Page 1,811«..1020..1,8101,8111,8121,813..1,8201,830..»

Google Drive vs Dropbox vs OneDrive: Which cloud solution is right for you? – TechRadar

Trying to assess the best cloud storage for your needs is difficult enough when looking at two different solutions - evaluating the strengths and weaknesses of three platforms adds further complexity. However, given the sheer number of cloud solutions on the market today, from cloud document storage to photo cloud storage, it can be useful to broaden comparisons to encompass a variety of cloud solutions. Thats what weve done here, coming up with a winner in a close three-way fight: Google Drive vs Dropbox vs OneDrive.

Each of these solutions represents some big hitters in the cloud market. Users will also have to factor in their associated integrations - which is where Google Drive and Microsoft OneDrive may have significant advantages. Having said that, Dropbox is an old hand when it comes to cloud storage, having launched all the way back in 2007. No tech platform lasts as long as that unless it can offer some serious advantages to users - especially with the amount of competition around.

Of course, if you want to dig a little deeper into the best bits of each platform, then youre in luck. Our Google Drive cloud storage review, Dropbox cloud storage review, and Microsoft OneDrive cloud storage review will provide more detailed insights into each cloud storage solution.

The features on offer are some of the most important reasons to go with one particular cloud storage solution over another. Google Drive offers file versioning, advanced search, offline access, and a variety of preview and layout options but its close integration with other Google tools may be its most popular feature. Integrated access to Docs, Sheets and Slides via an intuitive web app means that this is more than just storage - its a productivity suite too.

Dropbox hosts everything in a designated Dropbox folder, whether you are a Windows or macOS user. Boasting its own Google Docs clone, Paper, Dropbox does its best to fight off competition but the fact that you can't include network drives or external drives is disappointing. The mobile versions of Dropbox do offer background support for photo library backup, however.

Microsoft OneDrive works similarly to other major cloud platforms, automatically syncing files once youve specified those you want to be backed up. As with the cloud offerings from other major tech players, OneDrive works best as part of a broader digital ecosystem - in this case, Windows. In terms of versioning, OneDrive can bring back previous versions of your files from as far back as 30 days ago.

In an effort to find out which of the three cloud storage solutions offered the best performance, we compared them in terms of speed when uploading and then downloading the same 1GB test file. All three solutions performed well, with not much to choose between them.

OneDrives download speed was a little on the slow side, taking around seven minutes, but it did perform better in terms of uploads. If speed is essential, then Dropbox was the winner, delivering an impressive sub-one-minute time. It is worth noting, however, that all three cloud storage clients run in the background, so even if you have a large file to upload or download, this can take place without hindering your productivity too much.

In addition, please be aware that the speeds we measured are only an indication and many users will find that their results vary with different broadband connections. As such, the main takeaway should be that all three cloud storage solutions offer decent speeds, with only the heaviest users likely to notice a difference.

Unfortunately, glitches and troubleshooting are a fact of life when it comes to any software solution - and cloud storage is no exception. When comparing the three platforms, all of them offer the basic level of support you would expect but there are some nuances. OneDrive, for example, doesnt make it the easiest for users to access email and phone support channels, so they may reluctantly decide to stick with the relevant self-help articles - which are admittedly extensive.

Similarly, Dropbox also has plenty of self-help articles for users in need of support. Plus, it does make finding real-time support a little easier. Theres also an automated chat service called dropbot. Google Drive does only make email, phone, and live chat support available to its paying customers, but this is unlikely to be a major issue as business users are likely to need more than the 15GB of storage provided through the free plan.

Although theyre unlikely to be of much interest to serious users, Google Drive, Dropbox, and OneDrive all offer free plans. Microsoft offers 5GB of space for its free plan, Google Drive an impressive 15GB, and Dropbox an underwhelming 2GB.

In terms of the available paid plans, business users will have to fork out between $5 (3.80) and $10 (7.50) per month with OneDrive for access to cloud storage, or between $6 (4.50) and $12.50 (9.40) per month for access to Office 365 apps. Dropbox business plans cost between $15 (12) and $50 (40) per user per month. Google Drive, meanwhile, costs either $1.99 (1.59), $2.99 (2.49), or $9.99 (7.99) per month for 100GB, 200GB, or 2TB respectively, or users can subscribe to Google One on an annual basis.

Deciding between Google Drive, Dropbox, and Microsoft OneDrive ultimately depends on your specific needs. Dropbox may win in terms of performance but it doesnt integrate quite as neatly with other tools - something that Google Drive and OneDrive excel at for their respective operating systems.

All things considered, wed probably have to recommend Google Drive - particularly if youre a big Android or Chromebook user. Things get a little more complicated if youre a Windows fan or if speed is a priority, so maybe those free packages could be useful for getting some first-hand experience with each solution.

The rest is here:
Google Drive vs Dropbox vs OneDrive: Which cloud solution is right for you? - TechRadar

Read More..

A DevOps Guide to Kubernetes Storage on AWS – Spiceworks News and Insights

Kubernetes storage is useful for managing multiple forms of persistent and non-persistent storage in a cluster to cater to both stateful and stateless workloads in a containerized environment. Proper management of Kubernetes storage options allows us to dynamically provision the most suitable storage resources for multiple applications with minimal administration overhead.

There are various storage concepts you can leverage in Kubernetes, as well as typical use cases and pro tips for running Kubernetes on AWS from a storage perspective.

The storage architecture for Kubernetes is based on volumes as the core abstraction. Volumes can be ephemeral (non-persistent) or persistent, depending on their intended use cases. Kubernetes also allows for the dynamic provisioning of storage resources using volume claims.

Volumes are the basic storage entities in Kubernetes. A process in the container sees a filesystem view, which includes a root filesystem that matches the initial contents of a container image and the volumes mounted inside the container (if defined within the container specifications).

Volumes are mounted at specified paths within the container image, so you must independently specify the mount path of each volume used for each container in the pod. While volumes cannot be mounted within other volumes, a volume can be shared between multiple containers in a pod using sub-paths within the volume mount paths in the pod specifications.

Kubernetes supports multiple storage volumes, including local storage devices, network file systems (NFS), and cloud storage services like AWS Elastic Block Store (EBS) volumes. Developers can also create custom storage plugins to support specific storage systems deployed on Kubernetes clusters as extensions.

While support for cloud storage services is currently available within the core Kubernetes project, the Kubernetes Storage Special-Interest Group (k8s-sig-storage) is slowly shifting toward providing storage support through external Container Storage Interfaces (CSIs). For example, the native Amazon Elastic Block Store volume has been deprecated as of v1.17 in favor of the Amazon EBS CSI.

Unless specified within the container specifications, each container in a pod is created with an ephemeral volume by default in Kubernetes. This means there is a temporary storage directory on the machine that hosts the pod. Ephemeral volumes are removed after the pod ceases to exist.

The data in ephemeral volumes is safe in the case of a container crashing, as this does not remove a pod from a node. However, the pod with the crashed container may subsequently be deleted due to rescheduling or any reason that causes the pod to be evicted to another host, causing the data in the ephemeral volumes to be removed in the process.

Kubernetes uses persistent volumes, and persistent volume claims to allow pods to use storage in a portable manner while abstracting its implementation away from how storage is consumed.

A persistent volume (PV) is a storage entity within a cluster that is either allocated manually by an administrator or dynamically allocated based on a storage class. PVs define the details of the storage implementation, such as capacity, access modes, storage class, and reclaim policy. As they are cluster resources, PVs are not portable between clusters.

A persistent volume claim is a storage request used by developers to describe an applications storage requirements, for example, a containers storage size and access mode. Since the storage request is separate from the storage creation, Kubernetes can enforce access control mechanisms based on the container or pod credentials and the available PVs in the cluster.

A PVs lifecycle is independent of pods. The lifecycle of a PV and PVC consists of 5 stages:

For Kubernetes on AWS, EBS volumes are persistent volumes hosted in the same region and availability zone as the EC2 instance nodes running on the EKS cluster. When a pod is removed from an EC2 instance node on the EKS cluster, the data in the EBS volume mounted to the pod is persisted and the volume is unmounted.

Cluster administrators can configure storage classes in the cluster and assign PVs to each class. Each class represents a particular type of storage that users can request in their PVCs, depending on varying workload requirements within the cluster.

Dynamic volume provisioning is a feature in Kubernetes that lets you create storage volumes on-demand without requiring cluster administrators to create new ones manually.

Each storage class specifies a volume plugin called a provisioner and the parameters required for it to allocate storage volumes dynamically. When a user configures a storage class in their PVC, the provisioner automatically creates a storage volume based on the required specifications.

While some provisioners are internal and shipped alongside the Kubernetes project, you can also use external provisioners by following the specifications defined by Kubernetes.

A Container Storage Interface (CSI) is a Kubernetes extension that provides an extensible plugin architecture for vendors to create compatible storage plugins.

There are custom storage plugins in the form of CSI drivers for arbitrary storage systems external to your Kubernetes project (e.g., Amazon Elastic File System).

After you deploy the CSI driver on the Kubernetes cluster, you can use these CSI volumes with other Kubernetes storage API objects such as PVs and storage classes. For example, you can create a storage class that references the CSI provisioner, assign them to PVs, and reference the PVs in PVCs to mount the CSI volumes to a pod.

With the core Kubernetes projects gradual shift toward distributing control over the provisioning of non-native storage to the respective providers, external vendor-based CSI drivers are currently the preferred approach for managing the lifecycle of the external storage system in Kubernetes clusters. As part of this gradual shift, numerous migration features are slowly being released within the core project to ease the transition from the in-tree storage plugin to the corresponding vendor-based CSI driver.

With various options available for Kubernetes storage, you need to know which type to choose for different use cases.

For transient applications that require data storage (e.g., applications that extract read-only input data in files), you can use ephemeral volumes for storing data within the lifetime of the pod without being limited to the location and availability of some persistent volume.

Persistent volumes will store data beyond the lifetime of the pod for applications requiring data persistence across restarts (such as a database).

For use cases that require managing storage for various workloads within the cluster, you can opt for storage classes with various storage levels, backup policies, or any arbitrary policies defined by cluster administrators.

When it comes to running Kubernetes on AWS from a storage perspective, there are five pro tips you should keep in mind.

Using PVCs in the container config as part of the deployment IaC template lets users request persistent storage across clusters. This, in turn, enables storage configuration portability that is not tightly coupled with cluster resources. This tip applies to ephemeral Amazon EKS clusters created on-demand and Amazon EKS clusters deployed across multiple regions and availability zones.

Including PVs in the container, config is not recommended if you want to avoid tight coupling with a specific volume and prevent failure in binding storage volume when instantiating the container in the pod.

Instead, use PVCs as volumes while the cluster provisions storage by finding the PV bound to the claim and mounting that volume to the pod.

Cluster administrators can specify a default storage class for PVCs that do not have specific requirements for the storage class they need to bind to; they can also create separate storage classes that represent varying workload requirements. This allows users to request storage in PVCs based on the name of the storage class without manually specifying the volume within each pods specifications. Otherwise, PVCs without a specified storage class will fail to provide a PV.

Cluster administrators can provide users with a storage class when instantiating the config template. If the user provides a storage class name, the value should be defined in the StorageClassName within the PVC specifications so that the PVC can match the correct storage class. Otherwise, a PV can be automatically provisioned for the user using the default storage class in the cluster.

When monitoring your Kubernetes cluster with Prometheus and configuring alerting rules via Alertmanager, keep an eye out for PVCs that remain unbound for a prolonged period. This could mean your cluster lacks dynamic storage support or a storage system, where users wont be able to deploy configs requiring PVCs. If this is the case, the user should create a PV that matches the requirements defined in the PVC.

Implementing best practices for Kubernetes storage enables you to apply optimal storage configurations and dynamically provision suitable storage resources to multiple containerized applications without significant administrative overhead.

To reap the benefits of Kubernetes storage options on AWS, you can gradually adopt these best practices by creating storage classes and enabling dynamic volume provisioning in the cluster. You can choose suitable storage types for your containerized workloads based on the given use case.

Which best practices have you considered for Kubernetes storage on AWS? Let us know on LinkedIn, Twitter, or Facebook. Wed love to hear from you!

Read more here:
A DevOps Guide to Kubernetes Storage on AWS - Spiceworks News and Insights

Read More..

NetApp Teams with VMware, AWS to Help Customers Modernize and Scale Enterprise Workloads on the Cloud – Express Computer

NetApp a global, cloud-led, data-centric software company, in collaboration with VMware, Inc. and Amazon Web Services (AWS), announced the general availability of Amazon FSx for NetApp ONTAP with VMware Cloud on AWS, the first and only native AWS cloud storage service certified and supported as a supplemental datastore for VMware Cloud on AWS.

With this new datastore solution, enterprises can quickly, easily, and cost-effectively move their enterprise, data-demanding workloads to VMware Cloud on AWS. This allows organizations to scale cloud storage independent of cloud computing to optimize costs, deploy new modern applications with the speed and scalability of the cloud, and maximize the value of their existing IT investments. Additionally, organizations can gain access to the rich data management, protection, and efficiency benefits of ONTAP utilized by nearly twenty thousand VMware customers running on-premises.

Our strong relationship, deep integration, and joint innovation with both VMware and AWS hit another milestone, which helps make it easier for organizations to efficiently move enterprise workloads to the cloud, said Phil Brotherton, Vice President, Solutions & Alliances at NetApp. VMware customers running on NetApp or non-NetApp storage on-premises can now access the enterprise-class public cloud storage services and features of ONTAP, all running on AWS, as the first certified and supported supplemental datastore to VMware Cloud on AWS.

The majority of enterprises today run workloads on a VMware platform. Whether that is on-premises or in VMware Cloud on AWS, they want to be able to leverage consistency in operations and architecture, said Narayan Bharadwaj, Vice President, Cloud Solutions at VMware. AWS, NetApp, and VMware are giving customers the flexibility to buy and configure cloud storage independent of computing to meet the needs of a wide variety of enterprise applications. Our co-innovation will enable customers to move enterprise workloads to the cloud to cost-optimize and better scale their environments.

The strong collaboration between NetApp, VMware, and AWS is enabling organizations to innovate with greater speed and efficiency while minimizing cost, giving them greater freedom to move workloads between on-prem and multi-cloud environments, said Sanjay Rohatgi, Senior Vice President and General Manager, NetApp Asia Pacific & Japan. We look forward to working with customers across the region to accelerate their move to the cloud and in turn, spur the further transformation of their business.

New benefits from this certified and supported offering include improved:

In addition, partners of NetApp, VMware, and AWS can benefit from this innovation to expand their current offerings around VMware Cloud in multiple ways:

As a leading multi-brand provider of full stack IT solutions, our customers rely on us to deliver solutions and services to help them manage their most data-demanding workloads, said Troy Brick-Margelofsky, Digital Infrastructure Team Lead at CDW. With Amazon FSx for NetApp ONTAP as a certified and supported datastore for VMware Cloud, we can now help customers move workloads onto the cloud quickly and efficiently, saving them time, money, and resources with the added benefit of integration with the complete NetApp portfolio.

Amazon FSx for NetApp ONTAPprovides fully managed shared storage on AWS with the popular data access and management capabilities of ONTAP. The solution allows organizations to easily migrate applications and run them on AWS, with ONTAPs enterprise-grade storage workflows and data management capabilities, regardless of their on-premises storage provider.

Amazon FSx for NetApp ONTAP supplemental datastore for VMware Cloud on AWS is available.

View post:
NetApp Teams with VMware, AWS to Help Customers Modernize and Scale Enterprise Workloads on the Cloud - Express Computer

Read More..

Privacy-Focused Alternatives to Google Services for Tax Pros – Bloomberg Tax

Google, which started as a simple search engine in 1997, is now a major player in just about every facet of our digital lives. A commensurate increase in scrutiny has followed. From data privacy issues to antitrust claims, the Do No Evil company has been accused of myriad unsavory practices. On top of that, it has been known to somewhat abruptly cancel services and products.

Owing in part to these trials and tribulations, there are several services now seeking to draw customers away from Google. The chief value add in many of them is privacy: limited data collection and retention and improved encryption. This should be music to tax professionals ears, as it is incumbent on us to safeguard not only our own data but also our clients data. We dont keep our hard copy tax return documentation in a storage location where third parties have access, so why would we hold our digital retention to less stringent standards?

In light of this, please consider this short primer on privacy-focused alternatives to the Google offerings frequently used by tax professionals. Most of these services either wont have a free tier or have a free tier only for limited personal use. In many cases, they are substantially more expensive, especially for heavy users. One thing to note is that when youre not paying for a service, the company is monetizing the service somehow. And more often than not, youre a product being packaged and sold to an advertiser.

Googly Eyes on Cracked Sidewalk Making a Smiley Face

Photographer: Stock photo via Getty Images

If Google has one banner product, its the search engine. Truth be told, if youre using a modern browser, your connection is secure, and you arent signed in to a Google account that is keeping track of your search history, you dont have too much to worry about when performing the odd search here or there. All the same, if youre beefing up security at your house, and you install new locks on all the doors and a new alarm system, do you leave a window open just because its mostly out of reach?

The clear alternative to Google Search is DuckDuckGo, which doesnt track searches or tie an individual to a specific search query. And the search results are pretty darn good. DuckDuckGo has been around since 2008 and sees about 3 billion monthly searches. It monetizes by showing ads tied to the individual search that is performed rather than by assembling a dossier on a user and showing ads relevant to the users perceived interests.

Nonetheless, care should be taken when running searches that contain identifiable information for a client. Thought should be given as to what kind of picture could be painted by an aggregation of all the searches you run that contain a given clients nameyour research might be giving more away than you realize.

If Google has a product that rivals its search in ubiquity, its Gmail. Privacy-focused folks may remember that in 2017, Google had a bit of a scandal when it was revealed the company scanned the content of emails to better target advertisements to customers. For ordinary email users, that is a privacy violation. For professionals who may have other peoples personal and financial information in their inboxes, that might be an ethics problem.

Luckily, there is no shortage of Gmail alternatives, and many have privacy as a top line feature. Among the most oft-recommended services is Tutanota, a service out of Germany that boasts end-to-end encryption. This means, at least in theory, no one can read the contents of your inbox. Similarly, Proton Mail encrypts everything related to your account and signs your emails using PGP (Pretty Good Privacy) keys so recipients can be certain an email from you is indeed an email from you.

When client data is sent by email, the email itself and any attachments that contain personal information should be encrypted and put behind a password, regardless of what email service you use. You dont know who may be listening in on the receiving end.

Google Sheets is a popular tool with folks who spend their days crunching numbers but has many of the same privacy concerns tied to other Google services. Someone who has access to your Gmail account has access to your Sheets and anything else stored in the larger Google Drive service. A spreadsheet that is accessible from any browser can be useful for tracking client data, and there are even templates for doing things like estimating quarterly tax paymentsbut convenience comes with a security tradeoff.

Many privacy-focused users are looking at services such as CryptPadnot just because it claims end-to-end encryption and is open source, but simply because keeping everything in the Google ecosystem seems a bit like that old saw about eggs and baskets. CryptPad allows users to remain completely anonymous, which may reduce ones risk of exposing client data in a targeted attack.

The use of Google Drive grants relatively permissive terms of use to Google for your documents. As free cloud hosts go, that isnt bad, but it may be a nonstarter for folks that need to store private or sensitive information. Additionally, and as mentioned above, the tying together of the various Google services behind one Google account is convenient but creates one point of entry for an attacker to gain access to your entire digital world.

Finding alternative private cloud providers to the big players (such as Google Drive, Microsoft OneDrive, and Dropbox) is not as simple as with email and spreadsheets. The big players are best in a position to provide storage services for rates that reflect their ability to pay for storage at scale. As such, the privacy-focused answer for using cloud storage is a bit different from the above.

As with all things, inexpensive storage comes with a tradeoff for tax professionals: file retention and destruction issues. The more cloud storage you have, the less motivated by space constraints you will be to periodically prune your client data, and that may be a problem when client data is retained for periods longer than necessary.

In sum, use one of the major players, but encrypt your data prior to uploading it and regularly delete client data you no longer need to retain. Cryptomator offers an open source and free tool that streamlines the process. The result isnt perfectwith enough time, any encryption method can be crackedbut its the best solution that isnt simply not using cloud services.

If the above hasnt convinced you to make a privacy move, at least make sure you are using a secure password for Google that isnt used anywhere else, and turn on two-factor authentication. If possible, do not have your two-factor authentication codes sent by SMS to your cellphone, and use a code-generating application like Google Authenticator or Authy. If you do use SMS to receive your codes, call your cellphone provider and ask for a PIN code on your account for all changes.

Finally, when handling sensitive informationespecially someone elsesbe thoughtful about when, where, and why you add a piece of data to the cloud. Best practices for data backup include local and off-site backups. Your clients wont thank you when their data isnt divulged in a breach, because that would be weird, but you can sleep soundly knowing that you arent going to have to have an uncomfortable conversation with them the next time a big breach makes the news.

This is a regular column from tax and technology attorney Andrew Leahey, principal at Hunter Creek Consulting and a sales suppression expert. Look for Leaheys column on Bloomberg Tax, and follow him on Twitter at @leahey.

Read the original post:
Privacy-Focused Alternatives to Google Services for Tax Pros - Bloomberg Tax

Read More..

Hammerspace Named a 2022 Sample Vendor by Gartner – Business Wire

SAN MATEO, Calif.--(BUSINESS WIRE)--Hammerspace, the pioneer of the Global Data Environment, today announced that it has been recognized as a Sample Vendor in the 2022 Gartner report Hype Cycle for Storage and Data Protection Technologies. [1]

According to Gartner, This Hype Cycle focuses on emerging innovative storage and data protection technologies and evaluates business impact, adoption rate and maturity level to help infrastructure and operations leaders build adaptable and future-ready storage, and data protection platforms for changing business needs. By 2026, large enterprises will triple their unstructured data capacity stored as file or object storage on-premises, at the edge or in the public cloud, compared to 2022.

Hammerspace is honored to be named a Sample Vendor by Gartner in the recent Hype Cycle for Storage and Data Protection Technologies Report. Hammerspace is delivering the innovation to provide decentralized businesses with a Global Data Environment powers data-hungry AI, machine learning, and next-gen applications while delivering remote high-performance, local access of data to remote workers, said David Flynn, Founder and CEO of Hammerspace. I believe it is an honor and validation of our strategy to be recognized as a Sample Vendor for both Hybrid Cloud Storage and Management Software-Defined Storage.

Hammerspace delivers the worlds first and only Global Data Environment, breaking down the boundaries of data access for users and applications anywhere in the world to create, process, store, and protect data on any existing data center or preferred cloud infrastructure. Decentralized organizations with distributed infrastructure and data struggle with how to power data-driven projects. Hammerspace gives users and applications local, read/write access to all of their file data across all silos and locations based upon their permission while providing IT managers the ability to manage all their data and storage resources globally, without interrupting access to users and applications, and without being overwhelmed with the complexity of silo-based point solutions for data services.

_______________

[1] Gartner Hype Cycle for Storage and Data Protection Technologies Authors: Melissa Davis, Gary Olliffe/Published July 25, 2022

Disclaimer

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Hammerspace

Hammerspace delivers a Global Data Environment that spans across on-prem data centers and public cloud infrastructure enabling the decentralized cloud. With origins in Linux, NFS, open standards, flash and deep file system and data management technology leadership, Hammerspace delivers the worlds first and only solution to connect global users with their data and applications, on any existing data center infrastructure or public cloud services.

GARTNER and HYPE CYCLE are registered trademarks and service marks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartners research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Read the original:
Hammerspace Named a 2022 Sample Vendor by Gartner - Business Wire

Read More..

Can Red Hat and Accenture Solve Data Sovereignty? – RTInsights

In many jurisdictions, organizations are now required to store user data in the country where its collected and users live, which creates an enormous technical problem. A sovereign cloud might be the solution.

In a spate of announcements over the summer, Red Hat and Accurture said theyd extended their 12-year cloud partnership to pursue more innovations in hybrid cloud. But the smallest part of their announcementthat theyll collaborate on new products for the sovereign cloudis one of the most exciting, as its an area of data privacy thats churning with regulation and controversy.

In a statement, Raj Wickramasinghe, emerging platform lead at Accenture, said: Organizations are increasingly turning to hybrid cloud to help overcome complex challenges around core business functions like customer service and supply chain and to drive growth and innovation. Through our expanded alliance with Red Hat, we can further help clients embrace the cloud continuum to enable greater operational efficiency and drive innovation.

That sets the stage nicely for the idea of the sovereign cloud, which addresses how multinational organizations handle user data when deploying applications on one of the public cloud providers, like Google, Amazon, or Microsoft. In many jurisdictions, organizations are now required to store user data in the country where its collected, and users live, which creates an enormous technical problem: How do you possibly aggregate and analyze user data from multiple or dozens of different data stores?

The sovereign cloud doesnt relate to those data stores as much as it does the interconnectivity between thema place where data can flow freely and legally in a way that still enables viable applications for global audiences.

Red Hat and Accenture are adding a layer of open-source technologies and services to their sovereign cloud research and development, making it appealing to regulators and governments in the years to come.

See also: Solving for Sovereign Data with Edge AI

As soon as an organization accepts users from beyond a single country, they must start paying attention to the complex network of data privacy/security regulations. Aside from having their reputation on the line, failure to comply with data regulations can result in massive fineswell-well companies like Amazon, WhatsApp, and Google have all been fined hundreds of millions of dollars for GDPR violations.

The US, UK, and EU already have multiple regulations, with precedent-setting rulings, updates, and new initiatives always on the horizon.

The US has the CLOUD Act, which forces US public cloud providers to hand user data over to a government identity or law enforcement agency if they request it via a warrant, subpoena, or court order. That sounds simple enough, but the data requested might also be stored in another country, which creates conflict with that jurisdictions own requirements.

Thats one of the ways the CLOUD Act conflicts with the EUs General Data Protection Regulation (GDPR), which is perhaps the most well-known regulation, as its already caused lots of headaches for developers around storing personally identifiable information (PII) and is why you see so many cookie consent banners on the websites you visit, particularly if theyre based in the EU. Under the GDPR, cloud providers can only disclose personal data for legal requests made under EU law.

With these regulations at odds with one another, its not entirely clear what a cloud provider would do, for example, if the Security and Exchange Commission got a court order to hand over user data thats stored in Germany.

The landscape is dotted with other regulations that make it even harder to track and understand. Schrems II, a legal judgment published in July 2020 for the EU and UK, requires that organizations must individually and manually assess all data thats to be transferred to a non-EU country. The goal was to ensure the target country adheres to EU standards on data and privacy, but it also destroyed any opens of an open US-EU data highway, known then as EU-US Privacy Shield.

Like the CLOUD Act, the UKs COPO Act 2019 also allows UK law enforcement to compel non-UK companies to fork over user data.

Staying compliant with these conflicting rules is an enormous challenge for organizations and the public clouds they use to deploy applications and store user data, and an area thats overdue for concerted R&D.

Organizations can deploy a homegrown sovereign cloud today by working with smaller regional storage providers in target jurisdictions or deploying their own on-premises private cloud storage in every country where they do business.

Virtual data spaces are another burgeoning solution to this problem. If multiple trusted organizations partner together on establishing and maintaining the same high standards for storing and sharing data, they can safely share data without running afoul of any US, EU, or UK regulation. User data is never stored centrally in these spaces and only shared between partners when absolutely necessary.

On that front, GAIA-X is developing a federated European data infrastructure through a network that links many public clouds together. The goal is a European public cloud that respects the digital sovereignty of its users based on transparency and openness. Public cloud providers will have to commit to participating, but GAIA-X already has support from BMW, Deutsche Telekom, SAP, Siemens, Scaleway, and others.

As the general public gets more awareness of digital sovereignty and fines continue to stack up, this issue will only get messier, more complicated, and a lot more popular. Considering how Red Hat and Accenture have nothing concrete to announce, theyre likely years away from having a plug-and-play solution, which would do wonders for startups and small- or midsize-businesses who dont have enterprise-sized wallets.

Read more:
Can Red Hat and Accenture Solve Data Sovereignty? - RTInsights

Read More..

Top 3 Ways to Slow Down Time Lapse on iPhone in 2022 – NerdsChalk

Time Lapses are a great way to capture long static footage whether youre interested in the weather or the landscape. Not only do they help provide an artistic touch, they also help save space on your device by only capturing a fraction of the usually needed frames.

However, if youve tried to capture a time-lapse on your iPhone then you might have realized that theres no visible way to control the speed of your time-lapse.

This can be quite a hindrance in a creative workflow and if youre in the same boat then heres how you can slow down your time lapses on an iPhone.

No, there is currently no native feature on an iPhone by default that allows you to control the speed of your Time Lapse videos. However, if youve recently bought a new device then chances are thatiMovieis pre-installed on your device.

iMovie is Apples free comprehensive video editor that has the ability to alter the time of your captured time lapses.

If preferred you can also use a third-party app to slow down your time lapses instead. Follow the next section to help you along with the process.

Related: How to Loop a Video on iPhone

We recommend you start by using iMovie to alter the speed of your time lapses. Third-party apps can sometimes face issues slowing down time lapses that havent been captured through the app.

If iMovie can not get you the desired final result, you can try using one of the third-party apps mentioned below instead.

Download iMovie on your device using the link above if it is not pre-installed. Once installed, open the same and tapMovie.

Tap and select yourTime Lapsefrom the previews on your screen. Time Lapse videos will have a small icon for the same in the bottom left corner of the thumbnail.

TapCreate Movieat the bottom.

The video will now be added to your timeline. Tap and drag the play head to the beginning of your video.

Tap on your video to select it. It should be highlighted in yellow once selected.

Tap theSpeed icon at the bottom.

Tap and drag the slider to adjust your speed. Drag it to the left to slow down your time-lapse.

You will be shown the new length of your video in your timeline as you adjust your speed.

Once youre happy with the changes, tapDonein the top left corner.

Tap theShareicon at the bottom.

Tap and selectSave Video.

And thats it! The slowed-down time-lapse will now be saved to your Photos app.

Related: How To Duet On Instagram Reels [Workaround]

while iMovie is a native app you get with your iPhone, you can also use a third-party app to slow down time lapses on an iPhone. Use either of the apps below depending on your preferences.

Skyflow is a time-lapse app that allows you to capture and edit your time-lapses as needed. Follow the steps below to help you along with the process.

Download and install Skyflow on your device using the link above. Once installed, open the app and tap theCameraicon at the top.

Now frame your shot and tap theIntervalicon and adjust how frequently you wish to capture frames.

Similarly, tap theDurationicon and adjust the duration of your Time Lapse.

Now adjust your other camera settings as needed and tapStart to start recording your video.

TapStop once youre done recording.

The video will be now be saved to your gallery. Now tap theBackicon.

Your captured videos will now be available in the Skyflow gallery. Tap and open the recently captured video.

Tap theRabbit to adjust and slow down your time-lapse.

Drag the slider to your left to slow down your time-lapse.

Now adjust other settings for your time-lapse if needed and tap theShareicon.

Tap and choose your export settings as needed. You can adjust the following options for your time-lapse.

TapExport once youve made your choices.

The video will now be exported and saved to thePhotosapp by default. You can use the options on your screen to either save it to theFiles app or share it to your preferred social media or cloud storage platform.

And thats how you can use Skyflow to capture and adjust the speed of a time-lapse.

Related: Best iPhone and Android Apps To Create Videos With Background Music

InShot is another video editor that you can use to slow down time lapses on your iPhone. Follow the steps below to help you along with the process.

OpenInShoton your device and tapVideo.

Grant permission to access your photos based on your preferences and you should now have access to thumbnails for your photos and videos. Tap and select yourTime Lapse from the previews on your screen.

Once selected, tap thecheckmark in the bottom right corner.

The video will now be added to your timeline. Tap and selectSpeedfrom the tools offered at the top.

Drag the slider to adjust the speed of your video. Move the slider to the left to slow down your time-lapse.

Tap and switch toCurve if you wish to selectively slow down or speed up your video.

Tap thecheckmark once youre happy with the speed of your video.

Now tap theShareicon in the top right corner.

Adjust your export settings as needed. You can alter and change the following aspects of your final video.

TapSaveonce youre done.

The video will now be saved to yourPhotosapp.If you wish to save the video to yourFilesapp, tapOther and selectSave to Files.

And thats how you can adjust the speed of your Time Lapse using InShot.

Related: How to Combine Videos on a Mac Using Apps Like Quicktime and Shotcut

Here are a few other video editing apps that can help you adjust the speed of your Time Lapse on an iPhone.

We hope this post helped you easily slow down Time Lapses on an iPhone. If you have any more questions, feel free to drop them in the comments below.

Related: How to Airdrop Between Mac and iPhone

The rest is here:
Top 3 Ways to Slow Down Time Lapse on iPhone in 2022 - NerdsChalk

Read More..

Cloud servers are the most common way in for cyberattacks – BetaNews

New data unveiled by the Atlas VPN team shows that cloud servers are now the number one way in for cyberattacks on businesses, with 41 percent of companies reporting them as the first point of entry.

The data, based on the Cyber Readiness Report 2022 by insurer Hiscox, also shows a 10 percent increase in cloud server attacks over the year before.

Lat year's top attack vector, corporate-owned servers, now occupies the third spot on the list with 37 percent of businesses reporting them as the main cyberattack entry method. Second belongs to business emails, named as the main access point for attackers by 40 percent of businesses.

In total, 48 percent of companies report experiencing at least one cyberattack in the last 12 months. Even with a 60 percent higher cybersecurity spending, cyberattacks rose by five percent compared to the year before.

The Netherlands seems to be most targeted, with 57 percent of companies having experienced cyberattacks in the last 12 months. Organizations in the Netherlands have also seen the most significant rise in cyberattacks, up by 16 percent.

France is next with 52 percent suffering attack, up three percent. Attacks on businesses in Spain dropped by two percent to 51 percent, while i In the US 47 percent suffered attacks, an increase of seven percent.

UK businesses saw the lowest percentage of cyberattacks among the surveyed countries (42 percent), but tops the charts for the median cost of all attacks ($28,000).

You can read more on the AtlasVPN blog.

Image Credit:Chaiyapop Bhumiwat / Shutterstock

The rest is here:
Cloud servers are the most common way in for cyberattacks - BetaNews

Read More..

State’s centralized Office of Information Technology begins cloud migration – kinyradio.com

Tuesday, September 6th, 2022 8:06am

Juneau, Alaska (KINY) - The Department of Administrations centralized Office of Information Technology will begin the first of two phases in migrating the states data systems from state servers to the cloud this month.

According to a release from the Department, the migration to cloud based servers represents an important part of the states IT strategy and ongoing work to secure Alaskans data, modernize state IT systems and dramatically improve the states resilience to unexpected disruption.

Over the past two years, the Office of Information Technology has executed important work to design the cloud environment based upon the states specific security and operational needs. Said the States Chief Information Officer Bill Smith. OIT has conducted significant training for state employees, performed pilot migrations, built a cloud governance model, and worked to prepare for an effective migration. This move will allow us to take full advantage of world class security features and provide access to a robust computing environment built from the ground up to protect and secure the states data.

In the coming months, the Office of Information Technology will be evaluating every server in the state and executing the large-scale migration.

This migration effort is a culmination of the preparation that has been accomplished over the past two years and will utilize a rapid lift-shift solution unavailable until recently.

The project had its formal kickoff this month and will be conducted in two ninth-month phases.

Go here to read the rest:
State's centralized Office of Information Technology begins cloud migration - kinyradio.com

Read More..

A Plan to Let Soldiers Interact with the Army Cloud Using Their Own Devices Got a Bit Clouded – Forbes

After years of proposing Bring Your Own Device strategies, the U.S. Army has embarked on Phase III ... [+] of its BYOD Pilot.

The U.S. Army is testing a mobile device application that would let its Soldiers and DoD civilians access the Army Cloud using their personal cellphones or laptops. But theres some confusion about the app and the extent to which it will be used.

For context, its worth explaining that the Army and other services have enabled service members and DoD civilians to work remotely via Government Furnished Equipment (GFE) for over 15 years. The once ubiquitous BlackBerry phones that Soldiers, Airmen, Sailors and Marines carried for years exemplified remote work.

Uncle Sam paid for and supplied these devices and users were/are expected to conduct only official business on them, with the resulting phone in each hand a common sight among service people and government officials physically segregating their professional and personal communications. But a lot has changed in the last decade.

The Army and other branches followed and began to embrace the commercial technology evolution that has brought us digital cloud storage and software-as-a-service (SaaS). For the Army, and the rest of the world, that embrace became a bear hug when COVID-19 hit in 2020.

At the height of the Pandemic the Pentagon turned to a commercial solution for the vastly expanded telework work it believed was necessary to continue to function, enabling Microsoft MSFT Office 365 mobile capability for the military/civilian workforce. The capability was well received but in the span of less than a year DoD recognized it wasnt particularly secure. In June, 2021 Office 365 mobile capability was turned off.

To work remotely and access the cloud, users reverted to their GFE. As they did so, the folks running the DoD cloud enterprise were already asking the question - Do they have to use government funded devices?

Bring Your Own Device

With Microsoft Office 365 connectivity disabled, the DoD CIO and the respective service CIOs established separate pilot programs to assess the potential for military personnel and civilians to work remotely using their own cellphones and laptops. The Pentagon refers to this strategy and to the separate service pilots as Bring Your Own Device or BYOD.

The Army, Navy and Air Force each have their own BYOD Pilots though the Armys Pilot - now in Phase III - is likely the most mature. The goal of BYOD the Army says is to extend the convenience of teleworking on just one device to Soldiers and Army civilians. Essentially, its another app on your phone. A service member can walk out of the Pentagon or off-base, go to the store and still be connected to official business via his or her personal device.

BYOD may also save the service considerable money Army CIO, Dr. Raj Iyer says.

Army CIO Dr. Raj Iyer says its BYOD Pilot is demonstrating the convenience and potential cost ... [+] savings of having Army personnel use their own devices for official business.

We know that there are savings to be had. If you look at the total cost of ownership of government furnished cellphones and how much we pay for data services from the telecom providers, theres an opportunity to reduce those costs by switching to BYOD.

How much potential savings from dropping GFEs/data could be realized is one of a number of issues relating to BYOD over which there has been some confusion. Chief among these has been what kind of work it will enable users to do.

Lieutenant General John B. Morrison, the Armys Deputy Chief of Staff for Command, Control, Communications, Cyber Operations and Networks (G-6), emphasizes that BYOD is largely for administrative work. Technically, it is cleared to carry up to Impact Level 5 (IL 5) information including unclassified and controlled unclassified information the Army says. It is not for use for classified work, communications or data sharing.

Moreover, the Army BYOD Pilot is limited to the strategic administrative level, typically for in-garrison users within the U.S. However, the G-6 is working through use cases outside the continental U.S. LTG Morrison says so personnel in Europe, Africa or South Korea may theoretically be using their own devices through BYOD one day.

Deputy Chief of Staff, G-6 Lt. Gen. John B. Morrison, Jr. emphasizes that the Army's BYOD Pilot is ... [+] evolving and will go forward based on its productivity, security and a cost-driven business case.

While General Morrison says there has been no discussion of using the Bring Your Own Device approach in tactical scenarios at this time, he does not rule out the possibility. That would surely raise additional security concerns and Morrison adds, Were very mindful of the capability some of our adversaries have to use cellphones to do direction-finding and identification.

But for now, BYOD is a tool that replaces the GFEs mostly carried by those at the Army leadership level Morrison says. That includes a fair number of people. Phase III of the pilot will extend to 20,000 users.

Dr. Iyer says it can fully scale to over 20,000 users including National Guardsmen and Reservists whom the Army has also included in the Pilot. If, as LTG Morrison says, the Army will use Phase III to look at other use cases BYOD may have to expand beyond the above number.

The user population brings the BYOD proposition back to cost. If the Army can eliminate the need to provide 20,000 devices, it could probably save come coin. But this proposition has some wrinkles.

For one, both Gen. Morrison and Dr. Iyer stress that the Pilot (and ultimately a program) are strictly voluntary. However if the user base is smaller than anticipated, the cost of acquiring the commercial license for the BYOD app and maintaining its link to the Army cloud may outweigh the savings from handing out fewer phones.

The participation of Guardsmen (both Army and Air Force) and Reservists introduces another nuance to the cost equation. In addition to LTG Morrison and Dr. Iyer, I spoke with Kenneth C. McNeill, CIO at the National Guard Bureau who affirmed that Phase II BYOD testing with Guard Soldiers and Airmen went quite well.

He points out that only a relative handful of Guardsmen (and Reservists) actually have GFEs. To communicate and conduct official business, they have to go to an Armory or other post. When they respond to hurricanes, floods or [provide] whatever support theyre asked to, McNeill said, this will give them the capability to stay connected, pre and post mobilizing.

But since Guardsmen and Reservists who volunteer to use their own phones currently have no GFEs, their participation effectively represents no saving. The convenience may be welcome but Morrison acknowledges, We will do due diligence on whether it fiscally makes sense to move this forward.

Some in the cybersecurity community have already been asking whether moving forward with BYOD makes sense. While Army BYOD is not a classified system, penetrating it would still yield potential insights for U.S. adversaries like China which has derived real benefit over the last three decades from open-source intel, let-alone controlled information.

The Army is cognizant of this and with security foremost in mind, it has given BYOD a Halo.

A Security Halo

The key to BYOD is the ability to securely connect users personal devices to the Armys enterprise cloud environment. Known as cArmy, the services cloud currently offers shared services in the Amazon AMZN Web Services (AWS) and Microsoft Azure clouds at IL 2, 4 and 5.

To enable BYOD the Army turned to Hypori, a Virginia-based SaaS firm which has developed Halo cloud-access software. Halo renders applications and data that reside inside the cArmy cloud on a users device as pixels.

These virtual images allow users to interact and work within cArmy, without any actual transfer of data. Raj Iyer describes Halo-enabled phones as dumb display units which show representations of email, scheduling, spreadsheets or other applications hosted by cArmy. None of it resides on the users device.

This approach largely shifts security from the device to the cloud itself. It allows the service to focus its efforts on defending a single point - cArmy - rather than a collection of phones or laptops. The Army controls access to the cloud (right down to physical access to its servers) and constantly monitors the environment.

Hypori's Halo cloud software connects mobile devices to applications in the cloud via a pixel ... [+] presentation. No data is actually transferred to or from the edge device.

If an anomaly pops up inside cArmy, the Armys Enterprise Cloud Management Agency tells me that it is confident it can rapidly detect and identify an intrusion and defend the BYOD environment. Halo-enabled BYOD has been repeatedly red-teamed Iyer says, passing these evaluations with flying colors and outperforming the solutions the Navy and Air Force have chosen.

Despite their high level of confidence in Halo, both Iyer and General Morrison acknowledge that one can never-say-never in cybersecurity matters. The same centralization in the cloud allows U.S. adversaries to focus their own resources on a single target - cArmy.

While no data rests on the device, the vulnerabilities that always exist at the intersection between hardware, software and the internet remain as does the threat of what the Army cannot control. That stretches from the industrial architecture underpinning the cloud and cloud vendors (Amazon, Microsoft) to the risk of insider exploits.

One of the most notable cloud breaches was publicly acknowledged last May when news broke that in 2019 a former AWS employee exploited her knowledge of cloud server vulnerabilities at Capital One COF and more than 30 other companies to steal the personal information of over 100 million people, including names, dates-of-birth, and social security numbers. The possibility of such an insider breach of BYOD or other cloud systems rings as real to the Army as the name, Bradley Manning.

Even though the Army BYOD is currently intended for non-classified work, LTG Morrison stresses that, Weve baked cybersecurity in early and often and well do it again if we go live and do continual assessments to ensure that we adequately secure the capability were providing.

What was interesting to us about Halo was that we could implement it on devices that were unmanaged, Dr. Iyer says.

Other BYOD solutions come with a Mobile Device Management (MDM) approach which requires the environment (cloud) owner to take control of the device, typically to ensure security and compliance issues. For users, MDM raises privacy concerns which might prove a significant obstacle to adoption. But there is no MDM with Halo. The Army does not control the users device and cannot see beyond its own cloud boundary.

Before BYOD, one of the things we consistently heard from our users was that they didnt want their cellphones to be monitored or wiped if there was any potential [data] spillage, Iyer acknowledges.

The Army G-6 is confident enough in the privacy and security of Halo that I was told that there would be no obstacle to users having it on their phones - right next to Tinder, Reddit, or even TikTok.

Convenience or Burden?

As noted, adoption will be key to BYOD. General Morrison notes that the cost savings it may help the Army realize are up there in terms of importance with the productivity gains and security expected with BYOD. Its success in delivering on this trio of elements will determine a path beyond the current Pilot.

We will do due diligence on whether it fiscally makes sense to move this forward, Morrison affirms.

Users may ultimately have to weigh the convenience of using their own devices for official business with the cost. Some observers have already questioned whether BYOD simply shifts the burden of ownership of appropriate devices with sufficient data plans, identity security, and personal accountability from the government to the individual.

Having the right phone may or may not be a hurdle. In fact, my discussions with the G-6, General Morrison, Dr. Iyer and Hypori illustrated some cloudiness on the issue.

According to the G-6 there will be a list of approved devices which would not include phones no longer supported by their original equipment manufacturers like older Android and Apple versions. An iPhone 6, for example, wouldnt be acceptable. (Nor presumably, would a Huawei phone.) A signed user agreement for BYOD would also require that device owners maintain the latest security updates to remain eligible to work via the app.

However, Raj Iyer differed with the strict notion of approved devices, telling me that a user could bring just about anything to BYOD. Because it is an unmanaged solution, there are no specific requirements for what cellphone you bring. God forbid if you have a BlackBerry somewhere, that might work too.

I was later told Dr. Iyer was joking about the BlackBerry but the impression is that almost anything goes. To be sure I checked with Hypori CEO, Jared Shepard.

Shepard re-emphasized that Hypori Halo is a zero-trust platform which assumes that all edge devices are compromised. By design, it does not allow interaction of data from the protected environment with the device.

But he added, As a Security best practice we recommend that only devices that are still supported [updated and patched] by the manufacturers be allowed. This allows a tremendous amount of flexibility for devices new and old [many 4-6yrs old or more]. Currently iPhone 6 and 7 are still supported by Apple.

We will learn how this capability reacts to different kinds of phones that are out there, Morrison concludes.

As with other aspects of BYOD, the Army will have to have consistent messaging on its user requirements. These include identity. According to Iyer, BYOD employs multi-factor authentication (MFA, passwords augmented by scanning a fingerprint or entering a code received by phone for example).

However, the user identification system employed may also limit devices that can be used with BYOD. For example, Cisco Systems Duo MFA device requirements include a Secure Startup mode and a Cisco-approved operating system (Android 7 or higher) among other things.

Dr. Iyer points out that the Armys enterprise IT management system not only identifies but tracks BYOD phone locations. If a phone operating in Washington DC pops up three hours later in China, somethings obviously wrong. Devices will generally have to indicate active use inside the U.S. While the Army wont have access to personal data, dropping a GFE device wont allow users to go un-tracked.

Iyer says he has seen tremendous excitement about BYOD on social media, suggesting a population eager to embrace the scheme. But given its rollout largely to a group of more senior Army and civilian users, there may be less enthusiasm for yoking ones personal device (and consumer data plan) to BYOD than for a broader cross-section of the Army.

Indeed, one senior Army National Guard officer with a background in cybersecurity told me that while he thinks BYOD may be a useful convenience in the future, hed likely stick with his GFE. Since BYOD is strictly voluntary, potentially eligible users could elect to stay with their government furnished phones prompting a question as to whether personnel who decline to participate might worry about the career implications of taking a pass on BYOD.

This is not going to be viewed favorably or unfavorably, Dr. Iyer assures. I believe that the majority of our users will want it.

Kenneth McNeill thinks people will eventually get comfortable with the idea and says theres already a sizeable group of Guardsmen and Reservists volunteering. General Morrison characterizes early adopters as BYOD champions, people who are helping craft the tactics, techniques and procedures for its use. As Phase III progresses the Army will evaluate its expanded mix of users, continually reassessing the Pilot and iterating the app. How BYOD will ultimately take shape isnt known yet Morrison acknowledges.

Were being very pragmatic, he stresses. That includes putting BYOD through several legal reviews. Army personnel and DoD civilians will have the last word, ultimately making it clear to the service whether theyre comfortable enough with the privacy, security, cost and convenience of personal devices as a gateway to the Army cloud to bring their own.

More:
A Plan to Let Soldiers Interact with the Army Cloud Using Their Own Devices Got a Bit Clouded - Forbes

Read More..