Page 2,365«..1020..2,3642,3652,3662,367..2,3702,380..»

2 Growth Stocks That Could Double Your Money in 5 Years – Motley Fool

Just because the S&P 500 index is sitting close to all-time highs doesn't mean there aren't good stock deals to be found out there. You just have to look in the right places.

One industry that is becoming increasingly important to our economy and will surely continue to breed some long-term investment winners is the semiconductor industry. The chip market is forecast to see sales rise by 8.8% to reach $601 billion in 2022, according to the Semiconductor Industry Association.The ongoing buildout of data centers and other high-performance applications is a big tailwind for leading component suppliers.

Image source: Getty Images.

That tailwind is expected to help two best-of-breed semiconductor companies potentially double in value by 2027 -- Taiwan Semiconductor Manufacturing (NYSE:TSM) and Micron Technology (NASDAQ:MU). Indeed, both stocks have attracted the attention of top investment managers lately, including Mohnish Pabrai of Pabrai Investments and Seth Klarman of Baupost Group.

Here's why these two tech stocks have room to run.

TSMC is the largest dedicated semiconductor foundry in the world.It makes the capital investment in factories and manufacturing chips so that its customers can focus on what they do best, which is product design. Three notable customers are Advanced Micro Devices, Nvidia, and Intel.

There are two reasons to consider buying and holding TSMC stock for the long term. First, it's got a great track record of delivering market-beating returns to shareholders. Over the last 15 years, the stock has returned over 1,000% to investors, which thrashes the 235% gain over the same timeframe from the S&P 500 index.It generated $10 billion in free cash flow over the last year and paid out 90% of that in dividends to shareholders.

Second, what used to be a highly cyclical semiconductor industry is beginning to see narrower peaks and troughs in demand.TSMC's revenue growth has accelerated over the last two years,and management is increasing its capital investment as it sees a period of higher structural growth.

TSMC reported third-quarter revenue growth ( in U.S. dollars) of 22.6% over the year-ago period.As CFO Jen-Chau Huang said on the Q3 earnings call, "We are witnessing a structural increase in underlying semiconductor demand underpinned by the industry megatrends of 5G-related and [high-performance computing] applications."The latter would involve the expansion in data center capacity, which doubled over the last four years.

The stock is not cheap, trading at a price-to-earnings (P/E) ratio of 33,but a more sustained demand trend in the industry should support this valuation. Analysts expect TSMC to grow earnings per share at an annualized rate of 15% over the next five years, which is consistent with industry prospects and the company's past rate of earnings growth.Assuming the stock is still trading around the same P/E, that would deliver a double to investors, not counting the extra 1.47% return from the current dividend yield.

Image source: Getty Images.

Micron is a leader in making memory and storage components for everything that matters in tech: consumer PCs, TVs, cars, cloud servers, mobile phones, and the Internet of Things, among others. The two main products Micron is known for are dynamic random-access memory (DRAM) modules and non-volatile memory (NAND) products used in solid-state drives (SSDs).

The stock fell in 2021 over near-term demand in the PC, mobile, and cloud markets, in addition to uncertainty about near-term pricing trends for DRAM products, which have a history of wild swings based on supply/demand.The stock has since rebounded after Micron reported better-than-expected earnings that negated these concerns.

However, Micron's growth over the last five years shows a business riding similar secular demand trends as TSMC. Revenue has doubled to $29 billion, and free cash flow has grown faster, reaching $3.9 billion.While temporary bouts of weak memory pricing can cause lumpy revenue results, the long-term trend has supported growing demand for Micron's products that are essential in the new data economy. Through all the swings in memory pricing, the top line has increased 253% over the last 10 years.

Micron just launched its first DDR5 memory chip, which offers 50% faster data transfer speeds. Along with that release, it also introduced its high-performance 16 GB/16GBpsGDDR6 memory for AMD's RX 6000 graphics processors designed for gaming.Demand for DDR5 is significantly exceeding supply due to non-memory component shortages, but CEO Sanjay Mehrotra expects bit shipments of this product to "grow to meaningful levels in the second half of calendar 2022."

The shares trade at a P/E of 14. That would be a fair valuation for a low-growth, cyclical company, but that description doesn't completely fit Micron's businessconsidering the long-term opportunities across data centers, 5G, cloud computing, AI servers, and a growing gaming industry. As investors recognize Micron more as a growth business, the valuation multiple should expand and potentially lead to a double over the next five years.

This article represents the opinion of the writer, who may disagree with the official recommendation position of a Motley Fool premium advisory service. Were motley! Questioning an investing thesis -- even one of our own -- helps us all think critically about investing and make decisions that help us become smarter, happier, and richer.

Follow this link:
2 Growth Stocks That Could Double Your Money in 5 Years - Motley Fool

Read More..

Dispelling the top five myths of modern infrastructure – ComputerWeekly.com

The current period of disruption and transformation in the global infrastructure market has opened doors to misleading supplier marketing, leaving CIOs and IT leaders susceptible to false expectations of what modern infrastructure can offer. Misunderstanding these propositions can cost businesses money, so the first step in this disruptive environment is to dispel some common myths around modern infrastructure.

Cloudis a style of computing where scalable and elastic IT-related capabilities use internet technologies to provide as-a-service to customers. Dont think of the cloud as a location, but rather as a new computing paradigm where loosely coupled services come together to form applications. It is fundamentally different from traditional IT infrastructure.

There are many reasons why applications or data cannot be moved to public cloud infrastructure, including regulatory compliance, latency, the need for offline access, and more. But many organisations still want the cloud model, just in theirdatacentresor at the edge. The question becomes whether you want to buy turnkey services from a provider or build your own.

Now that cloud-first is the expected approach, CIOs should ask:

Historically, IT organisations built their owninfrastructure. They bought servers, storage and network switches often from three different suppliers and assembled everything themselves. But today that is usually unnecessary. You can simply buy a turnkey, ready-made infrastructure stack with little or no assembly required.

One way to do this is to move to the public cloud but its not the only way. Integrated systems including converged, hyper-converged, dedicated and composable infrastructure bring the benefits of prebuilt infrastructure to the datacentre and edge.

Then there is distributed cloud, where hyperscale public cloud providers place a substation of their infrastructure at your site to make their native services available to applications and data running in your datacentre. In this way, it is now possible to acquire on-premise infrastructure as a service (IaaS) and platform as a service (PaaS) directly from your public cloud provider.

Compare the cost-value benefit you will get from building the infrastructure versus buying it from a supplier. Will the new system integrate with your existing IT environment, or will it increase costs more than it will create value?

Automation is at the core of changes happening in infrastructure and operations (I&O). It is no longer optional. It is a response to the increasing scale and complexity of modern, distributed infrastructures, which cannot be managed without it.

However, many IT organisations pursue automation in the mistaken belief that it will save them money. Many organisations want to reduce infrastructure spending, often by reducing headcount they expect automation to replace manual effort and the people doing it. This is unlikely.

Infrastructure automation initiatives tend to shift costs, not reduce them. This is still highly valuable, because the time and money are put to better use on more valuable projects. But infrastructure automation typically doesnt lead to actual cash savings.

The near-term goal of infrastructure automation is efficiency gains, followed by productivity improvements. Cost savings, if they happen at all, will occur in the latter stages of the project.

Quantify the benefits of automation. For example, calculate whether the number of deployments has improved because of automation. Ideally, they should increase, and the error rates should also be low. This can make more room for innovation another benefit that infrastructure automation can provide.

Some suppliers claim to offer autonomous infrastructure powered by artificial intelligence (AI) that replaces manual operations (and maybe human operators). But these claims never withstand scrutiny.

Artificial intelligence for operations (AIOps) serves as decision support for human operators, and in that role, it can be quite valuable. For example, machine learning algorithms can comb through huge volumes of data, finding correlations that a human never could. So AIOps excels at predictive analytics, such as pinpointing when resources will be exhausted or helping to identify the root cause of failures.

AIOps tools can even execute predefined routines in response to certain conditions presuming a human being devises a solution to a problem, writes code to execute that solution, and defines exactly when and how the AIOps tool is permitted to run that code. AIOps cannot devise a solution independently or fix the problems it finds without human intervention.

The reality is that most enterprise IT organisations are simply not equipped to make the transition to modern infrastructure and operating models. Many veteran I&O staff still lack expertise with new technologies. There are new skills to be acquired, new roles to navigate and new responsibilities to take on. In many IT organisations, the lack of skills has reached crisis levels.

Somemodernisationinitiatives have already floundered for want of skilled engineers and architects.

Gartner data consistently shows labour shortages at the top of the job market because there arent enough people with modern skills. Infrastructure as code, Kubernetes, DevOps, AI and cloud infrastructure are the skills in highest demand for I&O technical professionals. But it may not be feasible to hire outside experts to fill these gaps because candidates with these skills are rare and expensive.

As it gets more difficult to hire skilled personnel and as they command ever higher salaries IT organisations will need to grow skills internally. These skills are best developed as part of a systematic talent enablement programme, which identifies and prioritises the highest-value skills to the IT organisation.

This enables opportunities for direct mentorship and hands-on experience that classroom training or individual research don't deliver. It can also provide a real-world interface between theoretical knowledge and practical experience. Investing in these programmes benefits both the IT organisation and the individual employee.

In short, dont buy into the hype. Craft your modern IT infrastructure strategy by keeping in mind the business outcome you are pursuing. Assess the data supporting your choice and best practices in the industry to then lock in your modern IT infrastructure strategy.

View original post here:
Dispelling the top five myths of modern infrastructure - ComputerWeekly.com

Read More..

The Future of Records & Compliance With Optimere CEO ICYMI – Government Technology

Communication channels have evolved over time, and this has put pressure on governments to remain agile with their communications strategies.

New platforms, an increase in public interest and the necessary expansion of regulatory frameworks require state and local agencies to monitor their communications closer than ever, including on social media and elsewhere online.

In this episode, the In Case You Missed It crew put a button on the latest GovTech 100 news and interviewed Ray Carey, CEO of Optimere, about how public records are changing, what his company is doing to help agencies remain in compliance and where government communications could go in the future.

The following interview was lightly edited for clarity and brevity:

A: Ive been involved in technology for 25 years, for my whole career as a banker and investor and manager. Im now the lucky CEO and janitor of Optimere. And I came to Optimere as the CEO of ArchiveSocial.

This is my third assignment in the CEO and janitor role. My last company was called Amplify, and I helped some of the worlds largest brands like McDonalds or General Mills or Estee Lauder harness the data in their customer communications. And that data was moving from traditional communications, think email and phone, over to social. So that should sound familiar to a powerhouse company.

Now [Amplify has] about 1,000 employees and continues to sort of help those global folks. But ArchiveSocial allowed me to get back to kind of a mission-driven company, which was cool.

Before that I had a company called Neo Nova and we were helping roll out rural broadband from Alaska to Key West and, you know, it felt really good to tell my mom that I was helping the rural broadband program. So Amplify was great, but its nice to get back to a company that, you know, you brag to your mom about.

Q: Optimere was recently formed out of ArchiveSocial, NextRequest and Monsido as a public records powerhouse. Can you share more about the vision for this new company?

A: Our mission here is to try to help government communicators build trust in digital communications. All of our communicators know they do their job because great communication is totally key to having a great community. If you dont have great communication, you have a hard time building that community and engaging the citizens in the way that you want.

But its really hard to do. There are so many rules and regulations that our customers government communicators are subject to, it can sometimes be paralyzing. I just want to talk about, you know, the issue of the day, the landslide that happened or whats going on with COVID, but Im paralyzed by all these regulations around data retention, or [Americans with Disabilities Act] ADA or [Freedom of Information Act] FOIA requests or data privacy laws. And so thats why we brought together these three great companies, so that our customers can focus on the message and we focus on them.

Q: How does Optimere work with government agencies right now to modernize the way they manage public records and communications?

A: Back to this idea that we help them build trust, because theres all these regulations and rules. And theres a reason those rules are there. In my mind its to drive compliance. And too often they drive liability.

Its kind of like saying we have speed limits for safety, not so that we can give people tickets. And so we believe it takes sort of a holistic approach to your communications social-web workflow. So thats ArchiveSocial-Monsido-NextRequest: social-web workflow.

And the issue in social, the biggest issue that people have, is one of record capture. So unlike other forms of communication where I send it to you the chain of custody is really clear with an email, per se, you have it the chain of custody on social media is really murky. It sits on servers, cloud servers, as weve talked about at Facebook, at Twitter, and if its gone, its gone. Oftentimes, they wont give it to you, even if youre the White House.

Weve looked in the archive and 1 in 12 records is edited or deleted within a year in the archive. And so if you dont have a real-time version of those, you are missing a fundamental record of your government communication. So we work with folks on social to make sure that they have a permanent record of the communication that they have.

On the web, theres lots of issues on the web, you have to comply with your policy. But the biggest issue that were working with folks (about) on the web is accessibility. Nobody would build a government building and in the parking lot not have parking spots for folks that have placards and need access. But we build websites that are not accessible to millions of folks all the time. And so we have to have that same mindset that what we do in the physical world, we have to be doing that in the digital world.

And if you get those two right youre creating this massive volume of digital records and you have to be able to produce those things without bankrupting your agency. And so we work with folks on automating their workflows. We work with them to handle time-intensive tasks like redaction. And then one thing that weve seen, particularly in the public records production spaces, is theres lots of, we call them oopsies, where people produce confidential information. And so we scan all these records ahead of time and give them risk scores to keep you from accidentally maybe producing something that has Social Security numbers or, you know, private citizen data. And unfortunately, that happens at times. So thats one of the great things about using technology to correct for what can be human process and human process errors.

Q: Now, weve seen a general trend that citizens are having shifting expectations, and they have greater expectations now in the public sector. No longer do they say, Oh, thats government, you know, theyre old school. They have much greater expectations on government to deliver services differently. And so those old ways of doing things are no longer accepted. How are you seeing this in the way that this is impacting agencies and how they should think about the record and communication aspects of what they do?

A: Yeah, I think in many ways government is very unique and different. But in some ways, its the same as the rest of industry. And people that want to communicate with their citizens, with their customers, with their constituents, you have to communicate in ... the place where your citizens live. And thats increasingly Facebook and Twitter and Pinterest and social media. You have to communicate, particularly in a post-COVID world, in a digital, sort of accessible way. And that means on the web.

Were seeing this massive growth in social media communications. One of our largest folks in the archive is the [Centers for Disease Control and Prevention] CDC. So just think about how much the CDC was putting out on Facebook two years ago, and whats going on right now.

If I look back three years ago, our average public agency had about four accounts. So think one agency, four accounts that might be two contributors on Facebook and Twitter. Right now, thats tripled, thats 12 accounts on average.

The number of records per agency over the last three years is up 300 percent. That archive today has around 3,500 agencies in it, and it just crossed over half a billion records. So what is happening is government is engaging its citizens where they live. Thats major.

Another big change were seeing is in the records space. Transparency has always been at the core of public records law, sunshine laws, you know, (the) Freedom of Information Act. Were seeing citizens want transparency in the record production process, not just for the records: Where does my request sit? How many days? Whos approving this?

So you need a system fundamentally to be able to not only be transparent as a government, but to be transparent in the way you are being transparent, to sort of stretch the analogy. Were certainly seeing those two big, big trends, with citizens demanding that from their public officials.

Q: I want to come back to something you mentioned earlier, and thats accessibility. How is Optimere approaching making records and communications more accessible to the country?

A: Each of our solutions can go together, but they each solve a very specific problem. And the problem on the web is you need something to monitor your sites and domain. So that is Monsido. There is more than one demand letter per day in a public agency threatening lawsuits for inaccessible websites, right? So it is a place that theres a significant risk factor with financial implications for folks.

But if you get past that money thing, it is just the right thing to do. Everybody communicates. Everybody wants to communicate in a way that is accessible to all folks. I havent met one of our customers whos trying to build websites that cant be digested by people with disabilities.

And so we are monitoring the websites across the board. If you look at your big agencies, they may have hundreds of people producing content on websites, hundreds of folks, and one misstep can really get them into trouble. So you need some automation to monitor those sites and domains. Are they complying with the policy? Are they complying with [Web Content Accessibility Guidelines]?

A little example of this is every single image needs to have whats called alt text that describes what that image is. So somebody whos visually impaired, their reader can read that website. So we scan the website for all of these potential violations, these potential risk factors. And then they can be scored, prioritized, and then dealt with.

Q: Im glad that you mentioned the theme of compliance, because thats something that continues to evolve. What are some of the macro trends that youre seeing impact record and communication compliance, that agencies need to take note of? And then second, how are you responding to these changes?

A: Theres more records. Theres more lawsuits. Theres more of these demand letters around accessibility. But theres one new threat vector that started coming up about six or seven months ago that I really wanted to draw peoples attention to. And that is the issue of social media blocking, and viewpoint discrimination.

Weve been working with folks for years to archive their social media. But we started seeing this pop up where agencies were being sued because somebody was blocking users and didnt have a good reason why they were blocking users. And recently there was one in Colorado state: $25,000 for a Senate president. A city in Rhode Island: $7,000, for blocked comments. Were seeing dozens of these every single month.

And if you looked at the policy, most every agency says we dont block anybody. I looked in the archive and 80 percent of public agencies are blocking folks, and no ones writing down why. And were starting to see records requests asking to show everyone that was blocked on Facebook. And were going to go through and say there are eight specific sort of exclusions to free speech. And you better have a reason why you blocked those folks, that is a sort of constitutionally valid reason, or youre going to have an issue with viewpoint discrimination.

So specific compliance with free speech and First Amendment violations is something really new and active that we see growing. And so we built into the system, on the back of the APIs for Facebook and Twitter, the ability to see everyone who youve blocked and then create metadata to write down the reason for this specific violation.

So when someone comes to you and says you blocked me, you can say either No, I didnt definitively, or you can say I did, because you violated our policy in this specific way. Heres everyone else we blocked. And it wasnt because they were of a political affiliation, or they said something about the mayors spouse that the mayor didnt like.

And so this is a new real threat vector for folks, because our communicators and our [public information officers] PIOs are usually doing a great job. They have people that get access to their social media that may not be as trained. They might be an elected official that goes a little haywire and puts their agency at risk.

Q: Whats on your radar for the year ahead? Whats next for Optimere?

A: So weve spent a lot of time in data privacy. We have a pretty big operation in Copenhagen, in the UK and [General Data Protection Regulation] GDPR. And data privacy, and how you handle consumer information, is very robust.

That is coming with CCNA in California. Theres laws in Vermont. Raise your hand if youve been assaulted by cookie banners popping up on websites in the last six months. That is directly related to law and regulation changes around data privacy.

Weve just introduced a product called ConsentManager, which is the first accessibility-driven cookie banner. Imagine you spend all this time in your website, making sure your website is compliant and accessible, and you get a third-party cookie banner that doesnt have that same rigor that the rest of your website has.

So I think 2022 is going to be a year of continued growth in data privacy, both in regulations and in solutions from us.

We have, in alpha, a new product called ArchiveChat. We are seeing modern collaboration communications, like Slack, and others get used in government. And that has the same duty of care that email and social media has. And so were working diligently on that.

And then, you know, were growing. We add about 150 public agencies a month. We added 1,500 public agency customers last year alone across the three companies. And so we need to hire optimists (thats the official word for an employee at Optimere). And we got a bunch of hiring to do this year. I love it.

Follow Optimere here: LinkedIn | Twitter | Facebook | Instagram

Until then, watch the previous episode announcing the GovTech 100 with special guests.

In Case You Missed It is Government Technologys weekly news roundup and interview live show featuring e.Republic* Chief Innovation Officer Dustin Haisler, Deputy Chief Innovation Officer Joe Morris and Gov Tech Assistant News Editor Jed Pressgrove as they bring their analysis and insight to the weeks most important stories in state and local government.

Follow along live each Friday at 12 p.m. PST on LinkedIn and YouTube.

*e.Republic is Government Technologys parent company.

Read the rest here:
The Future of Records & Compliance With Optimere CEO ICYMI - Government Technology

Read More..

Neenah schools to close for second consecutive day following cyber security issue – WGBA-TV

NEENAH (NBC 26) For the second day in a row, schools within the Neenah Joint School District will remain closed Wednesday due to a cyber security situation affecting the district.

Neenah schools closed Tuesday as the investigation into the IT security incident continues. Mary Pfeiffer, Neenah Joint School District superintendent, said a potential unauthorized access to the school data system caused an outage to the district's internet, phone systems and several software applications.

At this time, Pfeiffer said they don't believe confidential or personal information has been compromised.Teachers spent Tuesday creating non-digital lesson plans, a challenge when a lot of that information is on the district's server.

"In March of 2020, we shifted our staff to all virtual - at least for a short period of time - and now were telling them, no more technology," Pfeiffer said. "It's been an incredible year. Another incredible year. And now to have to pivot one more time for something that we didn't have control of, that can be pretty frustrating."

Michael Patton, director of the Cybersecurity Center of Excellence at the University of Wisconsin-Oshkosh, doesn't have direct knowledge of this investigation, but said a concern in this type of situation would be that data is taken. He said access to an organization's server can happen with just one click on a faulty link or video.

Whatever you open has as much access to your work computer as you do. They get to do things essentially as you," Patton said. "Your organization may have permissions in their network that allow for you to share things across computers. So the bad actors would leverage that sharing capability, and move throughout your network and infect lots of other things."

That's why Patton said it's best to separate work and personal.

"Maybe we want to check our Facebook or do some online shopping. Just recognize that if you're doing that from your work machine, that could allow whatever mistakes you make into your work space," Patton said.

He added people should always be vigilant and skeptical about things they open online.

The Neenah Joint School District is working to restore phone and internet access for students and staff. The district hopes to resume classes on Thursday.

More here:
Neenah schools to close for second consecutive day following cyber security issue - WGBA-TV

Read More..

Klobuchar needs to put her antitrust legislation to the sunshine test | TheHill – The Hill

Winter is coming for Americas tech industry. Sen. Amy KlobucharAmy KlobucharKlobuchar needs to put her antitrust legislation to the sunshine test Hillicon Valley: Amazon's Alabama union fight take two Senate Judiciary Committee to debate key antitrust bill MORE (D-Minn.) is marshaling forces to push antitrust legislation that would put Washington bureaucrats in charge of innovation and business decisions that have made Apple, Amazon, Google, and Microsoft so popular here and around the world.And as with the winter weather here in the capital, the best antidote is sunshine in the form of an open hearing to air very real concerns about how Klobuchars bills would hurt consumers and undermine Americas competitive standing in the world.

That kind of sunshine was absent last June when similar antitrust bills were marked-up in a closed House Judiciary Committee meeting that went all night long, without any input or testimony.But thats the point of going straight to a closed markup it lets the sponsors avoid a public hearing that puts sunshine on the proposed legislation. Still, that messy markup session tainted those antitrust bills to the point where Speaker Nancy PelosiNancy PelosiKlobuchar needs to put her antitrust legislation to the sunshine test President Biden is blaming everyone else for surging inflation Fetterman calls for ban on congressional stock trading MORE (D-Calif.) has held them back from the House calendar so far.

But those bills could break loose if the Senate rams related legislation through, again without a hearing.

What would we learn at an open hearing on Klobuchars antitrust bills, with testimony from economists and internet security and privacy experts?First, herAmerican Innovation and Choice Online Actwould prohibit innovation that has given American consumers so many choices online.In her own words, Klobuchars bill wouldPrevent self-preferencingand discriminatory conduct.That bars Amazon from showing its generic products as alternatives to products from big name brands. Amazons 150 million Prime customers would no longer see a Prime badge signaling next-day shipping, since that would discriminate against sellers who dont have their products shipped from Amazon distribution centers.

A hearing on Klobuchars bill would also reveal that Google search results may no longer default to showing a Google map and reviews if search results include a nearby destination.Klobuchar says that would be illegal for biasing search results in favor of the dominant firm.

Perhaps most worrying for bill sponsors is that internet security experts would describe consequences when Klobuchars law stops a dominant platform from preventing another businesss product or service from interoperating. Apple could be penalized for blocking an app from its App Store, even when Apple believes there are risks of security or privacy breaches, whether from the app provider or from hackers who exploit access granted to the app.

At a hearing, wed learn that the bills mandated interoperability is precisely how a university researcher allowed Cambridge Analytica to steal the private data of millions of Facebook users.

A hearing would give Americans the chance to hear Klobuchar explain how her bill could constrain politically driven prosecution by FTC and DoJ officials demanding that a company do more to stop global warming or to advance economic and social justice for their workers.

If were lucky, the Senate hearing could also address Klobuchars second antitrust bill, thePlatform Competition and Opportunity Act. That bill would bar the largest American companies from acquiring related businesses, putting the brakes on growth and innovation at Amazon, Apple and Google. The highlight of the hearing would be Klobuchar explaining why her bill would lock-in those few companies as the enforcement targets, while carving-out Walmart and her home-state retailer Target even if they later grew beyond the size threshold in the law.

Finally, an open Senate hearing puts sunshine on what will alarm Americans whose retirement savings are invested in Apple, Amazon, Google, Meta, and Microsoft. Those companies lead the world in R&D investment and innovation, yet would be prosecuted by a subjective and destructive antitrust regime untethered to traditional standards of consumer welfare. That would reduce Americas technological standing in the world, at a time when other nations are helping their own champions compete with us.

Unfortunately, Senate leadership may bow to Klobuchars pressure to bypass hearings and move straight to a closed markup in a committee she chairs. All major legislation, particularly when it impacts America's world-leading tech industry, needs to pass the Sunshine Test a fully open process of probing questions and debate.

If theres no Senate hearing, the concerning consequences discussed above would only be revealed when enforcement of the law begins. And thats when winter really comes for American consumers.

Steve DelBianco is President & CEO of NetChoice

Continued here:
Klobuchar needs to put her antitrust legislation to the sunshine test | TheHill - The Hill

Read More..

Apples Private Relay Roils Telecoms Around the World – WIRED

When Apple pushed iOS 15 out to more than a billion devices in September, the software update included the companys first VPN-like feature, iCloud Private Relay. The subscription-only privacy tool makes it harder for anyone to snoop on what you are doing online, by routing traffic from your device through multiple servers. But the tool has faced pushback from mobile operators in Europeand more recently, by T-Mobile in the US.

As Private Relay has rolled out over the past few months, scores of people have started to complain that their mobile operators appear to be restricting access to it. For many, its impossible to turn the option on if your plan includes content filtering, such as parental controls. Meanwhile in Europe, mobile operators Vodafone, Telefonica, Orange, and T-Mobile have griped about how Private Relay works. In August 2021, according to a report by the Telegraph, the companies complained the feature would cut off their access to metadata and network information and suggested to regulators that it should be banned.

Private Relay will impair others to innovate and compete in downstream digital markets and may negatively impact operators ability to efficiently manage telecommunication networks, bosses from the companies wrote in a letter to European lawmakers. However, Apple says that Private Relay doesnt stop companies from providing customers with fast internet connections, and security experts say theres been little evidence showing Private Relay will cause problems for network operators.

Apples Private Relay isnt a VPNwhich carriers freely allowbut it has some similarities. The option, which is still in beta and is only available to people who pay for iCloud+, aims to stop the network providers and the websites you visit from seeing your IP address and DNS records. That makes it harder for companies to build profiles about you that include your interests and location, in theory helping to reduce the ways youre targeted online.

To do this, Private Relay routes your web traffic through two relays, known as nodes, when it leaves your iPhone, iPad, or Mac. Your traffic passes from Safari into the first relay, known as the ingress proxy, which is owned by Apple. There are multiple different ingress proxies around the world, and theyre based in multiple locations, Apple says in a white paper. This first relay is able to see your IP address and the Wi-Fi or mobile network you are connected to. However, Apple isnt able to see the name of the website that youre trying to visit.

The second relay your web traffic passes through, known as the egress proxy, is owned by a third-party partner rather than Apple itself. While it can see the name of the website youre visiting, It doesnt know the IP address youre browsing from. It instead assigns you another IP address thats near where you live or within the same country, depending on your Private Relay settings.

The result is, neither relay knows both your IP address and the details of what youre looking at onlinewhereas a typical a VPN provider will process all your data. Also unlike a VPN, Apples system doesnt let you change your devices geographic location to avoid regional blocks on content from Netflix and others.

See original here:
Apples Private Relay Roils Telecoms Around the World - WIRED

Read More..

UK Government Apparently Hoping It Can Regulate End-To-End Encryption Out Of Existence – Techdirt

from the sure-hope-'the-children'-are-grateful-for-the-shitty-future-being-handed dept

Politicians -- those motivated by the notion of "doing something" -- want to end encryption. They don't want this to affect their communications and data security. But they don't see the harm in stripping these protections from the general public. Often, the argument is nothing better than "only criminals want end-to-end encryption," something they trot out as a truism despite plenty of evidence to the contrary.

But these politicians (and government officials) are cowards. They refuse to call a backdoor a backdoor. They come up with all sorts of euphemisms while pretending compliance with proposed laws won't result in the creation of backdoors that can be exploited by everyone, not just the "good guys." They also deploy other euphemisms to attack encryption that protects millions of members of the public, referring to good encryption as "warrant-proof" or "military-grade." Those terms never survive examination, but the narrative persists because most members of the public have no interest in closely examining falsehoods uttered by governments.

The UK government has expressed an unhealthy determination to undermine encryption for years now. It has the fanciest of plans to undo protections enjoyed by UK residents for reason ranging from "the children" to "the terrorists." The underlying intent never changes even if the name on the office doors do. Regulators come and go but the desire remains. Even the bills get renamed, as though a different shade of lipstick would make the UK's anti-encryption pig any more desirable.

Rebranding from "Online Harms" to "Online Safety" only changed the tablecloths in the Titanic's dining room. The UK government wants encryption dead. But presumably "safety" sounds better than "harms," especially when the government affirmatively wants to harm the safety of millions of UK residents.

The Internet Society has taken a look at the revamped and rebranded bill and has delivered a report [PDF] that explains exactly where on the Internet doll the UK government plans to engage in inappropriate touching. There's no mention of backdoors or broken encryption, but complying with the law means possibly doing both.

The draft Online Safety Bill places a duty of care on service providers within the scope of the draft bill to moderate illegal and harmful content on their platforms, with fines and penalties for those that fail to uphold this duty. The only way for service providers that offer end-to-end encryption to comply with this duty of care would be to remove or weaken the encryption that they offer.

That's the end result of these demands. But the politicians and regulators pushing this are unwilling to directly refer to the harms the bill will cause. There's no ban on end-to-end encryption. There's no mandate for backdoors. Instead, the bill hopes to achieve these ends by applying regulatory pressure that makes both of these outcomes unavoidable.

Service providers deploying end-to-end encryption obviously cannot see the content of communications between users. The UK government says that's no longer acceptable. Providers need to be proactive in preventing the spread of certain content. That leaves them with only one option.

Ofcom can require that service providers use accredited technology to identify harmful content and swiftly take down that content. To comply with this requirement and fulfil their duty of care, service providers will likely need to resort to upload filters and other mechanisms that may interfere with the use of end-to-end encryption.

Basically, the same thing that saw Apple catch a considerable amount of heat will be expected to be standard operating procedure for any tech company doing business in the UK. Client-side filtering is the most efficient way to prevent the uploading and sharing of "harmful content." Shutting it off at the source means either invading devices or removing at least one end of the end-to-end encryption. And once those options are available, it will only be a matter of time before the UK government starts demanding access to unencrypted devices and/or messages.

And the UK government has specifically cited Apple's now-defunct plans to strip protections it previously extended to users and device owners as evidence the proposed law is a net gain for society.

[I]n the Daily Telegraph article announcing the Safety Challenge Fund, Home Secretary Priti Patel points to Apples client-side scanning proposal as a positive example, raising concerns about the criteria for evaluating Challenge Fund proposals.

In its quest for easy wins, the UK government is ignoring the long-term fallout of these demands. While it may have no problem stripping UK residents of strong data and communication protections, it may find it more difficult to talk powerful businesses into accepting less-than-solid protections for their financial interactions and transmission of sensitive proprietary info. And government employees still rely heavily on third-party contractors for communication services and data transmission/storage. These same employees also rely on devices and cell phones manufactured by companies that will now be forced to make their products less secure for everyone who uses them.

Everyone loses. But the people who will lose more and lose it faster simply don't matter. Before the cold reality of broken encryption hits home for politicians, they'll have already collected the PR wins needed to secure more terms in office. And with more time comes more power. Eventually, the UK government may find a way to exempt it from the impositions placed on the private sector, elevating them above the people they serve. In the end, very little will have actually been done to address the problems (child exploitation, terrorism) cited to justify these impositions. The only guarantee is that devices, communication services, and the internet at large will be expected to make huge sacrifices in service to the UK government's talking points.

Thank you for reading this Techdirt post. With so many things competing for everyones attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise and every little bit helps. Thank you.

The Techdirt Team

Filed Under: backdoors, encryption, end-to-end encryption, going dark, online harms, online safety, online safety bill, uk

More:
UK Government Apparently Hoping It Can Regulate End-To-End Encryption Out Of Existence - Techdirt

Read More..

Android Encryption on the rise: Do I need To encrypt my smartphone? – Phandroid – News for Android

Encryption has long since been one of the most secure methods for ensuring privacy and security. The method works by converting unencrypted information, known as plaintext, into ciphertext. In laymans terms, encryption works to scramble your data into a gibberish form, preventing any third party without a decryption key from accessing it.

Recent years have seen a rise in device encryption as more people become aware of privacy and security concerns. The prospect of having any third party, let it even be law enforcement officials snooping into personal information, is enough for anyone to try and enable personal security.

What makes the situation particularly alarming is that these law enforcement officials have the required means of exploiting device security to acquire information. Meaning that such methods do exist, leaving a gaping window for anyone, including a cybercriminal, to use them. Therefore, amidst this, encrypting your smartphone might seem like a fair idea.

With a rise in awareness regarding the growing data breach and privacy concerns, mobile security has become one of the topmost concerns for people. Nowadays, people are more inclined towards a secure device that guarantees protection against hack attacks and data breaches.

Although Android devices are generally considered unsecure, Google does put in efforts to ensure the OS remains secure. A typical Android smartphone does ensure security by encrypting your data as soon as you lock your device through passcode, fingerprint, or even face recognition.

The information only decodes through a key that regenerates once you unlock your smartphone. Therefore, anyone who even manages to steal your locked phone will only come across a stream of gibberish and wont have access to your original data.

Smartphones nowadays have several similar layers of protection following different encryption algorithms to ensure security. While many encryption keys focus on ensuring device lock security, several encryption keys are available to secure sensitive data. Moreover, since the device hardware and OS are responsible for managing these keys, users dont have to fret over the long processes of setting up these additional security measures.

Apart from encrypting your device as default as soon as you lock it, Android allows two different methods of encrypting your data that are:

Android 7.0 and higher support file-based encryption (FBE) allow users to encrypt different files with different keys. These keys encrypt the complete file and its content and enable users to unlock these files independently. However, with FBE, other information such as directory layouts, file size, creation/modification times, and permission are not encrypted.

The advent of Android 9 introduced metadata encryption which relies on a single key available at boot time. This single key is responsible for encrypting all of the devices content, including the files left behind by FBE. The designated key is protected by the key master, which is further protected by verified boot.

Encryption on your Android device is tied to your screen lock passcode and doesnt work without it. Meaning, if you are willing to encrypt your device, you will have to enter your passcode once or twice.

The default encryption method is relatively simple and doesnt require many complexities. Through the following simple steps you can encrypt your device completely. Do remember to charge your one before proceeding with this:

Throughout the process, remain patient and vigilant. Your smartphone might restart at several stages, and to ensure your data gets completely encrypted, only start using your phone after the process is complete. Also, make sure not to stop the process midway; otherwise, you might end up losing all of your data.

Generally, the default Android encryption is secure against various data breaches and hack attacks. Primarily, Google religiously rolls out patches for vulnerabilities found within the OS that could potentially allow a cybercriminal to exploit user security. However, despite that, anyone with slightly more advanced tools can quite easily disrupt user security.

Each Android device has a complete protection mode that applies to the device before the user first unlocks the device after restarting it. Once you have unlocked your device, your phone goes into the Protected Until First User Authentication or After First Unlock mode.

Most of the encrypted files start existing in the quick access mods within the AFU mode. Amidst this, anyone with the right forensic tools can exploit any vulnerability within the system to grab further decryption keys and ultimately access more data from within the device.

Although encryption is a method for securing your information, encrypting your device does not entail online protection. Then even if your device is heavily encrypted, every time you go online and share any file, you remain vulnerable to tracebacks, spying, or surveillance.

Therefore while online, you need a different form of encrypted protection such as a proxy serviceor a VPN to ensure security. These tools help hide user data and identity from surveillance agencies by hiding IP addresses and changing user location.

Encryption is indeed one of the most reliable options for anyone seeking to ensure security. Protecting your data within times like today has become downright crucial with the rising surge in data breaches and hack attacks. Since the government and surveillance agencies are also constantly exposing our privacy and security, it is best to take matters into your own hands and ensure safety by encrypting your information.

Go here to see the original:
Android Encryption on the rise: Do I need To encrypt my smartphone? - Phandroid - News for Android

Read More..

The Next Evolution of the Database Sharding Architecture – InfoQ.com

Key Takeaways

With mobile phones and the internet becoming what some would call a daily necessity, it's not uncommon for websites and business services to receive billions of visits on a weekly basis - and thats not all.

Sales days like Black Friday in North America or Double Eleven (aka Singles Day) in Asia are excellent examples of traditional retail enterprises adapting to the digital world. These enterprises must now contend with new needs and challenges, to successfully achieve their business goals.

They all have to answer the same question: we need to drive our digital sales on this Black Friday, but when we succeed and this incredible traffic reaches the database cluster, will our databases be able to handle it?

Different business cases have multiple options when it comes to database solutions. Such options range from NoSQL products (e.g., MongoDB, Cassandra, Amazon DynamoDB, etc.), to NewSQL products (like Amazon Aurora or CockroachDB, which are popular these days).

Besides these great solutions, some industries will also consider transparent sharding on top of existing database clusters.

According to the database trend ranking DB-Engines, although many new database offerings are hitting the market, the traditional relational database still retains a considerable share of the pie.

Considering the new challenges databases are facing, is there an efficient and cost-effective way to leverage these types of databases and enhance them through some new practical ideas? Database transparent sharding is one of the best answers to this question.

One of the best techniques for this is to split the data into separate rows and columns. This splitting of large database tables into multiple small tables are known as shards. The original table is divided into either vertical shards or horizontal shards. Terminologies used to label these tables can be subjective to VS1 for vertical shards and HS1 for flat shards. The number represents the first table or the first schema. Then 2 and 3, and so on. These subsets of data are referred to as the table's original schema.

So what is the difference between sharding and partitioning? Both sharding and partitioning include breaking large data sets into smaller ones. But a key difference is that sharding implies that the breakdown of data is spread across multiple computers, either as horizontal or vertical partitioning. On the other hand, partitioning is when the database is broken down into different subsets but held within a single database, sometimes referred to as the database instance.

Since for sharding data is divided into numerous pieces stored across different machines, this approach offers the following advantages:

However, sharding architecture is not perfect and has some drawbacks:

Like for most things in technology, let alone in life, there is no silver bullet. You should perform a thorough analysis to have a complete picture of your needs and scenarios, and only then move on to choose the best possible solution.

Generally, the advantages of sharding architecture prevail, and many excellent products that play an essential role in the database industry are based on this architecture. Citus or Vitess have their respective definitions, but they're based on database-sharding architecture in nature.

Citus manages a coordinator (proxy) cluster to distribute the PostgreSQL cluster, while Vitess shards MySQL alike. Both of them concentrate on providing a low-cost and efficient distributed solution of traditional but prevailing relational databases. Actually, sharding architecture is fundamental for most NoSQL and NewSQL products as well, but that would be another topic focusing on sharding with NoSQL and NewSQL. This article focuses on sharding with relational databases since there are some innovations brought to the classic sharding technique.

The occurrence of sharding is the result of the distributed needs of databases. These days an increasing number of new issues involve databases, such as privacy protection, SQL audit, tenant, distributed authentication, etc.

These represent real-world new demands for databases. How to deal with these issues is an inevitable question for all database products, no matter the type of database. Could these issues be addressed with a database sharding solution? It looks like sharding needs to evolve to meet these challenges, which is our topic i.e., what's the next evolution for database sharding architecture.

My answer is Database Plus, the guiding concept for creating a distributed database system for more than sharding, positioned above DBMS.

It was conceived with the aim to build a standardized layer and ecosystem above existing and fragmented databases, as well as provide a unified and standardized database usage specification. This provides for upper-level applications, and the challenges faced by businesses due to underlying databases fragmentation get minimized as much as possible. The result is an environment where the applications only need to speak with a standardized service, instead of different ones for each database.

This idea was initiated by the PMC (Project Management Committee) of Apache ShardingSphere, and it took about a year to release 5.0.0 GA and implement this concept in its architecture.

In the 3.x and 4.x release stages, we defined Apache ShardingSphere as a distributed database middleware (sharding architecture) to only solve the sharding issue. However, new challenges for databases and the community pushed this project to evolve and include more features such as data encryption, shadow database, distributed authentication, distributed governance, etc. All of these changes go beyond the traditional sharding range, as sharding is just one part of Database Plus.

Apache ShardingSphere's example supports my thesis that a simple and classic sharding architecture can do more than sharding. The kernel mechanism directs all traffic through a proxy or driver, and then if it could parse SQLs and know the location of every database, the following jobs will be easy to perform:

So what do these jobs mean to the end users? Based on these kernel jobs, the products of Apache ShardingSphere are qualified to ease users database pain points.

Originally sharding, data encryption, shadow database, distributed authentication, distributed governance, etc. were all based on the necessary steps above. The architecture proposed by the Database Plus concept of Apache ShardingSphere brings these enhancing features with flexibility in mind.

All functions are just plugins that can be added or removed at any given time in this distributed system. Some people may just want to shard a database, while others may prefer to do data encryption. Users needs never stop evolving and are diverse, and for this reason Database Plus can be fully customizable and continuously receive new plugins (features) allowing it to meet users demands one by one specifically and flexibly.

ShardingSpheres architecture includes the following four layers as shown in Figure 1 below.

Figure 1 - ShardingSphere's Four Layer Architecture

Foundation Layer:Provides a variety of access terminals such as driver or proxy to flexibly meet the needs of users in different scenarios.

Storage Layer:All the functions are supported in these databases with the possibility to include more.

Function Layer:Provides a variety of functional plug-ins that meet users' needs, allowing a high degree of flexibility in plug-in choice and combination.

Solution Layer:End users are provided with industry-oriented (e.g. financial, e-commerce and entertainment industries) and specific scenario-oriented standard product solutions (e.g. distributed database solution, encrypted database solution or database gateway).

ShardingSphere JDBC and ShardingSphere Proxy have been polished and tested for five years and are now available in production. Many community users provided relevant production cases, and production feasibility has been verified.

With the shared core functions among different ShardingSphere clients, users can also choose hybrid deployment to achieve balance between query performance and management convenience (shown in Figure 2 below).

Figure 2 - ShardingSphere JDBC and Proxy Hybrid Development

The Apache ShardingSphere community proposed a SQL dialect, i.e., DistSQL (distributed SQL), to operate and manage all functions of ShardingSphere.

SQL is the standard and conventional interaction method with databases. However there are many new features in this distributed database system which required us to think of a SQL dialect to configure and use these new functions.

DistSQL allows users to use SQL-like commands to create, modify or delete a distributed database and table, or to encrypt or decrypt data. All of the above mentioned functions could be performed with distributed SQL. Some DistSQL snippets are presented below.

Figure 3 - DistSQL in Action

Distributed database system governance capability is necessary to alleviate the suffering of distributed cluster management. In the ShardingSphere ecosystem where computing and storage are separated, features are greatly enhanced in the new version including:

Additionally, the distributed lock new feature is scheduled to be released soon.

Figure 4 - ShardingSpheres Distributed Governance

Although many advantages have been listed above, there are some constraints or limitations that are worth mentioning. You should give careful consideration to the following items before adopting ShardingSphere::

This section will introduce two practical examples to demonstrate how create a distributed database and create an encrypted table with DistSQL - the SQL dialect connecting all the elements of the ShardingSphere ecosystem.

This part will guide you through an example of how to leverage DistSQL to create a distributed database. Users and applications visit Proxy to achieve a logic table (distributed table) which has been sharded among different servers. There is no need to take care of these shards, instead make your applications operate and manage this logical table.

Prerequisites:

Process:

Login Proxy CLI by executing SQLcommand:

mysql -h127.0.0.1 -uroot -P3307 -proot

Register two MySQL databases using DistSQL

ADD RESOURCE ds_0( HOST=127.0.0.1, PORT=3306, DB=demo_ds_0, USER=root, PASSWORD=root );

ADD RESOURCE ds_1 ( HOST=127.0.0.1, PORT=3306, DB=demo_ds_1, USER=root, PASSWORD=root );

Create sharding rule by distSQL

CREATE SHARDING TABLE RULE t_order( RESOURCES(ds_0,ds_1), SHARDING_COLUMN=order_id, TYPE(NAME=hash_mod,PROPERTIES("sharding-count"=4)), GENERATED_KEY(COLUMN=order_id,TYPE(NAME=snowflake,PROPERTIES("worker-id"=123))) );

Create sharding table by the previous sharding rule

CREATE TABLE `t_order` ( `order_id` int NOT NULL, `user_id` int NOT NULL, `status` varchar(45) DEFAULT NULL, PRIMARY KEY (`order_id`) ) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4;

Show resources, sharding databases and sharding tables

sql SHOW SCHEMA RESOURCES;

SHOW DATABASES;

SHOW TABLES;

Show sharding tables

SHOW TABLES;

Below are the tables in MySQL:

And below are the tables in ShardingSphere Proxy:

Drop sharding table

DROP TABLE t_order;

This example shows you how to create an encrypted table with DistSQL. The data encryption feature is ShardingSphere Proxy, which helps encrypt and decrypt data. Applications do not need any coding refactoring, and just send the plaintext to Proxy, where plaintext is encrypted and resends the ciphertext to the databases. Additionally, users can configure which column in which table should be encrypted by which encryption algorithm.

Prerequisites:

Process:

Login Proxy CLI by executing the following command:

Add Resources by distSQL.

ADD RESOURCE ds_0 ( HOST=127.0.0.1, PORT=3306, DB=ds_0, USER=root, PASSWORD=root );

Create encrypt rule

CREATE ENCRYPT RULE t_encrypt ( COLUMNS( (NAME=user_id,PLAIN=user_plain,CIPHER=user_cipher,TYPE(NAME=AES,PROPERTIES('aes-key-value'='123456abc')))));

SHOW ENCRYPT TABLE RULE t_encrypt;

Create encrypt table

CREATE TABLE `t_encrypt` ( `order_id` int NOT NULL, `user_plain` varchar(45) DEFAULT NULL, `user_cipher` varchar(45) DEFAULT NULL, PRIMARY KEY (`order_id`) ) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4;

Below is the result in MySQL:

Insert a data into this table

More here:
The Next Evolution of the Database Sharding Architecture - InfoQ.com

Read More..

Encryption Software Market Scope and overview, with Highest growth in the near future by leading key players – Taiwan News

Encryption Software Market is valued approximately USD 3.48 Billion in 2019 and is anticipated to grow with a healthy growth rate of more than 16.80% over the forecast period 2020-2027.

Encryption software assist in defending the confidentiality of the information stored in folders and files and data travelling over networks or data in-transit as per the compliance and security requirements of an organization. The demand for encryption software is expected to grow in global pandemic of COVID-19 as many organizations initiated for work from home and communicate through online medium. Therefore, need for high encryption is emerged in most organizations to provide safety and security to the data from data theft and breach.

Request To Download Sample of This Strategic Report@:-https://reportocean.com/industry-verticals/sample-request?report_id=bw1255

The rapid growth in cases of data theft and breach is anticipated towards the higher growth in encryption software over the forecast years. For instance: As per study by Accenture 2019, over 130 average number of security breach registered in 2017 and increased with 11% that leads to 145 average number of security breach in 2018. In addition, exponential increase in the adoption of cloud and virtualization technologies will propel the growth of market over the forecast years. However, the availability of free, open source, and pirated encryption software and budgetary constraints associated with encryption software hampers the market growth.

The regional analysis of global Encryption Software Market is considered for the key regions such as Asia Pacific, North America, Europe, Latin America, and Rest of the World. North America is the leading/significant region across the world in terms of market share owing to the increasing demand to adhere to stringent regulatory compliances, increasing presence of encryption software vendors, and growing government support. Whereas, Asia-Pacific is also anticipated to exhibit highest growth rate / CAGR over the forecast period 2020-2027. Factors such as heavy investments made by private and public sectors for securing sensitive data would create lucrative growth prospects for the Encryption Software Market across Asia-Pacific region.

Major market player included in this report are:Bloombase, Inc.Cisco Systems, Inc.Check Point Software Technologies Ltd.EMC CorporationIBM CorporationIntel SecurityMicrosoft CorporationOracle CorporationSophos Group PLCSymantec Corp.

The objective of the study is to define market sizes of different segments & countries in recent years and to forecast the values to the coming eight years. The report is designed to incorporate both qualitative and quantitative aspects of the industry within each of the regions and countries involved in the study. Furthermore, the report also caters the detailed information about the crucial aspects such as driving factors & challenges which will define the future growth of the market. Additionally, the report shall also incorporate available opportunities in micro markets for stakeholders to invest along with the detailed analysis of competitive landscape and Deployment offerings of key players.

Download Free Sample Report,SPECIAL OFFER (Avail an Up-to 30% discount on this report:-https://reportocean.com/industry-verticals/sample-request?report_id=bw1255

The detailed segments and sub-segment of the market are explained below:

By Deployment:On-premiseCloud-based

By Application:Disk EncryptionFile/Folder EncryptionData base EncryptionWeb communication EncryptionOthers

By End-use:BFSIIT & TelecomRetailHealthcareGovernment & Public administrationOthers

By Region:North AmericaU.S.CanadaEuropeUKGermanyFranceSpainItalyROE

Asia PacificChinaIndiaJapanAustraliaSouth KoreaRoAPACLatin AmericaBrazilMexicoRest of the World

Furthermore, years considered for the study are as follows:

Historical year 2017, 2018Base year 2019Forecast period 2020 to 2027

Target Audience of the Global Encryption Software Market in Market Study:

Key Consulting Companies & AdvisorsLarge, medium-sized, and small enterprisesVenture capitalistsValue-Added Resellers (VARs)Third-party knowledge providersInvestment bankersInvestors

What is the goal of the report?

The market report presents the estimated size of the ICT market at the end of the forecast period. The report also examines historical and current market sizes.

During the forecast period, the report analyzes the growth rate, market size, and market valuation.

The report presents current trends in the industry and the future potential of the North America, Asia Pacific, Europe, Latin America, and the Middle East and Africa markets.

The report offers a comprehensive view of the market based on geographic scope, market segmentation, and key player financial performance.

Access full Report Description, TOC, Table of Figure, Chart, etc:-https://reportocean.com/industry-verticals/sample-request?report_id=bw1255

Following are the questions answered by the Market report:

What are the goals of the report?

This market report shows the projected market size for the Multi-Cloud Management Market at the end of the forecast period. The report also examines the historical and current market sizes.

On the basis of various indicators, the charts present the year-over-year growth (%) and compound annual growth rate (CAGR) for the given forecast period.

The report includes an overview of the market, its geographical scope, its segmentation, and the financial performance of key players.

The report examines the current state of the industry and the potential growth opportunities in North America, Asia Pacific, Europe, Latin America, and the Middle East, and Africa.

The research report includes various factors contributing to the markets growth.

The report analyzes the growth rate, market size, and market valuation for the forecast period.

This report covers aspects of the regional analysis market.

The report includes data about North America, Europe, Asia Pacific, Latin America, the Middle East, and Africa.

This report analyzes current and future market trends by region, providing information on product usage and consumption.

Reports on the market include the growth rate of every region, based on their countries over the forecast period.

Inquire or Share Your Questions If Any Before the Purchasing This Report:-https://reportocean.com/industry-verticals/sample-request?report_id=bw1255

What factors are taken into consideration when assessing the key market players?

The report analyzes companies across the globe in detail.

The report provides an overview of major vendors in the market, including key players.

Reports include information about each manufacturer, such as profiles, revenue, product pricing, and other pertinent information about the manufactured products.

This report includes a comparison of market competitors and a discussion of the standpoints of the major players.

Market reports provide information regarding recent developments, mergers, and acquisitions involving key players.

What are the key findings of the report?

This report provides comprehensive information on factors expected to influence the market growth and market share in the future.

The report offers the current state of the market and future prospects for various geographical regions.

This report provides both qualitative and quantitative information about the competitive landscape of the market.

Combined with Porters Five Forces analysis, it serves as SWOT analysis and competitive landscape analysis.

It provides an in-depth analysis of the market, highlighting its growth rates and opportunities for growth.

Speak to our Analysts to Understand the Impact of COVID-19 on Your Business:-https://reportocean.com/industry-verticals/sample-request?report_id=bw1255

About Report Ocean:We are the best market research reports provider in the industry. Report Ocean believes in providing quality reports to clients to meet the top line and bottom line goals which will boost your market share in todays competitive environment. Report Ocean is a one-stop solution for individuals, organizations, and industries that are looking for innovative market research reports.

Get in Touch with Us:Report Ocean:Email: sales@reportocean.comAddress: 500 N Michigan Ave, Suite 600, Chicago, Illinois 60611 UNITED STATESTel: +1 888 212 3539 (US TOLL FREE)Website: https://www.reportocean.com/

View post:
Encryption Software Market Scope and overview, with Highest growth in the near future by leading key players - Taiwan News

Read More..