Page 2,699«..1020..2,6982,6992,7002,701..2,7102,720..»

Cybersecurity Breaches Must Be Reported to Attorney General; New CT Law Helps Businesses Connecticut by the Numbers – Connecticut by the Numbers

The Privacy and Data Security Department within the Attorney Generals Office handles matters related to the protection of Connecticut residents' personal information and data. The Department enforces state laws governing notification of data breaches, safeguarding of personal information, and protection of social security numbers and other sensitive information.

In addition, this Department provides the Attorney General with advice and counsel on proposed legislation and other matters regarding privacy and data security, and it engages in extensive outreach to citizens and businesses on matters relating to data protection and privacy, according to the Attorney Generals Office.

Governor Ned Lamont signed legislation this summer, approved by the 2021 state legislature and supported by the states business community, that would protect businesses from punitive damages if personal or restricted information is improperly accessed, maintained, communicated, or processed, so long as such businesses have adopted and adhered to appropriate cybersecurity measures. It does not diminish other important legal rights and actions that individuals and businesses can take after a cyber breach, according to the Governors office.

The legislation is Public Act 21-119, An Act Incentivizing the Adoption of Cybersecurity Standards for Businesses goes into effect on October 1, 2021.

Trust and security are at the heart of the relationship between businesses, residents, and their digital government, Mark Raymond, Connecticuts chief information officer, said when the legislation was signed into law.

Investing in cybersecurity is an expensive decision that requires a company to dedicate time, staffing, and financial resources to be successful, added Eric Gjede, vice president of government affairs for the Connecticut Business and Industry Association (CBIA). This legislation is critical for protecting our most vulnerable industries from the increasing threat of cyberattacks.

According to a 2018 CBIA survey, nearly one-quarter of Connecticut businesses experienced a data breach or cyberattack in the previous two years. And 90% of those were small businesses with less than 100 employees.

Testifying in support of the legislation earlier this year, Curtis W. Dukes, Executive Vice President & General Manager, Security Best Practices of the nonprofit Center for Internet Security, Inc., described Connecticuts approach as a creative way to protect its citizens and organizations from cyber attacks.

He added: Cybersecurity is, largely, unregulated today. There is no national statutory minimum standard of information security. This condition makes it difficult to improve cybersecurity on a wholesale basis. Until there is a national legal standard, we are in a period where organizations must voluntarily adopt cyber best practices--the Wild, Wild, West. The result: We are not as safe as we could be.

View original post here:
Cybersecurity Breaches Must Be Reported to Attorney General; New CT Law Helps Businesses Connecticut by the Numbers - Connecticut by the Numbers

Read More..

BlackBerry resisted announcing major flaw in software powering cars, hospital equipment – POLITICO

The back-and-forth between BlackBerry and the government highlights a major difficulty in fending off cyberattacks on increasingly internet-connected devices ranging from robotic vacuum cleaners to wastewater-plant management systems. When companies such as BlackBerry sell their software to equipment manufacturers, they rarely provide detailed records of the code that goes into the software leaving hardware makers, their customers and the government in the dark about where the biggest risks lie.

BlackBerry may be best known for making old-school smartphones beloved for their manual keyboards, but in recent years it has become a major supplier of software for industrial equipment, including QNX, which powers everything from factory machinery and medical devices to rail equipment and components on the International Space Station. BadAlloc could give hackers a backdoor into many of these devices, allowing bad actors to commandeer them or disrupt their operations.

Microsoft security researchers announced in April that theyd discovered the vulnerability and found it in a number of companies operating systems and software. In May, many of those companies worked with the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency to publicly reveal the flaws and urge users to patch their devices.

BlackBerry wasnt among them.

Privately, BlackBerry representatives told CISA earlier this year that they didnt believe BadAlloc had impacted their products, even though CISA had concluded that it did, according to the two people, both of whom spoke anonymously because they were not authorized to discuss the matter publicly. Over the last few months, CISA pushed BlackBerry to accept the bad news, eventually getting them to acknowledge the vulnerability existed.

Then BlackBerry said it didnt intend to go public to deal with the problem. The company told CISA it planned to reach out privately to its direct customers and warn them about the QNX issue.

Technology companies sometimes prefer private vulnerability disclosures because doing so doesnt tip off hackers that patching is underway but also because it limits (or at least delays) any resulting public backlash and financial losses.

But that outreach would only cover a fraction of the affected companies, because BlackBerry also told CISA that it couldnt identify everyone using its software in order to warn them.

Thats because BlackBerry licenses QNX to original equipment manufacturers, which in turn use it to build products and devices for their customers, just as Microsoft sells its Windows operating system to HP, Dell and other computer makers. BlackBerry told the government it doesnt know where its software ends up, and the people using it dont know where it came from. Its known customers are a comparatively small group.

Their initial thought was that they were going to do a private advisory, said a CISA employee. Over time, though, BlackBerry realized that there was more benefit to being public.

The agency produced a PowerPoint presentation, which POLITICO reviewed, stressing that many BlackBerry customers wouldnt know about the danger unless the federal government or the original equipment manufacturers told them. CISA even cited potential risks to national security and noted that the Defense Department had been involved in finding an acceptable timing for BlackBerrys announcement.

CISA argued that BlackBerrys planned approach would leave out many users who could be in real danger. A few weeks ago, BlackBerry agreed to issue a public announcement. On Tuesday, the company published an alert about the vulnerability and urged customers to upgrade their devices to the latest QNX version. CISA issued its own alert as well.

In a statement to POLITICO, BlackBerry did not deny that it initially resisted a public announcement. The company said it maintains lists of our customers and have actively communicated to those customers regarding this issue.

Software patching communications occur directly to our customers, the company said. However, we will make adjustments to this process in order to best serve our customers.

QNX is used in a wide range of products whose compromise could result in a malicious actor gaining control of highly-sensitive systems, Eric Goldstein, the head of CISAs cyber division, said. While we are not aware of any active exploitation, we encourage users of QNX to review the advisory BlackBerry put out today and implement mitigation measures, including patching systems as quickly as possible.

Goldstein declined to address CISAs conversations with BlackBerry but said the agency works regularly with companies and researchers to disclose vulnerabilities in a timely and responsible manner so that users can take steps to protect their systems.

Asked about whether the company originally believed QNX was unaffected, Blackberry said its initial investigation into affected software identified several versions that were affected, but that list of impacted software was incomplete.

BlackBerry is hardly the first company to disclose a bug in widely used industrial software, and cybersecurity experts say such flaws are to be expected occasionally in highly complex systems. But resolving the QNX problem will be a major task for BlackBerry and the government.

In a June announcement about QNXs integration into 195 million vehicles, BlackBerry called the operating system key to the future of the automotive industry because it provides a safe, reliable, and secure foundation for autonomous vehicles. BlackBerry bragged that QNX was the embedded software of choice of 23 of the top 25 electric vehicle makers.

The QNX vulnerability also has the Biden administration scrambling to prevent major fallout. Vulnerabilities in this code could have significant ripple effects across industries from automotive to health care that rely heavily on the software. In some cases, upgrading this software will require taking affected devices offline, which could jeopardize business operations.

By compromising one critical system, [hackers] can potentially hit thousands of actors down that line globally, said William Loomis, an assistant director at the Atlantic Councils Cyber Statecraft Initiative. This is a really clear example of a good return on investment for those actors, which is what makes these attacks so valuable for them.

After analyzing the industries where QNX was most prevalent, CISA worked with those industries regulators to understand the major players and warn them to patch the vulnerability, the agency employee said.

Goldstein confirmed that CISA coordinated with federal agencies overseeing the highest risk sectors to understand the significance of this vulnerability and the importance of remediating it.

CISA also planned to brief foreign governments about the risks, according to the PowerPoint presentation.

BlackBerry is far from unique in knowing little about what happens to its products after it sells them to its customers, but for industrial software like QNX, that supply-chain blindness can create national security risks.

Software supply chain security is one of Americas greatest vulnerabilities, said Andy Keiser, a former top House Intelligence Committee staffer. As one of the most connected societies on the planet, we remain one of the most vulnerable.

But rather than expecting vendors to identify all of their customers, security experts say, companies should publish lists of the types of the code included in their software, so customers can check to see if theyre using code that has been found to be vulnerable.

BlackBerry cannot possibly fully understand the impact of a vulnerability in all cases, said David Wheeler, a George Mason University computer science professor and director of open source supply chain security at the Linux Foundation, the group that supports the development of the Linux operating system. We need to focus on helping people understand the software components within their systems, and help them update in a more timely way.

For years, the Commerce Departments National Telecommunications and Information Administration has been convening industry representatives to develop the foundation for this kind of digital ingredient list, known as a software bill of materials. In July, NTIA published guidance on the minimum elements needed for an SBOM, following a directive from President Joe Bidens cybersecurity executive order.

Armed with an SBOM, a car maker or medical device manufacturer that learned of a software issue such as the QNX breach could quickly check to see if any of its products were affected.

SBOMs wouldnt prevent hackers from discovering and exploiting vulnerabilities, and the lists alone cannot tell companies whether a particular flaw actually poses a risk to their particular systems. But these ingredient labels can dramatically speed up the process of patching flaws, especially for companies that have no idea what software undergirds their products.

Buying software is only the start of the transaction. It is not the end, said Trey Herr, director of the Atlantic Councils Cyber Statecraft Initiative.

It's not a new problem, Herr added. Its not a problem thats going away, and what we are doing right now is insufficient for the scale of that problem.

Read more:
BlackBerry resisted announcing major flaw in software powering cars, hospital equipment - POLITICO

Read More..

Malice in the message: Phishing in messenger apps – The Financial Express

Vigilance combined with anti-phishing technologies form a reliable tool in the fight against phishing in messenger apps, says Tatyana Shcherbakova, senior web content analyst at Kaspersky.

Anonymised data, voluntarily provided by Kaspersky Internet Security for Android users, has shown which messenger apps are the most popular among phishing scammers. The biggest share of detected malicious links between December 2020 and May 2021 was sent via WhatsApp (89.6%), followed by Telegram (5.6%). Viber is in third place with a share of 4.7% and Hangouts has less than 1%. Countries experiencing the highest number of phishing attacks were Russia (46%), Brazil (15%) and India (7%). Globally, 480 detections were recorded per day.

According to the research, messenger apps outstripped social networks by 20% in 2020, in terms of popularity among users, and became the most popular tool for communication. Survey results also show that in 2020, the global audience for messengers amounted to 2.7 billion people, and by 2023 it is expected to grow to 3.1 billion. That is almost 40% of the worlds population.

Kaspersky Internet Security for Android has added a new feature, Safe Messaging, which prevents users from opening malicious links that they receive in messenger apps (WhatsApp, Viber, Telegram, Hangouts) and through SMS. As a result, Kaspersky analysed anonymised clicks on phishing links across messenger apps and found that between December 2020 and May 2021, 91,242 detections were recorded globally. According to the statistics, Kaspersky Internet Security for Android detected the biggest number of malicious links in WhatsApp, partly due to the fact that it is the most popular messenger globally. The biggest share of such messages was detected in Russia (42%), Brazil (17%) and India (7%).

Statistics show that phishing in instant messenger apps is still one of the most popular tools among scammers. This is partly due to the wide popularity of these apps among the audience, as well as the ability to use the built-in functionality of applications to carry out attacks. Sometimes it can be difficult to determine whether an attack is phishing, as the difference can be just one character or a minor mistake. Vigilance combined with anti-phishing technologies form a reliable tool in the fight against phishing in messenger apps, says Tatyana Shcherbakova, senior web content analyst at Kaspersky.

Get live Stock Prices from BSE, NSE, US Market and latest NAV, portfolio of Mutual Funds, Check out latest IPO News, Best Performing IPOs, calculate your tax by Income Tax Calculator, know markets Top Gainers, Top Losers & Best Equity Funds. Like us on Facebook and follow us on Twitter.

Financial Express is now on Telegram. Click here to join our channel and stay updated with the latest Biz news and updates.

Read this article:
Malice in the message: Phishing in messenger apps - The Financial Express

Read More..

If employee demand is an indicator, heres why cybersecurity stocks should be on your radar – Stockhead

Digital transformation that leverages cloud technologies and enable remote working is on the rise in Australia.

And so is the demand for cybersecurity solutions associated with it, according to a new report by Nasdaq-listed global tech advisory company, ISG.

The report sees the cybersecurity industry in Australia growing significantly in the coming years, driven by the increasing concerns about data privacy and cyber attacks.

Senior leaders are increasingly focused on the decision-making around cybersecurity products and services, and want to understand their organisations cyber risks, the report said.

The COVID-19 pandemic has also put a greater emphasis on cybersecurity systems, as many employees continue to work from home. In addition, the report singled out artificial intelligence (AI) as the fastest growing tool used within the industry.

The report concludes by saying that two segments in particular, access management and cloud-based detection solutions, will see significant growth in coming years.

But are we already seeing this play out in the current market?

Stockhead spoke to Richard Talbot, a co-founder and director at a tech recruitment company, Technology People, to get further insights into this space.

Talbot, a 25-year recruitment industry veteran, confirms that cybersecurity jobs in Australia are indeed red hot at the moment.

There is a significant demand from organisations of all sizes in Australia for people with cybersecurity skills, Talbot told Stockhead.

The more that you see in the news about these big hacks, intrusions and ransomware, the more that companies are willing to invest in cybersecurity and pay significant premium to people with relevant experience.

The increase in demand for cyber specialists has also pushed salaries for these professionals to astronomical levels.

Figures obtained by the Australian Financial Review showed that consultant Earnst & Young has a strong team of cybersecurity experts spread across Australia and New Zealand, with salaries of up to $360,000-a-year.

I think in Australia, we have a simple supply and demand issue, Talbot explained.

Demand is significantly increasing, but the skilled immigrants that used to be the pressure relief valve for the Australian IT sector, theyre not coming at the moment.

Nevertheless, Talbot says that hes seeing many consulting firms as well as top organisations from the ASX 100 ramping up their cybersecurity teams.

And then there are also the next layer down organisations that may have not really thought about cybersecurity in the past, but are now starting to hire the same of sort of skills.

Its not just cybersecurity demand thats rising Talbot also sees increase in demand for IT jobs across the board in Australia, especially since the pandemic began.

Out of the 35 CIOs that we surveyed, 90% said they expected to have increased budgets for IT spend post-COVID, Talbot said.

Talbot explains that the recruitment industry is a good bellwether of the economy and by extension, the stock market.

If things are slowing down, well tell you eight weeks in advance before any ABS data comes out, because we can see the job vacancies start to drop off.

There is a bunch of cybersecurity stocks trading on the ASX, some of which are listed below:

Tesserent (ASX:TNT)is a pure-play cyber-security stock, providing Internet Security-as-a-Service for a customers computer infrastructure.Its currently the largest provider of cybersecurity services to the Australian Federal government.

Senetas (ASX:SEN)owns the software tools that protect against malware and ransomware attacks. It has developed the technology with the ability to proactively eliminate all known and unknown threats hidden in files.

archTISs (ASX:AR9)technology can prevent malicious and accidental loss of information for its clients.

Its products include Kojensi, a multi-government certified platform for the secure access, sharing and collaboration of sensitive and classified information.

Whitehawk (ASX:WHK)is a first global online cybersecurity exchange marketplace.The company offers an online toolthat enables small and midsize businesses to take immediate action against cybercrime, fraud, and disruption.

At Stockhead, we tell it like it is. While archTIS is a Stockhead advertiser, it did not sponsor this article.

Get the latest Stockhead news delivered free to your inbox.

It's free. Unsubscribe whenever you want.

You might be interested in

Read the original:
If employee demand is an indicator, heres why cybersecurity stocks should be on your radar - Stockhead

Read More..

A Simple Crystal Could Finally Give Us Large-Scale Quantum Computing, Scientists Say – ScienceAlert

Vaccine and drug development, artificial intelligence, transport and logistics, climate science - these are all areas that stand to be transformed by the development of a full-scale quantum computer. And there has been explosive growth in quantum computing investment over the past decade.

Yet current quantum processors are relatively small in scale, with fewer than 100 qubits - the basic building blocks of a quantum computer. Bits are the smallest unit of information in computing, and the term qubits stems from "quantum bits".

While early quantum processors have been crucial for demonstrating the potential of quantum computing, realizing globally significant applications will likely require processors with upwards of a million qubits.

Our new research tackles a core problem at the heart of scaling up quantum computers: how do we go from controlling just a few qubits, to controlling millions? In research published today in Science Advances, we reveal a new technology that may offer a solution.

Quantum computers use qubits to hold and process quantum information. Unlike the bits of information in classical computers, qubits make use of the quantum properties of nature, known as "superposition" and "entanglement", to perform some calculations much faster than their classical counterparts.

Unlike a classical bit, which is represented by either 0 or 1, a qubit can exist in two states (that is, 0 and 1) at the same time. This is what we refer to as a superposition state.

Demonstrations by Google and others have shown even current, early-stage quantum computers can outperform the most powerful supercomputers on the planet for a highly specialized (albeit not particularly useful) task - reaching a milestone we call quantum supremacy.

Google's quantum computer, built from superconducting electrical circuits, had just 53 qubits and was cooled to a temperature below -273 in a high-tech refrigerator. This extreme temperature is needed to remove heat, which can introduce errors to the fragile qubits. While such demonstrations are important, the challenge now is to build quantum processors with many more qubits.

Major efforts are underway at UNSW Sydney to make quantum computers from the same material used in everyday computer chips: silicon. A conventional silicon chip is thumbnail-sized and packs in several billion bits, so the prospect of using this technology to build a quantum computer is compelling.

In silicon quantum processors, information is stored in individual electrons, which are trapped beneath small electrodes at the chip's surface. Specifically, the qubit is coded into the electron's spin. It can be pictured as a small compass inside the electron. The needle of the compass can point north or south, which represents the 0 and 1 states.

To set a qubit in a superposition state (both 0 and 1), an operation that occurs in all quantum computations, a control signal must be directed to the desired qubit. For qubits in silicon, this control signal is in the form of a microwave field, much like the ones used to carry phone calls over a 5G network. The microwaves interact with the electron and cause its spin (compass needle) to rotate.

Currently, each qubit requires its own microwave control field. It is delivered to the quantum chip through a cable running from room temperature down to the bottom of the refrigerator at close to -273. Each cable brings heat with it, which must be removed before it reaches the quantum processor.

At around 50 qubits, which is state-of-the-art today, this is difficult but manageable. Current refrigerator technology can cope with the cable heat load. However, it represents a huge hurdle if we're to use systems with a million qubits or more.

An elegant solution to the challenge of how to deliver control signals to millions of spin qubits was proposed in the late 1990s. The idea of "global control" was simple: broadcast a single microwave control field across the entire quantum processor.

Voltage pulses can be applied locally to qubit electrodes to make the individual qubits interact with the global field (and produce superposition states).

It's much easier to generate such voltage pulses on-chip than it is to generate multiple microwave fields. The solution requires only a single control cable and removes obtrusive on-chip microwave control circuitry.

For more than two decades global control in quantum computers remained an idea. Researchers could not devise a suitable technology that could be integrated with a quantum chip and generate microwave fields at suitably low powers.

In our work we show that a component known as a dielectric resonator could finally allow this. The dielectric resonator is a small, transparent crystal which traps microwaves for a short period of time.

The trapping of microwaves, a phenomenon known as resonance, allows them to interact with the spin qubits longer and greatly reduces the power of microwaves needed to generate the control field. This was vital to operating the technology inside the refrigerator.

In our experiment, we used the dielectric resonator to generate a control field over an area that could contain up to four million qubits. The quantum chip used in this demonstration was a device with two qubits. We were able to show the microwaves produced by the crystal could flip the spin state of each one.

There is still work to be done before this technology is up to the task of controlling a million qubits. For our study, we managed to flip the state of the qubits, but not yet produce arbitrary superposition states.

Experiments are ongoing to demonstrate this critical capability. We'll also need to further study the impact of the dielectric resonator on other aspects of the quantum processor.

That said, we believe these engineering challenges will ultimately be surmountable - clearing one of the greatest hurdles to realizing a large-scale spin-based quantum computer.

Jarryd Pla, Senior Lecturer in Quantum Engineering, UNSW and Andrew Dzurak, Scientia Professor in Quantum Engineering, UNSW.

This article is republished from The Conversation under a Creative Commons license. Read the original article.

The rest is here:
A Simple Crystal Could Finally Give Us Large-Scale Quantum Computing, Scientists Say - ScienceAlert

Read More..

IBM Partnering with University of Tokyo on Quantum Computer – Datamation

TOKYO IBM and the University of Tokyo have unveiled one of the most powerful quantum computers in Japan.

IBM Quantum System One is part of the Japan-IBM Quantum Partnership between the University of Tokyo and IBM to advance Japans exploration of quantum science, business, and education, according to IBM last month.

IBM Quantum System One is now operational for researchers at both scientific institutions and businesses in Japan, with access administered by the University of Tokyo.

IBM is committed to the growth of the global quantum ecosystem and fostering collaboration between different research communities,, said Dr. Dario Gil, director, IBM Research.

The quantum computer gives users access to repeatable and predictable performance from high-quality qubits and high-precision control electronics, with quantum resources tightly coupled with classical processing, according to IBM. Users can securely run algorithms requiring repetition of quantum circuits in the cloud.

The IBM Quantum System One in Japan is the second system of its kind by IBM to be built outside the U.S. In June, IBM unveiled an IBM Quantum System One in Munich, Germany, which is administered by Fraunhofer Geselleschaft, a scientific research organization.

IBMs quantum efforts are intended to help advance quantum computing and develop a skilled quantum workforce worldwide.

Gil is excited to see the contributions to research that will be made by Japans world-class academic, private sector, and government institutions.

Together, we can take major steps to accelerate scientific progress in a variety of fields, Gil said.

Teruo Fujii, president of the University of Tokyo, said that in the rapidly changing field of quantum technology, it is extremely important not only to develop quantum technology-related elements and systems, but also to foster the next generation of human resources in order to achieve advanced social implementation on a global scale.

Our university has a broad base of research talents and has been always promoting high-level quantum education from the undergraduate level. Now, we will further refine the development of the next generation of quantum native skill sets by utilizing IBM Quantum System One.

In 2020, IBM and the University of Tokyo launched the Quantum Innovation Initiative Consortium (QIIC), with the goal of strategically accelerating quantum computing research and development activities in Japan by bringing together academic talent from across the countrys universities, research associations, and industry.

In the last year, IBM has also announced partnerships that include a focus on quantum information science and technology with several organizations: the Cleveland Clinic, the UKs Science and Technologies Facilities Council, and the University of Illinois Urbana-Champaign.

Read more here:
IBM Partnering with University of Tokyo on Quantum Computer - Datamation

Read More..

Why Another Wave Up For Altcoins Is Probable According To BTC Dominance – NewsBTC

BTC dominance has always had an inverse effect on the price movements for altcoins. Historically, BTC dominance determines the direction the value of altcoins swings in. Bitcoin has so far maintained majority dominance on the market. But as more time passes, that dominance goes down as altcoins see more demand.

BTC dominance simply shows how much demand there is for bitcoin compared to altcoins. The more BTC dominance rises, the lower the demand for altcoins. This means that for altcoins to rally up further, bitcoin demand has to go down.

Related Reading |Ethereum Breaks 200,000 Validators Milestone, Over $14 Billion Now Staked In ETH 2.0

Over the years, this dominance has decreased as more and more investors put money in altcoins. One reason for this being a lot of investors feel they have missed the boat with bitcoin and thus are trying to get in early enough on altcoins. Others revolve around the new technological advancements being made by altcoin projects. Hence, investors are putting money into projects that they believe in.

BTC dominance has continually declined over the past couple of months. Currently sitting at 48.97% dominance, bitcoin now has less than half of the entire market dominance. This trend shows that demand for altcoins is on the rise. So, BTC dominance will continue to see declining numbers.

As the dominance declines, the value of altcoins will continue to go up. Market trends indicate that BTC dominance is poised to drop following the latest recovery.

When this happens, the demand for alts is expected to pick up very quickly. Leading to another upward wave for the altcoin market. Coins like the number 2 coin Ethereum are forecasted to gain even more dominance as the project gains more notoriety among the investment sector. With ETH 2.0 moving the network to proof of stake and using significantly less power to mine. The reduced environmental impact will mean that mining will become less of a problem.

Alts gaining more dominance does not negate the value of bitcoin. Currently, there are over 5,000 coins in the market all vying for market share. And some of these projects come with some very innovative ideas and tech. Thus, it is expected that as time passes, some of these projects will become popular. Therefore gaining more market share as more investors come into the market.

Related Reading |Fast Moneys Brian Kelly Remains Bullish On Bitcoin, Heres Why

The declining BTS dominance just means that bitcoin is not the only digital asset investors are rushing to get into. Despite decreasing dominance, bitcoin still remains the number 1 coin in the market. Being the first cryptocurrency and the reason why cryptocurrencies are currently so popular.

But as alts rally in what is usually known as alts season, bitcoin will continue to see declining dominance. This will translate to the price of altcoins rallying massively as interest in them grows.

Read more:
Why Another Wave Up For Altcoins Is Probable According To BTC Dominance - NewsBTC

Read More..

Best cloud computing services of 2021 | TechRadar

The best cloud computing services offer the opportunity for businesses to undergo digital transformation in order to improve efficiency and reduce costs.

The best cloud computing services

Cloud services have revolutionized computing, not least through IaaS, PaaS, and especially SaaS, which have allowed businesses to develop virtualized IT infrastructure and deliver software through the cloud, independent of a user's operating system.

Even better still, businesses can also mix and match cloud services from different providers through cloud brokers in order to ensure these services work to maximum efficiency and cost effectiveness, but also to reduce the chances of vendor lock-in while also improving redundancy. This may require additional cloud management software, but for larger businesses the economic benefits can be significant.

Because cloud services are run through software platforms and virtualized networks, it means that it's easy to access and analyze data for the purposes of analytics as well as for business intelligence purposes. It also makes it easier to simplify all aspects of monitoring through cloud orchestration and the easy processing of log files through cloud logging services. The result is IT infrastructure that allows for better maintenance and patching, while providing for insights that would have previously been much more difficult to access.

Cloud computing services also offer the advantage of being scalable, which means not only can you access additional resources exactly as you need them, but you are also charged only for the services you use so there's no need to buy in extra hardware for additional redundancy.

This especially applies to when storing data, as online cloud storage can be treated as effectively limitless. Even though you might be using cloud databases for your structured data, you can also archive everything else into massive data lakes for additional processing using AI and machine learning for greater insights.

Altogether, cloud services offer unparalleled potential for improving business performance and increasing profits, and here we'll look at the best cloud computing service provider.

The best cloud services platform

+Windows and Linux compatible+12-months free+Comprehensive services

Microsoft Azure was released nearly a decade ago, in 2010. Users can run any service on the cloud or combine it with any existing applications, data center or infrastructure.

Microsoft Azure provides a wide array of solutions suitable for all types of industry. All your business needs will be taken into consideration. This results in a package better suited for needs.

Azure means there is no need to have physical servers on site. This reduces the usual costs, such as an onsite server support team.

The Azure Migration Center makes cloud transfers faster and easier. The solution is also compatible with Linux.

Microsoft Azure offers a free tier which includes access to all popular services, and over 25 Always Free services. All of Microsoft Azures prices and plans are laid out in great detail on their site. The page includes a cost calculator and a Pay as you go service. Each plan can be tailored to your specific needs.

The most popular cloud computing service

+Highly customizable+Huge choice of services+Free trial

Amazon Web Services (AWS) is a cloud-based platform for building business solutions using integrated web services. AWS offers an extensive range of IaaS and PaaS services. These include Elastic Cloud Compute (EC2), Elastic Beanstalk, Simple Storage Service (S3) and Relational Database Service (RDS)

AWS offers extensive admin controls available via their secure Web client. Users can access a number of features from here including encryption key creation and auditing.

Aws lets you customize infrastructure requirements. This costs far less than if you were set up in your own premises. Users can also access EC2 we services. This permits you to run and acquire servers as necessary.

AWS has three different pricing models; Pay as you Go, Save when you reserve and Pay less using more. For more information about these, users must contact sale directly.

AWS also offers a free 12-month tier. Once your trial period has expired, you must either choose a paid plan or cancel your AWS subscription.

Google's powerful cloud computing alternative

+User friendly+Good range of services+12-month free trial

Google Cloud enables users to create business solutions using Google-provided, modular web services. It offers a wide array of services including IaaS and PaaS solutions.

With Google Clouds multi layered secure infrastructure, users can rest assured that anything you build, create, code or store will be protected. This is done through a commitment to transparency and a highly trained team of engineers.

Google Cloud has a variety of tools to ensure consistent performance and management. These include Compute Engine, App Engine, Container Engine, Cloud Storage and Big Query. Google also offers smooth migration to virtual machines with flexible pricing.

Google claims to be a leader when it comes to pricing by comparison to major revivals, and you can try the service out yourself for free.

Reasonably priced cloud services from one of the tech masters

+Pre-configured tools+Fully customizable+Management tools

IBM Cloud is a set of cloud computing services offered by the eponymous tech giant IBM. The solution offers platform as a service, software as a service and infrastructure as a service.

IBM Cloud offers a wide range of services. Not all of them are cloud based: it covers both virtual and hardware based servers, composed of public, private and management networks.

As hardware and virtual-based servers are combined into one on demand cloud-platform, you have complete infrastructure control. IBM refer to their hardware servers as bare metal. These provide clients with sole access to their entire server. This reduces the noisy neighbor effect and greatly improves performance.

IBM Cloud is integrated and managed by a single system that can be controlled via web portal, API (Application Programming Interface) or mobile apps.IBM Clouds Bluemix developing solution has a wide range of cloud SaaS management tools.

IBM Cloud also offers full server customization. This means that everything that is included in the server is handpicked by you. This way you do not have to pay for features that you might never use.

Another IT behemoth cloud service

+Architecture and storage+Enterprise ready+Free tier

Oracle Cloud Infrastructure is another cloud service from a computing behemoth, and as you'd expect it's both a powerful and feature-packed platform. A recent Forrester review noted that Oracle's services were especially strong at supporting different workloads, especially for IoT, OLTP, microservices, along with applications dependent on AI and machine learning. There are two main service provisions available: cloud architecture, and storage data.

Cloud architecture includes data management, databases, and applications, while the Oracle Data Cloud is primarily for driving big data analytics for business intelligence insights. Oracle also provides a range of SaaS (Software as a Service) platforms such as HCM, EPM, SCM, and social media tools.

As expected, there are a vast range of potential involved in using Oracle's cloud services, but they are really designed to accommodate enterprise needs rather than small businesses or individuals.

For those who do sign up, aside from a 30-day free trial, Oracle Cloud also offers a free service tier which includes unlimited access to two autonomous databases which comes with Oracle Application Express (APEX) and Oracle SQL

Developer, as well as two compute VMs, block, object, and archive storage, as well as load balancing, monitoring, and notifications.

The best open source cloud computing OS

+Cloud OS platform+Full control+Customizations+Built in security

-More technical challenges

CloudLinux isn't so much a cloud computing provider, but rather a cloud platform you can build across your own servers. This means that if you'd prefer to have tight control over your cloud network rather than going with third-parties, you can host it yourself. While this presents a different set of challenges, it also offers a range of benefits, especially for those companies already heavily invested in their own IT infrastructure.

CloudLinuxis a distro of specifically built for virtualized cloud operations to power shared hosting services, by allocating and limiting server resources to each tenant. Additionally, each tenant is partition from each other, in other to create a more secure environment. The result is a hosting platform that has built in redundancy, stability, and security, in order to provide a better hosting environment.

All cloud services require a degree of technical knowledge to work with, so for those with extensive expertise CloudLinux offers the opportunity to be far more in control of your own services and how they are configured.

Original post:
Best cloud computing services of 2021 | TechRadar

Read More..

Microsoft says the NSA needs to cancel its $ 10 billion cloud computing deal with Amazon – Illinoisnewstoday.com

expansion / An aerial photograph of the NSA.

nsa.gov

Amazon Web Services (AWS) has been named the winner of the National Security Agencys $ 10 billion cloud computing contract called Wild and Stormy.But Microsoft is definitely still salty Amazons Successful Challenge to Redmonds $ 10 Billion Jedi Contract Together with the Pentagon, he submitted a formal bid protest to the Government Treasury last month.

Microsoft says Microsoft would have won if the NSA had properly evaluated the bid. GAO plans to determine the outcome of the protest by the end of October.News first reported by trade magazine Washington technology..

This award and protest comes as US intelligence agencies have considered overhauling computing and storage resources over the past few years. Today, many agency cloud operations use so-called GovCloud products from various vendors, such as Amazons AWS and Microsofts Azure. The first move to the cloud was facilitated years ago by the exponential growth of data collected and analyzed by intelligence agencies. The increase outweighed the capacity of institutions to keep everything in-house. AWS was an early winner, winning a $ 600 million contract with the CIA in 2013.

After years of using GovCloud services tailored for the intelligence community, the NSA, CIA, and Pentagon have sought bids for new cloud computing contracts. In November, the CIA announced an award for the tens of billions of dollars worth of a 15-year commercial Cloud Enterprise program. Granted to AWS, Microsoft, Google, Oracle and IBM. As agencies meet different needs, the five companies compete for subcontracting.

Little is known about the NSAs Wild and Stormy program, but it appears to be part of the NSAs Hybrid Compute Initiative. This initiative combines traditional cloud services with one of the leading companies HaaS (Hardware-as-a-Service) products. Greg Smithberger, NSA Chief Information Officer, said: Janes last year. Its unclear if he was referring to AWS at the time.

The HaaS requirement stems from the fact that the NSA states that some of its applications require more specialized computing. There are some [network] A little more exotic work There are some works that are a little difficult to refactor and move to [commercial] Cloud services, said Smithberger.

The hybrid approach allows the NSA to offload more operational management and work with the same provider to divide more traditional and more specialized storage and computing needs.

The NSA is always up and running at very high capacities. Its always like a full-blown jet engine given the NSAs requirements, said Pentagon CIO John Sherman. It states as follows. FedScoop.. There is no resilience about what is happening on the mission at Fort Meade, he added. The software they have on GovCloud may need to run on bare metal, which can further improve performance.

AWS has been providing cloud computing to the intelligence community for almost a decade, offering a greater advantage than its competitors. In recent years, Microsoft has responded to these contracts by building the following equipment: Certification Process secret data and top secret data.

However, despite Microsofts presence in this area, AWS continues to dominate. [The NSAs award] Amazon is still a cloud provider that beats the entire federal government, said Bloomberg government analyst Chris Cornilly. Nextgov.. Microsoft has come a long way and has become a two-way horse race in the government, but Amazon had a relationship 10 years ago and was collecting security certifications. Microsoft is still catching up.

Microsoft says the NSA needs to cancel its $ 10 billion cloud computing deal with Amazon

Source link Microsoft says the NSA needs to cancel its $ 10 billion cloud computing deal with Amazon

More:
Microsoft says the NSA needs to cancel its $ 10 billion cloud computing deal with Amazon - Illinoisnewstoday.com

Read More..

How Cloud Technology Helps in Film Broadcast and Production? – Analytics Insight

How is cloud technology helping the film industry?

The film industry has undergone many technological changes such as 3D, 4D, and even 5D. But it is not the end. Cloud technology is now emerging in the field of film technology.

It has seen uses in all aspects of the industry, from content creation to distribution. Using cloud technology is enabling companies to balance their operations faster and in a more cost-effective way. It also provides small broadcasters and production houses with the tools to contend with the industry leaders.

Cloud technology allows centralization of data, information, and processes and serves easy access and perfect outline for films. This results in better decision-making, improved movie experience, and integrated operations.

Cloud-based editing enables the heavy processing work to take place away from the main workstation, meaning that all the editing operations can take place remotely. There is no need to physically visit the workstation and perform editing. Cloud technology helps in reducing expenses and investments that are made on hardware by the production houses.

Cloud technology is best known for data storage. Cloud technology provides storage and sharing of files off-site. This data can then be accessed only by the user, or whomever the user allows its access. This storage can be accessed from anywhere in the world by the user. Cloud storage provides an excellent solution for production houses or broadcasters that are storing large files and sharing them.

For broadcasters, cloud technology is enabling a rapid increase in content. Over the top (OTT) content, TV shows, and films over the internet are providing more revenues for existing companies.

Using the cloud as an avenue for delivering content enables broadcasters to start a brand-new channel without having the need for cable licenses.

Online streaming services like Netflix, Hulu, and Amazon Prime Video are the successful outcome of cloud technology.

New, as well as saved content that is stored on the cloud, can be easily accessed directly by the audience with the addition of an encoder and a storefront.

In todays world, a films production crew, director, participating service partners, and castes are global. Cooperating among these teams becomes difficult as the physical transfer of data and film reels is a time-consuming process. But having access to the files remotely makes the process easy and saves time. This is where cloud technology benefits the film industry. Cloud technology helps in making real-time discussions which saves time, effort as well as money.

For accumulating all the individual elements of a film including audio combinations, visual effects, and video filters to create the finished product, heavy computing power is required. The memory and processing power needed for making the final frames is much higher than what is available on standard computers. Cloud technology can be used to complete projects much rapidly by using remote computing power for the furnishing processes.

Pre-release privacy causes a 19% decrease in revenue than piracy that occurs post-release. Cloud technology offers refined solutions to such security issues to the film industry. By creating private clouds, the film industry doesnt have to worry anymore about other studios gaining access to their system.

Starting with film distribution from theatrical planning, booking, and settlements to building a smoother customer-centric approach, cloud technology enables assessment of similar films to an individual theatre performance, giving distributors insights to secure a successful release.

Share This ArticleDo the sharing thingy

Continued here:
How Cloud Technology Helps in Film Broadcast and Production? - Analytics Insight

Read More..