priority for businesses of any size. It has to be when the Ponemon Institute tells us that security breaches are costing companies millions every year.

Even if you dont have millions to lose, protecting what you do have should be a high priority.

There are several forms of security technology available, but encryption is one that everyday computer users should know about.

Encryption is an interesting piece of technology that works by scrambling data so it is unreadable by unintended parties. Lets take a look at how it works with the email-friendly software PGP (or GPG for you open source people).

Say I want to send you a private message, so I encrypt it using either one of these programs. Heres the message:

wUwDPglyJu9LOnkBAf4vxSpQgQZltcz7LWwEquhdm5kSQIkQlZtfxtSTsmawq6gVH8SimlC3W6TDOhhL2FdgvdIC7sDv7G1Z7pCNzFLp0lgB9ACm8r5RZOBiN5ske9cBVjlVfgmQ9VpFzSwzLLODhCU7/2THg2iDrW3NGQZfz3SSWviwCe7GmNIvp5jEkGPCGcla4Fgdp/xuyewPk6NDlBewftLtHJVf=PAb3

Once encrypted, the message literally becomes a jumbled mess of random characters. But, equipped with the secret passcode I text you, you can decrypt it and find the original message.

Come on over for hot dogs and soda!

Whether its in transit like our hot dog party email or resting on your hard drive, encryption works to keep prying eyes out of your business even if they happen to somehow gain access to your network or system.If you want to learn more about how encryption helps protect business data,you can read our article on how encryption aids cloud security.

The technology comes in many forms, with key size and strength generally being the biggest differences in one variety from the next.

Triple DES was designed to replace the original Data Encryption Standard (DES) algorithm, which hackers eventually learned to defeat with relative ease. At one time, Triple DES was the recommended standard and the most widely used symmetric algorithm in the industry.

Triple DES uses three individual keys with 56 bits each. The total key length adds up to 168 bits, but experts would argue that 112-bits in key strength is more like it.

Despite slowly being phased out, Triple DES still manages to make a dependable hardware encryption solution for financial services and other industries.

RSA is a public-key encryption algorithm and the standard for encrypting data sent over the internet. It also happens to be one of the methods used in our PGP and GPG programs.

Unlike Triple DES, RSA is considered an asymmetric algorithm due to its use of a pair of keys. Youve got your public key, which is what we use to encrypt our message, and a private key to decrypt it. The result of RSA encryption is a huge batch of mumbo jumbo that takes attackers quite a bit of time and processing power to break.

Blowfish is yet another algorithm designed to replace DES. This symmetric cipher splits messages into blocks of 64 bits and encrypts them individually.

Blowfish is known for both its tremendous speed and overall effectiveness as many claim that it has never been defeated. Meanwhile, vendors have taken full advantage of its free availability in the public domain.

Blowfish can be found in software categories ranging from e-commerce platforms for securing payments to password management tools, where it used to protect passwords. Its definitely one of the more flexible encryption methods available.

Computer security expert Bruce Schneier is the mastermind behind Blowfish and its successor Twofish. Keys used in this algorithm may be up to 256 bits in length and as a symmetric technique, only one key is needed.

Twofish is regarded as one of the fastest of its kind, and ideal for use in both hardware and software environments. Like Blowfish, Twofish is freely available to anyone who wants to use it. As a result, youll find it bundled in encryption programs such as PhotoEncrypt, GPG, and the popular open source software TrueCrypt.

The Advanced Encryption Standard (AES) is the algorithm trusted as the standard by the U.S. Government and numerous organizations.

Although it is extremely efficient in 128-bit form, AES also uses keys of 192 and 256 bits for heavy duty encryption purposes.

AES is largely considered impervious to all attacks, with the exception of brute force, which attempts to decipher messages using all possible combinations in the 128, 192, or 256-bit cipher. Still, security experts believe that AES will eventually be hailed the de facto standard for encrypting data in the private sector.

Cyber attacks are constantly evolving, so security specialists must stay busy in the lab concocting new schemes to keep them at bay. Expert observers are hopeful that a new method called Honey Encryption will deter hackers by serving up fake data for every incorrect guess of the key code. This unique approach not only slows attackers down, but potentially buries the correct key in a haystack of false hopes. Then there are emerging methods like quantum key distribution, which shares keys embedded in photons over fiber optic, that might have viability now and many years into the future as well.

Whether its protecting your email communications or stored data, some type of encryption should be included in your lineup of security tools. Successful attacks on victims like Target show that its not 100 percent bulletproof, but without it, youre offering up convenient access to your data. Find some tools that give you a piece of mind and stick with em!

Visit link:
5 Common Encryption Algorithms and the Unbreakables of the Future

Read More..

HIPAA Compliant Cloud Hosting Services – atlantic.net

What is HIPAA Cloud?

Businesses that handle sensitive data requiring regulatory compliance often have computing needs which make them ideal candidates to benefit from the cloud. Medical practitioners covered under the Health Insurance Portability and Accountability Act (HIPAA ) and the Health Information Technology for Economic and Clinical Health (HITECH) Act must have confidence in the availability and security of their IT systems not just because they are required to by law, but because their delivery of critical services depends on it.

In previously discussing private and public cloud hosting solutions, we defined cloud computing roughly as the use and storage of data and programs over the internet, enabled by virtualization, as a scalable and elastic service. Atlantic.Nets HIPAA Compliant Cloud Hosting offering is an environment specifically engineered for HIPAA compliance within the Atlantic.Net Public or Private Cloud. It provides secure and compliant IT system access to internal, remote, and mobile employees to allow them to concentrate on service delivery.

HIPAA compliance is based on satisfying a set of requirements, including the Privacy Rule, the Breach Notification Rule, and the Security Rule. Healthcare companies will also be concerned with the Health Information Technology for Economic and Clinical Health (HITECH) Act, which regulates the electronic transmission of health information. HIPAA compliance failures can result in jail time, and more frequently, result in fines of thousands or even millions of dollars for a covered entity (CE), such as a health care provider, health plan, or health data clearinghouse. What makes a solution HIPAA compliant is a series of plans, measures, and commitments underpinned by enhanced security features.

HIPAA compliance requires that a set of data security standards and capabilities be met, but does not specify certain technical means to meeting them. According to the U.S. Department of Health & Human Services , provisions in a Service Level Agreement (SLA) between a covered entity and a HIPAA-compliant cloud provider may address HIPAA concerns, including: system availability and reliability, back-up and data recovery, how data will be returned to the customer after the service, security responsibility, and limitations of data use, retention, and disclosure.

The main security features of Atlantic.Net HIPAA Cloud are its fully managed firewall solutions and advanced intrusion detection system (IDS). An IDS provides real-time threat monitoring, based on a continually-revised threat database, which is used to identify threats within the system based on their patterns or signatures. The firewall controls and protects access to the perimeter of the cloud and tracks a variety of metrics, such as the response rate for network gateways. Network security professionals take care of the monitoring, updating, and other tasks necessary to the firewall and IDS’s management, removing a significant source of potential risk, frustration, and man-hours from the healthcare organization.

In addition to our fully managed firewall and IDS, Atlantic.Net also includes fully-encrypted Virtual Private Network (VPN) access to all of a business hosted servers. This helps satisfy the requirement that all data transmitted to a server with Protected Health Information (PHI) is sent over a secure and encrypted network.

While Atlantic.Net manages the firewall and other elements that combine to provide HIPAA compliance, customers can choose to manage their own host servers, and retain full visibility into their system or have Atlantic.Nets expert engineers manage their servers, freeing up internal company resources to focus on core business directives.

The potential for multi-million dollar fines and jail time for not implementing HIPPAA/HITECH compliance makes it essential for all covered entities. The global market for IT services in support of healthcare is expected to grow from $134 billion in 2016 to $280 billion in 2021, with the majority of revenue in North America, according to MarketsandMarkets research.

HIPAA compliance delivered through Atlantic.Nets HIPPA Cloud solutions provides all the benefits of the cloud, including availability, scalability, cost savings, access to expert engineeers, along with a strong added security or compliance benefits.

As an Atlantic.Net HIPAA Cloud customer ShareSafe Solutions provides software-as-a-service (SaaS) to healthcare companies for secure, HIPAA-compliant communication and information sharing. ShareSafe Solutions delivers integrated communication between office terminals and mobile devices through the cloud, protecting against breaches with biometric identity authentication and other technologies. The company required a robust cloud to maintain instant communication, without compromising on security. It chose Atlantic.Net for support from skilled engineers, and was rewarded for that decision with swift mitigation of multiple DDoS attacks.

In addition to its fully managed firewall solutions and robust intrusion detection systems, Atlantic.Net HIPAA Cloud features highly available infrastructure, an encrypted virtual private network (VPN), a robust log management system, and a choice of Windows or Linux servers. It is all backed by an available Business Associate Agreement (BAA) which establishes parameters for Atlantic.Net’s use of protected health information (PHI).

Atlantic.Net’s HIPAA solution is third-party audited, and backed by a 100 percent network and hardware uptime service level agreement (SLA). Our data centers are certified, with state-of-the-art redundant systems, power, and physical security.

Having secure infrastructure and meeting planning and documentation standards for compliance are important for satisfying HIPAA requirements. The real value of Atlantic.Net HIPAA Cloud Hosting, however, is our extensive experience surpassing the minimum standards for compliance, security, and availability, backed by our expert team of engineers. Atlantic.Net HIPAA Cloud gives healthcare organizations and CEs an IT environment that provides compliant, high-performance networking, and the service to help healthcare organizations use it to the maximum benefit for their business.

Excerpt from:
HIPAA Compliant Cloud Hosting Services – atlantic.net

Read More..