Category Archives: Cloud Storage
Eufy is introducing cross-camera people tracking on its new security … – The Verge
Ankers smart home brand Eufy is revamping its camera lineup with a new SoloCam battery-powered outdoor camera ($199.99), Floodlight Cam E340($219.99), Video Doorbell E340 ($179.99), and Indoor Cam S350.
The signature hardware feature of the new line is its dual lenses with one camera thats wide angle and one telephoto for zooming in to better identify faces and license plates. But theres also a new standout ability: cross-camera tracking and video splicing.
Multiple cameras tracked this Amazon delivery worker from the vehicle to the gate, and Eufy outputs a spliced video for you to watch. Source: Eufy, GIF by Umar Shakir / The Verge
This technology is taken from the banking and traffic industry, Eufy spokesperson Brett White told The Verge in a briefing.
Each camera can pick up motion and follow it so you now get one spliced video showing every event across each camera. The new tracking feature works with Eufys HomeBase 3, a hub for its cameras. The HomeBase uses on-device AI to identify a person on each camera connected to it, splice all the videos together, and then send just one notification and one video.
The Eufy HomeBase 3 ($149.99) also adds AI-powered smart alerts to the cameras for free, including facial recognition and person, pet, and vehicle detection. The HomeBase 3 now also comes with a 1TB hard drive. Locally stored recordings are accessible for free with no subscription, and paid cloud storage is also available.
On-device AI and locally stored recordings are features that should appeal to privacy-conscious consumers, not just those looking to dodge cloud fees but note that Ankers Eufy brand was the one we caught in a privacy scandal.
The new cross-camera tracking feature will be part of a free beta trial at launch, and White says a final version of the feature will be released in the fourth quarter of 2023. Pricing for the feature will arrive later this year but it looks like it will be part of a subscription.
Older cameras that work with the Eufy HomeBase 3 will also add this cross-tracking capability, so you dont have to buy new cameras to get the feature. White says that almost every Eufy camera device, except for some wired cameras and wall light cams, now has full compatibility with HomeBase 3.
Heres a look at the new cameras:
Eufy SoloCam S340 $199.99
The SoloCam S340 can indefinitely power itself from the sun. Image: Eufy
A dual-lens battery-powered outdoor camera with a built-in solar panel, the S340 features a 3K resolution wide-angle lens and a 2K telephoto lens with an 8x hybrid zoom. It also has on-device AI, and the ability to track and zoom on a subject with a 360-degree pan and 70-degree tilt. Color night vision, two-way audio, and a 100-lumen spotlight plus four months of battery life and 8GB onboard storage round out the specs. It is compatible with the HomeBase 3.
Eufy Floodlight Cam E340 $219.99
Eufys Floodlight Cam can also pan and tilt its cameras. Image: Eufy
The first Eufy camera with the ability to record 24/7, the new floodlight camera comes with an onboard micro-SD slot for local storage up to 128GB. A wired camera with two light panels for up to 2,000 lumens of light, its designed to be mounted vertically on a wall. It has 360-degree coverage and can track a person in its field of view. It works with dual-band Wi-Fi 6, has two-way audio, a built-in alarm, lighting schedules, and adjustable brightness.
Eufy Indoor Cam S350 $129.99
Eufys Indoor Cam S350 looks like a baby robot, and can pan and tilt to follow family members throughout the home. Image: Eufy
The new indoor camera has 4K UHD resolution, 8x zoom, and 350-degree pan and tilt. It can be set to patrol points of interest, and AI tracking can keep a subject in view. It also features a privacy shutter and is powered by a USB cable.
Eufy Video Doorbell E340 $179.99
The Video Doorbell E340 looks at the ground so you can see packages / block surprise uppercuts. Image: Eufy
The successor to the Eufy Dual Video Doorbell, the E340 features two cameras a 2K camera with color night vision up top for person detection and a second 1080p camera below for package detection. The doorbell can be installed with wired power or can operate on battery, and as the other cameras announced, it handles up to 60 days of event-based recordings locally (8GB storage built-in), accessible without a subscription.
All four cameras are available starting today on Amazon and Eufys website.
Eufy cameras work with Amazon Alexa and Google Home, but only the Eufy Cam 2 line is compatible with Apple Home. White says the company has been in discussions regarding Matter compatibility, for whenever the new smart home standard supports cameras. Its a possibility, something were looking at, but theres nothing confirmed, he says.
Continue reading here:
Eufy is introducing cross-camera people tracking on its new security ... - The Verge
Supermicro Introduces New All-in-One Open RAN System … – PR Newswire
Expanded Edge Server Portfolio Delivers Improved Performance and Power Efficiency for Open RAN and Intelligent Edge Workloads
SAN JOSE, Calif. and LAS VEGAS, Sept. 25, 2023 /PRNewswire/ -- Supermicro, Inc. (NASDAQ: SMCI), a Total IT Solution Manufacturer for AI, Cloud, Storage, and 5G/Edge, announces the expansion of its portfolio of purpose-built servers for Edge AI and Telco workloads. The new Supermicro X13 Edge server, the SYS-211E-FRN13P, delivers a scalable, integrated Distributed Unit (DU) Commercial Off The Shelf (COTS) server. As virtualized Open RAN technology has matured to the point where it's become proven, companies are looking for solutions that enable them to optimize deployments and reduce costs. This solution means shifting the emphasis to attributes such as cost, power consumption, size and weight, and scalability.
"We are very excited to deliver all-in-one servers for the next generation of telco and edge deployments for vRAN and private 5G environments," said Charles Liang, president and CEO of Supermicro. "Our range of telco offerings allows for a more streamlined deployment at scale, which will expand the use of these new technologies to deliver more effective and reliable communication networks at scale."
Explore Supermicro's Edge Servers
Supermicro's latest edge platform is specifically designed to meet those requirements. Based on 4th Gen Intel Xeon Scalable processors with Intel vRAN Boost, it features fully integrated vRAN acceleration that eliminates the need for an external acceleration card, thereby substantially reducing system power requirements and complexity. The system also features an onboard network interface and 12 SFP25G ports, eliminating the need for add-on cards and breakout cables, fully integrated timing support with eight hours of holding time, and a compact, long-life design. The Supermicro SYS-211E systems deliver a fully integrated server optimized for cost, size, and power usage, handling large volumes of traffic at the edge across multiple cell site configurations, including massive MIMO streams.
Learn more about Supermicro's new X13 Edge Server
Learn more about Supermicro 5G Products and Solutions
Additionally, Supermicro is launching a 4-node version of the SuperEdge, a versatile edge server designed to handle a range of demanding workloads at remote network locations. Each of the four nodes in this 2U rackmount server features a single-socket 4th Gen Intel Xeon Scalable processor and runs independently of the other nodes. This enables the system to run multiple workloads in parallel, each with dedicated resources. The Supermicro SYS-211TP offers 2 PCIe 5.0 x16 FHHL slots per node, allowing each individual node to be optimized with add-on cards to match its designated workloads, including running as a DU or Centralized Unit (CU) in RAN networks, MEC, and enterprise edge workloads.
"Supermicro continues to deliver the latest technology to market in their solutions for virtualized RAN and intelligent workloads across the edge," said Cristina Rodriguez, vice president and general manager, Wireless Access Network Division at Intel. "By using our broad portfolio of technology, including the newest 4th Gen Intel Xeon Scalable processors and Data Center GPUs, Supermicro can offer innovative server designs that provide the industry with powerful, highly optimized platforms for a range of use cases at the edge."
Supermicro is bringing new compact edge systems to remote deployments outside the data center, using the latest generation of Intel processors. Among these are the SYS-521AD-TN2 mini-tower, the E102-13R, and the E302-12A systems. The SYS-521AD and E102-13R are both based on 13th Gen Intel Core processors. The SYS-521AD mini-tower is optimized for video processing, streaming, and storage and can be used as an edge server for small and medium businesses. The E102 packs up to 16 cores, 64GB memory, and a range of ports and expansion slots in a mini 1U embedded form factor, ideal for AI inferencing, retail, and signage workloads. The E302, featuring the latest Intel Atom C5000 processor in a fanless compact design, delivers cost-efficient performance to remote locations in a durable, low-noise form factor.
A common feature of Supermicro's new systems for edge workloads is the emphasis on support for GPU accelerators and AI inferencing. An increasing number of these systems are compatible with accelerators, including the NVIDIA A100, L40, L40S, L4, A2, and T1000, the Intel Data Center GPU Flex 140 and the Intel Data Center GPU Flex 170, and even specialized accelerators such as the Hailo-8 AI processor. This flexibility enables customers to use application optimized Supermicro systems at the intelligent edge to match the specific requirements of their workloads, leading to better results and minimizing latency.
Visit Supermicro's booth #814 at MWC Las Vegas, September 26-28, to explore many of its new systems and experience their performance in real-world applications at the intelligent edge.
About Super Micro Computer, Inc.
Supermicro (NASDAQ: SMCI) is a global leader in Application-Optimized Total IT Solutions. Founded and operating in San Jose, California, Supermicro is committed to delivering first to market innovation for Enterprise, Cloud, AI, and 5G Telco/Edge IT Infrastructure. We are transforming into a Total IT Solutions provider with server, AI, storage, IoT, and switch systems, software, and services while delivering advanced high-volume motherboard, power, and chassis products. The products are designed and manufactured in-house (in the US, Taiwan, and the Netherlands), leveraging global operations for scale and efficiency and optimized to improve TCO and reduce environmental impact (Green Computing). The award-winning portfolio of Server Building Block Solutions allows customers to optimize for their exact workload and application by selecting from a broad family of systems built from our flexible and reusable building blocks that support a comprehensive set of form factors, processors, memory, GPUs, storage, networking, power, and cooling solutions (air-conditioned, free air cooling or liquid cooling).
Supermicro, Server Building Block Solutions, and We Keep IT Green are trademarks and/or registered trademarks of Super Micro Computer, Inc.
Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries.
All other brands, names, and trademarks are the property of their respective owners.
Photo -https://mma.prnewswire.com/media/2219244/Picture1.jpg
Logo - https://mma.prnewswire.com/media/1443241/4291994/Supermicro_Logo.jpg
SOURCE Super Micro Computer, Inc.
Go here to read the rest:
Supermicro Introduces New All-in-One Open RAN System ... - PR Newswire
Add Windows 11 features to Windows 10 with these helpful tools – PCWorld
Microsoft releases a new version of its two operating systems Windows 10 and 11 every autumn. However, the software company has only delivered new features for Windows 11, limiting Windows 10 to basic upgrades alone.
Windows 10 also received an update a short time later, but you wont find any real innovations. Its limited to improvements that affect the quality, productivity, and security of Windows 10, per Microsoft.
Thats disappointing for Windows 10 users but youre not fully left behind. Heres how you can implement the new Windows 11 features into Windows 10 as well.
After years of stagnation, the Windows File Explorer is increasingly the focus of Microsoft developers. A feature that has been planned for years has made it into Windows Explorer with Windows 11 22H2: displaying multiple folders in different tabs. A new tab can be opened with the key combination Ctrl+T or the + button.
This is practical if you want to switch quickly between folders, for example to copy files. With the impending Windows 11 2023 Update, Microsoft will allow Windows Explorer to unpack Rar and 7-Zip files as well as the tar.gz and tar.bz2 archives commonly used under Linux. So far as with Windows 10 only Zip archives are supported, but unpacking should be faster in the future.
Windows Explorer replica: The Files app hardly differs visually from Windows Explorer. The tool also offers tabs for Windows 10 and additionally a two-panel view.
IDG
For those who are used to Windows Explorer, the Files app is probably the best alternative at the moment. When installed via the Microsoft Store in Windows 10, Files costs $8.99, which you use to support the project. You can find a free download on Github. Files can also be installed free of charge via the Microsoft Store for Windows 11.
Files looks almost like Windows Explorer and can be operated in the same way. However, there are considerably more options. In the context menu of the tabs, for example, you will find Duplicate Tab and Open Tab in New Window. A new tab can be created with Ctrl+T or the + button. If you prefer to work with a split view, you can go to New panel in the three-point menu on the far right of the toolbar. This allows two folders to be displayed side by side.
Configure files: Useful options can be activated in the settings, which can be reached via the cogwheel symbol at the top right. Under General > Start settings you can select Continue where you left off. Files then remembers the open folders and restores the view at the next start. In the Appearance section you can activate the Dark mode and also set other colors for the window.
Dealing with archive files: Via the context menu item Compress, files or folders can be packed into archives in the Zip and 7-Zip formats. Compress > Create archive leads to a dialogue in which you can specify the name and format as well as a password for the encryption. There are also settings for the compression level, and large 7-Zip archives can be saved in smaller individual files (split size). Zip, 7-Zip, and Rar archives can be opened by double-clicking, the contents viewed or files extracted.
The Files App
Microsoft
Other features: For the organization of files and folders, you can assign a tag such as Home or Work via the context menu item Edit tags, which Files displays in the Tags column. In the settings, activate the tags option under General > Widgets. The start page then shows Tags in addition to Quick Access and Drives, and the folders and files can be opened with a mouse click.
It is also possible to search for items with tags if you prefix the search term in the field at the top right with tag:. In the settings under Tags you can change the designations and add new tags.
The disadvantages of Files: In our tests, the tool mostly worked reliably, but occasionally it crashed. Compared to Windows Explorer, Files often opens folders and drives containing numerous items with a slight delay.
Two new Explorer functions of Windows 11 also in version 10: on top the practical tabs, below that the used capacity of OneDrive and other cloud storage.
IDG
It took a long time for Microsoft to add tabs to Windows Explorer. The practical feature, which you know from web browsers, enables the file manager to switch quickly between different folders and to copy or move data conveniently.
With Clover and QT Tab Bar, you have two tools that also equip Explorer with tabs under Windows 10. If you decide to use QT Tab Bar, install the tool, restart the PC, and open Windows Explorer. Now click on the down arrow in the View tab on the right under the Options symbol and activate the Qttabbar list entry. The new tab bar now appears in Windows Explorer.
The tabs are more closely aligned with the new Explorer design of Windows 11 with Clover. With this tool, however, you have to make an effort because the setup wizard shows Chinese characters. This is not a problem, however, because you only need to click the central button at the beginning and end of the installation. After that, the Windows 10 Explorer has tabs.
Microsoft has been planning a function that allows you to group several windows for several years. So far, however, nothing has been seen of this idea in Windows. Groupy offers more or less the functions that Microsoft may be planning for the future, and then some. You can try out the program free of charge for 30 days. A license for five PCs costs $9.99.
The first time you start Groupy, click on Start 30-day trial; then you have to enter your email address. In the confirmation email, click on the activation link.
Groupy adds a second tab bar above the title bar of the windows. In Windows Explorer the bar is always visible, in other windows it is only visible when you move the mouse to the area above the title bar. In Windows Explorer, a click on the + button opens the currently displayed folder again in a new tab. You can now navigate to different folders in both tabs. If you drag a file with the mouse from the Windows Explorer window to the other tab, the tab is activated and the file can be moved to the folder. To copy the file, press the Ctrl key.
Tabs with Groupy: The tool builds a bar with tabs above the title bar. These can display not only folders, but almost any application.
Groupy
Proceed in the same way for any other program: Open Windows Explorer and, for example, the Windows editor Notepad. Click on the Notepad window in the Groupy bar with the mouse and, while holding down the left mouse button, drag it to the upper area of the Windows Explorer window until Insert into group here appears. As soon as you release the mouse button, a new tab appears. Repeat this with all windows that you want to dock as tabs. You can undock a tab by simply dragging it away from the window and onto the desktop.
Alternatively, use the small button with the down arrow in the Groupy bar. In the menu you will see a list of open windows. Select the window for which you want to create a tab. Use All unordered windows on this monitor to create tabs for all windows.
You want to continue where you left off? In the context menu of a Groupy tab, select Group > Save group as, give it a meaningful name and click on Save. To load the group again later, go to Group > Saved Groups in the context menu and select the desired one.
In addition, the Explorer in Windows 11 now shows the data fill level of OneDrive. This useful feature can also be retrofitted and extended to other cloud storage right away.
This is how it works: Install Raidrive including the Runtime and Visual C++ modules that may be additionally required. After starting the program, click on + Add at the top, activate the entry OneDrive in the Personal tab and select a free drive letter for Drive. Clicking on Connect takes you to the OneDrive login, where you log in with your Microsoft account and allow Raidrive access to your cloud. To see the used storage space in Windows, click on View > Tiles or View > Contents in Explorer. In the same way, you can integrate Dropbox, Google Drive, et al into Explorer via Raidrive.
The Windowgrid tool makes it possible to arrange open program windows on the computer monitor as desired via the desktop grid that appears.
IDG
With Windows 11 version 22H2, Microsoft has expanded the Snap Layouts for quickly arranging program windows on the screen with the new Snap Bar. Instead of clicking precisely on a function icon, one simply drags an open window to the top of the desktop and selects the desired predefined placement.
Windowgrid also makes it possible to arrange windows under Windows 10. To do this, click the left mouse button at the top of the window, move it minimally, and now also press the right mouse button. This places a grid over the desktop. As soon as you release the right mouse button, you can place the window in the grid as desired by dragging it with the left button. Sounds complicated, but trial and error makes it immediately clear.
Another alternative is the Microsoft PowerToys (in the Microsoft Store) with the FancyZones feature. Because FancyZones offers many possibilities for placing and docking windows, the tool requires some training. Fortunately, weve got a FancyZones primer to help you wrap your head around it.
Also not limited to Windows 11 is the new video editor app Clipchamp, which is available under Windows 10 in the Microsoft Store. If the Store and Store apps are up to date, Windows 10 automatically offers the new app when the previous Video Editor app is called up.
Microsoft highlights the new efficiency mode in the task manager of Windows 11 version 22H2. This is not a unique feature, however, because it is already included in Insider builds of Windows 10 as Eco Mode.
It has not yet made it into the regular autumn update, but even without it you can prioritize processes without terminating them completely. To do this, right-click on a process entry in the Details tab of the task manager and continue with Set priority: In the test, the Low option reduced the CPU load of a demo application from almost 100 to 65 percent.
Sandboxie offers a safe environment to try out unknown software without risk. Virtual systems with Virtual Box or Vmware Player require more effort
Foundry
Microsoft has already introduced the sandbox for safely trying out software and system settings in 2019, i.e. in Windows 10 Pro and Enterprise. It has remained limited to the two professional versions, but since the autumn update, the virtual system no longer loses all changes when rebooting as it did before but only under Windows 11. Sandboxie Plus does the same and runs under Windows 10 including Home Edition.
This is how it works: After installing and starting Sandboxie, right-click on Sandbox DefaultBox > Start in Sandbox > Start Program > Search on the control surface. In the Programs or Programs (x86) folder, select the executable file of the software that is to start in the sandbox. In the next step, activate the option Start as UAC administrator, click on OK and, depending on the setting of the user account control (UAC), on Yes.
If you want to set up Windows as a complete virtual system, use VirtualBox or VMware Workstation Player. The ISO files for installing Windows 10 or 11 are available from Microsoft at http://www.microsoft.com/software-download.
The instant recovery tools Reboot Restore Rx and Time Freeze are convenient alternatives. They discard all changes made in the meantime and thus also remove potential malware. The tools also work with virtualization, but the virtual system does not have to be restarted.
With Smart App Control (SAC), Microsoft has introduced a function in Windows 11 version 22H2 that was previously reserved for Windows in S-mode namely, to rigorously block everything that the system does not explicitly classify as harmless. This is a significant difference to conventional virus protection. The latter only warns or blocks what probably contains malicious code.
The new function uses artificial intelligence and certificate-based signatures. How it will prove itself in practice remains to be seen. SAC does not currently provide for manually set exceptions to be able to run programs that are classified as unsafe. Microsoft is also aware that Smart App Control is a radical step: SAC can only be used on PCs with freshly installed Windows 11. Those who updated their PC to version 22H2 in autumn must first reset it.
Initially, the feature runs in evaluation mode. This analyzes the individual user behavior and then decides whether the protection seems to make sense in concrete use. Then it switches on automatically after some time; this can be done manually at any time. Once a protection mode has been activated, it can easily be deactivated again, but it cannot be reactivated without resetting Windows 11. Since the installed software is lost when resetting, this step needs to be carefully considered.
Windows 10, on the other hand, does not support the third-party Smart App Control, but offers a number of similar protection mechanisms. Microsoft summarizes these in the Settings app under Windows Security.
Some, such as virus, real-time, tamper and cloud-based protection, as well as the firewall, are turned on by default. But the other protection functions that are not automatically activated are also useful. These include Monitored Folder Access against ransomware (under Virus and Threat Protection), blocking potentially unwanted apps and downloads, and only in the Pro version Microsoft Defender Application Guard (both under App & Browser Control Reliability-Based Protection). Depending on the CPU, you will also find Core Isolation under Device Security.
This juxtaposition of different security functions is partly responsible for the fact that Windows sometimes also warns falsely. For example, if the system warns you when installing an established program, download it again from the manufacturer or from a secure source. You can also check the file with an online multiscanner such as Virustotal or Jottis Malware Scan before setting it up. If it gives the green light, install the software via More information > Run anyway at your own risk. Many security suites also offer real-time and system protection.
Screenshots can be created with the app Cut and Sketch (Snipping Tool), which can be called up most easily with the key combination Win+Shift+S. In the bar, you can select the screenshot you want to take. In the bar you can choose whether you want to cut out a window or an area. The image is on the clipboard, and a click on the notification opens it in the app, which offers some editing functions.
Whatever Microsoft plans for the Cut and Sketch app, the free tool Greenshot can probably already do it. After installation, it appears as an icon in the notification area next to the clock and registers the key combinations Print key (area), Alt-Press (window), and Ctrl-Press (desktop) for itself. The key combinations can be changed in the settings. After Ctrl-press, for example, a menu appears that can be used to save the screenshot, copy it to the clipboard, or open it in the Greeenshot Editor. The editor offers numerous editing functions. You can draw lines or rectangles in the image and add speech bubbles and text boxes.
The Bluestacks App Player offers access to Googles official Play Store as well as the possibility to install Android apps as APK files on Windows PCs.
IDG
Finally, can Android apps also be installed under Windows 10 i.e. one of the core functions of Windows 11, which Microsoft had to postpone at the launch of the operating system in autumn 2021 for performance reasons and which was only released a year later.
The Windows subsystem for Android and thus the apps themselves are not available with Windows 10. But the Android emulator Bluestacks App Player brings the Android apps into the predecessor system as well.
This is how it works: Run the Bluestacks installer and wait until all the necessary program files have been downloaded and the emulator has been installed. You can start the actual player with all its functions by clicking on the symbol at the bottom left of the Bluestacks interface. The function bar on the right offers so many possibilities that you need some time to get to know and set up the new system. This includes the fact that after logging into the integrated Google Play Store, almost all Android apps are available in principle. In addition, Bluestacks offers cross-system functions, such as file and media access via Windows Explorer.
Since the release of Chat-GPT, everyone has the option of getting help from an AI. Microsoft, which has a stake in Open AI, has meanwhile integrated the AI chat into the Edge web browser. It can be accessed via the icon (Discover) in the sidebar. The function is available to users of Windows 10 and 11.
Insider build 23493 of Windows 11 already shows what Microsoft plans to do with AI in the future. The key combination Win + C now no longer leads to Cortana, but to Windows Copilot. The window looks like Edge and you can type a question into the input line to communicate with the AI. However, commands that are started on the PC are also possible. Take a screenshot, for example, searches for an action and then opens the snipping tool. Switch to dark mode activates the dark mode for Windows and apps after a query.
So far, Windows Copilot is still a pre-release version; the features are limited. Microsoft will probably not offer Copilot for Windows 10. To our knowledge, there are no alternative programs. With the rapid development in the field of artificial intelligence, other providers will certainly also work on tools for PC control via AI.
This article was translated from German to English and originally appeared on pcwelt.de.
Read the original post:
Add Windows 11 features to Windows 10 with these helpful tools - PCWorld
AWS And Anthropic: 5 Key AI Chip Supply Chain Plans, Intel Hires … – CRN
Cloud News Mark Haranas September 26, 2023, 12:05 PM EDT
AWS CEO Adam Selipsky said his $85 billion cloud company is ramping up production to provide a very robust AWS-controlled supply chain for AI chips, thanks to Amazons $4 billion investment in Anthropic.
AWS CEO Adam Selipsky (pictured) has massive plans in store for Amazons blockbuster investment of up to $4 billion in AI startup star Anthropicfrom shaking up the chip industry to hiring new talent from the likes of Intel.
Its absolutely true that there is a huge demand for all of the different chips with which people do generative AI workloads on, Selipsky said in an interview with Bloomberg. So we absolutely have already been ramping up our Trainium and Inferentia supply chain and ramping up the supply that we can create as quickly as possible.
CRN breaks down the biggest plans and initiatives Amazon has for Anthropic, CEO Selipskys boldest statements on his AI chip vision, and new AWS executive hires from Intel.
[Related: Adam Selipsky: AWS Is Building The Ultimate GenAI Tool Chest]
Before jumping into AWS and Amazons plans for the AI startup, its key to note the technologies and strategy at play.
The Seattle-based $85 billion cloud giant is looking to become a global AI chip maker via its custom silicon offers Trainium and Inferentia. Anthropic is part of AWS plan to succeed as the popular AI startup will use AWS Trainium and Inferentia chips to build, train, and deploy its future foundation models. The two companies will also collaborate in the development of future Trainium and Inferentia technology.
Theres still a whole lot of storage and compute and database workloads ramping up on AWS. So we have many sources of growth, I anticipate, but theres absolutely no doubt that generative AI looks like its going to be an explosive additional source of growth in the years ahead, said Selipsky.
Heres five key things to know about AWS custom silicon chip plans and boldest remarks from Selipsky and Anthropic CEO Dario Amodeia former vice president at OpenAIthat investors, channel partners and customers need to know.
Mark Haranas is an assistant news editor and longtime journalist now covering cloud, multicloud, software, SaaS and channel partners at CRN. He speaks with world-renown CEOs and IT experts as well as covering breaking news and live events while also managing several CRN reporters. He can be reached at mharanas@thechannelcompany.com.
See the original post:
AWS And Anthropic: 5 Key AI Chip Supply Chain Plans, Intel Hires ... - CRN
Security Think Tank: To encrypt or not to encrypt, that is the question – ComputerWeekly.com
To encrypt or not to encrypt, that is the question.
Well, you should of course be encrypting data in motion particularly where its to be carried over a third party network such as the internet or the networks operated by data warehouses where cloud service providers (CSPs) locate their equipment.
Given remote working and the move of IT into the cloud, where your services will be operated in a multi-tenanted environment, you should be seriously looking at encrypting data flowing between systems as well as between users and systems.
One example is to encrypt the data flow between an email app such as Outlook and the email server such as Microsoft Exchange. This is easily done via set-up menus and should be done even if the main communications channel itself is encrypted.
Encrypting between systems is recommended though you will need to review individual applications to see what is available, here however Microsoft servers can encrypt end to end using the Server Message Block (SMB) encryption feature.
Websites both internally and externally facing should be using HTTPS by default and service and maintenance access to systems should also be encrypted (SSH, HTTPS, proprietary) remember though that data must be in the clear (decrypted) before it can be processed, we are a few years away from applications being able to process encrypted data directly in an economic way.
Meanwhile, data at rest should also be encrypted, and most database systems offer encryption selectable between fields or records. Some file systems (both hardware and software based) can offer encryption, examples being Microsoft BitLocker on Windows 10 and later (and Server 2008 and later) although for Windows 11 there is a requirement for TPM 2.0 (Trusted Platform Module) support.
For Microsoft Server 2016 TPM is not a requirement but is recommended, however if Host Guardian services are required then TPM 2.0 is a definite requirement.
Other encrypting file systems include APFS on macOS 10.3 and later; Ext4 on Linux kernel 4.1 and Novel Storage Services. See Wikipedia for more examples.
Encryption of data at rest is not a panacea or silver bullet as far as protecting data is concerned. It wont for instance protect you if a ransomware gang accesses your data store, it will quite happily encrypt your encrypted data! As such a well-designed and engineered infrastructure with careful attention to security configurations throughout is a must! Put least privilege into action, and CISOs, if your managers or board complain, get them to sign a formal affidavit that they understand the risks of not limiting file access according to an absolute business need and that they are therefore fully liable should things go wrong.
Weve talked about the need for encryption and where, but what standards should we be aspiring to? My recommendations are:
Remember that data at rest includes not just the data on file and database servers, it includes email systems and peoples PCs, laptops, smartphones and USB devices. And data in motion doesnt only travel between systems or systems and user devices but also sent to printers and backup systems. Dont forget them whatever you do. They could be the back door you forgot!
Read more from the original source:
Security Think Tank: To encrypt or not to encrypt, that is the question - ComputerWeekly.com
When data becomes dangerous, and what to do about it – SiliconANGLE News
Cloud storage has grown massively in the past few years. Simultaneous to that, organizations have been routinely targeted with ransomware, sometimes on a daily basis.
Still, theres so much more to go when it comes to the amount of data that needs to be moved to the cloud, according to Ed Casmer (pictured), founder and chief technology officer of Cloud Storage Security, a company dedicated to solving the security and compliance challenges surrounding data storage in the cloud. So when does data become dangerous?
I would just start by considering all data dangerous, Casmer said. But there are three particular cases to that. One is when the data is unknown, another is when its riddled with issues, payloads, you know, malware, and another is when it falls into the wrong hands.
Casmer spoke with theCUBE industry analyst Lisa Martin at the Cybersecurity AWS Startup Showcase event, during an exclusive broadcast on theCUBE, SiliconANGLE Medias livestreaming studio. They dove deep into how data becomes dangerous and discussed how to ensure data is safe to use. (* Disclosure below.)
When it comes to challenges around data being unknown, sometimes it means that organizations really dont have a clue about what data they have in their environment, according to Casmer. There may be certain data paths, but outside of those paths, the organization really doesnt know what data they have.
If we talk about the second piece there, being riddled with payloads, the notion there is the stats prove to us and show to us that one in two organizations are being attacked by ransomware on a daily, weekly or monthly basis, he said. That is really frequent.
The third piece, involving data falling into the wrong hands, is typically a configuration issue. Its not as though someone has compromised a system and isnt always just a brute entry into the environment, Casmer noted.
It proves to us by saying, what data is being compromised? What data is being lost to customers? And it was really interesting findings that we worked with [Enterprise Strategy Group] on, and its about a third of the customers losing it from file stores, he said. Whether these are network file shares or these are block storage attached to computers, 34% of organizations are losing information from data lakes.
The number that might not be as surprising is that 42% of organizations are losing information from their software-as-a-service applications, according to Casmer. Thats whether its the SaaS application being compromised or how its been configured.
Theyre losing data. So, its a wide array of where people are losing their data, he said.
When it comes to the three classifications of data becoming dangerous, there are various business and security challenges at play. The first involves the notion of how people have adjusted to the cloud in general, according to Casmer.
We focused on compute in the early days, but now we have to focus on storage as well. When we look at the business challenges, were looking at areas where data proliferates massively, he said. Whether thats backups now that are being pushed to the cloud, its the notion of having infinite resources versus finite resources on-prem, where you couldnt just make tons of copies of data and put it in places because you didnt have the places to put it. Now you can.
The security team is now focused on data as much as they were on compute, according to Casmer. Where there was shadow IT before, now there is shadow data.
Its easy to make a copy of a production database and put it someplace to start running reports against and doing more activity against, Casmer said. But its very hard for the security team to understand whos done what with that data and how youre securing it.
In the end, much of this comes down to how business and security teams work together to push back against the dangerous nature of data. What that means is the company is seeking ways to empower both the business side and the security side, Casmer explained.
The business side wants visibility; the security side wants control. So, how is Cloud Storage Security helping with that? Well, we provide a tool that locates the unknown data, he said. You get that notion of, there is no more unknown data because you can find everything across all of your infrastructure.
The company makes sure that the data is safe to use but is also classifying it and ensuring it is not too sensitive. Of course, there are multiple ways to lose data, including the configuration aspect.
Were giving you a best-practices review of all of your data stores to say, Are you doing the right things with that data? he said. With a little bit of visibility, a bunch of control and a bunch of scanning or touching of that data to really tell you what you have, we can help those organizations solve both the business requirements, as well as the security requirements.
Heres the complete video interview with Ed Casmer, part of SiliconANGLEs and theCUBEs coverage of the Cybersecurity AWS Startup Showcase event:
(* Disclosure: Cloud Storage Security sponsored this segment of theCUBE. Neither Cloud Storage Security nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)
TheCUBEis an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate thecontent you create as well Andy Jassy
THANK YOU
Read more from the original source:
When data becomes dangerous, and what to do about it - SiliconANGLE News
Storage and Data Protection News for the Week of September 15 … – Solutions Review
Solutions Review editors curated this list of the most noteworthy storage and data protection news items for the week of September 15, 2023.
Keeping tabs on all the most relevant storage and data protection news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last week, in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy storage and data protection news items.
Watch this space each week as Solutions Review editors will use it to share new Expert Insights Series articles, Contributed Shorts videos, Expert Roundtable and event replays, and other curated content to help you gain a forward-thinking analysis and remain on-trend. All to meet the demand for what its editors do best: bring industry experts together to publish the webs leading insights for enterprise technology practitioners.
With the next Solutions Spotlight event, the team at Solutions Review has partnered with network solutions provider Cloudflare. Join this webinar to understand the profound impact DDoS attacks can have on an organizations bottom line and how investing in proactive defenses can yield substantial returns.
Read on for more.
For consideration in future storageand data protection news roundups, send your announcements to the editor: tking@solutionsreview.com.
Tim is Solutions Review's Executive Editor and leads coverage on data management and analytics. A 2017 and 2018 Most Influential Business Journalist and 2021 "Who's Who" in Data Management, Tim is a recognized industry thought leader and changemaker. Story? Reach him via email at tking@solutionsreview dot com.
View original post here:
Storage and Data Protection News for the Week of September 15 ... - Solutions Review
I went to Apples iPhone 15 launch 4 things you missed and the first is good news for your wallet… – The US Sun
GADGET news has been delivered thick and fast at this week's Apple event.
But there were four things you might have missed unless you were watching very closely.
The prices of gadgets are only on the big screen (check out our Apple event live blog) fleetingly.
And it's hard to know if you're getting a good deal unless you compare it to last year's products.
For Americans, the good news is that prices on the new iPhone 15 models didn't rise this year.
The iPhone 15 is $799, the iPhone 15 Plus is $899, and the Pro is $999.
Seemingly the only exception is the Pro Max for $1,199, versus last year's $1,099 model.
But Apple has increased the base storage from 128GB to 256GB for this unit, so the price is the same as last year's 256GB model.
In the UK, it's even better news.
The iPhone 15 is 799 and the iPhone 15 Plus is 899 both a 50 price cut versus the year before.
The iPhone 15 Pro is 100 less than last year's model at 999.
And the Pro Max is flat versus the year before at 1,199.
This was almost a blink-and-youll-miss-it moment but got huge cheers from the audience.
Apple is finally adding some higher-storage tiers for iCloud.
So if you're approaching the limits of your iCloud storage, you'll be able to upgrade to new 6TB and 12TB.
The bad news is that they don't come cheap.
For 6TB, you'll be paying $30 / 26.99 a month, and 12TB will cost a hefty $60 / 54.99 each month.
Of course these are iCloud+ plans, so you get bonus features like Hide My Email, Private Relay, and Family Sharing for cloud storage.
Another quick fire update came for the AirPods.
Like the iPhone 15, the new AirPods feature a USB-C port.
That means new MacBook, iPad, iPhone and AirPods models all use the same type of connector: USB-C.
This has unlocked a brilliant trick: charging your AirPods with your iPhone.
You can now use a USB-C to USB-C cable to connect an iPhone and AirPods to give your headphones a quick boost.
It's not clear how much iPhone charge this will drain yet, but it's a handy trick that could work in a pinch if your AirPods are out of charge.
Another fun upgrade comes with the Apple Watch Series 9 and Apple Watch Ultra 2.
Both smartwatches feature upgraded storage.
Back with the Series 5, Apple increased local watch storage to 32GB.
And now for the first time, the two new models feature 64GB of local storage.
It means you can cram even more music or podcasts onto the device and leave your iPhone at home when you're out for a run, for instance.
See more here:
I went to Apples iPhone 15 launch 4 things you missed and the first is good news for your wallet... - The US Sun
First Mile looks to connect you from almost anywhere to the cloud – RedShark News
How do you connect to the cloud when youre not near a fixed network connection? First Mile is an interesting new option to bridge that gap.
For all its ubiquity, the cloud can be tricky to connect with. Any internet connection is, by definition, connected to the cloud, but not all connections are equal to the task of handling video content - especially the high bitrate flavours associated with video production.
For fixed-location production, most buildings in most cities have perfectly adequate - and sometimes very fast - internet connections. But the further you get from population centres, the harder it gets to find a suitable pipeline to the cloud. You might also want to use an entirely separate network for security and performance issues.
Its easy to be lulled into a false sense of available connectivity by smartphones, but these are subject not only to the laws of physics but also to the operational and commercial priorities of mobile networks.
You might have noticed that, sometimes, your mobile signal can come and go, even if youre not moving. That shouldnt happen, but one reason it might is that networks have a fixed capacity. At busy times, if more people are trying to connect than the network has capacity for, it will - counter-intuitively - *reduce* the power of its transmitter until it is only in contact with the number of phones it can cope with. For everyone else, its tough, mainly because these outages are entirely unpredictable. It can happen when theres a traffic accident on a major road, causing everyone to phone ahead to say they will be late.
Networks can be strong in some areas and weak in others. Sometimes, youll find that your phone works well in a location, but the data SIM youre using to access cloud services is connected to a network without coverage.
If your production workflow depends on cloud services, then you need more than this. Combining mobile networks and LEO (Low Earth Orbit) satellites can help, but no single mobile service can provide the sort of reliability you need if high bandwidth mobile connectivity is on your critical path. Nor can it match the security of a purposely designed network that always operates within a VPN tunnel.
If youre not already using cloud workflows, lets look at why you might want to. While early camera-to-cloud demonstrations were little more than a proof of concept, cloud workflows have now reached a level of proficiency where they are a viable option for any level of video production, and the advantages are enormous. The cloud is geographically agnostic. Its everywhere, subject only to a decent and reliable connection. It enables remote and collaborative working. You can set up teams across the globe (or across the street) and share media with them at any time.
With camera to cloud you can go from acquisition to publishing on social media - or even a news channel - within minutes. Atomos calls this From Lens to Likes, with good reason: if you can get your material published first, youll get the majority of the traffic. Youll get attention, engagement, and all the benefits of revenue that is proportional to views.
But there is still the question of how you connect to the cloud when even the fast mobile networks are designed for short, bursty, transactional data and not large, long media files. This is the problem that First Mile is designed to solve with scalable options for a wide range of operating scenarios. The companys mobile data products use professionally configured SIM cards, dedicated hardware and technical measures to ensure constant, high-bandwidth connectivity.
The easiest to understand is blending. Unless youre in a cave or a lead-lined room, youll probably get some kind of mobile signal. You might also be in the WiFi range, but the signals unreliable. Blending can spread the data load - and the risk - across multiple, diverse networks. To users, blending is transparent - it just feels like a fast, reliable connection. Whats happening under the hood is that software running on your comms device analyses the current state of multiple networks and allocates your data across them to smooth out differences in data rates and to give a net increase in the available bandwidth - and reliability.
With 5G, which is an entire family of technologies unified around the goal of improving bandwidth and latency, with the appropriate mobile network account - not usually available to consumers - its called network slicing, and it makes it possible to reserve a fixed portion of the network bandwidth for you and your team. It means that there will never be contention between multiple users as they cant encroach on your reserved patch of the data connection.
Beyond this, there are dozens of tricks of the trade and qualified users only tweaks and setups that are only available to companies with a deep level of competence in network configuration.
Frame.io is driving the industry towards a camera-to-cloud workflow, with companies like Atomos, Teradek and Sound Devices releasing hardware and software products that specifically embrace the cloud. Real-time cloud storage company LucidLink is among those underpinning remote, collaborative editing, bringing the prospect of cloud-only workflows closer to every filmmaker.
But if you have no fixed WiFi or physical network connection - usually the case if youre away from home or on location - then First Mile Technologies can make an incredible difference to your ability to use super-productive cloud production workflows. You can start *editing* while shooting, work collaboratively with your teams - wherever they are, and even deliver your edited content directly to social media or even a newsroom.
Check out First Mile Technologies at https://firstmile.tech/
Read the rest here:
First Mile looks to connect you from almost anywhere to the cloud - RedShark News
Manage cloud waste and high costs with automation – TechTarget
Cloud cost management shouldn't be an afterthought for your organization. Manually analyzing usage and growth patterns, allocating costs and conducting cost snapshots are time-consuming activities, prone to human error.
Organizations can automate ways to detect, track and report abnormal cloud activities to keep your cloud spending within budget. The benefits of automating cloud cost optimization include the following:
Read about the manual tasks automation can take off your to-do list and the helpful automation tools to consider.
There are several cloud cost management tasks that teams should automate to reduce human error and improve efficiency.
Right-sizing instances enables organizations to eliminate overprovisioning and allocate resources optimally, reducing cloud waste. To identify underutilized or oversized instances, implement automation, and analyze performance metrics and utilization data. Some tools can recommend appropriate instance types based on workload requirements, as well as automatically resize instances to optimize cost and performance.
Discounted instances can also cut costs. Automated tools can analyze usage patterns and recommend the optimal number and type of instances. These tools can often track the expiration dates of existing reservations and provide alerts or automate the purchasing process.
Automating cost data collection from cloud service providers using scripts or third-party tools saves time. It doesn't require human intervention, while retrieving and consolidating cost data from multiple sources into a centralized system or dashboard.
Cloud cost allocation, especially chargeback, is too important to risk human error. Automating cloud cost allocation enables teams to automatically analyze usage data and predefine allocation rules to automatically assign costs to departments, projects or cost centers. This eliminates the need for manual data manipulation and enables organizations to deliver reporting automatically at a regular cadence -- every week or month.
Locking down policy enforcement with automation enables organizations to implement resource usage policies and rules for countering cloud waste. For example, organizations can set an automated policy to enforce tagging standards, ensuring all resources are correctly labeled for cost allocation and management purposes.
Cloud teams can shut down or scale down resources during nonbusiness hours or periods of low demand with scheduling features and automation scripts. Automating lifecycle policies can manage data retention, archiving and deletion for storage resources.
Automated reporting tools can generate cost reports, dashboards and visualizations based on predefined templates or customizable requirements. These tools eliminate the need for manual data manipulation and analysis. Automated tools help guide cloud teams to deliver appropriate and actionable data to their stakeholders.
Using automation features can help detect unusual spending patterns or unexpected cost increases. For example, automated systems can monitor spending against budget thresholds and send alerts or notifications to relevant stakeholders when costs exceed predefined limits. Additionally, there can be alerts for potential issues or misconfigurations, helping prevent costly leaks and enabling proactive cost management.
Despite the expertise of FinOps teams, making cloud cost optimization recommendations requires automation. Implementing AI-powered cost optimization tools enables teams to analyze historical cloud usage patterns, identify cost-saving opportunities and provide actionable recommendations.
Tools can help in the journey to automate cloud cost management. Consider the following:
View post:
Manage cloud waste and high costs with automation - TechTarget