Page 3,215«..1020..3,2143,2153,2163,217..3,2203,230..»

Importance of AWS Identity and Access Management – Enterprise Security Mag

With all its interesting capabilities and potential, AWS IAM is gaining the gravity it deserves.

FREMONT, CA: Previously, the battle lines of network and internet security were drawn clearly. It was easy to separate good actors from malicious actors. Cybersecurity focused on preventing unauthorized access to network resources and data. IT security professionals have to pay closer attention today because the threats arent trying to hack or crack their way in. They are using sophisticated methods to obtain valid user credentials and walking in through the front door. Enterprises need to have a strong identity and access management, and cloud logging and monitoring to recognize and respond to malicious behavior. This is where Identity and Access Management (IAM) in AWS comes in.

Security in the cloud is one of the biggest barriers to cloud migration. It becomes essential for security operation teams to follow security best practices to ensure a smooth transition with a strong basis. With all the public attention surrounding major cloud platforms, it is admirable that AWS IAM follows an incredibly granular approach in offering permissions and access control. IAM lets enterprises control who can use the resources and in which ways. This is why its possible to create an exceedingly safe environment using AWS.

Check Out:Top Cybersecurity Companies

AWS IAM lets enterprises create and manage identities, including users, groups, and roles, meaning firms can issue and allow authentication for resources, people, services, and apps within the AWS account. Access management or authorization in IAM is made of policies and permissions. IAM lets enterprises do this without sharing the credentials, and more recently, AWS released ControlTower to further simplify multi-account configurations.

As the biggest cloud platform and provider, AWS has come forth with several measures to enhance security, and IAM is the most vital of all of them. However, security and IAM is a complicated subject, which is why AWS released the Shared Responsibility Model aimed at establishing and sharing the responsibility for security and compliance between customers and AWS.

Read more from the original source:
Importance of AWS Identity and Access Management - Enterprise Security Mag

Read More..

Internet of Things Security Market increasing demand with Industry Professionals: Check Point Security Software Technologies, Cisco Systems -…

GlobalInternet of Things SecurityMarket Report is an objective and in-depth study of the current state aimed at the major drivers, market strategies, and key players growth. The study also involves the important Achievements of the market, Research & Development, new product launch, product responses and regional growth of the leading competitors operating in the market on a universal and local scale. The structured analysis contains graphical as well as a diagrammatic representation of worldwideInternet of Things SecurityMarket with its specific geographical regions.

[Due to the pandemic, we have included a special section on the Impact of COVID 19 on the @ Market which would mention How the Covid-19 is Affecting the Global Internet of Things Security Market

Get sample copy of report @jcmarketresearch.com/report-details/1103747/sample

** The Values marked with XX is confidential data. To know more about CAGR figures fill in your information so that our business development executive can get in touch with you.

Global Internet of Things Security(Thousands Units) and Revenue (Million USD) Market Split by Product Type such as Cloud Security, Application Security, Endpoint Security, Network Security

The research study is segmented by Application such as Laboratory, Industrial Use, Public Services & Others with historical and projected market share and compounded annual growth rate.GlobalInternet of Things Securityby Region (2019-2028)

Geographically,this report is segmented into several key Regions, with production, consumption, revenue (million USD), and market share and growth rate ofInternet of Things Securityin these regions, from 2013to 2029(forecast), covering

Additionally, the export and import policies that can make an immediate impact on theGlobal Internet of Things Security Market. This study contains a EXIM* related chapter on theInternet of Things Securitymarket and all its associated companies with their profiles, which gives valuable data pertaining to their outlook in terms of finances, product portfolios, investment plans, and marketing and business strategies. The report on theGlobal Internet of Things Security Marketan important document for every market enthusiast, policymaker, investor, and player.

Key questions answered in this report Data Survey Report 2029

What will the market size be in 2029and what will the growth rate be?What are the key market trends?What is driving Global Internet of Things Security Market?What are the challenges to market growth?Who are the key vendors inspace?What are the key market trends impacting the growth of theGlobal Internet of Things Security Market?What are the key outcomes of the five forces analysis of theGlobal Internet of Things Security Market?

Get Interesting Discount with Additional Customization@jcmarketresearch.com/report-details/1103747/discount

There are 15 Chapters to display theGlobal Internet of Things Security Market.

Chapter 1, to describe Definition, Specifications and Classification ofInternet of Things Security, Applications ofInternet of Things Security, Market Segment by Regions;

Chapter 2, to analyze the Manufacturing Cost Structure, Raw Material and Suppliers, Manufacturing Process, Industry Chain Structure;

Chapter 3, to display the Technical Data and Manufacturing Plants Analysis ofInternet of Things Security, Capacity and Commercial Production Date, Manufacturing Plants Distribution, R&D Status and Technology Source, Raw Materials Sources Analysis;

Chapter 4, to show the Overall Market Analysis, Capacity Analysis (Company Segment), Sales Analysis (Company Segment), Sales Price Analysis (Company Segment);

Chapter 5 and 6, to show the Regional Market Analysis that includes North America, Europe, Asia-Pacific etc.,Internet of Things SecuritySegment Market Analysis by Cloud Security, Application Security, Endpoint Security, Network Security ;

Chapter 7 and 8, to analyze theInternet of Things SecuritySegment Market Analysis (by Application) Major Manufacturers Analysis ofInternet of Things Security;

Chapter 9, Market Trend Analysis, Regional Market Trend, Market Trend by Product Type Cloud Security, Application Security, Endpoint Security, Network Security , Market Trend by Application Smart Retail, Connected Vehicles, Smart Government and Defense, Connected Healthcare, Consumer Wearables, Connected Logistics, Smart Energy and Utilities, Smart Manufacturing , ;

Chapter 10, Regional Marketing Type Analysis, International Trade Type Analysis, Supply Chain Analysis;

Chapter 11, to analyze the Consumers Analysis ofInternet of Things Security;

Chapter 12, to describeInternet of Things SecurityResearch Findings and Conclusion, Appendix, methodology and data source;

Chapter 13, 14 and 15, to describeInternet of Things Securitysales channel, distributors, traders, dealers, Research Findings and Conclusion, appendix and data source.

Buy Instant Copy of Full Research Report: @jcmarketresearch.com/checkout/1103747

Thanks for reading this article; you can also get individual chapter wise section or region wise report version like North America, Europe or Asia.

About Author:JCMR global research and market intelligence consulting organization is uniquely positioned to not only identify growth opportunities but to also empower and inspire you to create visionary growth strategies for futures, enabled by our extraordinary depth and breadth of thought leadership, research, tools, events and experience that assist you for making goals into a reality. Our understanding of the interplay between industry convergence, Mega Trends, technologies and market trends provides our clients with new business models and expansion opportunities. We are focused on identifying the Accurate Forecast in every industry we cover so our clients can reap the benefits of being early market entrants and can accomplish their Goals & Objectives.

Contact Us:JCMARKETRESEARCHMark Baxter (Head of Business Development)Phone:+1 (925) 478-7203Email:[emailprotected]

Connect with us at LinkedIn

More:
Internet of Things Security Market increasing demand with Industry Professionals: Check Point Security Software Technologies, Cisco Systems -...

Read More..

Improve Your Internet Speed in 2021 With These Gadgets On Sale – ExtremeTech

This site may earn affiliate commissions from the links on this page. Terms of use.

Since well likely be spending more time staying safer at home in 2021, it might be time to think about upgrading your router. You can give yourself the gift of faster internet with this 2 day Christmas sale. Just use promo code MERRY15 to take 15 percent off these devices.

Want to go a step safer than a VPN? The Anonabox PRO Tor and VPN Router gives you move flexibility and internet security than a VPN alone. Use them both together (or separately!) without needing to download anything, and take it anywhere thanks to its small pocket size.

Get the Anonabox PRO Tor & VPN Router for $72.24 (reg. $119) with promo code MERRY15.

Dont have a ton of dough to shell out for a new router? This Wi-Fi extender expands your Wi-Fi coverage and lets you keep your original router thanks to its mesh and beamforming technology. And you can use it with all of your devices, from smartphones to smart refrigerators.

Get the Bearifi Edge Mesh Wi-Fi Extender Bundle: AP & Satellite for $110.49 (reg. $139) with promo code MERRY15.

This router pulls double duty, ensuring your internet activity stays safe from threats. Its been seen on the Wall Street Journal, Engadget, Digital Trends and Curbed, and comes with a whopping 18 months of Advanced Network Protection to keep you safe.

Get the Gryphon: The Ultimate Secure Router & 18-mo Free Advance Network Protection for $195.49 (reg. $257) with promo code MERRY15.

This is one of the most anticipated mesh routers of 2020, helping make sure you and your family dont fall victim to the risks of the internet. This all-in-one mesh Wi-Fi security router and parental control system makes sure everyone under your roof stays safe online.

Get the Gryphon Guardian: Wi-Fi Network Protection for $84.14 (reg. $119) with promo code MERRY15.

Want faster internet in the new year? This combo of the InvizBox Go VPN Router means your internet speed with improve, while you enjoy the added benefits of encryption, georestriction and a 10-hour battery life on this portable router. Its super easy to setup and comes with 2 years of the premium VPN subscription.

Get the InvizBox Go VPN Router + 2-Yr Premium Subscription for $126.61 (reg. $199) with promo code MERRY15.

You can have the convenience of accessing all your home and office networks simultaneously with this smart private internet. Not only does it make life easier, it also adds top-notch security and doesnt have a VPN block, so its no surprise its been featured in Forbes, GadgetFlow, ZDNet and Mac Sources.

With everyone working and learning from home, you can make sure they all stay connected with this certified refurbished router. It eliminates buffering and works with multiple devices simultaneously and at the same speed. Theres also a Smart Wi-Fi app and dedicated tech support to rely on.

Note: Terms and conditions apply. See the relevant retail sites for more information. For more great deals, go to our partners atTechBargains.com.

Now read:

Go here to see the original:
Improve Your Internet Speed in 2021 With These Gadgets On Sale - ExtremeTech

Read More..

SOC as a Service market on the up, driven by greater focus on security – SecurityBrief Asia

The global System On a Chip (SOC) as a Service market is set to reach US$676.8 million by 2026, according to a new study from Valuates Reports.

This represents an increase from US$305.5 million in 2020, at a CAGR of 14.2% during the forecast period 2021-2026.

The major factors that are driving the growth of SOC as a service market size are a rise in sophisticated cyber attacks, increasing venture capital funding, and growing investments in SOC as a Service technology, the report states.

In addition, a surge in trends such as BYOD and work from home is expected to drive the SOC as a service market size.

WFH employees use private networks such as telephone or internet links, the security strength of which is not known to organisations.

As these are mostly used for business purposes, they may be at risk of ransomware and other cybersecurity threats that did not originate within the organisation.

In order to protect businesses from possible harms that may be caused by these developments, corporations are embracing SOC as a Service to reduce the threat, the report states.

Furthermore, increased adoption of SOC as a Service by government and public sector is expected to drive the SOC as a Service market size.

Governments are heavily deploying new technology solutions through digital governance initiatives and smart cities.

Applications in the government and public sector industry verticals are becoming the primary targets for cyber criminals to access confidential data.

Due to the COVID-19 pandemic, the reliance on online businesses has increased significantly.

BFSI, retail, government and public sector, electricity, and infrastructure, healthcare and manufacturing sectors, among others, are using the internet to provide the requisite services to customers.

This increasing focus on online business due to the COVID-19 pandemic is expected to further propel the growth of SOC as a Service market size.

When it comes to regions, Asia Pacific is expected to witness the highest CAGR growth during the forecast period. Industries such as financial institutions, government and public sector, healthcare, retail, manufacturing, energy and utilities, and others are expected to adopt SOC as a service solution in this region.

Companies operating in APAC will benefit from flexible economic conditions, government-driven industrialisation policies, and increasing digitalisation, the report finds.

North America also is expected to hold a significant SOC as a service market share during the forecast period. This is due to the increased focus to enhance advanced systems protection for the enterprises, increasing the need for data security, and the strong presence of several market players.

Major key vendors include Proficio, BlackStratus, Thales e-Security, Cygilant, Alert Logic, Arctic Wolf Networks, Netmagic Solutions, ESDS Software Solution, AQM Technologies and Suma Soft.

In the reportGlobal Opportunity Analysis and Industry Forecast, 20212026,SOC as a Service Market is Segmented by type (Prevention, Detection, Incident Response), application (BFSI, Healthcare, Education, Retail, IT and Telecom, Logistics and Transportation, Manufacturing, Others), key vendors and regional growth.

Read more:
SOC as a Service market on the up, driven by greater focus on security - SecurityBrief Asia

Read More..

How COVID-19 Tilted the Scale in Favor of VPNs – Infosecurity Magazine

While one situation can be catastrophic for a group, it can also be a blessing for another. Before the COVID-19 pandemic, a lot of people believed that VPNs were doomed but, the reverse has happened. VPNs have become a must-have for remote workers to do their jobs during the pandemic, and whats more, we expect that this will become the norm in the post-COVID-19 world.

Though COVID-19 was reported to have started in 2019, early 2020 was when it gained ground, and that was also when the turn around for VPNs began. Without mincing words, the COVID-19 pandemic caused massive digital transformation for many businesses and office workers.

The traditional VPN connectivity

Before the pandemic, relatively few numbers of people worked from home, but now the case has changed. It has become imperative that organizations must seek ways to support workers who will have to use computers and mobile devices from home to access corporate resources.

The traditional VPN makes use of a thick client model to build a secure tunnel from the client device to the corporate network. This is the tunnel that all network communications use.

There is, however, this cost implication you must think about because of hair pinning. The model works on the basis that access to public cloud resources must go through the VPN tunnel to the corporate site, which then forwards access back out to the internet-based cloud provider.

Expected innovations in VPN technology

Advancements in technology transcend all fields, and VPN technology is not left out. While what we have seems to suffice, we must bear in mind that there is the possibility for end systems' to increase power, and that will facilitate the migration of more software-based VPN technology into endpoints.

This scenario calls for innovation in VPN technologies to take advantage of local process capabilities, hence, making VPNs easier for both users and network administrators. There will then be central systems through which network admins can control VPN administration.

Indeed, we dont need hardware in a software world but, we will still need the physical connections and that means we cant do without some form of hardware. One way out, however, is to deploy x86 compute systems to replace some dedicated devices and carry out functions we were using hardware for.

This may have to be at the network edge, where we have distributed computational resources. For now, we dont have anything in sight to replace hardware yet, as the speeds the network core requires can only be possible with dedicated hardware.

Another possible transformation is for VPNs to function like software-defined WAN products. This will ensure that connectivity does not depend on the underlying physical network that can be wired, wireless, or cellular, as well as its addressing.

The workings of the evolving VPN systems must focus on the ability to use the advantages of multiple paths and transparently switch between them.

Expected innovations in VPN security

While we must commend efforts put into VPNs to thwart cyberattacks, its obvious that they have not been outrightly efficient, as cyber-attacks have increased tremendously. Its pertinent, therefore to expect more instances of AI and machine learning being applied to these security functions to increase their effectiveness without corresponding increases in-network or security administrator support.

There must be concerted efforts by IT professionals to ensure that VPN paths are not rendered inefficient when an endpoint communicates with internet-based resources such as SaaS systems. The workings of a VPN deem it necessary that the endpoint must first send data to the VPN concentrator, which then forwards the data to the cloud-based SaaS application. This leads to an increase in network latency. Apart from that, the network overhead also increases within the VPN since the SaaS application also uses encryption.

You can, however, use split-tunneling to correct this anomaly but, its essential for IT teams to carefully select the VPN termination point to avoid creating a security hole. This can be achieved by integrating with smart DNS servers that enable split-tunneling to specific sites under the control of network or security administrators.

To ensure that your VPN system is highly secure, you need to employ the zero-trust model. Since you will have to assume that endpoints are compromised regardless of their location, you wont leave any detail to chance.

Since the introduction of the zero trust model with security components that include allow listing and micro-segmentation by Forrester Research in 2010, it has become the yardstick to measure quality performance by networks. For sound cybersecurity practices, VPNs must deploy automated methods to create and maintain these security functions.

Expectations are rife that the VPN technology will have to upgrade in the nearest future to provide a better cybersecurity environment while reducing the effort needed to implement and maintain that security.

John Ejiofor is the founder and editor ofNature Torch, a blog that discusses the impact of humans on our mother nature. Hes a freelance writer and has been featured on some of the top blogs around the world.

See more here:
How COVID-19 Tilted the Scale in Favor of VPNs - Infosecurity Magazine

Read More..

Internet security Market 2020: COVID19 Impact on Industry Growth, Trends, Top Manufacturer, Regional Analysis and Forecast to 2027 – The Monitor

New Jersey, United States,- The in-depth research report on Internet security Market added to its huge repository by Verified Market Research provides brilliant and comprehensive market research. The report offers an in-depth study of key market dynamics including growth drivers, restraints, and opportunities. It mainly focuses on current and historical market scenarios. It includes market competition, segmentation, geographic expansion, regional growth, market size, and other factors. The Internet security research study is sure to benefit investors, market players and other market players. You will gain an in-depth understanding of the global market and industry.

This report focuses on Internet security market trends, future forecast, growth opportunities, key end-user industries and market players. The aim of the study is to present the most important developments of the market in the world.

IT Training Market is growing at a faster pace with substantial growth rates over the last few years and is estimated that the market will grow significantly in the forecasted period i.e. 2019 to 2026.

The following Manufacturers are covered in this report:

Internet security Market Report Contains:

Market Scenario Growth, Constraints, Trends, and opportunities Segments by value and volume Status of supply and demand Competitive analysis Technological innovations Analysis of the value chain and investments

This is an up-to-date report covering the current impact of COVID-19 on the market. The coronavirus pandemic (COVID-19) has affected all aspects of life around the world. This resulted in several changes in market conditions. The rapidly changing market scenario along with the initial and future assessment of the impact is covered in the report. The report discusses all major aspects of the market with expert opinions on the current state of the market as well as historical data. This market report is a detailed study of growth, investment opportunities, market statistics, growing competitive analysis, key players, industry facts, key figures, sales, prices, revenue, gross margins, market share, business strategies, major regions, demand and developments.

The report further studies the segmentation of the market based on product types offered in the market and their end-use/applications.

IT Training Market, By Product

Furthermore, the market research industry provides a detailed analysis of the Internet security market for the estimated forecast period. The market research provides in-depth insights into the various market segments based on end-use, types, and geography. One of the most important characteristics of a report is the geographic segmentation of the market which includes all the key regions. This section mainly focuses on various developments in the region including the main development and how these developments will affect the market. Regional analysis provides in-depth knowledge of business opportunities, market status and forecast, possibility of generating sales, regional market by different end-users along with future types and forecast for the coming years.

Geographic Segmentation

The report offers an exhaustive assessment of different region-wise and country-wise Internet security markets such as the U.S., Canada, Germany, France, U.K., Italy, Russia, China, Japan, South Korea, India, Australia, Taiwan, Indonesia, Thailand, Malaysia, Philippines, Vietnam, Mexico, Brazil, Turkey, Saudi Arabia, U.A.E, etc. Key regions covered in the report are North America, Europe, Asia-Pacific, Latin America, and the Middle East and Africa.

The report includes:

Market overview Complete market analysis Analysis of the latest market developments Events of the market scenario in recent years Emerging and regional markets Segmentations up to the second and/or third level Historical, current and estimated market size in terms of value and volume Competitive analysis with an overview of the company, products, sales, and strategies. impartial market assessment Strategic recommendations to increase the presence in the business market

The study analyzes numerous factors influencing supply and demand in the Internet security market and further assesses market dynamics that boost the market growth during the forecast period. Furthermore, the Internet security market report offers a comprehensive analysis of the SWOT and PEST tools for all major regions such as North America, Europe, Asia Pacific, Middle East and Africa. The report offers regional expansion of the industry with product analysis, market share, and brand specifications. Furthermore, the Internet security market research provides a comprehensive analysis of the political, economic, and technological factors which are driving the market growth in these economies.

Some Points from Table of Content

1. Study coverage2. Summary3. Internet security Market Size by Manufacturer4. Production by region5. Consumption by region6.Internet security Market Size by Type7. Internet security Market size according to application8. Manufacturer profiles9. Production forecasts10. Consumption forecasts11. Analysis of customers upstream, industrial chain and downstream12. Opportunities and challenges, threats and influencing factors13. Main results14. Appendix

Verified Market Intelligence is a BI enabled database service with forecasted trends and accurate market insights on over 20,000+ tracked markets helping organizations globally with their market research needs. VMI provides a holistic overview and global competitive landscape with respect to Region, Country, Segment and Key players for emerging and niche markets.

About Us:

Verified Market Research is a leading Global Research and Consulting firm servicing over 5000+ customers. Verified Market Research provides advanced analytical research solutions while offering information enriched research studies. We offer insight into strategic and growth analyses, Data necessary to achieve corporate goals, and critical revenue decisions.

Our 250 Analysts and SMEs offer a high level of expertise in data collection and governance use industrial techniques to collect and analyze data on more than 15,000 high impact and niche markets. Our analysts are trained to combine modern data collection techniques, superior research methodology, expertise, and years of collective experience to produce informative and accurate research.

Contact us:

Mr. Edwyne Fernandes

US: +1 (650)-781-4080UK: +44 (203)-411-9686APAC: +91 (902)-863-5784US Toll-Free: +1 (800)-7821768

Email: [emailprotected]

See original here:
Internet security Market 2020: COVID19 Impact on Industry Growth, Trends, Top Manufacturer, Regional Analysis and Forecast to 2027 - The Monitor

Read More..

One Option You Shouldnt Overlook When Setting Up a Security Camera – The New York Times

If you own or plan to buy a home security camera or smart doorbell camera, you need a place to hold all of the footage it captures. That means you need to decide where video will be saved once the camera captures it, because where the video goes determines how long it lasts, how secure it is, what it costs, and how easy it is to access.

There are two types of video storage for Wi-Fi security cameras. Local storage saves all your video recordings in the camera, on a networked device, or even on network-attached storage (NAS)so all your video stays local, inside your home. Cloud storage is the other option, in which the camera transfers all your recordings over the internet to store them on servers that you can access from almost anywhere (thats what the cloud part refers to).

We suggest that most people use cloud storage for their security cameras, or that they select cameras offering both local and cloud options (such as our current top-two indoor camera picks). Although local storage is usually cheap (just the cost of the memory card), and in going local you dont have to worry about who might potentially view your footage, there are a few specific reasons we recommend only those cameras that offer some type of cloud service.

If you merely want to spot mice running across the kitchen counter or view what your dog is doing during the day, local storage should be just fine. However, if someone breaks into your home and steals the camera cardor the whole camerayou wont have a record of the incident.

Cloud storage keeps all your footage safely away from prying eyes (or hands). Of course, if the power goes out, if a child yanks the power cord, or someone simply steals your camera, youre out of luck no matter what type of storage you use. However, cloud storage at least ensures that you have a video clipright up until your camera shuts downthat you can view in an app or a web browser.

Every type of storage option has limits. If you use local storage, youre limited by the amount of space on the memory card or NAS device. For example, the Eufy 2K Indoor Cam can support a microSD card up to 128 GB, which provides enough space to hold about 30 hours of 2K-resolution video or 36 hours worth at 1080p resolution. Wyze recommends using a 32 GB card with the Wyze Cam v2; that translates to 48 hours of 1080p video or 168 hours of 720p video. That may sound like a lot, but it can disappear quickly depending on how often your camera gets motion triggersyou may end up having hours of clips of you mowing the lawn, say, or of kids playing in the family room. Typically when a card hits its limit, the camera automatically deletes the oldest video clips to make room for new oneswhich means if you arent checking it once or twice a week, you may miss something.

With a cloud storage plan, you think in terms of time instead of storage size. For instance, Wyzes Cam Plus service stores your footage for 14 days (your recordings delete automatically after that). Although most cloud storage plans dont support 24/7 recording (Googles Nest Aware being a notable exception), Wyze says you could theoretically store 14 days of 24/7 video clips if your camera is constantly being triggered to record.

It often pays towell, pay. Companies want to get you on the hook for that recurring revenue, so they often include exclusive features and other perks to entice new subscribers and keep existing customers happy.

For instance, for $2 per month per camera (or $15 annually), Wyzes Cam Plus service includes person detectionso your camera can be more selective when it records clips and sends you alerts. Similarly, the Arlo Smart service provides people, vehicle, and package alerts, as well as activity zones. And some cameras, like those from the Google Nest line or newer Arlo models, dont provide any type of storage, person alerts, or the ability to share clips without a subscription.

Although were never eager to subscribe to yet another paid service, we think cloud storage for security cameras is a service worth having, even if you dont use it 365 days a year. Compared with most service fees, the pricing for cloud storage tends to be relatively low. Current cloud plans cost anywhere from $2 to $6 per month for a single camera (and usually offer a discount for multiple cameras) and include several privacy and safety features.

See more here:
One Option You Shouldnt Overlook When Setting Up a Security Camera - The New York Times

Read More..

EDA moves to the cloud – eeNews Europe

If you are an engineer of a certain age, you will remember for engineering workstation. Those high cost, high performance machines were in short supply and were used to run the leading edge electronic design automation (EDA) tools.

But the workstation also drove chip and graphics architecture. Silicon Graphics drive the MIPS architecture (and was subsumed into Cray and now HP Enterprise), Sun Microsystems had its own Sparc architecture before the takeover by Oracle, and Digital Equipment (DEC, RIP) had its ARM-based Alpha chip, developed by a team that went on to Apple and arguably has resulted in the M1 chip powering the latest Macbook.

However, these mighty machines (for their time) were overtaken by the network. Client-server architectures allowed higher performance servers to run the EDA tools.

These servers were consolidated into server farms, with racks of processors on-site, and now we are seeing the next stage in the evolution into the cloud.

The big three Eda suppliers have had cloud in their strategic roadmaps for several years, and this work has come to fruition this year. Earlier this month, ARM showed the importance of the cloud.

Arm is moving the majority of its EDA workloads to AWS as part of our effort to reduce our global datacentre footprint by at least 45% and our on-premises compute capabilities by 80% as we complete our migration to AWS, said Rene Haas, President of thee IP Group at Arm. We have already realized a 6x improvement in performance time for EDA workflows on AWS and see the potential for increasing throughput by 10x.

As part of this move, AWS used the VCS Fine-Grained Parallelism (FGP) technology from Synopsys running on Arm-based Graviton2 servers. This enables accelerated development and verification of breakthrough connectivity technology and SoCs.

Link:
EDA moves to the cloud - eeNews Europe

Read More..

This is the best Google Cloud Print alternative – Android Police

Google Cloud Print is an excellent tool for people who still own older printers that don't have a network connection of their own. It allows you to hook up your printer to your computer via USB and then use that computer as your printing server no need to throw out a perfectly fine device. However, it looks like all good things must end when it comes to Google products, and the Cloud Print shutdown is already looming the service is turning off its servers on January 1, 2021. Google has a list of recommended replacements, but almost all of these are aimed exclusively at businesses, except for one: PaperCut and its Mobility Print service.

While PaperCut has lots of paid products in store for businesses that have to manage a plethora of printers for a multitude of different user groups, the company's free Cloud Print replacement looks promising. It currently only supports remote printing for Chrome OS and Windows, so you can only print from your phone when you're in your home network, but that's still better than being left stranded without any solution at all.

To get started, you need to download the Mobility Print server from PaperCut's website for your operating system. You're taken to a local server address once you've installed it, where you need to create a user name, password, and an organization name write those down or save them to your password manager. The software then automatically recognizes printers connected to your computer and makes them available for everyone using Mobility Print on your network. There are instructions on how to install clients on computers and phones on your local server's web address, but we want to highlight the mobile setup here.

On Android, you download and start the Mobility Print app, check if it's set up as a print service in your system settings via a link provided in the app, and then you're already all set. You'll find printers connected to your computer in the printing dropdown, accompanied by the PaperCut icon. When you select them as a target, you'll see a warning that your documents might pass through servers, but that's just a boilerplate statement your data doesn't actually leave your local network at all.

As mentioned, the biggest caveat with Mobility Print is the lack of iOS and Android support for remote printing when you're not connected to your home Wi-Fi. A spokesperson told us that "there are a few things we still want to add to optimise the experience on Mac, Windows, and Chromebooks before moving to mobile," so we probably can't expect this to be ready by January 2021, when Google Cloud Print dies. However, if you only ever need to print stuff from your phone while you in your Wi-Fi anyway, this limitation shouldn't bother you too much. In any case, Mobility Print should be even faster than Google's solution when you use it locally since jobs don't have to pass through servers before arriving on your printer.

Let's preface this by emphasizing that you only need to go through the following process when you want to print remotely while you're not at home. If you only want to print from your home network, you can skip this section.

To set up Mobility Print's remote printing solution for Chromebooks and Windows computers, there's an Enable Cloud Print button on your computer's local printer server interface. A popup will inform you that your print jobs are private and secure by using WebRTC to create peer-to-peer connections. ClickEnableto proceed, and you're taken to a website where you have to configure an invite link. If you want to set up remote printing permanently, tick the "no expiration" box underPrinting expiration date.You can do the same for theinvite link expiration dateif you want to be able to keep using the same invite link for more devices, but you can always generate a new one, which might be the more secure option.

Once you've generated the invite link, you can send it to your other Chromebook or Windows computer hit the copy to clipboard button and write yourself an email or use a service like Pushbullet. On a Chromebook, you're taken to a website from which you can install the Mobility Print Chrome extension. You should then be able to start printing remotely right away a handshake with your server is established via the personalized link you've used to open the website.

The setup screen for Chromebooks.

You can test if your installation was successful by disconnecting from your home network and see if you're able to see the printer you've set up via mobility print. If you have a tethering plan, you can use your phone's hotspot to do that real quick. Otherwise, you might have to go outside to and look for a public Wi-Fi network. You can easily spot the Mobility Print targets in your printing list thanks to the attached green PaperCut logo.

Printing remotely works!

You don't have to worry about opening any ports in your firewall because Mobility Print uses the same ports as video conferencing apps. Its reliance on existing standards and peer-to-peer connections is also the reason why PaperCut offers Mobility Print for free, as a spokesperson shared with us PaperCut simply doesn't have to process a lot of data, so it can cross-finance the service via its paid products. The company hopes that people who are happily using their product at home might recommend it to their work IT departments.

Since these are already the last days of Google Cloud Print, you probably don't need to deactivate Cloud Print manually. But if you'd like to clean up your printer selection before the end of the year, you can head to google.com/cloudprint#printers, click or tap your printer, and hit the delete button.

Unfortunately, Mobility Print can't replace the Save to Google Drive printer in Chrome's printing menu, which is also tied to Cloud Print. Google suggests you select Save as PDF and manually upload your documents to Google Drive in the future.

The detailed feature comparison. Source: PaperCut.

As you can see, Mobility Print isn't a 1:1 replacement for Cloud Print just yet, and it won't be able to replicate the Save to Google Driveprinter. Since Mobility Print isn't a first-party solution, the setup is also a bit more tedious than the seamless Google Account integration Cloud Print provides, but PaperCut made the process as simple as possible. And once Mobility Print gets remote printing support for Android and the remaining platforms, it should be the best replacement for Google Cloud Print you could ask for.

See more here:
This is the best Google Cloud Print alternative - Android Police

Read More..

Finding the balance between edge AI vs. cloud AI – TechTarget

AI at the edge allows real-time machine learning through localized processing, allowing for immediate data processing, detailed security and heightened customer experience. At the same time, many enterprises are looking to push AI into the cloud, which can reduce barriers to implementation, improve knowledge sharing and support larger models. The path forward lies in finding a balance that takes advantage of cloud and edge strengths.

Centralized cloud resources are typically used to train deep learning inferencing models because large amounts of data and compute are required to develop accurate models. The resulting models can be deployed either in a central cloud location or distributed to devices at the edge.

"Edge and cloud AI complement one another, and cloud resources are almost always involved in edge AI use cases," said Jason Shepherd, vice president of ecosystem at Zededa, an edge AI tools provider.

"In a perfect world, we'd centralize all workloads in the cloud for simplicity and scale, however, factors such as latency, bandwidth, autonomy, security and privacy are necessitating more AI models to be deployed at the edge, proximal to the data source," Shephard said. Some training is occurring at the edge and there's increasing focus on the concept of federated learning that focuses processing in data zones while centralizing results to eliminate regional bias.

The rise of better networking infrastructure and new edge computing architectures is breaking down the barriers between centralized cloud AI and distributed edge AI workloads.

"The edge is a huge emerging shift in infrastructure that complements the cloud by adding on an information technology layer which is distributed out to every nook and cranny of the world," said Charles Nebolsky, intelligent cloud and infrastructure services lead at Accenture. Nebolsky believes edge AI is leading to a revolution as big as the cloud was when it gained traction.

When engineered well, edge AI opens new opportunities for autoscaling since each new user brings an entirely new machine to the collective workload. The edge also has better access to more unprocessed raw input data, whereas cloud AI solutions must work with pre-processed data to improve performance or enormous data sets, at which point bandwidth can become a serious concern.

"The reason for moving things to the edge is for better response time," said Jonas Bull, head of architecture for Atos North America's AI Lab, a digital transformation consultancy.

Speed and latency are critical for applications such as computer vision and the virtual radio access networks used for 5G. Another big benefit lies in improving privacy by limiting what data is uploaded to the cloud.

Edge AI's deployment is also full of constraints, including network latency, memory pressure, battery drain and the possibility of a process being backgrounded by the user or operating system. Developers working on edge AI need to plan for a wide range of limitations, particularly as they explore common use cases like mobile phones, said Stephen Miller, senior vice president of engineering and co-founder at Fyusion, an AI-driven 3D imaging company.

"You need to plan for every possible corner case [on the edge], whereas in the cloud, any solution can be monitored and fine-tuned," Miller said

Most experts see edge and cloud approaches as complementary parts of a larger strategy. Nebolsky said that cloud AI is more amenable to batch learning techniques that can process large data sets to build smarter algorithms to gain maximum accuracy quickly and at scale. Edge AI can execute those models, and cloud services can learn from the performance of these models and apply to the base data to create a continual learning loop.

Fyusion's Miller recommends striking the right balance -- if you commit entirely to edge AI, you've lost the ability to continuously improve your model. Without new data streams coming in, you have nothing to leverage. However if you commit entirely to cloud AI, you risk compromising the quality of your data -- due to the tradeoffs necessary to make it uploadable, and lack of feedback to guide the user to capture better data -- or the quantity of data.

"Edge AI complements cloud AI in providing access to immediate decisions when they are needed and utilizing the cloud for deeper insights or ones that require a broader or more longitudinal data set to drive a solution," Tracy Ring, managing director at Deloitte said.

For example, in a connected vehicle, sensors on the car provide a stream of real-time data that is processed constantly and can make decisions, like applying the brakes or adjusting the steering wheel. The same sensor data can be streamed to the cloud to do longer-term pattern analysis that can alert the owner of urgently needed repairs that may prevent an accident in the future. On the flip side, cloud AI complements edge AI to drive deeper insights, tune models and continue to enhance their insights.

"Cloud and edge AI work in tandem to drive immediate need decisions that are powered by deeper insights, and those insights are constantly being informed by new edge data," Ring said.

The main challenges of making edge and cloud AI work together are procedural and architectural.

"Applications need to be designed so that they purposefully split and coordinate the workload between them," said Max Versace, CEO and co-founder of Neurala, an AI inspection platform.

For instance, edge-enabled cameras can process all information as it originates at the sensor without overloading the network with irrelevant data. However, when the object of interest is finally detected at the edge, the relevant frames can be broadcasted to a larger cloud application that can store, further analyze (e.g., what subtype of object is in the frame and what are its attributes), and share the analysis results with a human supervisor.

One strategy lies in creating an architecture that balances the size of the model and data against the cost of data transfers, said Brian Sletten, president of Bosatsu Consulting and senior instructor for edge computing at Developintelligence.com. For large models, it makes more sense to stay put in the cloud.

"There are ways to reduce the model size to help resolve the issue, but if you are dealing with a very large model, you will probably want to run it in the cloud," Sletten said.

In other cases, when there is a lot of data generated at the edge, it may make more sense to update models locally and then feed subsets of this back to the cloud for further refinement. Developers also need to consider some of the privacy implications when doing inference on sensitive data. For example, if developers want to detect evidence of a stroke through a mobile phone camera, the application may need to process data locally to ensure HIPAA compliance.

Sletten predicts the frameworks will evolve to provide more options about where to do training and how to improve reuse. As an example, TensorFlow.js uses WebGL and WebAssembly to run in the browser (good for privacy, low-latency, leveraging desktop or mobile GPU resources, etc.) but also can load sharded, cached versions of cloud-trained models. Model exchange formats (e.g., Open Neural Network Exchange) could also increase the fluidity of models to different environments. Sletten recommends exploring tools like LLVM, an open source compiler infrastructure project, to make it easier to abstract applications away from the environments they run in.

"One of the key challenges in moving more AI from the cloud to the edge is coming up with neural network architectures that are able to operate in the edge AI chips efficiently," said Bruno Fernandez-Ruiz, co-founder and CTO of Nexar, a smart dash cam vendor.

General computing platforms, like the one found in the cloud servers, can run any network architecture. This becomes much harder in edge AI. Architectures and trained models must be adapted to run on the AI chipsets found at the edge.

Fernandez-Ruiz and his team have been exploring some of these tradeoffs to improve the intelligence they can bring to various dash cam applications. This is a big challenge as users may drive from highly performant mobile networks to dead zones yet expect good performance regardless. The team found that during inference time, there isn't enough network bandwidth to move all the data from the edge to the cloud, yet the use case requires local inference outputs to be aggregated globally. The edge AI can run neural networks that help filter the data which must be sent to the cloud for further AI processing.

In other cases, the cloud AI training may result in neural network models which have too many layers to run efficiently on edge devices. In these cases, the edge AI can run a lighter neural network that creates an intermediate representation of the input which is more compressed and can therefore be sent to the cloud for further AI processing. During training time, edge and cloud AI can operate in hybrid mode to provide something akin to "virtual active learning," where the edge AI sifts through vast amounts of data and "teaches" the cloud AI.

Fernandez-Ruiz has found the types of supported neural network architectures in edge AI chipsets are limited, and usually running months behind what can be achieved in the cloud. One useful approach for addressing these limitations has been to use compiler toolchains and stacks like Apache TVM, which help in porting a model from one platform to another.

Another approach has been to use network architectures known to work well in edge AI, and train them directly for the target platform. He has found that given enough volume and variety of training data, this approach can often outperform the cross-platform compiler approaches in terms of in terms of absolute performance. However, it also requires some manual work during training, and in pre- and post-processing.

Accenture's Nebolsky said some of the most common tradeoffs developers need to consider between cloud and edge AI include the following:

Security: AI services that drive authentication and processing of sensitive information like fingerprints or medical records are generally best accomplished locally for security concerns. Even when very strong cloud security is in place, the user perception of better privacy from edge processing can be an important consideration.

See the original post here:
Finding the balance between edge AI vs. cloud AI - TechTarget

Read More..