Page 2,763«..1020..2,7622,7632,7642,765..2,7702,780..»

Avast and RiskIQ announce threat intelligence partnership – ChannelLife Australia

Digital security and privacy company Avast, and RiskIQ, an internet security intelligence company, have announced a threat intelligence partnership. Under the agreement, the companies will use their specific areas of expertise to develop combined threat intelligence for their customer bases to enhance security practices.

At Avast, we recognise that no one provider can see the whole picture, says Avast senior VP, partner business, Nick Viney.

Thats why we partner broadly to improve the threat intelligence available to companies and also to improve our ability to protect our customers. Our global threat intelligence will contribute to RiskIQs understanding of the worldwide threat landscape.

"Avast will leverage RiskIQs intelligence to enrich our data and further scale our threat hunting and response capabilities for companies and consumers alike," he adds.

Avasts threat intelligence platform covers hundreds of millions of endpoints from internet threats, powered by threat intelligence from Avasts global network, one of the worlds largest and most geographically diverse threat detection networks. Avast says advanced analytics enable insight into thousands of malware families, including how they are detectable before customers are impacted, and how those threats evolve as bad actors attempt to evade detection.

RiskIQ aggregates and collects data and intelligence from the whole internet to identify threats and attacker infrastructure, and leverages machine learning to scale threat hunting and incident response. Its Illuminate Internet Intelligence Platform provides content on attackers, including their tools and systems, and indicators of compromise across the global attack surface.

RiskIQ and Avast share a mission to protect people and businesses on the internet, and as partners, we can both be more effective, says RiskIQ CEO, Lou Manousos.

Avast helps us enrich our understanding of the global threat landscape, and we welcome them to our Interlock Partner Program. RiskIQs Interlock Partner Program is a next-generation program supporting deep, bi-directional integrations that meaningfully advance the capabilities and value for customers and both solutions.

It enables members to rapidly deploy RiskIQ attack surface visibility and internet security intelligence across their enterprise security ecosystem (or infrastructure) for automated and informed threat detection, investigations, and prevention, he says.

Avast has 435 million online users and offers products under Avast and AVG to protect from threats on the internet and the evolving IoT threat landscape. While RiskIQ specialises in digital attack surface management, discovery, intelligence, and mitigation of threats associated with an organisations digital presence. Based in San Francisco, the company is backed by Summit Partners, Battery Ventures, Georgian Partners, NationalGrid Partners, and MassMutual Ventures.

Read the original post:
Avast and RiskIQ announce threat intelligence partnership - ChannelLife Australia

Read More..

Internet of Things in desperate need of more robust identity and access management – SecurityBrief Asia

The future of identity and access management in the Internet of Things will escape the confines of user-focused identity and transition toward a more inclusive model, according to a new analysis research report by ABI Research.

The new multi-faced approach will include machine and system identity along with IoT device and platform management operations.

"IAM is yet another identity and security framework that poses significant challenges when crossing from the IT realm onto the IoT," says Dimitrios Pavlakis, senior cyber security and IoT analyst at ABI Research.

"Most cloud providers regard IAM as a purely user-focused term while other IoT device management and platform providers make references to IAM in device access control," he says.

"IAM in traditional IT environment is used to streamline user digital identities and to enhance the security of user-facing front-end operations using a variety of management tools, privilege management software and automated workflows to create a user-focused authorisation framework."

Pavlakis says the explosion of IoT technologies has significantly increased the sheer volume and complexity or interconnected devices, users, systems, and platforms making traditional IT IAM insufficient, if not problematic in some cases.

"Insufficient access control options, legacy infrastructure and proprietary protocol dependencies, traditionally closed networks, the fervent increase in digitisation, albeit with lackluster security operations, are some of the most prominent challenges for IAM in IoT," he explains.

"Regardless of which IAM terminology is used, these challenges along with the highly complex IoT identity value chain point toward a more competent model of IAM, which touches upon various technologies and security protocols to be considered under the IAM umbrella including: user privilege management and on-prem access control, edge-to-cloud integration, cloud directory-as-a-service, system and machine ID, data security and governance, API management, IoT device identity, authentication and access control."

Pavlakis says the justifiable lack of a unified IoT security standardisation framework, the fact that organisations are always on a reactive approach versus proactive, the emergence of the new cyber-threat horizon and ever-present budget restrictions also forces implementers to create an approximation of IAM protocols by examining IoT applications on a case by case basis.

"No matter how you slice it, IAM in Industrial IoT obviously ought to be significantly different than IAM protocols in finance settings and further blurs the lines between access control for system, machine and user ID," he says.

Prominent IT IAM vendors include Cisco, IBM, Microsoft, Oracle, RSA, ForgeRock, Giesecke and Devrient, Ping Identity, Idaptive, Micro Focus, Okta and Ubisecure while new vendor categories under the IoT IAM umbrella can include telcos, IoT device, gateway management or platform providers including Entrust, Globalsign, Pelion, Sierra Wireless, Cradlepoint, Kerlink, and Advantech.

See the article here:
Internet of Things in desperate need of more robust identity and access management - SecurityBrief Asia

Read More..

Serial Swatter Who Caused Death Gets Five Years in Prison Krebs on Security – Krebs on Security

A 18-year-old Tennessee man who helped set in motion a fraudulent distress call to police that led to the death of a 60-year-old grandfather in 2020 was sentenced to 60 months in prison today.

60-year-old Mark Herring died of a heart attack after police surrounded his home in response to a swatting attack.

Shane Sonderman, of Lauderdale County, Tenn. admitted to conspiring with a group of criminals thats been swatting and harassing people for months in a bid to coerce targets into giving up their valuable Twitter and Instagram usernames.

At Sondermans sentencing hearing today, prosecutors told the court the defendant and his co-conspirators would text and call targets and their families, posting their personal information online and sending them pizzas and other deliveries of food as a harassment technique.

Other victims of the group told prosecutors their tormentors further harassed them by making false reports of child abuse to social services local to the targets area, and false reports in the targets name to local suicide prevention hotlines.

Eventually, when subjects of their harassment refused to sell or give up their Twitter and Instagram usernames, Sonderman and others would swat their targets or make a false report to authorities in the targets name with the intention of sending a heavily armed police response to that persons address.

For weeks throughout March and April 2020, 60-year-old Mark Herring of Bethpage, Tenn. was inundated with text messages asking him to give up his @Tennessee Twitter handle. When he ignored the requests, Sonderman and his buddies began having food delivered to Herrings home via cash on delivery.

At one point, Sonderman posted Herrings home address in a Discord chat room used by the group, and a minor in the United Kingdom quickly followed up by directing a swatting attack on Herrings home.

Ann Billings was dating Mr. Herring and was present when the police surrounded his home. She recalled for the Tennessee court today how her friend died shortly thereafter of a heart attack.

Billings said she first learned of the swatting when a neighbor called and asked why the street was lined with police cars. When Mr. Herring stepped out on the back porch to investigate, police told him to put his hands up and to come to the street.

Unable to disengage a lock on his back fence, Herring was instructed to somehow climb over the fence with his hands up.

He was starting to get more upset, Billings recalled. He said, Im a 60-year-old fat man and I cant do that.'

Billings said Mr. Herring then offered to crawl under a gap in the fence, but when he did so and stood up, he collapsed of a heart attack. Herring died at a nearby hospital soon after.

Mary Frances Herring, who was married to Mr. Herring for 28 years, said her late husband was something of a computer whiz in his early years who securedthe @Tennessee Twitter handle shortly after Twitter came online. Internet archivist Jason Scott says Herring was the creator of the successful software products Sparkware and QWIKMail; Scott has 2 hours worth of interviews with Herring from 20 years ago here.

Perhaps the most poignant testimony today came when Ms. Herring said her husband who was killed by people who wanted to steal his account had a habit of registering new Instagram usernames as presents for friends and family members whod just had children.

If someone was having a baby, he would ask them, What are your naming the baby?, Ms. Herring said. And he would get them that Instagram name and give it to them as a gift.

Valerie Dozono also was an early adopter of Instagram, securing the two-letter username VD for her initials. When Dozono ignored multiple unsolicited offers to buy the account, she and many family and friends started getting unrequested pizza deliveries at all hours.

When Dozono continued to ignore her tormentors, Sonderman and others targeted her with a SIM-swapping attack, a scheme in which fraudsters trick or bribe employees at wireless phone companies into redirecting the targets text messages and phone calls to a device they control. From there, the attackers can reset the password for any online account that allows password resets via SMS.

But it wasnt the subsequent bomb threat that Sonderman and friends called in to her home that bothered Dozono most. It was the home invasion that was ordered at her address using strangers on social media.

Dozono said Sonderman created an account on Grindr the location-based social networking and dating app for gay, bi, trans and queer people and set up a rendezvous at her address with an unsuspecting Grindr user who was instructed to waltz into her home as if he was invited.

This gentleman was sent to my home thinking someone was there, and he was given instructions to walk into my home, Dozono said.

The court heard from multiple other victims targeted by Sonderman and friends over a two-year period. Including Shane Glass, who started getting harassed in 2019 over his @Shane Instagram handle. Glass told the court that endless pizza deliveries, as well as SIM swapping and swatting attacks left him paranoid for months that his assailant could be someone stalking him nearby.

Judge Mark Norris said Sondermans agreement to plead to one count of extortion by threat of serious injury or damage carries with it a recommended sentence of 27 to 33 months in prison. However, the judge said other actions by the defendant warranted up to 60 months (5 years) in prison.

Sonderman might have been eligible to knock a few months off his sentence had he cooperated with investigators and refrained from committing further crimes while out on bond.

But prosecutors said that shortly after his release, Sonderman went right back to doing what he was doing when he got caught. Investigators who subpoenaed his online communications found hed logged into the Instagram account FreeTheSoldiers, which was known to have been used by the group to harass people for their social media handles.

Sonderman was promptly re-arrested for violating the terms of his release, and prosecutors played for the court today a recording of a phone call Sonderman made from jail in which he brags to a female acquaintance that he wiped his mobile phone two days before investigators served another search warrant on his home.

Sonderman himself read a lengthy statement in which he apologized for his actions, blaming his addiction on several psychiatric conditions including bipolar disorder. While his recitation was initially monotone and practically devoid of emotion, Sonderman eventually broke down in tears that made the rest of his statement difficult to hear over the phone-based conference system the court made available to reporters.

The bipolar diagnoses was confirmed by his mother, who sobbed as she simultaneously begged the court for mercy while saying her son didnt deserve any.

Judge Norris said he was giving Sonderman the maximum sentenced allowed by law under the statute 60 months in prison followed by three years of supervised release, but implied that his sentence would be far harsher if the law permitted.

Although it may seem inadequate, the law is the law, Norris said. The harm it caused, the death and destruction.its almost unspeakable. This is not like cases we frequently have that involve guns and carjacking and drugs. This is a whole different level of insidious criminal behavior here.

Sondermans sentence pales in comparison to the 20-year prison time handed down in 2019 to serial swatter Tyler Barriss, a California man who admitted making a phony emergency call to police in late 2017 that led to the shooting death of an innocent Kansas resident.

Go here to read the rest:
Serial Swatter Who Caused Death Gets Five Years in Prison Krebs on Security - Krebs on Security

Read More..

Why the Bank of England has its head in the cloud over data security – The Guardian

The Bank of England is at risk of moving too slow, according to experts, who say it needs to get a grip on the financial sectors plans to outsource customer data storage to a handful of unregulated US tech giants.

Last week, the central bank raised fresh concerns about the use of cloud services, where data is held on remote servers run by another company. It said the fact the services were dominated by just a few companies such as Google, Amazon and Microsoft posed a potential threat to financial stability.

Cloud service providers are an increasingly integral part of the infrastructure of the financial system, the Bank governor, Andrew Bailey, said. And there are many good reasons for that: its a model that works.

But the fact that a growing list of financial firms rely on just three tech companies to run their day-to-day services has increased the risk that multiple banks could be affected by cybersecurity risks, hacking and outages aimed at a single provider. Their dominance also means they can dictate the prices and terms of their services, and potentially withhold key information about risks from clients and regulators.

We dont want people publishing how this thing works in great detail so that hackers have a guidebook, so we have to balance that, the governor explained. But as regulators we have to get more assurance that they are meeting the levels of resilience that we need.

The regulator is now trying to secure those assurances before it has its own cloud-based data breach to deal with. The big problem here is technology is moving faster than regulators, said Sarah Kocianski, the head of research at the fintech consultancy 11:FS.

Like most companies, banks have been using cloud services for day-to-day operations such as email, admin and HR for years. Their use has since expanded to run chat bots and fraud detection programmes that can flag up irregular spending automatically.

But the rapid digitalisation of banking services, which has pushed more people towards apps and online banking and away from their local branches, has meant major banks including Lloyds, NatWest, HSBC and Barclays are planning to shift core customer-related data to cloud services run by the worlds largest tech giants if they havent already.

HSBC, which already had agreements with Google and Microsoft, announced last June it had struck a multi-year deal with Amazon Web Services to help run new services for its wealth and personal banking business a division that serves millions of customers worldwide as part of its digital transformation plan. Meanwhile, Lloyds has launched a dedicated Cloud Centre of Excellence tasked with ensuring the safe adoption of cloud services, provided by Microsoft and Google, across the entire organisation.

Those projects have been accelerated by the pandemic, which put pressure on banks to provide new services online much quicker than planned. Banks have suddenly realised: Oh, we dont have five years to do this, we have five months and I think that has, necessarily, pushed them to look at third parties that can help them along the way, Kocianski said.

Most banks are not capable of building this stuff themselves. They dont have the talent, they dont have the time, they dont have the expertise. And quite frankly, why would you build it if you could buy it?

Brexit has also played a role, forcing banks to use the cloud to store EU customer information that they did not have the capacity, or security, to properly hold in the UK due to strict data privacy rules.

The Bank of England, which is understood to be speaking to cloud providers on a monthly basis, said last week it was working with the Financial Conduct Authority and the Treasury to try to address the potential risks, but could only go so far without international cooperation given that most of those cloud service providers were headquartered overseas.

Sign up to the daily Business Todayemail

It puts further pressure on cross-border regulators such as the Financial Stability Board and the Bank for International Settlements to set global standards, and fast.

But David Richards, the chief executive and co-founder of WANdisco, a company that shifts company information to cloud platforms, warned that financial regulators could end up behind the curve if they did not act quickly enough.

You have to regulate now, he said. Trying to implement rules in five years, when the amount of cloud-based data was potentially 100 times bigger, will be too hard.

Amazon and Microsoft declined to comment. Google did not respond to requests for comment.

See the rest here:
Why the Bank of England has its head in the cloud over data security - The Guardian

Read More..

Fungible can solve the public cloud Hotel California problem Blocks and Files – Blocks and Files

DPU startup Fungible recently briefed Blocks & Files on its views regarding Intels Infrastructure Processing Unit. Co-founder and CEO Pradeep Sindhu said it was inadequate as a data centre cost saver, lacked imagination, and couldnt help solve the public clouds trillion-dollar paradox, also known as the Hotel California problem.

Intel launched its data processing unit (DPU) line recently, differentiating itself from DPU suppliers such as Fungible and Pensando, by calling its product an Infrastructure Processing Unit (IPU). While Fungible would agree processing infrastructure-centric instructions is the key need, it thinks Intels DPU vision is painfully inadequate and provides much smaller TCO benefits.

The basic difference between the Intel and Fungible approaches, in Blocks & Filess view, is that Intel is focussed on incremental improvements using Smart NICs such as Nvidias BlueField where Fungible is looking for up to 12x improvement.

Intel says it is the DPU market leader by virtue of its sales to hyperscaler data centre operators. Such operators have thousands of servers and switches, and tens of thousands of storage drives. They sell compute cycles, so any percentage gain in compute cycle capacity is worthwhile. A ten to 20 per cent improvement obtained by offloading network, security and storage functions to a SmartNIC means a significant increase in server utilisation, and hence revenues.

Sindhu mentioned Amazons Annapurna approach, in which Amazon took infrastructure processes that were running on X86 and put them on Arm. The Arm CPUs were not as powerful as X86 processors but, at $5/core, were much lower cost than X86 which cost $40/core an 8x improvement. By making that switch, AWS freed up X86 compute cycles, which it could sell to customers.

But Fungible wants more. Sindhu told us that he believes the infrastructure server processing burden is becoming a much bigger component of overall server CPU cycle utilisation. As application server populations in data centres increase and as non-server processing resources such as GPUs increase as well the amount of internal-to-the-data-centre infrastructure processing skyrockets. Sindhu said there is much more east-west data movement in such data centres than north-south data movement.

That means more and more network, storage and security processing tasks are the result of such data movement within and across the infrastructure. It is, he thinks, pointless for application servers to execute the myriad repetitive instructions needed for this work. Yes, it should be offloaded from the servers but not in a small-scale, incremental way with SmartNICs.

In our view, that is like putting lipstick on a pig.

Sindhu said The DPU concept is broader than Intels IPU concept, but he is happy to have Intel and Nvidia validating our vision.

He said Intels IPU concept lacks imaginative vision because Fungibles DPUs can do so much more than an Intel IPU. One example: legacy applications are compute-centric, so user-initiated computations should be executed close to where user data is stored. SQL primitives can be executed directly on DPUs (with SSDs plugged into them) with little data movement.

Sindhu talked about a second example: machine learning involves parameter-serving problems in which previous GPU results are put into Comma and the results distributed. These computations are best done in the network and on-the fly, he said. In other words, on the Fungible DPU.

What Intel actually has is an accelerator (crypto and others), not a DPU, plus a bunch of vanilla Atom cores. Just integrating them on the same die will not solve the problem.

DPU computations have four characteristics:

What is needed is a more or less complete offload of infrastructure-centric processing to dedicated processing chips, tailor-made with instructions and architecture specifically designed for IT infrastructure processing. Fungibles view is that its specialised CPU can process these infrastructure-centric computations far more efficiently than anything else out there.

In effect, an infrastructure-focussed data processing system, using DPUs, is deployed inside a data centre as a central hub with application CPUs using GPUs to carry out processing tasks that distract from their main purpose: running application code.

Sindhu said Nvidias Bluefield SmartNIC is a hardware implementation of NVMe-over Fabrics RoCE (RDMA over Converged Ethernet) protocol, with a ConnectX 5 chip (ROCE v2) and 8 and then 16 Arm cores. The issue he said, is that for RoCE its fine but for other computations its just another general purpose CPU. In short, its inefficient.

Intel and Nvidia are using 7nm designs, yet we beat the pants off them with our 16nm chip because we have a better architecture. Well move to 7nm and then on to 5nm, and no-one will be able to catch us.

Our FS1600 does close to 15 million IOPS. If you use two Xeons with the same SSDs youll get one million IOPS if youre lucky We can see our way 20 million IOPS with software improvements.

Fungible claims that hyperscalers and near-hyperscaler data centres can realise a 12x improvement in TCO by using its specialised chips and software. That consists of 4x improvement from eliminating resource silos and then 3x from improving efficiency.

A Fungible slide shows these two aspects of Fungibles TCO claim. The 3x efficiency improvement claim is shown by taking a nominal $100 of existing IT network, compute and storage infrastructure spend and claiming that the equivalent Fungible infrastructure spend spend with DPU column would be $36. Thats a 64 per cent reduction. Put another way, a $10M infrastructure spend without Fungible would be a $3.6M spend with Fungible a saving of $6.4M.

The slide includes a middle Spend Smart NIC column, which is where Intels IPU-based infrastructure would fit. It partially offloads the host server CPUs but doesnt affect the network and storage spend elements, resulting in a ten per cent TCO reduction a $1M saving in the case of the $10M infrastructure spend example above, with Fungible saving you $5.4M more..

The rather large storage spend saving with Fungible $40 down to $8 is from its data reduction and erasure coding, both meaning less capacity is needed for the same number of raw terabytes.

Sindhu says overall enterprise data centre IT equipment utilisation is less than eight per cent. AWSs data centre utilisation is 32 per cent. He says: Fungible can bring 10x better efficiency to enterprise data centres and 2 to 2.5x better efficiency than hyperscalers.

The Fungible marketing message is that its products let customers operate a data centre with higher efficiency than the hyperscalers themselves. That means tier-1 and tier-2 data centre operators are likely prospects for Fungible.

Equinix and other colocation centres are examples of potentially good targets for Fungible. But a lot of Equinix revenues comes from hyperscalers themselves, with systems such as direct connect brokerage. Equinix might not want to bite the hands that feed it.

Toby Owen, Fungibles VP for Product, said: I think a service provider (SP) would be a model for us that has a huge potential. A whole bunch of customers would rent AI/ML resources from SPs.

Sindhu referred to the Andreessen Horowitz Trillion Dollar Paradox article by Sarah Wang and Martin Lomax:

This said that cloud IT resources were cheap when companies started using them, but quite rapidly become high-cost after a few years. The chart above shows worldwide spending on on-premises data centres and the public cloud from 2010 to 2020, with the cloud growing past the on-premises spend.

Cloud spend puts so much pressure on a companys margins that its share price falls and its market capitalisation suffers. The article explains: Its becoming evident that while cloud clearly delivers on its promise early on in a companys journey, the pressure it puts on margins can start to outweigh the benefits, as a company scales and growth slows. Because this shift happens later in a companys life, it is difficult to reverse as its a result of years of development focused on new features, and not infrastructure optimisation.

Sindhu says that large public cloud customers end up in Hotel California:You can check out any time you like, but you can never leave!*

Wang and Casados conclusion is: We show (using relatively conservative assumptions) that across 50 of the top public software companies currently utilising cloud infrastructure, an estimated $100B of market value is being lost among them due to cloud impact on margins relative to running the infrastructure themselves.

Sindhus message is that a large business can save extensive amounts of money by repatriating public cloud IT infrastructure spend to its on-premises data centres, and equipping them with Fungibles DPU hardware and software. That way they get better than public cloud data centre efficiency and boost their market capitalisation even more.

* Hotel California lyrics Cass County Music, Red Cloud Music, Fingers Music. Songwriters: Don Henley, Glenn Frey, Don Felder. Source:Musixmatch

Read the original here:
Fungible can solve the public cloud Hotel California problem Blocks and Files - Blocks and Files

Read More..

AWS hosting: What is it, and how does it work? – Tom’s Guide

Whether youre planning your first website or are a seasoned veteran with dozens under your belt, every website owner faces the important question of which web hosting provider to choose. Finding and choosing one of the best web hosting services for your needs isnt easy, not least because you have a lot of different options to choose from. Learning about them all is overwhelming.

To help with that task, this article will outline one of the biggest players in the hosting space to consider: AWS hosting.

Amazon Web Services (AWS) hosting refers to the hosting services provided by the global ecommerce giant Amazon. AWS hosting is one service within the larger AWS platform, which provides an array of cloud-based products (over 200 altogether). In addition to web hosting, some of its top products are cloud storage and database services: read our AWS review to learn more about the cloud storage element.

AWS is the largest cloud platform there is, and was one of the earliest companies to provide cloud-based services, making them one of the most respected options for anyone interested in cloud hosting.

AWS hosting uses cloud hosting. With traditional hosting, a website is stored on a specific physical web server. Cloud hosting, by contrast, uses a network of connected serversboth virtual and physical. That means websites that use cloud hosting arent dependent on any one machine. One server in the network can go down without affecting the performance of any website being hosted on it, since there are plenty of others to fall back on.

AWS hosting is by no means the only option for cloud hosting, but it's one of the most well-known and popular of the best cloud hosting providers.

AWS offers a few different types of AWS hosting services for different levels of need.

If you do decide to use AWS for your hosting, then figuring out which service makes the most sense for your needs will play a role in what you pay and how satisfied you are with the experience.

Web hosting is a competitive market, but AWS is an established brand with some strong benefits to offer.

Security

A business built on ecommerce should know something about security, and Amazon extends that knowledge to its AWS services. The company promises infrastructure that was built to the standards of the most exacting industries, including the military and global banks.

Finding a secure web host is only one step in making sure your website is secure, but its an important one. AWS hosting is a solid choice in this regard, and you can learn more about site security in our feature, which spells out how to evaluate and improve your website security.

Performance

AWS has a huge infrastructure backing its hosting services, which translates into a strong performance (at least most of the time). For websites that use AWS hosting, that means you can typically count on fast loading times and near constant uptime (the term for how often your website is available).

Flexibility

One of the big benefits of cloud hosting in general, including AWS hosting, is that its easier to scale up and down as needed. If your websites needs arent consistentsay, your traffic surges during the holiday season, then slows down for months afterthen having a web hosting plan that can accommodate varying needs as they arise is useful. AWS hosting is a good choice for that.

Payment model

AWS hosting uses a pay-as-you-go model, which can be useful for some businesses. For months where you have fewer visitors and need less bandwidth, your costs will go down. And if you only need some of the services AWS makes available, youll pay less because of it. If you like the idea of knowing that youll only pay for what you need, AWS hosting makes that possible.

Global footprint

While many website owners dont think much about it, geography plays a role in the performance of your web host. If their servers are located on the opposite side of the world from where most of your visitors are, it can affect how fast your site loads and how well it works for them.

Regional hosting matters for your websites performance. AWS has servers all over the world, set up in availability zones. No matter where you or your visitors are located, they probably have a server nearby.

Compatibility

AWS hosting is compatible with all the main platforms, content management systems (CMSs), and programming languages you may use to build your website.

While the benefits AWS hosting offers are significant, its not a perfect service and its not for everyone.

Confusing pricing

The pay-as-you-go model is a plus for some website owners, but a minus for many others. It makes payment into a complicated process. Understanding what you owe and knowing what to expect each month becomes difficult. You may end up feeling like you have less control over your costs. You dont want to end up with a surprise bill thats much higher than your business budget for the month.

Many web hosting providers offer much more straightforward pricing. You pay a set amount per month or year, period. For companies or individuals on a strict budget, knowing exactly what youll owe can make a lot more sense than dealing with the possibility of change month to month.

Complexity

AWS hosting offers a ton of functionality, but the flipside to that is that its not intuitive for beginners. Figuring out how to get set up and use the hosting service can be confusing. A lot of other web hosting providers do a better job at providing ease of use for non-experts. If you dont want to deal with a steep learning curve, or dont have IT experts on staff to do the work for you, then AWS hosting may not be worth the effort.

Some vulnerability

AWS hosting can promise impressive security and high performance expectations, but you cant assume that means your website will face no issues. Websites that use AWS hosting have still faced data leaks and hacks, and the hosting service has dealt with the occasional outage in spite of its impressive infrastructure.

Choosing a reputable web hosting provider like AWS hosting makes a big difference when it comes to security and performance, but its not a guarantee that youll experience no issues.

AWS hosting may be a smart choice for you if you need a high level of security and performance, and like the idea of being able to scale as needed and only pay for what you use. For website owners that prefer a more straightforward payment structure and value ease of use over power and features, AWS hosting isnt your best choice.

More here:
AWS hosting: What is it, and how does it work? - Tom's Guide

Read More..

Get Cloud Storage and VPN Protection in One Discounted Bundle – PCMag.com

Data is a valuable commodity these daysto users, to big businesses, and to hackers trying to siphon it off. Protecting it requires storing your data securely, but also protecting yourself online so nobody can compromise your system and gain access to it.

One easy solution to this problem is TheLifetime Backup & Security Subscription Bundle. It's a one-two punch of services that can solve the safe storage problem, no matter your data needs. As its name suggests, users get lifetime subscriptions to reliable cloud storage and a top-rated VPN.

Degoo does storage right with high-speed transfers from servers protected by 256-bit AES encryption. Your premium subscription gets you a massive 10TB of data, accessible anytime and easily shared via a link or email. With file change detection and automatic backup, you never have to worry about losing valuable content on a crashed computer.

For an extra dose of security, there's also a lifetime subscription to VPN Unlimited. This service gives you everything you could want in a virtual private network: easy connection on a range of protocols, no bandwidth limits, and access to more than 500 servers in locations worldwide. You'll be able to access geo-restricted content and torrent to your heart's content, all thanks to a masked IP and VPN Unlimited's no-logging policy.

PCMag readers can snag The Lifetime Backup & Security Subscription Bundle, on sale for $89.9997% off the $3,799 MSRP.

Prices subject to change.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.

More here:
Get Cloud Storage and VPN Protection in One Discounted Bundle - PCMag.com

Read More..

Qualcomm’s Vision: The Future Of … AI – Forbes

Mobile Chip Leaders AI Starts In Mobile, And Grows To The Clouds

Company acquires assets from Twenty Billion Neurons GmbH to bolster its AI Team.

Qualcomm Technologies (QTI) is running a series of webinars titled The Future of..., and the most recent edition is on AI. In this lively session, I hosted a conversation with Ziad Asghar, QTI VP of Product Management, Alex Katouzian, QTI SVP and GM Mobile Compute and Infrastructure, and Clment Delangue, Co-Founder and CEO of the open source AI model company, Hugging Face, Inc. Ive also penned a short Research Note on the companys AI Strategy, which can be found here on Cambrian-AI, where we outline some impressive AI use cases.

Qualcomm believes AI is evolving exponentially thanks to billions of smart mobile devices, connected by 5G to the cloud, fueled by a vibrant ecosystem of application developers armed with open-source AI models. Other semiconductor companies might say something similar, but in Qualcomms case it uniquely starts with mobile. The latest Snapdragon 888 has a sixth generation AI engine powerful enough to process significant AI models on the phone, enabling applications such as on-device speech processing and even real-time spoken language translation. Qualcomm complements the edge devices with cloud processing using the Cloud AI100, which demonstrated leading performance efficiency recently on the MLPerf V1.0 benchmarks. Qualcomm calls this approach Distributed Intelligence.

Qualcomm envisions a tightly coupled network of AI processors across the cloud, Edge cloud, and ... [+] on-device endpoints.

To add more talent and IP to Qualcomms AI research lab, the company announced today that it has acquired a team from Twenty Billion Neurons GmbH (TwentyBN), including their high quality video dataset that is widely used by the AI research community.The founding CEO is Roland Memisevic, who co-led the world-renowned MILA AI institute withYoshua Bengio of the Universit de Montral.

While few smart phone users realize they are using AI every time they take a picture, even fewer understand that AI helps keep them connected. QTI embeds AI in both applications, such as computational photography and accurate voice interaction, as well as in the operation of the mobile handset itself, optimizing 5G to extend the networks reach, and power management to prolong battery life. Heres a few snipets from The Future Of... session.

Alex Katouzian, notes that Strategically what we do is we use our largest channel, which is mobile, to create inventions that will spiral and get reused in adjacent markets that have the same mobile traits. For example, PCs and XR or auto. And then, getting into some of the infrastructure-based designs as well, because AI can get used in edge cloud, in some private networks environments.

Ziad Asghar notes that We took our pedigree, which is amazing power efficiency, and applied it to AI processing. We've taken that from mobile, taken our learnings and applied it to the cloud side. If you look at what some of the major platforms are seeing today, theres a huge problem with the power consumption, where the power is basically doubling every year on the cloud side. So what we did was we took our AI expertise, we developed a new architecture, and came up with a product that's specifically designed for inferencing. That's what's given us an ability to be able to show performance at a power level that nobody else can show.

Hugging Faces Clment Delangue believes that Transfer Learning will be the next big thing in AI. I think, in five years, most of the machine learning models out there will be transfer learning models. And that's super exciting because they have new capabilities but also new opportunities for them to be smaller, more compressed, to be trained on smaller datasets, thanks of the unique characteristics and capabilities of transfer learning.

Qualcomm is one of the few if not only semiconductor companies to offer AI engines in both SoCs for mobile edge processing and in cloud servers. With over a decade of experience with mobile and now data center AI, the company is in a unique position to build the future:

We believe that this comprehensive strategy coupled with leadership performance and power efficiency will position Qualcomm well for significant growth in AI.

Original post:
Qualcomm's Vision: The Future Of ... AI - Forbes

Read More..

What Is a Server and What Do Servers Do? – Server Watch

ul > li, .td_block_template_6.widget > ul > li, .td_block_template_8.widget > ul > li, .td_block_template_9.widget > ul > li, .td_block_template_10.widget > ul > li, .td_block_template_11.widget > ul > li, .td_block_template_12.widget > ul > li, .td_block_template_13.widget > ul > li, .td_block_template_14.widget > ul > li, .td_block_template_15.widget > ul > li, .td_block_template_16.widget > ul > li, .td_block_template_17.widget > ul > li { margin-left: 0 !important; } .global-block-template-12 .td-comments-title span, .global-block-template-13 .td-comments-title span { margin-left: 0 !important; font-size: 20px; } @media (max-width: 767px) { .global-block-template-12 .td-comments-title span, .global-block-template-13 .td-comments-title span { font-size: 15px; } } .td-block-title-wrap .td-wrapper-pulldown-filter { font-family: 'Roboto', sans-serif; position: absolute; bottom: 0; right: 0; top: 0; margin: auto 0; z-index: 2; background-color: #fff; font-size: 13px; line-height: 1; color: #777; text-align: right; } .td-block-title-wrap .td-wrapper-pulldown-filter .td-pulldown-filter-display-option { cursor: pointer; white-space: nowrap; position: relative; line-height: 29px; } .td-block-title-wrap .td-wrapper-pulldown-filter .td-pulldown-filter-display-option i { font-size: 9px; color: #777; margin-left: 20px; margin-right: 10px; } .td-block-title-wrap .td-wrapper-pulldown-filter .td-pulldown-filter-display-option i:before { content: 'e83d'; } .td-block-title-wrap .td-wrapper-pulldown-filter .td-pulldown-filter-display-option span { padding-left: 20px; margin-right: -14px; } @media (max-width: 360px) { .td-block-title-wrap .td-wrapper-pulldown-filter .td-pulldown-filter-display-option span { display: none; } } .td-block-title-wrap .td-wrapper-pulldown-filter .td-pulldown-filter-display-option:hover { color: #4db2ec; } .td-block-title-wrap .td-wrapper-pulldown-filter .td-pulldown-filter-display-option:hover i { color: #4db2ec; } .td-block-title-wrap .td-wrapper-pulldown-filter .td-pulldown-filter-display-option:hover ul { display: block; } .td-block-title-wrap .td-wrapper-pulldown-filter .td-pulldown-filter-list { list-style: none; position: absolute; right: 0; top: 100%; padding: 18px 0; background-color: rgb(255, 255, 255); background-color: rgba(255, 255, 255, 0.95); z-index: 999; border-width: 1px; border-color: #ededed; border-style: solid; display: none; margin: 0; } .td-block-title-wrap .td-wrapper-pulldown-filter .td-pulldown-filter-item { list-style: none; margin: 0; } .td-block-title-wrap .td-wrapper-pulldown-filter .td-pulldown-filter-item .td-cur-simple-item { color: #4db2ec; } .td-block-title-wrap .td-wrapper-pulldown-filter .td-pulldown-more { padding-bottom: 10px; } .td-block-title-wrap .td-wrapper-pulldown-filter .td-pulldown-more:before { content: ''; width: 70px; height: 100%; position: absolute; margin-top: 2px; top: 0; right: 0; z-index: 1; opacity: 0; } .td-block-title-wrap .td-wrapper-pulldown-filter .td-pulldown-filter-link { color: #777; white-space: nowrap; display: block; line-height: 26px; padding-left: 36px; padding-right: 27px; } .td-block-title-wrap .td-wrapper-pulldown-filter .td-pulldown-filter-link:hover { color: #4db2ec; } @media (min-width: 768px) and (max-width: 1018px) { .td-pb-span4 .td-block-title-wrap .td-wrapper-pulldown-filter .td-pulldown-filter-display-option span { display: none; } .td-pb-span4 .td-block-title-wrap .td-wrapper-pulldown-filter .td-pulldown-filter-link { padding-left: 24px; padding-right: 20px !important; } } @-moz-document url-prefix() { .td-pulldown-syle-default .td-subcat-more, .td-pulldown-syle-default .td-subcat-list { position: relative; top: -1px; } } .td-pulldown-syle-2 { top: 0; } .td-pulldown-syle-2 .td-subcat-dropdown ul { padding: 20px 0; margin-top: 0; } .td-pulldown-syle-2 .td-subcat-dropdown ul:after { content: ''; position: absolute; width: calc(100% + 2px); height: 3px; top: 0; left: -1px; background-color: #4db2ec; } .td-pulldown-syle-2 .td-subcat-dropdown a { padding-left: 40px; padding-right: 31px; } .td-pulldown-syle-2 .td-subcat-dropdown:hover .td-subcat-more { background-color: transparent !important; } .td-pulldown-syle-2 .td-subcat-dropdown:hover .td-subcat-more span, .td-pulldown-syle-2 .td-subcat-dropdown:hover .td-subcat-more i { color: #4db2ec; } .td-pulldown-syle-2 .td-subcat-dropdown .td-subcat-more { margin-left: 9px; margin-bottom: 8px; // this align the dropdown list } .td-pulldown-syle-2 .td-subcat-list .td-subcat-item { margin-left: 24px; } .td-pulldown-syle-3 { top: 0; } .td-pulldown-syle-3 .td-subcat-dropdown ul { padding: 15px 0; margin-top: -1px; border-width: 1px; } .td-pulldown-syle-3 .td-subcat-dropdown a { padding-left: 40px; padding-right: 31px; } .td-pulldown-syle-3 .td-subcat-dropdown &:hover .td-subcat-more { background-color: transparent !important; } .td-pulldown-syle-3 .td-subcat-dropdown &:hover .td-subcat-more span, .td-pulldown-syle-3 .td-subcat-dropdown &:hover .td-subcat-more i { color: #4db2ec; } .td-pulldown-syle-3 .td-subcat-dropdown .td-subcat-more { margin-left: 9px; margin-bottom: 8px; // this align the dropdown list } .td-pulldown-syle-3 .td-subcat-list .td-subcat-item { margin-left: 24px; } .td_block_template_2 .td-block-title { font-size: 17px; font-weight: 500; margin-top: 0; margin-bottom: 16px; line-height: 31px; text-align: left; } .td_block_template_2 .td-block-title > * { color: #000; } .td_block_template_2 .td-related-title a { padding: 0 20px 0 0; } @media (max-width: 767px) { .td_block_template_2 .td-related-title a { font-size: 15px; } } .td_block_template_2 .td-related-title .td-cur-simple-item { color: #4db2ec; } .td-theme-wrap .tdi_93_cdd .td-block-title > *, .td-theme-wrap .tdi_93_cdd .td-pulldown-filter-link:hover, .td-theme-wrap .tdi_93_cdd .td-subcat-item a:hover, .td-theme-wrap .tdi_93_cdd .td-subcat-item .td-cur-simple-item, .td-theme-wrap .tdi_93_cdd .td-subcat-dropdown:hover .td-subcat-more span, .td-theme-wrap .tdi_93_cdd .td-subcat-dropdown:hover .td-subcat-more i { color: #ffffff; } .td-theme-wrap .tdi_93_cdd .td-subcat-dropdown ul:after { background-color: #ffffff; } .td-theme-wrap .tdi_93_cdd .td_module_wrap:hover .entry-title a, .td-theme-wrap .tdi_93_cdd .td_quote_on_blocks, .td-theme-wrap .tdi_93_cdd .td-opacity-cat .td-post-category:hover, .td-theme-wrap .tdi_93_cdd .td-opacity-read .td-read-more a:hover, .td-theme-wrap .tdi_93_cdd .td-opacity-author .td-post-author-name a:hover, .td-theme-wrap .tdi_93_cdd .td-instagram-user a { color: #ffffff; } .td-theme-wrap .tdi_93_cdd .td-next-prev-wrap a:hover, .td-theme-wrap .tdi_93_cdd .td-load-more-wrap a:hover { background-color: #ffffff; border-color: #ffffff; } .td-theme-wrap .tdi_93_cdd .td-read-more a, .td-theme-wrap .tdi_93_cdd .td-weather-information:before, .td-theme-wrap .tdi_93_cdd .td-weather-week:before, .td-theme-wrap .tdi_93_cdd .td-exchange-header:before, .td-theme-wrap .td-footer-wrapper .tdi_93_cdd .td-post-category, .td-theme-wrap .tdi_93_cdd .td-post-category:hover { background-color: #ffffff; }/* inline tdc_css att */.tdi_93_cdd{border-color:#3a3a3a !important;border-style:solid !important;border-width: 0px 0px 3px 0px !important;}]]> *:before,body .tdi_93_cdd.td_block_template_17 .td-block-title:after,body .tdi_93_cdd.td_block_template_13 .td-block-subtitle,body .tdi_93_cdd.td_block_template_9 .td-block-title:after{ right: 0; left: 0;}body .tdi_93_cdd.td_block_template_5 .td-block-title > *{ border-width: 0 0 0 4px;}body .tdi_93_cdd.td_block_template_8 .td-block-title > *{padding-left: 20px;padding-right: 20px;}]]>Our Brands

See original here:
What Is a Server and What Do Servers Do? - Server Watch

Read More..

What Exactly Are Amazon Web Services? – Movies Games and Tech

- Advertisement -

Amazon, which started out as a basic onlinebookshop in 1994, is now one of the biggest technology companies in the entire world. One of the most dominant fields that amazon operates in is cloud computing. Amazon Web Services are a group of cloud computing products that have a wide-reaching impact. Amazon Web Services have a whopping32% of the market share in cloud computing more than the shares of its two main competitors combines. So what exactly are Amazon Web Services, and why are they so successful?

A Wide Range of Compatible Applications

Amazon Web Services are not merely restricted to cloud storage. Instead, AWS is more of a complete cloud computing service. This means that applications of all sorts can be used without being stored on local servers by clients. This web-based application compatibility opens up the possibility for organizations to pick the exact applications they want without committing to long subscription or licensing plans.

A Space for Innovation

Amazon Web Services are useful for developers and innovators looking to push the boundaries of what can be achieved on the cloud. In the past, companies used to have huge computing budgets if they wanted to acquire hardware powerful enough to innovate with. With Amazon Web Services, innovators are only limited by their internet connection. Machine learning is one of the areas that has been catalyzed by practical and adaptive cloud computing. Developers and scientists can utilize lots of applications for the construction of machine learning code. Although the options are opening up for developers to explore these realms, some training is required in order to get the most out of AWS. Completing anAWS machine learning certification path with an experienced set of developers can be very useful if you want to start creating intelligent applications and code using AWS.

Doing Away With Local Servers

All computer networks rely, to some degree, on communications with a server or series of servers. Local servers owned and operated by the organization that uses them are an extremely large expense. They are costly, of limited size, and take a great deal of money to maintain correctly. Amazon Web Services and other cloud computing providers essentially negate the need for local servers. Every computing function that a company might need can be hosted remotely on cloud servers cutting out lots of expense.

Pay-As-You-Go

Amazon Web Services are charged for in a rather novel way. Instead of buying into a contracted plan, clients pay for services as they use them. This does require some careful budgeting to stay on top of and means that organizations can scale up and down their cloud budgets on the fly. It cuts down on wasted funds spent on unused applications and empty storage space. In theory, a company using AWS can only pay for the storage and software that they are using at the time. Other cloud computing companies are following on from Amazons lead and offering pay-as-you-go services.

Read the rest here:
What Exactly Are Amazon Web Services? - Movies Games and Tech

Read More..