Page 6«..5678..2030..»

Fast & Secure Cloud Storage – Best Online Solution by Acronis

Only you have access to the data you store in the Acronis Data Center.Acronis Data Centers identify all the incoming data with your Acronis account number. Only you can access the data, whether you are backing up or restoring a single file or an entire machine.

Your data is encrypted even before you send it.Acronis Cloud Storage can encrypt your data at-source with government-approved AES-256 strong encryption before sending it to a secure Acronis Data Center. You set the password and only you can access it.

Even metadata is encrypted!All management communication between your system and the Acronis Cloud runs through secure channels with SSL encryption. With our cloud backup solutions, all aspects of your data are completely secure at any given moment in time.

Acronis Data Centers are highly secure.Physical security is ensured via high fences, 24×7 security personnel, and video surveillance with 90-day archiving. A biometric hand-geometry scan and proximity key card are required for access.

See the original post:
Fast & Secure Cloud Storage – Best Online Solution by Acronis

Read More..

Blockchain Will Survive A Cryptocurrency Apocalypse

A year ago, the idea that Bitcoin and cryptocurrencies were going to change the world was becoming the consensus opinion. Today, not so much.

The digital currencynow trades below $5,000. Its 77% off its high near $20,000 in January. Other cryptos are collapsing, too.

Blockchain technology, cryptocurrency mining. Server roomGetty

There is a catalyst. People who follow digital tokens blame thehard forkof Bitcoin Cash. The smaller, namesake cryptocurrency is itself a fork of Bitcoin proper. But last week, its developers and miners could not agree on the future of the digital token. So they decided to split into two competing cryptos, Bitcoin ABC and Bitcoin Satoshis Vision (SV).

If that seems like an inherently bad idea, it is. Bitcoin is an open source project. Developers are free to duplicate the base code and create cryptocurrencies at will. And they have. As of November 2018, there are 2,502 cryptocurrencies, according to alistcompiled at The cumulative market capitalization of these tokens is $142 billion, although it had been much higher.

Forgive me. Im burying the lede. The problem with Bitcoin, and cryptocurrency in general, is not forking. Its that developers should not be able tocreatecurrency, at all.

I began writing inJanuarythat cryptocurrencies were where the internet was in the dot-com era, and inFebruarythat most of these thousands of cryptos were headed to zero. At the time, it was not a popular position. I prefaced my view on two things every potential investor needs to understand about me too digital coins: There is no use case, and worse, its unlikely they will ever represent a store of value.

Keep in mind, many things can represent a store of value. Collectibles like art, baseball cards and signed memorabilia immediately come to mind. Cryptocurrencies, at least the vast majority of them, will never be that.

Bill Harris, a former chief executive officer atPayPal, made headlines in August when he wrote atRecode: OK, Ill say it: Bitcoin is a scam.

Harris argues Bitcoin is a pump-and-dump scheme, where promoters push up the value of dubious investments with hype and relentless advocacy. As the price surges and enthusiasm is greatest, they dump everything, leaving unsuspecting investors holding worthless securities.

Admittedly, I have made this case about so-called alternative coins. Investing in an Initial Coin Offering is like speculating in a highly promoted junior gold mining company where the prospect of finding actual gold is nil. There will be price volatility and plenty of promises made. But in the end, the investment is worthless. And it was always going to be worthless.

But Harris is conflating Bitcoin with alternative coins. That is a mistake, I believe.

A pure digital currency is a good idea.It takes power away from central authority. The problem is oversupply. There are currently too many coins and too many charlatans.

This will pass. The Securities and Exchange Commission will round up the fraudsters. Their fake investment premises will lead to a great reckoning. Most ICOs will go to zero because they will be unable to pass the test of legitimate government oversight.

That could leave Bitcoin as one of the last digital coins standing. When that happens, my guess is it will ultimately be more valuable than it is today. However, there is plenty of pain ahead as pump-and-dump schemes are uncovered, and most coins collapse souring the mood for all their peers.

The play for stock investors is blockchain, Bitcoins cryptographic infrastructure

Ultimately, this digital ledger system is going to find its way into global supply chains and financial services because it systematically removes middling trusted agents for verification.

Blockchain will make legions of accountants, lawyers and back office personnel redundant.

IDC, a global information technology research firm, sees blockchain as part of alarger digital transformation. The shift could be worth $7 trillion by 2022.

Microsoftwas an early convert to the power of blockchain. Itbegan workingwith financial services start-ups in 2016. More recently, the Redmond, Wash., software giant has been touting the scalability of its Azure cloud computing platform to run ledger systems. The company is even working on a blockchain-as-a-service tool.

Shares trade at 20x forward earnings. The market capitalization has come down to $780 billion in the last leg of the tech wreck. The stock would be a great pickup in the low $90s.

View post:
Blockchain Will Survive A Cryptocurrency Apocalypse

Read More..

Encryption | Information Technology Services

This InfoCenteris a collection of resourcesaboutencryption for stored informationonportable devices, such as laptops, tablets, and externally attachedstorage. (Refer to TLS certificates in the Related InfoCenters box forinformation related toencrypted network communications.) The Help Desk provides general support for Windows BitLocker and for OSX FileVault2 full disk encryption.Questionsshould normally be handled by a departmental IT support person, and if necessary willbe escalated to the InformationSecurity & PolicyOffice or the ITS Enterprise Client Management team.

Encryption is a method to protect digital information, byscrambling it as it travels across the Internet, or scrambling it when the information is “at rest”or stored on our computers. This ensures that only authorized users can decrypt (un-scramble) the information and use it. Encryption enhances the privacy and confidentiality, as well as the integrity and authenticity of our information. It helps us keep our information safe.

Portable devices such as laptops, tablets, and USB storage are most at risk for being misplaced or stolen. If a device is lost or stolen, encryption prevents unauthorized users from accessing data stored locally on the device. Without encryption, unauthorized users canuse various techniques to bypass the accounts and permissions in order to access the localdrive contents.

In order to meet our legal obligations and our responsibility to protect the privacy of those we serve, The University of Iowa requires full disk encryption to be implemented onall university owned mobile computing devices (i.e.laptops,tablets, USBstorage). The best way to avoid theft or lossof sensitive data is to keepit in a secure file storage offering such as OneDrive, RDSS,or department shared drives, where it’s physically secured and regularly backed up. Then,you can easily access the information remotelyfrom your mobile computer. However, encryption is oursafety net for new files,temporary (cached) files, and other information that is stored on a mobile device.

Everyone uses network encryption today: over https connections from your browser to a website, over cellular phone-to-tower communications, and also over wireless networks that require a login or connection password, such as Eduroam, in order to protect the privacy of communications. Full disk encryption is similarly designed to protect information when its stored.

Encryption | Information Technology Services

Read More..

Cryptocurrency – Simple English Wikipedia, the free encyclopedia

digital medium of exchange

A cryptocurrency is a medium of exchange, that is designed to work like a currency. Usually, cryptocurrencies use features found in strong cryptography, such as digital signatures to secure financial transactions, control the creation of additional units, and verify the transfer of assets.[1][2][3] The first of them were created to be independent of a government-issued currency.

Cryptocurrencies use decentralized control[4] as opposed to centralized electronic money and central banking systems.[5] The decentralized control of each cryptocurrency works through distributed ledger technology, typically a blockchain [6], that serves as a public financial transaction database.[7][8]Bitcoin, first released as open-source software in 2009, is generally considered the first decentralized cryptocurrency.[9] Since then, over 4,000 altcoin (alternative coin) variants of bitcoin have been created.

In many cases, cryptocurrencies cannot be converted to real currencies; it is only possible to convert them to other cryptocurrencies, or to use them to buy things. Some cryptocurrencies can be converted to real currrencies: They usually have a high volatility, and using them carries a high risk.[10] They are also a target for so-called Pump-and-Dump-Attacks.[11] They act like a big distributed economic system: As they are not issued or controlled by central banks, their value is difficult to influence: For this reason, they cannot really take the place of a stable currency.[12]

Cryptocurrencies are prone to speculation, which makes buliding a system of more or less stable exchange rates very difficult.[13] Another problem is the inequality of distribution: Many cryptocurrencires are held by only few people. As an example: about 1.000 people hold half of the total amount of bitcoins in the world. This means that if any of these persons starts using their cryptocurrency, this has an effect on the exchange rate. It also means that these people have a great influence on the value of the currency, and are able to change its value easily.[14] The currency itself only documents ownership changes. Exchange rates of cryptocurrencies are established outside the system. Exchange rates are issued by brokers and traders; their indication is no guarantee that the currency is traded at the value proposed. In itself, the unit of cryptocurrency has no value.

In contrast to cyptocurrencies, real currencies are issued and controlled by central banks. Certain econnomic phenomena such as inflation or deflation may change the value (and exchange rate) of a currency. The people who own units of the currency have no direct influence on its value.

According to Jan Lansky, a cryptocurrency is a system that meets six conditions:[15]

In March 2018, the word “cryptocurrency” was added to the Merriam-Webster Dictionary.[16]

The rest is here:
Cryptocurrency – Simple English Wikipedia, the free encyclopedia

Read More..

15 Top Cloud Computing Service Provider Companies

Introduction to Cloud Computing Services:

Earlier we used to store our data in hard drives on a computer. Cloud Computing services have replaced such hard drive technology. Cloud Computing service is nothing but providing services like Storage, Databases, Servers, networking, the softwares etc through the Internet.

Few Companies offer such computing services, hence named as Cloud Computing Providers/ Companies. They charge its users for utilizing such services and the charges are based on their usage of services.

In our daily routine we use this cloud service without our notice like web-based email service, watching movies through the internet, editing documents, storing pictures etc uses cloud computing on the back-end.

Using such cloud technology we can design and create new applications, store and recover data, hosting the websites etc.

Generally, cloud computing services are categorized into three types.

1) Infrastructure as a Service (IaaS): This service provides the infrastructure like Servers, Operating Systems, Virtual Machines, Networks, and Storage etc on rent basis.

Eg: Amazon Web Service, Microsoft Azure

2) Platform as a Service (PaaS): This service is used in developing, testing and maintaining of software. PaaS is same as IaaS but also provides the additional tools like DBMS, BI services etc.

Eg: Apprenda, Red Hat OpenShift

3) Software as a Service (SaaS): This service makes the users connect to the applications through the Internet on a subscription basis.

Eg: Google Applications, Salesforce


=> Let us know if we are missing any company in this list


Here we go with a brief review of the individual company.

=> Explore the site for more features on Amazon Web Services.


=> Visit Kamatera Cloud Services


=> You can visit this website for further information.


=> Visit Google Cloud Platformfor more details.


=> For more information on this service, visit Adobe website.


Visit this websitefor further details on VMware Cloud service.

For more information on IBM, access IBM Cloud.

For more details visit Rackspace Cloud.

You can visit the Red Hat website and browse for more information regarding cloud computing.

To learn more about Salesforce, you can visit here.

Visit the website for a free trial version and further details on Oracle Cloud.

For further queries or information regarding pricing visit SAP Cloud.

Visit the Verizon Cloud website for more details.

A free trial version of Navisite desktop service is availablehere.

30 days free trialversion of Dropbox can be accessed here.

For additional information visit Egnyte.

This article provides you a list of best cloud computing service providers using which one can avail various cloud services like file sharing, automatic backup of files, file locking, notifications to users regarding any updates etc.

Depending upon their specifications few of the cloud service providers limit their services to small businesses, consumers, mid-sized businesses etc.


=> Let us know if we are missing any company in this list.


Read more from the original source:
15 Top Cloud Computing Service Provider Companies

Read More..

Cloud Computing Overview –


Cloud Computing provides us means of accessing the applications as utilities over the Internet. It allows us to create, configure, and customize the applications online.

The termCloudrefers to aNetworkorInternet. In other words, we can say that Cloud is something, which is present at remote location. Cloud can provide services over public and private networks, i.e., WAN, LAN or VPN.

Applications such ase-mail, web conferencing, customer relationship management (CRM) execute on cloud.

Cloud Computingrefers tomanipulating, configuring,andaccessingthe hardware and software resources remotely. It offers online data storage, infrastructure, and application.

Cloud computing offers platform independency, as the software is not required to be installed locally on the PC. Hence, the Cloud Computing is making our business applicationsmobileandcollaborative.

There are certain services and models working behind the scene making the cloud computing feasible and accessible to end users. Following are the working models for cloud computing:

Deployment models define the type of access to the cloud, i.e., how the cloud is located? Cloud can have any of the four types of access: Public, Private, Hybrid, and Community.

Thepublic cloudallows systems and services to be easily accessible to the general public. Public cloud may be less secure because of its openness.

Theprivate cloudallows systems and services to be accessible within an organization. It is more secured because of its private nature.

Thecommunity cloudallows systems and services to be accessible by a group of organizations.

Thehybrid cloudis a mixture of public and private cloud, in which the critical activities are performed using private cloud while the non-critical activities are performed using public cloud.

Cloud computing is based on service models. These are categorized into three basic service models which are –

Anything-as-a-Service (XaaS) is yet another service model, which includes Network-as-a-Service, Business-as-a-Service, Identity-as-a-Service, Database-as-a-ServiceorStrategy-as-a-Service.

TheInfrastructure-as-a-Service (IaaS)is the most basic level of service. Each of the service models inherit the security and management mechanism from the underlying model, as shown in the following diagram:

IaaSprovides access to fundamental resources such as physical machines, virtual machines, virtual storage, etc.

PaaS provides the runtime environment for applications, development and deployment tools, etc.

SaaSmodel allows to use software applications as a service to end-users.

The concept ofCloud Computingcame into existence in the year 1950 with implementation of mainframe computers, accessible viathin/static clients. Since then, cloud computing has been evolved from static clients to dynamic ones and from software to services. The following diagram explains the evolution of cloud computing:

Cloud Computing has numerous advantages. Some of them are listed below –

One can access applications as utilities, over the Internet.

One can manipulate and configure the applications online at any time.

It does not require to install a software to access or manipulate cloud application.

Cloud Computing offers online development and deployment tools, programming runtime environment throughPaaS model.

Cloud resources are available over the network in a manner that provide platform independent access to any type of clients.

Cloud Computing offerson-demand self-service. The resources can be used without interaction with cloud service provider.

Cloud Computing is highly cost effective because it operates at high efficiency with optimum utilization. It just requires an Internet connection

Cloud Computing offers load balancing that makes it more reliable.

Although cloud Computing is a promising innovation with various benefits in the world of computing, it comes with risks. Some of them are discussed below:

It is the biggest concern about cloud computing. Since data management and infrastructure management in cloud is provided by third-party, it is always a risk to handover the sensitive information to cloud service providers.

Although the cloud computing vendors ensure highly secured password protected accounts, any sign of security breach may result in loss of customers and businesses.

It is very difficult for the customers to switch from oneCloud Service Provider (CSP)to another. It results in dependency on a particular CSP for service.

This risk involves the failure of isolation mechanism that separates storage, memory, and routing between the different tenants.

In case of public cloud provider, the customer management interfaces are accessible through the Internet.

It is possible that the data requested for deletion may not get deleted. It happens because either of the following reasons

There are four key characteristics of cloud computing. They are shown in the following diagram:

Cloud Computing allows the users to use web services and resources on demand. One can logon to a website at any time and use them.

Since cloud computing is completely web based, it can be accessed from anywhere and at any time.

Cloud computing allows multiple tenants to share a pool of resources. One can share single physical instance of hardware, database and basic infrastructure.

It is very easy to scale the resources vertically or horizontally at any time. Scaling of resources means the ability of resources to deal with increasing or decreasing demand.

The resources being used by customers at any given point of time are automatically monitored.

In this service cloud provider controls and monitors all the aspects of cloud service. Resource optimization, billing, and capacity planning etc. depend on it.

Read more:
Cloud Computing Overview –

Read More..

Cloud Computing Trends: 2017 State of the Cloud Survey

Update: 2018 cloud computing trends from the latest RightScale State of the Cloud Survey are now available.

In January 2017, RightScale conducted its sixth annual State of the Cloud Survey of the latest cloud computing trends, with a focus on infrastructure-as-a-service. In 2017, we see several new themes emerging: anarrowing race among public cloud providers,decrease in private cloud adoption, a renewed focus among enterprises on optimizing cloud costs, and strong growth in Docker.

This is the largest survey on the use of cloud infrastructure thatis focused on cloud buyers and users, as opposed to cloud vendors. Their answers provide a comprehensive perspective on the state of the cloud today.

The survey asked 1,002 IT professionals about their adoption of cloud infrastructure and related technologies. Forty-eight percent of the respondents represented enterprises with more than 1,000 employees. The margin of error is 3.07 percent.

We highlight several key findings from the survey in this blog post. For the complete survey results, download the RightScale 2017 State of the Cloud Report.

Cloud Computing Trends: Key Findings

In the twelve months since the last State of the Cloud Survey, weve seen private cloud adoption fall slightly. The percent of respondents now adopting private cloud is 72 percent, down from 77 percent last year.As a result, use of hybrid cloud environments has fallen to 67 percent from 71percent last year. In total, 95 percent of respondents are now using cloud.

The percentage of enterprises that have a strategy to use multiple clouds grew to 85 percent (vs. 82 percent in 2016) with 58 percent planning on hybrid (vs. 55 percent in 2016). There was also an increase in the number of enterprises planning for multiple public clouds (up from 16 percent to 20 percent) and a concurrent decrease in those planning for multiple private clouds (down from 11 percent to 7 percent).

Companies that use public cloud are already running applications in an average of 1.8 public clouds and experimenting with another 1.8 public clouds. While fewer companies are using private clouds, those that do use more, running applications in an average of 2.3 private clouds and experimenting with an additional 2.1 private clouds.

Companies now run 79 percent of workloads in cloud, with 41 percent of workloads in public cloud and 38 percent in private cloud. Its important to note that the workloads running in private cloud may include workloads running in existing virtualized environments or bare-metal environments that have been cloudified.

Enterprises run 75 percent of workloads in cloud with more in private cloud (43 percent) vs. public cloud (32 percent). SMBs run 83 percent of workloads in cloud with more in public cloud (50 percent) vs. private cloud (33 percent).

This year we saw a strong shift toward centralization, with more central IT teams taking a broader view of their role in cloud. They see a role for themselves in selecting public clouds (65 percent), deciding/advising on which apps to move to cloud (63 percent), and selecting private clouds (63 percent).

However, there is now a significant gap between the view of central IT and that of the business units they support. Respondents in business units are less likely to delegate authority to central IT for selecting public clouds (41 percent), deciding/advising on which apps to move to cloud (45 percent), and selecting private clouds (38 percent).

In 2017, cloud challenges declined across the board with the exception of governance/control, which remained flat. This year expertise, security, and spend were all tied for the top challenge with 25 percent of respondents citing each as a significant challenge.

Lack of resources/expertise, the #1 cloud challenge in 2016, was less of a challenge in 2017 with only 25 percent citing it as a major concern, down significantly from 32 percent in 2016. Concerns about security fell to 25 percent vs. 29 percent last year. Managing cloud spend fell only slightly from 26 to 25 percent.

Even as managing cloud costs becomes a top challenge, cloud users underestimate the amount of wasted cloud spend. Respondents estimate 30 percent waste, while RightScale has measured actual waste between 30 and 45 percent.

This increased concern about costs has made optimizing cloud costs the top initiative for 2017 across all cloud users (53 percent) and especially in mature cloud users (64 percent).

As part of adopting DevOps processes, companies often choose to implement new tools that allow them to standardize and automate deployment and configuration of servers and applications. These tools include configuration management tools (such as Chef, Puppet, and Ansible) and, more recently, container technologies, such as Docker and container orchestration and scheduling tools such as Kubernetes, Swarm, and Mesosphere.

The meteoric rise in the use of containers now makes Docker the top DevOps tool among those included in our survey. Overall Docker adoption surged to 35 percent, taking the lead over Chef and Puppet at 28 percent each. (Note that we did not ask about continuous integration tools such as Jenkins, Travis, and others.)

The 2017 State of the Cloud Survey reveals that although AWS continues to lead in public cloud adoption (57 percent of respondents currently run applications in AWS), this number has stayed flat since both 2016 and 2015. It is important to note that while the percentage of companies running at least one application in AWS is flat, the number of applications and VMs they are running is increasing, thereby driving increased revenue for AWS.

In contrast, over the last year, weve seen significant growth in the percentage of respondents running applications in Azure and Google, the #2 and #3 public cloud providers. Overall Azure adoption grew from 20 to 34 percent of respondents to reduce the AWS lead, with Azure now reaching 60 percent of the market penetration of AWS. Google also increased adoption from 10 to 15 percent.

The public cloud adoption numbers above indicate the number of respondents who are running any workloads in a particular cloud. However, it is also important to look at the number of workloads or VMs that are running in each cloud. The chart below shows the number of VMs being run.

So although AWS adoption is flat, it shows the largest footprint for public clouds with 8 percent running more than 1,000 VMs and 28 percent running more than 100 VMs. In comparison, Azure only has 3 percent running more than 1,000 VMs and and 13 percent running more than 100 VMs.

In contrast to last years survey when we saw private cloud adoption grow, the 2017 survey shows that adoption of private cloud is flattening across all providers. Across all sizes of organizations, VMware vSphere continues to lead with 42 percent adoption, slightly below last year (44 percent). OpenStack (20 percent) and VMware vCloud Suite (19 percent) were also flat in growth, with OpenStack barely eking into the #2 slot. Microsoft Azure Pack/Stack was the only private cloud technology to show significant growth, up from 9 percent to 14 percent. Microsoft System Center showed 3 percent growth, which is right at the 3 percent margin of error.

The 2017 State of the Cloud Survey shows that while hybrid cloud remains the preferred enterprise strategy, public cloud adoption is growing while private cloud adoption flattened and fewer companies are prioritizing building a private cloud. This was a change from last years survey, where we saw strong gains in private cloud use.

AWS leads in public cloud adoption despite staying flat for the last two years in the number of respondents using it. However, respondents are running more VMs in AWS than in other public clouds, which explains the AWS lead in revenue. Azure made strong gains in adoption in this years survey, closing the lead on AWS. Google also made gains and still remains in the #3 position.

Enterprise central IT teams are taking a stronger role in cloud adoption. However, business units seem reluctant to give up authority. Cloud governance continues to progress, which will serve to help increase alignment between central IT and the business units they support.

With increasing maturity of both cloud users and cloud providers, we are seeing an across-the-board reduction in cloud challenges. Unlike last year when concern about resources and expertise was the most widespread (32 percent of users), this year security, spend, and expertise tied for the largest concern, albeit with only 25 percent of users expressing concern about each.

As adoption grows, cloud bills and cost concerns are also growing. As a result, the most cited challenge among mature cloud users was managing cloud costs. Most organizations, however, continue to underestimate the level of waste in cloud spend (30 percent) when compared to actual waste between 30 and 45 percent measured by RightScale. Although only a minority of cloud users have taken action to reduce waste, they are now turning their focus to this issue, making it the top initiative for 2017, followed closely by migrating more workloads to cloud.

The use of DevOps practices and tools continues to increase, with enterprises moving beyond piecemeal adoption to company-wide DevOps programs. This year Docker surged to become the top DevOps tool in the survey, seemingly at the expense of configuration management tools such as Puppet and Chef, which showed declines in adoption.

Download the RightScale 2017 State of the Cloud Report for the complete survey results.

Use of Charts and Data In This Report

We encourage the re-use of data, charts, and text published in this report under the terms of this Creative Commons Attribution 4.0 International License. You are free to share and make commercial use of this work as long as you attribute the RightScale 2017 State of the Cloud Report as stipulated in the terms of the license.

Read more from the original source:
Cloud Computing Trends: 2017 State of the Cloud Survey

Read More..

Bitcoin | Bitcoin Price | Bitcoin News | BTC |

Bitcoin is one of many cryptocurrencies currently finding its way across the world of business and finance, Bitcoin is a cryptocurrency and was thought of as Internet money in its early beginnings. Unlike fiat currencies Bitcoin is considered a decentralized currency that means that a network of users control and verify transactions instead of a central authority like a bank or a government.Bitcoin still works like real money one person pays another person for goods and services however once Bitcoin is exchanged, the record of the transaction is publicly recorded onto a ledger known as a blockchain, which other Bitcoin users known as miners verify the transactions in the blockchain via Proof of Work. After a certain amount of transactions have been verified by a miner, they will receive newly minted bitcoins for their work and thus new bitcoins will be added into circulation, while the number of bitcoins in circulations are now in the multi-millions range, the maximum amount of bitcoins that can ever be created is capped at 21 million. The creation rate is automatically halved every few years as more bitcoins are added into circulation, whilst this system is modeled after gold, mining difficulty is always increasing and makes finding new bitcoins more rare as the number of available bitcoins reaches the 21 million cap.As bitcoin has matured as a cryptocurrency there has been more companies warming to the idea of using various bitcoin exchange facilities to gain exposure to the volatile bitcoin price while a few websites such as reddit WordPress and overstock have begun accepting bitcoins, most major retailers have yet to take the plunge into the cryptoverse whils other pioneers have decided to create their own bitcoin forks and have listed new projects on other cryptocurrency exchanges.

Excerpt from:
Bitcoin | Bitcoin Price | Bitcoin News | BTC |

Read More..

Cloud computing: Hardware & Software Security: Online …

Examples of cloud computing include Software as a Service, Platform as a Service, and Infrastructure as a Service. Generally, cloud computing services are run outside the walls of the customer organization, on a vendor’s infrastructure with vendor maintenance.

Although cloud-like services can be internal (e.g., IU’s Intelligent Infrastructure), this document refers exclusively to cloud services provided by third-party vendors over a network connection where at least part of the service resides outside the institution, regardless of whether those services are offered freely to the public or privately to paying or registered users.

Cloud computing represents an externalization of information technology applications and infrastructure beyond an organization’s data center walls. In the university context, cloud computing may be thought of as extra-campus or above-campus computing.

Cloud services are often available “on demand,” and utilize an infrastructure shared by the vendor’s customers. While some offer a flat fee model or consumption-based pricing, other cloud services are offered at no cost.

Within the university, the confidentiality, integrity, availability, use control, and accountability of institutional data and services are expected to be ensured by a suite of physical, technical, and administrative safeguards proportional to the sensitivity and criticality (i.e., risk) of those information assets and services.

These safeguards help protect the reputation of the university and reduce institutional exposure to legal and compliance risks. Much of the challenge in approaching cloud computing involves determining whether a service vendor has adequate safeguards in place commensurate with the value and risk associated with assets and services involved.

Once the high-level challenges are understood, the next step is to consider the risks and determine whether or how to appropriately mitigate those risks in the context of the proposed information and/or service.

The above factors should not be taken to suggest that cloud computing has no potential benefits; but rather that the benefits must be balanced with the risks involved when evaluating the use of cloud computing services.

Cloud computing services are similar to traditional outsourcing and can be approached analogously while accounting for their unique risks/benefits. The following recommendations and strategies are intended to assist units in their approach to evaluating the prudence and feasibility of leveraging cloud services.

See the original post here:
Cloud computing: Hardware & Software Security: Online …

Read More..

Cloud Solutions from Cisco – Cisco

Today there is no single cloud, and applications and their developers play a more critical role than ever. Organizations are challenged to find the right people, processes, and tools to simplify the complexities of a multicloud world and to innovate quickly.

Automation and orchestration. Compliance. Workload governance. Kubernetes and containers. SaaS security and performance. Consistent networking and security policies. It can all get to be too much, too fast. But what if there was an answer for all this complexity? What if we could make things simpler?

Cisco brings together networking, security, analytics, and management. We deliver cloud solutions that span your multicloud world, from your on-premises environment to your multiple cloud providers, and from your applications to your infrastructure.

Our cloud solutions help you manage a private, hybrid, or public cloud, or all of the above. Whether you have one application and one cloud or multicloud applications and multiple clouds, we help you embrace a multicloud world by simplifying how you connect, protect, and consume your clouds.

View post:
Cloud Solutions from Cisco – Cisco

Read More..