Page 3,583«..1020..3,5823,5833,5843,585..3,5903,600..»

Machine Learning Takes UWB Localization to the Next Level – Eetasia.com

Article By : Nitin Dahad

Imec uses machine learning algorithms in chip design to achieve cm accuracy and low-power ultra-wideband (UWB) localization...

Imec this week said it has developed next generation ultra-wideband (UWB) technology that uses digital RF and machine learning to achieve a ranging accuracy of less than 10cm in challenging environments while consuming 10 times less power than todays implementations.

The research and innovation hub announced two new innovations from its secure proximity research program for secure and very high accuracy ranging technology. One is hardware-based, with a digital-style RF circuit design such as its all-digital phase locked loop (PLL), to achieve a low power consumption of less than 4mW/20mW (Tx/Rx), which it claims is up to 10 times better than todays implementations. The second is software-based enhancements which utilize machine learning based error correction algorithms to allow less than 10cm ranging accuracy in challenging environments.

Explaining the context imec said ultra-wideband technology is currently well suited to support a variety of high accuracy and secure wireless ranging use-cases, such as the smart lock solutions commonly being applied in automotive; it automatically unlocks a cars doors as its owner approaches, while locking the car when the owner moves away.

However, despite its benefits such as being inherently more difficult to compromise than some alternatives, its potential has largely remained untapped because of its higher power consumption and larger footprint. Hence imec said the hardware and software innovations it has introduced mark an important step to unlocking the technologys full potential, and opens up the opportunity for micro-localization services beyond the secure keyless access that its been widely promoted for so far, to AR/VR gaming, asset tracking and robotics.

Christian Bachmann, the program manager at imec, said, UWBs power consumption, chip size and associated cost have been prohibitive factors to the technologys adoption, especially when it comes to the deployment of wireless ranging applications. Imecs brand-new UWB chip developments result in a significant reduction of the technologys footprint based on digital-style RF-concepts: we have been able to integrate an entire transceiver including three receivers for angle-of-arrival measurements on an area of less than 1mm.

He added this is when implemented on advanced semiconductor process nodes applicable to IoT sensor node devices. The new chip is also compliant with the new IEEE 802.15.4z standard supported by high-impact industry consortia such as the Car Connectivity Consortium (CCC) and Fine Ranging (FiRa).

Complementing the hardware developments, researchers from IDLab (an imec research group at Ghent University) have come up with software-based enhancements that significantly improve UWBs wireless ranging performance in challenging environments. This is particularly in factories or warehouses where people and machines constantly move around, and with metallic obstacles causing massive reflection all of which impact the quality of UWBs localization and distance measurements.

Using machine learning, it has created smart anchor selection algorithms that detect the (non) line-of-sight between UWB anchors and the mobile devices that are being tracked. Building on that knowledge, the ranging quality is estimated, and ranging errors are corrected. The approach also comes with machine learning features that enable adaptive tuning of the networks physical layer parameters, which allows appropriate steps to then be initiated to mitigate those ranging errors for instance by tuning the anchors radios.

Professor Eli De Poorter from IDLab said, We have already demonstrated an UWB ranging accuracy of better than 10cm in such very challenging industrial environments, which is a factor of two improvement compared to existing approaches. Additionally, while UWB localization use-cases are typically custom-built and often depend on manual configuration, our smart anchor selection software works in any scenario as it runs in the application layer.

Through these adaptive configurations, the next-generation low power and high-accuracy UWB chips can be utilized in a wide range of other applications such as improved contact tracing during epidemics using small and privacy-aware devices.

In fact, imec has already licensed the technology to its spin-off Lopos, which hasreleased a wearable that enables enforcement of Covid-19 social distancingby warning employees through an audible or haptic alarm when they are violating safe distance guidelines while approaching each other.

Choosing UWB instead of Bluetooth, Lopos SafeDistance wearable operates as a standalone solution which weighs 75g and has a battery life of 2-5 days. The UWB-technology based device enables safe, highly accurate (< 15cm error margin) distance measurement. When two wearables approach each other, the exact distance between the devices (which is adjustable) is measured and an alarm is activated when a minimum safety distance is not respected.

Since it is standalone, no personal data is logged and there is no gateway, server or other infrastructure required. Lopos has already ramped up production to meet market demand, with multiple large-scale orders received over the last few weeks from companies active in a wide range of different sectors.

Related Posts:

View original post here:
Machine Learning Takes UWB Localization to the Next Level - Eetasia.com

Read More..

This Bengaluru start-up is using machine learning and IoT to detect the freshness of your fruits and veggies – EdexLive

Srishti Batra and Rubal Chib, Founders, QZense (Pics: Rubal Chib)

While India is one of the largest producers of food crops in the world, a lot of this - 16 per cent to be exact - is wasted every year due to inadequate infrastructure and supply chain management. The cold storages aren't equipped to reduce food wastage even when a large number of India's population goes hungry and the country continues to slip lower in the Global Hunger Index. The need of the hour is some disruptive technology that can address this problem. That is whereQZensecomes in. Founded byRubal ChibandSrishti Batra, this Bengaluru-based start-up has developed a device, using machine learning and IoT, to detect the shelf life and ripeness of agricultural produce.

The start-up has developed two devices, which use the sense of smell and sight to detect the quality of produce. "The devices will study their internal composition and biochemical processes to assess the health of fresh food," says Rubal. The two devices include a handheld scanner and a data logger. "The scanner, called QScan, is portable and can be used to grade and sort the fresh produce. For example, it can tell the retailer about the level of sweetness in fruits. The loggers can be installed in cold storages or in the vehicles transporting produce. It has in-built sensors to detect the gases and compounds produced by the fruits and vegetables. It will alert the user when the rate of degradation is increasing so that the food can be distributed sooner," adds Rubal.

QZense will be accelerated by the Indian School of Business (ISB), Hyderabad's Atal Innovation Centre under their ESTAC programme, which works with and mentors start-ups in the field of agriculture. They will pilot their project with the Government of Punjab, which is set to begin next month. "Under the programme, ISB will mentor agricultural start-ups like us and help improve our model over the next three to four months," says Rubal. Srishti and Rubal first pitched their start-up idea in a Shark Tank-like scenario and received initial funding from Entrepreneur First, a UK-based international talentinvestor.

Rubal hopes that technology will help improve the supply chain and more produce will reach the consumers. "We lose around 14 billion dollars in food waste every year. If storage and grading are made more efficient, this will have a greater economic and social impact," she feels, "A lot of high-grade fruits and vegetables in the supermarkets have been imported since India doesn't have technology and infrastructure to store or grade fresh produce. Technology can improve exports and quality of food supplied in the Indian markets." The duo eventually wants to develop devices for farmers as well for them to understand the right time to harvest their crops.

But this isn't Rubal's first brush with handling a start-up. "I have worked in product development for a multinational company and also with several start-ups in their IoT teams," says Rubal. Her co-founder Srishti has a PhD in computational biology (a field of study that uses machine learning on biological data) and has specifically researched the sense of smell.

Visit link:
This Bengaluru start-up is using machine learning and IoT to detect the freshness of your fruits and veggies - EdexLive

Read More..

CloudBolt Releases Version 9.3 of Its Award-Winning Cloud Management Platform – Container Journal

Available to enterprises now, latest platform release features significant UX enhancements, improved Microsoft Azure support, and new third-party integrations

NORTH BETHESDA, Md., May 28, 2020 (GLOBE NEWSWIRE) CloudBolt Software, the enterprise cloud management platform leader, today announced the general availability of CloudBolt 9.3. Recently namedBest Cloud Management Solutionby the 2020 SIIA CODiE Awards, this platform release builds on the companys promise of delivering unparalleled time-to-value for enterprise IT and developers. New features in this release include improved user navigation, expanded support for Microsoft Azure, and deep integrations with Veeam, SolarWinds, and Cisco UCS.

We continue to listen to our customers and enhance the cloud management platform of their choice with updates to address their pain points, said Rick Kilcoyne, chief product officer of CloudBolt. The significant increase in 9.3s self-service capabilities, accelerated networking and provisioning, new integrations with multiple in-demand platforms, and elimination of many manual processes empower CloudBolt users to better allocate resources to drive more business value. 9.3 continues CloudBolts tradition of always innovating and adapting with the needs of our users top of mind.

The CloudBolt platform already supports management of 20+ private and public cloud environments through a single pane of glass, accelerates workload delivery with self-service provisioning, and enables consistent, standardized governance through centralized automation and orchestration. The new features and capabilities in the 9.3 release build on this solid foundation to address a wide range of cloud management challenges. These new capabilities include:

Try CloudBolt 9.3 Now

CloudBolt 9.3 is now generally available.Download CloudBoltfor free, learn more aboutCloudBolt 9, or contact your customer success manager to upgrade to CloudBolt 9.3.

About CloudBolt

CloudBolt is the leading cloud management platform for the enterprise. Deployed in minutes, CloudBolt helps IT unify orchestration and automate provisioning of their hybrid cloud resourcesquickly, cost-effectively, and securelywhile providing developers with anywhere, anytime access to those resources through a self-service catalog. Today, CloudBolt is deployed in the worlds largest enterprises, across all industries including financial services, government, healthcare, manufacturing, retail, technology services, and more. For more information, visitwww.cloudbolt.io.

P

Related

Read more:
CloudBolt Releases Version 9.3 of Its Award-Winning Cloud Management Platform - Container Journal

Read More..

Kaminario offers cut-price virtual SAN in the cloud – ComputerWeekly.com

Flash storage pioneer turned software-defined storage specialist Kaminario has taken its SAN storage capability to the cloud.

Its VisionOS, which can build a server and its shelves of flash drives into a SAN pool, is now available as a virtual offering on the big three cloud providers: Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP).

And it is much cheaper than the native block storage offered by the big three, the company said.

Our Flex orchestrator and Clarity predictive analytics take charge of the online storage pool as if they were on-site. It makes it trivial to upload data to the cloud and even to move it from one cloud to another, said Kaminario CEO Dani Golan to ComputerWeekly.coms French sister site LeMagIT during an event that formed part of the IT Press Tour.

According to Kaminario, having storage arrays function in hybrid mode allows for rapid scaling to the cloud when theres a need to burst capacity beyond the datacentre.

It also makes it easy to rapidly put datacentre-developed applications on the internet. These include those with block-based storage needs such as databases and legacy applications in virtual machine format that havent been refactored to the cloud.

Kaminarios big selling point is that,for upwards of 100TB (terabytes) of capacity, its virtual SANs in the cloud come in on average 30% cheaper than the block storage services offered by the cloud giants themselves.

The benefit of our pricing comes from the thin provisioning in VisionOS you only pay for what you use and not for what you reserve, said Kaminario chief technology officer (CTO) Derek Swanson.

He was keen to point out that thin provisioning amounts to over-allocating storage. Users believe they have access to a certain capacity, but thats actually only allocated to them gradually, as they write data to it.

In addition, Kaminario makes snapshots of these cloud holdings, but pointed out they are heavily compressed to occupy less space.

According to the vendors presentation, using Kaminarios cloud SAN will cost less than one-third what it would from the big three cloud providers.

Using virtual disk in the cloud and reserving 256TB would cost $70,500 per month, plus $9,500 per month for associated snapshots, with those providers. To do the same with Kaminario, it said, would cost $20,000 per month all-in.

Commercially speaking, Kaminarios hybrid cloud will take the form of a new offering called Cloud Data Platform with automated cloud migration functionality.

But the catalogue is rather confusing. It is possible that what we are talking here about Data Pods in the Public Cloud function and that Cloud Data Platform is the new name of the global offering. This has been called Data Plane Virtualisation in recent weeks, Composable Storage last year and even Cloud Fabric the year before that.

In the world of storage, other suppliers also offer their arrays as virtual instances in the cloud, but none follow quite the same model.

Pure Storage, with its Cloud Block Store (only on AWS) is the closest. Meanwhile, NetApp offers NAS functionality on AWS, Azure and GCP. Dell EMC is set to offer its new PowerStore arrays as virtual instances but may, as it has done with its Unity VSA arrays, confine them to private cloud use.

Link:
Kaminario offers cut-price virtual SAN in the cloud - ComputerWeekly.com

Read More..

4 types of mobile security models and how they work – TechTarget

Organizations have become increasingly reliant on mobile security vendors to protect devices, and there are several types of mobile security approaches that can help them optimize their mobile defense.

The first line of defense in keeping malware off mobile devices is to use approved app stores for iOS and Android. However, even mobile apps in legitimate app stores can harbor malware. Apple Store and Google Play are battling to keep these malicious apps out of their stores, but administrators can minimize their risk by limiting unknown mobile downloads from users.

Organizations should also deploy a managed environment from an enterprise mobility management or unified endpoint management platform that helps administrators address the basic security profiles of mobile devices.

These profiles enable IT to install a mobile security agent on a device. IT can also activate embedded enhanced security tools that may be available on the device itself, such as Samsung Knox in the Android Enterprise program.

Deploying an add-on mobile-specific security tool from a variety of vendors -- such as Lookout, BlackBerry Cylance, Zimperium and Symantec -- can provide additional defense against malware. No mobile security tool is 100% effective, but they are an important step given how much sensitive corporate data is available on mobile devices these days.

There are four different types of mobile security models used by vendors.

The traditional signature file antivirus model creates a signature file on the device that all apps and documents are compared to. This doesn't work very well for mobile devices, however. Today, many organizations employ the hybrid-AI approach noted below.

This type of mobile security tool studies the files users download and install on their devices. It's a similar model to search engines where the community contributes samples that improve the overall experience.

No mobile security tool is 100% effective, but they are an important step given how much sensitive corporate data is available on mobile devices these days.

Analyzing these files and applications in the cloud helps security tools identify the warning signs of malicious intent. Once AI identifies any malicious files, it prevents users from downloading and opening them. The tools enforce these policies through a local app that updates with the latest information about the safety of files.

This cloud-based analysis approach works very well for mobile devices because it doesn't require large amounts of local processing. With relatively fast connections, the lag in checking a file type against the files on a cloud server is minimal.

However, this type of mobile security approach isn't great at finding zero-day attacks due to the time lag inherent with gathering data, testing and returning intelligence to the on-device agent. The next type of security model also uses the cloud and essentially acts as an intermediary service.

Under this model, any files a user receives or downloads to the device are automatically uploaded to the cloud service for testing and comparison to determine if they're malware or security threats. The files are loaded to the device only if these files are approved.

This intermediary approach also works well for mobile devices, but it can sometimes cause a lag in performance if the mobile devices are on a slow network. Fortunately, the general availability of fast 4G, 5G and LTE makes this less of an issue.

For mobile security vendors, this approach means they can run very fast and extensive processes on high-powered cloud servers, eliminating the restrictions of on-device resources. The following type of mobile security monitors the behavior of the apps or files on the device.

With this approach, an AI-based preloaded app prevents malicious activity by flagging suspicious behavior. There is still a cloud-based component to this approach; the agent occasionally downloads new suspicious behaviors to flag on the device, but most of the work is done locally.

Mobile behavioral analysis is the best way to find zero-day exploits. This approach uses crowd sourcing to obtain and test files, but it is more behavior-based than the simple penetration testing associated with a traditional signature file antivirus approach.

Many tools are hybrids of these types of mobile security models, and they aren't purely signature-, AI- behavior- or cloud intermediary-based. In fact, many argue that combining models can provide superior security compared to the use of a single model.

Unfortunately, threat actors are becoming more sophisticated even as mobile security applications gain capabilities. Security add-ons should still be a standard practice for users -- especially enterprise users with sensitive corporate data.

Go here to read the rest:
4 types of mobile security models and how they work - TechTarget

Read More..

Increased cybersecurity for the transportation industry – Commercial Carrier Journal

Malicious hackers are always on the lookout for opportunities to launch an attack, and the coronavirus pandemic has provided one.

According to cybersecurity agency Mimecast, transportation was one of the three most targeted sectors by cyberattackers during the first 100 days of the pandemic, and the firm said theres a greater than 95% chance that cyberattacks will increase after the event.

Cybersecurity was a topic of discussion Thursday during CCJs online Symposium, Upshift. Panelists for Breaches & Ransom! Why Hackers Think Fleets are Easy Targets included B-H Transfer Vice President of Administration John Wilson; Matt Cacace, Dasekes senior vice president of business systems; and Bob Verret, Chief Information Office for Dupr Logistics.

This is a very emotional time, Verret of the pandemic, and when youre emotional, you tend to be distracted.

Its a generally accepted concept that a companys greatest cyberthreats come from within, Cacace said.

You and I and others get several emails per day or per week that entice you to click on links to take you to websites where well just say bad things can happen, he said. Anyone with a network has a firewall that is probably attacked several times an hour with various bad actors trying to get into your system.

Wilsons Georgia-based company has been the target of attackers a few times, most recently in February, just as coronavirus made headlines but before anyone knew what lay ahead. The companys anti-virus platform diagnosed and shut down the malware attack before it was able to launch, but Wilson noted the initial attack turned out to only be the first wave.

They decided to wreak a little more havoc the only way they could, he said of the attacker. Somehow, they got into our backup on that one, deleted it, and on the way out turned on Microsofts BitLocker encryption.

In encrypting the carriers files, that effectively wiped the entire server out, Wilson said. We couldnt get on it, of course. We didnt have that 42-bit key. B-H Transfer was able to recover the files with minimal disruption to the operation, but it took almost two weeks to untangle the mess the frustrated hacker left behind.

Partnering with a third-party security provider, which B-H Transfer has done, can be helpful andVerret suggested a layered approach to security that includes monitoring and measuring protocols as things change very rapidly in the environment.

Keeping your own internal people well-educated on awareness that these things are out there and these things can happen and its only a point and click away, Cacace added.

Daseke uses quarterly training and Verret said the company is a firm believer in social engineering, a security layer in which the company sends controlled phony phishing emails that provide instant feedback on employees that need enhanced training.

We basically had a social engineering go out, pretty much, the day after we instituted our work-from-home policy, he said.

Verret said the first step in thwarting a cyberattack is to not click links embedded in emails if theres a reason to suspect the email itself isnt legitimate. Then, contact the IT department or service desk. Never reply to the email. Verret said if the recipient needs to verify the sender, they should call them directly.

A quick and easy-to-implement security layer, Cacace said, is to protect the companys email system via cloud-based service, which distributes a companys email over a number of cloud servers which have a high level of security around them, as opposed to have a server sitting in your own server room, he said.

A replay of the panel discussion, titled Breaches & Ransom! Why Fleets are Easy Targets for Hackers Right Now, will be available for download next week at the following link: http://www.ccjsymposium.com/downloads.

Here is the original post:
Increased cybersecurity for the transportation industry - Commercial Carrier Journal

Read More..

Cloud-Based Firewalls Are Key to Protecting Employees While Working Remotely – Security Boulevard

The business environment has changed due to the global coronavirus pandemic. To combat the spread of this virus, many businesses transitioned their employees from working in office locations to working from home. As businesses have now settled into a new remote-working cadence, internet security remains a high priority, causing IT teams to reconsider their on premises network security deployments and look toward cloud-based solutions.

Traditionally, businesses build their network security infrastructure on premises, allowing them to have more hands-on access to physical hardware or manage internal security policies. With an on premises firewall, the sole responsibility of maintenance and updates fall on internal IT teams or, in some cases, a managed service provider. On premises firewalls are key when employees have a centralized place to meet, work, and collaborate, securing every device connected to the network at a headquarter or branch office. However, now that many businesses have shifted to extending their remote working policies, cloud-based firewalls have increased in popularity. A cloud-based firewall enables organizations to maintain secure and productive Internet connections for their employees while providing remote access to their digital assets.

The benefit of cloud computing is it provides a centralized core for negotiating dozens of endpoints as they interact with the network, improving business agility and scalability. Transitioning to cloud based applications has allowed businesses to have greater flexibility on how information and data is accessed for all employees. With so many employees working remotely, authorized access to corporate applications, company data, and other business tools can be based on VPN connectivity and authorized access, without the limits of being physically tethered to the office.

Just as many employees have transitioned to working from home, deploying IT infrastructure in the cloud allows the IT administrator to also work from anywhere, without having to be on site in the office server room.

Many businesses transitioning to cloud services will need to explore the options of security within the cloud. Deploying a cloud-based next generation firewall in popular cloud service providers, such as Amazon Web Services, Microsoft Azure, or Google Cloud, gives businesses the ability to provide consistent, secure connectivity to employees across the company.

There are a few steps network administrators can take to ensure their cloud-based firewall provides robust connectivity and a secure environment for employees:

Working within the cloud, many vendors offer Firewall-as-a-Service (FWaaS) models for cloud environments. FWaaS provides a simple and flexible architecture to provide connectivity to all employees, no matter where they are working. Employees can leverage centralized policy management, content filtering, malware and threat protection, and other unified threat management capabilities.

It is crucial that network administrators choose a VPN technology that is fast, secure, and can be fully managed. The means, network administrators have more control over VPN profiles, including mobile device management, and can seamlessly connect remote workers without installing software on every end user device.

Adding multi-factor authentication for access to business applications is another layer of security that IT teams can leverage with remote employees. As each employee has to log into their VPN or cloud-based applications, it should be standard policy that a secondary form of identification, usually an SMS text or bio-identifier like a fingerprint, is also used to log in. This secondary form of authentication protects against unauthorized access to the network or the use of stolen credentials.

As the business environment has changed to adapt to the needs of employees during the coronavirus pandemic, it will change further in ways we might not yet be able to predict. Many businesses who may not have considered having employees work outside the office may continue to work this way in the future. Businesses may find that their employees are just as productive, or more so working in this manner. Many businesses may open up their hiring policies to hire more people in different geographical locations in the future. Whether a business decides to continue to function with employees working remotely in the future, or whether all employees ultimately return to the office, a Firewall / Unified Threat Management solution deployed in the cloud will be a robust future proof solution.

Recent Articles By Author

*** This is a Security Bloggers Network syndicated blog from Untangle authored by jjakobsson@yahoo.se. Read the original post at: https://www.untangle.com/inside-untangle/cloud-based-firewalls-are-key-to-protecting-employees-while-working-remotely/

Originally posted here:
Cloud-Based Firewalls Are Key to Protecting Employees While Working Remotely - Security Boulevard

Read More..

Cloud storage 101: File, block and object storage in the cloud – ComputerWeekly.com

Cloud storage is increasingly sophisticated and flexible. The initial appeal of storing data in the cloud was flexibility and cost, and to achieve that, the majority of cloud services based their products around object storage, most famously Amazon Web Services (AWSs) S3.

AWSs use of the term bucket for its cloud-based Simple Storage Service is an excellent metaphor for how it works. Users effectively throw their data in, and AWSs object technology takes care of the rest.

But object storage or at least, object storage in isolation cannot fulfil all an organisations data storage needs, and that has prompted the big three cloud service providers AWS, Microsoft Azure and Google Cloud Platform to introduce an increasingly rich menu of storage options.

These include mainstream storage architectures with file, block and object storage, and services such as archiving and backup.

By fine-tuning their storage offerings, the big three aim to give their customers flexibility as well as a viable alternative to local storage.

Block storage such as Googles Persistent Disk provides an alternative to the datacentre for virtual machine (VM) storage.

Meanwhile, AWSs Elastic File System is an NFS file-based system that can combine cloud and on-premise. Azure also offers cloud-based file shares via SMB.

Each of the three suppliers offers its own flavour of object, block and file. The benefits include application support, a range of performance and price options, and the ability to scale up or down on demand.

Against this, CIOs need to weigh up potential costs. Cloud storage is by no means always cheap, and performance-based storage, in particular, can become expensive. There are also the potential performance hits for moving data into the cloud and the fact that data cannot (yet) be moved seamlessly between the three providers.

The trade-offs between cloud and local storage also depend as much on how an organisation needs to manage its data, as on its choice of platforms.

Microsoft Azure may have a head start among CIOs for its (perceived) support for Windows operating systems, but its file-based storage is multi-platform. Amazon, for its part, offers FSx for Windows File Server, another SMB-based system. Windows, or SMB, compatibility is a useful tool to span storage across local and cloud installations, although it is not the only way to do so.

Storage architectures, too, are less rigid than they were. The large cloud providers, along with a host of smaller, specialist storage companies, are increasingly using hardware or technologies such as software-defined storage to bridge the gap between applications and storage architectures.

Nonetheless, there are still some clear use cases for different cloud storage implementations.

Object storage is the system of choice for archiving, backup and analytics, which are all applications that need to store large volumes of data and where the efficiencies and resilience of object come to the fore.

As performance improves, though, object storage is moving into areas such as the internet of things (IoT), running websites, and potentially enterprise applications. The nature of object storage also makes it easier for suppliers to offer storage tiers based on performance, cost and frequency of access.

Against this, block and file can seem less versatile, although this is not always the case.

Block storage is closely tied to the growth in cloud-based virtual machines, and this is its main use case.

Azure Disk, for example, works with Azure VMs, and comes with performance tiers. Googles Persistent Disk operates in a similar way, with Google Cloud VMs, while Amazons Elastic Block Store (EBS) integrates with Amazons EC2 compute resources. Workloads can move to the cloud, but block storage is not typically shared between cloud and local instances.

Microsoft suggests that its Ultra Disk is suitable for SAP Hana, SQL, Oracle and other IOPS-intensive applications.

File-based storage can give more flexibility about where data is located. Amazons EFS is designed to combine cloud and on-premise volumes, but brings the flexibility of the cloud.

Google and Microsoft have their own take on harnessing file-based storage to bring the elastic nature of the cloud to local applications. An additional mention should go to NetApp, as a storage technology provider with tight and multi-supplier integration with the cloud.

File-based cloud storage is not usually application- (or even OS-) specific. Instead, buyers can choose performance levels to match their capacity and IOPS requirements.

And, although performance for cloud-based file shares is increasing, higher-performance stores will usually cost more.

AWS

File: Amazons Elastic File System (EFS) is an NFS-based file system that operates on cloud and local storage. AWS provides this as a Standard storage class and EFS IA (infrequent access). EFS throughput is more than 10GBps. FSx For Windows File Server is storage dedicated to that platform.

Block: Elastic Block Store works with Amazon Elastic Compute Cloud. General purpose SSD volumes offer a base performance of 3 IOPS/GB. Provisioned IOPS SSD volumes support up to 64,000 IOPS and 1,000MBps throughput.

Object: S3 is AWSs object storage offering with a claimed 11 nines availability.

Azure

File: Azure Files uses SMB and allows concurrent file share mounting in the cloud or on premise. Support for Windows, Linux and MacOS. Maximum storage capacity is 4PB, ingress 25Gbps and egress 50Gbps.

Block: Azure Disk provides managed disks for Azure virtual machines, with five nines availability and a maximum disk size of 65,536GB for Ultra disk, with 160,000 down to 32,76GB for standard disk, with 2,000 IOPS.

Object: Azure Blob offers petabyte-scale object storage with 16 nines availability.

Google Cloud Platform

File: Cloud Filestore provides NAS for Google Compute Engine and Kubernetes Engines, with storage offered as standard and premium. Standard ranges from 1TB to 10+TB with 1000 IOPS and 180MBps read throughput for 10+TB systems. Premium starts at 3.5+TB with a read throughput of 1.2GBps and 60,000 IOPS.

Block: Persistent disk block storage runs up to 64TB and offers standard persistent disks, persistent SSDs, and local SSDs and NVMe storage. Write IOPS range from 15,000 to 30,000 and read IOPS from 15,000 to 100,000.

Object: Google object or blob storage provides different locations based on performance and redundancy requirements. The main storage tiers are Standard, Nearline, Coldline and Archive. GCPs Object Lifecycle Management tool automatically moves storage to a lower-cost tier, according to user-specified rules.

Cloud services need not work in isolation. The main suppliers are also adding hardware options, to allow data to span local and cloud locations and to help with data migration.

Amazon offers its Snow range, from the portable Snowball Edge device, which supports up to either 42TB of block or object storage or 80TB for data transfer, to Snowmobile, which comes in a 45ft shipping container. AWS Outposts is its hybrid offering.

Google also offers a transfer service, and Anthos for data storage, although the supplier also works with a number of third parties, including Komprise for hybrid cloud management.

Microsoft provides ARC and Stack as building blocks for hybrid cloud, and data migration. On-premise Kubernetes clusters and Azure data services can both be managed from Azure.

See the original post:
Cloud storage 101: File, block and object storage in the cloud - ComputerWeekly.com

Read More..

Cloud Transition During the COVID-19 Exposing the Enterprise Vulnerabilities – EnterpriseTalk

Why is cloud ERP going to be the preferred solution in low business times?

Cloud ERP software is going to be the preferred solution in low business times because it brings a predictable cost model for operating ERP software. With the cloud, IT expenses to move from capital expenses to operational expenses. The cost of maintaining servers, other hardware, disaster recovery, back-ups, even keeping the air-conditioning running in the server room go away. Once that predictable cost model is in place, distributors benefit from greater efficiency as their IT resources can spend more time prioritizing the business and driving real strategic value, rather than getting stuck in administrative tasks. IT teams dont have to spend time worrying about an expensive server replacement looming ahead.

Without Intelligent Automation, 60% of the Automation Dreams Will Turn into Nightmares

By standardizing technology investments in the cloud with a few or single trusted service providers, distributors simplify their application and infrastructure strategy to one that is able to scale as required by business needs.

Some of our distributors have had to deal with several vendors for their hardware and their applications to manage their ERP operations. With the cloud, they can replace them with a single enterprise solution- giving them one hand to shake.

Letting an expert service provider manage the administrative aspects of running IT, keeping systems updated, and keeping the business current with the latest technologies, means their IT team can refocus on the highest value business projects. Distributors that choose cloud deployed ERP solutions will be the ones that can stay focused through industry change, and maintain an advantage against competitors who would otherwise get distracted.

AI and Automation Enabling Remote Working During the COVID-19 Crisis

Furthermore, Epicor recently interviewed over 2,000 professionals in our ecosystem as part of the Epicor 2019 Global Growth Index survey and found 84% saw the cloud as playing an essential role in their growth strategy, 90% run cloud applications today (with 31% saying they use cloud significantly), and 92% are planning to invest in cloud applications this year. When looking at industry trends like this, its clear that the cloud is here, and distributors see it as the type of investment that can generate quantifiable returns.

Will the upgrade of Prophet 21 provide added security functionalities since that seems to be the biggest enterprise challenge today?

We had customers come to us saying, Our servers are at end-of-life, so we need to replace them. Id rather avoid the cost. Im also worried about securing them. By upgrading to a cloud environment, companies are reducing the cost and risk of data loss, compliance, and overall cybersecurity with capabilities like antimalware, 247 system monitoring, powerful threat intelligence, best-practice backup, disaster recovery practices, and high-quality solutions. This is to ensure business continuity, and in the event of a component failure, they can recover their data quickly and minimize disruption. Today this is a must-have.

In the current mass remote working scenario, how does a cloud ERP solution help in higher efficiencies?

Given the need today for remote work or wherever a distributors team is, they need reliable and secure communication tools to drive business continuity and rapidly respond, especially to customers or suppliers that are critical or essential to the business. Having a cloud-based ERP that runs in a browser from any device, from anywhere, without the hassle of a VPN, is important to a businesss future-proof strategy.

Cloud-based ERP solutions provide real-time availability of data, but how do they assure the security of that data? How does azure help?

Some of our on-premises customers have shared that they have been hit by ransomware, or they know that their competitors and suppliers have been. They come to us telling us they need help to protect their systems better.

IoT How to Utilize it for Successful Business Operations?

Just recently, weve seen that in times of economic and business uncertainty, cybercriminals are taking full advantage of the situation. If you dont have adequate security measures in place, you are vulnerable. In fact, one of the most popular ways that cybercriminals will infiltrate an organization is through email. Phishing is widely cited as the most popular cyber-attack, and if your company runs its email on the same servers or network as your business applications, that is the perfect highway for a hacker to get in and bring down your business. VPNs are even proven to be vulnerable. You need a smart isolation strategy that separates your business applications like ERP software, from your email.

The rest is here:
Cloud Transition During the COVID-19 Exposing the Enterprise Vulnerabilities - EnterpriseTalk

Read More..

The Role of Artificial Intelligence in Ethical Hacking | EC-Council Official Blog – EC-Council Blog

Artificial intelligence has influenced every aspect of our daily lives. Nowadays,thousands of tech companies have developed state-of-the-art AI-powered cybersecurity defense solutions specifically designed and programmed by ethical hackers and penetration testers. The Artificial Intelligence used in such solutions helps prevent cyberattacks from even happening by predicting the potential risks.

Every tech app or service we use contains at least some type of Artificial Intelligence or smart learning technology, at least in most cases. It is now of a high possibility of connecting almost every electrical device to the internet to create our own personalized smart environments, all thanks to the recently announced 5th generation speed networks and rapid advancement in machine learning. In order to improve the overall efficiency and performance of the tasks these IoT devices are set to, they have to communicate and exchange information with each other repeatedly.

With the use of AI, most of the tasks are automated, and these AI-powered apps are used in every sector like healthcare, education, military, etc. The data from these smart devices is collected from a set of sensors such as heat, light, weight, speed, or noise. The machine learning technology is directly connected with the security of digital devices and our data/information. There has been an extensive progression in the artificial intelligence sector. And in todays modern age, where all our devices are connected either to the internet or some other modes of networks, the risks of security issues and the need for Artificial Intelligence solutions have skyrocketed.

Different Artificial Intelligence solutions help when our devices are involved in heavy communication under the connection of networks, automatically sending our data securely to the remote cloud servers where all the data and information are gathered and analyzed by the robotic process in order to understand, visualize and extract useful information. Now the challenge arises in safely sending this confidential data to servers as there are many potential threats and risks of hackers stealing this data, which can, in turn, lead a device to be used illegitimately, leaving a privacy risk. Therefore, we must have a way of securing these devices and overcoming these risks in the form of a solution that involves high usage of AI-powered applications.

Since we all use the web regularly, the most common medium we use to access it is an internet browser. And cybercrooks, due to their malicious nature, have found several mechanisms to deceive the innocent and unsuspecting users into providing sensitive information through phishing. This method works when a cybercrook makes a fake SMS, video, phone call, or shopping site that offers goods, products, or services at very unbelievable prices. But when a user enters their personal information, like credit card or other payment information, it goes straight into the hands of web-hackers who then use this for their very own personal usage. Then the innocent buyer never receives anything that they ordered. However, cyber professionals have deemed artificial intelligence as a countermeasure for this hacking method. The AI-powered web-based filters and firewall applications are now available that upon deployment on a users device like their computer;it protects the users by now even letting the user open a website that raises flags of a little bit of insecure and suspicious. Machine learning coded into Artificial Intelligence helps learn the new patterns of scams over time, and these AI-powered firewalls learn automatically new ways to protect users against advanced cyber risks. When users install these anti-scams firewalls into their digital devices like mobile phones, then the chances of phishing related scams are extremely reduced.

Data leaks and identity theft nowadays are on the rise, as the passing time has very much revealed the shocking fact that the number of such cyber-attacks is only increasing over time. As humans, we are not perfect, and we also keep forgetting very important things in our lives. The same goes for when it comes to the protection of data/information like our passwords for our different accounts, including social media, bank accounts, and so on. Since we keep the usage of the same passwords for too long that the chances of it being break/cracked by cyber-crooks increase. Or simply sometimes we keep a device logged-in with our info, and someone else physically takes the device and can see our private information. But with the use and implementation of AI, this problem is hugely reduced as Artificial Intelligence automatically determines that a password of an account is being used for too long, and it is time to change, keeping the user reminding that changing-passcodes regularly is vital for information-safeguarding. Similarly, if an account is open and someone tries to change, edit or modify info/data the Artificial Intelligence parameters are automatically triggered that asks the users to re-verify their passcodes, hence protecting the user from ID/data theft

Lets face it, everyone uses the internet, and for using the internet we need a web-browser. Its common knowledge that there are billions of people who use the internet everyday and for hours. We use browsers on every device we own no matter its our smartphone, tab, laptops. The Internet is a crucial part of our lifestyle; there is no denying this fact. However, Artificial Intelligence only has the power to predict potential cybersecurity risks and take feasible countermeasures and to block them even before time. However, practicing privacy enhancement methods plays a vital role in developing secure habits that can save us, users from any malicious attack attempt on our IoT devices. Obtaining the EC-Council Certified Ethical Hacker (CEH) Certification would give you the critical base-knowledge of implementing Artificial Intelligence into a cybersecurity environment.

FAQs

How does Artificial Intelligence help cyber security?

Read more: https://becominghuman.ai/why-you-should-use-artificial-intelligence-in-cybersecurity-204dbe33326c

Will Artificial Intelligence take over cyber security?

Read more: https://www.circadence.com/blog/will-artificial-intelligence-replace-cyber-security-jobs/

What is the future for cyber security?

The ability to leverage machine learning and artificial intelligence is the future of cybersecurity. There is no doubt Artificial Intelligence can become the future of security. Data is exponentially increasing. Automation and machine learning have catapulted us beyond the limitations of human skill.

Read more: https://www.disruptordaily.com/future-of-cybersecurity/

Read the original here:
The Role of Artificial Intelligence in Ethical Hacking | EC-Council Official Blog - EC-Council Blog

Read More..