Page 3,047«..1020..3,0463,0473,0483,049..3,0603,070..»

Cashing in on bitcoins: French government to pocket $30 mn from first-ever cryptocurrency auction – Economic Times

Paris, March 17, 2021 -Governments might look askance at bitcoin, but it does not mean they do not want to cash in on its soaring value and France is set to pocket nearly $30 million from its first-ever action of the cryptocurrency, a minister said on Wednesday.

The sale was of more than 600 coins seized as part of an investigation and were valued at more than $30 million based on current market prices.

Held online by the Kapandji Morhange auction house, the sale attracted nearly 1,600 bidders.

"It's a sale that will raise 24 million euros ($29 million) in proceeds for the government", the minister of public finances, Olivier Dussopt, told the television channel, BFM Business, at the end of the auction.

When preparations got underway in September, bitcoin was trading around $10,000, far from the $60,000 it struck over the weekend, putting the sale of 611 coins in an altogether different league.

When bidding began at 9:00 am (0800 GMT), the starting price stood at 23,250 euros per coin, but most of the coins sold for around 40,000 euros apiece, more or less in line with the current market price minus exchange rate rates and commission.

No information has been disclosed about the provenance of the bitcoins as the legal process is underway.

If the defendant wins, they'll receive the funds from the auction minus commissions paid to the auction house.

Otherwise, the French state will pocket any money not awarded by the court to victims or charity.

France is far from the first to auction cryptocurrencies, with the United States doing so in 2014, followed by Canada, Australia, Belgium and Britain, according to the auction house.

Entrepreneurs are a high-risk group whenever the markets catch a cold. Heres how they invested to keep themselves, and their companies, in the pink of health.

Jyotsna Uttamchandani, Executive Director, Syska GroupIf I had to stress about investing in something this year, it would be health. A gym, at this point, is accessible to us on our smartphones. We can always do group exercise classes online or even group challenges for steps with our friends. From a business point of view, investing in AI solutions to drive productivity will be a year-round focus. It will prioritise product sales, optimise our pricing, and provide seamless forecasting.

Gautam Das, CEO, Oorjan CleantechI have participated in almost 50 marathons, including an 87-km comrade run. Spending time outdoors running, doing yoga or meditation, swimming or playing a sport is how I invest in my mental and physical well-being. Good health is the biggest wealth. I believe in financial investments in new ventures that create value and jobs. Success and money are the by-products.

Dhruvil Sanghvi, CEO, LogiNextIn 2021, I am going to double down on efforts to maintain good health by regular exercise and meditat ion. For our employees too, we are envisaging more ways for people to invest in their mind and body. As for wealth, I actively help upcoming technology entrepreneurs with mentorship and angel investments. Ill be expanding horizons here to build more pathbreaking global companies from India.

Ameera Shah, MD, Metropolis HealthcareLife is all about tradeoffs. Keep a mental and emotional balance and deal with your anxiety in a positive way. Regular exercise and spending quality time nurturing myself and my family are some of my priorities. On wealth, for those investing in markets, it is better to be diversified and to stay liquid. For entrepreneurs, there needs to be a strong back-up plan. Wealth-creation is a process, but solving customer problems and impacting lives positively is the true purpose.

Read the original here:
Cashing in on bitcoins: French government to pocket $30 mn from first-ever cryptocurrency auction - Economic Times

Read More..

Migrating File Data to the Cloud Using AWS DataSync, Part 1 – Virtualization Review

Migrating File Data to the Cloud Using AWS DataSync, Part 1

With more interest in cloud-based file servers, Brien Posey details the integral process of migrating existing files to the cloud to get started.

For many years the idea of hosting file servers in the cloud was widely regarded as impractical and cost prohibitive. More recently however, there has been a renewed interest in cloud-based file servers. Of course if an organization does opt to host its file servers in the cloud then it will need to figure out how to migrate existing files. Thankfully, Amazon offers a service called DataSync that can help with the migration process.

Before I show you how to use AWS DataSync, there are two important things that you need to know. First, in order to use the AWS DataSync service, you are going to need to set up a virtual machine (VM). This VM will run an agent that enables communications between your on-premises environment and the Amazon cloud. The required VM can either run on-premises or in the cloud. If you opt to run the VM on-premises then you will need to have a server that is running VMware ESXi, Kernes-based Virtual Machine (KVM), or Microsoft Hyper-V. If you decide to host the VM in the cloud then it will run on Microsoft Hyper-V.

The other thing that you need to know before getting started is that in order to migrate your data to the AWS cloud using DataSync, the data will need to be located in a supported location. Amazon allows you to migrate data on NFS or SMB stores, as well as self managed object storage, Amazon EFS, Amazon FSx for Windows File Server and Amazon S3.

To get started, log into the AWS portal and then select the DataSync option from the list of services (it's located in the Migration and Transfer section). Once you arrive at the AWS DataSync page, the first thing that you will need to do is to specify the type of data transfer that you want to perform. The Create Data Transfer drop-down list gives you two options. You can perform a data transfer between on-premises storage and AWS, or you can transfer data between two AWS storage services. You can see what these options look like in Figure 1.

Once you have made your selection, click the Get Started button (the Get Started button is hidden by the drop-down menu in the figure above). For the purposes of this blog series, I am going to walk you through the process of migrating data that is located in an on-premises SMB share. I will be hosting the VM on a Microsoft Hyper-V server.

As you can see in Figure 2, the next step in this process is to create the agent. The first thing that you will need to do is to select the hypervisor that you want to use, and then download the VM image. What you do next will vary considerably based on the hypervisor that you have selected, but I will show you the steps required by Microsoft Hyper-V.

The download consists of a single ZIP file, which you will need to extract to a folder on your Hyper-V server. Next, open the Hyper-V Manager and select the New | Virtual Machine commands from the Actions pane. This will cause the Hyper-V Manager to launch the New Virtual Machine Wizard.

Click Next to bypass the wizard's Welcome screen and you will be taken to a screen that asks you to provide a name and location for the VM. You can see what this looks like in Figure 3.

Click Next and you will see a prompt asking you to choose a VM generation. Choose the Generation 1 option and click Next. You will now be asked to specify the amount of startup memory to allocate to the VM. I couldn't find anything in the AWS documentation specifying the amount of memory that should be used. My experience has been that 4 GB seems to work well, but you may need to allocate more or less depending on how much data you are migrating.

Click Next, and you will be taken to the Configure Networking screen. Here you will need to select the virtual switch that you want to use. Be sure to choose an external virtual switch, because the VM will need to access the Internet.

Click Next and the wizard will display the Connect Virtual Hard Disk screen. Choose the option to use an existing virtual hard disk and then specify provide a path to the VHDX file that you extracted from the ZIP file earlier. You can see what this looks like in Figure 4.

Click Next, followed by Finish to create the VM.

Now that the required VM has been created, it is time to configure the VM to enable the data migration process. I will show you how to do that in Part 2.

About the Author

Brien Posey is a 19-time Microsoft MVP with decades of IT experience. As a freelance writer, Posey has written thousands of articles and contributed to several dozen books on a wide variety of IT topics. Prior to going freelance, Posey was a CIO for a national chain of hospitals and health care facilities. He has also served as a network administrator for some of the country's largest insurance companies and for the Department of Defense at Fort Knox. In addition to his continued work in IT, Posey has spent the last several years actively training as a commercial scientist-astronaut candidate in preparation to fly on a mission to study polar mesospheric clouds from space. You can follow his spaceflight training on his Web site.

See original here:
Migrating File Data to the Cloud Using AWS DataSync, Part 1 - Virtualization Review

Read More..

Cloud spending topped data centers for the first time last year – ITProPortal

Businesses around the world spent more money on cloud infrastructure than they did on on-premise solutions for the first time last year, new figures have said.

A report from market researchers Synergy Research Group claims enterprise spending on cloud-based solutions grew by another third (35 percent) in 2020, compared to the year before, adding that total annual spending has now come close to the $130 billion mark.

At the same time, spending on on-prem solutions dropped by six percent, year-on-year, shrinking to less than $90 million.

Speaking to TechCrunch, chief analyst and research director at Synergy, John Dinsdale, said CIOs spend their money on servers, storage, security and software for the cloud, among other things:

The software pieces included in this data is mainly server OS and virtualization software. Comparing SaaS with on-prem business apps software is a whole other story, Dinsdale said.

Despite significant growth in spending, sceptics out there are still saying that the majority of workloads remains on-prem. For Dinsdale, its a tough question to answer because of the ease at which workloads move around in todays hybrid world.

Ive seen plenty of comments about only a small percentage of workloads running on public clouds. That may or may not be true (and I tend more toward the latter), but the problem I have with this is that the concept of workloads is such a fungible issue, especially when you try to quantify it, he said.

See the article here:
Cloud spending topped data centers for the first time last year - ITProPortal

Read More..

Telos moves intercom to the cloud with Infinity VIP Virtual Intercom Platform – NewscastStudio

Telos Alliance has released a new broadcast intercom system that moves communication to the cloud.

Branded as the Infinity VIP Virtual Intercom Platform, the new system makes workflows available on any devicesmartphone, laptop, desktop, or tablet.

Third-party devices, such as Elgatos Stream Deck can also be utilized to control the system.

VIP allows users to utilize Telos Infinity IP Intercom anywhere, including at home, on-prem, site-to-site or in the cloud.

Telos Infinity has revolutionized comms forever by eliminating the outmoded centralized matrix. We are doing it again with the new Telos Infinity Virtual Intercom Platform, the next evolution of Infinity that, for the first time, puts fully-featured broadcast Intercom in the Cloud. This opens up a whole new world of virtual comm workflows, responds to customer demand for remote workflows, and aligns with Telos Alliances larger push toward virtualization across product lines, said Martin Dyster of Telos Alliance.

Meeting users where they are on the path toward virtualization, Telos Alliance offers several deployment options for VIP:

On-Prem Use Telos Infinity VIP hardware appliance or your own server for on-prem installations.

Integrated For both On-Prem or Cloud versions, the Telos Infinity VIP system can be integrated with Telos Infinity beltpacks and hardware panels or any third-party intercom or audio subsystem using AES67 or SMPTE 2110-30 connectivity.

Advertisement

Cloud Server Software for supported Cloud platform installations. A complete Communications infrastructure in the Cloud (including Amazon Web Services and Google Cloud) with connectivity options for integration with third-party cloud-based and On-Prem audio subsystems.

Software as a Service (SaaS) Various third-party Telos Alliance partners will offer a Telos Infinity VIP SaaS option, allowing users to lease it in a virtual environment.

Go here to see the original:
Telos moves intercom to the cloud with Infinity VIP Virtual Intercom Platform - NewscastStudio

Read More..

Microsoft Exchange Attacks: What IT and Security Need to Know – Dice Insights

With the IT and security industries still coming to grips with the sophisticated supply chain attacks that targetedSolarWindsand that companys customers, Microsoft dropped another bombshell early this month that has once again shaken the cybersecurity industryleaving analysts and observers to wonder about the basic safety of the hardware and software used every day. Forcybersecurity professionalseverywhere, this is a critical moment.

On March 2,Microsoftpublished an out-of-band security alert concerning four zero-day vulnerabilities found in certain versions of its Exchange email server product that were being exploited by a hacking gang that the company calls Hafnium, which appears to have links to China. Researchers at security firmsVolexityand Dubex assisted in the discovery of these flaws.

After the initial announcement, Microsoft, security vendors and multiple government agencies, including the U.S.Cybersecurity and Infrastructure Security Agency, issued reports and emergency warnings to on-premises Exchange users of the potential dangers, asking them to apply the published patches immediately.

In cases where it appears that attackers successfully exploited these vulnerabilities, CISA notes that on-premises Exchange servers must be disconnected and should not be re-admitted to the network domain. For federal agencies that fall under CISAs purview, this also means rebuilding their Exchange Service operating system and reinstalling the software package.

Despite the warnings from Microsoft, CISA and other security actors, attackers now appear to be accelerating their attacks in an attempt to exploit these vulnerabilities as quickly as possible.By some estimates, tens of thousands of organizations and their networks could have been compromised by these attacks, and security firmESEThas found that at least 10 advanced persistent threat groups, many with ties to China, have now been linked to these incidents.

Reports have surfaced that vulnerabilities are being exploited to plant malware, includingransomwareandcryptominers.

By March 15,Check Point Softwarepublished a report that found the number of attempted attacks trying to exploit these vulnerabilities had increased tenfold since the beginning of the month, increasing from 700 to over 7,200 incidents reported in one day. Organizations in the U.S. appear the most frequently targeted, and the hackers appear most interested in military and government organizations.

And beyond the sheer scale of these attacks, the hacking of Exchange servers, along with SolarWinds, have led many to question the fundamentals of cybersecurity, as well as what is being done to protect the hardware and software that organizations use every day.

The recent hack of Microsofts Exchange email server is teaching us many lessons and correcting previous misconceptions, said John Morgan, CEO of security firm Confluera. One such correction is that despite the trend of cloud migration, many organizations still run enterprise applications such as Microsofts Exchange email servers on-premise.

The attacks targeting the vulnerabilities in Exchange servers have raised numerous questions, including when these incidents began (some reports have the first attacks starting in early January). What was the original goal of the initial hackers before the flaws became public?

Several security experts note that the attacks appear focused on smaller and mid-sized organizations that are running on-premises versions of Exchange and havent moved to more cloud-based email systems such as Office 365 or Google Gmail.

Joseph Neumann, director of offensive security at consulting firm Coalfire, notes that attacks involving Exchange should raise concerns about why smaller organizations are still relying on on-premises tools for basic functions such as email, which can either be moved to the cloud or turned over to a managed services provider.Its all a matter of staffing and resources.

Companies of a smaller nature rarely have a deep bench that would feel comfortable patching and securing an exchange server, Neumann told Dice. Migrations to cloud services like Exchange Online, or outsourcing all email needs is the way all companies should be going. Managing the security of the server and keeping the service running is astronomically more affordable now than running your own on-prem email system.

Neumann notes that, while organizations that want to move more cloud services usually have to re-train or hire staff that understand these services, the long-term benefits (such as better security and less cost) outweigh staffing changes.

Cloud migrations tend to realize how they can realign their staff to not run data centers but manage applications and virtual private clouds, which may have huge cost savings, Neumann noted. On the security front, being able to defer some controls by using microservices allows the customer to push even more responsibilities to the cloud service provider, who has better technology and staff to focus specifically on the effort of maintaining their infrastructure.

And while the Exchange attacks might make smaller organizations rethink both their email and security approach, Morgan said there are specific concerns about migrating to cloud services.

Organizations considering the adoption of cloud services due to the recent exchange hack have to consider several factors including replacement of spam filters and other related security services, required bandwidth and associated costs, and tuning performance including latencies, Morgan told Dice. Organizations must also consider the lack of in-house expertise for cloud services and the learning curve for the IT teams to ramp up.

Heather Paunet, senior vice president at security firm Untangle, noted that her company recently conducted asurveythat found about 48 percent of small businesses remain undecided if moving data and network traffic to the cloud offers better security. The result: While Microsoft can quickly push a patch out, it cant make customers apply the fix as fast, which is part of the problem with the current attacks on Exchange.

With on-premises deployments, Microsoft can provide the update to secure the breach quickly, but they must rely on the IT administrators to actually deploy the update, Paunet said. Small IT departments may not always be able to implement the patch quickly and some may even be hesitant and take a wait-and-see approach.

Knowing that organizations facing the most impact are smaller,Microsofton March 16 released a mitigation tool that can automate portions of both the detection and patching process.

Morgan also notes that smaller organizations, along with their IT and security staff, should heed some lessons from these attacks. He notes that if the attacks did indeed start in January, it means the original hackers were taking a low and slow approach. It wasnt until the attacks became more brazen that alarms were raised. Going forward, this means enterprises of all sizes must be able to connect the dots faster.

Also, Morgan notes how quickly other attackers appeared to jump on these vulnerabilities while IT and security teams scrambled to patch. By the time the vulnerabilities are known in the community, it impacts all businesses. Companies should avoid the sense of security based on the initial attack targets, he said.

Milan Patel, global head of Managed Security Service at BlueVoyant and a former FBI agent, noted that companies should subscribe to as many security publications as possible to get notice of when these types of attacks are first spotted. He also believes that if email services have been outsourced, companies should check to make sure proper guidance has been followedand that an investigation should commence if hackers appear to have gained access to the network.

The stark reality is that no matter what size an organization is, it is very difficult to identify these types of vulnerabilities in the supply chain, Patel told Dice.

Want more great insights?Create a Dice profile today to receive the weekly Dice Advisor newsletter, packed with everything you need to boost your career in tech. Register now

Follow this link:
Microsoft Exchange Attacks: What IT and Security Need to Know - Dice Insights

Read More..

It’s Harder To Hear The Pulse In The Server Market – IT Jungle

March 22, 2021Timothy Prickett Morgan

More than any other piece of equipment that does into the datacenter, the server is an indicator of health and wealth. Over the more than three decades that The Four Hundred has been published, we have spent a lot of effort and time to understand how the world is investing in what kinds of servers, including Big Blues midrange systems running OS/400 and IBM i, and how the trends change over time. And we are committed to doing that going forward, even though it has just gotten a little bit more difficult.

For the past several decades I honestly cant remember how long the box counters at both Gartner and IDC have been in competition with each other delivering market data, and this competition compelled them to provide a good bit of data about server, storage, and networking spending as a kind of loss leader for the very detailed market models they have. I have been personally grateful for the insight that this publicly available data has provided, and in recent years have concentrated more on the information that IDC put out in these core datacenter markets because of its richness and thoroughness.

So it came as something of a shock when the usual detailed shipment and revenue data, by the top original equipment manufacturers (OEMs) and the collective of original design manufacturers (or ODMs), was not made available when IDC put out its figures for the fourth quarter of 2020. Rather than the detailed tables we have come to expect, IDC has put out some commentary and two graphics showing market shares of vendors by revenues and shipments. Not to be deterred, we have worked from these graphics to do some estimating you can count pixels in the images to get relatively precise percentages and apply these to the revenue and shipment figures. But the level of precision from estimates is by necessity a lot lower than the actual figures that IDC used to put out, which we presume are derived from market checks and data from vendors themselves before they are published. (This is why there is nearly a three-month lag between the end of a financial quarter and when the IDC and Gartner sales and shipment figures are divulged.)

While this is disappointing, we get it. IDCs founder, Pat McGovern, died in 2014 and the company, which included the IDG publishing giant as well as the IDC consulting business, was sold to China Oceanwide Holdings Group in 2017, which itself is part of a wide web of investment vehicles centered in Beijing that, oddly enough, is cross coupled with the Chinese Academy of Sciences and its Legend Holdings, which of course is the owner of Sino-American server maker Lenovo. It would take a week to sort out all of the links between the owners and controllers of IDG and IDC, and that is not the point. What is the point is that the writing was on the wall once McGovern died and the company inevitably was sold by his heirs. Both Gartner and IDC have been tightening up their release of information to the public, and no doubt because building and maintaining these market models is difficult and expensive and, thanks to fewer suppliers and fewer buyers of systems due to the dominance of the hyperscalers and cloud builders, that cost is necessarily spread across fewer potential paying customers who need much richer datasets than this publicly available data to make their decisions.

Going forward, we will do our best with the information that IDC does provide to give you what insight that we can. We will clearly delineate data that is actually provided by IDC and that which we estimate based on data such as the relatively rough but still useful data embodied in charts.

According to the statement that IDC put out this month, sales of servers rose by 1.5 percent to $25.8 billion, but shipments declined by 3 percent to just under 3.3 million units. (We reckon it is around 3.293 million machines shipped in Q4 2020, against 3.395 million units shipped in Q4 2019, but IDC is not giving that kind of precision anymore.)

Here is the revenue share chart IDC put out:

As you can see, Inspur (which includes sales of Power-based gear in China as part of the Inspur Power Systems joint venture that this Chinese server maker has with Big Blue) grew by a little less than IBM itself shrunk, and Hewlett Packard Enterprise and Dell both shrank a tiny but as Lenovo stayed flat and Huawei Technology rose and the ODM collective was flat. The rest of the market, which we calculate was worth 16.1 percent of the market based on pixel counts from this chart, rose by a bit, accounting for around $4.15 billion of the $25.8 billion. HPE came in at $4.09 billion by our math, and Dell was $3.97 billion. Inspur, we think, rose by 24.8 percent to $2.17 billion, and IBM fell by 20.5 percent to $1.88 billion. Huawei was up 17 percent to $1.54 billion and Lenovo grew along with the market at 1.5 percent to $1.45 billion, as did the ODMs, who hit $6.55 billion. We think, based on our estimates from what IDC said in its companion server shipment char, that the ODMs shipped 29 percent of servers to drive those revenues, or around 955,000 machines. Thats actually a 9.5 percent decline in machines, which tells us the hyperscalers and cloud builders are buying beefier boxes, which the math shows they are. But they buy so many basic infrastructure servers that they have to buy a lot of pretty expensive, GPU and flash laden machines to move that needle.

Here is a chart that lays out the OEM and ODM landscape since the Great Recession:

Our precision in our estimates of IDCs data us only as good as a pixel size, of course. We make do.

IBM, as you can see, has pretty much leveled off at somewhere around an average of $1.3 billion a quarter in the past two years. Because Cisco Systems was knocked out of the top five vendors five quarters ago by Inspur and Huawei Oracle/Sun Microsystems has long since been banished to the Others category we have been estimating its revenues based on its own financial reports and prior IDC data. Again, we make do.

IDC said in its statement that revenues from non-X86 servers, such as IBMs Power Systems and System z mainframes but also including a growing Arm server category (driven now mostly by Fujitsus supercomputing business. Amazon Web Services and its Graviton2 processor for its own cloud, and Ampere Computings emerging Altra line), and a few legacy Itanium and RISC platforms, hit around $2.8 billion, a decline of around 9 percent and X86 servers hit around $23.1 billion, an increase of 2.9 percent. (Based on what we think happened a year ago in the IDC data, we think the numbers are closer to $2.75 billion in non-X86 sales and $23.05 billion in X86 sales, for whatever that is worth.) Here is the trend of X86 versus non-X86 since they separately from each other (that is not an accident) during the Great Recession:

There is a kind of dtente there, and as Microsoft and Amazon embrace more and more Arm computing, it will fill in the gap in declining RISC/Unix and mainframe sales, we think, and quite possibly bend that curve up.

Here is another interesting chart we pulled out of the historical IDC data we have kept track of for a long time, plotting sales of all types of IBM servers against sales of all types of non-X86 servers:

IBM, as you can see, has been the signal driver outside of the X86 market for a long, long time. (This data only goes back to the middle of 2002, when IDC first started talking about the market this way.) But, as we point out above, as Arm servers rise in the datacenter and we think they will this could change. As we have pointed out before, anything that weakens the case for X86 strengthens the case for Power, but if Arm servers get beefier and cheaper, it can also weaken the case for Power. We shall see how this all plays out, and count on us to try to figure that out for you.

Taking The Full Measure Of Power Servers

Chipping Away At X86 Hegemony In the Datacenter

Just How Big Is The Whole Power Systems Business?

Power Systems Slump Is Not As Bad As It Looks

The Ups And Downs Of The Server Cycle

IT Starts To Feel The Impact Of The Great Infection

The IT Sector Could Weather The Pandemic Storm

The Midrange Gets Pinched A Little More

Power9 Enters The Long Tail

Servers Cool A Bit In Q3, But The Market Is Still Hot

IBM And Inspur Power Systems Buck The Server Decline Trends

Server Buying Cools, But Its Cool Dont Panic

Power Systems Bucks The IBM Trend And Grows

Inspur Joins OpenPower To Build Power Machines

IBM Licenses Power8 Chips To Chinese Startup

View post:
It's Harder To Hear The Pulse In The Server Market - IT Jungle

Read More..

Hello Azure. Pure Cloud Block Store is here Blocks and Files – Blocks and Files

Pure Storage has made its Cloud Block Store available on the Azure Marketplace.

Cloud Block Store is the cloudified version of Purity OS, the operating system that runs on the companys FlashArrays. The software provides high-availability block storage, a DR facility and Dev/Test sandboxes. All these instantiations can be handled through Pure1 Storage Management.

Cloud Block Store enables bi-directional data mobility between FlashArray on-premises, hosted locations and the public cloud. The service is already available on AWS.

Aung Oo, Partner of Director Management for Microsoft Azure Storage, issued a statement: Pure Cloud Block Store on Azure, which is built with unique Azure capabilities including shared disks and Ultra Disk Storage, provides a comprehensive high availability and performant solution.

Pure has said it may roll out CBS to other public clouds Google Cloud springs to mind. The company is also considering expanding storage protocol support files and S3 objects spring to mind.

The company has announced a Pure Validated Design for Microsoft SQL Server Business Resilience to provide business continuity for SQL Server databases running on premises. This enables disaster recovery in the cloud, with Cloud Block Store for Azure acting as a high-availability target.

With the Azure coverage, Pure joins HPE, Infinidat, NetApp, IBMs Red Hat and Silk in providing a common block storage dataplane across their on-premises, hosted, AWS and Azure instances. Silk and Red Hat go further by covering GCP as well.

The hybrid multi-cloud environment is becoming a reality and we expect newer vendors, such as VAST Data and StorONE, to follow suit.

More here:
Hello Azure. Pure Cloud Block Store is here Blocks and Files - Blocks and Files

Read More..

Week in review: Attacks on Exchange servers escalate, the influence of the Agile Manifesto, O365 phishing – Help Net Security

Heres an overview of some of last weeks most interesting news and articles:

Ongoing Office 365-themed phishing campaign targets executives, assistants, financial departmentsA sophisticated and highly targeted Microsoft Office 365 phishing campaign is being aimed at C-suite executives, executive assistants and financial departments across numerous industries.

The benefits and challenges of passwordless authenticationMore and more organizations are adopting passwordless authentication. Gartner predicts that, by 2022, 60% of large and global enterprises as well as 90% of midsize enterprises will implement passwordless methods in more than half of use cases.

If you are not finding vulnerabilities, then you are not looking hard enoughBuilding security and privacy into products from concept to retirement is not only a strong development practice but also important to enable customers to understand their security posture and truly unleash the power of data.

With data volumes and velocity multiplying, how do you choose the right data security solution?There is no doubt that the COVID-19 pandemic has caused radical changes in our personal and working lives. The sudden and massive surge of employees working from home and the anticipated long-term popularity of the option is also forcing CIOs and CISOs to gauge to the best of their abilities how the balance of remote and in-person operations will look in the coming months and years.

Security threats increasing with 70% using personal devices for workSamsung has revealed the results of a multi-industry research study, which identifies the main technology challenges UK businesses have faced over the last year and the key solution theyre turning to as the nation prepares for a future of hybrid working.

As attacks on Exchange servers escalate, Microsoft investigates potential PoC exploit leakMicrosoft Exchange servers around the world are still getting compromised via the ProxyLogon (CVE-2021-26855) and three other vulnerabilities patched by Microsoft in early March. To help administrators, the company has released Exchange On-Premises Mitigation Tool (EOMT), which quickly performs the initial steps for mitigating ProxyLogon on any Exchange server and attempts to remediate found compromises.

Automatically mitigate ProxyLogon, detect IoCs associated with SolarWinds attackers activitiesMicrosoft has updated its Defender Antivirus to mitigate the ProxyLogon flaw on vulnerable Exchange Servers automatically, while the Cybersecurity and Infrastructure Security Agency (CISA) has released CHIRP, a forensic tool that can help defenders find IoCs associated with the SolarWinds attackers activities.

The future of IT security: All roads lead to the cloudMore and more applications and with them workflows and entire business processes are finding their way into the cloud. Analysts predict that IT security will follow suit, and this raises a few questions.

Securing a hybrid workforce with log managementMoving to a remote workforce in response to the pandemic stay-at-home orders meant that IT departments needed to address new risks, e.g., insecure home networks. However, as they begin to move back into offices, many of these challenges will remain.

A strategic approach to identity verification helps combat financial crime70% of financial services organizations are taking a strategic approach to identity verification to combat financial crime and stay one step ahead of fraudsters according to Trulioo.

Alarming number of consumers impacted by identity theft, application fraud and account takeoverA new report, developed by Aite Group, and underwritten by GIACT, uncovers the striking pervasiveness of identity theft perpetrated against U.S. consumers and tracks shifts in banking behaviors adopted as a result of the pandemic.

Why data privacy will be the catalyst for digital identity adoptionIdentity fraud is rising, even more so since the COVID-19 pandemic took hold, buoyed by the sheer volume of personal information out there.

The dangers of misusing instant messaging and business collaboration tools71% of office workers globally including 68% in the US admitted to sharing sensitive and business-critical company data using instant messaging (IM) and business collaboration tools, Veritas Technologies research reveals.

Why is financial cyber risk quantification important?Why are executives pressuring CISOs to start financially quantifying cyber risk for their business? This process allows CISOs to identify and rank risk scenarios that are most critical to their enterprise, based on factors such as which attacks would have the biggest financial impact, and how equipped the company is to defend itself against any given attack.

Where is 5G heading, and how fast will it get there?When it comes to 5G, carriers are optimistic. In fact, more than half of those surveyed by Dimensional Research expect to deliver substantial end-user benefits within two to five years while 47% reported that users already are seeing value or will within one year.

iOS app developers targeted with trojanized Xcode projectThe trojanized version of the project dubbed XcodeSpy by the researchers executes an obfuscated Run Script when the developers build target is launched. The script contacts a C&C server and downloads a custom variant of the EggShell backdoor

Password reuse defeats the purpose of passwordsWhen a person reuses the same password across multiple accounts, one accounts exposure puts all the others at risk. To prevent this, cybersecurity awareness programs must emphasize the importance of passwords: how to create them, use them, and how to use a password manager.

Threat actors thriving on the fear and uncertainty of remote workforcesThe pandemics work-from-home reality resulted in an unprecedented change for organizations as they fought to defend exponentially greater attack surfaces from cybercriminals armed with powerful cloud-based tools, cloud storage and endless targets. As working environments evolved, so did the methods of threat actors and other motivated perpetrators, as detailed in the SonicWall report.

Women helping women: Encouraging inclusivity in the cybersecurity industrySince 1987, the month of March has been known as Womens History Month, celebrating the historical achievements and contributions of women around the world. It is especially important during this time of reflection and celebration that we recognize the important role women have played in the growing security sector over the years.

Years-old MS Office, Word flaws most exploited to deliver malware29% of malware captured was previously unknown due to the widespread use of packers and obfuscation techniques by attackers seeking to evade detection, according to a HP report.

DDoS attacks surge as cybercriminals take advantage of the pandemicDDoS attacks reached a record high during the pandemic as cybercriminals launched new and increasingly complex attacks, a Link11 report reveals.

Risk management in the digital world: How different is it?Managing risk arising from remote work has largely been reactive, and risk managers have had to adapt to new digital threats that werent necessarily as prevalent when work was done from a physical office.

The influence of the Agile Manifesto, 20 years onIn the years since the Manifesto was first published, Agile has been adopted by domains outside of software development, including hardware systems, infrastructure, operations, and even business support to name a few.

The DevOps Guide to Terraform SecurityWhile there are many benefits to using Terraform as part of your infrastructure provisioning workflow, there are also key security considerations that we will cover in this paper.

New infosec products of the week: March 19, 2021A rundown of the most important infosec products released last week.

View post:
Week in review: Attacks on Exchange servers escalate, the influence of the Agile Manifesto, O365 phishing - Help Net Security

Read More..

Elon Musk offers Jordan Peterson discussion on Life, the Universe and Everything after invitation to talk – RT

Billionaire Elon Musk could be interviewed by Jordan Peterson, the controversial critic of political correctness. The two appear to have set up a sit-in on Petersons YouTube talk show.

Peterson asked Musk on Friday if he would be a guest on his program, to which the entrepreneur responded: What would you like to talk about? Musk suggested that the conversation could be about Life, the Universe and Everything, citing the title of an iconic book by science fiction writer Douglas Adams, so one assumes the number 42 may come up in the discussion.

Its unclear if the exchange will lead to an actual interview, but the proposal definitely made many people excited.

Musk, who currently holds the title of the wealthiest person in the world, is known for his extensive footprint on social media and swift embrace of unconventional public moves. For example, at the peak of the scandal involving amateur investors on Reddit going after Wall Street short sellers, Musk invited the CEO of RobinHood an app that drew much hatred for seemingly undercutting the small guy and siding with the big financial players in the situation for a surprise interview,

Peterson, a Canadian psychology professor, made his name by going against the woke trends in academia and elsewhere and championing conservative values. He is a bestselling author and has a significant fan following online.

Critics accuse him of fostering hatred toward minorities and catering to far-right extremism for actions like opposing policing the use of preferred gender pronouns for transgender people and speaking about a crisis of masculinity in the West.

Among his recent guests was Abigail Shrier, the author of the book Irreversible Damage: The Transgender Craze Seducing Our Daughters, which got pushed out from some major bookseller shops by activists accusing it of promoting transphobia.

If you like this story, share it with a friend!

Link:
Elon Musk offers Jordan Peterson discussion on Life, the Universe and Everything after invitation to talk - RT

Read More..

‘Mein Kampf’ and the ‘feminazis’: What three academics’ Hitler hoax really reveals about ‘wokeness’ – Haaretz

The scandal broke in The Wall Street Journal, two and a half years ago. Three self-described "left-leaning liberals" had fooled feminist and gender studies journals to accept a number of absurd and horrific hoax papers for publication. One paper was billed as a rewrite of a chapter from Hitlers "Mein Kampf," but using feminist theory.

Peter Boghossian, James Lindsay and Helen Pluckroses endeavors were praised in some quarters as an essential satire of fashionable jargon and theories, and a brave expose of academic journals openness to publishing "intellectually vacuous as well as morally troubling bullshit," as Yascha Mounk put it.

Others slammed the authors hoaxes as mean-spirited attacks on leftist scholarship; 11 of Boghossians Portland State colleagues described them as "fraudulent, time-wasting, anti-intellectual." When Boghossians university opened an ethics investigation against him, Jordan Peterson (of intellectual dark web infamy) declared only Boghossians critics could be accused of "academic misconduct"and not the philosophy professor himself.

What is clear is that the hoax and its controversy propelled Boghossian and his co-writers into the media limelight, big time, with multiple article in the mainstream press and a particularly warm welcome from right-leaning platforms: Dave Rubins show The Rubin Report and Petersons own YouTube channel, but also from more centrist outlets like Joe Rogans podcast.

Boghossian deepened his longstanding allyship with right-wing provocateur, Andy Ngo, and won a phalanx of new fans from Richard Dawkins to Bari Weiss, Andrew Sullivan to Megyn Kelly.

But did the trio really demonstrate that contemporary academia is receptive to an "intersectional 'Mein Kampf'"? What did the stunt actually prove? What were the underlying motivations of the hoaxers, and the conservative media stars who embraced them so eagerly? What light does this saga throw on todays culture wars and the so-called "anti-wokeness" and cancel culture campaigns? Whom did the three writers really hoax?

Let's go back to the stated aims of the three writers themselves.

Inspired by physicist Alan Sokals famous 1996 hoax paper in the journal Social Text,these "concerned academics" saw themselves as critiquing "an ongoing problem we see in gender studies and related academic disciplines," a problem they name as "grievance studies": the effort to inflame the grievances of "certain identity groups" on subjects such as race, gender and sexuality.

Their aim was, they claimed, to "reboot" the academic conversation, to "reintroduce scepticism" about core assumptions, and provide a safe space to challenge the "increasing power of grievance scholars."

Over a period of 10 months, they wrote 20 papers: seven were accepted for publication, and four were published.

To excavate the controversy, and as a historian studying Hitler, and, I've chosen to drill down into one of the hoax articles: "Our Struggle is My Struggle: Solidarity Feminism as an Intersectional Reply to Neoliberal and Choice Feminism," the piece flagged by the WSJ as based on "Mein Kampf."

It was sent to the journal Feminist Theory but was rejected; it was accepted by Affilia: Journal of Women and Social Work in the fall of 2018, but never actually published. On The Rubin Report, James Lindsay airily hypothesized that it was "probably days away from actually being published when the WSJ broke their story."

Clearly, the idea that an article based on "Mein Kampf" could be published in a serious scientific journal is certainly an appalling prospect and generates instinctive outrage. So let's dig a bit deeper: What does "based on 'Mein Kampf'" actually mean?

First and foremost, the source material. The chapter the hoaxers chose, not by coincidence, one of the least ideological and racist parts of Hitler's book. Chapter 12, probably written in April/May 1925, deals with how the newly refounded NSDAP should rebuild as a party and amplify its program.

According to their own account, the writers took parts of the chapter and inserted feminist "buzzwords"; they "significantly changed" the "original wording and intent of the text to make the paper "publishable and about feminism." An observant reader might ask: what could possibly remain of any Nazi content after that? But no one in the media, apparently, did.

Indeed, in public, the trio constantly downplayed the amount of re-writing they did to the original text. On Joe Rogans podcast in October 2018, Lindsay described how they'd "modified the words and added theory around it so that it would fly," and in another interview explained that this was to "get past plagiarism."

Chapter 12, he noted, included sentences like: "This is why we need the Nazi Party, and [this is] what is expected of people who are going to be part of it." What did they change? "We took that out [the Nazi party reference] and replaced it with intersectional feminism." What's left is an entirely anodyne sentence, stripped of any identifiable Nazi vestiges. Hardly "owning the grievance warriors."

So what did the text in the article accepted by Affilia actually look like? Was it, as Fox News claimed, a "feminist Mein Kampf", suggesting men should be treated the same way as Hitler victimized Jews?

It is surprising, to say the least, that none of the journalists reporting on the controversy actually bothered to compare the two texts. If they'd done so, they would have found that the Affilia article didn't contain anything that could be recognized as "Mein Kampf" even by a Hitler expert, let alone a lay person.

The best way to illustrate this is to highlight a section of what remained of Hitler's text, spread out as it was over several paragraphs on several pages:

[] to appeal to [] contented and satisfied, [] to embrace [].

[] half-measures, by [] a so-called objective standpoint, [] the goal []. That is to say, [] in the sense [] many limitations, []. [] countered only by an antidote, [] only the []. [] people [] neither [] nor []. [] abstract knowledge [] directs their []. [] is where their [] lies. [] receptive [] in one of these two directions [] never to a [] between the two.

[] emotional [] stability. [] than respect, [] is more [] than aversion, [] weakness) [], [] will [] power.

The future of a movement is [].

The lacunae between these preserved pieces of text were filled with material that was either re-written, or entirely new (including references to bona fide scholarship). This created the convincing illusion of an original philosophy paper. Neither the words nor the intent were comparable to "Mein Kampf"; indeed, the intent was the very opposite.

If the idea was to showcase the 'absurdity' of feminist theory, and the ideology-fueled laxity of editors, why didnt they choose to work from a much more ideological or racist part of "Mein Kampf," say chapter 11: Volk und Rasse ("People and Race") instead? Well, Lindsay told Rubin, revealingly, it was "too extreme" to be useful.

If the point of the experiment was to prove that radical theory was so unhinged it could pass as Nazism, they failed. If the point was to hoodwink a feminist journal to run "Mein Kampf" dressed up as feminist theory, but denatured the text to be unrecognizable from the original, then they didnt prove their contention at all. What they did prove was that there are workaday sentences with nouns and verbs and adjectives in "Mein Kampf" that can be repurposed.

Ironically, the figure whose 1996 hoax inspired the "Mein Kampf" stunt, Alan Sokal, was lukewarm on whether the later hoax had actually proved anything of importance, precisely because the authors had gone so far out of their way to mask their core contention in order to get published. He noted in a 2019 interview that the problem with the grievance studies hoax "may be that the authors did too good of a job of imitating the style of other articles in the field. In which case the articles [] wouldnt prove much of anything."

In fact, the trio wrote two articles based on "Mein Kampf." In one of them they claimed ) to have "essentially" just replaced references to "Jews" with "white men," although their own fact sheet states the article was a more comprehensive "rewrite": they exchanged "Jews" with "white people" or "whiteness," and "added plenty of jargon and critical race theory."

Why didn't this article get any media traction? Because it was never accepted by any journal, let alone published. That failure meant two out of three journals chose to reject "Mein Kampf" articles.

Nevertheless, the trio's stunts garnered them enormous attention. Besides Rogan and Rubin, they were interviewed by Jordan Peterson (at the time at the pinnacle of his fame), and their results spread through largely uncritical reporting in leading newspapers all over the world.

Riffing off Lindsay's framing, an op-ed in The New York Times falsely claimed that not only had the "Mein Kampf" piece been published, but that they had "simply scattered some up-to-date jargon into passages lifted from Hitlers 'Mein Kampf'"; in The Washington Post, an op-ed incorrectly stated that it "was literally a partial chapter of 'Mein Kampf' rewritten using womens studies buzzwords."

Right-wing pundit Ben Shapiro called the stunt "genius" and asked, unself-consciously, when "true power" would be restored to educators not engaged in "navel-gazing mental masturbation and toward a renewed intellectual search for knowledge."

The online magazine Quilletteoffered a prcis of the scandal that indicated its self-appointed status as savior of free speech wasn't bothered by obvious factual inaccuracies, stating that all seven papers had actually been published (false), one included a 3000 word excerpt from "Mein Kampf" (false) and that the latter had been published in Affilia(false).

But it was in Sweden that perhaps the most egregious write-up appeared. The country's second largest daily newspaper, the liberal Svenska Dagbladet, featured an editorial headlined, "The Feminazis at Our Universities," and it went downhill from there.

Editorial staff writer Ivar Arpi didn't bother to fact-check his claims about the Mein Kampf piece, regurgitating the same mistakes as Quillette, and then claimed the article accepted by Affilia was nothing less than "feminazism, literally."

"Feminazi" was the go-to slur for feminists coined by right-wing Christian shock-jock Rush Limbaugh back in the 1980s but its use in a Swedish newspaper was shocking and extreme; no other news outlet in the world (not even Fox News) used "feminazi" in connection with the hoax. Arpi, however, brought the term into mainstream, liberal parlance as if it was the most natural thing in the world.

Perhaps Arpi's foul language was a harbinger of Sweden's growing anti-feminist backlash. A poll last month showed 41 percent of Swedes somewhat agreed with the statement: "It is feminisms fault that some men feel at the margins of society and demonized," the highest rates among eight European countries surveyed. According to Nick Lowles, chief executive of the anti-racist group HOPE not Hate, that anti-feminism is "wrapped up in the growing right-wing culture wars" and exhibits increasingly aggressive, even violent, rhetoric.

Feminism and gender studies are in the crosshairs of neo-fascism, and Sweden just so happens to have the worlds largest far-right party, the Sweden Democrats, formed by ex neo-Nazis, and one actual Nazi (an SS volunteer on the Eastern Front in WWII). The party won no less than 17.5 percent of the popular vote in the country's 2018 general election.

The "Mein Kampf" hoax itself is embedded within these wider culture wars, and is revealing about their dynamics and the strange-looking self-declared liberals-and-right-wing alliance pushing so much of the outrage machine.

That is best seen in the hoaxers own parsing of their stunt as they bathed in the glow of right-wing adoration. It had a far cruder, nastier edge, and goes to the heart of why the trio so deliberately chose "Mein Kampf" to "expose" the left.

On the Rubin Report, Lindsay offered an explicit analogy between "Mein Kampf" and so-called leftist "grievance studies": He claimed that Hitler, too, "was pushing the politics of grievance."

Perhaps Lindsay thought this was the winning tell of the whole endeavor. But it resembles far more what philosopher Daniel Dennett calls "pseudo-profound bullshit": To the extent it is true, it is trivial to the extent it is not trivial, it isnt true. All politics is based on some form of grievances; that is why we engage in political struggles in the first place: to correct a perceived wrong in the world.

Ironically, the trios whole stunt was based on their grievances towards "intersectional feminism" and gender studies; so are their grievances also the same as Hitlers? Of course not. Hitlers grievances and feminist grievances are not the same, and it is absurd to claim that they are. They are fundamentally different in every possible way except for them being termed "grievances."

This ludicrous equivocation does, though, illustrate just how widespread the relativization of Nazism and its crimes has become, and the nave ease with which it is being spread by people who are far from being fascist themselves.

To imply in any way that feminism and Nazism can be put on the same footing is a reductio ad absurdum: to relativize the atrocities of Hitlers regime. The right-wing media constantly replays the same equivalence dynamic, comparing cancelled events on campus, sanctioning platforms publishing threats of violence or just losing followers on Twitter as Nazism, Kristallnacht or the Holocaust.

But the use of the Hitler analogy is also intended to valorize the current-day "victims" of the so-called "feminazis" conservatives, Trump supporters, the "anti-woke" and their self-declared liberal fellow travelers. They are now framed as the "Jews," the victims of a totalitarian left which, not coincidentally at all, is often equated by the right-wing fringe to Nazism (the "National Socialists were socialists" idiocy.) Much of the outrage at this ravenous but nebulous "left" has now transitioned from attacking feminist theory to the all-encompassing bugbear of "critical race theory."

All this, despite the evidence of the real world where the right-wing was just in power, where in 2020 the GOP won nearly 47 percent of U.S. votes, where conservative churches, universities and think tanks are as solid as ever, and where an enormous and influential right-wing media ecosystem thrives a fact hardly peripheral to the careers of Dave Rubin, Joe Rogan and Jordan Peterson themselves.

So, what did the "Mein Kampf" articles actually prove? Ironically, they showed that the journals they targeted rejected both of their papers; only after major revisions to one of the texts and after having been emptied of all traces of Nazi ideology and no longer had any resemblance to "Mein Kampf" did they manage to get it accepted.

If anything, it proved a remarkable resilience on the part of these journals to withstand pseudo-scientific bullshit. Moreover, the article Affilia accepted was a philosophical paper not premised on outrageously obvious forged data, as some of the other articles did. The fact that they managed to fool some reviewers with fraudulent content, and in some cases fabricated data, is not exactly earth-shattering news.

As Science reported, by late October 2018 more than 18,000 papers have been retracted by peer-review journals since the 1970s, about 60 percent due to fraud. The problem is arguably much bigger in the natural sciences than in the humanities and social sciences. Yet, we dont see Boghossian, Lindsay and Pluckrose berating natural science journals for publishing bad science.

When Inside Edition featured an experiment where a comedian read Hitler quotes to Trump supporters, who were told they were from his speeches - and most agreed with the statements. The prankster didnt even tweak the quotes.

That didnt demonstrate that Trump supporters were Nazis, but that people are naturally gullible and suggestable, and will accept a persons framing (especially if it comes from an academic or a friendly journalist) unless they have strong reasons not to, or information that contradicts it. The same is true in this case; reviewers assume that their peers dont brazenly lie and fabricate content for the sake of an ideological prank.

No, the campaigns against gender studies, the study of racism and "intersectional feminism," and the gleeful efforts to humiliate other academics has nothing to do with a wish to preserve the integrity of science; it is an ideological and political crusade against an entire field of science simply because of its connection to feminism, social justice, and the fight for equality. Dont be fooled by it.

Mikael Nilsson is an historian based in Stockholm, Sweden, specializing in Hitler and National Socialism. His latest book is "Hitler Redux: The Incredible History of Hitlers So-Called Table Talks" (Routledge, 2020). Twitter:@ars_gravitatis

Read this article:
'Mein Kampf' and the 'feminazis': What three academics' Hitler hoax really reveals about 'wokeness' - Haaretz

Read More..