Page 1,857«..1020..1,8561,8571,8581,859..1,8701,880..»

Disrupting Data Science in Neuroscience Research and AI – PR Web

Dimitri Yatsenko

TAMPA BAY, Fla. (PRWEB) August 23, 2022

In 2013, then-President Obama launched the brain initiative, which allocated funding to map every neuron in the brain. Understanding how the brain works can revolutionize the lives of many Americans, solving the complex problems of Alzheimers and Parkinsons disease, depression, and traumatic brain injury (1). However, mapping the brain alone does not reveal how it functions. Different parts of the brain appear similar but function differently, and each person has unique brain anatomy (2).

Neuroscientists have historically worked alone on individual projects, but as technology and data advance, they have to team up to achieve meaningful results. The need for data analysis has allocated neuroscience graduate students to solving complex computer science problems. This presents two significant problems. First, the number of years to achieve a neuroscience Ph.D. is increasing. Second, each graduate student solves the problems presented to them in isolation, which fails to create continuity either after they leave or between research teams. The result is a vast amount of available data failing to achieve its potential. Enter stabilizing disruptor Dimitri Yatsenko, CEO of DataJoint, who explains to Karla Jo Helms, host of the Disruption Interruption podcast, that to be used effectively for the greater good, the vast data recorded about the brain has to be analyzed with continuity between universities, laboratories, and research teams.

Dimitri Yatsenkos background in computer science gave him a unique perspective when his fascination with the human brain led him to neuroscience. He saw independent labs repeatedly reinventing ways of doing data analysis, weighing grad students down with data analysis that had little to do with their passions, and falling short of their collaborative potential. Dimitri said to himself, THATS IT IM DONE WITH THE STATUS QUO and began to develop a computational framework to create continuity across projects, teams, and applications. He made it cloud compatible, containerized, and web-accessible so it can be quickly deployed for multi-lab collaborations, and DataJoint was born.

Dimitri explains:

We have more data gathered about the brain and its circuits than at any other time in history. We need to combine molecular, genetic, and electrophysiology data, which is beyond the scope of any single neuroscientist. Understanding the brain requires a systematic approach to data and modeling.

Progress is limited by the tsunami of data and the systems required to model and analyze it.Up to half of the time spent on any neuroscience project is software engineering and systems engineering.

Neuroscientists are fundamentally curious about how the brain, its circuits, our interaction with the environment, and our genetic programming work to produce intelligence. However, the next level of understanding relates to how molecules, genes, and stimuli interact to shape circuits and how circuit systems produce adaptive behavior.

The brain is complex but has patterns to it. You can make the same circuits of the neocortex (the outer portion of the mammalian brain) solve very different problems. The more we understand the principles of how this works, the more effectively we can apply machine learning to understand how circuits and populations of neurons work together in the living brain.

What neuroscience teams want to achieve logically and computationally requires infrastructure, communication, and organization across departments. They havent had the tools to support this requirement, and its adding to the overhead costs of research.Commercial companies can help execute things more effectively and provide computation as a service rather than having each lab reproduce the same computation with graduate students.

DataJoint provides a systematic framework to work with data and computation and bridge communication gaps in one unified framework.

Disruption Interruption is the podcast where youll hear from todays biggest Industry Disruptors. Learn what motivated them to bring about change and how they overcome opposition to adoption.

Disruption Interruption can be listened to via the Podbean app, and is available on Apples App Store and Google Play.

About Disruption Interruption:Disruption is happening on an unprecedented scale, impacting all manner of industries MedTech, Finance, IT, eCommerce, shipping and logistics, and more and COVID has moved their timelines up a full decade or more. But WHO are these disruptors, and when did they say, THATS IT! IVE HAD IT!? Time to Disrupt and Interrupt with host Karla Jo KJ Helms, veteran communications disruptor. KJ interviews bad a**es who are disrupting their industries and altering economic networks that have become antiquated with an establishment resistant to progress. She delves into uncovering secrets from industry rebels and quiet revolutionaries that uncover common traits and not-so-common that are changing our economic markets and lives. Visit the worlds key pioneers that persist to success, despite arrows in their backs at http://www.disruptioninterruption.com.

About Karla Jo Helms:Karla Jo Helms is the Chief Evangelist and Anti-PR Strategist for JOTO PR Disruptors.

Karla Jo learned firsthand how unforgiving business can be when millions of dollars are on the line and how the control of public opinion often determines whether one company is happily chosen or another is brutally rejected. Being an alumnus of crisis management, Karla Jo has worked with litigation attorneys, private investigators, and the media to help restore companies of goodwill back into the good graces of public opinion Karla Jo operates on the ethic of getting it right the first time, not relying on second chances and doing what it takes to excel. Helms speaks globally on public relations, how the PR industry itself has lost its way, and how, in the right hands, corporations can harness the power of Anti-PR to drive markets and impact market perception.

About DataJoint:Dimitri Yatsenko is the Chief Executive Office at DataJoint, which is the leading data analysis platform and toolkit for neurophysiology researchers. They develop data science frameworks, platforms, and services for collaborative research, focusing on neuroscience and AI.

With a Ph.D. in Neuroscience (Baylor College of Medicine) and M.S. in Computational Engineering and Science (University of Utah), Dimitri holds an extensive record of projects in academia and industry in areas of signal analysis and image processing, machine learning, medical imaging, data science, and neurophysiology. While engaged in neuroscience research at Baylor College of Medicine, Dimitri started the DataJoint framework as an open source framework https://datajoint.org. Researchers turned to the project to organize a computational data pipeline spanning multiple labs. After receiving his Ph.D., Dimitri co-founded DataJoint to develop solutions and services for data-driven team science to bridge both social and technical gaps. For more information, visit https://www.datajoint.com

Sources:1.Obama White House Archives; THE BRAIN INITIATIVE. Brain Research through Advancing Innovative Neurotechnologies. Retrieved 11 August 2022, obamawhitehouse.archives.gov/BRAIN.2.University of Zurich. "Every person has a unique brain anatomy." ScienceDaily. ScienceDaily, 10 July 2018.

Read more here:

Disrupting Data Science in Neuroscience Research and AI - PR Web

Read More..

IIT Patna is Offering New Courses in Computer Science, Business Management Mapped With Industry Demand – News18

IIT Patna is all set to start six new academic programs compliant to National Education Policy (NEP-2020).The new programs are starting with three academic programs in computer science stream and three academic programs in business management stream.

The three-year UG program is designed for aspirations of school (10+2) pass outs who have dreamt of IIT quality education but have missed the bus through JEE(Advance). There is multiple channel for entry to these new programs of studies, i.e.; valid score of JEE Main, CUCET, SAT(US), NTSE, KVPY, INSPIRE, State level entrance and IITP-SAT.Each of the three year UG programs are designed to impart skill in demand by industry and employers worldwide, reads the press release issued by IIT Patna.

The later course structure is aligned at par with professional body framework course structure requirement like ICAI, ICSE, CIMA, ACCA, CPA, NSE etc. The hybrid mode of instruction is another unique feature to enable the day scholars of any other program (say B.Tech.) with an alternative avenue to enhance their skill simultaneously without hassle, added the release.

Each program of both the streams will have an intake of 250 students taking total intake to 1500. The semester fee for computer science program and management program will be Rs 40,000 and 50,000 respectively.

On successful completion of the three-year degree program, the candidates will be awarded IITP alumni status. However, the opportunity of entry and exit scope exists at each year with an opportunity to re-enter later with credit bank facility.

Read the Latest News and Breaking News here

Go here to read the rest:

IIT Patna is Offering New Courses in Computer Science, Business Management Mapped With Industry Demand - News18

Read More..

UCI-led study identifies social media strategies to educate young adults on vaccine effectiveness and accessibility – Newswise

Newswise Public health researchers from the University of California, Irvine identified several social media messaging strategies to educate young adults and their parents about evidence-based interventions around the human papillomaviruses (HPV). Their findings could help inform future health information social media campaigns, beyond the HPV vaccine, on the benefits of lifesaving interventions.

Roughly 14 million Americans are infected with new HPV cases annually as the most common sexually transmitted infection in the U.S. Yet, despite the robust safety profile of HPV vaccination that has reduced HPV morbidity by 64% among vaccinated 14- to 19-year-olds, low vaccination rates (roughly 55%) persist particularly among young adults aged 1826 and have dropped drastically during the pandemic.

Despite the broad use of social media 330 million unique users in the United States alone effectively disseminating evidence-based vaccine interventions in the competitive social media messaging environment has posed a challenge for healthcare agencies, such as the National Cancer Institute.

Led by Suellen Hopfer, Ph.D., assistant professor of health, society, and behavior at the UCI Program in Public Health, a team of researchers conducted a 4-month observational study to determine effective social media strategies for broadcasting narrative HPV vaccine intervention videos across three platforms: Instagram, TikTok, and Twitter.

Study findings are published in the journal Frontiers in Digital Health.

Social media is a powerful tool that has the potential to revolutionize health interventions if used correctly, with social media being dubbed the new vital sign, said Hopfer, who also has affiliations with the UCI Department of Pediatrics and the UCI Center for Virus Research.

Adapting evidence-based videos for social media, the team used a push-pull framework to push or disseminate HPV vaccine messages and anticipated pull or engagement from social media users. One of the biggest challenges in the competitive social media environment is engagement. Twelve strategies were implemented and tested over four months to increase engagement, by building a following.

The teams evaluation of the social media HPV vaccine intervention campaign showed that engagement with the online profile @RealHotGirlShot and its content increased across all three platforms, but Instagram and TikTok outperformed Twitter on impressions, followers, engagement, and reach. Among the most effective strategies were segmenting videos and emphasizing specific vaccine messaging with captions or questions, using more hashtags including COVID-19 hashtags, posting frequently during certain times of the day and on certain days of the week, and using tag-and-follow influencer strategies.

Our findings provide valuable insight to help with engagement and future vaccine messaging campaigns, and, in the case of the HPV vaccination, cancer-saving public health messages, Hopfer added.

The study is among the first of its kind to implement vaccine intervention information in a real-time scenario in the competitive social media messaging environment versus a controlled setting. The study also contributes to the body of research around digital interventions and steps needed to adapt health behavior change interventions for a social media setting.

Co-authors include Kalani Kieu-Diem Phillips, MPH, a UCI public health doctoral student; Hannah Vasquez, MPH, and Sarah Alkhatib, MPH, both UCI graduates from the Program in Public Health; Sanda M. Harabagiu, a professor of computer science and computational linguist and Maxwell Weinzierl, a computer science doctoral student, both from the University of Texas at Dallas.

See more here:

UCI-led study identifies social media strategies to educate young adults on vaccine effectiveness and accessibility - Newswise

Read More..

Research Fellow in Applied Cryptography And Data Security job with UNIVERSITY OF SURREY | 306274 – Times Higher Education

Computer Science

Location: GuildfordSalary: 33,314 to 42,155 per annumFixed TermPost Type: Full TimeClosing Date: 23.59 hours BST on Tuesday 20 September 2022Reference: 058222

The Department of Computer Science at the University of Surrey is seeking to recruit an outstanding Research Fellow in the field of applied cryptography and data security for a full-time position. This is a fixed-term appointment for 36 months. The expected start is October 2022 or as soon as possible thereafter.

The post holder will be contributing to two EU-funded research projects Continuous and Efficient Cooperative Trust Management for Resilient CCAM (the project short name is CONNECT) and Rewiring the Compositional Security Verification and Assurance of Systems of Systems Lifecycle (the project short name is REWIRE).

The main responsibility of the post holder will be in the design and development of new cryptographic protocols for trusted computing and secure systems, including attribute-based encryption and signatures, anonymous signatures, remote attestation, and distributed ledger technologies.

The Department of Computer Science within the Faculty of Engineering and Physical Sciences has an international reputation for research and teaching. Research in the department is focused on three main areas - Nature Inspired Computing and Engineering (NICE), Distributed and Networked Systems, and Secure Systems, with Surrey hosting UK Academic Centres of Excellence both in Research and in Education, both recognised by GCHQ.

The position offers the platform for the research fellow to develop skills to become an independent researcher. The successful candidate will work under the direction of Professor Liqun Chen and Dr Catalin Dragan. The research fellow will also work with the other colleagues of the Surrey Centre for Cyber Security and collaborate with the other partners of the CONNECT project consortium and the REWIRE project consortium.

We are looking for applicants that demonstrate strong research and protocol design skills, have strong communication skills, and have enthusiasm for developing their own research ideas. Applicants should have knowledge and experience in the design of cryptographic protocols for trusted computing and secure systems, and a good understanding of distributed ledger technologies. Skills in software engineering would be an advantage but being willing to learn how to develop a software prototype for demonstration is acceptable.

Applicants should have a PhD (or close to completing a PhD degree) in a relevant subject or equivalent professional experience.

For informal enquiries please contact Professor Liqun Chen atliqun.chen@surrey.ac.uk.

Please note, it is University Policy to offer a starting salary equivalent to Level 3.6 (33,314) to successful applicants who have been awarded, but are yet to receive, their PhD certificate. Once the original PhD certificate has been submitted to the local HR Department, the salary will be increased to Level 4.1 (34,308).

Furtherdetails:JobDescription

For more informationand to apply online, please download the further details and click on the 'apply online' button above.

In return we offer a generous pension, relocation assistance where appropriate, flexible working options including job share and blended home/campus working locations (dependent on work duties), access to world-class leisure facilities on campus, a range of travel schemes and supportive family friendly benefits including an excellent on-site nursery.

Click here to find out more about the benefits we offer to support you.

The University of Surrey is committed to providing an inclusive environment that offers equal opportunities for all. We place great value on diversity and are seeking to increase the diversity within our community. Therefore we particularly encourage applications from under-represented groups, such as people from Black, Asian and minority ethnic groups and people with disabilities.

Read the rest here:

Research Fellow in Applied Cryptography And Data Security job with UNIVERSITY OF SURREY | 306274 - Times Higher Education

Read More..

Two Thirds Ethereum Nodes Are With AWS, Hetzner & OVH Cloud Servers – Infostor magazine

Currently, 4,653 active Ethereum nodes are managed by different centralized web providers. The important topic of discussion and has become part of trending news these days is that three cloud providers account for two-thirds of these 4,653 Ethereum nodes.

Source: Messari- Twitter

According to crypto analytics platform Messari, Three major cloud providers are responsible for 69% of the 65% of @Ethereum nodes hosted in data centers. Of the estimated 95% of @Solana nodes hosted in data centers, 72% are hosted with the same cloud providers as @Ethereum.

This special report shared by Messari clearly shows that Ethereum and Solana blockchain nodes are centralized to a considerable extent by the three primary cloud providers.

As per the data shared by Messari, three major cloud providers are responsible for 69% of the 65% of Ethereum nodes hosted in data centers. Also, the same three cloud providers are responsible for 72% of 95% of Solana nodes hosted in data centers.

Analyzing this tweet and the image shared by Messari makes us that Amazon Web Service is responsible for 50% of the hosted nodes on the Ethereum Main net. Apart from Amazon, the two other primary cloud providers, Hetzner and OVH, are responsible for 15% and 4% of the hosted nodes, respectively.

Also, the same is the situation of the Solana Hosted nodes. Hetzner accounts for 42% of the hosted Solana nodes. OVH stands at the second position with 26%, and AWS takes 3% of the total hosted Solana nodes.

Also read: 20 Most Expensive NFTs Sales In 2022

The current situation of 3 cloud providers acquiring two-thirds of Ethereum nodes indicates that crypto needs to decentralize. Presently, there are many companies favoring blockchain centralization. Digital companies need to clearly understand decentralization is crucial to protect Ethernodes from central points of failure.

Even if geographical centralization is a massive problem, still no steps are taken for the same. The United States and Germany account for 60% of Ethereum distributed globally.

With the increasing node and geographical centralization, you can expect more focus on the decentralization of blockchain networks. As blockchain networks like Ethereum and Solana face many risks, other crypto analytics platforms may share strong messages like this to solve these problems.

It is crucial to stop complete centralization as this exposes Ethernodes to central points of failure. We will have to wait and watch to see the steps which will be taken to reduce centralization.

Infostor.com (c)

See more here:
Two Thirds Ethereum Nodes Are With AWS, Hetzner & OVH Cloud Servers - Infostor magazine

Read More..

Audi putting a centralized server solution into test operation in cycle-dependent production; edge solution gets rid of individual PCs – Green Car…

Audi is putting a centralized server solution into test operation in cycle-dependent production; it says it is the first manufacturer to do so. With this Edge Cloud 4 Production local server solution, Audi is initiating a paradigm shift in automation technology.

With the Edge Cloud 4 Production, a few centralized and local servers will take on the work of countless expensive industrial PCs. The server solution makes it possible to level out spikes in demand over the total number of virtualized clientsa more efficient use of resources. Production will save time and effort, particularly where software rollouts, operating system changes, and IT-related expenses are concerned.

What were doing here is a revolution. We used to have to buy hardware when we wanted to introduce new functions. With Edge Cloud 4 Production, we only buy applications in the form of software. That is the crucial step toward IT-based production.

Gerd Walker, Member of the Board of Management of AUDI AG Production and Logistics

After successful testing in the Audi Production Lab (P-Lab), three local servers will take over directing workers in the Bllinger Hfe. If the server infrastructure continues to operate reliably, Audi wants to roll out this automation technology for serial production throughout the entire Volkswagen Group.

In the Bllinger Hfe near Neckarsulm, the Audi e-tron GT quattro1 and the R8 share an assembly line. The small-scale series e produced there are particularly well suited for testing projects from the P-Lab and trying things out for large-scale series.

The crucial advantage of Edge Cloud 4 Production is that countless industrial PCs can be replaced along with their input and output devices and no longer need to be individually maintained. Process safety is also greatly improved. In the event of a disruption, the load can be shifted to other servers. In contrast, a broken industrial PC would have to be replaced. That takes time. On top of that, the solution reduces the workload for employees.

In the future, thin clients capable of what is known as power-over-Ethernet will set the pace. These terminal devices get their electrical power via Ethernet cables and most of their computational power through local servers. They have USB ports for output devices. That enables managers directing workers to look at a monitor and see what needs to be mounted onto which vehicle. In the future, an oversized PC with processing and storage capacity will not be necessary for these tasks.

Software-based infrastructures have proven themselves in data processing centers. Were convinced they will also work well in production.

Henning Lser, head of Audis Production Lab

Together with the experts from the P-Lab, the IT managers around Christoph Hagmller, the Head of IT Services at Audi in Neckarsulm and co-manager for Production IT in the Bllinger Hfe, are rolling out the new solution. With its comparatively low unit and cycle numbers, the Bllinger Hfe is ideally suited to functioning as a real lab for testing the new concept in series production.

Edge Cloud 4 Production has a hyper-converged infrastructure (HCI). This software-defined system combines all the elements of a small data processing center: storage, computing, networking, and management. The software defines functionalities such as web servers, databases, and managing systems. The cloud solution can also be quickly scaled at will to adapt to changing production requirements.

However, a public cloud link is out of the question due to productions stringent security requirements. Additionally, local servers make the necessary, very short latencies possible.

These are the reasons why we install the servers near us. Thats also why we call the solution Edge Cloud: because its close to our shop floor environment.

Henning Lser

The new IT concept also improves ease of maintenance and IT security. With industrial PCs, the patch cycles (the intervals between necessary updates) are usually longer. On top of that, updates can only be installed during pauses in production. With the cloud-based infrastructure, IT experts can roll out patches in all phases within a few minutes via the central servers. Moreover, IT colleagues install functionality updates in all virtual clients at the same time, such as a new operating system.

Hagmller says that the need for additional functionality will get increasingly elaborate and expensive in the future. He estimates that the cost of an updatefor example, from Windows 10 to Windows 11can be reduced by about one-third.

Additionally, with the server solution, we arent dependent on loose timeframes in Production anymore. It gives us tremendous flexibility to ensure our software and operating systems are always completely up to date.

Christoph Hagmller

Both data processing centers in the Neckarsulm plant are slated for subsequent mass production. A fiber optic cable connects them with the Bllinger Hfe. According to Henning Lser, 5G will be relevant in the second stage. Thus far, a separate computer has been installed in every automated guided vehicle (AGV). Here too, experts must install costly security updates and new operating systems. It is conceivable that they could acquire new functionalities, but they are seldom transferable to their computers.

We need a fast, high-availability network for that. In our testing environment in the P-Lab, we have taken another step forward concerning 5G.

Henning Lser

Read the original post:
Audi putting a centralized server solution into test operation in cycle-dependent production; edge solution gets rid of individual PCs - Green Car...

Read More..

Why There’s Renewed Interest In The Cloud for Healthcare – HIT Consultant

Wes Wright, Chief Technology Officer at Imprivata

From the development of the EMR to the growth of telehealth, the digital environment for healthcare has evolved tremendously over the last few years. So, its no surprise that IT spending is set to increase by 12.3% for cloud computing, 9.7%, for digital transformation, and 9.7% for security software this year. Though healthcare organizations have historically been slower to adopt cloud, were now seeing renewed interest.

Has the pandemic caused a reaction among IT leaders to follow this trend? Or is cloud just the start of a digital identity revolution for care providers? Lets dive into the main factors behind this trend.

But first why has healthcare lagged other industries in cloud adoption?

Cloud isnt anything new. In fact, almost all businesses use it in some form, and the market for public cloud alone will be worth over $800 billion by 2025. However, the healthcare sector can be slow to adopt new technologies like cloud.

Any medical data stored in the cloud is accessible from multiple locations. So, anything ranging from a patients personal health information (PHI) to a clinician or doctors digital identity is a lot more vulnerable to cyberattacks. With industry leaders focused on compliance, regulation, and security, this understandably makes healthcare leaders hesitant to adopt these technologies.

But while this threat appears in the cloud, a greater one lies in human error and negligence where a lost device or stolen password can lead to a breach just as easily as a phishing attempt.

The good news is that there are many solutions on the market today that HDOs can implement to mitigate security risks by protecting the digital identities of those accessing sensitive patient information.

Why is it important to protect a users digital identity?

Digital identity refers to the unique identifiers an individual uses to interact online. For example, a doctor uses their digital identity to log into a patients medical record. Of course, protecting these identifying credentials is crucial to reducing the risk of a cyberattack or breach of sensitive information.

Fortunately, digital identity solutions have seen more widespread adoption due to the need to manage and secure a multitude of users, locations, and devices many of which are cloud technologies. HDOs that have implemented these solutions have seen their security posture strengthen, allowing IT leaders to put more trust in cloud.

These solutions also provide HIPAA compliance a growing topic of importance as telehealth and virtual care open even more access points to a users digital identity. In the U.S., HIPAA encourages the use of electronic medical records and includes standards for protecting PHI. These standards affect any organization that handles patient data including cloud service providers.

Still, finding a HIPAA compliant digital identity solution is only one component of reaching a secure digital environment. HDOs must also configure their infrastructure, monitor it continuously and address any issues that arise. As such, many healthcare leaders are fearful of making a compliance misstep when they migrate to the cloud with the potential of hefty fines. Luckily, more digital identity solutions have taken steps to address these fears through the cloud.

So, how will the cloud change healthcare IT?

Within and beyond hospital walls, care as we know it has changed drastically since the onset of the pandemic. Keeping up with the rising number of COVID-19 patients while continuing care for the public has left clinicians and IT leaders with a lot more to keep track of (not to mention some serious burnout.) Fortunately, cloud offerings provide appealing capabilities that could lead to more innovative patient care while combatting ongoing IT talent shortages, and the pressure of growing costs.

Improve patient care through the cloud

Over the last couple decades, weve seen the electronic medical record (EMR) transform data storage for HDOs. How and where that data is accessed is different too, with many clinicians using smartphones and tablets to send information and access patient records. But as the digital health landscape evolves and cyberattacks rise, more safeguards have been put in place to protect this sensitive information but at what cost to the patient experience?

Using any mobile device often requires clinicians to connect to a VPN and authenticate at least twice not ideal for those working to provide care without worrying about technology.

How can cloud help? By providing ease for HDOs while empowering patients.

Weve already seen many healthcare organizations adopt cloud technologies with the rise of telemedicine, a trend that shows no signs of slowing. Many are using cloud to implement services that make it easier to share health data, treatment plans, lab test reports, medical records and even doctors notes, without sacrificing security.

For clinicians using mobile devices, cloud access is a secure and seamless option. Theres no need to access the VPN with multiple log ins because of the encrypted connection. This alone has given patients better visibility, access, and options regarding their own health, as HDOs maintain HIPAA compliance.

Maintain IT security amid resource constraints

As the amount of data in hospital systems continues growing, the responsibilities of IT staff have expanded as well quite a bit. Just as weve seen in other industries throughout the pandemic, this burnout has resulted in healthcare talent shortages and resource constraints.

But every talent shortage has a silver lining. In this case, its increased cloud adoption. For short-staffed healthcare organizations struggling to find qualified workers, cloud is a much more attractive option than on-site storage. HDOs can outsource all maintenance and support to cloud service providers. Those managing cloud servers are often IT experts trained at securing massive amounts of data further increasing the security of cloud.

Many analytical tools are used through cloud to handle database management, business analytics, artificial intelligence, and beyond. This adds a layer of security while converting data into meaningful information.

Growing cost pressures

Participants spent around 50-70% less when storing PHI in the cloud, compared to on-premises, according to a Black Book survey on the state of healthcare IT. At a time when IT budgets are being squeezed in all directions by increasing insurance rates, rising salaries, growing user demands, and higher overall operating costs, this represents an important saving.

Why is cloud cheaper than on-premises storage? First, because it requires little to no upfront spend on hardware and licensing. Second, because it enables users to pay as they go for availability and storage, as well as offering limitless scalability. And third, it supports remote access for clinicians.

For some healthcare organizations, the unpredictable price of energy might also play a role. Powering and cooling an on-premises data center is extremely energy intensive, and therefore costly. Migrating to the cloud protects organizations from this at least in part.

Finally, its worth noting the growing popularity of hybrid cloud solutions the market for which is forecast to triple in value from 2020 to 2026, rising from $52 to $145 billion. Hybrid cloud refers to any solution that combines private storage infrastructure with public cloud.

Hybrid cloud also enables organizations to select storage thats customized to the performance and cost requirements of their specific workload. For example, healthcare organizations can store dynamic, short-term workloads in the public cloud. Meanwhile, more static long-term workloads can be stored on-premises for less, leading to long-term cost savings.

Whats next for the cloud in healthcare?

Healthcare capabilities will continue to evolve with the cloud, enhancing security and patient care. IT constraints, the lack of security expertise, and financial limitations are just a few of the burdens that cloud will help HDOs overcome and manage.

Hybrid cloud will likely be the shift for many healthcare organizations opening the door for identity and access management providers to develop and integrate sleek and sophisticated cloud solutions that allow clinicians to focus more on care and less on technology at every touchpoint.

Weve all adjusted to a new normal over the last few years, and now, well see healthcare IT do the same.

About Wes Wright

Wes Wright is the Chief Technology Officer at Imprivata. Wes brings more than 20 years of experience with healthcare providers, IT leadership, and security. Prior to joining Imprivata, Wes was the CTO at Sutter Health, where he was responsible for technical services strategies and operational activities for the 26-hospital system. Wes has been the CIO at Seattle Childrens Hospital and has served as the Chief of Staff for a three-star general in the US Air Force.

Excerpt from:
Why There's Renewed Interest In The Cloud for Healthcare - HIT Consultant

Read More..

The art of the multicloud deployment in your organization – TechRepublic

Image: iStock

As cloud adoption has constantly been on the rise, it is becoming increasingly risky for organizations to host all of their applications and data on one cloud provider. Risk can be mitigated through multicloud deployment, which spreads resources across multiple cloud providers.

Jump to:

Multicloud refers to a deployment that depends on cloud services provided by two or more cloud vendors. It involves having workloads in multiple cloud providers.

Multicloud deployments also involve a calculated approach to the design and deployment of resources to ensure application architecture and the strengths of prospective infrastructure providers are complementary.

SEE:Multicloud explained: A cheat sheet (TechRepublic)

A key benefit of a multicloud deployment approach is that it ensures mission-critical services do not suffer outages when a cloud provider suffers an outage. Such resilience is crucial for systems and applications that need to serve end users around the clock.

Todays business needs are constantly changing. Multicloud deployments enable organizations to stay flexible and agile in the face of constant and rapid change. It also allows organizations to satisfy different data needs and ensure data is available.

Organizational IT compliance requirements around areas of data privacy and data sovereignty often vary. When dealing with data that involves stringent data security measures, multicloud deployments allow organizations to store sensitive data in a hardened private cloud and control how public cloud environments query them.

Multicloud deployments provide enterprises with a way out of being tied to one provider, as the alignment between a provider and an enterprise may change with time. Misalignment may yield increased cost and ineffective service delivery. Furthermore, changing providers as a result of this misalignment may be expensive and time-consuming. Multicloud environments limit organizations exposure to vendor lock-in.

Multicloud deployments may provide an organization with the means to optimize the costs of cloud technologies and the reliability of workloads. As cloud providers vary in offering and cost, organizations can choose which providers cost-effectively align with their strategic initiatives.

A single cloud provider may introduce a sharp learning curve to teams as a result of the processes and systems IT teams are required to learn in addition to familiarity with the services these providers introduce. Now, consider the impact of the adoption of more providers. It may be challenging to ensure teams remain competent across all environments.

Overall, cost proves to be a challenge for multicloud deployments. An extra cost is generated from the additional traffic and management layer between cloud environments. Unnecessary expenses can arise when organizations fail to grasp the differences in costs between cloud providers.

Also, the cost of hiring and training staff for all of the cloud environments and the cost of unutilized resources that can go unnoticed in complex cloud environments shows that costs can easily spiral out of control without proper management and monitoring.

There are a number of considerations that need to be made for successful multicloud deployment. These include infrastructure, operations and applications.

A multicloud deployment plan should be specific about the target infrastructure based on the current and future needs of various stakeholders. The plan has to also take into consideration the impact of advanced technologies like software-defined infrastructure, virtualization and more.

The deployment plan needs to consider a multicloud deployment that supports these advanced infrastructure technologies in complex hybrid and multicloud environments. It is also crucial to determine how required data format conversions will be carried out during the movement of data across public cloud and on-premises environments. This consideration still holds for the transit of data between different cloud providers.

It is also important to determine whether a prospective multicloud deployment supports infrastructure self-provisioning as much as it can. These include infrastructure-as-code (IAC) templates, particularly since IAC tools by cloud providers are vendor-specific and often tough to manage in multicloud environments.

Finally, the data that is stored in containerized environments needs to be correctly managed and secured. Containerized environments benefit multicloud environments, as they run code in the same way, regardless of deployment infrastructure.

A multicloud deployment plan ought to address a number of operational issues. There should be an understanding of the impact of the deployment on the IT landscape and where new roles may need to be established.

For example, business relationship management roles may need to be introduced to ensure business needs and IT services work in alignment. These roles should also be created with access control and multicloud security in mind.

One of the greatest challenges plaguing multicloud deployments is cost management. As a result, the deployment plan must incorporate a cost management process to handle both current and future right-sizing.

It should also be easy to move data from one cloud to another when required. Users need to consider multicloud deployment tools that approach data replication and synchronization and multicloud data transfer cost-effectively.

Organizations should also consider multicloud deployment tools that manage and deploy the whole data fabric from a unified dashboard to provide transparency to the whole spectrum of multicloud end users. Such transparency ought to also cover the billing and pricing models for these end users.

For effective multicloud application deployment, teams should evaluate which applications and workloads are best suited for specific cloud platforms. This can be determined by the availability of specialized compute, how simple it is to integrate a cloud providers services and resources with other cloud environments, and the geographic locations of the providers data centers.

Securing and protecting data must be a priority, as data security stands as one of the top challenges to multicloud deployments. Multicloud application deployment should be augmented by effective authorization and authentication features to secure data.

Encryption of data at rest and data in transit is one of the approaches that could be taken to secure data. Additionally, this data needs to be protected against corruption and loss and has to be a consideration in a multicloud deployment plan.

Furthermore, standardization and coordination of development stacks across clouds have to be considered to ensure consistent and swappable deployments across multiple clouds. Considering continuous integration and delivery solutions for multicloud environments can ease the shift to multicloud environments and make multicloud application deployment more consistent and manageable.

SEE: iCloud vs. OneDrive: Which is best for Mac, iPad and iPhone users? (free PDF) (TechRepublic)

Flexera is a cloud management tool with a rich array of discovery, operational monitoring, management, governance, template-based provisioning, orchestration and automation, and cost optimization across multicloud environments and virtual and bare-metal servers. It is suitable but not limited to small and medium-sized businesses in need of a potent orchestration engine and workflow automation capabilities.

VMwares multicloud solutions offer organizations the ability to seamlessly migrate to the cloud without having to recode their applications. They enable them to modernize their infrastructure and consistently operate across multicloud environments, data centers and the edge. VMware offers numerous multicloud products including VMware Cloud Foundation, Tanzu, Cloud on AWS, vRealize Cloud Management, CloudHealth by VMware Suite and more.

Azure Arc extends the Azure platform to enable users to create applications and services that can flexibly run in multicloud environments, at the edge and across data centers. Arc runs on new and legacy hardware, integrated systems, IoT devices, and Kubernetes and virtualization platforms.

Formerly known as Nutanix Beam, Nutanix Cloud Manager Cost Governance is a cloud management platform that offers organizations visibility into cloud consumption patterns and provides solutions for cost management and security optimization. Nutanix Cloud Manager Cost Governance also simplifies and drives multicloud governance. Cloud teams seeking insight into their expenditures will find great value in this tool.

Mist is an open-source multicloud management platform aiming to simplify multicloud and provide a unified interface for multicloud management. Mist supports all relevant infrastructure technologies such as private and public clouds, containers, bare-metal servers, and hypervisors.

Organizations should keep an eye on multicloud if they seek options that single providers do not provide. If flexibility, resilience and control over applications and data appeal to you, then you should consider multicloud deployment. However, as multicloud deployments are large-scale transformative endeavors for any enterprise, the deployment plan should be executed in an agile manner.

Continue reading here:
The art of the multicloud deployment in your organization - TechRepublic

Read More..

VMware Carbon Black causing BSOD crashes on Windows – BleepingComputer

Windows servers and workstations at dozens of organizations started to crash earlier today because of an issue caused by certain versions of VMwares Carbon Black endpoint security solution.

According to some reports, systems at more than 50 organizations started to display the dreaded blue screen of death (BSOD) a little after 15:00 (GMT+1) today.

The root of the problem is a ruleset deployed today to Carbon Black Cloud Sensor 3.6.0.1979 - 3.8.0.398 that causes devices to crash and show a blue screen at startup, denying access to them.

Microsoft Windows operating systems impacted by the issue are Windows 10 x64, Server 2012 R2 x64, Server 2016 x64, and Server 2019 x64.

On systems impacted by the issue, the stop code may identify the error as "PFN_LIST_CORRUPT."

Tim Geschwindt, an incident responder for S-RM Cyber, told BleepingComputer that starting at 15:30 (GMT+1), clients started to complain that their servers and workstations were crashing and suspected Carbon Black to be at fault.

After investigating, the researcher determined that all clients running Carbon Black sensor 3.7.0.1253 were affected. They couldnt boot into any of their devices at all. Complete no go, Geschwindt said.

One adminsaidthat they had about 500 endpoints BSOD across our estate from approx 15:15 UK time.

It appears that there is a conflict between Carbon Black and AV signature pack 8.19.22.224.

VMware explainsin a knowledge base today that an updated Threat Research ruleset was rolled out to Prod01, Prod02, ProdEU, ProdSYD, and ProdNRT after internal testing showed no signs of issues.

An investigation is ongoing right now and the troublesome ruleset is being rolled back, which is expected to eliminate the problem.

As a temporary workaround, VMware recommends putting sensors into Bypass mode via Carbon Black Cloud Console. This enables affected devices to boot successfully so the faulty ruleset can be removed.

VMware is advising clients experiencing this issue to open a support case and include the following info: Org_Key, Device Name(s), Device ID(s), and Operating System(s).

Update [August 23rd, 17:50]: VMware has provided the following statement for BleepingComputer shortly after publishing the article:

"VMware Carbon Black is aware of an issue affecting a limited number of customer endpoints, where certain older sensor versions were impacted by an update of our behavioral preventative capabilities. The issue has been identified and corrected, and VMware Carbon Black is working with impacted customers."

Continued here:
VMware Carbon Black causing BSOD crashes on Windows - BleepingComputer

Read More..

Antivirus Software Global Market Report 2022: Cloud-Based Antivirus a Key Trend Gaining Traction and Pres – Benzinga

DUBLIN, Aug. 24, 2022 /PRNewswire/ --The "Antivirus Software Global Market Report 2022, By Type, Operating System, End User" report has been added to ResearchAndMarkets.com's offering.

The global antivirus software market is expected to grow from $3.92 billion in 2021 to $4.06 billion in 2022 at a compound annual growth rate (CAGR) of 3.6%. The change in growth trend is mainly due to the companies stabilizing their output after catering to the demand that grew exponentially during the COVID-19 pandemic in 2021. The market is expected to reach $4.75 billion in 2026 at a CAGR of 4.0%.

The antivirus software market consists of sales of antivirus software by entities (organizations, sole traders, and partnerships) that are used to protect computers from viruses by scanning, detecting, and removing them. Most antivirus software operates in the background once downloaded, providing real-time protection against virus attacks. All programs behavior is monitored by the anti-virus software, which flags any questionable behavior.

The main types of antivirus software are computers, tablets, smartphones, and others. Computer anti-virus software is used in computers to prevent, scan and detect the virus and malware that harm the computer. The different operating systems include Windows, MAC, Android or IOS, or Linux and are used by various verticals such as corporate, personal, government.

North America was the largest region in the antivirus software market in 2021. Europe was the second-largest region in the antivirus software market. The regions covered in this report are Asia-Pacific, Western Europe, Eastern Europe, North America, South America, Middle East, and Africa.

The increasing number of cyber-attacks is expected to propel the growth of the antivirus software market in the coming years. A cyberattack is a cyberspace-based attack aimed at disrupting, disabling, destroying, or manipulating a computer or other device intentionally.

There is an increase in hacking and data breaches in computers, laptops, and mobiles using viruses or malware. Antivirus software can block or prevent the virus or malware from entering the device and prevents cyberattacks. For instance, in 2020, Air India, an Indian-based carrier airline company, reported hackers had compromised their servers and accessed the personal data of 4.5 million fliers. In India, in 2020 alone 1.16 million cyber security cases are registered. Therefore, the increasing number of cyber-attacks drives the market for antivirus software.

Cloud-based antivirus is a trend gaining popularity in the antivirus software market. Cloud antivirus or cloud-based antivirus is a solution that offloads the work to a cloud-based server instead of bogging down the computer with an antivirus suite. Cloud antivirus protects PCs, laptops, and mobile devices by providing behavioral-based screening and updating malware software capable of transferring data. For instance, according to Tracxn Technologies Limited, an India-based software company report in 2021, major companies including Malwarebytes, Avast, Panda Security, Qihoo 360 Technology, AVG Technologies are using cloud-based antivirus solutions.

In July 2020, NortonLifeLock, a US-based cybersecurity software company acquired Avira for a $360 million deal amount. Through this acquisition, Avira serves a large customer base in Europe and important emerging markets with a consumer-focused array of cybersecurity and privacy solutions. Avira is a Germany-based company offering security software and specializes in antivirus software.

Scope

Markets Covered:

1) By Type: Computers; Tablets; Smart Phones; Others

2) By Operating System: Windows; MAC; Android Or IOS Or Linux

3) By End User: Corporate; Personal; Government

Key Topics Covered:

1. Executive Summary

2. Antivirus Software Market Characteristics

3. Antivirus Software Market Trends And Strategies

4. Impact Of COVID-19 On Antivirus Software

5. Antivirus Software Market Size And Growth

6. Antivirus Software Market Segmentation

7. Antivirus Software Market Regional And Country Analysis

8. Asia-Pacific Antivirus Software Market

9. China Antivirus Software Market

10. India Antivirus Software Market

11. Japan Antivirus Software Market

12. Australia Antivirus Software Market

13. Indonesia Antivirus Software Market

14. South Korea Antivirus Software Market

15. Western Europe Antivirus Software Market

16. UK Antivirus Software Market

17. Germany Antivirus Software Market

18. France Antivirus Software Market

19. Eastern Europe Antivirus Software Market

20. Russia Antivirus Software Market

21. North America Antivirus Software Market

22. USA Antivirus Software Market

23. South America Antivirus Software Market

24. Brazil Antivirus Software Market

25. Middle East Antivirus Software Market

26. Africa Antivirus Software Market

27. Antivirus Software Market Competitive Landscape And Company Profiles

28. Key Mergers And Acquisitions In The Antivirus Software Market

29. Antivirus Software Market Future Outlook and Potential Analysis

30. Appendix

Companies Mentioned

For more information about this report visit https://www.researchandmarkets.com/r/9zwldu

Media Contact:

Research and MarketsLaura Wood, Senior Managerpress@researchandmarkets.com

For E.S.T Office Hours Call +1-917-300-0470For U.S./CAN Toll Free Call +1-800-526-8630For GMT Office Hours Call +353-1-416-8900

U.S. Fax: 646-607-1904Fax (outside U.S.): +353-1-481-1716

Logo: https://mma.prnewswire.com/media/539438/Research_and_Markets_Logo.jpg

SOURCE Research and Markets

Excerpt from:
Antivirus Software Global Market Report 2022: Cloud-Based Antivirus a Key Trend Gaining Traction and Pres - Benzinga

Read More..