Category Archives: Cloud Computing

Stack Overflow and Google Cloud Announce Strategic Partnership to Bring Generative AI to Millions of Developers – PR Newswire

Partnership brings together the leading knowledge platform for developers with Google Cloud's leading AI platform

NEW YORK and SUNNYVALE, Calif., Feb. 29, 2024 /PRNewswire/ -- Stack Overflow and Google Cloud today announced a strategic partnership that will deliver new gen AI-powered capabilities to developers through the Stack Overflow platform, Google Cloud Console, and Gemini for Google Cloud.

Through the partnership, Stack Overflow will work with Google Cloud to bring new AI-powered features to its widely adopted developer knowledge platform. Google Cloud will integrate Gemini for Google Cloud with Stack Overflow, helping to surface important knowledge base information and coding assistance capabilities to developers. Google Cloud will also surface validated technical knowledge from Stack Overflow directly in the Google Cloud console, giving developers easy access to trusted and accurate knowledge and code backed by the millions of developers that have contributed to the Stack Overflow platform for 15 years.

"This partnership brings our enterprise AI platform together with the most in-depth and popular developer knowledge platform available today," said Thomas Kurian, CEO at Google Cloud. "Google Cloud and Stack Overflow will help developers more effectively use AI in the platforms they prefer, combining the vast knowledge from the Stack Overflow community and new AI capabilities, powered by Vertex AI and Google Cloud's trusted, secure infrastructure."

"In the AI era, Stack Overflow has maintained that the foundation of trusted and accurate data will be central to how technology solutions are built, with millions of the world's developers coming to our platform as one of the few high quality sources of information with community attribution at its core," said Prashanth Chandrasekar, CEO of Stack Overflow. "This landmark, multi-dimensional AI-focused partnership, which includes Stack Overflow adopting the latest AI technology from Google Cloud, and Google Cloud integrating Stack Overflow knowledge into its AI tools, underscores our joint commitment to unleash developer creativity, unlock productivity without sacrificing accuracy, and deliver on socially responsible AI. By bringing together the strengths of our two companies, we can accelerate innovation across a variety of industries."

Extending Stack Overflow to Gemini for Google Cloud and the Google Cloud ConsoleStack Overflow and Google Cloud are partnering to unleash developer productivity by bringing together Gemini for Google Cloud with Stack Overflow's trusted, community-vetted knowledge. Gemini for Google Cloud is already trained on an extensive collection of publicly available information and code from open-source and third-party platforms. Now, Gemini for Google Cloud will also provide developers with suggestions, code, and answers from Stack Overflow, utilizing the new OverflowAPI.

In addition, developers using Gemini for Google Cloud will be able to access Stack Overflow directly from the Google Cloud console, bringing them greater access to information so they can ask questions and get helpful answers from the Stack Overflow community in the same environment where they already access Google Cloud developer services and manage cloud applications and infrastructure.

Supercharging Stack Overflow's developer engagement platform with Google Cloud's AI servicesStack Overflow has selected Google Cloud as the platform of choice to host and grow its public facing developer knowledge platform. In addition, Stack Overflow plans to leverage Google Cloud's state-of-the-art AI capabilities to improve their community engagement experiences and content curation processes. The use of Google Cloud AI technology is expected to result in an accelerated content approval process and further optimized forum engagement experiences for Stack Overflow users.

To learn more about Stack Overflow, visithttps://stackoverflow.co. To learn more about Gemini for Google Cloud, visit https://cloud.google.com/duet-ai.

The first set of new integrations and capabilities between Stack Overflow and Gemini for Google Cloud will be available in the first half of 2024 and previewed at Google Cloud Next, April 9-11.

About Stack Overflow Across both its public and private platforms, Stack Overflow is empowering developer communities to discover the information, answers, and learning opportunities they need when they need them. Millions of the world's developers and technologists visit Stack Overflow to ask questions, learn, and share technical knowledge, making it one of the most popular websites in the world. Stack Overflow's market-leading knowledge sharing and collaboration platform, Stack Overflow for Teams, helps more than 15,000 organizations distribute knowledge, increase efficiency, and innovate faster. Founded in 2008, Stack Exchange, Inc., the owner of Stack Overflow, is headquartered in New York, NY. Stack Overflow is a registered trademark of Stack Exchange, Inc.

About Google CloudGoogle Cloud accelerates every organization's ability to digitally transform its business and industry. We deliver enterprise-grade solutions that leverage Google's cutting-edge technology, and tools that help developers build more sustainably. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems.

SOURCE Google Cloud

The rest is here:
Stack Overflow and Google Cloud Announce Strategic Partnership to Bring Generative AI to Millions of Developers - PR Newswire

Top Cloud Computing Bootcamps to Enroll in 2024 – Analytics Insight

In todays fast-paced job market, staying ahead of the curve is essential. One area where this is particularly true is in cloud computing and modular technology solutions. These cutting-edge fields are crucial for excelling in the modern corporate world. Its no surprise that cloud and distributed computing have consistently ranked high on LinkedIns Annual list of skills employers expect the most from individuals.

For those interested in a career path in cloud computing, enrolling in a Cloud Computing Bootcamp can be a smart move to gain basic knowledge and skills. However, with so many alternatives available, determining the ideal one may be difficult. To help you navigate this, weve curated a list of the top cloud computing Bootcamps that are worth your time and effort.

This program, offered in partnership with Caltech CTME, provides in-depth training on cloud computing, focusing on Azure and AWS. Participants gain skills in designing and deploying dynamically scalable and reliable cloud applications. The program includes live learning, hands-on exercises, industry case studies, masterclasses by CTME faculty, and full-spectrum career services.

This 8-month program (4 hours per week) covers all aspects of cloud computing, including core distributed systems, cloud applications, and cloud networking. The specialization consists of 6 courses that progress from basic to advanced topics. Participants earn a course completion certificate by successfully completing a hands-on project.

This program explores all three types of cloud computing IaaS, PaaS, and SaaS. Participants learn about cloud technologies such as AWS, GCP, Azure, vSphere, and OpenStack, and how to use them to enhance business productivity and effectiveness. The program lasts for 8 months and involves instructor-led training.

This learning path consists of 6 cloud computing courses totaling 10 hours of comprehensive learning material. Participants gain a strong foundation in cloud computing, understanding the differences between AWS, Azure, and GCP, exploring common features of all cloud services, and learning about different job options related to cloud development.

This course covers basic cloud computing concepts along with AWS fundamentals. With around 8 hours of on-demand video, participants gain an understanding of the fundamental systems underlying the cloud and build their expertise from basic to advanced levels.

This program is designed to help participants become AWS Cloud Architects, capable of leading an organizations cloud computing strategy. The 3-month program (10 hours per week) covers planning, designing, and building highly available and secure cloud infrastructure. Prior knowledge of programming, AWS, and cloud computing is necessary.

This training program is ideal for those seeking a foundational understanding of cloud computing. Participants learn cloud computing basics in a platform-agnostic way, understanding which cloud provider or deployment model is right for them. The program also covers the benefits and limitations of major cloud service platforms, including AWS, Azure, and GCP.

This program aims to make participants proficient in cloud applications and architecture. Participants explore core cloud computing skills such as AWS CloudFormation, EC2, S3, Azure Resource Manager, VPC, Route53, Azure App Services, and more. The program also prepares participants for cloud architect certifications like Azure Architect and AWS Solutions Architect.

This program is suitable for individuals who want to learn the basics of cloud computing, including its different forms, benefits, and what makes the technology powerful. The program includes numerous hands-on demos of cloud computing solutions, as well as discussions on IaaS and SaaS solutions. The expert-led program lasts around 2 hours.

This short course (1-hour duration) is ideal for those seeking a foundational understanding of cloud computing. Participants learn how cloud computing is used, why its important, and the as a service models like PaaS, FaaS, IaaS, and SaaS. The course also covers the difference between servers and serverless and highlights the jobs that can be obtained with cloud skills.

In conclusion, gaining expertise in cloud computing can be highly beneficial for your professional career. Cloud skills are in high demand, and professionals can expect lucrative salaries as they continue to gain more experience in the field. By choosing the right Cloud Computing Bootcamp, you can enhance your skills and advance your career in this rapidly evolving field.

Join our WhatsApp and Telegram Community to Get Regular Top Tech Updates

View post:
Top Cloud Computing Bootcamps to Enroll in 2024 - Analytics Insight

JFrog integrates Qwak AI tech to speed up application delivery – SC Media

A new collaboration between software supply chain firm JFrog and machine learning platform provider Qwak AI will leveragemachine learningmodels to speed up the delivery of artificial intelligence applications at scale,SiliconAnglereports.

Under the integration, JFrog Artifactory and Xray will integrate natively with Qwaks ML Platform in a modern DevSecOps and MLOps workflow. JFrogs universal ML Model registry will be able to make use of a centralized MLOps platform to enable the building, training, and deployment of models with greater governance, visibility, versioning, and security whether on-premises or in the cloud. Machine learning engineers, data scientists, developers and DevOps teams can also make use of the integration to easily develop projects at scale. "There are still hurdles to overcome in terms of bringing ML models to production, such as bridging the gap between MLOps and DevSecOps workflows," said Gal Marder, JFrog's executive vice president of strategy. "We can provide customers with a complete MLSecOps solution that helps bridge this gap by bringing ML models in line with other software development processes."

Go here to see the original:
JFrog integrates Qwak AI tech to speed up application delivery - SC Media

Alibaba Cloud announces a 55% price reduction – Chinadaily.com.cn – China Daily

Liu Weiguang,president of public cloud business at Alibaba Cloud Intelligence. [Photo provided to chinadaily.com.cn]

Alibaba Cloud, the cloud computing unit of Chinese heavyweight Alibaba Group Holding Ltd, announced on Thursday a price reduction of up to 55 percent on more than 100 core cloud products, marking the biggest price cut in the company's history.

This move aims to make public cloud services more inclusive and accessible in the era of artificial intelligence, and speed up the popularization of cloud computing in all walks of life, the company said.

The new prices, with an average of 20 percent reduction, are effective on Thursday, covering over 100 cloud products, such as computing, storage and database.

"As the biggest cloud service provider in China and the Asia-Pacific region, we see tremendous growth prospects in China's digital market. That's why we decided to launch the price reduction campaign to lower the threshold of cloud services for more enterprises and developers to reap the technological dividends and accelerate the adoption of advanced public cloud services across various industries in China," saidLiu Weiguang,president of public cloud business at Alibaba Cloud Intelligence.

Liu said with the rapidly increasing amount of data in China, businesses will need robust, high-performance and cost-effective computing power to help handle and analyze their massive amounts of data, adding Alibaba Cloud aims to become the most open cloudand help customers to turn AI into productivity.

Cloud infrastructure services expenditure on the Chinese mainland grew 18 percent year-on-year to $9.2 billion in the third quarter of 2023, according to market consultancy Canalys. Alibaba Cloud led the cloud infrastructure services market, taking up 39 percent of total spending.

fanfeifei@chinadaily.com.cn

Go here to read the rest:
Alibaba Cloud announces a 55% price reduction - Chinadaily.com.cn - China Daily

Why the Cloud Is Critical to Modern Applications in Retail – BizTech Magazine

The use of applications in retail has reached an all-time high. Experts predict that 2024 will see retail apps being used more than ever, almost as much as navigation and weather apps. But heres the challenge: How can retailers modernize their apps efficiently?

Traditionally, most retailers updated their applications inside their data centers. The data generated by these applications was typically very dispersed, and the applications themselves usually were not well integrated.Thats an increasingly obsolete approach. The rapid pace of change in retail makes application agility crucial.

But retailers simply cant afford to completely redesign their customer-facing mobile apps every time conditions shift. Instead, they need to be able to release new features without interrupting uptime or performance.

Enter cloud-native applications. This is a modernized approach that enables retailers to adapt to market changes and consumer needs by offering scalable, flexible and resilient infrastructure. Here are a few ways that retailers can use the cloud to modernize their applications:

Click the banner to learn how to modernize your retail IT environment.

Deployment speed is a key attribute of top DevOps performers. In fact, the highest-performing DevOps teams deliver on-demand deployment, with multiple deployments each day, according to Googles research on the topic. The more efficient the development, the faster the deployment.

Cloud platforms help expedite the cycle. DevOps teams can leverage myriad tools and services provided by cloud platforms to build, test and deploy applications more efficiently. From there, teams can also add any number of automated solutions into the mix.

DISCOVER: See how a national retail chain improved its customer experience.

Coca-Cola Argentina is one example of this. Leveraging Amazon Web Services and its automated continuous delivery pipeline, Coca-Cola Argentina created Wabi, a mobile app for product ordering and delivery. With this technology, delivery takes 30 minutes instead of hours. And, as detailed on AWS website, the cloud drove the creation of the app and now helps keep it updated efficiently.

Using AWS, we can deploy new features for Wabi in several months instead of the year it could sometimes take in our previous environment, Alejandro Arauz, digital operations director at Coca-Cola Argentina and cofounder of Wabi, notes in an AWS case study.

Retailers frequently scale physical storefronts in accordance with traffic and seasonal demand. Now, retailers can do the same with applications. The cloud makes it simple and cost-effective to scale up during periods of growth or scale down during seasonal downtimes. This ensures that retailers meet customer demand without overinvesting in underutilized infrastructure.

If a retailer wants to prepare for the holidays, for example, it can troubleshoot applications in advance to make sure they run smoothly under pressure. Mobile users expect websites to load in under three seconds, and stress-testing applications before deployment can reduce loading times. This can also help retailers avoid uninstalls of e-commerce apps, which can cost businesses up to $68,000 per month.

UP NEXT: See the challenges that in-store retailers are facing in 2024.

When it comes to modernizing applications, another key asset of the cloud is simplified security compliance. By offering standardized, up-to-date security protocols and automated compliance controls across an entire digital infrastructure, the cloud reduces the complexity of security standards and keeps retailers updated in real time.

Thats why 60 percent of consumer-facing applications will be running on public clouds by 2025, according to Boston Consulting Group. Whats more, almost 40 percent of data warehouses and analytics workloads and more than 30 percent of core business applications will be running on public clouds by the same year. Retailers who make the shift to the cloud now will fare better in the long term.

The percentage of consumer-facing applications that will run on public clouds by 2025

Source: Boston Consulting Group, The Keys to Scaling Digital Value, March 2022

The cloud also offers convenience. With a centralized dashboard, employees can reduce their toggling tax, or the time lost by switching between applications, notes the Harvard Business Review. In this way, the cloud can improve the customer experience while also increasing employee engagement and productivity.

Cloud platforms also seamlessly integrate with other services and applications. This facilitates collaboration across teams and creates a more cohesive application ecosystem. Overall, retailers who embrace a cloud-native approach are positioned for greater success in the fast-paced market. They also have more agility and cost-efficiency to meet consumer demands and stay competitive.

Here is the original post:
Why the Cloud Is Critical to Modern Applications in Retail - BizTech Magazine

Unveiling the Threat Landscape: Exploring the Security Risks of Cloud Computing – Security Boulevard

In the digital era, cloud computing has become synonymous with agility and scalability for businesses and individuals. However, critical security risks and threats inherent in cloud environments come alongside the myriad benefits. This blog aims to dissect the nuances of cloud security risks, shedding light on the challenges commonly faced when securing digital assets in the cloud.

Before delving into the specific risks associated with cloud security, its crucial to understand the foundational concept of the Shared Responsibility Model. This model represents a new approach to securing cloud environments. Unlike traditional on-premise solutions, with the Shared Responsibility Model, cloud security is a collaborative effort between cloud service providers (CSPs) and their users.

The Shared Responsibility Model defines the division of responsibilities between the CSP (cloud service provider) and the user. The CSP secures the underlying infrastructure, including the physical data centers, networking, and hypervisors. On the other hand, users are entrusted with securing their data, applications, and configurations within the cloud.

This balanced approach ensures that neither party bears the entire burden of cloud security, fostering a cooperative relationship that leverages the expertise of both CSPs and users. The model shifts based on the type of cloud service Infrastructure as a Service (IaaS), Platform as a Service (PaaS), or Software as a Service (SaaS).

The development of this model was necessitated by the dynamic nature of cloud computing, where traditional security models became inadequate. Oversight of the Shared Responsibility Model is a shared endeavor, with constant communication and collaboration required to adapt to evolving threats and technological advancements.

Understanding this model is fundamental to comprehending the subsequent discussion on security risks in cloud computing. It lays the groundwork for organizations to make informed decisions, implement effective security measures, and navigate compliance complexities in the cloud.

Now, lets delve into the specific risks associated with cloud security.

Cloud environments, known for their intricate configurations through web-based interfaces or Infrastructure as Code (IaC), are susceptible to misconfigurations. Cloud resources dynamic and scalable nature introduces challenges, making it crucial for teams to adapt and effectively manage configurations. This includes addressing risks such as Broken Object Level Authorization (OWASP API1) and Security Misconfigurations (OWASP API8), where improper configurations may lead to unauthorized access or vulnerabilities.

Cloud platforms offer diverse services, each demanding specific access controls. The scalability of cloud environments complicates the consistent management of access permissions. Teams must navigate complex IAM settings unique to each cloud provider. This challenge aligns with risks such as Broken Authentication (OWASP API2) and Broken Function Level Authorization (OWASP API5), where weak authentication mechanisms or flawed access controls can result in unauthorized access.

Cloud computing involves data transmission over networks and storage in shared infrastructures. Encryption is vital due to the distributed and multi-tenant nature of cloud services. Teams must implement encryption measures compatible with cloud environments to protect data across various states. This aligns with risks such as Broken Object Property Level Authorization (OWASP API3), emphasizing the importance of encryption at the object property level.

Cloud environments consist of numerous interconnected components, making monitoring and logging complex. Cloud storage security risks such as incomplete monitoring may lead to the oversight of critical security events.Specialized tools are required to track activities across virtual machines, containers, and cloud services. Incomplete monitoring may lead to the oversight of critical security events. This challenge corresponds to risks like Improper Inventory Management (OWASP API9), highlighting the need for comprehensive monitoring.

Cloud service providers regularly update their platforms, requiring teams to manage patches for virtual machines, containers, and other services. The dynamic nature of cloud infrastructure demands agile patch management to address vulnerabilities promptly. This aligns with risks such as Unrestricted Resource Consumption (OWASP API4), where successful attacks can lead to resource exhaustion or denial of service.

Cloud environments are susceptible to various disruptions, necessitating effective disaster recovery plans. These plans should align with cloud services, including backup strategies and the ability to restore operations cloud-natively. This challenge relates to risks such as Unrestricted Access to Sensitive Business Flows (OWASP API6), emphasizing the importance of planning for potential disruptions.

Cloud Specificity: Cloud computing relies heavily on APIs for seamless service integration. Insecure APIs pose a specific threat in cloud environments, where integration is essential. Teams must be vigilant in securing APIs and verifying the security practices of third-party services. This corresponds to risks such as Unsafe Consumption of APIs (OWASP API10), underlining the importance of secure API practices in cloud-based services.

At the heart of these security challenges lies the application programming interfaces (APIs), pivotal components that facilitate seamless connections between software without needing human login. APIs, however, present a unique set of challenges. Whether dealing with open-source or proprietary software, the API landscape demands a meticulous approach to identify and address potential risks.

The OWASP API Security Top 10 offers a comprehensive list of common issues associated with APIs, ranging from broken object-level authorization to the unsafe consumption of APIs. This framework underscores the tendency to place unwavering trust in API functionality, often overlooking inherent vulnerabilities. Notably, the list highlights the need for organizations to scrutinize API usage, considering additional technologies that can augment protection, especially for services intended for a wider audience.

As the cloud security landscape evolves, understanding APIs critical role in vulnerabilities and solutions becomes paramount. By acknowledging the challenges and proactively implementing robust security measures, organizations can fortify their cloud infrastructure against potential threats, ensuring a resilient and protected digital ecosystem.

The cloud landscape faced challenges as Microsoft grappled with authentication issues, drawing attention from attackers and security experts, including Tenable. The heart of the matter lay in insufficient access control to Azure Function hosts, a critical component of Microsofts Power Platform (Power Apps, Power Automation). This revelation underscored the importance of transparency in cloud security, emphasizing the need for robust measures to secure cloud authentication.

Tenable CEO Amit Yoran described the vulnerability allowed attackers to interact with Azure Functions without authentication, exploiting a flaw in creating and operating custom connectors within the Power Platform. This scenario exposed a potential risk wherein attackers could traverse different customer connectors by determining hostnames, posing a serious threat to data integrity.

Microsoft swiftly addressed the Power Platform Custom Code information disclosure vulnerability, as detailed in a technical note. Affected customers were promptly notified via Microsoft 365 Admin Center, ensuring a proactive approach to risk mitigation.

Recent challenges, such as the unprepared shift to remote work and smart home security concerns, have introduced new dimensions to cloud security.

The rapid adoption of remote work infrastructure requires secure frameworks and comprehensive policies to mitigate risks. Organizations should prioritize endpoint security, enforcing the use of virtual private networks (VPNs) and regularly updating security protocols on remote devices.

Smart home devices, previously non-networked, now serve as potential breach points, emphasizing the need for user awareness and safe configuration practices. Employee education programs should include guidelines on securing home networks, updating router passwords, and ensuring the security of connected devices.

Cloud configuration should prioritize security over speed. Rushed setups often result in misconfigurations that expose sensitive data. Organizations should allocate sufficient time for detailed cloud security risk assessment, including comprehensive stress testing to identify potential weak points. Continuous monitoring and automated configuration management tools contribute to ongoing security.

BYOD policies demand careful consideration of potential risks. While the flexibility of BYOD policies enhances employee convenience, organizations should implement strict security measures. This includes regularly updating security software on employee devices, conducting periodic security training, and implementing mobile device management (MDM) solutions.

Phishing attacks and social engineering methods continue exploiting technical and human vulnerabilities.

Implementing multi-factor authentication, security software, and regular training are essential measures.

Phishing attacks often target the human security element, relying on unsuspecting users to divulge sensitive information. Organizations should conduct regular and simulated phishing exercises to enhance employee awareness. Multi-factor authentication (MFA) adds an extra layer of protection, requiring additional verification beyond passwords.

Regular training sessions on recognizing social engineering tactics and ongoing communication about emerging threats contribute to a vigilant and security-conscious workforce. Additionally, organizations should invest in advanced email filtering solutions to detect and block phishing attempts before reaching employee inboxes.

Identify and encrypt sensitive data, ensuring secure storage of encryption keys.

While VPN services provide secure transit for data, organizations should also focus on encrypting data at rest. This involves identifying and classifying sensitive data, applying encryption algorithms, and securely storing encryption keys. Regularly updating encryption protocols in response to evolving threats enhances the overall security posture.

Implement cloud security solutions, such as Kaspersky Hybrid Cloud Security, for comprehensive protection.

End-to-end encryption ensures that data remains secure from the origin device to its destination. This practice safeguards sensitive information even if intercepted during transit. Organizations should promote the use of applications and services that prioritize end-to-end encryption.

Cloud security solutions, such as Kaspersky Hybrid Cloud Security, provide a holistic approach to protecting cloud environments. These solutions offer threat detection, vulnerability management, and real-time monitoring. Regularly updating and configuring these solutions according to evolving threats enhances their effectiveness.

Secure smart home devices, use VPNs for remote work, and regularly update software for increased security.

Test cloud security setups and conduct regular audits to identify and address vulnerabilities proactively.

Multi-factor authentication adds an extra layer of security beyond passwords. Organizations should prioritize its implementation across cloud services, ensuring user access requires multiple verification forms.

Securing smart home devices involves more than just individual device security. Organizations should guide employees on securing their home networks, using VPNs for remote work, and updating router passwords. This comprehensive approach extends the organizations security perimeter to include employee home environments.

Regularly updating software is a fundamental yet often overlooked aspect of cloud security. Organizations should implement automated patch management systems to ensure that all software, including operating systems and applications, is up-to-date. Conducting regular security audits helps identify potential vulnerabilities and weaknesses that attackers may exploit.

Effectively securing the cloud requires a dual focus on understanding and mitigating security risks and threats. By embracing the shared responsibility model, navigating security and compliance in cloud computing challenges, and implementing proactive measures against potential threats, organizations can confidently harness the power of cloud computing risk while safeguarding their digital assets. In this ever-evolving landscape, a comprehensive and strategic approach to cloud security is key to a resilient and protected digital infrastructure. Stay vigilant, stay secure.

The post Unveiling the Threat Landscape: Exploring the Security Risks of Cloud Computing appeared first on Centraleyes.

*** This is a Security Bloggers Network syndicated blog from Centraleyes authored by Michelle Ofir Geveye. Read the original post at: https://www.centraleyes.com/security-risks-of-cloud-computing/

Continued here:
Unveiling the Threat Landscape: Exploring the Security Risks of Cloud Computing - Security Boulevard

Cloud adoption for telcos is coming with AWS collaboration – SiliconANGLE News

Bringing the cloud to telecommunications has been a lengthy process, but Amazon Web Services Inc. is collaborating with telephone companies to complete their transformation from connectivity providers to digital service providers.

We have 240 services built using thousands of [application programming interfaces], and all the developers see, all that our cloud users see, are APIs, said Ishwar Parulkar(pictured), chief technology officer of telecom and edge cloud at AWS. Its a sea of APIs, and one piece that was missing was the connectivity piece. Now [developers] can build applications that are network-aware.

Parulkar spoke with theCUBE Research analysts John Furrier and Dave Vellante at MWC Barcelona, during an exclusive broadcast on theCUBE, SiliconANGLE Medias livestreaming studio. They discussed how cloud computing is transforming telco operations and whats next for APIs. (* Disclosure below.)

Cloud adoption for telcos consists of stages, according to Parulkar. Managing the workload of operations support and business support systems is one of the first, while the radio access network is more demanding. Since MWC 2023, AWS has been collaborating with the Global System for Mobile Communications Associations Open Gateway initiative to bring more cloud services to the edge.

What Open Gateway is doing is standardizing [APIs] across telcos, Parulkar said. Even though its coming from a different operator, it has to be the same API, same format that can be integrated into the application.

Security, bandwidth control and location services are three areas that Parulkar describes as low-hanging fruit for Open Gateway. For example, APIs could help with fraud detection for financial services by detecting whether a SIM card has been swapped.Reinventing telco services will also be crucial for the next wave of artificial intelligence.

If you look at most machine learning applications, theres training which needs to be done [with] large compute capacity. Theres inference which can happen at the edge, Parulkar said. We are looking at how we can apply generative AI and our other artificial intelligence and machine learning services to help telcos really transform their businesses.

Heres the complete video interview, part of SiliconANGLEs and theCUBE Researchs coverage of MWC Barcelona:

(* Disclosure: TheCUBE is a paid media partner for the MWC Barcelona event. No sponsors have editorial control over content on theCUBE or SiliconANGLE.)

THANK YOU

Read this article:
Cloud adoption for telcos is coming with AWS collaboration - SiliconANGLE News

Multi-cloud security challenges and best practices – TechTarget

Multi-cloud environments are rapidly becoming a common deployment model for many organizations. From a security standpoint, however, they introduce added complexity.

A main source of this complexity is the expansion of both the threat surface and of the skills and knowledge needed to handle the various tools, services, software objects and security policies of each cloud service provider (CSP). Due to this, organizations contend with the following main multi-cloud security challenges:

Let's dig deeper into each challenge and then look at the best practices to help solve them.

Alongside existing challenges for cloud security, an organization's security team needs to consider the following multi-cloud security challenges.

Configuration management is one of the most common issues organizations face and given the velocity of changes and updates in cloud environments, it's one that recurs.

The range and complexity of the services and objects available in a single-cloud environment can lead to misconfiguration. That range and complexity only compounds with each additional cloud in multi-cloud deployments.

Common configuration issues -- such as using outdated server and container components and images, accidentally exposing storage nodes to the internet, or improperly implementing and aligning identity and access management policies -- can result in security vulnerabilities and possible exposure in the cloud.

Logging and monitoring are relatively straightforward in leading IaaS and PaaS clouds, but many organizations struggle with the volume of cloud-related events generated. This becomes even more difficult when multiple clouds are involved.

Many organizations also often don't understand how to coordinate and contextualize playbooks for monitoring and alerting across different service environments, which leads to further complexity.

Incident detection and response are often a struggle for organizations with multi-cloud deployments. They require preparation of forensic and response tools and services ahead of time in each cloud, as well as specific workflows and playbooks that cover all cloud environments. Workflows and playbooks can become more complicated if hybrid cloud architectures are in use. Further, incident responders often lack the appropriate skills to respond to incidents in each specific cloud environment.

Meeting compliance and regulatory requirements across a diverse set of cloud environments can be difficult, depending on an organization's industry. Most larger cloud providers have SOC, ISO and other compliance-specific reports available to attest to the state of controls and processes on their side of the shared responsibility model. Customer controls status and reporting, however, still need to be collected and aggregated.

The following industry best practices and security tools and processes can help organizations meet multi-cloud security challenges head-on:

Dave Shackleford is founder and principal consultant with Voodoo Security; SANS analyst, instructor and course author; and GIAC technical director.

Read more:
Multi-cloud security challenges and best practices - TechTarget

Huaweis cloud unit banks on booming AI demand in Europe and Middle East – South China Morning Post

The cloud unit of Chinese telecommunications equipment giant Huawei Technologies is wooing overseas industry clients and expanding its global footprint with new data centres, banking on the explosive demand for generative artificial intelligence (AI), despite US sanctions.

Huawei plans to open a new local cloud service in Egypt next month, adding to its 85 availability zones across 30 regions globally, according to executives at the companys cloud summit in Barcelona, Spain, on Sunday, ahead of Monday's opening of telecoms industry trade show MWC Barcelona 2024. The Shenzhen-based firm will also soon launch its first AI cloud computing centre in Hong Kong, the company's executives said.

At Huawei Cloud, AI is a key strategy, said Jacqueline Shi, president of Huawei Cloud global marketing and sales service. Were building a solid cloud foundation for everyone, for every industry, to accelerate intelligence.

Huawei chases cloud clients in South Korea as users hold onto Samsung phones

Huaweis expansion in cloud computing has formed part of its ongoing efforts to forge deeper ties with traditional industries and corporations as it seeks to diversify revenue streams. The US has put multiple sanctions on the company since May 2019 when it was added to Washingtons Entity List, which cut off its access to critical American technologies and all but killed its lucrative global smartphone business.

Huaweis cloud sales reached 45.3 billion yuan (US$6.3 billion) in 2022, after seeing rapid growth outside China, according to the company. Its cloud business saw steady growth last year, according to a new years message by Huaweis rotating chairman Ken Hu Houkun in December.

The company is the second-largest cloud services provider in China, according to research firm Canalys, and it has been steadily expanding its global footprint. Last year it opened new data centres in Turkey and Saudi Arabia.

At the opening ceremony last September for the data centre in Riyadh, capital of Saudi Arabia, Huawei promised to support 200,000 new developers in the country, and work with 1,000 local partners and 2,000 start-ups through its cloud computing services over the next five years.

Huawei also saw the number of its cloud partners in Europe quintuple last year. It pledged to support the growth of 1,000 European start-ups through cloud services in the next five years.

Read the original here:
Huaweis cloud unit banks on booming AI demand in Europe and Middle East - South China Morning Post

Revolutionizing IoT: Cloud to edgeware security and architecture – EurekAlert

image:

Cover forCloud to Edgeware: Wireless Grid Applications, Architecture and Security for theInternet of Things

Credit: World Scientific

What if the key to unlocking the full potential of the Internet of Things lies not in the vast expanse of the cloud, but closer to home, at the very edge of our digital world? Cloud to Edgeware: Wireless Grid Applications, Architecture and Security for the Internet of Things embarks on an exploratory journey into this frontier, where the future of IoT is being reshaped by the synergy of edge computing and advanced wireless grids, promising unparalleled efficiency and security.

In the process of crafting Cloud to Edgeware, extensive research was undertaken to bridge the current knowledge gap in the integration of cloud computing with edge technology. This book meticulously analyzes emerging wireless grid applications, their architectural frameworks, and the paramount importance of robust security measures in the IoT domain. By scrutinizing real-world case studies and the latest advancements in technology, the research offers a comprehensive insight into the potential and challenges of IoT ecosystems, setting a new benchmark for scholarly and practical discourse in this field.

The intended readership for this pioneering work is multifaceted, encompassing both professionals, researchers, and academics within the fields of information technology, cybersecurity, and IoT development. It serves as an invaluable resource for engineers, architects, and practitioners looking for practical solutions and innovative approaches to IoT challenges. Additionally, the book is tailored for researchers and students seeking to deepen their understanding of edge computing and its pivotal role in the future of digital networks, making it a must-read for those poised to lead the next wave of technological innovation.

Cloud to Edgeware: Wireless Grid Applications, Architecture and Security for the Internet of Things retails for US$148 / 135 (hardcover) and is also available in electronic formats. To order or know more about the book, visit http://www.worldscientific.com/worldscibooks/10.1142/9354.

###

About the Author

Dr.Tyson Brooks is an adjunct professor in the School of Information Studies (iSchool) at Syracuse University, USA. Dr. Brooks has over 25 years of professional experience in the engineering design, architecture, and information security of complex information systems in the U.S. and overseas. Dr. Brookss expertise includes work in the areas of information assurance, cyber-security, penetration testing, and network-based intrusion analysis and defense in both the public and private sectors. He also holds certifications in Network+, Security+, CISSP, C|EH, CEA, GCIH, CAS-ISM, and PMP. He was the past Editor-in-Chief of the International Journal of Internet of Things and Cyber-Assurance (IJITCA) and is an Associate Editor for IEEE Access. Dr. Brooks is also a Senior Member of IEEE and the Association of Computing Machinery (ACM).

About World Scientific Publishing Co.

World Scientific Publishing is a leading international independent publisher of books and journals for the scholarly, research and professional communities. World Scientific collaborates with prestigious organisations like the Nobel Foundation and US National Academies Press to bring high quality academic and professional content to researchers and academics worldwide. The company publishes about 600 books and over 170 journals in various fields annually. To find out more about World Scientific, please visit http://www.worldscientific.com.

For more information, contact WSPC Communications at communications@wspc.com.

Disclaimer: AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert system.

Read the original post:
Revolutionizing IoT: Cloud to edgeware security and architecture - EurekAlert