Category Archives: Cloud Storage
Data Compliance in the Cloud: What You Need to Know – TechiExpert.com
With the rise in cloud offerings and data-driven solutions, enterprises are accumulating massive amounts of data. The accumulation is causing regulatory and public awareness to adopt and promote secure data usage against illegal or unethical benefits. Countries and governments are mandating the implications of compliance regulations to ensure enterprises are transparent about the data collection and usage standards.
The presence of sensitive data elevates the criticality of compliance implications when data storage, transformation, and transmission are involved via the cloud. Affordable cloud storage and compute resources at the disposal of button clicks make data compliance critical, as anyone can capture the data and use it for destructive or criminal purposes. Cloud providers continually strive to design and develop solutions that adhere to data compliance and regulations. Understanding key aspects of protecting the data is essential. The developer is responsible for reviewing and implementing data compliance standards.
The availability of information and news is the cause of the digital responsibility movement. Global and regional regulatory policies have been derived and evolved, specifying the kinds of data that must be protected, acceptable procedures by the law, and the consequences for businesses that fail to adhere to the rules.
The top standards that are generally a part of cloud data security solutions encompass the global, health, and financial regulations Global Data Protection Regulation (GDPR), the Health Insurance Portability and Accountability Act (HIPAA), and the Payment Card Industry Data Security Standard (PCI DSS).
The Privacy Act, ISO 27001, and many other industry-specific compliance standards exist that firms should consider to ensure compliance standards are adhered to for sensitive data.
Considering and applying standard compliance practices in cloud environments boosts the security posture and builds overall service integrity, showcasing the companys commitment to data privacy and ethical business practices.
Cloud compliance policies open up possibilities for enhanced data management and risk mitigation. Above all, cloud data compliance is displayed as a badge of trust in the market for customer trust and loyalty.
Well-documented guidelines and cloud solution best practices exist as a data compliance framework and help organizations adhere to regulatory requirements. These solutions are general and efficient at the same time.
Encryption, masking, and anonymization abstract the underlying data from unintended exposures by making it unreadable and safeguarding the data integrity of confidential information in transit and at rest.
IAM policies, data classification, and tagging help classify and label data based on sensitivity and importance, with the advent of applying robust access control to administer the usage and access restrictions.
Logging and alerting are vital for recording data access patterns and version history while reporting unintended behaviors as they occur in real-time for instant mitigation and remediation to minimize the exposure of the attack surface.
Data residency, location rules, retention, and deletion regulations are essential. The strategies enable sound and fail-proof data compliance management. This strategy protects confidential data while fostering accountability, openness, and adherence to data compliance rules.
Data compliance and regulations are not to be mistaken for general requirements. The standards are part of the enterprise data handling and sharing strategy. Failing to apply and comply with global and regional data compliance standards can put enterprises at risk of reputation and monetary loss.
Inadequate addressing of compliance requirements can lead to data breaches, data exposure, and breaches. Additionally, regulatory and legal consequences are imposed if enterprises are seen practicing unethical or illegal activities with personal and sensitive data while avoiding data compliance standards.
The standards and usage of the data in the cloud ecosystem have raised numerous red flags recently concerning the safety and security of data. Countries and users place their trust in enterprises and believe they will use their data (personal) for ethical purposes, and betterment of overall service, and nothing more.
Global policies and regulatory acts exist to guide and instruct enterprises to apply cloud data compliance solutions. These solutions range from general to most sophisticated ones, and third-party tools exist to provide consolidated features as a single offering. Organizations at any cost must prioritize data compliance to protect sensitive information.
See original here:
Data Compliance in the Cloud: What You Need to Know - TechiExpert.com
Experts believe there is a need for unified data storage – The Financial Express
NetApp (NASDAQ: NTAP), a global, cloud-led, data-centric software company, released the 2023 Data Complexity Report, a global report that explores companies growing needs for unified data storage. The report found that 98% of organisations are in the middle of their cloud journey, with three out of four reporting workloads stored on-premises, highlighting the need for a unified approach to hybrid multi-cloud architectures and continued innovation in both on-premises all-flash storage and public cloud storage to enable AI adoption at scale.
Security threats, sustainability goals, and adoption of deep technologies like AI make IT more complex than ever. Holistic solutions that address these challenges and enable new technologies to thrive across hybrid IT environments, is the need of the hour, Puneet Gupta, managing director,vice president, NetApp India and SAARC, explained.
According to the report, migration to the cloud hasnt been a linear journey for many businesses. Of all tech executives with plans to migrate workloads to the cloud, three out of four still have most of their workloads stored on-premises.
However, AI adoption is the biggest driver for cloud migration, and the cloud is a major enabler for AI adoption. Seventy-four percent of respondents said theyre using public cloud services for AI and analytics. Tech executives globally (39%) say their top need for Flash innovation is to optimise AI performance, cost and efficiency, as per insights from the report.
Follow us onTwitter,Facebook,LinkedIn
Read the original post:
Experts believe there is a need for unified data storage - The Financial Express
Oxide on-prem cloud computer reinvents the server rack Blocks … – Blocks and Files
Startup Oxide has delivered a rack-level system providing cloud-style computing on premises as its first commercial product.
Oxide was founded in September 2019 by datacenter heavyweights CTO Bryan Cantrill, CPO Jessie Frazzelle, and CEO Steve Tuck. It has had three funding rounds to date: A $20 million seed round in 2019; a $30 millionA-round in September 2022; and a $44 million continuation A-round this month that coincides with its first product launch. All the rounds were led by Eclipse Ventures.
Cantrill was CTO at Joyent and distinguished engineer at Sun Microsystems/ Oracle before that. Frazelle, who left in July 2022 to co-found KittyCAD, was a software engineer at Docker, Mesosphere, Google, Microsoft, and GitHub. Tuck was president and COO at software and services company Joyent, also SVP worldwide sales, and held sales roles at Dell before that.
Oxides purpose is to build what it calls a commercial cloud computer, a cloud-scale and cloud-style rack-level, on-premises computing system.
The Oxide cloud computer combines compute, storage, and networking elements as sleds in a plug-and-play rack. It includes the open source software needed to build, run, and operate a cloud-like infrastructure.
This software includes a Propolis hypervisor, a Nexus control plane, Crucible distributed block storage system, IAM (Identity and access management), and OPTE (Oxide Packet Transformation Engine) self-service network fabric. The software is anchored to a hardware root of trust.
The distributed block storage is based on OpenZFS and has configurable capacity and IOPS per volume. Volume size can be scaled upon demand. It has redundancy for high availability. It can integrate with external storage across a network link. Crucible provides instantaneous, point-in-time virtual snapshots for recovery and off-rail backup.
Oxide says OpenZFS checksums and scrubs all data for early failure detection. Virtual disks constantly validate the integrity of user data, correcting failures as they are discovered. There is automated rebalancing of data to preserve redundancy in the event of drive or sled removal.
Pools of resources are available either through APIs, a CLI, or a web-based UI.
Each sled contains an AMD processor, DRAM, and NVMe SSD storage. Each sled is slid into place and needs no wiring, were told. There can be 16, 24, or 32 sleds in a delivered rack. A compute sledhas an AMD Milan EPYC 64-core CPU, 16 x DDR4 DIMM slots providing 512GiB or 1TiB of memory, and up to 10 x U.2 NVMe 3.2TB (2.91 TiB) SSDs. That provides a maximum of 32 x 32 TB 1,024 TB of raw storage capacity. There is 100 GbE link to the racks network switch.
There are two network switches. Each has an Intel Tofino 2 processor with 6.4 Tbps throughput and 232 x 40/100/200 GBASE QSFP-28 uplink ports and 32 x 100 GBASE-KR4 backplane ports.
The rack switch has parts for three networks: An up to 12 Tbps programmable Ethernet ASIC, a secondary GigE switch ASIC, and an FPGA driving a proprietary low-level protocol for board control of other systems in the rack. It is connected via a PCIe link to a compute node for management.
The rear of the rack has a DC busbar and a cabled backplane with blindmated networking. This means self-aligning connectors slide or snap into position as a sled is installed in the rack. There are no power or network cables to plug or unplug.
A blog by Cantrill says:
In his view, the rental-only model for the cloud is not sustainable. A cloud computer has to be rack-scale and one must break out of the shackles of the 1U or 2U server, and really think about the rack as the unit of design.
That helps explain the blindmating. This is a domain in which we have leapfrogged the hyperscalers, who (for their own legacy reasons) dont do it this way, he says.
Oxide claims its rack is up to 35 percent more energy efficient than traditional server racks.
The Oxide rack ships with everything installed and can be set up in around four hours. Customers can use Kubernetes or cloud software tools like Terraform to deploy and configure workloads.
Customers are said to include a US federal agency, the Idaho National Laboratory, and a financial services business. Several Fortune 1,000 companies are said to be interested.
In effect Oxide wants to replace Dell, HPE, and Supermicro on-premises racks with its own hyperconverged infrastructure rack with built-in public cloud facilities. The Oxide rack uses less power and is far easier to own, operate, and run from a hardware and a software sense than traditional server and HCI racks, Oxide says.
Download a specification sheet here.
Originally posted here:
Oxide on-prem cloud computer reinvents the server rack Blocks ... - Blocks and Files
TP-Link’s teeny-tiny security camera offers a lot for very little – The Verge
Tapo, one of TP-Links two smart home brands, is continuing to expand its footprint in the home security camera space with the announcement of the $39.99 Tapo C120. This pint-size smart home camera fits in the palm of your hand and can be used indoors or out, thanks to IP66 weatherproofing rating. Its due to be released on November 13th.
Small smart security cameras arent new Wyze and Blink both have offerings of a similar size for under $100 but TP-Links new camera crams a lot of features into a small package for under $40. A wired camera, it has 2K video, local storage with an onboard microSD card, free AI-powered person detection, and an easy-to-use magnetic mount.
The Tapo C120 costs $39.99 and includes 2K video, local storage, and free smart alerts for people, pets, and vehicles. Image: TP-Link
Blinks outdoor cameras cost start at $99 for 1080p video, local storage requires additional hardware, and you have to pay for person detection; they are battery-powered. Wyze has battery and wired outdoor options with onboard storage (up to 512 GB), but anything with 2K is over $55, and unless you pay for a subscription, Wyzes recording options are limited.
All of this makes the new Tapo camera an intriguing option for anyone looking for a versatile budget security camera that doesnt rely on the cloud (although there is an option for cloud storage.)
Other features of the C120 include adjustable dual spotlights that can be triggered for different events and a starlight sensor for color night vision. Full duplex two-way audio lets you talk to and hear anything going on in your home, and an alarm system allows you to record your own audio.
The Tapo C120 can be used indoors as a pet cam, or baby monitor as well as outdoors. A magnetic mount and adjustable stand make it easy to install. Image: TP-Link
An invisible IR night vision mode and baby crying and pet alerts make the C120 a good option for use indoors as a pet cam or baby monitor. Free AI-powered smart alerts for people and vehicles also translate to a useful outdoor camera for monitoring a front door or driveway.
As with Tapos other recent launch, the Tapo Wire-Free MagCam, this camera has an adjustable magnetic mount. This is something I find really handy for security cameras, as it makes mounting them and moving them if you want to monitor somewhere else much easier. A 9.8-foot power cord is also a useful addition, although the plug isnt weatherproof.
The camera works with the Tapo smart home app and is compatible with Alexa and Google Home to live-stream footage to smart display. The Tapo C120 will be available starting November 13 at Amazon for $39.99.
Update: Friday, November 3rd, 5:30PM: TP-Link reached out after publication to say the launch has been delayed, and the camera wont be available to buy until November 13th. weve updated the article to reflect this.
More here:
TP-Link's teeny-tiny security camera offers a lot for very little - The Verge
Latest Update: Cloud Workload Protection Platform Market Size … – GlobeNewswire
Pune, India, Nov. 01, 2023 (GLOBE NEWSWIRE) -- The global cloud workload protection platform market size was valued at USD 2.77 billion in 2022 and is expected to reach USD 12.10 billion by 2030 with a CAGR of 20.5% during the forecast period. Fortune Business Insights, in its report titled, Cloud Workload Protection Platform Market Forecast, 2023-2030.
Request a Sample PDF:
Key Industry Development:
Key Takeaways
Discover the Leading Players Featured in the Report:
Companies leading the Cloud Workload Protection Platform Market are Trend Micro Incorporated. (Japan), Palo Alto Networks (U.S.), VMware, Inc. (U.S.), SentinelOne (U.S.), Microsoft (U.S.), Musarubra US LLC (Trellix) (U.S.), Lacework (U.S.), Orca Security (U.S.), Sysdig (U.S.), Check Point Software Technologies Ltd. (Israel), Cisco Systems, Inc. (U.S.)
Report Scope & Segmentation
Browse Complete Report Details:
https://www.fortunebusinessinsights.com/cloud-workload-protection-market-106491
Drivers and Restraints
Integration and Need for Cloud Compliance to Drive Market Trajectory
Integration and the need for cloud compliance are anticipated to drive the global cloud workload protection platform market growth. Cloud storage offers various benefits such as agility, speed, and flexibility and provides security measures to protect data. Key market players have been integrating these solutions to develop strong cloud security compliance solutions.
However, the integration of CWPP faces challenges due to an increased number of misconfigurations resulting from user errors, which is expected to hinder market development in cloud workload protection platforms.
SEGMENTATION
By Component
By Deployment
By Enterprise Type
By End-User
By Region
Regional Insights
With the Presence of Various Cloud Service Providers, North America is Expected to Lead the Market Share
North America is projected to lead the cloud workload protection platform market share, with the market valued at USD 1.25 billion in 2022. The U.S. is one of the prominent countries in the region due to the presence of various cloud service providers. Canada is also expected to show appreciable growth due to the adoption of the cloud in workloads and business models.
Europe is expected to hold a prominent market share in the cloud workload protection platform industry during the study period due to the adoption of the cloud and the integration of cloud security practices for complex cloud environments.
Quick Buy - Cloud Workload Protection Platform Market Research Report
https://www.fortunebusinessinsights.com/checkout-page/106491
Competitive Landscape
Leading Players in the Market Expanding Offerings to Attract Diverse Customer Base
The global cloud workload protection platform market includes key players such as Trend Micro Incorporated, Palo Alto Networks, VMware, Inc., Microsoft, Musarubra US LLC, Lacework, Orca Security, and others. The key players are focused on expanding their presence by launching specific solutions and new products to attract a vast customer base.
FAQs
Cloud Workload Protection Platform Market?
Cloud Workload Protection Platform Market size was USD 2.77 billion in 2022.
How fast is the Cloud Workload Protection Platform Market growing?
The Cloud Workload Protection Platform Market will exhibit a CAGR of 20.5% during the forecast period, 2023-2030.
Related Reports:
Data-Centric Security Market Size, Share, Trends 2030
Digital Transformation Market Size, Share, Trends and Growth
Cloud Security Market Size, Share, Growth, Analysis
About Us:
Fortune Business Insights offers expert corporate analysis and accurate data, helping organizations of all sizes make timely decisions. We tailor innovative solutions for our clients, assisting them to address challenges distinct to their businesses. Our goal is to empower our clients with holistic market intelligence, giving a granular overview of the market they are operating in.
Contact Us:
Fortune Business Insights Pvt. Ltd.
US: +1 424 253 0390
UK: +44 2071 939123
APAC: +91 744 740 1245
Email: sales@fortunebusinessinsights.com
The rest is here:
Latest Update: Cloud Workload Protection Platform Market Size ... - GlobeNewswire
Cloud migration 101: how to plan, execute and optimise your cloud … – iTWire
Cloud computing is the new normal for many enterprises. Yet, there are companies still to embrace the cloud, and there are companies who have lifted and shifted but aren't seeing the benefits of power or cost they expected. Here's my take on cloud migration.
Cloud computing is no longer a buzzword, but a reality for many businesses.According to a recent survey by Flexera, 99% of enterprises use at least one public or private cloud service, and 92% have a multicloud strategy. The benefits of cloud computing are clear: scalability, agility, cost-efficiency, innovation, and more.
But how do you migrate to the cloud and optimise your cloud strategy? What are the best practices and pitfalls to avoid? How do you choose the right cloud model, provider, platform, and tool for your needs? How do you manage your cloud costs, performance, security, and compliance?
Here are practical tips and tricks to help you plan, execute, and optimise your cloud migration and strategy.
Before you start moving your workloads to the cloud, you need to have a clear vision and plan for your cloud migration. Here are some steps to follow:
Once you have your plan ready, you can start executing your cloud migration. Here are some steps to follow:
Migrating to the cloud is not a one-time event, but an ongoing journey. You need to continuously monitor, manage, and improve your cloud strategy to ensure that you are getting the most out of your cloud investment. Here are some steps to follow:
Cloud computing is a powerful and transformative technology that can help you achieve your business goals and objectives. However, migrating to the cloud and optimising your cloud strategy can be challenging and complex. You need to have a clear plan, execute it carefully, and optimise it continuously. By following the steps and tips outlined here, you can make your cloud migration and strategy a success.
Image credit: "Day 287: Cloud Computing" by quinn.anya is licensed under CC BY-SA 2.0 .
Did you realise that Gartner also recommends that security teams prioritise NDR solutions to enhance their detection and response?
Picking the right NDR for your team and process can sometimes be the biggest challenge.
If you want to try out a Network Detection and Response tool, why not start with the best?
Vectra Network Detection and Response is the industry's most advanced AI-driven attack defence for identifying and stopping malicious tactics in your network without noise or the need for decryption.
Download the 2022 Gartner Market Guide for Network Detection and Response (NDR) for recommendations on how Network Detection and Response solutions can expand deeper into existing on-premises networks, and new cloud environments.
DOWNLOAD NOW!
Marketing budgets are now focused on Webinars combined with Lead Generation.
If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.
The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.
Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.
We look forward to discussing your campaign goals with you. Please click the button below.
MORE INFO HERE!
Go here to read the rest:
Cloud migration 101: how to plan, execute and optimise your cloud ... - iTWire
Scams are hard to picture that’s part of the problem – The Spinoff
A new photo series created by the governments cybersecurity agency wants to make people more wary of scamming. It got Shanti Mathias thinking about how limited we are in illustrating and imagining the systems that produce scams.
When the crime happens, theres no broken glass, no loud noises, no neighbourhoods cordoned off. Theres just flatness: a voice on the telephone, black letters on a screen, tapping keys, replying, trusting until it is suddenly clear that what you thought you were doing wasnt happening at all.
Its hard to write about scams, even though they happen all the time; even though thousands of people are targeted each month. New Zealand loses about $20m a year to scams, and thats just what gets reported. Its difficult to imagine the magnitude of the small losses, or the money that is able to be recovered, or the thousands of missed calls and dubious Facebook messages and other near misses that dissolve, back into the ether of ones and zeroes.
Difficult to imagine: yes. Difficult to image, too, and thats part of the problem. Ive written several stories about scams this year, and finding imagery that fits the tone of the stories is challenging. There are endless stock images of people, often older people, looking angry or confused at their laptop, surrounded by credit cards. Then there are the scammers themselves: lit up by rows of binary blue digits, always wearing hoodies, faces shadowed.
These images dont convey the banal malevolence of scams. Theyre not a threat because we are confused about technology, while scammers are experts in manipulating the internet. Scams are a threat because we have to engage with technology. Our society requires us to trust banks and authenticating text messages, trust RealMe, trust the websites we give our address and phone number and credit card details to when we shop. Pictures of people perplexed by the internet fail to illuminate the everywhere-ness of technology, part of all we do.
Cert NZ, the governments cyber security agency, clearly struggles with finding imagery that can help people care about scams, too. A few days ago, I trotted along to an event they were hosting at central Auckland creative venue The Tuesday Club. Scams like an art exhibit: big photos on the wall and little labels. A library of scams: romance and impersonation scams, social media traps and investment scams, job scams and unauthorised access scams. The photos were taken of real scam victims, through webcams on phones and computers. The images were then treated to look pixelated and blurred, uncomfortable. Its called EXPOSED.
The photos are a reminder of all the ways our devices see us: present as we do press ups in time with the woman on YouTube, call our friends, pick our nose, wonder when the work day will be over. And scams come from that place of inattention and ubiquity. My phone is my key to my bank account, my family group chat, my archive of good days with good friends and yet simultaneously, it is the same place where I am in danger from 15 texts telling me I need to pay for a toll road, from message requests accompanied by ersatz pictures of beautiful women.
Everyone is a target, every demographic if you have an email address, a cellphone, social media. One moment of distraction is enough, says Sam Leggett, Cert NZs senior threat analyst. The imagery is highlighting this idea that [being scammed] can happen at any time its a powerful way to understand how exposed your information might be.
Cert NZ has lots of advice for avoiding scams, but this threat happens in the privacy of our own devices what stock images would make it more visible? One that comes to mind is tables of lists of passwords, the backend of a phishing campaign people dont realise that websites all around the world have data breaches including information like email and passwords, Leggett says. Ah, theres the rub often, theres nothing you can do about being targeted by scams, because the information is gone already.
Another image idea, this one conceptual: Someone is knocking at your house, and theyre wearing a mask, so they look exactly like someone you know. The person in the mask asks for the keys to your house maybe theyre your landlord, you let them in to fix something. And then a hacker is inside, now they have your logins, they can access your stuff.
Thats figuratively exactly what happened to William Chen. He used to be an art director, managing photo shoots for magazines so he knows that while the image of himself used in Cert NZs exhibition, distracted and eating breakfast, isnt exactly flattering, thats not the point. Ive put others through it, so its my turn, he says. If a photo of him makes it less likely that other people will fall for a scam, hes willing to be public with it.
A few years ago, Chen was visiting family in Malaysia when he got a message from a Filipino friend, saying that he had been mugged in Manila and lost his passport and needed money urgently. It was an impersonation scam. All the tell-tale signs were there, Chen says ruefully. The scammer wouldnt answer detailed questions, for example, and wanted money paid through Western Union. Over a period of only a few hours, Chen received message after message with harrowing descriptions of his friends misery, and the urgency of help; he eventually went to the local Western Union to send money as instructed, then told his sister about the situation. She immediately told him hed been scammed.
I wasnt sharp enough, he says now. He feels guilty about it and still paranoid that messages he receives on social media might not be legitimate. Its good that [Cert NZ] is raising awareness, but I dont think the government can do much about scams it all boils down to personal responsibility.
Maybe Chen is right, but its not that big institutions are doing nothing about scams. Take the man in the news recently for losing $400,000 to an investment scam. He was repeatedly called by his bank, to warn him that it was a scam. The outgoing government announced a new anti-scam team a few weeks before the election; since the issue isnt highly politicised (or on the ambitious 100 day hit list), the new government hopefully will continue to support this initiative. Banks, especially, will keep putting safety measures in place; an obvious one is payee verification on transfers, so its clear when youre not paying who you think you are.
Pictures of scamming can show victims as human beings: distracted and vulnerable, their information ripe for the picking. The Cert NZ photo series goes some way towards making these images more compassionate, more diverse, less victim-blaming. Theres a deeply complex, psychological element to being scammed the urge to believe that something is true, that someone is trustworthy but in the imagery of scams and the focus on victims, we fail to imagine who is on the other side of the phone.
Taking photos of victims is obvious, if important. Its so much harder to picture the people carrying out the scams, and the systems that enable them. For instance, how do you photograph the thousands of forms with your address or birthday or phone number that you fill out every time you make a useful account on the internet? How do you visualise the profits of a company that didnt hire an extra data engineer and thereby releases your information and thousands of others to potential hackers and scammers via a data breach?
Theres a subgenre of YouTube videos devoted to unmasking scammers through elaborate pranks. This is a reminder that scamming is an enormous global industry, employing thousands of workers in places where the law doesnt want to look very hard for crimes that happen on the internet.
In some parts of the world, there are many more underemployed educated young people than there are well-paying jobs, which can make carrying out scams a viable, if not appealing, option. Thats a product of global inequality, but its difficult to draw a picture of. There arent compelling photos of the dreary office parks in the corners of global cities Abuja, Kolkata, Bandung, Hyderabad, So Paulo, Budapest, Karachi and the workers inside them, carrying out the dull labour of digital deceit.
I dont say this to suggest that the work of scamming is good work, that it is somehow part of global wealth redistribution. Theres no transparency to these payments; the money is unlikely to go to those who need it most, and the losses hurt people with the least financial stability. But trying to imagine what scamming people might look like from every angle is essential if we dont want these to keep happening. While artificial intelligence improves, theres every likelihood that the scams will just get more convincing.
Maybe some form of scamming will always exist, but much of the damage is preventable. The solutions involve individual wariness, as the CERT photos show. But responding to scamming also requires the government to treat it with the urgency it requires, social media companies to cooperate and private institutions to improve their processes. Maybe if all of that happens, scamming will be less profitable, and it wont be a job for people in countries whose governments are incentivised to look the other way. Maybe. Its hard to picture.
See more here:
Scams are hard to picture that's part of the problem - The Spinoff
Digital transformation modernizes businesses, ball in your court – Daily News
The past few years have seen accelerated rates of digital transformation across almost every industry and sector. Spurred by the COVID-19 pandemic, a broad swathe of industries across the globe saw a decades worth of transformation in a matter of months. That momentum has continued beyond the pandemic too. But if the benefits of digital transformation are to continue accruing, then carriers and operators must keep evolving.
But, what is digital transformation?
Digital transformation is the integration of digital technology into all areas of a business, fundamentally changing how you operate and deliver value to customers. Its also a cultural change that requires organizations to continually challenge the status quo, experiment, and get comfortable with failure.
They are, after all, enablers of so much of the infrastructure thats crucial to digital transformation. Aside from connectivity, things like cloud services and the Internet of Things (IoT) would be all but impossible without them. They also help ensure that organisations have better security and data protection, are able to scale flexibly, and can more easily collaborate with various technology providers, businesses, and startups to foster innovation.
..
Why does digital transformation matter?
A business may take on digital transformation for several reasons. But by far, the most likely reason is that they have to: Its a survival issue. Here, improving the customer experience is a top priority at most organizations. Digital transformation efforts rely on digital technology to convert customer insight into customer-centric products and services. This helps organizations to better engage customers and gain even more value for the business.
In a nutshell, digital transformation can help businesses save costs by reducing manual labor, streamlining processes and improving productivity. For example, by adopting cloud storage, businesses can save on hardware costs and reduce the need for physical storage.
Put in another way, it enables businesses to modernize legacy processes, accelerate efficient workflows, strengthen security, and increase profitability.
It changes the way an organization operates. Systems, processes, workflow, and culture are all part of this process. This transformation affects each level of an organization and brings together data across areas to work together more effectively.
By taking advantage of workflow automation and advanced processing, such as artificial intelligence (AI) and machine learning (ML), companies can connect the dots on the customer journey in a way that wasnt possible before.
For many companies, the driver for digital transformation is cost-related. Moving data to a public, private, or hybrid cloud environment lowers operational costs. It frees up hardware and software costs while freeing up team members to work on other projects.
As Liu Kang, president of Huawei Global Carrier Marketing & Solution Sales Dept recently explained at MWC Shanghai, In the telecommunication industry, operators have always been the leaders and enablers of digital transformation.
Operators have not only continuously optimised and accumulated their own innovation capabilities during digital transformation, he added, but also enabled digital upgrade in thousands of industries, which has accumulated huge innovation potential.
He backed this up by illustrating how carriers and operators have historically embraced technological shifts and evolved accordingly.
Among consumers, for example, operators have changed from providing simple voice services to providing ubiquitous gigabit and implementing intelligent interaction. For industry, meanwhile, the shift to digital production from office digitalisation to marketing and customer service digitalisation is inseparable from the overflow of capabilities accumulated during carriers digital transformation.
Looking forward, Liu added, it will be important for carriers to build three new capabilities of digital transformation.
The first is the infrastructure layer, which transforms ICT collaboration into the ability to elastic integrate strategic resources.
One of the most intuitive manifestations is that connections are moving from 100 Mbit/s uplink, Gbit/s downlink, and cloud native capabilities to new connections with typical characteristics such as Gbit/s uplink, 10 Gbit/s downlink, and endogenous intelligence, Liu said. On this basis, the combination of network + computing, the requirements of cloud-network synergy, cloud-edge collaboration, and cloud-device synergy are emerging.
The second is the operation layer, which converts massive data into the ability to cope with complex scenarios in an agile manner. From data aggregation, to data aggregation + intelligent support further accelerates data transfer in peoples production and life activities, enables smart operations throughout the entire process and business, and directly doubles experience and efficiency. And the continuous innovation of the model.
The third is the digital service layer, which transforms advantageous services into the ability to quickly stimulate innovation. With digital transformation, operators can fully exploit the advantages of SIM, which is a natural entry point, and provide more innovative digital services.
In order to support this evolution, Huawei has introduced several new product lines aimed at helping carriers transform from Internet service providers to managed service providers and seize new opportunities in digital transformation, thereby driving new growth.
At MWC Shanghai, Steven Zhao, Vice President of Huaweis Data Communication Product Line, stated that Huawei launched its digital managed network solution and products in February 2023, which received positive feedback from carriers around the world. Many of them carried out digitally managed network services (such as Managed LAN, Managed WAN, Managed Security, and Managed DCN) on top of traditional IP private lines and upgraded their transport networks to improve IP private line quality assurance and automation capabilities. This not only enables the rapid growth of these carriers B2B services but also significantly improves enterprise customer experience at lower service costs.
Zhao added that carriers can expand the B2B market by upselling managed services (such as Managed LAN and Managed Security) to existing private line customers, and this will allow carriers to quickly transform from ISPs to MSPs. Huaweis digital managed network solution enables carriers to achieve rapid revenue growth in the B2B market by providing innovative digital transformation solutions for SMEs, accelerating the digital transformation of numerous industries, and promoting social and economic development.
During MWC Shanghai Huawei also launched several products and solutions aimed at building trustworthy data infrastructure that will help carriers better grow and cope with changing industry trends.
Huaweis IT Product Line President Peter Zhou noted that these products and solutions are designed to help overcome the many technical challenges facing carriers currently, including a lack of strong multi-cloud ecosystems, the recent explosion of generative AI apps, and the weak resilience of data. As such, he said, Huawei is focused on helping carriers through these issues by ensuring that theyre equipped to deal with new types of apps, new forms of data, and to build new forms of resilience.
New Apps: Accelerating valuable data acquisition through data paradigms
Carrier-built data centres are currently turning to multi-cloud deployment models. Similarly, enterprises are operating an increasing number of cloud-native apps in their data centres. These changes are increasing the performance and reliability requirements set for industrial container storage. Zhou explained that Huaweis solutions are well-positioned to help carriers adapt to these changes. For example, more than 40 carriers have chosen Huaweis container storage solution.
Generative AI is also being introduced to many parts of carriers businesses, including network operations, customer service, and B2B large language model (LLM) training. This is changing the data paradigm and storage architecture. Faced with the exponential increase of LLM parameters and data, time-consuming data preprocessing, and unstable training process, the Huawei AI storage solution uses cutting-edge technologies like efficient backup and recovery of checkpoints, channel-associated data processing, and vectorized indexing to accelerate data preprocessing, powering the LLM training that houses trillions of parameters.
New Data: Resolving problems from data gravity with intelligent data fabric
In addition to having to handle new types of apps, data centres are also facing new challenges thanks to surges in data volume. In the past, cloud data centres mainly used an integrated server architecture that couples apps with local disks. Now, this method is resulting in wasted resources, poor performance, and low reliability. It also limits carriers ability to expand flexibly.
The explosive increase in data has also resulted in severe increases in data gravity, which makes data more difficult to access or move from distant systems or locations. Zhou explained that Huawei is tackling this issue by using an intelligent data fabric that provides unified global data views and scheduling functions across multiple systems, regions, and clouds.
New Resilience: Building intrinsic storage resilience capabilities
The final area Zhou said Huawei was trying to tackle was storage resilience. While traditional data security systems focused on preventing disruption from physical threats, like natural disasters, they are struggling to deal with the increase in human threats that are plaguing the digital world, like ransomware and malicious attacks. To tackle this issue, Huawei created the ransomware protection storage solution which ensures multi-layer protection and intrinsic storage resilience, building the last line of defense for data security. Up to now, more than 50 strategic customers have chosen the solution of Huawei.
All of these solutions have applications in East African countries, such as Tanzania and Kenya. While the latter in particular has long been a leader in the African technology space and last year was ranked the second-most digitally mature country on the continent after South Africa.
Its carriers and operators are also relatively mature and therefore well-placed to adapt and evolve to the latest digital transformation requirements of the business sector. Doing so will also be critical when it comes to ensuring growth both among their customers and the broader economy.
As Liu said in anticipation of the future: A new wave of intelligent digital era is coming and Huawei will continue to work with the industry to continuously promote digital transformation and accelerate the transformation of innovation potential into industry development momentum.
Link:
Digital transformation modernizes businesses, ball in your court - Daily News
Use Fundamental Analysis in Crypto Investing: The "Get Rich Slowly" Approach – Decrypt
Earn a free on-chain NFT by taking our free course,Crypto Investing: Fundamentals First. Decrypt will cover gas fees for the first 10,000 mints!
Fundamental analysis eschews the analysis of price charts (technical analysis) by looking at a broad set of indicators as well as some well reasoned but somewhat subjective judgements of industry analysts. Before introducing how fundamental analysis relates to crypto investing, lets look at how fundamental analysis is used in traditional investing spaces.
For stock market investors, fundamental analysts look for stocks that are trading below their fair market value, which means stocks that are trading for less than analysts perceive the company to be worth; this means that the current market cap (the number of stocks multiplied by the current price) is less than the analysts believe it is worth.
For example, lets say a company has 5 million shares that are trading for $20 each. This equates to a market cap of $100 million. If analysts believe the company should actually be fairly valued at $140 million, this would equate to a stock price of $28 per share and would be a buying opportunity. Or, if they determined that the fair market value was $80 million dollars, this would equate to a share price of $16. This could also be taken advantage of by shorting the stock or selling it if you already have it in your portfolio (in the belief the price will drop). Investing based on fundamental analysis assumes the market eventually realizes that a stock is not valued correctly and adjusts the price accordingly.
Fundamental analysis predicts price movements over a longer time frame, while technical analysis tends to favor short-term price movement predictions.
If fundamental analysts determine that the current stock price seems to accurately reflect the companys value (in this case they believe it is valued around $100 million), there is no actionable investing play. In this case, they would likely move on in order to see if there is an opportunity to profit off a different company that is overvalued or undervalued.
In general, fundamental analysis predicts price movements over a longer time frame (sometimes years), while technical analysis tends to favor short-term price movement predictions. When it comes to stock investing, metrics to consider include: the outlook of the industry (where the stock is), the state of the economy in general (bullish or bearish), the performance of the stock in question (earnings per share, profitability, and so on), and the quarterly and annual reports given by the company in question.
The use of hard numbers and metrics is called quantitative fundamental analysis. Using these standardized measurements is a core part of fundamental analysis, but there is another side to these longer term price predictions that utilizes what is known as qualitative fundamental analysis.
More subjective and less tangible in some respects, qualitative fundamental analysis measures the quality of a company by looking at its name recognition, leadership team, organizational structure, and other market differentiators such as more advanced or patented technology or products. While quantitative analysis is more of a science, qualitative analysis is more of an art. In general, it is often suggested to combine both types of fundamental analysis to get a clearer investing picture.
Fundamental analysts in the crypto sector use similar methods, but must rely on different data sets and qualitative measures. With no quarterly reports and blurred industry designations, these crypto analysts must look at other indicators. When it comes to quantitative analysis, looking at the tokenomics (covered in our previous article) is a good place to start. From there, you may want to delve into qualitative analysis by looking at the core team, early investors, the whitepaper, previous project accomplishments, and the trajectory of the upcoming roadmap and their chances of success.
Opinions can certainly be mixed when analyzing some of these characteristics. Lets take the leader or team of a project. Some analysts value a public and open team of well known individuals with past success. On the other hand, other analysts may value a leaderless project that may have a pseudonymous or anonymous team or no leader at all.
For example, Bitcoin doesnt have a headquarters, board of directors, or even a known founder. While Satoshi Nakamoto created Bitcoin, no one knows who this person or group is. For analysts that may be concerned about the legal or regulatory risks that come with a crypto company or team, this could actually be considered a positive not a negative. In keeping with this, other analysts may prefer the governance of a decentralized autonomous organization (DAO) over the centralized decision-making of a small team.
In much the same way that you wouldnt compare CocaCola with Ford or McDonalds with SpaceX (but you would compare Ford with Tesla), you need to separate crypto projects by their intended use cases and their relevant sectors. Use cases for the blockchain include: cryptocurrency, oracles, decentralized finance (DeFi), gaming, AI, decentralized storage, real-world asset (RWA) tokenization, and much more.
Once categories are established, you need to try to answer the following questions
Of course, the questions are the easy part of the test. The answers are what require some work; they get graded as time goes on and ones predictions are validated or proven wrong. When it comes to crypto, many of these sectors are expected to gain market share from centralized alternatives. Lets look at cloud storage as an example.
The cloud storage market was valued around $90 billion in 2022 and is expected to surpass $300 billion by 2028. The crypto sectors decentralized storage market is currently valued at around $4.75 billion. If you believe that decentralized cloud storage options will gain market share from centralized cloud storage alternatives in this burgeoning industry, you may want to crunch some numbers to see if investing in this sector makes sense.
Popular options for decentralized cloud storage include Filecoin, Arweave, and Storj. If you believe they are undervalued, you may want to select ones that you believe have the most promise, are undervalued relative to their competitors, or have higher market penetration. To reduce your risk, you may simply want to diversify your exposure into a number of these projects.
Likewise, many make price predictions for BTC using these questions:
Many of the longer term BTC price predictions utilize fundamental analysis to calculate a variety of prices ($100,000, $250,000, or $1,000,000/BTC) at a variety of future dates. These numbers are generally not picked out of thin air; they are backed up by fundamental analysis. Of course, the difference in how you answer some of these key questions about BTC accounts for the large price disparities in these predictions.
Oftentimes, this analysis must accurately weigh BTCs fundamental or intrinsic value. For BTC proponents, some view this technology as revolutionary and almost priceless. For crypto skeptics (Peter Schiff, Warren Buffet), many see BTC and other cryptocurrencies as being worthless and posit that they have no inherent or intrinsic value. Many fall between these two extreme viewpoints in some sort of fundamentally analysis-derived middle ground.
Knowing the core concepts about fundamental analysis can help you make more informed investing decisions. This may allow you to understand the rationale of price predictions given by experts or to even make your own rough estimations on future price movements. Ultimately, the decision is up to you on how to assess the value of this burgeoning and dynamic space. While many have predicted the fall of Bitcoin, Ethereum, and the crypto ecosystem writ large, it is still continuing to be a major economic powerhouse with a combined market cap in excess of $1 trillion (down from a high of nearly $3 trillion in 2021).
As the crypto market is still nascent and very volatile, you may want to strongly consider reading and listening to the fundamental analysis of crypto experts and analysts. While it is often quite difficult to predict the crypto prices in shorter time horizons (days, weeks, and even months), using fundamental analysis can help you predict the future price of these assets in 510 years provided the analysis is done correctly and the critical assumptions become reality.
Disclaimer: This investing series is strictly for informational and entertainment purposes. It should not be construed as financial or investment advice. Do not invest based on price prediction tools or forecasts laid out in this series. Please consult an investing professional or financial planner if you feel you need investment guidance.
Continued here:
Use Fundamental Analysis in Crypto Investing: The "Get Rich Slowly" Approach - Decrypt
I wish I’d had the Nextbase iQ Smart Dash Cam when my car got … – TechRadar
Our car got written off quite recently and, while there were thankfully no injuries, the incident was very stressful. Someone rear-ended us at around 30-40mph while our car was stopped at traffic lights. It tore the rear drivers side wheel off our car and did the same thing to the front wheel of the car being driven by the person who hit us.
Weve got no idea what they were doing because we didnt have a rear-facing dash cam fitted. In retrospect, I really wish we'd made the time to fit one. We did, however, have a front-facing model in the car and it captured the whole thing including being pushed right across the two-lane urban carriageway until the car was almost touching the kerb.
It all happened so fast and, once you've got over the initial shock it's still easy to forget capturing obvious things, like taking pictures or recording what is said. That's why having a dash cam makes an awful lot of sense. Even more so if you've got the new Nextbase iQ model, because it's a new breed of 'smart' dash cam that does all of the work for you, compiling all of that invaluable data and pushing it to the cloud for safe keeping.
Luckily, after the crash, we had the good sense to remove the media card from our older dash cam, which contained the footage of the accident. But what if we'd been hospitalized and couldn't retrieve it? Even getting to our car after it had been towed to a pound in order to remove personal effects turned out to be problematical. So it's scarily easy to be parted from your evidence, and that is definitely not a good thing.
I therefore think it's a great idea to have a cloud-based dash cam that can be worked remotely using an app. It offers much more reassurance. Were still waiting the outcome of the insurance findings, but you would hope with the footage we submitted supplemented by the shocked audio captured in our car, would prove conclusive.
Since then, Ive taken owning a dash cam a lot more seriously than I used to. Talking to a group of motoring journalists recently, there seemed to be mixed feelings about owning one. As they quite rightly pointed out, a dash cam might be great at catching events that affect you but arent your fault. Equally though, they can incriminate you, the driver too if youre in the wrong. A fair point, I guess.
Thats where the new Nextbase iQ Smart Dash Cam might make people who arent convinced about these things even more nervous. The latest model from the British company does it all, from scanning the road ahead and capturing events through to offering up a view of the cabin of your car and its occupants too. Spend a little more and you can also add on the rear-facing camera and connect everything up, so youve got a one-stop safety and security solution.
Being this well covered when it comes to being in your car along with when youre not thanks to remote vehicle monitoring by the iQ seems like a great idea on the whole.
Getting setup and ready to go is straightforward enough, too. Nextbase has launched the iQ app and thats available as of now. All you need to do is download it and work your way through the steps. After launching it you simply work through the various screens before pressing continue. Initially it advises not to fix the iQ dash cam to your screen for simplifying the setup procedure.
Youll need to find your ODB port in the car too, which will be slightly different if youre used to plugging a dash cam into the 12-volt power supply in your car. The ODB port is generally found under the dash, usually on the drivers side of the car but if youre stuck Nextbase advises checking your owners manual.
Once located, you plug the connector from the dash cam into this port, which only goes in one way. This gives your dash cam its power and the design of the unit means this is effectively an always on solution, hence the constant remote monitoring it offers.
If youre not keen on doing this, Nextbase also includes a hardwiring kit inside the box allowing you or a trained professional, the option of creating a more permanent connection. This route is perhaps less ideal if you have more than one vehicle and plan to transfer the iQ from one car to the other.
In order to gain access to remote Live View, you need to have one of the Nextbase subscription packages - you get two months free if paying annually. This is worth doing if you want to benefit from the extra features including event notifications, Smart Sense Parking Security and Witness mode. Theres the convenience of cloud storage and also the ability to carry out remote downloads.
The app itself is nicely laid out, with Live View, History and More tabs along the bottom that let you access core features. Up at the top there are Events, Library and Downloads tabs that are self-explanatory. One of the most appealing aspects of the Nextbase iQ is that it seems future-proof too, thanks to over-the-air-updates that will help keep it relevant over time.
Nextbase says that it will be offering at least three new features towards the end of the year. First up is Guardian Mode, which notifies you when a family member or friend is using your vehicle, or if its travelled beyond agreed boundaries when left with a mechanic. Youll even be able to add restrictions to things like speed and heavy braking.
Voice Control is the next feature that looks interesting in that youll be able to place calls, control smart home devices and get directions, all directly via the Nextbase iQ. Topping it all off is another key feature in the shape of Roadwatch AI, which tracks the speed and trajectory of other vehicles around you. There's not much else out there currently that comes close to the Nextbase iQ in terms of specification muscle.
While completing my Nextbase iQ review I found that setting the camera up and using the app, along with its extensive list of features was generally very straightforward. Video and audio quality is excellent, as you'd expect from this brand, and the way you can view clips, share them and generally get help when you need it is all very impressive. One of the best aspects, at least in my own personal experience, is that a lot of the help and assistance is done by the camera and app automatically.
Based on our experience having the aforementioned accident, you're not always thinking clearly after a crash. So to have the benefit of a smart camera doing its thing in the background is well worth the outlay. It's one less thing to worry about and, if you're unlucky enough to have an accident or car-related incident, that provides a great deal of reassurance, even if that service comes with a subscription cost.
Read more here:
I wish I'd had the Nextbase iQ Smart Dash Cam when my car got ... - TechRadar