Category Archives: Cloud Servers

Googles latest smartphones put AI photo-editing in your hands – Sydney Morning Herald

Where many smartphone-makers fill their software with cascading options and heaps of micro features, Pixels have always put a focus on attractive, understated design and proactively useful touches. The new Pixels are crammed full of stuff, its just that it tends to pop up when its required rather than being tucked away in menus or needing to be stacked all over your home screen.

The Pixel 8 has new cameras, more powerful AI and keeps the chunky camera bar. Supplied

As you might expect, a lot of Googly features are baked in and benefit greatly from the Pixel 8s new Tensor G3 chip, which provides on-device machine learning. That includes fast and accurate voice-to-text for sending messages, interpreting other languages and automatically transcribing recordings, as well as powerful photo and video editing, and health-tracking via Fitbit. The tech even extends to using the device for old-fashioned phone calls, with great noise-cancelling that makes the caller sound clear and the ability to have Google Assistant screen your calls.

But while the Pixel 8s continue the tradition of putting the best of Google front and centre, and may be the best Androids on the market, theyre also a testing ground for new features and developments that dont always feel ready for prime time.

Physically not a lot has changed from last years Pixel 7, with the new phones packing the familiar and wonderfully symmetrical chunky camera bar on the back. Both phones have great screens that can get phenomenally bright (2000 nits on the 8, 2400 on the Pro, though youll only get those maximum results in direct sun), and both have 120Hz refresh rates for very smooth scrolling and animation.

In fact, the two phones are the closest theyve been since the introduction of the Pro moniker with the Pixel 6. The main differences are screen size (6.2 inches or 6.7 inches) and an extra camera, with the Pro packing a 5x telephoto lens in addition to the main shooter and ultra-wide. Oh yeah, and the Pixel 8 Pro has a thermometer.

The Pixel 8 Pro and Pixel 8 (right), with the iPhone 15 Pro Max and iPhone 15 (left). Tim Biggs

I have to assume that Google intended this sensor to be for checking peoples foreheads, and then didnt get the appropriate medical approval or gave up on the idea, because theres no other reason for it to be there. When you use it for the first time you have to tick a box to say you understand it is not a medical device, and then youre free to put it five centimetres in front of any object to check its temperature. It seems to work, but I couldnt find a compelling use for it.

Despite a similar hardware design, Googles own take on the new Android 14 software does a lot to give the Pixel 8s a fresh look. There are a lot of lock-screen styles to choose from, which double as always-on-display designs (I especially like the new one that puts the date and temperature against the phones longer sides), and the options to colour theme your phone, widgets and icons automatically to your wallpaper continue to impress.

Embedded in the top of the display is a little selfie shooter similar to last years, but it has a new trick thanks to AI, in that it can recognise you a lot more accurately. The change means you can authenticate banking apps and sign in to services with your face, just like you can on an iPhone, without a big black spot at the top of the phone. The one downside to Googles approach here is it doesnt work in the dark, so you still need a fingerprint or PIN.

Speaking of AI, this years update is big on generative features, both obvious and subtle. One example of the former is the new AI wallpaper feature, which is a DALL-E style text-to-image generator but with a lot of limitations. Choose a theme, pick some keywords, wait 20 seconds and youll be given eight different options to choose from. Theyre always fairly abstract and dont stand up to close scrutiny to be honest, Id always prefer one of the many real photos or paintings from Googles wallpaper collection but as a gimmick it works and will only get better.

Googles Best Take feature can swap peoples faces when you take multiple shots. Supplied

Generative AI is more present in the new Google Photos editing suite too, where it toes the line between allowing you to realise the intention of a photograph and letting you straight-up invent stuff. The marquee feature here is Magic Editor, which is scarily good at replacing a gloomy sky with a nice blue one, shifting the colours for a golden hour look, removing unwanted elements or even completely changing the composition.

For example, I grabbed an older photo of my two kids at mini golf, posing in the left of the frame. Behind them is a giant statue of a cartoon rhino, centre frame. In the Magic Editor I tapped one kid to select him, held down to edit, then dragged him over to the right of the frame. After processing, the image just looks like the kids were naturally standing either side of the rhino. The part where the repositioned kid used to be standing now has some convincing invented detail, including a bit of path, some scattered bark chips and one of the rhinos hands. It even gives you a few options to choose from so you can pick the most natural. The feature is also great at enlarging the moon, or removing dead tree branches. But for whatever reason, any time I tried to change the size of a person I was told it was against the companys ethics policy.

On the left is my original photo, the middle is with Googles AI-generated sky, the right has golden hour turned on. Tim Biggs

Theres also a feature called Best Take, which appears if youve taken a series of photos featuring a group of people. Pick one of the photos, and you can tap on each persons face to cycle through the various expressions they made throughout the set, ending up with one picture featuring everyones best face. Like the Magic Editor its far from foolproof but can result in fakes nobody would pick at a glance.

To be honest, I cant ever see myself using these tools on my own personal photos. Im aware that some level of AI processing has been present in smartphone photography for a long time and is here to stay, but intentionally changing the content feels unnerving. That said, I can definitely see using it in place of Photoshop if I needed a specific edit of a non-human subject quickly.

For video, a new Audio Eraser will analyse clips for sounds and show a few of them as separate waveforms (for example, wind, speech or nature). Then you can watch and listen to the video while moving the levels around to cut out talking or annoying gusts. Like a lot of AI photo editing it works very well but leaves artefacts youll notice if youre specifically looking for them. Other features, like a video enhancer that utilises Googles cloud servers, are not present at the phones launch.

The new Pixels come hot on the heels of new iPhones, and the two families of devices share some similarities despite being fundamentally tough to compare. Googles phones have been becoming more premium and expensive year over year, while Apples have been becoming more open notably this year with the introduction of a USB-C port so theyre closer to equivalent than ever.

Comparing the standard phones, Pixel 8 and iPhone 15, Googles immediately stands out as more premium despite being $300 cheaper. Theyre similar sizes and have similar camera set-ups, but Apples lacks a fast refresh and an always-on display. Under the hood Apple has also withheld some features from the standard iPhone that the Pixel happily supports, including USB 3.2 for much faster charging and data transfer, and autofocus on the ultra-wide camera which makes for a great close-up macro mode.

When it comes to the high end, Pixel 8 Pro against the iPhone 15 Pro Max, the gap is much closer though the prices are farther apart. (The iPhone starts at 256GB here, so a true like-for-like comparison would put the Pixel 8 Pro at $1800, but thats still a $400 gap.)

Click to reload

The phones are evenly matched across almost all specs, though Apple has the strong advantage of an immensely powerful processor that outpaces the Pixel in raw strength. In cameras Google has opted for bigger sensors and more flexibility in editing, and the Pro has an excellent manual control mode, but Apples shots tend to be more pleasant for quick snaps since you can preset your preferred temperature and crop. When it comes to portrait mode and low light photography the Pixel is far more confident, and both phones now support adding a bokeh blur after the fact; Apple by capturing depth data when it detects a face and Google through the Magic Editor.

Both happily shoot 4K HDR video that looks amazing, though Apple supports Dolby Vision and ProRes which may suit professionals better.

iPhone users have access to a pretty full suite of Google products these days, and even features like the Magic Eraser have made their way from Pixel to iPhone, though the opposite is not true; those who choose Apple services tend to have a hard time on Android. The unique strength of the Pixel, then, is hardware thats been specially tuned for Googles AI tasks, and the latest in experimental features that may or may not become widely used in the future.

Still, putting the AI features aside these are still the nicest Pixels Google has yet produced, with some of the most genuinely useful features and best cameras youll find on an Android.

Get news and reviews on technology, gadgets and gaming in our Technology newsletter every Friday.

Originally posted here:
Googles latest smartphones put AI photo-editing in your hands - Sydney Morning Herald

Where to Watch Frasier Reboot in 2023 [StreamFrom Anywhere] – Cloudwards

Key Takeaways: How & Where to Watch Frasier Episodes Online Free

This September marked 30 years since the premiere of comedy series Frasier. The show ran for 11 seasons, and its just shy of 20 years since the last season was on our screens. Now were in for a new 10-episode Frasier reboot starting this October. If you want to know how and where to watch Frasier, keep reading.

Kelsey Grammer will return as psychiatrist Frasier Crane and other members of the original cast will make appearances. However, not all of the cast will be returning, including David Hyde Pierce as Frasiers brother Niles.

The Frasier reboot is exclusively available on Paramount Plus. If youre not in a country where Paramount Plus is available, you wont be able to access the show due to geoblocks. Using a VPN can get you past such blocks, though, and we recommend using ExpressVPN, the best VPN around.

The new season of Frasier will be streamed on Paramount+. The first two episodes premiere Thursday, Oct. 12 in the U.S. and Canada, and new episodes will be available weekly.

The Frasier reboot starts on Oct. 12 on Paramount Plus in the U.S. and Canada.

All other Paramount Plus regions, such as Australia, New Zealand and the U.K., will get the new Frasier season starting on Friday, Oct. 13.

If you dont have a Paramount+ account, the first two episodes will premiere live on the CBS channel on Tuesday, Oct. 17 at 9:15 p.m. EST. If you dont have cable, you can sign up for a live TV streaming service that carries CBS, such as Hulu + Live TV, YouTube TV, fuboTV or DirecTV Stream.

If youre not in a Paramount+ country, you can use a virtual private network (VPN) to unblock the service. This will also work for a live TV streaming service in the U.S.

All you need to do is connect to a VPN server in a country that has Paramount+ or a CBS stream. This will mask your true location, making you look like youre in the country and allowing you to access your chosen service. We have a step-by-step guide further down.

If youre new to the Frasier series or want to rewatch previous seasons, there are plenty of options available.

In the U.S., you can watch all 11 seasons on Paramount+, Hulu and Amazon Prime Video. All of those services offer a free trial. You can also watch Frasier on other services around the globe. Heres a table of all the streaming services where we found it. Remember, if youre outside of any of these countries, a VPN can help.

No, the Frasier reboot isnt on Netflix because its a Paramount+ exclusive. We also didnt find the original Frasier seasons on Netflix.

Netflixs content is always changing, so there is a chance that Frasier could make an appearance at some point. If that happens, well try to keep this information updated. You can check Netflix for yourself, too, and not only in your own location. Netflix regions have slightly different content, so its a good idea to check other countries libraries.

You can use a VPN to check if Frasier is available in a different Netflix library. Just connect to a server in the country you want to check, then log in to your Netflix account. You should see that countrys content library. If not, Netflix may have detected your VPN usage, so connect to a different server and try again.

Since the Frasier reboot is only available on Paramount Plus and CBS, your only option to watch it for free is a free trial. Paramount Plus offers a seven-day free trial, which isnt enough to get you through all 10 episodes as they premiere. A livestreaming services free trial wont allow you to watch the entire reboot either.

Your best bet is to wait until the new season concludes and then use the Paramount Plus free trial to binge-watch it.

As you can see in our table above, there are quite a few options to watch the original Frasier for free. However, since there are 11 seasons, youll want a pretty long trial to get through all the episodes. Hulu and Amazon Prime Video both offer a 30-day free trial, but even then, youll need to watch 8-9 episodes per day to get through it (there are 264 episodes in total).

The best option is to watch it on Channel 4 in the U.K. Its completely free, and all you need to do is create an account. If youre outside the U.K., you can use a VPN to get a U.K. IP address. Most VPNs offer a 30-day money-back guarantee.

Of course, that means youre back to only having 30 days to get through it, but there are free VPNs available with U.K. servers. Windscribe is a great option, but it limits you to 15GB of data per month, so youll need to spread your streaming sessions out a bit. Read our Windscribe review for more information on the service.

In this section, well show you how to use a VPN to watch the new Frasier season on Paramount Plus in the U.S. Weve used ExpressVPN for our example. If you decide to watch it on CBS with a live TV streaming service or use a different VPN, the steps will be fairly similar. Just substitute the name of another service where needed.

Subscribe to a VPN like ExpressVPN. Go to the website and choose a plan. Whichever plan you choose, youll be covered by the 30-day money-back guarantee.

Download the VPN software for your device and install it. After that, open the VPN app and log in to your account.

Find and connect to a U.S. server. ExpressVPNs full server list can be found by clicking the three dots by the server name. You can then scroll through the list or use the search bar to find a U.S. server. Click on the server to connect to it. If needed, click the big power button to manually connect.

Go to the Paramount Plus website and sign up for the service. New customers will get a seven-day free trial. However, you do need a U.S. payment method. If you dont have one, you can use a service like StatesCard to get a prepaid U.S. card with a U.S. billing address.

Search for Frasier on Paramount Plus and start watching the series.

For the best chance of unblocking Paramount Plus and streaming Frasier without hiccups, you need a VPN that can easily bypass geoblocks and has fast speeds. The following VPNs have what you need and more. Lets get into them, starting with our top pick, ExpressVPN.

ExpressVPN easily unblocks streaming services and has excellent speeds.

Pros:

Youll find ExpressVPN at the top in most of our how to watch articles, simply because it is the best VPN for streaming. Its combination of fast speeds, excellent unblocking ability and thousands of servers in 94 countries makes it the best option for accessing most shows. Its also on most devices, providing an easy-to-use app while keeping you secure online.

Its only downside is the price. Its expensive, theres no sugarcoating it. However, you get a premium service that rarely has any issues. It also has a 30-day money-back guarantee, which you can use to test it out before committing. You can also read our ExpressVPN review.

ExpressVPN Plans

NordVPN is the fastest VPN and has an affordable two-year plan.

Pros:

Cons:

NordVPN is another great choice for streaming Frasier. It can easily access streaming services and, although its server spread isnt quite as wide as ExpressVPNs, it still has plenty of servers for watching Frasier. Our daily speed tests also show NordVPN as having the fastest average speeds.

Its app is on different device types and includes a nice interactive server map, though the map can be a little hard to use on mobile due to the smaller screen. Its a secure, fast and reliable VPN that is more affordable if you sign up for two years. Theres a 30-day money-back guarantee, so you can try it without risk. Learn more in our NordVPN review.

Standard

Proton VPN is a great free VPN that has unlimited data and U.S. servers.

Pros:

Proton VPN is the best free VPN for watching Frasier online. While we dont recommend most free VPNs, Proton VPN is an exception because its a premium VPN that offers a limited free plan. Where most free VPNs limit data usage, Proton VPN doesnt. You get unlimited data and access to free servers in the U.S., the Netherlands and Japan.

It can access streaming services and its speeds are mostly good, though the free servers can slow down due to the amount of users connected. Its also easy to use and secure.

Upgrading to the paid plan provides access to more server locations and better speeds since the servers arent so overloaded. Its not as affordable as NordVPN, but if you want to check it out, theres a 30-day money-back guarantee. Read our Proton VPN review for more details.

Though much of the new plot is still unknown, the Frasier reboot portrays a completely new life for Frasier Crane. Frasier decides to reconnect with his son Freddy in Boston, Massachusetts, forging new relationships along the way.

In the trailer, we can see hes taken a new job, possibly in a university, and has found a new place to live. Whether or not Frasier still has his radio talk show remains to be seen, though it would be great to hear some of those funny radio show callers again.

Aside from Kelsey Grammer returning as Frasier Crane, well see the likes of Peri Gilpin and Beatrice Neuwirth make appearances as Roz Doyle and Lilith Sternin, respectively. The rest of the cast will be mostly fresh faces, though. Frasiers own brother Niles (David Hyde Pierce) wont be back, and John Mahoney, who played Frasiers father, sadly passed away in 2018.

The new cast includes Jack Cutmore-Scott as Frasiers son Freddy and Nicholas Lyndhurst as Frasiers old college friend Alan Cornwall. While Niles and Daphne (Jane Leeves) wont be in the show, Anders Keith will play their son and Frasiers nephew, David. Heres a complete table of the Frasier reboot cast.

The original Frasier series was a spinoff from Cheers, where the character Frasier Crane first appeared. After his marriage ends, Frasier leaves Boston and returns to his hometown of Seattle as a radio psychiatrist. His partially disabled father moves in with him and the pair reconnect, although they have a slightly difficult relationship and Frasier has to put up with his fathers love life.

Frasier gains fame as a radio psychiatrist on his own show The Dr. Frasier Crane Show, which gets him nominated for a local broadcasting award. The show revolves around Frasier, Niles and Frasiers dad Martins love lives, bickering, revealing family dialogue and often a personal and professional dilemma for Frasier.

No, David Hyde Pierce will not be returning as Niles in the Frasier reboot.

The Frasier reboot is sure to be popular with both original and new fans of the show. The rumor mill has been flowing about what might happen in the new series, but well have to wait and see though Frasier likely begins dating a pretty young woman.

Paramount Plus is the place to watch it online, but if youre not in a country that has Paramount+, you can use a VPN to get a U.S. IP address and unblock the service. ExpressVPN is the best option, and the 30-day money-back guarantee means you can test it risk-free.

Are you a longtime fan of Frasier, or are you new to the series? Will you be watching the Frasier reboot on Paramount+ or CBS? Will you need to use a VPN? If so, which VPN is your favorite? Let us know in the comment section and, as always, thank you for reading.

The Frasier reboot is available on Paramount Plus in the U.S. and other countries. You can also watch the original series there, as well as on other services, like Hulu and Amazon Prime Video in the U.S. and Channel 4 in the U.K. If youre not in a country where Frasier is available, you can use a VPN to get access.

Frasier is not on Netflix, but you can find all of the original series on Hulu. The new season of Frasier is not available there, though.

No, neither the original series nor the Frasier reboot are available on Netflix. You can watch the show on Paramount Plus.

All seasons of Frasier are available on different services around the world. All 11 previous seasons and the new reboot are available on Paramount+ U.S. Previous seasons are also available on Hulu, Amazon Prime Video U.S., Canal+ in France, Channel 4 in the U.K. and Crave in Canada.

Let us know if you liked the post. Thats the only way we can improve.

YesNo

More here:
Where to Watch Frasier Reboot in 2023 [StreamFrom Anywhere] - Cloudwards

The ‘Green Cloud’: Four strategies for a sustainable and responsible … – Open Access Government

Green Cloud refers to a sustainable way of cloud computing. It reduces energy demand and saves money while keeping an eye on environmental issues at the same time. Moving traditional IT infrastructure to the cloud is beneficial for the environment in several ways; primarily, it reduces the number of physical servers and increases the average utilisation of available computing units. If cloud providers do it right, a measurable impact on a companys CO2 footprint can be achieved.

Recently, Green Cloud has become a buzzword as more companies consider the CO2 emissions and the overall carbon footprint of their new cloud service providers facilities. Respectively, sustainability and responsibility are becoming the main points of differentiation in the marketplace for global hyperscales like AWS, Google Cloud or Microsoft Azure and European cloud companies like OVH.

Firstserv Ltd is putting all its efforts into ensuring its services are as environmentally friendly as possible. The climate crisis and rising energy costs demand future-proofing of the support given to their customers. Improving efficiency is a major step towards a sustainable cloud, particularly regarding physical data centres. Sebastian Tyc, CEO of Firstserv Ltd, outlines the four most effective strategies for creating a sustainable and responsible future of greener cloud services.

The operation of a data centre requires loads of energy. While most of this energy is needed to power the servers, a large part also goes into cooling them to protect the equipment. If data centre locations are picked strategically, their power demand can be substantially reduced. For example, data centres in cool regions such as Scandinavia or underground facilities need much less cooling than in desert or subtropical areas like the Southern US.

The main concept behind cloud computing is that services are shared over a network, optimising the resources effectiveness. For example, a cloud facility that serves Sydney users during Sydney business hours with a specific service (e.g., a web server) could relocate the same resources to serve European users during European business hours with a different application.

As such, cloud services operate more efficiently than on-premises data centres. It is precisely because of the efficient utilisation of IT resources that cloud computing positively impacts the environment. As data-intensive technologies such as Artificial Intelligence (AI) and distributed manufacturing systems surge, cloud computing centres must remain energy efficient.

In this regard, modern data centres increasingly use advanced technologies to eliminate wastage at every level of their operations. For example, most of todays data centres use machine learning to maximise cooling their environments automatically. Besides machine learning, data centres also deploy smart temperature, lighting, and cooling controls to minimise energy use in their environments.

Firstserv Ltd data centres employ renewable energy sources such as geothermal, solar, wind or water-cooling technology. They introduce liquid cooling for processors to minimise their overall carbon footprint. It is also important to ensure that your infrastructure is suitable for hosting your application environment.

Even though cost savings and increased efficiency in business operations are the top drivers of virtualisation, they are not the only benefits. Cloud computing also uses virtualisation to contribute positively to environmental sustainability.

Virtualisation allows an organisation to create several virtual machines (VMs) and run multiple applications on the same physical server via a hypervisor. As such, high-carbon physical machines get replaced with their virtual equivalents.

For example, an organisation could use a single VM rather than a resource-heavy physical server to stream videos. This could help the company to minimise power consumption and the overall carbon footprint. Shifting an on-premises IT infrastructure to the cloud means you use fewer servers, and this type uses less power, potentially having a lower impact on the environment.

To reduce the overall need for energy in data centres, cloud providers strive to use optimised and modern hardware and software infrastructure. This is not limited to changing old light bulbs to energy-saving lights! Data centres employ energy-saving strategies such as dynamic voltage and frequency scaling (DVFS) or shifting to modern data storage devices. Solid state drives (SSDs) need less power, faster access to data, and last longer than their legacy technology, HDDs. Using optimised hardware, data centres become more efficient and minimise energy demand.

Firstserv Ltd uses multiple strategies to optimise IT workflows at every level. This might include shifting workloads to different times, modifying applications to reduce network traffic, optimising storage and server caches, automating routine tasks or taking other steps to reduce energy usage.

It is also important to ensure that your infrastructure is suitable for hosting your application environment. Firstserv Ltd offers a wide range of options: Hosted Private Cloud, Public Cloud, and a variety of Bare Metal servers. With several Bare Metal options and models available, Firstserv Ltd partners can precisely adjust their ratios (RAM per core ratio, storage per RAM or core, etc.) and ensure they use the best virtual machine for every workload.

Editor's Recommended Articles

See more here:
The 'Green Cloud': Four strategies for a sustainable and responsible ... - Open Access Government

Do SSD failures follow the bathtub curve? Ask Backblaze – The Register

Cloud-based storage and backup provider Backblaze has published the latest report on usage data gathered from its solid state drives (SSDs), asking if they show the same failure pattern as hard drives.

Backblaze uses SSDs as boot drives in the server infrastructure for its Cloud Storage platform, while high-capacity rotating drives are typically used for storing and serving up data.

However, they do more than just boot the storage servers, holding log files and temporary files produced by each server. The volume of data a boot drive will read, write, and delete thus depends on the activity of the storage server itself.

The company previously reported that its SSDs appeared to be at least as reliable as hard drives, but warned this could change as it has not collected SSD data for as long as hard drives and the accumulation of more data could alter the statistics.

Backblaze says it has added 238 SSDs to its infrastructure since the last SSD report, ending in Q4 2022. These comprised 110 Crucial drives (model: CT250MX500SSD1), 62 WDC drives (WD Blue SA510 2.5) and 44 Seagate drives (ZA250NM1000).

Looking at the Q1 2023 and Q2 2023 figures, Backblaze notes that some drives appear to have exceptionally high annualized failure rates, with the Seagate model SSDSCKKB240GZR listed with an annualized failure rate (AFR) of over 800 percent, for example.

This is a fluke of the statistics because of the low number of drives; in Q1 there were just two of this model, one of which failed shortly after being installed. During Q2, the remaining drive did not fail and thus the AFR for that period was zero.

These figures illustrate why Backblaze considers at least 100 instances of a specific drive model and 10,000 drive days of operation in a specific quarter as a minimum before the calculated AFR can be considered to be reasonable, according to Backblaze storage cloud evangelist Andy Klein

Looking at the AFR over time, Backblaze reports that the AFR across its SSDs was 0.96 percent during Q1 of 2023 and 1.05 percent during Q2. This failure rate is thus up from the previous quarter, but down slightly from the same quarter a year ago. In fact, a chart of the AFR per quarter over the past three years shows that it has fluctuated between 0.36 percent and 1.72 percent, with no apparent underlying pattern.

However, Backblaze says that the quarterly data is still vital as it can reveal issues such as one particular drive model that was the primary cause of a jump in AFR from 0.58 percent in Q1 2021 to 1.51 percent in Q2 then 1.72 percent in Q3.

"It happens from time to time that a given drive model is not compatible with our environment, and we will moderate or even remove that drive's effect on the system as a whole," Klein said.

Backblaze earlier this year calculated the average age at which failure occurred for its entire collection of hard drives, and has repeated the calculation for SSDs in this latest report.

This involved collecting the SMART data for the 63 failed SSD drives the company has had to date, which is not a great dataset size for statistical analysis, as Klein admitted. The resulting figure calculated from the data is 14 months, compared with two years and seven months across all hard drives.

But Backblaze cautions this figure is likely to be unrepresentative, as the average age of the entire fleet of SSDs it has in operation is just 25 months.

Looking at three drive models for which the company has a reasonable amount of data, Klein found that the average age of the failed drives increases as the average age of drives in operation increases, and it is therefore reasonable to expect that the average age for an SSD failure will increase with time.

Turning to the lifetime annualized failure rate for all of its SSDs, Backblaze reports a figure of 0.9 percent, covering a period from Q4 2018 through to the end of Q2 2023. This figure is up slightly from the 0.89 percent it found at the end of Q4 2022, but down from the same quarter a year ago, when the figure was 1.08 percent.

However, this includes those drives which have high apparent failure rates because there is just not enough data to make the calculation reliable.

If the calculation is limited to just those drive models for which there are 100 units in operation and over 10,000 drive days, and also with a confidence interval of 1 percent or lower between the low and the high values, then it cuts the data down to just three drives and an AFR of just 0.6 percent.

Meanwhile, Backblaze has also produced a graph of SSD failures over time to see how well the data matches the classic bathtub curve used in reliability engineering, as the comparable graph for its hard drives does.

According to Klein, while the actual curve (blue line) showing the SSD failures over each quarter is a bit "lumpy," the trend line (red) does have "a definite bathtub curve look to it."

The trend line is about a 70 percent match to the actual data, so Backblaze says it cannot be totally confident at this point, but for the limited amount of data available, it would appear that the occurrences of SSD failures are on a path to conform to the tried-and-true bathtub curve.

As ever, Backblaze makes the raw data used in its report available on a Drive Stats Data page for anyone to download and analyze as long as you cite Backblaze as the source if you use the data, and don't sell it, of course.

Go here to see the original:
Do SSD failures follow the bathtub curve? Ask Backblaze - The Register

Revolutionising retail efficiency through the power of the cloud – Cape Business News

Neil Coetzee, Head of Engineering at redPanda Software

Technology has become not just a tool, but a catalyst for transformation to bring greater efficiencies as well as improve the customer experience. Central to this is the cloud that brings with it the combination of advanced technologies, edge solutions, and the ability to integrate within the existing retail ecosystem.

Historically, retailers have stuck to traditional deployment methods. For instance, manually updating Point-of-Sale (PoS) systems outside of working hours. This not only presented a risk, with limited after-hours support but was also expensive, time-consuming, and lacked real-time testing. Invariably, when the store would open the next day, there would be teething issues that had to be ironed out. This not only had a detrimental effect on profits, but also negatively impacted on the customer experience.

Enter the concept of blue/green deployments. This deployment strategy, essentially allowing retailers to run parallel application versions in identical environments effectively enabling seamless transitions. In the world of retail, this means the capability to deploy changes during production hours without interrupting the shopping experience. Instead of an overnight manual PoS update, we now have automated deployments that are tested rigorously, ensuring operational effectiveness.

Additionally, enterprise-class retail solutions could only be afforded by the largest stores. However, the emergence of major cloud providers like AWS and GCP in South Africa and the rest of the continent mean that even small-scale retailers at an individual store level can leverage powerful cloud-based solutions. The cloud has essentially levelled the playing field, making world-class technology accessible to retailers of all sizes.

Mobilising the in-store experience

The ubiquity of mobile devices, including mobile printers, scanners, and WiFi devices, has reshaped the retail environment. Gone are the days of tethered printers and wired devices opening up their own set of challenges. With cloud integration, these wireless devices can seamlessly communicate, streamlining operations, and enhance the customer experience without being reliant on an on-premises server.

Historically, local retailers have faced significant connectivity challenges. Yet, with cloud advancements, especially in edge solutions, the dependency on international connectivity has diminished. Now, even if undersea cables fail as was the case recently, retailers can still tap into in-country cloud solutions.

There is also the opportunity to harness the potential of AI within the retail store environment. With cloud solutions, retailers can effortlessly integrate AI-driven managed services. Instead of creating and configuring bespoke applications that must be hosted within their on-premises environments, the cloud offers plug-and-play solutions that provide instant benefits.

This also extends to the cybersecurity segment. At a time when cyber threats are constant, cloud deployments offer unparalleled security. Traditional non-cloud systems, often plagued with outdated security solutions, stand vulnerable. In contrast, cloud deployments force retailers to adhere to stringent security standards by the cloud providers, thereby safeguarding retailer data and customer information.

Disaster recovery and load shedding resilience

The unpredictability of load shedding can wreak havoc on traditional in-store servers. However, with the cloud, disaster recovery becomes streamlined. Retailers can quickly restore operations with the click of a button, bypassing prolonged downtimes.

Furthermore, while in-store servers might require uninterrupted power supplies (UPS) to function during load shedding, mobile devices, now integral to modern retail, rely on the cloud. This means a diminished dependency on in-store servers, pushing retailers towards a more resilient and agile operational model.

Deploying the cloud within an extensive retail environment remains a costly exercise. The retailer must understand the use case for it and know how the cloud can be fit for purpose as well as the benefits it can provide the store environment.

In navigating the challenges and opportunities of the modern retail landscape, cloud solutions offer an unmatched combination of agility, resilience, and efficiency. As we at redPanda Software have seen, the integration of the cloud into retail operations is not just a step forward; its a leap into the future.

More:
Revolutionising retail efficiency through the power of the cloud - Cape Business News

Desktop as a Service (DaaS) Working and Importance | Spiceworks – Spiceworks News and Insights

Desktop as a service or DaaS is a cloud-based desktop service where vendors stream desktops, operating systems, and application images remotely to users devices and look after provisioning, maintenance, upgrades, and other routine tasks, all through a one-stop-shop subscription offering.

DaaS Providing Full Abstraction for Virtual Desktops

Source: TIBCOOpens a new window

The modern-day workforce needs to respond to emails and interact with coworkers from anywhere and on any device. The pandemic showed that remote teams can succeed regardless of location or distance. However, many businesses still strive to meet the technological requirements of their hybrid and remote employees. Here, desktop-as-a-service, also known as DaaS, can be immensely beneficial.

Desktop-as-a-service is a comprehensive cloud-based virtual desktop solution. It provides multiple user services, including operating systems, apps, data storage, and user preferences, all in a single bundle. It is an efficient, secure, and cost-effective desktop virtualization strategy.

DaaS liberates businesses from dependence on physical hardware for their operating systems and productivity software. Instead, enterprises can utilize DaaS to connect to virtual desktops from a cloud service provider over the internet. Cloud providers can provide this service by distributing and administering virtual desktops through their own data centers.

Three key traits define DaaS solutions, which are:

IT administrators deploy operating systems and apps on every employees device in a typical desktop deployment approach. Here, administrators frequently invest excessive time and resources in mundane tasks such as installing software, managing enhancements and updates, and trying to safeguard devices.

This traditional terminal deployment model is also unsuitable for an increasingly mobile and remote workforce. Many employees now work at home or while traveling, using various devices such as desktops, laptops, and/or mobile phones.

Organizations must, therefore, provide a robust and standardized user experience across all these devices to help these employees work efficiently. DaaS allows individuals to enjoy access to the same data and apps, irrespective of the device they use. As such, desktop as a service is the perfect fit for large organizations trying to cut down on IT costs and resources. This model is also suitable for companies with a mid-sized to large remote or mobile workforce.

The answer is no; virtualization is a part of DaaS, but desktop as a service includes several other cloud-delivered services priced on a subscription model.

Virtual desktop infrastructure (VDI) solutions such as DaaS offerings deliver desktops to devices from a consolidated data center. This is why the two terms are commonly confused. However, the infrastructure underpinning the VDI solution is typically on-premise and controlled by the IT department.

A cloud provider administers the storage, computation, and network infrastructure in the DaaS model. The organization offering desktops to its staff can oversee the desktop operating system, apps, anti-virus software, and any other desktop-related tasks or even partner with a managed desktop service provider.

DaaS eliminates the substantial upfront costs that come with establishing VDI on-premise. Typically, DaaS offerings come with a subscription-based plan that requires no upfront payment. Additionally, you can delegate all the administrative tasks necessary to support, repair, adapt, or update the VDI.

See More: How Citrix Is Powering IT Teams With Desktop-as-a-Service (DaaS): Q&A With Adam Lotz

If we were to describe the working of DaaS in one sentence, it is simply when a service provider distributes virtual desktops on a per-user model and delivers them to end users through the internet. The provider then offers support services for these virtual desktops. They administer the backend for companies that find it prohibitively costly or resource-intensive to create their individualized virtual desktop infrastructure.

DaaS enables a company to function with a smaller IT department as the vendor handles implementation, connectivity challenges, and various end-user concerns. That is essentially how desktop as a service or DaaS works.

Lets look at some of the key features that support the functioning of DaaS.

1. Flexible licensing

This allows businesses to transfer their existing licenses and permits, if available, or to seamlessly incorporate licensing into the DaaS solution. The latter eliminates the inconvenience of configuring individual license credentials.

2. Low-latency connection

A complete user experience that replicates using an actual office desktop is one of the most crucial aspects of DaaS. Employees want seamless application access, high-quality audio, and a video interface without jitters or delays. This may depend on server configuration or the geographic location of data centers and mainframes.

3. Multi-user access

A company can avoid wasting resources on different workstations for every user through the DaaS model. DaaS enables individuals to perform tasks on the exact same workstation at different times while still storing their data and apps independently.

4. Local integration

A cloud-based workstation does not eliminate the need for users to have access to localized devices such as printers and credit card readers. As a result, a DaaS platform would facilitate the automatic and seamless integration of the desktop with these local devices.

5. Unified management consoles

While DaaS is administered completely by the vendor, the organizations IT team will require visibility and control. A central management console will facilitate large-scale DaaS deployments. By consolidating where apps and desktops are managed, the company can save the time and effort of its IT personnel.

6. Resource optimization

DaaS can execute a resource optimization program to help a company save money when machines are inactive. For instance, it can autonomously shut down a workstation after the user has been inactive for a predetermined time, particularly after regular business hours. This disconnection of inactive desktops also compels users to initiate new sessions as and when required. This reduces the likelihood of malicious conduct or security threats.

7. Various access options

DaaS platforms offer numerous login options to accommodate the preferences of diverse employees and consumers. Some users like to access their workstations via a web browser, while others appreciate downloadable or independent versions. Most DaaS solutions can accommodate all of these requirements.

An important part of understanding how DaaS works is also knowing the challenges that it can throw up. When implementing desktop-as-a-service, the following aspects should be kept in mind.

1. Risk of high costs in the long term

In terms of initial investment, DaaS is less expensive than VDI. However, as time passes, the subscription fees may become prohibitively high. In addition, DaaS license fees can be higher than the time and effort of running virtual desktops. DaaS pricing is still more consistent and predictable than VDI pricing but isnt fundamentally cheaper over the long run.

2. Challenges around customizability

Another thing to consider is that a one-size-fits-all strategy may not be optimal for all businesses. Some DaaS products lack features an organization may require. Compliance and security regulations differ from one organization to another, making it hard to find a DaaS product that perfectly meets your needs.

3. Limited control

Desktop as a service allows limited control over system upgrades and safety in general, resulting in issues that IT teams cannot resolve. For instance, if the public cloud hosting an organizations virtual desktops is disrupted, the company faces an efficiency blockade. If theres a connectivity challenge, the IT team would have far less visibility into the networks functioning and would have to wait for the service provider to fix the issue.

See More: Top Five Remote PC Management Solutions for the Hybrid Work Era

Desktop as a service of DaaS is fast becoming an important component in the IT stack of organizations. This is because it:

The proliferation of remote and hybrid work settings has mandated a new method to access apps and data. IT teams can simply move data between platforms using DaaS. Users can access the information they need from various devices, regardless of location.

The vendor streamlines the complex systems underpinning DaaS. You do not need to build internal IT competencies or recruit skilled virtual desktop specialists. Instead, you can work together with your users to meet their expectations. IT teams are not required to oversee every endpoint, reducing their overall workload.

Subscription-based DaaS enhances the predictability of operational expenses and lowers IT costs. You are not required to invest in setting up and running a data center. CIOs and finance departments have recognized the importance of DaaS since it removes unnecessary hardware and software expenditures from their balance sheets.

DaaS can free employees from having to work exclusively on company-issued devices. They dont even have to restrict themselves to a single device. With DaaS, IT teams can readily facilitate bring your own device or BYOD policies, allowing employees to work on their own smartphones, tablets, or laptops. It makes it easier to switch between devices and still access the same apps and processes.

Data is located in the cloud providers data center and not on the devices that employees use. It is simple to disconnect a lost or stolen machine/gadget from the cloud-based service, simplifying endpoint security.

Numerous resources would be required to replace all obsolete equipment and legacy devices. In such cases, one can use DaaS to update their operating system. Running the latest operating system from the cloud is more cost-effective than changing a fleet of on-premise hardware.

Various cloud providers offer DaaS backup and recovery options. This prevents any disruption if a workstation crashes, no matter the size of your IT department. To enhance business continuity, you can back up desktop files and layouts per predefined SLAs.

In virtualized environments, network latency significantly impacts the general user experience. Through the network, users transmit keystrokes or mouse clicks to a remote computer. Desktop performance depends heavily on network connectivity strength.

Traditional VDI did not achieve widespread adoption because it was frequently sluggish due to inherent network problems. 5G connectivity is now tackling network latency issues as they happen. This will generate an effortless user experience for individuals using workstations driven by DaaS.

The hardware component is already configured in a DaaS implementation. It only requires a connection to a fresh device. IT departments can set it up without any configuration requirements. DaaS can thus save seasonal businesses (with cyclical fluctuations in demand or personnel) a massive amount of time and money.

Some DaaS vendors offer browser support. This is a safe and straightforward way for consumers to access DaaS. Instead of deploying a virtual desktop, users can opt for a browser-friendly virtualized desktop using a browser approved by the DaaS vendor.

The Web Access feature of Amazon WorkSpaces and the Azure Virtual Desktop web client are two instances of this possibility. This further reduces IT effort and supports niche use cases, such as testing within a sandbox environment.

These three use cases further illustrate the importance of DaaS.

See More: Top Five Remote PC Management Solutions for the Hybrid Work Era

Desktop as a service (DaaS) enables simplified administration, more versatility, and reduced overall cost of ownership compared to legacy models. Companies that want to offer options for remote work and device flexibility can set up a digital workspace quickly and effortlessly with DaaS. Users can sign in to their virtual desktops from wherever they are and from various machines, and their desktops will appear identical to the last time they checked in from a different location.

Since the data resides in a centralized, remote location, it is continually backed up. This means that internal IT teams do not need to manage backups themselves. They also need not be concerned about files residing on a machine at the workplace but not at home.

Given these overwhelming benefits, companies are increasingly turning to DaaS for their employees IT needs. Despite its challenges, desktop as a service can add significant value to an organizations IT infrastructure.

Did this article help you understand how desktop-as-a-service (DaaS) works and its importance in todays digital world? Tell us on FacebookOpens a new window , XOpens a new window , and LinkedInOpens a new window . Wed love to hear from you!

Image Source: Shutterstock

Read the original post:
Desktop as a Service (DaaS) Working and Importance | Spiceworks - Spiceworks News and Insights

Cloudflare helps companies reduce their IT infrastructure’s carbon footprint by up to 96% by moving to the cloud – ZAWYA

DUBAI, UAE: Cloudflare, Inc. (NYSE: NET), the security, performance, and reliability company helping to build a better Internet, today shared a new independent report published by Analysys Mason that shows switching enterprise network services from on premises devices to Cloudflares cloud-based services can cut related carbon emissions up to 78% for very large businesses to up to 96% for small businesses. The report is one of the first of its kind to calculate potential emissions savings achieved by replacing enterprise network and security hardware boxes with more efficient cloud services.

Global Internet usage accounts for3.7%of global CO2 emissions, about equal to the CO2 emissions of all air traffic around the world. The Internet needs to reduce its overall energy consumption, especially as regulators continue to implement the Paris Climate Accord, including plans to transition to azero emissions economy. TheEuropean Climate Lawrequires that Europes economy and society become climate-neutral by 2050, with a target of reducing net GHG emissions by at least 55% by 2030, compared to 1990 levels. Regulators in theUnited Statesand theEuropean Union, among others, have also announced plans to require companies to disclose climate-related information including carbon emissions resulting from their operations and supply chains, as well as climate related risks and opportunities. Finally, among theFortune Global 500, 63% of companies now set 2050 targets for emissions reductions. Companies large and small will increasingly be looking to reduce carbon throughout their supply chains, particularly their IT infrastructure.

The best way to reduce your IT infrastructures carbon footprint is easy: move to the cloud, said Matthew Prince, CEO and co-founder, Cloudflare. At Cloudflare, weve built one of the worlds most efficient networks, getting the most out of every watt of energy and every one of our servers. Thats why, with Cloudflare, companies can help hit their sustainability goals without sacrificing security, speed, performance, or innovation.

The Analysys Mason study found that switchingenterprise network servicesfrom on premises devices to Cloudflare services can cut related carbon emissions up to 96%, depending on the current network footprint. The greatest reduction comes from consolidating services, which improves carbon efficiency by increasing the utilization of servers that are providing multiple network functions. On premises devices are designed to host multiple workloads and consume power constantly, but are only used for part of the day and part of the week. Cloud infrastructure is shared by millions of customers, often all over the world. As a result, cloud providers are able to achieve economies of scale that result in less downtime, less waste, and lower emissions. Furthermore, the Analysys Mason study found that there are additional gains due to the high Power Usage Effectiveness of cloud data centres, and differences in the carbon intensity of generation in the local electricity grid.

Happy Cog is a full-service digital agency that designs, builds, and markets experiences that engage our clients and their audiences. Weve relied on Cloudflare for many of those websites and apps because it's secure, reliable, fast, and affordable but also aligns with many of our clients sustainability roadmaps and goals, said Matt Weinberg, Co-Founder and President of Technology at Happy Cog. Switching our clients from their previous on premises or other constant-usage infrastructure to Cloudflare's network and services has let them be greener, more efficient, and more cost effective. It's ideal when you can offer your clients a solution that covers all their needs and provides a delightful experience now, without having to compromise on their longer term priorities.

Report Methodology

Analysys Mason compared a typical hardware stack deployed in an enterprise data center or IT closet, and its associated energy consumption, to the energy consumption of comparable functions delivered by Cloudflaresglobal network. Traffic requirements were translated to energy requirements for both on-premise and cloud-based alternatives. The analysis includes assumptions for the power usage effectiveness (PUE) of cloud data centers vs. on-premises data centers or data rooms, and the carbon from electricity, based on the mix of fossil fuel versus renewable energy sources in the local grid.

-Ends-

About Cloudflare

Cloudflare, Inc. (www.cloudflare.com/ @cloudflare) is on a mission to help build a better Internet. Cloudflares suite of products protect and accelerate any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare have all web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was awarded by Reuters Events for Global Responsible Business in 2020, named to Fast Company's Most Innovative Companies in 2021, and ranked among Newsweek's Top 100 Most Loved Workplaces in 2022.

Original post:
Cloudflare helps companies reduce their IT infrastructure's carbon footprint by up to 96% by moving to the cloud - ZAWYA

15 VPS Security Tips to Prevent Attacks on Your Server – G2

Linux virtual private server (VPS) stands as a trusted choice for companies across the world.

The flexibility and power of Linux VPS make it a prime pick. Yet theres a dark cloud hovering: cyber threats.

The facts cause alarm.

In March 2023, according to IT Governance, 41.9 million records, mainly drivers licenses, passport numbers, monthly financial statements, etc., were compromised by cyberattacks worldwide.

Additionally, the three biggest security incidents of May 2023 alone accounted for more than 84 million breached records 86% of the months total. The easiest target? An inadequately secured server.

An inadequately secured VPS waits like a ticking time bomb, ready to blow a hole in your reputation, finances, and customer trust. Thankfully, fortifying your Linux VPS isn't string theory, but you have to practice diligence, expand awareness, and employ proven security measures.

In this guide, were going to talk about 15 VPS security tips. Simple, actionable, and indispensable, these strategies will convert your server from vulnerable to vault.

Keeping VPS protected from potential threats and weaknesses involves a suite of protocols, tools, and best practices. Essentially, virtualized servers mimicking dedicated servers within larger servers, VPS, are highly susceptible to cyber threats due to their connectivity to the internet.

VPS security shields these digital environments from unauthorized access, malware, Distributed Denial-of-Service (DDoS) attacks, or further security breaches.

Linux VPS, though reputable for its robust security framework, is not impervious to threats.

Like any other system, vulnerabilities emerge, and hackers constantly prowl for any weak points by leveraging:

At its source, VPS technology relies on bare-metal servers, which inherently bolster security for web hosting.

Bare-metal servers are physical servers dedicated exclusively to one tenant. This exclusivity ensures complete control over the hardware, eliminating multi-tenancy risks. With this control, theres minimal chance for one users vulnerabilities to affect another's.

Next in line is the hypervisor.

This software marvel divides a bare-metal server into multiple VPS instances. By partitioning and sharing resources, it hosts several virtual environments on a single host machine. It remains isolated, often out of the general public's reach, curbing potential security breaches.

Source: Webpage Scientist

When we pit VPS against shared hosting, the former takes the prize.

One vulnerability can expose all hosted sites with shared hosting, but using VPS, even if you're technically sharing a bare-metal server, the partitioned and virtualized environments offer layers of security buffers, making VPS a safer bet.

While technology has provided businesses with tools to scale and operate efficiently, it's also opened the gates to sophisticated cyber threats. Your server, the backbone of your online presence, demands unwavering protection.

A lapse in online safety isn't just a technical glitch; it's a breach of trust, a dent in reputation, and a potential financial pitfall. Which proactive measures should you take to shelter the impenetrable fortress of your server against cyber threats?

Root logins grant users the highest level of server access. By logging in as root, anybody can make whatever changes they want, clearly a huge risk. Administrators should ideally use a non-root user account with the necessary privileges and then switch to a root user when essential.

By disabling direct root logins, they can shrink the attack surface.

Dropbox once experienced a data breach because an employee used a password from a site that had been hacked.

Logs record all activities that happen on your server. Regular log monitoring allows you to spot any unusual patterns or potential security breaches. Early detection means the difference between thwarting a hacking attempt and dealing with a full-blown crisis.

For example, if a shoplifter visits multiple times, the shop owner can detect patterns in their behavior. Similarly, consistent log analysis signals repeated unauthorized access attempts.

The Equifax breach in 2017 affected 143 million people. The culprit turned out to be an unpatched vulnerability in the Apache Struts web application software, an unnecessary module for most.

What does this mean?

Every pre-installed software package or module can potentially introduce vulnerabilities, and not all are necessary for your operations. Removing unused or obsolete packages reduces the number of possible entry points.

Secure shell (SSH) is commonly used to safely access servers. However, attackers often target the default port 22. By simply changing this to a non-standard port, you can dodge many automated attack attempts.

Moreover, using SSH keys - cryptographic keys instead of passwords fortifies security. SSH keys are more complex and harder to crack than even the strongest passwords.

Major companies encourage the use of SSH keys for authentication. GitHub, for one, emphasizes its security benefits over traditional passwords.

iptables function as an internal firewall, controlling the traffic that goes in and out of your server.

By filtering and setting rules on IP packets, you can decide which connections to allow and which to block. This gives you another shield against hackers.

Major web platforms, such as Amazon Web Services, frequently emphasize the importance of setting up correct iptables rules to secure resources.

While Linux is often praised for its robust security, it's not immune to threats.

Installing antivirus on your VPS helps detect and neutralize malicious software to keep your data safe and uncompromised. Just as software has protected millions of computers worldwide by detecting threats in real time, an antivirus for your server continuously scans files and processes to keep malware at bay.

In 2021, the ransomware attack on the Colonial Pipeline resulted in a shutdown and disrupted fuel supplies all across the East Coast of the United States.

Taking regular backups of your data protects you and your server from such disasters. By having backups, you can restore everything to its previous state in the event of a data loss incident.

Disabling IPv6, the latest version of the internet protocol, can prevent potential vulnerabilities and attacks. But it may also introduce new risks if not properly configured and secured.

Disabling IPv6 reduces the attack surface and potential exposure to cyber threats.

Every open port on your VPS is a potential gateway for cyberattacks. By disabling ports you don't use, you're essentially shutting unnecessary open doors. It makes it harder for intruders to get in.

Disabling unused ports lowers the risk of human error.

GNU Privacy Guard (GnuPG) encryption helps encrypt and sign your data and communication. It provides a secure layer so your data remains confidential and tamper-proof.

In 2022, a ransomware variant called "LockFile" was discovered that used GnuPG encryption to encrypt files on infected systems. The ransomware was particularly sneaky, targeting specific organizations and slipping past standard security protocols.

Rootkits are malicious software platforms that can gain unauthorized access to a server and remain hidden. Installing a rootkit scanner neutralizes the hidden threats.

In 2023, the cybersecurity community identified a novel rootkit named "MosaicRegressor" that specifically targeted Linux servers. Alarmingly, it could slip past conventional security protocols with ease.

Your firewall is your servers bouncer for your server. It checks all the data coming in and going out. With the right rules and guidelines, firewalls stop dodgy requests or certain unwanted IP addresses.

For instance, businesses with a DDoS attack problem could often mitigate the effects using well-configured firewalls.

Make sure only the right people keep your server safe. We often look out for dangers from the outside, but sometimes, the troublemaker might be calling from inside the house.

In November 2021, a glaring example surfaced when a former employee of the South Georgia Medical Center in Valdosta, Georgia, downloaded confidential data onto one of their own USB drives a day after quitting the job.

Regularly reviewing and updating user permissions prevents potentially disastrous situations like this.

To conduct disk partitioning, you have to split your server's hard drive into multiple isolated sections so that if one partition faces issues, the others remain functional.

File transfer protocol (FTP) was once the go-to method for transferring files, but it lacks encryption, meaning data sent via FTP is vulnerable to eavesdropping. Secure file transfer protocol (SFTP) was then developed to work similarly to FTP with the added bonus of data encryption.

Think about when you transmit customer details or confidential business data. Using SFTP is similar to sending a sealed, secure courier package, whereas using FTP is like sending a postcard anyone can read it if they intercept it.

Choosing a hosting service isn't just about speed and uptime; a secure hosting provider is the first line of defense against potential cyber threats. Seek out providers that prioritize end-to-end encryption, regularly update their systems, and offer consistent backups.

Reviews and testimonials can be valuable, but deepen your understanding by asking the following questions:

Cyber threats are often closer than you think. Even minute vulnerabilities can invite hackers to infiltrate your systems. Recognizing weak spots and acting promptly fortifies your VPS security.

Peruse these common pitfalls to learn how to circumvent them.

The hackers' favorite gateway is a frail password. According to a survey by the UK's National Cyber Security Centre, 23.2 million victims used "123456" as passwords that were later stolen.

A whopping 81% of company data breaches are due to stolen, weak passwords.

Fix: Enforce a password policy that requires alphanumeric characters, special symbols, and varying cases to reduce the reliance on easily guessable phrases. Password manager softwarecan generate and store complex passwords.

Recommendations from the National Institute of Standards and Technology call for people to create passwords that are "easy-to-remember phrases, long" a series of four or five words mashed together.

Running outdated software is akin to leaving your doors unlocked. Cybercriminals constantly look for known vulnerabilities in old versions the same way house thieves look for overgrown lawns and full mailboxes.

Consider the WannaCry ransomware attack, which exploited older Windows versions and affected over 200,000 computers.

Fix: You need to regularly update and patch software. IT teams can adopt automated systems, like unattended upgrades for Linux, to keep software updates timely.

An open port is like an unlocked door for hackers. For instance, the Redis database vulnerability resulted from unprotected ports.

Fix: Use tools like Nmap to scan and identify open ports. Close unnecessary ports and employ firewalls like UFW or iptables to restrict access. The fewer doors you have open, the fewer ways to sneak in.

Overprivileged users spell disaster. Having analyzed quarterly reports for 500 companies, Accenture reported that 37% of cyberattacks in businesses originate with internal actors.

Fix: Set up the principle of least privilege (PoLP). Assign roles based on necessity and audit user permissions routinely. Ensuring that each user has only the permissions they need minimizes potential damage.

Without a vigilant eye on server operations, irregularities go unnoticed and pave the way to potential threats.

Take a situation where an unexpected surge in traffic occurs. This might be a DDoS attack, but without proper supervision, someone could easily misconstrue it as a sudden influx of genuine users.

Fix: Invest in monitoring tools. Periodically review logs and set up alerts for unusual incidents because you can't protect what you cant monitor.

Function-level control goes beyond general user permissions and dives into the specific tasks a user can perform.

Say an employee in a company's finance department has access to view and modify payroll data. Without clear boundaries, that employee could effect unintended changes, errors, or even malicious activities.

Fix: Implement function-based access control (FBAC) systems to make sure that users only access the functions vital to their role. Regular audits of these permissions further fine-tune and secure access.

By controlling functions, you're not just limiting access; you're molding a secure, role-appropriate environment for each user.

As cyber dangers grow trickier and more common, an unprotected server can lead to big problems. You might lose important data you might lose the faith people have in you.

Keeping a VPS safe is like tending to a garden; you've got to keep at it. By staying updated and following good safety tips, you're building a strong defense.

And remember, by guarding your server, you're showing your users you really care about their trust.

Dive deep into the basics ofVPS hostingand learn more about its types, benefits, and best practices to follow to make VPS hosting work for you.

Here is the original post:
15 VPS Security Tips to Prevent Attacks on Your Server - G2

Even with repatriation cost savings, the value of cloud computing is still strong – InfoWorld

37Signals, led by CTO David Heinemeier Hansson, implemented a cloud repatriation plan that has already saved them $1 million. Previously, the company spent $3.2 million annually on cloud services. They viewed that as being too much. Their repatriation project invested $600,000 in eight servers hosted by Deft. Hansson now projects that the plan can save $10 million over five years. Thats money they can put back into the business directly, investing in innovations and digital transformation projects.

As a result, their cloud spending has decreased by 60%, going from around $180,000 to less than $80,000 per month. Hansson expects another significant drop in expenditures. Despite managing their hardware, the ops team size has stayed the same.

Of course, those who drive repatriation projects based on this anecdotal data may not find not the same level of cost benefits. Indeed, just because money is saved by moving applications and data to cheaper owned hardware platforms, the benefits of cloud computing are more challenging to measure.

Many enterprises may happily report cost reductions of 60% or more but miss the bigger picture in terms of agility and speed to innovation that cloud computing is able to provide over owned hardware systems. The danger is that enterprises will rush towards managed services providers and colocation services, even renting their own data center space, and end up with long-term fixed costs and capital expenses that are not cost-justifiable when considering all hard and soft benefits.

This is not a push-back on repatriation, only that the value calculations are much more complex than many people understand. I fear enterprises may rush to on-premises systems to save a few bucks, much like they rushed to cloud platforms just a few years ago. The same mistakes can occur when companies dont understand the true value thats being delivered.

Much of this comes down to carefully defining what value means to the business. For some businesses, cost savings can be turned into value if they are in an industry that does not value innovation and speed, and the cheapest and best product wins the day. Take a company that just makes staples, has made staples for the last 100 years, and will continue to make staples to meet a steady demand.

For these types of more traditional companies, the cloud really does not have value and perhaps they should have never made the trek to the public cloud. Thus, repatriation is really right-sizing, working on platforms that are more cost-efficient for the type of computing they need and their type of business.

For others, its not that easy. Most businesses succeed by their innovations, no matter if its a product, service, or process that makes the customer experience better, such as automated supply chains so optimized that products are delivered to the customer faster and through a superior experience.

Even traditional companies such as banks can benefit from this type of innovation which is much easier when leveraging public clouds as the primary platforms even if its cheaper to operate on owned hardware. The value is in the innovation and speed to market, not in any savings that may be possible by taking cheaper paths to computing that limit agility and speed of growth.

So, is Linthicum against repatriation or for repatriation? Neither. This has never been about one direction or another; its about matching up the technology configuration and resources to the needs of the business. Of course, many people dont want to hear this; they want a simple answer to Which one is better?

This is why were here in the first place. We seem to be missing some of the strategic planning to understand the business and match a technology configuration to maximize the business value. We seem to run headlong to whatever the cool kids are doing these days. Thats never been the right approach, and well end up fixing things on the back end and gathering too much technical debt.

Here is the original post:
Even with repatriation cost savings, the value of cloud computing is still strong - InfoWorld

UCaaS, CCaaS, CPaaS Whats the Difference? – Telecom Reseller

With the increasing demand for quick and convenient ways to reach organizations, various innovative technologies have taken place in the past few years. UCaaS, CCaaS, and CPaas are some of the few technologies that have gained a lot of recognition in these years. All these technologies are cloud-based technologies and share similarities. However, they are quite different from each other and serve different purposes. In this blog, we will get a detailed insight into all these three cloud-based technologies.

In todays knowledge-driven business world, how a business shares and exchanges information defines its success. Companies, especially the call/contact centers, sales and service teams, and many others are reorganizing and updating their communication strategies to stay competitive. Various developments have been made in the way people share and exchange information. However, the major development throughout this shift has been the emergence of cloud technology solutions. You might have already heard about the term cloud, also known as cloud computing and technology.

What is cloud computing?

Cloud computing is simply an array of services delivered over the internet or the cloud. Instead of relying on local hard drives and private data centers, cloud computing uses remote servers to store and access data.

Before the emergence of cloud computing, businesses primarily depended on databases, servers, hardware, software, and other supplements to take their businesses online. Companies used to invest heavily in purchasing and maintaining their own servers to meet their business requirements. To minimize the risk of outages and downtime and to accommodate peak traffic volume, businesses had to buy enough server space. In such cases, businesses end-up having large amounts of server space unused for much of the time.

The emergence of cloud services has made it easier for businesses to store and maintain information without investing a huge amount on servers. With these services, companies can save a lot by eliminating the need for onsite servers, maintenance workforces, and other costly IT resources. Instead of buying, owning, and maintaining physical data centers and servers, users can access various technology services including databases and storage as per their specific requirements from a cloud provider. With all these things in mind, it would be correct to say that cloud computing has completely transformed the way businesses used to store and share information.

Who all can use cloud computing?

Businesses of every size, type, and industry can benefit from using cloud services for a variety of reasons such as:

The most popular cloud-based services: UCaaS, CCaas, and CPaaS

Since businesses are swiftly shifting from on-premises communication models to cloud-based communication models, they are using various types of services to enhance their business communication. If we talk about different types of as a Service models in the cloud-based communication systems, then the most popular models are:

All these cloud-based communication systems share similar characteristics but vary in terms of their services and functionalities. Still, many people get confused about these cloud-based services.

For a better understanding of each service, lets discuss all these cloud-based technologies in detail.

What is UCaaS?

UCaaS is the short form of Unified Communications as a Service. It is an all-in-one cloud-based platform that has developed from the concept of unified communications (UC). With the help of UCaaS vendors, businesses can streamline and integrate their communication channels as well as people easily and effectively. The UCaaS vendors generally emphasize areas like voice, SMS, chat, and conferencing applications. This cloud-delivered unified communications model is widely used to support various communications functions including:

Since the cloud hosts UCaaS services, companies dont need to install and maintain any additional hardware or infrastructure. UCaaS providers are responsible to own and maintain the platform and software. With the help of UCaaS services, agents can provide superior customer service. They can access various advanced company tools and data to assist customers without having to switch back and forth between applications. Even customers can connect with businesses in their preferred medium which makes their support experience even better.

Advantages of the UCaaS Model

Some of the key advantages of choosing the UCaaS model include:

What is CCaaS?

CCaaS is the short form of Contact Center as a Service. CCaaS enables organizations to use a remotely hosted and cloud-based set-up for the smooth running of their contact center operations. The vendors of CCaaS build different products on APIs (Application Programming Interfaces) that work across several operating systems and Internet browsers. The service providers generally focus on offering companies enough capacity and tools to handle and manage customer interactions, queries, and service/support cases easily. Using CCaaS, contact center agents can easily access their companys contact center software from their mobile device or any web browser, from anywhere and at any time. The CCaaS model is widely used to support various communications functions including:

Due to the increasing dependence on digital communication channels, especially after the pandemic situation, the CCaaS market offerings are expected to grow to $27.8 billion by 2023. Since the platform is hosted in the cloud, users need not invest in any costly hardware. It lets customers connect with a company via their preferred way of communication which leads to a better customer experience.

Advantages of CCaaS Model

Here are some of the key benefits of choosing a CCaaS model:

What is CPaaS?

CPaaS is the short form of Communication Platform as a service. This platform is an extension of both UCaaS and CCaaS. It allows companies to add various communication features to their existing applications. To do this, they do not need to invest in completely new hardware or infrastructure or any additional technical assistance. In simple words, the CPaaS platform lets users build real-time communication features without the need to create their own tech stack. CPaaS vendors provide users with different APIs and code snippets to add to the environments of the cloud-based platforms. The CPaaS model is widely used to support various communications functions like:

CPaaS provides users with prebuilt features and communication channels, thereby eliminating the need to hire any expert team to add APIs and code snippets. The platform includes almost everything like pre-built applications, sample codes, an application programming interface (API), and more to assist companies in integrating desired solutions quickly and easily.

Advantages of CPaaS Model

Conclusion:

UCaaS, CCaaS, and CPaaS are all widely used, popular cloud-based technologies. All these technologies help in augmenting the communication experience. You can choose the one based on the specific needs and demands of your business. Choosing the right technology can help you add agility, reliability, security, and control to your overall communication system.

See the full article here.

Here is the original post:
UCaaS, CCaaS, CPaaS Whats the Difference? - Telecom Reseller