Page 2,815«..1020..2,8142,8152,8162,817..2,8202,830..»

The evolution of cryptographic algorithms – Ericsson

Cryptographic algorithms and security protocols are among the main building blocks for constructing secure communication solutions in the cyber world. They correspond to the locks that secure a house in the physical world. In both, it is very difficult to access the assets inside without a valid key. The algorithms and protocols are based on hard mathematical and computationally infeasible problems, whereas the lock mechanisms are based on the difficulty of solving the physical construction.

Mobile networks are critical infrastructure and heavily use advances in cryptographic algorithms and protocols to ensure the security of the information in the communication and privacy protection for the individuals. In this blog post, we take a detailed look at the cryptographic algorithms and protocols used in mobile communications and share some insights into the recent progress. We give an overview taking into consideration the development from 2G to 5G and beyond. In addition, we present detailed information on the progress toward defining the profiles to be used in the security protocols for the mobile communication systems. Last but not least, we give the current status and future plans for post-quantum cryptographic algorithms and protocols.

It can be hard to get an overview of the cryptographic algorithms used in mobile networks. The specifications are spread out over many documents, published over a period of 30 years by the three standardization organizations: 3GPP, ETSI and GSMA. The algorithms can also have quite cryptic names, with more than one name often given to the same algorithm. For example, GEA5, UEA2, 128-EEA1 and 128-NEA1 are almost identical specifications of SNOW 3G for GPRS, UMTS, LTE and NR respectively.

The 3GPP/GSMA algorithms come in three different types: authentication and key generation, encryption and integrity. The authentication and key generation algorithms are used in the Authentication and Key Agreement (AKA) protocol. The encryption and integrity algorithms are used together or independently to protect control plane and user plane data. An overview of all currently specified algorithms is shown in Figures 1 and 2.

The second generation (2G or GSM) mobile networks have quite low security by todays standards. But GSM was actually the first mass-market communication system to use cryptography, which was both revolutionary and controversial. At the time, export of cryptography was heavily restricted and GSM had to be designed with this in mind. The encryption algorithms A5/1 and A5/2 are LFSR-based stream ciphers supporting 64-bit key length. A5/2 is a so-called export cipher designed to offer only 40-bit security level. Usage of export ciphers providing weak security was common at that time and other standards like TLS also supported export cipher suites.

To further align with export control regulations, the key generation algorithms COMP128-1 and COMP128-2 decreased the effective output key length to 54 bits by setting 10 bits the key to zero. While A5/1 and A5/2 mostly met their design criteria, COMP128-1 was a very weak algorithm and was soon replaced by COMP-128-2 and COMP128-3. When packet-switched data was introduced with GPRS, slightly different algorithms GEA1 and GEA2 were introduced. Similar to A5/1 and A5/2, GEA1 and GEA2 are LFSR-based stream ciphers supporting 64-bit key length, where GEA1 was the export cipher. The export ciphers A5/2 and GEA1 are forbidden to support in phones since many years and COMP128-1 is forbidden to support in both networks and SIM cards. None of the original 2G algorithms were officially published anywhere as they were intended to be kept secret, which was quite common practice at the time. But all were reverse engineered by researchers in academia nearly a decade after their development.

The third generation (3G or UMTS) mobile networks introduced 128-bit security level public encryption and integrity algorithms. In 3G, the algorithms were selected by the ETSI Security Algorithms Group of Experts (SAGE), which has since made recommendations for all the new algorithms for mobile networks. The final decision is always taken by 3GPP SA WG3, the security working group in 3GPP. While many other designs from the same time, such as SSH and TLS, turned out to have significant flaws, the 3G algorithms and their modes of operation are still secure today.

The 3G encryption algorithms UEA1 and UEA2 use the KASUMI block cipher and the SNOW 3G stream cipher, which are slightly modified versions of the MIST block cipher and SNOW 2.0 stream cipher respectively. The integrity algorithm UIA1 is CBC-MAC using KASUMI and UEA2 is a Carter-Wegman MAC based on SNOW 3G. For authentication and key generation, the exact algorithm is not standardized and it is up to the operator to choose the algorithm deployed in their home network and SIM cards. 3GPP defines the Milenage algorithm (based on AES-128) as a well-designed example algorithm and this choice is widely used in practice. All the 3G algorithms have also been specified to be used in 2G.

Figure 1: 3GPP/GSMA algorithms for authentication and key generation - Green algorithms are secure while red algorithms only offer 64-bit security or less.

Figure 2: 3GPP/GSMA algorithms for encryption and integrity protection - Green algorithms are secure while red algorithms only offer 64-bit security or less.

The fourth generation (4G or LTE) mobile networks replaced KASUMI with AES-128. The encryption algorithm 128-EEA2 is AES in counter mode (AES-CTR) while the integrity algorithm 128-EIA2 is AES in CMAC mode. 4G also introduced Tuak, a new algorithm family for authentication and key generation based on Keccak hash algorithm but using slightly different parameters from the one which NIST later standardized as SHA-3. SIM cards are recommended to support both Milenage and Tuak. 4G also introduced an optional algorithm, ZUC, to construct 128-EEA3 and 128-EIA3 algorithms, which are the only optional ones to be supported in implementations. It is also worth mentioning that 3GPP specifies at least two mandatory algorithms due to the security practice of having a backup algorithm.

The fifth generation (5G or NR) uses exactly the same algorithms used in 4G. There are no weaknesses in any of the 4G algorithms and they offer good enough performance when implemented in hardware. However, the currently used algorithms are not suitable for future deployments as they are slow in software, does not support 256-bit keys, and only support 32-bit MACs. Software performance is essential for software implementations in virtualized deployments. While these algorithms are fast enough for 5G when implemented in hardware, they perform far worse than state-of-the art algorithms also in hardware and will likely not be suitable for 6G.

3GPP SA3 and ETSI SAGE have therefore started working together on new virtualization-friendly algorithms suitable for later 5G releases and 6G. It is essential that the new algorithms perform well in software on a wide range of architectures (such as x86, ARM and RISC-V) and that they can also be efficiently implemented in hardware. AES-CTR is already fulfilling these criteria, but would have to be accompanied by a high-performance integrity mode like GMAC. SNOW 3G is not up to the task, but the new cipher SNOW-V would be a perfect fit, outperforming even AES-GCM on x86 processors.

The new algorithms to be introduced to 3GPP will likely support only 256-bit key length and offer at least 64-bit tags. While 128-bit algorithms will be practically secure against quantum computers, cellular networks are increasingly classified as critical infrastructure. Already today, governments and financial institutions often mandate more than 128-bit security level for protection of their communication.

While mobile networks use some algorithms and security protocols specific to 3GPP, most of the security protocols used in 5G such as TLS, DTLS, IKEv2, ESP, SRTP, X.509, and JOSE are standardized or maintained by the Internet Engineering Task Force (IETF). 3GPP has, for many years, had the excellent tradition of updating their security profiles in almost every release following recommendations from academia, IETF and other organizations. A large part of this work has been driven by Ericsson.

The general 3GPP profiles for (D)TLS, IPsec and X.509 specified in TS 33.210 and TS 33.310 apply to many different 3GPP interfaces. 3GPP now has some of the best and most secure profiles for TLS and IPsec. 3GPP was, for example, very early with mandating support for TLS 1.3 and with forbidding TLS 1.1 and all weak cipher suites in TLS 1.2. Best practice today is to encrypt as much information as possible and to do key exchange with Diffie-Hellman to enable Perfect Forward Secrecy (PFS). The profiles are well ahead of most other industries as well as IETFs own profiles. 5G is increasingly referred to as critical infrastructure and as such the security profiling should be state-of-art.

For Rel-16 and Rel-17, 3GPP initiated work items specific to security updates, but similar work has been done for much longer under the general TEI work item. For Rel-17, 3GPP aims to mandate support for SHA-256 in the few remaining places where MD5 or SHA-1 is still in use, introduce Curve25519 for low latency key exchange in IKEv2, enable use of OCSP and OCSP stapling as an alternative to CRL everywhere, mandate support of DTLS-STRP and AES-GCM for SRTP, and introduce deterministic ECDSA.

Updating profiles for cryptographic algorithms and security protocols is a process that takes many years because of backward compatibility, as nodes from one release often have to talk to devices from much older releases. Before any weak algorithms or protocol versions are forbidden, the support of strong alternatives needs to have been mandatory for several releases.

Taking into consideration that 3GPP produces approximately one release every 1.5 years, it is essential to mandate the support of new versions of security protocols as soon as possible like 3GPP did with TLS 1.3. Some drawbacks of TLS 1.2 are that it requires a large amount of configuration to become secure and does not provide identity protection, therefore it should be phased out in the future.

Current best practice is to mandate the support of at least two strong algorithms everywhere, so there is always a strong algorithm supported if one of the algorithms is broken. The National Institute of Standards and Technology (NIST) has long functioned as a global standardization organization for cryptographic algorithms. NIST standardizes algorithms in open competitions, inviting contributions from academia all over the world. Both AES and SHA-3 were designed by researchers from Europe. Recently, the Internet Research Task Force Crypto Forum Research Group (IRTF CFRG) has complemented NIST as a global cryptographic Standards Developing Organization (or SDO) and has standardized algorithms like ChaCha20-Poly1305, Curve25519, EdDSA, LMS, and XMSS. NIST has introduced many of the CFRG algorithms within their own standards.

Broken algorithms were once very common, but essentially all algorithms standardized by NIST, IRTF CFRG and ETSI SAGE since 2000 (such as AES, SHA-2, SHA-3, ChaCha20, KASUMI and SNOW 3G) have remained secure, with no practical attacks. Figure 3 gives an overview of broken, weak or legacy algorithms and security protocols. 3GPP has already forbidden most of these and will likely phase out the rest in future releases.

Figure 3: Broken and legacy cryptographic algorithms and security protocols

A big part of future work in upcoming releases will be to introduce quantum-safe algorithms or Post-Quantum Cryptography (PQC). PQC algorithms are cryptographical algorithms that are secure against attacks from quantum computers, which happens to be most algorithms except RSA and Elliptic-Curve Cryptography (ECC). This is something 3GPP is well prepared for, having already future-proofed protocols like 5G Subscription Concealed Identifier (SUCI) by allowing ciphertexts and public keys to be several thousands of bytes long. If somebody builds a sufficiently large quantum computer, RSA and ECC will likely be broken in a matter of hours.

Small quantum computers already exist, however it is still uncertain when (or if) quantum computers capable of breaking these cryptographic algorithms will be built. 3GPP will likely introduce quantum-safe algorithms long before quantum computers even get close to affecting the security of 3GPP systems. Introducing non-standardized cryptographic algorithms likely introduces more risks than it solves, and both 3GPP and IETF have taken the decision to wait for NIST standardization of PQC algorithms, which is already in the final round and will be ready in 2022-2024. After that, IETF will standardize the use of PQC algorithms in (D)TLS, IKEv2, X.509, JOSE and HPKE and as soon as this is done, 3GPP will introduce the new updated IETF RFCs.

Some of the candidates for post-quantum security level 1 in the final round of NIST PQC standardization are summarized in Figure 4. It seems very likely that one of the lattice-based algorithms will be the main replacement for RSA and ECC, for both Key Encapsulation Mechanisms (KEM) and signatures. KEM provides a simplified interface for key exchange and public key encryption. Lattice-based algorithms have slightly larger public keys, signature and ciphertext sizes than the ones of RSA, but they are even faster than ECC. As can be seen from Figure 4, PQC is very practically useful for most applications. Transition to PQC can be seen as a bigger step than the transitions from 3DES to AES and SHA-1 to SHA-256, as it might require security protocol changes to a larger degree. Note that PQC algorithms are not relying on quantum mechanics and software implementation does not require any new hardware.

Figure 4: Some candidates (post-quantum security level 1) in the third and final round of NIST PQC Standardization. The performance measurements are single-core on Skylake 2.5 GHz https://bench.cr.yp.to/ebats.html (lower is better)

128-bit symmetric algorithms will not be practically affected by quantum computers and NIST is currently labeling AES-128 as post-quantum security level 1. Even so, 3GPP is moving towards increased use of 256-bit keys and algorithms such as AES-256.

More information about the algorithms used in mobile networks can be found in the specification series prepared by the 3GPP SA3 working group. For the main profiles used in the security protocols, check 3GPP TS 33.210 and TS 33.310.

To learn and keep up to date on the latest progress in post-quantum cryptography, follow NIST PQC Standardization.

Learn more about the realities of post-quantum cryptography in our previous blog post from 2020.

Discover how 5G fits into mobile communication network security in our guide to 5G network security

Read our summary of the latest standardization work from 3GPP, Release 16 (5G phase 2)

See the original post:
The evolution of cryptographic algorithms - Ericsson

Read More..

EU rewrites rulebook on science and technology cooperation with the rest of the world – Science Business

After years of fighting against a Europe first approach in research funding, policy makers and lobbyists in Brussels now want to explicitly limit access for scientists in countries that flout academic freedom and intellectual property rights.

The Commission says in future it will base its rules for international scientific cooperation on the principle of open strategic autonomy. In particular, it is drawing up a roadmap on science and technology with China, in which it is seeking to impose stricter terms on cooperation, to ensure EU research organisations and companies can access the Chinese market safely, without needing to worry about potential IP breaches.

We are not in the autonomy trap, we are keeping our eyes open, Jean-Eric Paquet, director general for research and innovation told the EUs Research & Innovation Days conference last week.

Paquet said both he and EU research commissioner Mariya Gabriel want intense cooperation with China, whose scientific prowess is spectacular in many respects. But before opening its arms, the Commission is planning to scrutinise Chinas practices in intellectual property and academic freedom. We need indeed to do it on a proper basis, and that is the challenge ahead of us in the coming weeks and months, said Paquet.

Researchers remain largely in favour of international R&D cooperation, but they do want limitations to be applied to countries that could use open access to EU programmes to spy on sensitive technologies for economic and military gains.

We are fully in favour of international cooperation, and we say no to a blind EU first approach, said Kurt Deketelaere, secretary general of the League of European Research Universities. But he said, the EU should protect itself from unfair and abusive practices by China.

Universities want help in steering a path through the new requirements and say the Commission should list the technologies it wants to protect, and specify the criteria for international cooperation universities should apply when weighing up collaboration projects with the rest of the world.

Heads of Canadian, American and UK universities are spending time with people from the national security services to track potential security threats via science collaboration, according to Deketelaere.

It would be very useful if the Commission took the initiative to open up channels for similar discussions between the EUs 27 national security services, said Deketelaere. We have to take this seriously, he said.

Germany has unilaterally put in place measures to make scientists and universities aware of the challenges posed by international cooperation, said Susanne Burger, head European and international cooperation at Germanys federal ministry for education and research. When dealing with one of the systemic rivals [universities] can approach us, she said.

Our aim is not to control the freedom of science, or to interfere in any case, said Burger. What we do is to just help [universities] discover the traps in international cooperation.

As a sign of a tougher stance, last week German authorities arrested a scientist who had been passing sensitive information from a German university to Russian intelligence services.

Research spies

German MEP Reinhard Btikofer said China has been exploiting its relationship with the EU. I think it's not a trust-building measure if they send scientists and don't say that these scientists are working on behalf of the Chinese armed forces, and that they are here to spy on our technology in order to enhance China's civil military fusion programme, and to help them in building an even stronger military at the service of their aggressive foreign policy, he said.

Btikofer was recently banned from entering China. In March, the EU announced sanctions against officials of the Chinese Communist Party who are thought to be involved in human rights abuses in the Xinjiang province. In retaliation, Beijing imposed sanctions on seven EU politicians, Btikofer included.

As a long-time critic of the Chinese government, Btikofer is calling for the EU to ensure science cooperation is based on commonly agreed principles and rules. You cannot build the relationship with a systemic rival on the basis of blind trust, he said.

Autonomy trap

It is ironic to think how as recently as 2018, EU research lobbies and policy makers in Brussels were quick to dismiss a proposal by Romanian MEP Dan Nica to make the Horizon Europe programme exclusive for EU researchers.

The Commissions pivot to open strategic autonomy is a significant departure from the position of the previous EU research commissioner Carlos Moedas, a leading proponent of science diplomacy. As the 2021 - 2027 Horizon Europe programme was taking shape, Moedas frequently called for EU research and innovation to be, open to the world.

Despite believing there should be some restraints, Deketelaere warned the EU should take care not isolate itself from the international scientific community. Organisations that feel weak, or are becoming weaker, very often tend to ask for more autonomy, he said. And with asking for more autonomy, they often isolate themselves more than they already were, and then they become even weaker as a consequence. And at the end of the day, of course, they collapse, said Deketelaere.

As one example of how these things can be finessed, the Commission and member states recently came to an agreement on third country access to sensitive research projects in quantum science and space that are funded through Horizon Europe.

The terms on which they take part will be negotiated separately with each associated country, the Commission agreed, after caving in to pressure from member states. Before that, the Commission planned to introduce a blanket ban on non-EU researchers and companies in all quantum and space projects.

Quantum is the future of computation, is the future communication, is really the next breakthrough in terms of technology, said Roberto Viola, the Commissions director general for communications technology. I think there's no doubt that we want a quantum computer available for our scientists and for our companies.

The EU is trying to boost its industrial competitiveness in key emerging technologies and make sure it has the capabilities needed to immunise itself against shortages of microelectronics and medical devices.

A global shortage of microchips, paired with significant delays in international shipping, has forced EU manufacturers of cars and medical devices to reduce or suspend production. This is really impairing the capability of Europe to produce, said Viola.

Viola said it is in Europes interest to build open strategic autonomy so that such situations can be avoided in the future. Theres not one way to deliver autonomy. It's a combination of being stronger technologically speaking in Europe, and also being smarter when it comes to partnerships, he said.

Europe should be able to build its own technologies and pay more attention at the rules of engagement with the rest of the world. We want those technologies to be used for peaceful use and no country, no company outside Europe should use these technologies against us, said Viola.

The EU recently announced it will establish closer research ties with the US and Canada, two countries which have already put in place new rules of engagement with China, for fear of technology and science espionage.

It is, I think, an obvious fact that we have to make a distinction, whether we are dealing with likeminded partners, or whether partners do not necessarily share our values on the principles of transparency, or reciprocity, or other core concerns, said Btikofer.

View post:
EU rewrites rulebook on science and technology cooperation with the rest of the world - Science Business

Read More..

The war on Jordan Peterson – Washington Times

ANALYSIS/OPINION:

Leftist hatred for the Canadian psychology professor Jordan Peterson is really something to behold. He stands as an example of what happens to someone who strays from the crazy line of thinking by modern campus bigots.

Mr. Peterson is the canary in the toxic coal mine of political correctness and petty thought police.

Lets start with the professors crime.

Simply put, Mr. Peterson does not share the monolithic, prevailing liberal orthodoxy on university campuses dictating that Western White males are the worlds evil oppressors and anyone who does not belong to that evil race is a victim trapped in circumstances beyond his or her control.

Consider for a moment the leftist premise to which the radical Mr. Peterson objects.

On its face, it is blatantly racist. Divvying up, defining and punishing groups of people based on their race (or gender) was racist 200 years ago during slavery times. It was racist 75 years ago. It is still racist today.

Yet, astonishingly, this reborn racism is widely embraced by the racists who dominate college campuses today.

The second obvious flaw in this racist orthodoxy is the message it sends to non-White, non-males.

Any challenges, failures or misery you face in life are not your fault. And, even worse, there is nothing you can do to change your circumstances. So, just stew in your bitterness and hatred for White males along with the rest of us, goes the leftist campus orthodoxy of the day.

Is there any more destructive and devious lie that could be sold to young people? Is there anything more dystopian or hopeless?

Mr. Peterson has become something of a rock star among beleaguered youth suffocating in the coal mine of modern academia with speeches, lectures, podcasts and a book titled, The Twelve Rules of Life: An Antidote to Chaos. His message has been particularly devoured among young men many of them White who have been vilified and emasculated by crazy university teachings.

Find meaning in life. Take responsibility for yourself. Surround yourself with good people who want the best for you.

Pretty nasty stuff, huh?

The chapter titles of his book include radical instructions such as: Stand up straight with your shoulders back, Tell the truth or, at least, dont lie, and Pet a cat when you encounter one on the street.

These lessons have earned Mr. Peterson a level of blinding hatred that is normally reserved for former President Donald Trump.

So it has been with considerable glee that the leftist media the Revolutionary Guard of modern academia hunted down Mr. Peterson as he suffered from a pestilence of personal maladies that no decent human would wish on his worst enemy.

Over the past year, Mr. Peterson has suffered physical illness and serious mental disease including suicidal thoughts. His wife was diagnosed with cancer. As his life spiraled out of control, Mr. Peterson developed a near-fatal drug addiction.

Actual humans read those lines and are struck with pangs of angst and sorrow for Mr. Peterson and his family. They mutter a prayer for them.

But not the campus bigots and the jackals in the media. Every bleak detail is catnip to them. Their desperate war to destroy all who disagree never sleeps.

When the story of Mr. Petersons troubles emerged about a year ago, a creature named Amir Attaran, a professor of both law and medicine, began his public hot take on Mr. Petersons travails: #KARMA.

Jordan Peterson, oracle to gullible young men, preacher of macho toughness, and hectoring bully to snowflakes, is addicted to strong drugs and his brain is riddled with neurological damage. He deserves as much sympathy as he showed others.

Says the law professor.

A new interview with the Sunday Times of London about his tribulations sparked yet another avalanche of glee and gloating over the unimaginable pain Mr. Peterson has been through.

Introducing her interview, reporter Decca Aitkenhead opines openly referring to herself no fewer than three times in the lead paragraph that she is unable to diagnose the root of Mr. Petersons problems.

I dont know if this is a story about drug dependency, or doctors, or Peterson family dynamics or a parable about toxic masculinity, she sneers.

If these are the purveyors of social justice, we are truly doomed.

Charles Hurt is opinion editor of The Washington Times. He can be reached at churt@washingtontimes.com.

Read more:
The war on Jordan Peterson - Washington Times

Read More..

Review: Beyond Order, by Jordan B. Peterson – The Atlantic

This article was published online on March 2, 2021.

One day in early 2020, Jordan B. Peterson rose from the dead. The Canadian academic, then 57, had been placed in a nine-day coma by doctors in a Russian clinic, after becoming addicted to benzodiazepines, a class of drug that includes Xanax and Valium. The coma kept him unconscious as his body went through the terrible effects of withdrawal; he awoke strapped to the bed, having tried to rip out the catheters in his arms and leave the intensive-care unit.

When the story of his detox became public, in February 2020, it provided an answer to a mystery: Whatever happened to Jordan Peterson? In the three years before he disappeared from view in the summer of 2019, this formerly obscure psychology professors name had been a constant presence in op-ed columns, internet forums, and culture-war arguments. His book 12 Rules for Life: An Antidote to Chaos, published in 2018, sold millions of copies, and he had conducted a 160-city speaking tour, drawing crowds of up to 3,000 a night; premium tickets included the chance to be photographed with him. For $90, his website offered an online course to better understand your unique personality. An official merchandise store sold Peterson paraphernalia: mugs, stickers, posters, phone cases, tote bags. He had created an entirely new model of the public intellectual, halfway between Marcus Aurelius and Martha Stewart.

The price of these rewards was living in a maelstrom of other peoples opinions. Peterson was, depending on whom you believed, either a stern but kindly shepherd to a generation of lost young men, or a reactionary loudmouth whose ideas fueled the alt-right and a backlash to feminism. He was revered as a guru, condemned as a dangerous charlatan, adored and reviled by millions. Peterson has now returned to the public sphere, and the psyche-splitting ordeal of modern celebrity, with a new book, Beyond Order: 12 More Rules for Lifean intriguing title, in light of his recent experiences. The mystery deepens: What really happened to Jordan Peterson, and why has he come back for more?

Growing up in Fairview, Alberta, Peterson was small for his age, which fostered both a quick wit and a fascination with the power and violence of traditional masculinity. He once recounted in a Facebook post how hed overheard a neighbor named Tammy Roberts joking with another girl that she wanted to keep her surname, so she would have to marry some wimp. Then she turned around and proposed to the teenage Jordan. He spent a youthful summer working on a railroad in Saskatchewan, with an all-male group that nicknamed him Howdy Doody, after the freckle-faced puppet. As a student, he visited a maximum-security prison, where he was particularly struck by a convict with a vicious scar right down his chest, which he surmised might have come from surgery or an ax wound: The injury would have killed a lesser man, anywaysomeone like me.

How to be a greater man was very much on Petersons mind. Raised in a mildly Christian household, he decided as a teenager that religion was for the ignorant, weak and superstitious. He yearned for a left-wing revolution, an urge that lasted until he met some left-wing activists in college. Then, rejecting all ideology, he decided that the threat of the Cold War made it vital to understand the human impulse toward destruction. He began to study psychology.

Alongside pursuing his doctorate, teaching at Harvard and then the University of Toronto, and raising a familyhe married Tammy in 1989, and yes, she took his surnamePeterson started work on his first book, a survey of the origins of belief. Its ambition was nothing less than to explain, well, everythingin essence, how the story of humanity has been shaped by humanitys love of stories. Maps of Meaning, published in 1999, built on the work of academics like Joseph Campbell, the literature and religion scholar who argued that all mythic narratives are variations of a single archetypal quest. (Campbells monomyth inspired the arc of Star Wars.) On this heros journey, a young man sets out from his humdrum life, confronts monsters, resists temptation, stares into the abyss, and claims a great victory. Returning home with what Campbell calls the power to bestow boons on his fellow men, the hero can also claim the freedom to live at peace with himself.

In the fall of 2016, Peterson seized the chance to embark on his own quest. A Canadian Parliament bill called C-16 proposed adding gender identity or expression to the list of protected characteristics in the countrys Human Rights Act, alongside sex, race, religion, and so on. For Peterson, the bill was proof that the cultural left had captured public-policy making and was imposing its fashionable diktats by law. In a YouTube video titled Professor Against Political Correctness, he claimed that he could be brought before a government tribunal if he refused to use recently coined pronouns such as zhe. In the first of several appearances on Joe Rogans blockbuster podcast, he made clear that he was prepared to become a martyr for his principles, if necessary. His intensity won over Rogana former mixed-martial-arts commentator with a huge young male fan base and eclectic political views (a frequent critic of the left, he endorsed Bernie Sanders in 2020). You are one of the very few academics, Rogan told Peterson, who have fought against some of these ideas that are not just being promoted but are being enforced.

The fight over C-16, which became law in 2017, was a paradigmatic culture-war battle. Each side overstated the other sides argument to bolster its own: Either you hated transgender people, or you hated free speech. In Petersons view, the bill exposed the larger agenda of postmodernism, which he portrayed as an ideology that, in denying the existence of objective truth, leaves its practitioners without an ethic. (This is not how theorists of postmodernism define it, and if you have a few hours to spare, do ask one of them to explain.) He was on the side of science and rationality, he proclaimed, and against identity politics. Feminists were wrong to argue that traditional gender roles were limiting and outdated, because centuries of evolution had turned men into strong, able providers and women into warm, emotionally sensitive nurturers. The people who hold that our culture is an oppressive patriarchy, they dont want to admit that the current hierarchy might be predicated on competence is how he later phrased it. (This was during Donald Trumps presidency.) The founding stories of the worlds great religions backed him up, as did the heros journey: It is men who fight monsters, while women are temptresses or helpmates.

The mainstream media began to pay attention. Peterson had posted some advice on the Q&A site Quora, which he turned into his second book, 12 Rules for Life, a mashup of folksy wisdom, evolutionary biology, and digressions on the evils of Soviet Communism. (His daughter, Mikhaila, is named after Mikhail Gorbachev.) It stresses the conservative principles of self-reliance and responsibility, encouraging readers to tidy their bedrooms and smarten themselves up to compete for female attentiona message reinforced by a questionable analogy involving lobsters, which fight by squirting urine from their faces to establish their place in the mating hierarchy. Parents, universities and the elders of society have utterly failed to give many young men realistic and demanding practical wisdom on how to live, David Brooks wrote in a New York Times column. Peterson has filled the gap. He offered self-help for a demographic that wouldnt dream of reading Goop.

Yet the relentless demands of modern celebritymore content, more access, more authenticitywere already tearing the psychologists public persona in two. One Peterson was the father figure beloved by the normie readers of 12 Rules, who stood in long lines to hear him speak and left touching messages on internet forums, testifying that he had turned their lives around. The other Peterson was a fearsome debater, the gladiator who crowed Gotcha! at the British television interviewer Cathy Newman after a series of testy exchanges about the gender pay gap and the freedom to give offense. His debates were clipped and remixed, then posted on YouTube with titles announcing that he had DESTROYED his interlocutors.

I know this because one of them was me: Our interview for British GQ, which has garnered more than 23 million views, is easily the most viral moment Ive ever had. While dozens of acquaintances emailed and texted me to praise my performance and compare Petersons stern affect to Hannibal Lecter with a Ph.D., mean comments piled up like a snowdrift below the video itself. I was biased and utterly intellectually bankrupt, dishonest and malicious, and like a petulant child who walked into an adult conversation. What kind of man, several wondered, would marry a dumb, whiny, shrill feminist like this? (Quite a nice one, thanks for asking.)

Peterson lived in this split-screen reality all the time. Even as he basked in adoration, a thousand internet piranhas ripped through his every utterance, looking for evidence against him. One week, Bari Weiss anointed him a leading culture warrior, including him in a New York Times feature as a member of the Intellectual Dark Web. Ten days later, the newspaper published a mocking profile of him, reporting that his house was decorated with Soviet propaganda and quoting him speculating about the benefits of enforced monogamy in controlling young mens animal instincts. After he was accused of pining after Margaret Atwoods Gilead, he quickly posted a note on his website arguing that he meant only the social enforcement of monogamy.

The negative publicity affected him deeply, and it was endless. After the Indian essayist Pankaj Mishra charged him with peddling fascist mysticism, Peterson tweeted that Mishra was an arrogant, racist son of a bitch and a sanctimonious prick. He added: If you were in my room at the moment, Id slap you happily. Even sleep brought no relief. Peterson is a believer in dream analysis, and after one particularly ill-tempered interview in October 2018, he blogged about a nightmare that followed. In his dream, he met a man who simply would not shut up. The man reminded him, he wrote, of an acquaintance at university in Canada he calls Sam, who drove around in a Mercedes with swastikas on the doors, saying the worst things he could, unable to resist inviting attacks. I cant help myself, Sam had told Peterson. I have a target drawn on my back. Eventually, at a party, Sam overstepped the line; he was about to be assaulted by a mob until another acquaintance felled him with a single punch. Peterson never saw Sam again. In his dream, the Sam-like man talked and talked and finally pushed me beyond my limit of tolerance I bent his wrists to force his knuckles into his mouth. His arms bent like rubber and, even though I managed the task, he did not stop babbling. I woke up.

It is hard to resist reading the subtext like this: Peterson had spent months being casually described as a Nazi and associated with the alt-right, labels he always rejected. He had metaphorical swastikas on his car door. He couldnt resist putting a target on his own back, and he, too, couldnt stop talking. Indeed, in May 2019, after railing against left-wing censoriousnessnow widely called cancel culturehe met with Viktor Orbn, the proudly illiberal prime minister of Hungary, whose government has closed gender-studies programs, waged a campaign to evict Central European University from the country, and harassed independent journalists. Orbns state-backed version of cancel cultureor, to use the correct word, authoritarianismapparently didnt come up in their meeting. Peterson had previously told an interviewer to describe politicians like Orbn not as strongmen, but as dictator wannabes. Nonetheless, the visitand the posed photograph of the men in conversation, released to friendly media outletsgave intellectual cover to Orbns repressive government.

All that time, the two Petersons were pulling away from each other. As the arguments over his message raged across YouTube, Twitter, Facebook, and traditional media, he became an avatar of our polarized media climate. People were consuming completely different Petersons, depending on their news sources. When I saw him on his speaking tour at a theater on Long Island, the first question he was asked was not about pronouns or the decline of Western civilization; it was When was the last time you got drunk? The second was a heartfelt plea that will be familiar to any new parent: How can I get my baby to sleep?

The past two years have clearly been hell for Peterson. In a June 2020 video interview with his daughter, he looked gaunt and restless as he described his struggle with drug dependency, a torment that he revisits in the Overture to Beyond Order, his new book. As he describes it, an allergic reaction during the 2016 Christmas holiday manifested as intense anxiety, leading his family doctor to prescribe benzodiazepines. He also started following what Mikhaila calls the lion diet, consuming only meat, salt, and water. In 2019, the tumultuous reality of [being] a public figure was exacerbated by a series of family health crises culminating in his wifes diagnosis, in April, of what was thought to be terminal cancer. (She has since recovered.) Petersonwho notes that he had been plagued for years by a tendency toward depressionhad his tranquilizer dosage upped, only to experience rising anxiety, followed by the ravages of attempted withdrawal. He was at the edge of the abyssanxiety far beyond what I had ever experienced, an uncontrollable restlessness and need to move overwhelming thoughts of self-destruction, and the complete absence of any happiness whatsoever.

Throughout this turbulent time, Peterson was working on Beyond Order. He makes no claims that his suffering provided a teachable moment (particularly, he notes, when a pandemic has upended lives everywhere). He also declines the opportunity to place his addiction in the context of the prescription-drug-abuse crisis. Peterson seems to have softened his disdain for religion, and as for Tammy, passing so near to death motivated my wife to attend to some issues regarding her own spiritual and creative development. Notably, Peterson is not ready to give up on the heros journey, despite the terror he has endured. All of that misfortune is only the bitter half of the tale of existence, he writes, without taking note of the heroic element of redemption or the nobility of the human spirit requiring a certain responsibility to shoulder.

This book is humbler than its predecessor, and more balanced between liberalism and conservatismbut it offers a similar blend of the highbrow and the banal. Readers get a few glimpses of the fiery online polemicist, but the Peterson of Beyond Order tends instead to two other modes. The first is a grounded clinician, describing his clients troubles and the tough-love counsel he gives them. The other is a stoned college freshman telling you that the Golden Snitch is, like, a metaphor for round chaos the initial container of the primordial element. Some sentences beg to be prefaced with Dude, like these: If Queen Elizabeth II suddenly turned into a giant fire-breathing lizard in the midst of one of her endless galas, a certain amount of consternation would be both appropriate and expected But if it happens within the context of a story, then we accept it. Reading Peterson the clinician can be illuminating; reading his mystic twin is like slogging through wet sand. His fans love the former; his critics mock the latter.

The prose swirls like mist, and his great insight appears to be little more than the unthreatening observation that life is complicated. (If the first book hadnt been written like this too, youd guess that he was trying to escape the butterfly pins of his harshest detractors.) After nearly 400 pages, we learn that married people should have sex at least once a week, that heat and pressure turn coal into diamonds, that having a social life is good for your mental health, and that, for a man in his 50s, Peterson knows a surprising amount about Quidditch. The chapter inviting readers to make one room in your home as beautiful as possible is typically discursive, but unusually enjoyable: Peterson knows his Wordsworth. (It is not free from weirdness, however. At one point, he claims to have looked at 1.2 million paintings on eBay while selecting his living-room decor.) His prose also lights up when he describes the wonder of watching his granddaughter encounter the world.

On the rare occasion that Beyond Order strays overtly into politics, Peterson still cant resist fighting straw men. What Peterson sees as healthy ambition needs to be encouraged in every possible manner, he writes.

But who is reflexively identifying all male ambition as innately harmful? If any mainstream feminist writers are in fact arguing that the West is a patriarchal tyrannyas opposed to simply a patriarchy or male-dominated societyhe should do the reader the favor of citing them. Is he arguing with Gloria Steinem or princess_sparklehorse99 on Tumblr? A tenured professor should embrace academic rigor.

Peterson writes an entire chapter against ideologiesfeminism, anti-capitalism, environmentalism, basically anything ending in ismdeclaring that life is too complex to be described by such intellectual frameworks. Funny story: Theres an academic movement devoted to skepticism of grand historical narratives. Its called postmodernism. That chapter concludes by advising readers to put their own lives in order before trying to change the world. This is not only a rehash of one of the previous 12 rulesClean up your bedroom, he writes, because fans love it when you play the hitsbut also ferocious chutzpah coming from a man who was on a lecture tour well after he should have gone to rehab.

The Peterson of Beyond Order, that preacher of personal responsibility, dances around the question of whether his own behavior might have contributed to his breakdown. Was it really wise to agree to all those brutal interviews, drag himself to all those international speaking events, send all those tweets that set the internet on fire? Like a rock star spiraling into burnout, he was consumed by the pyramid scheme of fame, parceling himself out, faster and faster, to everyone who wanted a piece. Perhaps he didnt want to let people down, and he loved to feel needed. Perhaps he enjoyed having an online army glorying in his triumphs and pursuing his enemies. In our frenzied media culture, can a hero ever return home victorious and resume his normal life, or does the lure of another adventure, another dragon to slay, another lib to own always call out to him?

Either way, he gazed into the culture-war abyss, and the abyss stared right back at him. He is every one of us who couldnt resist that pointless Facebook argument, who felt the sugar rush of the self-righteous Twitter dunk, who exulted in the defeat of an opposing political tribe, or even an adjacent portion of our own. That kind of unhealthy behavior, furiously lashing out while knowing that counterattacks will follow, is a very modern form of self-harm. And yet in Beyond Order, the blame is placed solely on the hypothetically safe but truly dangerous benzodiazepine anti-anxiety medication he was prescribed by his family doctor. The book leaves you wishing that Peterson the tough therapist would ask hard questions of Peterson the public intellectual.

To imagine that Peterson is popular in spite of his contradictions and human frailtiesthe things that drive his critics madis a mistake: He is popular because of them. For a generation that has lost its faith in religion and politics, he is one of notably few prominent figures willing to confront the most fundamental questions of existence: Whats the point of being alive? What kind of personal journey endows our existence with meaning? He is, in many ways, countercultural. He doesnt offer get-rich-quick schemes, or pickup techniques. He is not libertine or libertarian. He promises that life is a struggle, but that it is ultimately worthwhile.

Yet Petersons elevation to guru status has come at great personal cost, a cascade of suffering you wouldnt wish on anybody. It has made him rich and famous, but not happy. We compete for attention, personally, socially, and economically, he writes in Beyond Order. No currency has a value that exceeds it. But attention is a perilous drug: The more we receive, the more we desire. It is the culture wars greatest reward, yet it started Jordan Peterson on a journey that turned a respected but unknown professor into the man strapped into the Russian hospital bed, ripping the tubes from his arms, desperate for another fix.

See the original post:
Review: Beyond Order, by Jordan B. Peterson - The Atlantic

Read More..

Winston Marshall says Mumford & Sons were targeted by internet mobs amid tweet controversy – NME

Winston Marshall has claimed that Mumford & Sons were targeted by internet mobs amid the Twitter storm that led to his departure from the band.

The banjoistfaced backlash back in Marchafter tweeting praise for a book by US journalist Andy Ngo, titledUnmasked: Inside Antifas Radical Plan To Destroy Democracy. He said the release was important, hailing Ngo as a brave man in a since-deleted post.

Marshall subsequently confirmed that he would be taking a break from the group, and announced in a statement last week (June 24) that hed stepped down from his role for good.

I know now that, as long as I am a member of the band, speaking my mind on the evils of political extremism could bring them trouble, he said. My loyalty and love for them cannot permit that.

Speaking on BBC Radio 4s Today showearlier today (June 29), Marshall said that his former bandmates had been subjected to internet mobs while he received a lot of very horrible negativity over his endorsement of Ngo.

What was sort of unpleasant about it is that they went for my bandmates, they went for my friends, and thats not fair on them because its got nothing to do with them, he explained.

Winston Marshall performing live with Mumford & Sons; Andy Ngo at a far-right protest in Portland, 2019. CREDIT: Getty

But in the public eye we were a unit and thats, I suppose, what these internet mobs do. They go for all those people around you and thats, I think, what was so troubling for me about the experience, was to see my friends getting dragged under the bus with me, which is not fair on them.

Marshall said most of the criticism he received online was nonsense and lies, adding that Mumford & Sons were so sweet and stood by me and invited me to continue.

Theyve been perfectly honourable throughout and Im very grateful for that, he continued. I still, sort of, obviously regret that this situation even came about and, with hindsight, it was a foolish tweet to have made.

Elsewhere in his initial departing statement, Marshall looked back on the highlights of the time he spent with the band. From odysseys through the Scottish Islands to headlining Glastonbury, from The Betsy Trotwood to Madison Square Garden. Weve done it all, he said.

What a blessing it was to be so close to such talent as those three lads. I will look back at it all with immense pride and love. However, after much reflection and consideration, I have decided it is time to move on.

Commenting on Marshalls departure in an Instagram post, the group said they wished him all the best.

Back in 2018,Mumford & Sons also respondedafter they faced criticism over a photothat saw several members posing with controversial academic Jordan Peterson.

See more here:
Winston Marshall says Mumford & Sons were targeted by internet mobs amid tweet controversy - NME

Read More..

‘Preserve the thread of tradition, my son’ MercatorNet – MercatorNet

The Unbroken Thread: Discovering the Wisdomof Tradition in an Age of Chaosby Sohrab Ahmari, Hodder & Stoughton, 2021, 294 pages

Sohrab Ahmaris new book, The Unbroken Thread, follows his acclaimed spiritual memoir, From Fire by Water, in which the Iranian-American journalist had charted the story of his conversion to Catholicism.

This book is less personal and more ambitious, laying out an argument that we need to rediscover the traditions which have been swept away by the enhanced focus on individual autonomy and social liberation which has become so prevalent in recent times.

In diagnosing what he feels is our civilisations main malady, Ahmari, opinion editor of the New York Post, speaks from experience.

As readers of his previous work will know, Ahmari did not convert to Christianity from Islam. Having been raised in a highly Westernised family which fled the Ayatollahs Iran, the young immigrant embraced a hedonistic lifestyle with a passion, and felt appalled that others around the world were denied such freedom.

Years on, Ahmari has scaled the heights of journalism on both sides of the Atlantic and now enjoys a comfortable life in Manhattan. He is, by any definition, an example of a successful immigrant to the West.

But as a Catholic and a father of a young son, he is disturbed by what he sees around him and fearful about the world which his little boy will inherit. He writes:

I have come to believe that the very modes of life and thinking that strike most people in the West as antiquated or limiting can liberate us, while the Western dream of autonomy and choice without limits is, in fact, a prison; that the quest to define ourselves on our own is a kind of El Dorado, driving to madness the many who seek after it; that for our best, highest selves to soar, other parts of us must be tied down, enclosed, limited, bound.

Self-sacrifice and freedom

His son Maximilian looms large in this book, as does Saint Maximilian Kolbe, who died a martyr in Auschwitz.

Ahmari writes that Kolbes act of self-sacrifice in volunteering to die in the place of a stranger represents the climbing of the very summit of human freedom, and argues that we have abandoned Kolbes brand of freedom freedom rooted in self-surrender, sustained by the authority of tradition and religion in favour of one that glories in the individual will.

Surveying the landscape of contemporary society, the author fears that his son will discard the permanent ideals of the past in favour of a culture which prefers the new to the old, and which suggests that there is no purpose to life other than self-fulfilment.

This book the final chapter of which is a touching letter addressed from father to son is an attempt to explain the unbroken thread which connects us to the past.

Is God reasonable?

Ahmaris structural approach is reminiscent of Jordan Petersons. He divides the book into twelve sections, each of which is based on answering a particular question: Is God Reasonable? Can You Be Spiritual without Being Religious? What Is Freedom For?

Like Peterson, Ahmari is a gifted storyteller and is refreshingly broad-minded when it comes to the examples he explores from a range of religious and cultural traditions.

In one chapter, he describes how C.S. Lewis came to abandon the shallow and materialistic worldview which he and others had developed in the early 20th century, and how this renewed respect for the old helped Lewis not just to explore this world, but to reconsider the Christian faith he had abandoned.

When explaining the relationship between faith and reason, Ahmari describes how Plato and Aristotle had, through the use of reason and without revelation, concluded that God must exist.

Elsewhere, in discussing the value of the Sabbatical rest and the costs which society has borne as a result of our collective decision to dispense with it, he highlights the work of the rabbi Abraham Heschel, who believed that by honouring the Sabbath, people were not only reminded of their basic religious duties, but also helped to understand their task to restore the world to the kingship of the Lord.

Secularisation, individualism and conservatism

Many prominent books about modern American life have touched upon what is surely the most consequential change to occur there in recent times: the rapid secularisation of the population.

This usually involves a movement away from traditional religion towards an individual-centric form of vague spirituality, and Ahmari argues persuasively that the baleful effects of this shift can be seen throughout society, including the rise of identity politics and the ever-greater social division which it is causing.

Politics is not the central theme here, thankfully, although it is touched upon.

It is worth noting that the author has recently undergone more than a religious conversion. In addition to this, he has become an increasingly vocal critic of the traditional fusionist approach of right-of-centre Americans, which saw social conservatives work together with libertarian-leaning economic conservatives to advance their goals within the framework of the American political system.

In 2019, Ahmari launched a blistering attack on this approach in the pages of First Things, and he has since become associated with the quixotic integralist position, which favours a more aggressive approach in culture war issues, and which seeks to do the impossible in marrying Church and State at a time of accelerating secularisation.

It would take another (very long) book to chart a path towards the society he and the other integralists seem to be aspiring towards, but few conservative-minded readers would disagree with his basic contention that the existing American order enshrines very few substantive ideals I would want to transit to my son.

Those substantive ideals are there, surely, and in this book, Sohrab Ahmari has done an excellent job of explaining to his son and anyone else who cares to listen why the thread which binds us to the past must always be preserved with reverence.

View post:
'Preserve the thread of tradition, my son' MercatorNet - MercatorNet

Read More..

ScalaHosting and AWS to deliver new SPanel web hosting capabilities – TechRadar

One of the obstacles to cloud hosting adoption has been the increased technical demand on users, which could be difficult for smaller companies to surmount without significant specialized talent acquisition or outsourcing.

This was one of the very things that pushed managed cloud VPS hosting firm ScalaHosting to partner with Amazon Web Services (AWS) and introduce SPanel, offering users an intuitive interface for Cloud VPS management.

The Graphic User Interface (GUI)-driven SPanel allows users to migrate to the platform quickly and is also compatible with cPanel.

After ScalaHosting finalized its strategic collaboration partnership agreement with AWS, TechRadar Pro sat down with Chris Rusev, CEO and co-founder of ScalaHosting and SPanel.io to iron out the details of the collaboration.

The main idea behind the AWS integration is simple - "Think global, host local". To achieve the highest speed and performance a website must be as close as possible to its visitor. AWS runs 230+ data centers in 200+ countries globally. Combining that with the modern AWS cloud infrastructures quality and the ScalaHosting in-house developed SPanel, which is among the top 5 cPanel/WHM alternatives, the user gets the complete bundle that will let him scale up his online business in one of the most secure and reliable cloud environments worldwide. In addition, with this move, ScalaHosting enters more aggressively the B2B hosting segment, because these days, no one gets fired for choosing AWS.

Before all else SPanel means freedom to our customers. Its completely free to all our customers and it makes them independent from 3rd party software providers like cPanel. Because its our own proprietary cloud management platform, we can afford to integrate into it only our own apps and features or free 3rd party add-ons. Instead of making SPanel commercial and monetizing it as the others do, we decided to make it developer-friendly.

Here, everyone can request new features and vote for existing ones, and we start developing only those with the max votes. Usually, it takes from weeks to two months max from request to implementation. In addition, by cutting down costs, we successfully lowered the price of a fully managed cloud VPS with a control panel, to the level of an average shared hosting plan.

a) Dedicated cloud environment - CPU, RAM & Disk resources are 100% dedicated to you. Your resources are yours and yours alone. Other users on the same server cannot degrade the performance of your websites and services.

b) Security - a VPS gives you much higher security because the whole server is dedicated to you and there is no risk that another website on the same server to be used to compromise your data. The fully managed service makes things really easy for the website owner as they don't need to worry about software updates, security, and daily routine server administration tasks. In comparison to the traditional hosting where no matter how well you isolate your account youll be still sharing the same OS kernel and software allowing a hacker to try local exploits to compromise other accounts or the whole server. Having local access to the OS makes hacking hundreds of times easier no matter how well a shared server is configured. With the cloud VPS such scenarios are simply not possible due to the dedicated environment.

c) Scalability - a cloud VPS may significantly scale up and down to serve hundreds of thousands of visitors and you only pay for the CPU/RAM resources that you really used for the period of time you needed them. Extra resources are always available and take less than a minute to add more.

d) Dedicated IP - Each VPS comes with a dedicated IP which is really important for both email deliverability and SEO as well. A compromised account may send spam or upload a phishing page with malicious code. As a result, the IP of the server is usually blacklisted in IP reputation platforms, and your emails start getting delivered to the Spam folder instead of Inbox. Losing only one customer because of that will cover the fee for a VPS for a couple of months. If you pay for SEO that will have even more dramatic results in the long run as Google also monitors IP reputation.

Most small to medium businesses cannot afford large IT and sysadmin teams in-house. For that reason, AWS was not an option because they do not provide fully managed service. With this collaboration, we are now able to offer SMBs, AWS bundled with 24/7 live ask anything technical support, SPanel, SShield security protection, premium Softaculous 1-click installer and more. Thats how we completely offload all server-related problems from the entrepreneurs backs and we give them the chance to fully focus on what they can do best.

In the light of the global Covid crisis, many offline SMBs were forced to move online. For these newcomers, this is still an unknown alien world, and they are unaware of how important the type of hosting they choose is for their online business. Shared hosting can silently drive back customers because no one likes to wait for more than a blink when he checks out his basket. Our strategy is to keep on promoting the VPS technologies and also to educate about the benefits of having an isolated cloud environment. We also want to spread the word that these advanced cloud technologies are not affordable and not that much different than the traditional hosting price-wise.

With this integration, ScalaHosting steps into 24 data centers around the globe, allowing the user to host his websites as close as possible to his audience. Now our customers can now choose between ScalaHosting native data centers in Dallas, New York, and Sofia-BG, and the globally integrated datacenter network of AWS and DigitalOcean.

More:
ScalaHosting and AWS to deliver new SPanel web hosting capabilities - TechRadar

Read More..

Aunalytics Announces FedRAMP Ready Status of Its Cloud – GlobeNewswire

SOUTH BEND, Ind., June 29, 2021 (GLOBE NEWSWIRE) -- Aunalytics, a leading data platform company delivering Insights-as-a-Service for enterprise businesses, announced today that its Aunalytics Cloud solution has achieved Federal Risk and Authorization Management Program (FedRAMP) Ready status and is actively working toward FedRAMP certification. Certified cloud-based products help U.S. federal agencies meet increasingly complex regulations and defend against cybersecurity threats, prevent data loss, enforce compliance, and protect agency domains.

FedRAMP is a government-wide program which is an assessment and authorization process that federal government agencies have been directed to use to ensure security is in place when accessing cloud computing products and services. By applying the FedRAMP framework to their evaluation, government agencies have a uniform assessment and authorization of cloud information security controls, alleviated cloud security concerns, and increased trust in the validity of assessments.

FedRAMP Ready status and, ultimately certification, represents one of the highest compliance standards and third party validations of our cloud hosting services, giving federal agencies the utmost confidence that our offering is tested and confirmed to meet the trust principles of confidentiality, availability, security, and privacy, said Kerry Vickers, CISO Aunalytics. Meeting these rigorous standards will benefit all of our clients in every industry and enable us to expand our footprint within the government sector by providing federal agencies, as well as defense contractors and others required to use FedRAMP certified suppliers, with a cloud infrastructure that is FedRAMP compliant.

Listed as FedRAMP Ready on the FedRAMP Marketplace, Aunalytics is seeking an agency sponsor as it moves toward the second phase of being FedRAMP authorized.

Tweet this: .@Aunalytics Announces #FedRAMP Ready Status of Its Cloud #Dataplatform #Dataanalytics #Dataintegration #Dataaccuracy #ArtificialIntelligence #AI #Masterdatamanagement #MDM #DataScientist #MachineLearning #ML #DigitalTransformation #FinancialServices

About AunalyticsAunalytics is a data platform company delivering answers for your business. Aunalytics provides Insights-as-a-Service to answer enterprise and mid-sized companies most important IT and business questions. The Aunalytics cloud-native data platform is built for universal data access, advanced analytics and AI while unifying disparate data silos into a single golden record of accurate, actionable business information. Its DaybreakTM industry intelligent data mart combined with the power of the Aunalytics data platform provides industry-specific data models with built-in queries and AI to ensure access to timely, accurate data and answers to critical business and IT questions. Through its side-by-side digital transformation model,Aunalyticsprovides on-demand scalable access to technology, data science, and AI experts to seamlessly transform customers businesses.To learn more contact us at +1 855-799-DATA or visit Aunalytics at http://www.aunalytics.comor on Twitter and LinkedIn.

PR Contact: Denise NelsonThe Ventana Group for Aunalytics (925) 858-5198dnelson@theventanagroup.com

View original post here:
Aunalytics Announces FedRAMP Ready Status of Its Cloud - GlobeNewswire

Read More..

BMO Global Asset Management (EMEA) Deploys NICE Cloud Compliance Recording for Microsoft Teams to Support Remote Workforce and Full Agility – Business…

HOBOKEN, N.J.--(BUSINESS WIRE)--NICE (NASDAQ: NICE), a leading provider of communication compliance solutions, today announced that BMO Global Asset Management (BMO GAM), the global investment manager owned by BMO Financial Group, has deployed NICEs certified Cloud Compliance Recording solution for Microsoft Teams across its business in Europe, the Middle East and Africa (EMEA) to meet certain regulatory requirements around recording omnichannel communications for regulated employees now working from home.

As we transitioned to Microsoft Teams to support our remote workforce, we needed to implement a compliance recording solution quickly, said Scott Wilson, Director, Infrastructure & Operations at BMO Global Asset Management. NICEs fully managed, cloud-based, software-as-a-service offering for Teams compliance recording enabled us to accelerate our adoption of Microsoft Teams. We were also able to free our staff from time-consuming activities like handling security patches, upgrades and other platform management tasks, which are now fully managed by NICE.

Chris Wooten, Executive Vice President, NICE, said, Leading financial services firms like BMO GAM are embracing remote and hybrid work environments and collaborative communication technologies like Microsoft Teams. NICE is helping to accelerate their digital transformation and ensure faster time-to-value, by providing complete recording coverage and contributing to compliance with different regulations worldwide. For firms with a cloud-first strategy, our SaaS recording solution delivers a low maintenance, touch-free experience, along with other powerful advantages of the cloud, including zero footprint and unprecedented scalability, reliability and security.

NICEs Certified Compliance Recording for Microsoft TeamsOffered as an on-premise or fully managed cloud solution, NICEs all-in-one compliance recording and assurance platform is used by most of the worlds leading banks and investment firms to record and retain trade-related conversations from unified communications platforms, turrets, desk phones, and mobile phones. It is the first compliance recording solution to be certified under the Microsoft Teams certification program. Offering complete recording coverage for all Microsoft Teams communications, including voice, video, chat and screen sharing, the solution leverages the Microsoft Azure secure cloud for application hosting, and compliant capture and archiving of regulated employee communications.

Learn MoreTo learn more about NICE Compliance Recording for Microsoft Teams:

About BMO Global Asset ManagementBMO Global Asset Management is a global investment manager with offices in more than 25 cities in 14 countries, delivering service excellence to clients across five continents. Our four major investment centres in Toronto, Chicago, London and Hong Kong are complemented by a network of world-class specialist managers strategically located across the globe: BMO Real Estate Partners, LGM Investments and Pyrford International Ltd. BMO Global Asset Management is a signatory of the United Nations-supported Principles for Responsible Investment initiative (UNPRI).

BMO Global Asset Management is a part of BMO Financial Group, a highly diversified financial services provider based in North America with total assets of CDN $950 billion as of 30 April 2021.

About NICENICE (Nasdaq: NICE) is the worlds leading provider of both cloud and on-premises enterprise software solutions that empower organizations to make smarter decisions based on advanced analytics of structured and unstructured data. NICE helps organizations of all sizes deliver better customer service, ensure compliance, combat fraud and safeguard citizens. Over 25,000 organizations in more than 150 countries, including over 85 of the Fortune 100 companies, are using NICE solutions. http://www.nice.com.

Trademark Note: NICE and the NICE logo are trademarks or registered trademarks of NICE Ltd. All other marks are trademarks of their respective owners. For a full list of NICEs marks, please see: http://www.nice.com/nice-trademarks.

Forward-Looking StatementsThis press release contains forward-looking statements as that term is defined in the Private Securities Litigation Reform Act of 1995. Such forward-looking statements, including the statements by Mr. Wooten, are based on the current beliefs, expectations and assumptions of the management of NICE Ltd. (the Company). In some cases, such forward-looking statements can be identified by terms such as believe, expect, seek, may, will, intend, should, project, anticipate, plan, estimate, or similar words. Forward-looking statements are subject to a number of risks and uncertainties that could cause the actual results or performance of the Company to differ materially from those described herein, including but not limited to the impact of changes in economic and business conditions, including as a result of the COVID-19 pandemic; competition; successful execution of the Companys growth strategy; success and growth of the Companys cloud Software-as-a-Service business; changes in technology and market requirements; decline in demand for the Company's products; inability to timely develop and introduce new technologies, products and applications; difficulties or delays in absorbing and integrating acquired operations, products, technologies and personnel; loss of market share; an inability to maintain certain marketing and distribution arrangements; the Companys dependency on third-party cloud computing platform providers, hosting facilities and service partners;, cyber security attacks or other security breaches against the Company; the effect of newly enacted or modified laws, regulation or standards on the Company and our products and various other factors and uncertainties discussed in our filings with the U.S. Securities and Exchange Commission (the SEC). For a more detailed description of the risk factors and uncertainties affecting the company, refer to the Company's reports filed from time to time with the SEC, including the Companys Annual Report on Form 20-F. The forward-looking statements contained in this press release are made as of the date of this press release, and the Company undertakes no obligation to update or revise them, except as required by law.

Visit link:
BMO Global Asset Management (EMEA) Deploys NICE Cloud Compliance Recording for Microsoft Teams to Support Remote Workforce and Full Agility - Business...

Read More..

Vertafore unveils next generation of ImageRight to transform productivity and user experience for insurers – Yahoo Finance

Cloud-based Vertafore Hosting for ImageRight 7 can reduce cost of ownership for carriers, with savings up to 25-50% annually

DENVER, June 29, 2021 /PRNewswire/ -- Vertafore, the leader in modern insurance technology, today announced the next generation of ImageRight, the industry's premier workflow and content management system designed specifically for insurance carriers. The announcement was made during the keynote event of Carrier Week at Accelerate, powered by NetVU.

Vertafore (PRNewsfoto/Vertafore)

ImageRight 7 provides a fully reimagined user experience in a web-based interface, enabling users to get more done with streamlined core processes and personalized task lists.

As the first release in Vertafore's multi-year commitment to modernize ImageRight, the update is available anytime and anywhere via modern browsers, further enabling carriers to equip their workforce for success as the "new normal" of work evolves. ImageRight 7 also includes compliance and security updates to keep users current with the latest rules and regulations.

ImageRight 7 provides a state-of-the-art user experience that improves productivity and streamlines tasks with enhancements that include:

An intuitive interface that enables users to easily navigate, discover, and track policies and all related documents.

The ability to easily edit and manage Microsoft Office files right from ImageRight, with all changes kept in sync.

Personalized to-do lists that surface work by priority. To-do lists are updated in real time, reducing the number of clicks to get to the latest tasks.

Vertafore Hosting for ImageRight 7 can save carriers 2550% annually

Also available with ImageRight 7 is Vertafore Hosting, a new cloud hosting option available via Amazon Web Services. Carriers get ImageRight delivered Software-as-a-Service (SaaS), including automatic version upgrades, as Vertafore takes the hosting burden off carrier IT teams, freeing them up for other priorities.

Data from Vertafore users show that Vertafore Hosting reduces the total cost of ownership for a carrier with 100 users an average of $320,000 over three years, or 25-50% of savings annually. The biggest savings come from eliminating capital expenses associated with maintaining their own hardware, operating systems, databases, and backup system infrastructure for ImageRight.

Story continues

"ImageRight 7 provides the industry's most modern experience for carriers to manage their workflow and content," says Sharmila Ray, head of carrier strategy at Vertafore. "With these latest enhancements and the introduction of Vertafore Hosting, carriers are empowered to drive productivity, reduce their IT costs and better meet the expectations and needs of a modern workforce."

About Vertafore

As North America's InsurTech leader for more than 50 years, Vertafore is modernizing and simplifying insurance distribution so that our customers can focus on what matters most: people. Vertafore's solutions provide end-to-end connectivity, improve the client and agent experience, unlock the power of data, and streamline essential workflows to drive efficiency, productivity, and profitability for independent agencies and carriers. For more information about Vertafore, visit http://www.vertafore.com.

2021 Vertafore and the Vertafore logo are registered trademarks of Vertafore. All rights reserved. All other trademarks are the property of their respective owners.

Press ContactAmanda Urbanaurban@nextpr.com312-259-1814

Cision

View original content to download multimedia:https://www.prnewswire.com/news-releases/vertafore-unveils-next-generation-of-imageright-to-transform-productivity-and-user-experience-for-insurers-301321197.html

SOURCE Vertafore

More:
Vertafore unveils next generation of ImageRight to transform productivity and user experience for insurers - Yahoo Finance

Read More..