Page 1,133«..1020..1,1321,1331,1341,135..1,1401,150..»

Signing in to Pocket just got even more secure – Mozilla & Firefox

The Pocket app and web experience are trusted by millions of people everyday to stay up to date and informed on the topics they care about most, free from clickbait, fake news and the pressure and anxiety often felt while on social media platforms. Since being acquired in 2017, Pocket is part of the family of products made by Mozilla, the nonprofit-backed tech company building responsible technology that prioritizes people over profits, so internet safety and security are top of mind for our customers.

In order to provide additional security benefits such as two-factor authentication to our users, all Pocket accounts will be converted to Firefox accounts, an authentication service powered by Mozilla. For those of you who enjoy logging in to Pocket via Google or Apple, youll still benefit from the enhanced security thats enabled by having Pocket backed by Firefox accounts.

We want you to have the best security for your account and were lucky to be a part of the Mozilla family of products that have a team working full-time on creating the best authentication experience possible. By using a Firefox account to access Pocket in any browser or mobile device, you will benefit from Mozillas privacy policy, which always puts people first. (To learn how to manage your Firefox account and the data associated with it, click here).

Starting July 11, 2023, Pocket users will be prompted to transition to a Firefox account in order to log in and access their Pocket account. Aside from changing how you log in to Pocket, this does not affect your saved items. While optional at first, the transition to a Firefox account in order to log in will be required by August 15, 2023.

For Pocket Premium subscribers, converting your account will not impact your subscription.

And from then on, simply use Continue with Firefox to log into Pocket.

*For people who login with their Apple ID and Google login

If you use Apple ID or Google login to access your Pocket account, you dont need to do anything. Your account will be auto-migrated on July 11, 2023. The next time you log in after this date, youll access Pocket with your new Firefox account using the same Apple ID or Google login.

Note that if you have already signed into Pocket with your Firefox account, your account has already been converted. Theres nothing else to do!

While well now require a Firefox account to sign up or log in to Pocket, you can continue using your preferred web browser to access Pocket. Our Pocket browser extensions for many popular browsers and apps for iOS and Android will continue to be available as well.

Creating a Firefox account also comes with other features that will make your time online more enjoyable, including other Mozilla products such as Monitor and Relay, both of which do not require using a Firefox browser.

If you have any other questions regarding signing up and transitioning to Firefox accounts to log in to your Pocket account, you can visit our Frequently Asked Questions (FAQ) page.

If you need any other assistance with your Pocket account, click here to contact Pocket Support.

Save and discover the best articles, stories and videos on the web Get Pocket

See the original post:
Signing in to Pocket just got even more secure - Mozilla & Firefox

Read More..

Stolt-Nielsen deploys fully integrated Orange SASE solution to optimise global connectivity and security for hybrid workforce – TelecomTV

Stolt-Nielsen, a global expert in bulk liquid logistics and sustainable land-based aquaculture, has chosen Orange Business to provide a secure access service edge (SASE) solution. It combines SD-WAN connectivity with global Security Service Edge (SSE) to securely support the companys global, hybrid workforce and drive business growth.

Stolt-Nielsen has a diverse business portfolio, including the worlds largest fleet of chemical tankers, terminals for the safe storage and handling of bulk liquids, and bulk door-to-door chemical delivery logistics. It prides itself on being a trailblazer in adopting technology in its field.

The multinational enterprise was an early adopter of SD-WAN and is now moving to the next generation of advanced solutions. It was looking to replace a set up of internet providers and network solutions with one integrated service to optimize performance and security for its 2,500 hybrid users globally.

Phased SASE deploymentStolt-Nielsen wanted a trusted partner to help migrate from its former infrastructure and develop a phased SASE strategy. It chose Orange as the integrator, impressed by its global network capabilities, security expertise, and broad portfolio of services.

The fully managed Orange SASE Advanced offering, created for Stolt-Nielsen in partnership withNetskope, provides enhanced global connectivity and consistent internet security on and off the network. With Netskopes SSE infrastructure located across more than 70 regions globally, plugging it into the Orange network ensures data security can be managed centrally without affecting business productivity.

As part of our transformation, we needed to define a secure, centralized, future-proofed digital infrastructure to support our business growth and innovation. We chose Orange because of its ability to provide seamless, reliable global connectivity with the highest security standards delivered via SASE,explains Peter Koenders, CIO at Stolt-Nielsen.

Stolt-Nielsen will reap the benefits of Orange SASE Advanced with a secure, flexible infrastructure built on our Evolution Platform and secured by Orange Cyberdefense. This innovative approach will help to drive the companys secure digital transformation plans, advancing operational efficiency and propelling digital business growth,adds Nemo Verbist, Senior Vice President, Europe, at Orange Business.

Read the original post:
Stolt-Nielsen deploys fully integrated Orange SASE solution to optimise global connectivity and security for hybrid workforce - TelecomTV

Read More..

The everyday words people really SHOULD know how to spell – Daily Mail

There are all kinds of embarrassing Google searches. A weird rash, your ex, common knowledge you really should know and all the words you cant spell.

Lots of people use search engines as a dictionary these days.

But which words are the hardest to spell?

The folks at unscrambled words - a Scrabble cheater/helper site - looked at a year of Google Search data to spill the beans.

It's as simple as pie, right? Think again! That cluster of vowels in the middle makes this one challenging. Break it down into syllables: res-tau-rant. Or, hey, picture yourself taking a rest, holding a "U" sign and ranting about something.

The silent p will get you every time. Pneumonia is an infection in one or both lungs. The word itself is packed with pesky extra letters. Hey, at least you probably wont need to spell it often.

How many people doing a Google search for this one gave up and said thanks? It starts tricky with the double "P." Picture someone handing you an apple as a thank you.

Kim Komando hosts a weekly call-in show where she provides advice about technology gadgets, websites, smartphone apps and internet security.

Listen on 425+ radio stations or get the podcast. And join over 400,000 people who get her free 5-minute daily email newsletter.

Finally, one with a classic rule you probably know: I before E, except after C. This checks the boxes, though that PT combo at the end is tricky, too. Sorry, youre just going to have to memorize it.

Yeah, a little harder than pretty. It helps to focus on the "beau" part handsome or attractive. After that, it's pretty smooth sailing.

Fear not, dear aunts and uncles, theres a phrase you already know for this one: I before E. The C might throw you off, but its after the IE combo.

You're in complicated territory whenever multiple spots could be one letter or another. It doesn't help that maintain a word that feels like it should be spelled the same is a little different. For this word, break it down into syllables: main-te-nance.

This slang term means fancy or characteristic of luxury. And youll find lots of people spelling it boujee. Remember, its a fancy word and a G feels a little fancier than a J, right? Right. After all, it comes from the word "bourgeoisie."

Bet you knew that one was coming. Imagine the urgency with which Google users typed those letters. Theres no shortage of ways to spell this one wrong. To spell this stomach-churning word correctly, remember the double R + H.

We're willing to be it's that "T" in the middle that trips people up the most. The way most of us pronounce it, it could be a "D" instead. Just remember "congrats" or that you "congratulate," and you're on the right track.

The rest is here:
The everyday words people really SHOULD know how to spell - Daily Mail

Read More..

Russian Cybersecurity Executive Arrested for Alleged Role in 2012 … – Krebs on Security

Nikita Kislitsin, formerly the head of network security for one of Russias top cybersecurity firms, was arrested last week in Kazakhstan in response to 10-year-old hacking charges from the U.S. Department of Justice. Experts say Kislitsins prosecution could soon put the Kazakhstan government in a sticky diplomatic position, as the Kremlin is already signaling that it intends to block his extradition to the United States.

Nikita Kislitsin, at a security conference in Russia.

Kislitsin is accused of hacking into the now-defunct social networking site Formspring in 2012, and conspiring with another Russian man convicted of stealing tens of millions of usernames and passwords from LinkedIn and Dropbox that same year.

In March 2020, the DOJ unsealed two criminal hacking indictments against Kislitsin, who was then head of security at Group-IB, a cybersecurity company that was founded in Russia in 2003 and operated there for more than a decade before relocating to Singapore.

Prosecutors in Northern California indicted Kislitsin in 2014 for his alleged role in stealing account data from Formspring. Kislitsin also was indicted in Nevada in 2013, but the Nevada indictment does not name his alleged victim(s) in that case.

However, documents unsealed in the California case indicate Kislitsin allegedly conspired with Yevgeniy Nikulin, a Russian man convicted in 2020 of stealing 117 million usernames and passwords from Dropbox, Formspring and LinkedIn in 2012. Nikulin is currently serving a seven-year sentence in the U.S. prison system.

As first reported by Cyberscoop in 2020, a trial brief in the California investigation identified Nikulin, Kislitsin and two alleged cybercriminals Oleg Tolstikh and Oleksandr Vitalyevich Ieremenko as being present during a 2012 meeting at a Moscow hotel, where participants allegedly discussed starting an internet caf business.

A 2010 indictment out of New Jersey accuses Ieremenko and six others with siphoning nonpublic information from the U.S. Securities & Exchange Commission (SEC) and public relations firms, and making $30 million in illegal stock trades based on the proprietary information they stole.

[The U.S. Secret Service has an outstanding $1 million reward for information leading to the arrest of Ieremenko ( ), who allegedly went by the hacker handles Zl0m and Lamarez.]

Kislitsin was hired by Group-IB in January 2013, nearly six months after the Formspring hack. Group-IB has since moved its headquarters to Singapore, and in April 2023 the company announced it had fully exited the Russian market.

In a statement provided to KrebsOnSecurity, Group-IB said Mr. Kislitsin is no longer an employee, and that he now works for a Russian organization called FACCT, which stands for Fight Against Cybercrime Technologies.

Dmitry Volkov, co-founder and CEO, sold his stake in Group-IBs Russia-based business to the companys local management, the statement reads. The stand-alone business in Russia has been operating under the new brand FACCT ever since and will continue to operate as a separate company with no connection to Group-IB.

FACCT says on its website that it is a Russian developer of technologies for combating cybercrime, and that it works with clients to fight targeted attacks, data leaks, fraud, phishing and brand abuse. In a statement published online, FACCT said Kislitsin is responsible for developing its network security business, and that he remains under temporary detention in Kazakhstan to study the basis for extradition arrest at the request of the United States.

According to the information we have, the claims against Kislitsin are not related to his work at FACCT, but are related to a case more than 10 years ago when Nikita worked as a journalist and independent researcher, FACCT wrote.

From 2006 to 2012, Kislitsin was editor-in-chief of Hacker, a popular Russian-language monthly magazine that includes articles on information and network security, programming, and frequently features interviews with and articles penned by notable or wanted Russian hackers.

We are convinced that there are no legal grounds for detention on the territory of Kazakhstan, the FACCT statement continued. The company has hired lawyers who have been providing Nikita with all the necessary assistance since last week, and we have also sent an appeal to the Consulate General of the Russian Federation in Kazakhstan to assist in protecting our employee.

FACCT indicated that the Kremlin has already intervened in the case, and the Russian government claims Kislitsin is wanted on criminal charges in Russia and must instead be repatriated to his homeland.

The FACCT emphasizes that the announcement of Nikita Kislitsin on the wanted list in the territory of the Russian Federation became known only today, June 28, 6 days after the arrest in Kazakhstan, FACCT wrote. The company is monitoring developments.

The Kremlin followed a similar playbook in the case ofAleksei Burkov, a cybercriminal who long operated two of Russias most exclusive underground hacking forums. Burkov was arrested in 2015 by Israeli authorities, and the Russian government fought Burkovs extradition to the U.S. for four years even arresting and jailing an Israeli woman on phony drug charges to force a prisoner swap.

That effort ultimately failed: Burkov was sent to America, pleaded guilty, and was sentenced to nine years in prison.

Alexei Burkov, seated second from right, attends a hearing in Jerusalem in 2015. Image: Andrei Shirokov / Tass via Getty Images.

Arkady Bukh is a U.S. attorney who has represented dozens of accused hackers from Russia and Eastern Europe who were extradited to the United States over the years. Bukh said Moscow is likely to turn the Kislitsin case into a diplomatic time bomb for Kazakhstan, which shares an enormous border and a great deal of cultural ties with Russia. A 2009 census found that Russians make up about 24 percent of the population of Kazakhstan.

That would put Kazakhstan at a crossroads to choose between unity with Russia or going with the West, Bukh said. If that happens, Kazakhstan may have to make some very unpleasant decisions.

Group-IBs exodus from Russia comes as its former founder and CEO Ilya Sachkov remains languishing in a Russian prison, awaiting a farcical trial and an inevitable conviction on charges of treason. In September 2021, the Kremlin issued treason charges against Sachkov, although it has so far refused to disclose any details about the allegations.

Sachkovs pending treason trial has been the subject of much speculation among denizens of Russian cybercrime forums, and the consensus seems to be that Sachkov and Group-IB were seen as a little too helpful to the DOJ in its various investigations involving top Russian hackers.

Indeed, since its inception in 2003, Group-IBs researchers have helped to identify, disrupt and even catch a number of high-profile Russian hackers, most of whom got busted after years of criminal hacking because they made the unforgivable mistake of stealing from their own citizens.

When the indictments against Kislitsin were unsealed in 2020, Group-IB issued a lengthy statement attesting to his character and saying they would help him with his legal defense. As part of that statement, Group-IB noted that representatives of the Group-IB company and, in particular, Kislitsin, in 2013, on their own initiative, met with employees of the US Department of Justice to inform them about the research work related to the underground, which was carried out by Kislitsin in 2012.

View original post here:
Russian Cybersecurity Executive Arrested for Alleged Role in 2012 ... - Krebs on Security

Read More..

Modern eDiscovery Solutions: The Case for the Cloud in 2023 – JD Supra

While the cloud has become commonplace in our everyday lives, many legal teams are still missing out on the benefits of cloud-based ediscovery software.

As of 2021, there is a 50/50 split between ediscovery solutions being on-premise or in the cloud, leaving a large portion of the market still not leveraging the notable benefits of cloud-based ediscovery software.

Despite initial skepticism from others in the legal tech field, Rakesh Rocky Madhava, Founder and CEO of Nextpoint, has always remained a firm believer in the potential of cloud technology. As one of the early pioneers of cloud-based solutions in the legal industry, Nextpoint blazed a trail for other legal tech companies to follow.

Theres ample data that reveals how cloud computing has become a dominant force in todays digital world. Cloud-based collaboration tools have become increasingly popular according to a report by Flexera, 58% of businesses now consider cloud technology to be a strategic asset, and 90% of organizations now use some form of cloud service.

Given the prevalence of cloud-centric technologies in our daily lives, its only natural for the legal profession to catch up and start utilizing cloud-based tools and services to improve efficiency, collaboration, and accessibility. With cloud technology, legal professionals can access important documents and files from anywhere, collaborate with colleagues and clients in real time, and streamline their workflows and manual processes.

You may be wondering: if the cloud is so great, why are so many legal professionals missing out?

Change is Difficult

The cloud, or more specifically cloud computing, refers to the process of accessing resources, software, and databases over the internet and outside the restrictions of local hardware.

There are various reasons as to why legal teams use on-prem ediscovery solutions (data security risks taking first place), and the ability to adapt to change is where many individuals may fall short.

Those who use on-prem solutions may think, This is fine, theres no need to make any changes, to avoid workflow disruption from data migration, implementation, etc. However, limiting yourself to what is relatively fine may actually be holding you back from utilizing the many benefits of cloud-based ediscovery software.

The Importance of Cloud Security

Understanding the security requirements for keeping data safe has become essential as companies continue to migrate toward the cloud. Security threats have become more advanced as our digital landscape continues to evolve, and many of these threats explicitly target cloud computing providers. But protections against these threats have also become more robust in fact, the cloud is generally more secure than on-premise technologies.

For legal teams, choosing a cloud provider with advanced security protocols is essential. Firms are also responsible for implementing their own safeguards against security threats, which includes using secure passwords, limiting account sharing, and only accessing data on private devices. It is imperative to prioritize best practices and cloud security solutions to ensure data protection regardless of the cloud environment your organization operates in whether public, private, or hybrid.

Embracing the Cloud: 5 Advantages of Cloud-Based eDiscovery

1. Increased Scalability

Traditionally, on-premise solutions were the go-to choice for legal professionals, but times are changing. The limitations of relying on locally installed software have become apparent, prompting many legal teams to shift toward the cloud. One of the most compelling advantages of the cloud is its unparalleled scalability.

Unlike on-premise solutions, the cloud can effortlessly handle varying caseloads and data sizes. Whether youre dealing with a small caseload or an extensive document review, the cloud adapts and ensures optimal efficiency no matter the data volume. On-premise solutions, on the other hand, depend on the processing power of the local servers theyre installed on, which are typically no match for the cloud. Furthermore, the cloud is constantly evolving to expand its processing capacity, while local servers rarely undergo this level of advancement.

The clouds lightning-speed processing power has revolutionized the way document review is conducted. In a Nextpoint case study, Hugh Berkson, Principal attorney at McCarthy Lebit Crystal Co., expressed his amazement at the speed in which documents were able to load in our cloud-based ediscovery software. I think the thing that caught me by surprise is the speed with which documents will load when everything is online, Hugh said.

2. Automatic Upgrades and Reliable Service

When it comes to software updates, the reliance on manual software can be a cumbersome and time-consuming process. For on-premises solutions, updates arent available unless an IT team or software provider does them manually. This process is needlessly complex, and it puts you at risk of using outdated software thats no longer supported by the original software developers.

With a cloud-based solution, you can say goodbye to complicated manual updates and enjoy automatic upgrades without the need for an IT team. This not only saves valuable time and money, but also ensures that legal teams are always equipped with the latest features and security improvements.

In addition to the convenience of automatic upgrades, the cloud exhibits an unmatched level of reliability. The clouds reliance on a vast network of public servers creates a robust infrastructure that minimizes downtime. By embracing the cloud, legal teams can enjoy an uninterrupted workflow, maximizing efficiency and minimizing costly interruptions.

For example, in two years between 2015-2017, Amazon Web Services, the backbone of Nextpoints secure hosting infrastructure, experienced a total of only 7.5 hours of downtime (impressive, we know!).

3. Enhanced Security

Historically, security concerns have been a barrier to cloud adoption in the legal industry. However, many cloud providers have risen to the challenge, making significant investments in robust security controls and protocols, dispelling the doubt that once tainted this technology.

When it comes to on-premise, ensuring security becomes a daunting task for those not specialized in IT security. The valuable time and effort spent on securing internal systems often diverts attention away from core functions, limiting productivity. Its unlikely that most legal organizations have an experienced IT team on-site, leaving them vulnerable to potential security threats.

A significant risk associated with on-premise data lies in their physical proximity to the enterprise itself, putting your network at risk of access by unauthorized users, particularly from inside threats.

In contrast, the cloud operates under strict security standards. Top public cloud providers like AWS protect their servers with physical defenses such as fences, guards, biometric devices, and security cameras. Nextpoint also enacts a number of digital protections including data encryption, controlled access, audit trails and two factor authentication.

Many cloud-based companies also undergo external audits for instance, Nextpoint is proudly Soc II Compliant, which means that our auditing procedure ensures we securely manage data to protect the privacy of our clients.

4. Greater Remote Collaboration

In ediscovery, collaboration plays an important role in ensuring seamless document review and production, regardless of physical location. By centralizing ediscovery processes in the cloud, legal professionals can break free from the constraints of location dependent workflows.

Whether team members are located across different offices, cities, or even countries the cloud serves as a unifying effort, fostering collaboration with ease. Documents can be accessed, reviewed, and discussed in real-time, eliminating the need for time-consuming tasks such as passing physical copies of documents or emailing updated versions of work product.

5. Cost Predictability

With the cloud, legal teams no longer have to bear the financial burden of purchasing and maintaining costly infrastructure. The cloud provider takes care of software AND hardware requirements. Legal organizations can then reallocate their funds for other important endeavors.

The cloud also eliminates the need to hire an in-house IT team, which can level the playing field for firms of all sizes and make ediscovery more accessible for smaller firms and organizations operating on limited budgets.

Some legal teams have found the per-Gigabyte pricing that many ediscovery software companies use prohibitive, as they may end up with exorbitant fees from a large dataset. However, Nextpoint introduced our per-user pricing model with unlimited data hosting in 2017 to combat these unaffordable expenses and provide equal access to the cloud for firms of all sizes. While some legal cloud providers fees widely vary, there are options for firms in search of more predictable ediscovery costs.

Changing Rules and Regulations

Parties involved in a case have a duty to maintain the integrity, confidentiality, and security of all potential evidence, and information stored in the cloud is subject to the same requirements. With that being said, there are key issues that should be addressed for organizations utilizing the cloud for ESI.

Where is ESI Located in the Cloud?

Its crucial to know where your data is actually stored. Because cloud providers are expected to provide data at any given time, they may store your data in more than one data center due to repetition purposes.

Be attentive to which ediscovery providers stay up to date with evolving legal standards. Choosing the right provider will mitigate any risk of issues that may arise due to changing data privacy and security laws.

In 2022, Nextpoint launched new developments for legal software in Canada and California amidst recent changes to data privacy and security laws. Although the launch is limited to Canada and California, it has sufficiently prepared us to address restrictions that may emerge in new regions amidst rising concerns over data privacy.

Data security and privacy have always been a top priority here at Nextpoint, and the growing prevalence of consumer privacy laws is changing what this looks like in the ediscovery world. We remain committed to protecting our users data and helping them navigate the complexities of practicing law in a digital age.

eDiscovery and the Cloud Are Evolving Together

The proliferation of cloud storage solutions has allowed individuals to generate and retain vast amounts of data, much of which is now being incorporated into ediscovery processes and presents us with the huge caseloads that we often see today. However, the clouds high processing power can also offer a solution to these challenges.

Many individuals and organizations are now leveraging cloud-based storage solutions (like Dropbox, etc.), and legal tech companies are adapting and adding new features to accommodate these widespread platforms. In Nextpoint, you can now easily drop data from other cloud platforms into your ediscovery software rather than undergo a time-consuming and complicated collection process.

The cloud has both influenced ediscovery and been influenced by it. The emergence of stricter data privacy regulations means were seeing a shift toward greater transparency in data hosting locations. Will this be isolated to ediscovery, or will it permeate the rest of the cloud storage landscape? Only time will tell but its clear that ediscovery and the cloud have become intertwined.

Data permeates every aspect of our lives and plays a pivotal role in litigation. In our constantly evolving digital environment, the cloud stands as the only solution capable of adapting to the dynamic nature of data. It provides the necessary infrastructure to handle vast amounts of information involved in legal proceedings and ensures integration with our evolving data-driven landscape.

Continued here:
Modern eDiscovery Solutions: The Case for the Cloud in 2023 - JD Supra

Read More..

Expense Management Software Market size is set to grow by USD … – PR Newswire

NEW YORK, July 3, 2023 /PRNewswire/ -- Theexpense management software marketsize is forecast to increase by USD 4,776.21 million from 2022 to 2027, at a CAGR of 13.75%, according to the recent market study by Technavio. The growth of the market will be driven by the increasing adoption of cloud-based solutions, the growing automation of manual processes, and the increasing need for cost reduction. Charts & data tables about market and segment sizes for a historic period of five (2017-2021) years have been covered in this report. Download The Sample Report

Technavio has extensively analyzed 15 major vendors, includingCoupa Software Inc., Emburse Inc., Expensify Inc., Fyle Technologies Pvt. Ltd., Insperity Services L.P., International Business Machines Corp., Intuit Inc., ITILITE, Koch Industries Inc., Oracle Corp., Sage Group Plc, SAP SE, Sodexo SA, The Access Group, VA Tech Ventures Pvt. Ltd., Webexpenses Pty Ltd., Workday Inc., Xero Ltd., Zaggle Prepaid Ocean Services Pvt. Ltd., and Zoho Corp. Pvt. Ltd.

Key Benefits for Industry Players & Stakeholders

Expand operations in the future - To get requisite details, ask for a custom report.

Expense Management Software Market -Segmentation Assessment

The market is segmented by component (solution and service), application (large enterprises and SMEs), and Geography (North America, Europe, APAC, South America, and Middle East and Africa)

To get detailed insights about inclusions and exclusions, buy the report

Expense Management Software Market - Market Dynamics

Key drivers

Major Trends

Significant Challenges

Drivers, Trends, and challenges have an impact on market dynamics, which can impact businesses. Find more insights in a sample report!

What are the key data covered in this Expense Management Software Market report?

Gain instant access to 17,000+ market research reports.

Technavio's SUBSCRIPTION platform

Related Reports

The intellectual property software market is estimated to grow at a CAGR of 15.83% between 2022 and 2027. The size of the market is forecast to increase by USD 4,517.91 million. Furthermore, this report extensively covers market segmentation by component (software and service), deployment (on-premises and cloud-based), and geography (North America, Europe, APAC, Middle East and Africa, and South America). The rising investments in research and development are a key factor driving the market growth during the forecast period.

The extended reality market size is estimated to grow at a CAGR of 43.09% between 2022 and 2027. The market size is forecast to increase by USD 421.42 billion. Furthermore, this report extensively covers market segmentation by application (VR, AR, and MR), component (hardware and software), and geography (North America, APAC, Europe, South America, and the Middle East and Africa). The rapid improvements in sensor technology are a key factor driving the market growth during the forecast period.

Expense Management Software Market Scope

Report Coverage

Details

Base year

2022

Historic period

2017-2021

Forecast period

2023-2027

Growth momentum & CAGR

Accelerate at a CAGR of 13.75%

Market growth 2023-2027

USD 4,776.21 million

Market structure

Fragmented

YoY growth 2022-2023(%)

12.25

Regional analysis

North America, Europe, APAC, South America, and Middle East and Africa

Performing market contribution

North America at 40%

Key countries

US, China, France, Germany, and UK

Competitive landscape

Leading Vendors, Market Positioning of Vendors, Competitive Strategies, and Industry Risks

Key companies profiled

Coupa Software Inc., Emburse Inc., Expensify Inc., Fyle Technologies Pvt. Ltd., Insperity Services L.P., International Business Machines Corp., Intuit Inc., ITILITE, Koch Industries Inc., Oracle Corp., Sage Group Plc, SAP SE, Sodexo SA, The Access Group, VA Tech Ventures Pvt. Ltd., Webexpenses Pty Ltd., Workday Inc., Xero Ltd., Zaggle Prepaid Ocean Services Pvt. Ltd., and Zoho Corp. Pvt. Ltd.

Market dynamics

Parent market analysis, Market growth inducers and obstacles, Fast-growing and slow-growing segment analysis, COVID-19 impact and recovery analysis and future consumer dynamics, and Market condition analysis for the forecast period.

Customization purview

If our report has not included the data that you are looking for, you can reach out to our analysts and get segments customized.

Table of Contents

1 Executive Summary

2 Market Landscape

3 Market Sizing

4 Historic Market Size

5 Five Forces Analysis

6 Market Segmentation by Component

7 Market Segmentation by Application

8 Customer Landscape

9 Geographic Landscape

10 Drivers, Challenges, and Trends

11 Vendor Landscape

12 Vendor Analysis

13 Appendix

About UsTechnavio is a leading global technology research and advisory company. Their research and analysis focus on emerging market trends and provide actionable insights to help businesses identify market opportunities and develop effective strategies to optimize their market positions. With over 500 specialized analysts, Technavio's report library consists of more than 17,000 reports and counting, covering 800 technologies, spanning 50 countries. Their client base consists of enterprises of all sizes, including more than 100 Fortune 500 companies. This growing client base relies on Technavio's comprehensive coverage, extensive research, and actionable market insights to identify opportunities in existing and potential markets and assess their competitive positions within changing market scenarios.

ContactTechnavio ResearchJesse MaidaMedia & Marketing ExecutiveUS: +1 844 364 1100UK: +44 203 893 3200Email: [emailprotected]Website: http://www.technavio.com

SOURCE Technavio

More:
Expense Management Software Market size is set to grow by USD ... - PR Newswire

Read More..

Ahead of Apple’s iOS 17 update, iOS 16.6 update fixes bugs and brings security patches | Mint – Mint

Apple is currently gearing up to launch the iOS 16.6 update, as they have recently introduced the iOS 16.6 Public Beta 4 for iPhone users. This upcoming release is expected to primarily focus on bug fixes and security patches, but it will also bring some significant updates for iPhone users.

Apple is currently gearing up to launch the iOS 16.6 update, as they have recently introduced the iOS 16.6 Public Beta 4 for iPhone users. This upcoming release is expected to primarily focus on bug fixes and security patches, but it will also bring some significant updates for iPhone users.

While everyone is eagerly awaiting the release of iOS 17 later this year, Apple has already provided a preview of its features during the WWDC 2023 event. These features aim to enhance the iPhone experience by offering customization options for the call screen, updating the Messages app with Live stickers and faster gesture replies, introducing a new Journal app, and much more. So, iPhone users can look forward to an improved user experience ahead of the iOS 17 update.

While everyone is eagerly awaiting the release of iOS 17 later this year, Apple has already provided a preview of its features during the WWDC 2023 event. These features aim to enhance the iPhone experience by offering customization options for the call screen, updating the Messages app with Live stickers and faster gesture replies, introducing a new Journal app, and much more. So, iPhone users can look forward to an improved user experience ahead of the iOS 17 update.

Here are some details on iPhone's upcoming features with iOS 16.6 release:

Here are some details on iPhone's upcoming features with iOS 16.6 release:

iOS 16.6 is set to introduce a new feature that allows users to verify their interactions with the intended recipient. When multiple individuals who have activated this feature engage in a conversation, Apple will send an alert if there is any compromise in the security of the cloud servers. This will serve as a warning if the conversation becomes vulnerable to unauthorized access.

iOS 16.6 is set to introduce a new feature that allows users to verify their interactions with the intended recipient. When multiple individuals who have activated this feature engage in a conversation, Apple will send an alert if there is any compromise in the security of the cloud servers. This will serve as a warning if the conversation becomes vulnerable to unauthorized access.

According to the Public Beta, a new prompt is anticipated to be introduced for iCloud on Windows login attempts when the iPhone and Windows computer are not connected to the identical Wi-Fi network. The prompt will recommend using a different network and emphasize the necessity for both devices to be on the same network in order to continue.

According to the Public Beta, a new prompt is anticipated to be introduced for iCloud on Windows login attempts when the iPhone and Windows computer are not connected to the identical Wi-Fi network. The prompt will recommend using a different network and emphasize the necessity for both devices to be on the same network in order to continue.

According to the Gadget Hacks website, the Beats Studio Buds may receive additional icon options with the introduction of two new color icons. Specifically designed for the Beats Studio Buds, these icons represent the ivory and transparent versions of the earbuds. After updating to the upcoming iOS 16.6, users of Beats Studio Buds can anticipate the inclusion of either of these two new icons on their iPhone.

According to the Gadget Hacks website, the Beats Studio Buds may receive additional icon options with the introduction of two new color icons. Specifically designed for the Beats Studio Buds, these icons represent the ivory and transparent versions of the earbuds. After updating to the upcoming iOS 16.6, users of Beats Studio Buds can anticipate the inclusion of either of these two new icons on their iPhone.

The exact timing for experiencing these new features is currently unknown, as Apple has not disclosed the release date for iOS 16.6. However, it is expected to become available in the near future.

The exact timing for experiencing these new features is currently unknown, as Apple has not disclosed the release date for iOS 16.6. However, it is expected to become available in the near future.

Read the rest here:
Ahead of Apple's iOS 17 update, iOS 16.6 update fixes bugs and brings security patches | Mint - Mint

Read More..

Mission Linux: How the open source software is now a lucrative target for hackers – CSO Online

Growing at close to 20% year-over-year, the Linux operating system market is expected to touch $22.15 billion in 2029 from a mere $6.27 billion in 2022, according to Fortune Business Insights. However, with growth, comes opportunities, and sometimes these are opportunities for threat actors.

Linux has gained significant popularity and broader adoption in various domains, including servers, cloud infrastructure, Internet of Things (IoT) devices, and mobile platforms.

The increased adoption of DevOps and modern applications is making Linux the platform of choice for servers and hence developers are increasingly developing it.

"Linux powers critical infrastructure, servers, and cloud environments, making it an appealing target for attackers aiming to compromise sensitive data, disrupt services, or launch broader attacks," said Royce Lu, distinguished engineer at Palo Alto Networks.

In 2022, Palo Alto Networks observed Linux malware samples increase by 18.3% compared to 2021. Keeping with the trend of increasing attacks from December 2022 to May 2023, the maximum daily number of encounters with malicious ELF files (targeting Linux-based OSes) increased by almost 50%, according to Stefano Ortolani, threat research lead at VMware.

Improperly configured Linux systems or weak security practices, such as default or weak passwords, unpatched software, and unsecured network configurations can make them vulnerable to attacks.

However, as more critical systems are now running on Linux, it would also allow attackers to demand bigger ransom and hence a ransomware attack could potentially become more disruptive to customers.

"In addition to servers, millions of Internet of Things (IoT) devices run on Linux, effectively expanding the attack surface of organizations across all verticals, especially in critical infrastructure," Dean Houari, director of security technology and strategy at Akamai, APJ, said.

Ransomware groups such as Agenda, BlackCat, Hive, and RansomExx have also developed versions of their ransomware in the programing language Rust. Using Rust allows the groups to customize malware for Linux.

In March, APT, Iron Tiger updated its malware to target the Linux platform. In April, Chinese hackers, Alloy Taurus,launched a Linux variant of PingPull malware. In May, a new variant of the IceFire ransomware started targeting Linux enterprise systems.

Another reason that could be attributed to the increase in attacks is the vulnerabilities in applications running on Linux. "We saw the Log4j attack because of a vulnerability in the Apache server. Apache runs on Linux as well and thus such vulnerabilities can also mean increased attacks," said Sharda Tickoo, technical director for India & SAARC at Trend Micro.

While ransomware targeting Linux-based systems has been on the rise, a huge share of encounters is still variants of Mirai repurposed to mine Bitcoins or Monero, Ortolani said.

"As long as cryptocurrencies are easily fungible, we can expect more and more cybercriminals to take advantage of insufficiently protected systems," Ortolani said.

While Linux systems were generally considered secure, analysts say the need of the hour is to focus on timely vulnerability patches.

"The strategy used to infect Linux systems is different from Windows as Linux is more susceptible to vulnerabilities", Houari said."The high number of Linux vulnerabilities and dependency on open source code is a challenge for security teams to ensure that they are patched in a timely manner which could allow attackers to gain access to these systems effectively bypassing the perimeter security and obtaining privileged access for further reconnaissance and attacks."

Organizations must adopt a zero trust strategy to embed security into the infrastructure so that it is possible to systematically address the threat vectors at all levels thereby reducing the overall attack surface, according to Ortolani. Organizations need to have strong authentication and access controls, monitor and log activities, utilize security-hardening techniques, and educate users about best practices for using Linux systems securely.

Go here to see the original:
Mission Linux: How the open source software is now a lucrative target for hackers - CSO Online

Read More..

Supermicro Microcloud AMD Ryzen 7000 Blades for Cloud Gaming, Virtualization – StorageReview.com

Supermicro has unveiled a new server solution aimed at meeting the high-performance and scalability needs of todays IT and data center owners. The Supermicro Microcloud AS-3015MR-H8TNR is an 8-blade chassis, which features Super H13SRD-F motherboard-based nodes that support the AMD Ryzen 7000 Zen 4 core architecture.

Supermicro has unveiled a new server solution aimed at meeting the high-performance and scalability needs of todays IT and data center owners. The Supermicro Microcloud AS-3015MR-H8TNR is an 8-blade chassis, which features Super H13SRD-F motherboard-based nodes that support the AMD Ryzen 7000 Zen 4 core architecture.

These AMD processors deliver exceptional performance with a maximum boost speed of up to 5.7 GHz, allowing them to support PCIe Gen5 storage, up to 128GB DDR5-5200 MHz RAM per node, and up to 16 cores (32 threads) per CPU. Supermicro collaborated closely with AMD to optimize the Ryzen 7000 Series firmware specifically for their server usage and will be able to bring these advanced, optimized solutions to the market very soon.

The Microcloud AS-3015MR-H8TNR is designed for diverse applications such as E-commerce, cloud gaming, code development, content creation, and virtual private servers. Supermicro emphasized that they will offer IT administrators a compact and high-performance option and allow them to deliver services with reduced latencies to both internal and external customers.

While this node-based server shares the chassis, power supply, and cooling system, this is a modular server architecture where individual nodes contain their own set of CPU, memory, and storage, combined to form a larger server infrastructure.

This allows for a ton of scalability, flexibility, and efficient resource allocation, making it ideal for cloud computing, virtualization, and high-performance computing applications. These server types are easier to manage and maintain, have improved resource utilization, and feature the ability to scale resources independently, resulting in better performance and cost efficiency.

Supermicro AS-3015MR-H8TNR Details

The A+ Server AS-3015MR-H8TNR nodes are serviced from the rear and are each powered by the Super H13SRD-F motherboard, offering impressive performance and versatility for demanding computing tasks.

Each node features a single Socket AM5 (LGA-1718) CPU, supporting the AMD Ryzen Zen4 7000 series Processors for up to 16 cores and 32 threads per CPU. Interestingly, Supermicro states that it can support CPUs with a TDP (a measure of the maximum amount of heat generated by a specific component) of 65W all the way up to an impressive 170W. It is able to handle this due to its highly efficient air-cooled design.

In terms of memory, each node provides 4 DIMM slots, accommodating up to 128GB of DDR5 UDIMM memory running at 5200MHz. The system supports various storage options, including 2x 3.5 hot-swap NVMe/SAS/SATA drive bays or two U.2 NVMe drives, offering high-speed and flexible storage capabilities. Additionally, there is an M.2 NVMe slot available.

The server is also outfitted with one PCIe 5.0 x16 LP that can accommodate a low-power GPU (NVIDIA L4, A2, T4) and one PCIe 5.0 x8 MLP expansion slot (for networking) to provide even more flexibility.

The server ensures reliable and efficient cooling with its 4x 8cm heavy-duty fans and strategically placed air shrouds. It effectively manages the temperature and monitors critical components, including CPU cores, voltage levels, and memory, ensuring optimal performance and stability. The chassis is designed in a 3U rackmount form factor, featuring a compact and sturdy build.

The server is equipped with advanced security features, including a Trusted Platform Module (TPM) 2.0, ensuring secure operations and protecting sensitive data.

Powering this server is a 2,200W redundant titanium-level power supply, providing reliable and efficient power delivery. It complies with RoHS standards and operates within a wide temperature range of 10C to 35C (50F to 95F), making it suitable for a range of environments.

Supermicro product page

Engage with StorageReview

Newsletter|YouTube| PodcastiTunes/Spotify|Instagram|Twitter|TikTok|RSS Feed

Continued here:
Supermicro Microcloud AMD Ryzen 7000 Blades for Cloud Gaming, Virtualization - StorageReview.com

Read More..

Microsoft opens new front in cloud wars with OpenAIs help – Yahoo News

The Scoop

OpenAI, the company behind ChatGPT, has been quietly training artificial intelligence models on a narrow topic that is useful mainly to a small slice of people in the IT industry: Microsofts cloud services, known as Azure, according to people with knowledge of the project.

Microsoft and OpenAI have a partnership to offer AI products to Microsoft customers. The new training, which has not been previously reported, could help the Windows developer sell its cloud services by automating processes that previously required large IT resources, these people said. OpenAI has yet to include the new training into any of its products, one of the people said.

The training may offer a window into Microsofts long-term cloud strategy and reflects how AI is reshuffling the cloud computing industry, which is expected to grow north of $2 trillion by 2030, as Amazon, Microsoft, Google, and Oracle intensify the fight for market share.

Microsoft and OpenAI declined to comment.

Microsoft likely noticed the traction that Oracle has gotten on its cloud computing message.

Oracle is working with Cohere, a provider of foundational AI models, and has partnered with computing company Nvidia to promise a cheaper and more open option than those of its competitors.

In the cloud, since you pay by the minute, if you run twice as fast and we do you pay half as much, Oracle chairman Larry Ellison told analysts earlier this month.

For all the attention AI has gotten lately, the biggest impact wont come until large companies start implementing it on a massive scale, an effort that, for now, is taking place largely on the cloud.

Large language models and other kinds of generative AI have upended the cloud computing landscape. Every major business is scrambling to tap into those powerful models, fearing that if they dont, they might be left behind. And the fastest and easiest way to do that is through cloud providers.

In the past, there have been two main categories of cloud customers: Large, deep-pocketed entities that employ huge IT staffs to run complex cloud operations and smaller to medium-sized businesses that use the cloud for simple applications that the cloud providers largely manage.

Story continues

Companies like Google and Oracle are betting they can use AI to open up a new category of customer: One that can use language interfaces like ChatGPT to run complex cloud operations with fewer resources. Googles Duet AI cloud product is aimed pretty squarely at that customer.

Oracle encourages its customers to use different cloud services for different needs, known as a multi-cloud approach. And while Google and Microsoft also support multi-cloud, Oracle appears to have embraced that philosophy in its AI strategy. Instead of developing mainly proprietary, in-house models, its working with outside providers like Cohere.

The revelation that OpenAI is training specifically on Azure products is a sign of how fast-moving and competitive the cloud industry has become.

Its not enough just to have the best AI models available. Companies also need to hand customers the key to the cloud on a silver platter.

This is also a sign of where consumer internet products are heading. If something as complex as cloud computing can be transformed by natural language AI, then everything is going to go in that direction.

Clicking, navigating, and searching knowledge bases will soon become unacceptable friction for consumers. If companies cant offer their products with natural language interfaces with a zero learning curve, they wont be able to compete for long.

Dell, which also struck a partnership with Nvidia, is pushing an alternative vision for AI. Rather than use the cloud, Dell thinks companies should save money and protect data by building their own servers to run AI models. Dell announced the initiative, called Project Helix, last month.

Cloud computing, which means running computer programs on powerful, internet-connected servers instead of on local devices, was the key enabler of Web 2.0. Without cloud computing, companies like Netflix, Uber, Airbnb, and Dropbox would not have been able to grow so quickly or operate at all.

As more companies utilized cloud services, Amazon Web Services emerged as the behemoth in the industry, with more than 30% market share. Microsoft and Google trail in second and third place. Much of what you do on the internet is routed through one of those three companies.

Microsoft spent roughly two years getting ready to offer OpenAIs technology to customers and gained the first-mover advantage. Of all the companies that have jumped on the generative AI bandwagon, a large percentage are using Microsofts cloud to tap into OpenAI models.

But the market is only just getting started and a lot can change. Other companies are quickly catching up. Google, which pioneered the transformer model that ChatGPT and other generative AI is built on, is offering a wide array of AI models.

Roy Illsley, the U.K.-based chief analyst focusing on cloud and data center practices for research firm Omdia, expects the rapid expansion and competition in cloud computing to continue through next year. But the big question mark is what happens with European regulation.

Illsley believes the regulation could pick de facto winners if some companies are better equipped to adjust to the changes. One possibility is that cloud services running AI models may be required to operate physically within Europe.

The EU regulations could put the cat amongst the pigeons, he said. Ultimately, that will shake the market and how it will be deployed for people.

Oracle jumped into the generative AI race early by courting AI startups to train models on its cloud, which was built around AI-specific tasks, as this Information article pointed out in February.

See more here:
Microsoft opens new front in cloud wars with OpenAIs help - Yahoo News

Read More..