Page 1,568«..1020..1,5671,5681,5691,570..1,5801,590..»

Scale Computing Expands Edge to Cloud Video Surveillance with Wasabi Surveillance Cloud – Yahoo Finance

INDIANAPOLIS, March 29, 2023 /PRNewswire/ -- Scale Computing, the market leader in edge computing, virtualization, and hyperconverged solutions, today announced its edge video surveillance solutions have been extended to include cloud video surveillance storage with Wasabi Surveillance Cloud and theIntel NUC Enterprise Edge Compute Built with Scale Computing. Together, Scale Computing and Wasabi deliver an edge to cloud surveillance solution that is easy to use, minimizes disruption, and allows access to video as usual, and when paired with the Intel EEC customers have a bottomless-storage, edge to cloud appliance. The company also announced its participation at ISC West in Las Vegas this week.

Scale Computing (PRNewsfoto/Scale Computing)

"Video and AI are going through a massive transformation, creating an opportunity for the industry to leverage edge technologies from companies like Scale Computing and Wasabi that enable better performance, agility, choice, and cost," said Kasia Hanson, Global Director, Video, Safety & Security Sales at Intel. "As the video surveillance and security markets continue to grow rapidly, shifting from analog video cameras, CCTV, and proprietary recording appliances to digital IP-based cameras, the demand for near real-time response is driving this need for computing power at the edge of a network. By combining the power of Intel NUC EEC with the simplicity and reliability of Scale Computing HyperCore software, organizations have an efficient, scalable, and comprehensive edge computing solution."

"Organizations are making significant technology investments in video surveillance, and Wasabi Surveillance Cloud is a first-of-its-kind solution offered by a cloud provider that enables these organizations to offload video surveillance footage from their local storage environment directly to the cloud without ever running out of capacity," said David Boland, VP of Cloud Strategy at Wasabi. "This 'bottomless' approach to video storage, combined with Scale Computing, is vital for the surveillance industry as it struggles to manage enormous amounts of video in high resolution environments and increasingly large file sizes tied to surveillance."

Story continues

Scale Computing and Wasabi combine industry-leading, on-premises edge computing with easy-to-use cloud data retention and archival to create the agile, hybrid-cloud environment needed today. With seamless integration with all major VMS providersinside of Wasabi Surveillance Cloud, Scale Computing is now able to expand to organizations' needs for critical video surveillance at the edge to the cloud.

Key benefits include:

Easy Management: Moving "cold video files" to the cloud from Scale Computing Platform with minimal admin effort and no impact on users or applications. With Wasabi Surveillance Cloud, 80 percent or more of an organization's video files, on average, can be off-loaded from on-site storage to lower-cost Wasabi cloud storage, freeing up capacity for additional video data.

Cost savings: Every terabyte of video removed from existing primary storage generates real savings by delaying the substantial cost of adding additional on-site storage. This includes not just the cost of the hardware, but also the licensing and maintenance costs, network costs, energy costs, and data center costs.

Flexibility: Whether a company needs disaster recovery, an extension of their storage, or a combination of both.

Dedicated video surveillance infrastructure and storage: Running VMS software on top of hyperconverged infrastructure such as SC//HyperCore provides even greater benefits including high availability failover, data redundancy, rolling upgrades for infrastructure maintenance and the ability to scale out compute and storage capacity of the overall system as needs inevitably change.

"We're seeing a lot of security organizations and businesses beginning to adopt cloud storage as a way to reduce video storage complexity and costs. As they do so, one of the main obstacles that they face is converting the file-based format to a cloud object storage format," said Scott Loughmiller, Chief Product Officer and co-founder of Scale Computing. "Organizations can now combine on-premises Scale Computing clusters and Wasabi Hot Cloud Storage, allowing recent video to be stored locally at the edge until it's moved to the cloud where it can be kept for as long as the organization needs it."

To learn more about edge to cloud video surveillance, please visit the Scale Computing team at Wasabi booth #2077 at ISC West (March 28 - 30). Scale Computing is also hosting a Partner Power Hour at 2pm PT on Wednesday, March 29, inside Booth #2077.

For more information on Scale Computing, please visit https://www.scalecomputing.com/video-and-surveillance-infrastructure-solutions

About Scale ComputingScale Computingis a leader in edge computing, virtualization, and hyperconverged solutions. Using patented HyperCore technology, Scale Computing Platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime, even when local IT resources and staff are scarce. Edge Computing is the fastest growing area of IT infrastructure, and industry analysts have named Scale Computing an outperformer and leader in the space, including being named the #1 edge computing vendor by CRN. Scale Computing's products are sold by thousands of value-added resellers, integrators, and service providers worldwide. When ease-of-use, high availability, and TCO matter, Scale Computing Platform is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate, G2, and TrustRadius.

Cision

View original content to download multimedia:https://www.prnewswire.com/news-releases/scale-computing-expands-edge-to-cloud-video-surveillance-with-wasabi-surveillance-cloud-301781417.html

SOURCE Scale Computing

Read more here:
Scale Computing Expands Edge to Cloud Video Surveillance with Wasabi Surveillance Cloud - Yahoo Finance

Read More..

Hostingo WordPress: Cheap and the Best Cloud Hosting for … – Expat Guide Turkey

Websites are known as important tools used to strengthen the online presence of businesses and individuals. However, it is equally important to use the right tools to create a website. WordPress is one of the most popular website platforms worldwide, as well as this platform is preferred because it is easy to use, customizable, and scalable. Hostingo is an ideal solution for WordPress hosting and stands out for its performance and security.

When creating your website, if you are using WordPress, it is quite important to choose the right hosting provider. Most of the factors that affect your websites performance, speed, reliability, and SEO ranking are determined by your hosting provider. Hostingo is known for its cheapness and the best cloud hosting for wordpress

Hostingo provides a quality WordPress hosting service at cheap prices. Hosting packages can be customized according to your budget and needs. This way, instead of paying too much for unnecessary features, you can control your budget by choosing the services you need. If you are looking for cheap WordPress hosting, the right address is hostingo.com/wordpress-hosting

Hostingo is recently among the cheapest hosting services compared to other WordPress hosting providers. In addition, the low price does not affect the quality of service. Hostingo guarantees its customers the high performance of your website and fast loading times. If you are looking for the cheapest WordPress hosting, Hostingo is the right address.

Hostingo is one of the hosting providers that offer the best cloud hosting for wordpress , Cloud hosting has the latest technologies to improve the performance and speed of your website. Hostingo WordPress provides customized cloud hosting services according to the needs of your website. In this way, it ensures high performance and fast update time for your website.

Hostingo offers all the services you need for hosting your website in the best way. The hosting service designed specifically for WordPress is optimized to improve the performance of your website and provide fast loading times. In addition, it takes the necessary measures to ensure your security and ensures that your website is backed up regularly.

Hostingo offers high-quality and cheap WordPress hosting services. The best cloud hosting services, improves the performance of your website and increases your SEO ranking. If you are looking for affordable and high-performance hosting services, Hostingo is one of the best options for your search for the cheapest WordPress hosting.

Read more from the original source:
Hostingo WordPress: Cheap and the Best Cloud Hosting for ... - Expat Guide Turkey

Read More..

Moving to a Private Cloud Things to Consider – Industry Analysts Inc

The process for moving your PaperCut MF Application Server between two on-premises servers is the same whether youre moving it to a cloud platform hosted by Google, Microsoft, or Amazon. The distinction is in the extra work youll put in up front to make sure cloud hosting is appropriate for your business and in the back end to confirm that your solution still works as planned after moving to remote infrastructure.

Consider the following issues before you start planning such a migration:

Q Is my internet connection reliable and fast enough for my company to rely on it for printing?

Click Here to Read the Rest!

Interested in learning more? Click Here or Email us sales@ecoprintq.com to get more about hosting scenarios and how we can help you make your business more efficient.

SOURCE ecoprintQ

Read more from the original source:
Moving to a Private Cloud Things to Consider - Industry Analysts Inc

Read More..

Cloud Native Applications Market worth $17.0 billion by 2028 – Exclusive Report by MarketsandMarkets – Yahoo Finance

CHICAGO, March 27, 2023 /PRNewswire/ --The global Cloud Native Applications Market size is estimated at USD 5.9 billion in 2023 and is projected to reach USD 17.0 billion by 2028, at a CAGR of 23.7% during the forecast period, according to a new report by MarketsandMarkets.

MarketsandMarkets Logo

Download PDF Brochure @ https://www.marketsandmarkets.com/pdfdownloadNew.asp?id=53431081

Platforms segment to hold the largest market size during the forecast period

A cloud native application is made of discrete, reusable components called microservices that can be integrated into any cloud environment. Microservices serve as building blocks and are frequently packaged in containers. Microservices work together to form an application as a whole, but each can be independently scaled, continuously improved, and rapidly iterated via automation and orchestration processes. Each microservice's flexibility contributes to the agility and continuous improvement of cloud-native applications. Cloud native is a method of developing and running applications that takes advantage of the benefits of the cloud computing delivery model. Companies that build and operate applications using a cloud native architecture bring new ideas to market faster and respond to customer demands more quickly. While public cloud has changed the way people think about infrastructure investment in almost every industry, cloud-like delivery isn't limited to public environments. Cloud native development is appropriate for both public and private clouds; it is about how applications are created and deployed rather than where they are created and deployed. More importantly, the ability to provide developers with on-demand access to computing power as well as modern data and application services is critical. Cloud native development combines DevOps, continuous delivery, microservices, and containers. A cloud-native platform is built, optimized, and run entirely in the cloud. Cloud-based tools are fast and scalable because the platform is built in the cloud. This technology provides reliable functionality, seamless interconnectivity, and enhanced business continuity. Cloud-native systems are built entirely in the cloud and provide developers with new and advanced deployment tools for the rapid evolution of the enterprise's overall architecture. They simplify the design and administration of complex infrastructure. Cloud hosting technology refers to cloud technologies that provide cloud processing and storage. The service provider manages the cloud-based infrastructure, software, and tools. The cost is variable and dependent on the user's requirements.

Story continues

Healthcare & life sciences vertical to record the highest CAGR during the forecast period

By accelerating the digital transformation, healthcare companies are adapting and innovating faster than ever before to improve their healthcare services. This technology is gaining traction, allowing for better care delivery while also improving financial and operational outcomes. Cloud-native helps healthcare by easing onboarding and reducing the use of internal resources. Healthcare organizations that are already using cloud services and migrating to cloud-native platforms will find the process easier because the majority of the hardware and software requirements will be met. Because such cloud-native technology is flexible and scalable, healthcare ideas and plans can be easily brought to market and respond to customer needs more quickly. Connected devices continuously transmit data, and the amount of unstructured and structured data generated by the healthcare industry is massive. A single platform system for data collection, preservation, access, and compilation is now required, and health professionals are increasingly aware of the need for such systems. The use of cloud computing in healthcare allows for real-time data analysis, which improves accessibility and workflows, resulting in more proactive healthcare. When migrating from legacy systems to cloud platforms, privacy and security are of the utmost importance. Cloud-native platforms are an excellent solution to these issues. The use of cloud-native platforms can shift the emphasis away from the software, hardware, and infrastructure burden. It protects against data breaches and security breaches while also ensuring compliance with the Health Insurance Portability and Accountability Act (HIPAA) and the General Data Protection Regulation (GDPR) (GDPR).

Request Sample Pages @ https://www.marketsandmarkets.com/requestsampleNew.asp?id=53431081

North America is projected to have the largest market sizeduring the forecast period

North America is expected to have the largest market size in the CNA market, and the trend is expected to continue till 2028. With the new Cloud Native and Orchestration Center in North America, Ericsson is doubling down on cloud native. Cloud native is a modern approach to developing and running software applications that takes advantage of cloud computing's flexibility, scalability, and resilience. Ericsson has launched the new Cloud Native and Orchestration Center with a focus on North America, where operators are at the forefront of the cloud native transformation. Ericsson's new center, which brings together more than 100 experts from across the US and Canada, will use this expertise to design, develop, implement, and support the life cycle management of cloud native solutions for customers worldwide. All network functions are migrating to cloud native platforms, from cloud native 5G core to cloud/virtualized RAN, and North America is at the forefront of this telco cloud native transformation. This new Cloud Native and Orchestration Center in North America will assist them with challenges such as platform and application life cycle management, migration, and automation, all of which are more complex for telco solutions. The Cloud Native and Orchestration Center is a virtual collaboration of Ericsson employees in Plano, Texas, as well as other locations across Canada and the US. Ericsson's Software Delivery Unit will also assist the team, as will Ericsson D-15 Labs in Silicon Valley. Services are critical in the cloud storage market because they support clients both before and after they adopt cloud storage solutions. Service providers assist their clients with various phases such as designing, establishing, maintaining, and updating CNA solutions.

Market Players

Some prominent players across all service types profiled in the Cloud Native Applications Market study include Amazon (US), Google (US), IBM (US), Infosys (India), LTI Mindtree (India), Microsoft (US), Oracle (US), Red Hat (US), SAP (Germany), VMware (US), Alibaba Cloud (Singapore), Apexon (US), Citrix (US), Cloudhelix (Sussex), and Cognizant (US).

Browse Adjacent Markets:Software and Services MarketResearch Reports & Consulting

Related Reports:

Master Data Management Market- Global Forecast to 2027

Green Data Center Market- Global Forecast to 2026

Desktop Virtualization Market- Global Forecast to 2027

Multi-cloud Security Market- Global Forecast to 2027

Content Services Platforms Market- Global Forecast to 2027

About MarketsandMarkets

MarketsandMarkets is a blue ocean alternative in growth consulting and program management, leveraging a man-machine offering to drive supernormal growth for progressive organizations in the B2B space. We have the widest lens on emerging technologies, making us proficient in co-creating supernormal growth for clients.

The B2B economy is witnessing the emergence of $25 trillion of new revenue streams that are substituting existing revenue streams in this decade alone. We work with clients on growth programs, helping them monetize this $25 trillion opportunity through our service lines - TAM Expansion, Go-to-Market (GTM) Strategy to Execution, Market Share Gain, Account Enablement, and Thought Leadership Marketing.

Built on the 'GIVE Growth' principle, we work with several Forbes Global 2000 B2B companies - helping them stay relevant in a disruptive ecosystem. Our insights and strategies are molded by our industry experts, cutting-edge AI-powered Market Intelligence Cloud, and years of research. The KnowledgeStore (our Market Intelligence Cloud) integrates our research, facilitates an analysis of interconnections through a set of applications, helping clients look at the entire ecosystem and understand the revenue shifts happening in their industry.

To find out more, visit http://www.MarketsandMarkets.comor follow us on Twitter, LinkedInand Facebook.

Contact:

Mr. Aashish MehraMarketsandMarkets INC.630 Dundee RoadSuite 430Northbrook, IL 60062USA: +1-888-600-6441Email: sales@marketsandmarkets.comResearch Insight: https://www.marketsandmarkets.com/ResearchInsight/cloud-native-applications-market.aspVisit Our Website: https://www.marketsandmarkets.com/Content Source: https://www.marketsandmarkets.com/PressReleases/cloud-native-applications.asp

Logo: https://mma.prnewswire.com/media/660509/MarketsandMarkets_Logo.jpg

Cision

View original content:https://www.prnewswire.com/news-releases/cloud-native-applications-market-worth-17-0-billion-by-2028---exclusive-report-by-marketsandmarkets-301781818.html

SOURCE MarketsandMarkets

View original post here:
Cloud Native Applications Market worth $17.0 billion by 2028 - Exclusive Report by MarketsandMarkets - Yahoo Finance

Read More..

The Future of Colocation Hosting and How it is Evolving to Meet … – Robotics and Automation News

Colocation is a type of hosting where the hosting firm rents out space in its data center. You have the space you need in the data centers to manage your needs and keep your server.

Even though they wont be in control of the hardware and software the server colocation hosting provider assumes full responsibility for keeping a secure server environment.

Unlike cloud hosting, server colocation hosting necessitates that customers supply their own hardware. They look for a place that will accommodate their gear and software. When you choose cloud hosting in contrast your supplier includes both the hardware and the hosting space.

In a server colocation facility hosting for servers is very different from managed hosting. While the latter is in charge of managing and maintaining the servers the former is only responsible for retaining your server by providing the best hosting space.

Colocation hosting is the best solution for businesses that are in control of their hardware and software resources.

Your colocation hosting provider makes the necessary conditions for your resources to be kept in the defined area. Space is allotted in accordance with the plan you bought.

These server colocation hosting companies accept the need to deliver the greatest server environment possible through first-rate server administration. However, the colocation clients are responsible for handling any resource-based needs or expansions that arise within.

As a result, server colocation is the ideal solution for clients that lack the specialized server management and experience required to meet their expanding server requirements. The colocation service provider for servers stays out of the way of expanding demands and server operations.

Colocation hosting has been developing quickly to accommodate the changing needs of businesses. It is a sort of data center service that enables companies to rent physical space, power, cooling, and connectivity for their servers and other IT equipment. The followings are some of the trends and advancements influencing colocation hosting in the future:

Businesses are increasingly opting for colocation hosting services that offer better flexibility and scalability as a result of the rise of cloud computing. In response colocation providers are providing flexible contract periods and the option to add or remove equipment as necessary.

As environmental consciousness increases, businesses are looking for colocation providers who promote sustainability. This has led to an increase in the usage of energy-efficient technology, such as green electricity energy-saving cooling systems, and the use of recycled materials in data center construction.

Security has emerged as a top concern for businesses due to the increasingly complex and pervasive nature of cyber attacks. To safeguard their clients sensitive data and IT systems colocation providers are investing in cutting-edge security features like biometric access control round-the-clock monitoring, and multi-layer firewalls.

Edge computing, a technology that analyses data closer to the source of data generation, is becoming more and more popular as the volume of data generated by a lot of devices keeps growing.

Colocation providers are investing in edge data centers to give businesses the option of processing and storing data closer to the source reducing latency and improving performance.

Businesses want quicker and more dependable connectivity as cloud computing and other data-intensive technologies become increasingly popular.

To accommodate this demand colocation service providers are making investments in fast fiber optic networks and other cutting-edge connectivity technologies.

Today, many firms combine on-premises private cloud and public cloud solutions. In response to this trend, colocation providers are providing multi-cloud solutions that let companies store their data across many platforms and locations.

Artificial intelligence and machine learning are being used by colocation providers to increase the effectiveness and dependability of their data centers. AI-powered systems, for instance, may monitor and anticipate equipment problems, improve cooling and power usage, and decrease downtime.

In conclusion, uk colo hosting is evolving to better meet the changing needs of businesses by offering more flexibility, sustainability, security, edge computing capabilities, and high-speed connectivity.

As businesses rely more and more on IT to support their operations, colocation hosting will remain crucial in helping them manage and protect their data and IT systems.

As long as organizations continue to demand more efficient, secure, and environmentally friendly data center solutions colocation hosting has a bright future.

As technology advances, colocation service providers will continue to invest in new goods and services to meet the changing demands of their clients.

You might also like

Go here to see the original:
The Future of Colocation Hosting and How it is Evolving to Meet ... - Robotics and Automation News

Read More..

8 Basic Server Types Used in Computer Networking – MUO – MakeUseOf

In modern programming, the prevailing architecture relies on client-server communication. A client computer requests data from a server. The server receives the request and responds to it with the data or an error of some sort.

The word server can refer to both computer hardware and software that provides functionality for other programs.

Servers play a vital role in the consumption of goods and services and many types are used in computer networking. Learn what they are, their use cases, and how they differ.

An origin server listens to and responds to incoming internet requests. It's typically used in conjunction with edge and caching servers. Origin servers consist of one or more programs delivering web content to clients.

It's commonly used to serve clients like a website with data. Origin servers can be slow. This is because speed depends on the distance between the client and the server. The server has to process clients' requests and responses, which delays loading.

You can reduce the latency of origin servers using a Content Delivery Network (CDN). A CDN consists of distributed servers that cache content close to the client. This reduces the distance between an origin server and a client, reducing latency.

CDNs easily transfer internet assets like HTML pages, JavaScript files, images, and videos. These assets assist in the transfer of internet content.

A Proxy server is an application that acts as an intermediary between a client and a server. They process a request on behalf of the client and mask its identity. They deliver the response from the source server.

Proxy servers act as content control software. They filter encrypted data, log, access services, and boost security in the network. Proxy servers use different types of protocols to get work done.

You can create your own Proxy server to help hide the identity of your devices on the web. This can lessen the chance of you suffering an attack. Organizations use proxy servers to restrict the type of web content available on their network. They work together with origin servers to reduce latency and improve security.

A web server is both software and hardware that processes requests over the web. Web servers use network protocols to process content. These protocols include HTTP (Hypertext Transfer Protocol), SMTP (Simple Mail Transfer Protocol), and FTP (File Transfer Protocol).

Web servers work to display website content. They process, store, and deliver content through the web, to users. The web server hardware connects and exchanges data with connected devices.

The software controls how a user accesses the data. You can use web servers in web hosting or hosting data for web-based applications.

Database servers manage databases containing data or information. They can be any server that maintains files in a database application. They control access to the database for authorized users.

Programmers create databases on database servers using scripting languages like SQL. Applications have to connect to the database server to access the database.

Database servers keep backup data in a central location. They allow authorized users and applications on the network to access the data. Organizations use database servers to filter client requests and protect data.

One database can have several servers, and several databases can have one server. Examples of database servers include Microsoft SQL Server or Oracle.

A cloud server is a centralized server hosted remotely by a cloud service provider. Clients can access the server via an internet connection. Like physical servers, cloud servers can store, process and deliver data. Cloud servers provide services to clients remotely regardless of location.

Cloud servers are physical servers delivered through the internet. This happens through a process called virtualization. When a hypervisor abstracts physical servers, it creates a virtual resource. The virtual resource is then automated and delivered to clients through the internet.

Clients that use cloud servers don't own or manage their own physical servers. Instead, a third-party organization provides server services. This is the infrastructure-as-a-service (IaaS) model.

It's a form of cloud computing that provides virtual services over the internet. Clients pay to use cloud servers to store and manage resources and scale whenever they want. Clients can share a public cloud or have a private or hybrid cloud(on-premise and virtual). Examples of cloud server providers include Amazon Web Services and Microsoft Azure.

Mail servers control the sending and receiving of mail over a network. Receives mail from clients and delivers mail to other mail servers and clients. Mail servers handle and deliver email over a network like the internet.

A mail server powers email services. It receives an email from a client and delivers it to another mail server. A client can be any computing software, for example, a desktop or mobile device. Mail servers use SMTP to process and deliver information. Gmail provides a free SMTP server that you can use to send emails from your app or website. Examples of clients that use mail servers include Gmail, Yahoo, etc.

A DNS (Domain Name Service) server translates domain names to corresponding IP addresses. Your browser references a DNS server when you type a domain name into your browser. In a computer network, all devices have an identifying IP address. They use the IP address to identify themselves when connecting to the internet.

A DNS server lets you avoid memorizing IP addresses. Instead, typing in a domain name translates into the IP address and finds the resource you seek. There are dynamic DNS servers and static DNS servers. You can either do it manually or use a free dynamic DNS provider.

A DHCP (Dynamic Host Communication Protocol) server configures the network settings of client computers. It dynamically allocates IP addresses to computers in a LAN network. Without a DHCP server, you would have to configure IP addresses for each device in your network manually.

Servers exist to facilitate the provision of data to users. They can manage a network, share programs, host databases and web pages, and transfer e-mail.

There are many other types of servers used in computer networking. Others like FTP servers, application servers, DHCP, and file servers are equally important. Each server has specific functions and use cases.

It's important to know how servers function if you work in tech. Understanding servers helps you to maximize their capabilities on physical and virtual platforms.

Continue reading here:
8 Basic Server Types Used in Computer Networking - MUO - MakeUseOf

Read More..

Scale Computing Expands Edge to Cloud Video Surveillance with … – PR Newswire

INDIANAPOLIS, March 29, 2023 /PRNewswire/ -- Scale Computing, the market leader in edge computing, virtualization, and hyperconverged solutions, today announced its edge video surveillance solutions have been extended to include cloud video surveillance storage with Wasabi Surveillance Cloud and theIntel NUC Enterprise Edge Compute Built with Scale Computing. Together, Scale Computing and Wasabi deliver an edge to cloud surveillance solution that is easy to use, minimizes disruption, and allows access to video as usual, and when paired with the Intel EEC customers have a bottomless-storage, edge to cloud appliance. The company also announced its participation at ISC West in Las Vegas this week.

"Video and AI are going through a massive transformation, creating an opportunity for the industry to leverage edge technologies from companies like Scale Computing and Wasabi that enable better performance, agility, choice, and cost," said Kasia Hanson, Global Director, Video, Safety & Security Sales at Intel. "As the video surveillance and security markets continue to grow rapidly, shifting from analog video cameras, CCTV, and proprietary recording appliances to digital IP-based cameras, the demand for near real-time response is driving this need for computing power at the edge of a network. By combining the power of Intel NUC EEC with the simplicity and reliability of Scale Computing HyperCore software, organizations have an efficient, scalable, and comprehensive edge computing solution."

"Organizations are making significant technology investments in video surveillance, and Wasabi Surveillance Cloud is a first-of-its-kind solution offered by a cloud provider that enables these organizations to offload video surveillance footage from their local storage environment directly to the cloud without ever running out of capacity," said David Boland, VP of Cloud Strategy at Wasabi. "This 'bottomless' approach to video storage, combined with Scale Computing, is vital for the surveillance industry as it struggles to manage enormous amounts of video in high resolution environments and increasingly large file sizes tied to surveillance."

Scale Computing and Wasabi combine industry-leading, on-premises edge computing with easy-to-use cloud data retention and archival to create the agile, hybrid-cloud environment needed today. With seamless integration with all major VMS providersinside of Wasabi Surveillance Cloud, Scale Computing is now able to expand to organizations' needs for critical video surveillance at the edge to the cloud.

Key benefits include:

"We're seeing a lot of security organizations and businesses beginning to adopt cloud storage as a way to reduce video storage complexity and costs. As they do so, one of the main obstacles that they face is converting the file-based format to a cloud object storage format," said Scott Loughmiller, Chief Product Officer and co-founder of Scale Computing. "Organizations can now combine on-premises Scale Computing clusters and Wasabi Hot Cloud Storage, allowing recent video to be stored locally at the edge until it's moved to the cloud where it can be kept for as long as the organization needs it."

To learn more about edge to cloud video surveillance, please visit the Scale Computing team at Wasabi booth #2077 at ISC West (March 28 - 30). Scale Computing is also hosting a Partner Power Hour at 2pm PT on Wednesday, March 29, inside Booth #2077.

For more information on Scale Computing, please visit https://www.scalecomputing.com/video-and-surveillance-infrastructure-solutions

About Scale ComputingScale Computingis a leader in edge computing, virtualization, and hyperconverged solutions. Using patented HyperCore technology, Scale Computing Platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime, even when local IT resources and staff are scarce. Edge Computing is the fastest growing area of IT infrastructure, and industry analysts have named Scale Computing an outperformer and leader in the space, including being named the #1 edge computing vendor by CRN. Scale Computing's products are sold by thousands of value-added resellers, integrators, and service providers worldwide. When ease-of-use, high availability, and TCO matter, Scale Computing Platform is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate, G2, and TrustRadius.

SOURCE Scale Computing

Follow this link:
Scale Computing Expands Edge to Cloud Video Surveillance with ... - PR Newswire

Read More..

Microsofts CEO said he never expected to land the top jobthis is his best piece of career advice – Yahoo Finance

When Satya Nadella walked through the doors of Microsoft's Washington offices in 1992 he told himself, "This is the greatest job on earth. I don't need anything more."

Twenty-two years later, he was named CEO of the company.

Speaking to LinkedIn's CEO Ryan Roslansky as part of its The Path video series, Nadella revealed that when he was growing up his focus wasn't on his studies, but on cricket. His parents, his father a civil servant and his mother a Sanskrit professor, gave him the "room and confidence" to become his own person.

He went to university in India before studying in Wisconsin, landing a job with Silicon Valley stalwart Sun Microsystems after he graduated in 1990. It was a couple of years later in 1992 that he was offered a job at Microsoft.

Nadella, who has led the company since 2014, said he chose the Bill Gatesfounded brand because it reflected a feeling of empowerment. Nadella said he remembered using a computer for the first time as a child: "The malleability of software was the thing that got me hooked. I won't say I was one of those people who took it and said 'That's my future,' but it was there, it was latent."

Years later, Nadella says Microsoft offered echoes of the potential of computing he'd recognized as a child: "It's that feeling of empowerment. I felt that I wanted to make sure that everyone else can feel that because of computing, that freedom you get to express yourself."

Now a board member for the likes of Starbucks and the University of Chicago, as well as the chairman of the Business Council U.S., Nadella said there "was never a time where I thought the job I was doingall throughout my 30 years at Microsoftthat somehow I was doing that as a way to some other job.

"I felt the job I was doing there was the most important thing, I genuinely felt it. And then of course it helped me get my next job."

That feeling led Nadella to his best piece of career advice: "Don't wait for your next job to do your best work. I think sometimes we define our jobs narrowly. One of the managers I worked for said: 'Hey, what if you did a thought experiment and thought of your job not as your job but as my job, and what would you do?'"

As a result, he said, he started taking on some of the burden that was on his manager so that he was expanding his own role without having to wait for a promotion.

Nadella, who was born in southern India, steadily worked his way up the ladder at Microsoft courtesy of this attitude. Having started out working on the development of Microsoft Windows NT, he then turned his talent to the organization's business solutions team. In 2007 he was elevated to the role of senior vice president in research and development, before getting another boost five years later to become president of the server and tools businessworth $19 billion in revenue.

Among Nadella's other achievements is acting as executive vice president for Microsoft's cloud computing platform, which provided the infrastructure bedrock for services such as the Xbox Live gaming network, search engine Bing, and the subscription model for Office 365.

As CEO, Nadella was lauded for his attention on company culture. However, the business has faced criticism this year for announcing 10,000 layoffs the day after hosting a private Sting concert for its executives at Davos.

"Leadership is such a privilege," he said. "Whenever you're leading someone you don't think of it as an entitlement, you should think of it as a privilege. The question is: How do you earn it?"

Leaders must always aim to bring clarity to confusing or ambiguous situations, Nadella said: "However smart you are, if you come in and create more confusion at an already uncertain time, that's not leadership."

His second tip for bosses is to create energy so that people leaving conversations feel buoyed by the interaction they just had. And lastly, he said there's no time for a perfect pitch or ideal conditions to perform in, explaining that it was the task of managers and the CEO to unconstrained teams and allow them to perform. He added no one was the "perfect" leader, but those questioning how they could have brought more clarity, energy, or freedom to their employees will always improve.

This story was originally featured on Fortune.com

More from Fortune:

Read more:
Microsofts CEO said he never expected to land the top jobthis is his best piece of career advice - Yahoo Finance

Read More..

How to Detect Cryptojacking in a Cloud Environment – ITPro Today

The software behind cryptojacking a type of security breach in which attackers mine cryptocurrency on infrastructure owned by someone else, leading to bloated hosting costs is designed to be hard to detect in any environment. But in the cloud, cryptojacking detection can be especially difficult, due to the lower level of visibility and control that cloud admins have over their environments.

Related: How Cloud Computing Has Intensified Cybersecurity Challenges

Fortunately, difficult doesn't mean impossible. Keep reading for tips on how to identify cryptojacking attacks in the cloud.

The reason why cloud-based cryptojacking software is harder to detect is simple enough: In the cloud, conventional cryptojacking detection methods don't work as well because businesses that use the cloud don't have as much visibility into or control over their cloud environments.

Related: What Happened in That Cyberattack? With Some Cloud Services, You May Never Know

In an on-premises environment, cryptojacking attacks can be detected in three main ways. One is to scan operating systems to check for processes that appear to be carrying out cryptomining. Good security scanning and monitoring software should be capable of finding at least some cryptojacking software by identifying anomalous features within it.

In other cases if cryptojacking applications elude security scans you can often detect the attacks simply by monitoring CPU usage. Since cryptomining consumes very high amounts of CPU, a sudden spike in CPU utilization that can't be explained in other ways (such as increased load on legitimate applications) could reveal cryptojacking. This detection approach may not pinpoint the source of the cryptojacking, but it at least alerts admins to the fact that cryptojacking is likely happening, so that they can research the issue further.

A third way of detecting unauthorized cryptomining is to monitor network connections for signs of unusual requests or protocols known to be associated with cryptomining.

Unfortunately, none of these detection techniques necessarily works well in the cloud. Depending on the type of cloud service you are using, you may not be able to scan your host servers' operating systems or the network at a low level to look for cryptojacking software. You also may not be able to collect enough infrastructure utilization metrics to identify likely cryptojacking attacks.

For example, if you deploy applications in the cloud using serverless functions, you can't scan the host servers, and you are limited in most cases to basic performance and networking metrics that may not be enough to detect anomalies related to cryptojacking attacks. The same is generally true if you run containerized applications using a managed Kubernetes service, where you also have limited access to the underlying host environment.

That said, there are ways to check for cryptojacking, even in cloud environments where you have less control.

You may not be able to scan the servers that host cloud workloads, but you can and should scan your applications in most cases. For example, if you deploy containers on a managed Kubernetes platform, you can scan the containers prior to running them. Scanning won't guarantee full protection against cryptojacking, but it will detect most cryptomining software that attackers have embedded into your applications.

By default, the networking metrics and other data that you get from most cloud providers are limited. But if you set up special networking infrastructure, such as a virtual private cloud, you can use features like VPC flow logs to gain deeper visibility into what's happening on the network.

From there, you may be able to detect cryptojacking attacks that you'd otherwise miss.

Monitoring and auditing access configurations in your cloud can help surface cryptojacking attacks, among other security issues. Insecure access control configurations are one path by which attackers can plant cryptomining software inside your cloud. As a result, if you detect insecure permissions settings, you may then be able to audit accounts and resources associated with those permissions in order to locate unauthorized activities, like the deployment of cryptominers.

To be sure, not every insecure cloud access control setting necessarily means you've been compromised by cryptojacking, but auditing access controls is one way of detecting potential cryptomining breaches.

A crude but effective way of catching some cryptomining attacks in your cloud is to monitor cloud spending. Billing spikes that aren't associated with legitimate changes in your environment might be a sign of cryptojacking.

Again, monitoring spending may not be enough to pinpoint where cryptomining is happening, but it can at least point you in the right direction especially if you monitor cloud spending granularly, such that you can link spending increases to specific types of cloud resources so that you know which ones have likely been compromised by cryptojacking.

Finding cryptojacking software within your cloud environment is more challenging than detecting cryptomining on-premises. But it's certainly not impossible. When you adopt the right strategies and analyze the right types of data, unauthorized cloud cryptomining operations become easy enough to identify and, in turn, to shut down in order to avoid the unnecessary spending that results from cryptojacking attacks.

About the author

Read the original post:
How to Detect Cryptojacking in a Cloud Environment - ITPro Today

Read More..

Alibaba splits into six in biggest overhaul in 24 years – TechCrunch

Image Credits: Qilai Shen/Bloomberg / Getty Images

Alibaba never fails to show its a fan of restructuring to stay nimble in an ever-changing environment.

The e-commerce behemoth said Tuesday that it will split into six business groups, which will each be managed by their respective CEOs and follow a holding company structure. Each CEO will report to a board of directors and assume full responsibility for company performance.

The decision, which it describes as the most significant governance overhaul in the platform companys 24-year history, came just a day after Jack Ma was spotted in China for the first time after spending months abroad.

The reappearance of the billionaire founder of Alibaba and Ant Group has become a source of intrigue for investors and entrepreneurs, who see his whereabouts as a bellwether of Beijings relationship with the private sector.

Over the past three years or so, China has imposed a sweeping regulatory crackdown on the tech industry, freezing the IPO of Ant and driving Didi to delist from the U.S.But in recent weeks, the country has made efforts to restore confidence in the business community, for instance, by hosting a high-profile corporate summit that attracted the likes of Tim Cook and Ray Dalio.

Alibaba is reorganizing its digital empire to reconcile with changes in the tech industry. This transformation will empower all our businesses to become more agile, enhance decision-making, and enable faster responses to market changes, said Daniel Zhang, current CEO of Alibaba, in an email to employees.Zhang will continue to serve as the chairman and CEO of Alibaba Group.

The market is the best litmus test, and each business group and company can pursue independent fundraising and IPOs when they are ready, said the CEO.

The setup means the staff and leaders of each subsidiary would be better incentivized by their respective stock option plans. It also offers flexibility to Alibabas businesses to seek IPOs in different jurisdictions, where approval processes could vary greatly.

When it comes to impact on staff, the reorg is undoing the organizational structure that it prided itself on for years the middle platform, which are middle and back office functions that can be reused across departments for data and business purposes.

These resources will transition into the relevant business groups and companies going forward and only retain functions required for listed company compliance, according to Alibaba. As the units become more independent, resources will be siloed, which will inevitably lead to redundancy; but the good news is some departments might need to increase their headcount after months of big layoffs.

The six business groups of Alibaba are Cloud Intelligence Group (cloud computing think AWS), Taobao Tmall Commerce Group (domestic retail businesses), Local Services Group (on-demand businesses like food delivery), Cainiao Smart Logistics (logistics), Global Digital Commerce Group (overseas retail businesses, including Lazada) and Digital Media and Entertainment Group (including the likes of video streaming).

More here:
Alibaba splits into six in biggest overhaul in 24 years - TechCrunch

Read More..