Page 3,656«..1020..3,6553,6563,6573,658..3,6703,680..»

Cloud Native Computing Foundation Announces Helm Graduation | State – thepress.net

SAN FRANCISCO, April 30, 2020 /PRNewswire/ --The Cloud Native Computing Foundation (CNCF), which builds sustainable ecosystems for cloud native software, today announced that Helm is the tenth project to graduate. To move from the maturity level of incubation to graduation, projects must demonstrate thriving adoption, an open governance process, and a strong commitment to community, sustainability, and inclusivity.

Helmis a package manager that provides an easy way to find, share, and use software built for Kubernetes. The project uses a packaging format called charts, which are a collection of files that describe a related set of Kubernetes resources. It is used in production by a variety of organizations, including AT&T, Bitnami, CERN, Conde Nast, Microsoft, VMWare, and many others. Since its inception, there have been more than 13,000 contributions representing over 1,500 companies to the Helm project.

"Because of its close ties to the Kubernetes community, Helm has been involved with CNCF since the foundation was created," said Chris Aniszczyk, CTO/COO of the Cloud Native Computing Foundation. "Since joining CNCF as an independent project outside of Kubernetes and with their recent v3 release last year, the project has proven to be incredibly popular with end users by lowering the barrier of entry to install and manage software in Kubernetes."

Helm was created in 2015 at Deis, which was later acquired by Microsoft. What is now known as Helm classic was introduced at the inaugural KubeCon that November.In 2016, the Helm team joined forces with Google, Skippbox, and Bitnami to produce Helm 2, which defined a workflow for creating, installing, and managing Helm charts. In June 2018, Helm joined CNCF as an incubating project. The Helm Hub was launched in late 2018 as a centralized home for Helm charts and today sees more than hundreds of millions of downloads a month. Late last year, the Helm team released Helm 3, which builds upon the Helm 2 workflow, changing the underlying infrastructure to reflect the needs of the community as they change and evolve.

"When we set out to build Helm, we had two goals in mind," said Matt Butcher, principal software development engineer at Microsoft and Helm maintainer. "First, make it easy for Kubernetes newcomers to get started deploying cloud native applications. Second, provide a package manager that can scale with enterprise needs. With today's graduation announcement, we're happy to see how these two goals have been fulfilled on a larger scale than we ever imagined!"

Across Helm and all its sub-projects, there are 28 active maintainers from 16 different organizations, including Blood Orange, IBM, Microsoft, Samsung SDS, and more. The project also has more than 30,000 GitHub stars, and receives close to 2 million downloads in a month from across the globe.

"We're absolutely thrilled to hear about Helm's graduation," said Matt Fisher, software engineer at Microsoft and Helm maintainer. "We've accomplished so much together as a community over the last four and a half years. Helm was built with the goal to help teams collaborate together, share their experiences with the Kubernetes community, and discover new ways of accomplishing tasks with Kubernetes. We're really proud of the work we've done up to this point, and look forward to the work ahead of us."

CNCF recently funded an open source, third-party security audit of Helm 3, which concluded that Helm is "recommended for public deployment," and did not pose significant security risks.

"Throughout my time at Cond Nast and American Express, Helm has swiftly become the de facto package manager to Kubernetes," said Katie Gamanji, CNCF TOC member and cloud platform engineer at American Express. "It is a highly customizable tool and it abstracts the application deployment to a simple configuration file. I am excited to see Helm as a graduated CNCF project, as it is a mechanism that sustains open collaboration and closes the gap between the application and infrastructure teams."

"Helm has empowered our developer teams to leverage our on-premise multi-tenant Kubernetes installation in a big way," said Nick Shine, technology engineer at State Farm. "With the power of Helm and a GitLab CI Runner Helm Chart, developers were able to take control of and manage their own CICD infrastructure in a single command without the overhead and redundancy of every team becoming experts in Kubernetes. Our internal Helm Chart Repository has grown from just a few charts, customized to comply with our security policies, to almost 40, providing developer teams with a wider range of tools, databases, and language choices than ever before."

"Helm is a fantastic tool for Kubernetes application deployment," said Liying Zhang, product manager, JD Retail. "We recently started to use Helm for deploying our ChubaoFS cluster on JD's Kubernetes platform, where it has helped to reduce the deployment time from several hours to a few minutes. In addition to ChubaoFS, we also use Helm to manage many other charts including ectd, grafana, MySQL, zookeeper, etc. I'm thrilled to see Helm graduate, and hope this project becomes increasingly active and benefits more users."

To officially graduate from incubating status, the project has adopted the CNCF Code of Conduct. It has also defined transparent open governanceand has a security assurance case, part of the requirements for CII Silver level, that did not find any issues.

For more about Helm, please visit https://github.com/helm/helm.

Additional Resources

About Cloud Native Computing Foundation

Cloud native computing empowers organizations to build and run scalable applications with an open source software stack in public, private, and hybrid clouds. The Cloud Native Computing Foundation (CNCF) hosts critical components of the global technology infrastructure, including Kubernetes, Prometheus, and Envoy. CNCF brings together the industry's top developers, end users, and vendors, and runs the largest open source developer conferences in the world. Supported by more than 500 members, including the world's largest cloud computing and software companies, as well as over 200 innovative startups, CNCF is part of the nonprofit Linux Foundation. For more information, please visit http://www.cncf.io.

The Linux Foundation has registered trademarks and uses trademarks. For a list of trademarks of The Linux Foundation, please see our trademark usage page. Linux is a registered trademark of Linus Torvalds.

Media ContactJessie Adams-ShoreThe Linux FoundationPR@CNCF.io

See the rest here:
Cloud Native Computing Foundation Announces Helm Graduation | State - thepress.net

Read More..

Cryo-EM in the Cloud – AZoM

In this interview, AZoM talks to Michael Cianfrocco, Ph.D., a Research Assistant Professor at the University of Michigan, about Cryo-EM images being held in the cloud.

Ive been doing cryo-EM (cryo-electron microscopy) since 2007 when I started as a graduate student with Eva Nogales at Berkeley. I began by using T12 Spirit and Tecnai F20 S/TEMs with film but eventually graduated to CCD (charge-coupled device) detectors and have just moved forward since then.

Yeah, in grad school I mostly just did a lot of cryo-EM grid freezing and imaging analysis. At the end I felt like I needed to pick a biological system to focus on, but I also wanted to keep doing cryo-EM. Thats why I ended up doing a joint postdoc with Samara Reck-Peterson and Andres Leschziner at UC San Diego, since I could keep using electron microscopy.

Thats really when I first bumped into the computing bottlenecks of cryo-EM. Computing access was pretty variable as we were spread between different computing clusters, all of which had their own queuing times. We just didnt want to be in that situation. Thats when we realized the potential that cloud computing had, and I sort of became the cloud guy since then.

In essence, we study how things move inside of the cell. We want to understand how our motor proteins know when to start, stop and sustain transport along with the cellular skeleton (i.e. microtubules).

As Ive done workshops on cryo-EM, Ive realized that the biggest hurdle for new users is oftentimes the very first steps; they need to know if their protein is behaving properly on the grid, what's actually a particle in the micrograph, if the CTF (contrast transfer function) is good, etc. and all these things could really be compressed down into a single step.

Ive had people in our facility who would say; I have a protein and a nanodisc, how do I know if the protein is in my nanodisc? Since theyre new to cryo-EM theyre just fiddling with everything and getting the answer might take a week or two. It's going to take them so long, and it should just be something they get in a couple of hours.

So, it feels like, right now, what we need most is to capture all of the expertise in the heads of people like me, who have been doing cryo-EM for a while, and convert that into algorithms for deep learning. It would essentially be a collection of user choices regarding the data and the microscope; which micrographs are good or bad, which particles, which class averages, etc. We just need to make that into somewhat of a black box for new users; then, as they learn, they can start changing more of these parameters with their increased expertise.

Coming from these introductory workshops that I run, this increased accessibility is definitely the thing thats most critical for us going forward.

For those that want to learn more about the cloud computing tools available for cryoEM, we have recently published a paper in the Journal of Structural Biology on a software platform for submitting cryo-EM jobs directly to Amazon Web Services. (Read: cryoem-cloud-tools: A software platform to deploy and manage cryo-EM jobs in the cloud) Additionally, readers can learn more about the cloud-computing-based workshops we have hosted at the University of Michigan on the U-M website. (Read: Scientists get hands-on experience with cryo-EM data tools at U-M workshop)

More details, in general, can be found on our group website.

Michael Cianfrocco, Ph.D. is a Research Assistant Professor at the University of Michigan Life Sciences Institute as well as an Assistant Professor at the Department of Biological Chemistry, University of Michigan Medical School. We sat down with him at the 2019 American Crystallography Association Annual Meeting to discuss his background with EM and what he hopes to see in the future of the technique.

Disclaimer: The views expressed here are those of the interviewee and do not necessarily represent the views of AZoM.com Limited (T/A) AZoNetwork, the owner and operator of this website. This disclaimer forms part of the Terms and Conditions of use of this website.

View original post here:
Cryo-EM in the Cloud - AZoM

Read More..

Cloud Computing in Retail Banking Market to Witness Rapid Growth by 2026 Top Key Players Amazon Web Services (AWS), Ellie Mae, IBM, Infosys, Intuit -…

Cloud Computing in Retail Banking Marketreport focused on the comprehensive analysis of current and future prospects of the Cloud Computing in Retail Banking industry. This report is a consolidation of primary and secondary research, which provides market size, share, dynamics, and forecast for various segments and sub-segments considering the macro and micro environmental factors. An in-depth analysis of past trends, future trends, demographics, technological advancements, and regulatory requirements for the Cloud Computing in Retail Banking market has been done in order to calculate the growth rates for each segment and sub-segments.

Get Sample Copy of this report @:

https://www.a2zmarketresearch.com/sample?reportId=238724

Top Key Vendors of this Market are:

Amazon Web Services (AWS), Ellie Mae, IBM, Infosys, Intuit, Medidata, Microsoft, Oracle, Salesforce, SAP, TCS, Veeva Systems, Wipro, Workday, BBVA, Bankinter, Intel, Google, Alibaba, Tencent, Kingsoft, Ucloud, Baidu, Huawei, China Telecom, China Unicom.

Various factors are responsible for the markets growth trajectory, which are studied at length in the report. In addition, the report lists down the restraints that are posing threat to the global Cloud Computing in Retail Banking market. It also gauges the bargaining power of suppliers and buyers, threat from new entrants and product substitute, and the degree of competition prevailing in the market. The influence of the latest government guidelines is also analyzed in detail in the report. It studies the Cloud Computing in Retail Banking markets trajectory between forecast periods.

The report provides insights on the following pointers:

Market Penetration:Comprehensive information on the product portfolios of the top players in the Cloud Computing in Retail Banking market.

Product Development/Innovation:Detailed insights on the upcoming technologies, R&D activities, and product launches in the market.

Competitive Assessment: In-depth assessment of the market strategies, geographic and business segments of the leading players in the market.

Market Development:Comprehensive information about emerging markets. This report analyzes the market for various segments across geographies.

Market Diversification:Exhaustive information about new products, untapped geographies, recent developments, and investments in the Cloud Computing in Retail Banking market.

Get Exclusive Discount Upto 30% on this Report @:

https://www.a2zmarketresearch.com/discount?reportId=238724

The report summarized the high revenue that has been generated across locations like, North America, Japan, Europe, Asia, and India along with the facts and figures of Cloud Computing in Retail Banking market. It focuses on the major points, which are necessary to make positive impacts on the market policies, international transactions, speculation, and supply demand in the global market.

Global Cloud Computing in Retail Banking Market Segmentation:

Segmentation by Type:

Public CloudsPrivate CloudsHybrid Clouds

Segmentation by Application:

PersonalFamilySmall and Medium-Sized Enterprises (SMES)

Table of Contents

Global Cloud Computing in Retail Banking Market Research Report 2020 2026

Chapter 1 Cloud Computing in Retail Banking Market Overview

Chapter 2 Global Economic Impact on Industry

Chapter 3 Global Market Competition by Manufacturers

Chapter 4 Global Production, Revenue (Value) by Region

Chapter 5 Global Supply (Production), Consumption, Export, Import by Regions

Chapter 6 Global Production, Revenue (Value), Price Trend by Type

Chapter 7 Global Market Analysis by Application

Chapter 8 Manufacturing Cost Analysis

Chapter 9 Industrial Chain, Sourcing Strategy and Downstream Buyers

Chapter 10 Marketing Strategy Analysis, Distributors/Traders

Chapter 11 Market Effect Factors Analysis

Chapter 12 Global Cloud Computing in Retail Banking Market Forecast

For more Information, Inquire @:

https://www.a2zmarketresearch.com/enquiry?reportId=238724

If you have any special requirements, please let us know and we will offer you the report as you want.

Here is the original post:
Cloud Computing in Retail Banking Market to Witness Rapid Growth by 2026 Top Key Players Amazon Web Services (AWS), Ellie Mae, IBM, Infosys, Intuit -...

Read More..

Global Healthcare Cloud Computing Market Size, Share, Growth, Revenue, Global Industry Analysis and Future Demand And Forecast To 2020-2026 – Cole of…

The research report on Healthcare Cloud Computing Market provides comprehensive analysis on market status and development pattern, including types, applications, rising technology and region. Healthcare Cloud Computing Market report covers the present and past market scenarios, market development patterns, and is likely to proceed with a continuing development over the forecast period. The report covers all information on the global and regional markets including historic and future trends for market demand, size, trading, supply, competitors, and prices as well as global predominant vendors information.

Get Sample copy: https://www.reportspedia.com/report/semiconductor-and-electronics/global-healthcare-cloud-computing-industry-market-research-report/10276 #request_sample

This market research report on the Healthcare Cloud Computing Market is an all-inclusive study of the business sectors up-to-date outlines, industry enhancement drivers, and manacles. It provides market projections for the coming years. It contains an analysis of late augmentations in innovation, Porters five force model analysis and progressive profiles of hand-picked industry competitors. The report additionally formulates a survey of minor and full-scale factors charging for the new applicants in the market and the ones as of now in the market along with a systematic value chain exploration.

An outline of the manufacturers active within the Healthcare Cloud Computing Market, consisting of

EMCEpic SystemsCleardata NetworksMicrosoftAthenahealthAllscripts Healthcare SolutionsVmwareCarestream HealthSAPNextGen Healthcare Information SystemsOracleAppNetaIBMNetappSiemensVerizonCisco SystemsHP HealthcarePhilips HealthcareRackspace HostingNTT DataCareCloudIron MountainNapier HealthcareGoogleUnitedHealth GroupGE HealthcareAppleMEDITECHMerge HealthcareCernerCovisintNetsuiteAWSAgfa HealthcareDellGNAX HealthSalesforceCognizant Technology Solutions

The Healthcare Cloud Computing Market Segmentation by Type:

PrivatePublic

The Healthcare Cloud Computing Market Segmentation by Application:

PACSEMRCPOERCMClaims Management

Market Segment by Regions, regional analysis covers

Get Upto 40% discount on this report Click Here @ https://www.reportspedia.com/discount_inquiry/discount/ 10276

The competitive landscape of the Healthcare Cloud Computing Market is discussed in the report, including the market share and new orders market share by company. The report profiles some of the leading players in the global market for the purpose of an in-depth study of the challenges faced by the industry as well as the growth opportunities in the market. The report also discusses the strategies implemented by the key companies to maintain their hold on the industry. The business overview and financial overview of each of the companies have been analyzed.

This report provide wide-ranging analysis of the impact of these advancements on the markets future growth, wide-ranging analysis of these extensions on the markets future growth. The research report studies the market in a detailed manner by explaining the key facets of the market that are foreseeable to have a countable stimulus on its developing extrapolations over the forecast period.

Key questions answered in this research report:

Table of Contents:

Global Healthcare Cloud Computing Market Research Report

Chapter 1 Healthcare Cloud Computing Market Overview

Chapter 2 Global Economic Impact on Industry

Chapter 3 Global Market Competition by Manufacturers

Chapter 4 Global Production, Revenue (Value) by Region

Chapter 5 Global Supply (Production), Consumption, Export, Import by Regions

Chapter 6 Global Production, Revenue (Value), Price Trend by Type

Chapter 7 Global Market Analysis by Application

Chapter 8 Manufacturing Cost Analysis

.CONTINUED FOR TOC

Get Full Table of content @ https://www.reportspedia.com/report/semiconductor-and-electronics/global-healthcare-cloud-computing-industry-market-research-report/10276 #table_of_contents

If you have any special requirements, please let us know and we will offer you the report as you want.

Read the original here:
Global Healthcare Cloud Computing Market Size, Share, Growth, Revenue, Global Industry Analysis and Future Demand And Forecast To 2020-2026 - Cole of...

Read More..

Cloud Computing Data Center IT Asset Disposition (ITAD) Market Forecast 2020-2027 (impact of COVID-19) with Top Key Players- AMI, Iron Mountain,…

Cloud Computing Data Center IT Asset Disposition (ITAD):

The GlobalCloud Computing Data Center IT Asset Disposition (ITAD) Marketreport mainly elaborates market size, share, trends, and growth analysis on the basis of different parameters. The Global Cloud Computing Data Center IT Asset Disposition (ITAD) Industry analysis is provided for the international markets including development trends, competitive landscape analysis, and key regions development status on the definition, types, applications and major players of the Cloud Computing Data Center IT Asset Disposition (ITAD) market in detail.

The report represnts tables and several other graphical data elements, the Cloud Computing Data Center IT Asset Disposition (ITAD) market report makes for an insightful data repository that is a valuable source of direction and guidance for managers, decision makers, business strategists, and all those who are interested in the overall development of the global Cloud Computing Data Center IT Asset Disposition (ITAD) market.

Cloud Computing Data Center IT Asset Disposition (ITAD) Market report 2020 comprises strategically vital information such as compounded annual growth rate, working capital, enterprise value and the book value of major companies operating in the market.

Key players in Global Cloud Computing Data Center IT Asset Disposition (ITAD) market include: AMI, Iron Mountain, CloudBlue, Apto Solutions, Arrow, Tes-Amm, Sims Recycling, and ITRenew

To Know More Detail about Companies/Key players Get sample copy of Cloud Computing Data Center IT Asset Disposition (ITAD) Market2020

Our new sample is updated which correspond in new report showing impact of COVID-19 on Industry

The report scrutinizes different business approaches and frameworks that pave the way for success in businesses. The report used Porters five techniques for analyzing theCloud Computing Data Center IT Asset Disposition (ITAD) Market; it also offers the examination of the global market. To make the report more potent and easy to understand, it consists of info graphics and diagrams. Furthermore, it has different policies and development plans which are presented in summary. It analyzes the technical barriers, other issues, and cost-effectiveness affecting the market.

GlobalCloud Computing Data Center IT Asset Disposition (ITAD) MarketResearch Report 2020 carries in-depth case studies on the various countries which are involved in the Cloud Computing Data Center IT Asset Disposition (ITAD) market. The report is segmented according to usage wherever applicable and the report offers all this information for all major countries and associations. It offers an analysis of the technical barriers, other issues, and cost-effectiveness affecting the market. Important contents analyzed and discussed in the report include market size, operation situation, and current & future development trends of the market, market segments, business development, and consumption tendencies. Moreover, the report includes the list of major companies/competitors and their competition data that helps the user to determine their current position in the market and take corrective measures to maintain or increase their share holds.

What questions does the Cloud Computing Data Center IT Asset Disposition (ITAD) market report answer pertaining to the regional reach of the industry?

A short overview of the Cloud Computing Data Center IT Asset Disposition (ITAD) market scope:

Reasons for Buying this Report

TABLE OF CONTENT (get sample for detail TOC):

1 Report Overview

2 Global Growth Trends

3 Market Share by Key Players

4 Breakdown Data by Type and Application

5 United States

6 Europe

7 China

8 Japan

9 Southeast Asia

10 India

11 Central & South America

12 International Players Profiles

13 Market Forecast 2020-2027

14 Analysts Viewpoints/Conclusions

15 Appendix

Get 10% Discount on Cloud Computing Data Center IT Asset Disposition (ITAD) Market 2020

About Us:

Reports and Markets is not just another company in this domain but is a part of a veteran group called Algoro Research Consultants Pvt. Ltd. It offers premium progressive statistical surveying, market research reports, analysis & forecast data for a wide range of sectors both for the government and private agencies all across the world. The database of the company is updated on a daily basis. Our database contains a variety of industry verticals that include: Food Beverage, Automotive, Chemicals and Energy, IT & Telecom, Consumer, Healthcare, and many more. Each and every report goes through the appropriate research methodology, Checked from the professionals and analysts.

Contact Us:

Sanjay Jain

Manager Partner Relations & International Marketing

http://www.reportsandmarkets.com

Ph: +1-352-353-0818 (US)

See the rest here:
Cloud Computing Data Center IT Asset Disposition (ITAD) Market Forecast 2020-2027 (impact of COVID-19) with Top Key Players- AMI, Iron Mountain,...

Read More..

How Does AI, ML, and Cloud Computing Help In E-Learning? – Express Computer

The importance of E Learning platforms has outstretched a lot of peopleduring this COVID -19 outbreak. While most of the employees across Indiaare working from home, there is also a rise in the number of people whowant to make optimal use of their time at home by upgrading their knowledgethrough some professional courses.

IntelliPaat, a pioneer in the training provider industry has experienced a huge surge in their platform, observing this time as the best time for people to upskill their existing skills. IntelliPaat provides courses for the corporate employees in the IT sector who wish to upskill their knowledge and have an urge to find themselves on the top. It also attracts youngsters, looking for a bright career but at the same cannot afford expensive professional courses. IntelliPaat provides various learning courses into Data Science, AI, Web Technologies, and Cloud computing.

Answers by Diwakar Chittora, CEO & Founder at IntelliPaat.

How is e-learning coping up with the current pandemic? How is IntelliPaat faring?

Because of COVID-19 people are locked inside their homes. Companies whose employees can work from home have taken steps to allow their workers to do so. We are entering a world of digitalisation. Organisations that were hesitant to work digitally and having their employees work remotely have made a dramatic shift. They are willing to adopt digital technologies and are eager that their employees work from home.

Colleges and schools are examples of such organisations. Every second college and school has transitioned from a classroom-based model of teaching to an online one. Even business schools which were dedicated to classroom-based instruction have migrated to online delivery. Whether it is premier colleges like IITs, IIMs or schools like DPS, each is now delivering education online. While online training is nothing new with the spread of the COVID-19 virus, its adoption has skyrocketed. The increase in colleges and schools teaching online as a result of the COVID-19 pandemic is not a trend- it is expected to be the norm even when the pandemic abates.

Over the past 30 days, Intellipaat has seen a 30% increase in traffic to its website. This increase is directly attributable to the pandemic and ensuing lockdown. Furthermore, Intellipaat has a feature that allows students to attend classes they missed. Many students who missed their classes due to personal or professional commitment are re-attending the classes to make the best of out this free time during the lockdown. There has been a 40% surge in the number of students wanting to re-attend classes.

We see a 25% surge in our online business this year. Before COVID-19, leading consultancies like KPMG had projected that the market for online education would grow by 10% annually. Because of the pandemic and we expect the industry to receive a further boost of 10% to 15%. Hence it will grow this year by nearly 25%.

How are you cometing with leading players like Courera, Udemy and Udacity?

The leading players globally are Coursera, Udemy, Pluralsight, Udacity and a few others. We compete with these players both with our outstanding training and delivery which are huge differentiators. Because we emphasise both, we have been growing annually at 100% despite being bootstrapped.

We differentiate ourselves by understanding the needs of our learners and help them to achieve their end goal. 80% of our learners comes with an objective of career shift by learning high end skills which are high in demand in market like data science, big data, AI, business intelligence. Majority of our learners are professionals working in the industry with min 1 yr of exp upto cxo level. A professional with 2 years of java experience earn upto to 5-7 lakhs annually. On the other hand, even a fresher with data science expertise may earn as much as 8 -10 lakhs annually. Naturally, as a data scientist progresses in his or her career, he or she will make much more.

Our faculties are subject matter experts and selected by a technical panel of experts. Our courses are created after through research of multiple jobs and speaking to multiple hiring managers to make sure it contains all the required skills that are required by top employers and thats what differentiate us from others a lot. For instance, a student who enrols in a Data Science Masters Course learns not only learns Data science algorithms but also learns skills like Python, Statistics, machine learning algorithms, and big data tools, etc that are required to become a successful data scientist. Our courses are created to provide hands on exposure with multiple assignments and project work.

After completing our course, graduates have skills sets equivalent to those of professionals with six months experience in their fields.

We also have a dedicated job portal where over 500 employers are registered. On the portal, 600 jobs are listed. Those who enrol with IntelliPaat are encouraged to visit the portal and apply for jobs. Furthermore, we market our students resumes increasing the likelihood they will find the job they wanted. We also prepare students for interviews by conducting mock interview sessions with them.

Most of our competitors teach using static e-learning videos. We provide 24X7 support to students and offer career guidance. Our competitors do neither.

Our superior pedagogy and support have allowed us to grow 100% year on year even though we are bootstrapped. Our competitors are suffering heavy losses despite being well funded.

How technically sound are you when it comes to reaching out to your students?

We teach students subjects the industry demands most. These include data science, AI, machine learning, and cloud computing, big data, web development, etc.

Do you think that technology is the panacea for all current problems?

Nearly half of peoples lives are spent interacting with technology on daily basis According to Facebook, the average person spends ten minutes every day on its platform. Twitter revealed that once in every tenth person makes a minimum of three tweets daily.

Platforms like Flipkart, Myntra, Uber, and Ola use technology that has ease everyone life and that is the reason everyone switched to them quickly.

Today AI is on the ascent. Mostly all automobile company are investing heavily in developing self-driving cars. Drones are fully capable of fighting in wars, most of the manufacturing units are mostly automated and people have built robots to work in natural disasters situations to save human lives.

Technology is rapidly changing human behaviour. For instance, in 2004, nobody would have believed that by 2020, 2 out of every ten people would shop online. But this is the reality today. Over the next ten years, the percentage of people shopping online will grow from 20% to 50%. Furthermore, by 2028, even in India, autonomous cars will be commonplace. These developments are dramatic shifts. Technology will have a significant impact on peoples lives.

Relying too much on technology may prove harmful. When people rely on technology to do jobs that were earlier done by people, it will lead to mass unemployment. Also, people who dont take steps to learn new skills will become displaced by technology.

Where can we see IntelliPaat in the upcoming days?

We formed IntelliPaat with a vision to provide high-quality education across the globe at a nominal price. We envisioned enhancing the career growth of professionals. IntelliPaat has more than 150 courses in its portfolio. We expect to grow this number to 250 shortly.

The companys most significant footprint is in the largest tier 1 cities of Bangalore, Chennai, and Pune. We will be expanding to tier 2 Indian cities as well. IntelliPaat will also take a deeper dive oversees. We expect to increase our footprint to cover multiple cities in overseas countries. These are our plans for the next three years.

We have launched courses in collaboration with top universities like IIT Guwahatis E&ICT department and these courses were designed to provide academic rigour along with industry exposure to working professionals. Professionals who enrol in these courses can continue working as classes are held on Saturday and Sunday. Those who enrol in these courses upgrade their skills. They are taught by IIT faculty and professionals from the industry. IntelliPaat expects to grow 300% over the next two years.

How has your entrepreneurial been so far? What can the budding ones learn now on?

To wannapreneurs, I would like to say that the entrepreneurial journey is wonderful, full of learning and but you should have never die attitude. As in this journey you will fail many times but the most important part is how quickly you can understand mistake and take quick action to fix. Many a times entrepreneurs suffer considerable stress but your passion towards your vision make you always in active mode. Focus on providing the best experience that you can to your customers so they become always loyal to you.

If you have an interesting article / experience / case study to share, please get in touch with us at [emailprotected]

Read this article:
How Does AI, ML, and Cloud Computing Help In E-Learning? - Express Computer

Read More..

Multi-cloud vs. hybrid cloud and how to know the difference – TechTarget

With so many varying definitions out there, it's not always clear what it means for an architecture to be multi-cloud vs. hybrid cloud.

In fact, the terms have become so muddled that many enterprises struggle to know where one term begins and the other ends. Many people think these terms are interchangeable, but they're actually two completely different cloud architectures and should be treated as such.

So, what is the difference between these two cloud architectures? Check out the video by Steve Bigelow, senior technology editor at TechTarget, as well as the following tips to familiarize yourself with the similarities and differences between hybrid cloud and multi-cloud.

IT teams have a weight lifted off their shoulders when they don't have to choose between a public and private cloud. Hybrid cloud strategies combine the advantages of both cloud models to give enterprises a competitive edge. When evaluating multi-cloud vs. hybrid cloud, IT teams should consider the benefits and drawbacks of these architectures so they make the right decisions for their workload requirements.

A hybrid cloud creates a single environment to offer consistency and mobility. This type of cloud can help combat spikes in demand by drawing upon public cloud resources. A hybrid cloud also helps clarify where a company's money goes, enabling IT teams to better optimize usage and keep unexpected charges at bay.

Explore the other benefits of a hybrid cloud so you can address business demands, while keeping cost in mind.

The need for comprehensive management tools has increased as hybrid cloud and multi-cloud architectures become more popular. Enterprises are attracted to multi-cloud strategies because it enables them to select the cloud services that best fit their workloads and data requirements. However, the number of cloud services available can add more complexity to an already complicated management strategy. Multi-cloud management tools can help.

For successful multi-cloud management, IT teams need tools that emphasize abstraction, orchestration and automation. The right tool to fit your enterprise's needs is out there, it's just a matter of finding it. IT teams also need to consider market consolidation when selecting multi-cloud management tools, since changes in ownership can affect the research and development required to improve third-party tools that span multiple clouds.

Get acquainted with the different types of multi-cloud management tools so you're better equipped to know which one your workload needs.

The relationship between compliance and cloud computing is complicated by nature. Enterprises in highly regulated industries are often reticent to move any applications, processes or data onto someone else's infrastructure. The most common cloud compliance risks they face fall within these three categories:

When companies implement a multi-cloud strategy, cloud compliance is even more of a challenge. Addressing those risks becomes a top priority, which is why it's so important for enterprises to be familiar with the strategies and tools that can simplify the situation.

Learn how to address monitoring, networking and hosting concerns while working with your cloud providers.

Traditionally, a hybrid cloud is made up of an on-premises software stack that's integrated with a public cloud. However, a new hybrid infrastructure has emerged now that public cloud providers have released physical appliances that enable users to operate the same software stack in the cloud and on premises.

Hybrid cloud architectures today are broken down into two different models -- heterogeneous and homogeneous. A heterogenous hybrid infrastructure includes a public cloud and private technologies supplied by different providers. A homogenous model relies on the same software both on premises and in the public cloud. It is up to each enterprise to weigh its cost, performance and management requirements to find the best fit.

More:
Multi-cloud vs. hybrid cloud and how to know the difference - TechTarget

Read More..

ACLU, EFF still trying to get documents unsealed in Facebook encryption case – CyberScoop

Written by Sean Lyngaas Apr 28, 2020 | CYBERSCOOP

Civil liberties groups on Tuesday asked an appeals court to unseal a federal judges ruling that rejected a U.S. government effort to force Facebook to decrypt voice calls.

The American Civil Liberties Union and the Electronic Frontier Foundation argue that the public has a right to know about how U.S. prosecutors tried to force Facebook to decrypt the calls in a 2018 investigation of the MS-13 gang, and why a judge rejected the prosecutors effort. The Department of Justice is urging the court to keep the ruling sealed, arguing that making it public could compromise ongoing criminal investigations.

It is the latest front in a broader standoff between privacy advocates and law enforcement over access to encrypted communications. Law enforcement officials have for years lamented that strong encryption has hampered investigations into terrorists and criminals. But many technologists say any software especially designed for law enforcement access risks weakening security for many other internet users.

In this case, civil liberties groups say a failure to clarify the legal requirements forgivingauthorities access to encrypted communications would set a dangerous precedent.

[U]sers of electronic communications services, and the providers of those services themselves, would not know whether federal law requires providers to weaken the security of their services at the behest of the police, Riana Pfefferkorn, a scholar at Stanford Law SchoolsCenter for Internet and Society and one of the plaintiffs, told CyberScoop in an email.

The DOJ pressure on Facebook stemmed from a 2018 criminal case against suspected members of the MS-13 gang in California. After the FBI said it couldnt access calls made on Facebook Messenger by the suspects, prosecutors tried to get a judge to hold Facebook in contempt of court for failing to carry out a wiretap order to decrypt the calls. The judge rejected the prosecutors request, Reuters reportedinSeptember2018.

A U.S. district judge denied the ACLU and EFFs request to unseal the documents last year,but the groups have taken the case to the U.S. Court of Appeals for the Ninth Circuit.

[T]he Department of Justice has told us that the current law is not strong enough and does not give it enough authority to conduct the surveillance it needs to in investigations, Jennifer Granick, a lawyer for the ACLU, argued during the video-conferenced hearing Tuesday. The public needs to know what that current law is.

But Scott Meisler, a DOJ lawyer, argued that unsealing the ruling could disrupt other criminal investigations.

If we have parallel proceedings where we have right-of-access litigation on one side versus criminal discovery on the other side, I do think it interferes not just with ongoing investigations but with the way that ongoing prosecution is carried out, Meisler told the court.

It is unclear when the appeals court will make a ruling on the documents.

The standoff over encryption has escalated in recent months, as Justice officials have held conferences to galvanize support for their positionagainst allowing people to go dark in their communications.

They have sympathetic ears on Capitol Hill. In March, a bipartisan group of senators introduced legislation that would force tech companies to do more to fight child exploitation or risk losing liability protections. Critics say there would be no way for companies to comply with the bill without undermining strong encryption.

The Facebook Messenger case is reminiscent of when the FBI took Apple to court in 2016 to compel the tech company to unlock the iPhone of the perpetrator of the San Bernardino terrorist attack. The bureau dropped that demand after paying a contractor to crack the phone.

Read more:
ACLU, EFF still trying to get documents unsealed in Facebook encryption case - CyberScoop

Read More..

How Let’s Encrypt changed the web with free, easy encryption – Fast Company

Lets Encryptissued its one billionth digital certificate a few weeks ago. Run by the nonprofit Internet Security Research Group (ISRG), the service provides these certificates to websites for free, allowing your browser to create a secure and validated connection to a server thats effectively impenetrable to snooping. The pandemic hasnt halted the groups progress: It says its now issued over 1,080,000,000 certificates.

That Lets Encrypt doesnt charge for this service is a big deal. A digital certificate for a websitealso useful for email servers and other client/server systemsused to cost hundreds of dollars a year for a basic version and even more for a more comprehensive one. For smaller sites, that cost alone was a barrier.

While the price had dropped significantly before Lets Encrypt began issuing its certificates at no cost in 2015, and some commercial issuers had offered free certificates on a limited basis, encrypting a site was no trivial matter. It required technical expertise and the ability to puzzle through command-line configurations. (Though Ive been running websites since 1994, renewing and installing certificates had remained one of my bugbears before Lets Encrypt.)

Lets Encrypt didnt set out to launch a price war and thereby destroy an existing marketplace. By making encryption free and simple, the organization has been a large part of an industrywide shift to encrypt all web browsing that has doubled the number of secure sites from 40 to 80 percent of all sites since 2016.

As executive director and cofounder of ISRG Josh Aas says, the organization wants everyone to be able to go out and participate fully in the web without having to pay hundreds of dollars to do something. Setting the cost at zero benefits each sites users and the internet as a whole.

Google tracks opt-in information from Chrome browser users about the type of connections they make. It shows that secure connections rose from 39 percent (Windows) and 43 percent (Mac) in early 2015 to 88 and 93 percent respectively on April 11, 2020. One source indicates that Lets Encrypt now supplies 30 percent of all website digital certificates. Two hundred million websites now use its certificates, the organization says.

This dramatic increase in web encryption protects people from some unwanted commercial tracking and snooping by malicious parties and government actors alike. It took Lets Encrypt as a catalyst to put it within the reach of every website.

After the revelation of the scope and nature of wide-scale, routine data collection by U.S. national security agencies added to the already-known and suspected habits of other democracies and repressive countries, tech firms shifted heavily into encrypting connections everywhere they could. That meant more encryption between data centers run by the same company (as Google added starting in 2013), encryption of data at rest stored on servers, and browser makers calling users attention to unprotected web sessions.

That last part was critical, as Chrome, Firefox, and Safari slowly increased warnings about nonencrypted connectionsand finally turned those warnings into outright error messages. But it could also have been unfair to smaller websites, especially those in developing nations and ones run by nonprofits, volunteer groups, and small companies lacking the wherewithal to implement encryption. Without an easy way for most organizations to secure their sites, it would have balkanized the net.

Lets Encrypt stepped into that growing void. Now financially supported by a host of major tech companiesthough Apples name is oddly and noticeably absentthe firm has scaled successfully from a million certificates a year to a million a day over just four years.

We want to make sure that when someone entrusts us with a dollar, we go out and do the most work we can with that dollar.

We want to make sure that when someone entrusts us with a dollar, we go out and do the most work we can with that dollar, Aas says. For instance, he says, the group relies on three very expensive, exceedingly reliable database servers. Each costs $100,000 or more, but the setup provides triple redundancy. Using more common, cheaper hardware would require more staffers to provide maintenance.

ISRG has also retained an extremely tight mission focus on certificate issuance. And it offers no customer support, though it has a rich and active community that it encourages and ever-improving online documentation. Not providing support results in a huge amount of internal pressure to ensure people dont need support, says Aas. Developing community is a huge part of our efficiency.

Some major hosting firms have adopted Lets Encrypt as an effectively no-cost method of adding digital certificates for their users sites with almost no overhead. They can automate the process of requesting a certificate, receiving it, and installing it, a dramatically less intensive process than any previous method. (Lets Encrypt has focused on automation and spent three years shepherding a relevant Internet Engineering Task Force draft through to a proposed standard in March 2019.)

The widely used cPanel administrative interface offers Lets Encrypt as a point-and-click option to install a certificate. But its equally trivial to use manually. To renew certificates across about 20 domains and subdomains I own, I type in a single command every three months, reminded by Lets Encrypts renewal email 30 days in advance. A few seconds pass and Im ready to go for another three months. If I were slightly less lazy, I could entirely automate the process through a recurring server-based task.

Most free things on the internet come with an expensive price tagusually involving giving up our privacy. Lets Encrypt is the rare organization that does something useful and controls its scope and budget, so it can be more efficient every day it operates. The organization knows virtually nothing about parties requesting certificatesit doesnt even ask for an email addressand retains almost nothing. It relies entirely on domain ownership as proof of a users identity. Thats enough, since all a certificate does is validate that someone runs the domain that the certificate is securing.

With its constrained mission, Aas says that ISRG has plenty of efficiencies yet to reap and improvements to make, even as it focuses on its day-to-day operations. We take the time to do it right, but we dont take more time than we need to get it right, he says. The group took years to become a certificate authority (CA), for instance, making it one of a few hundred organizations trusted by a handful of operating system and browser makers to be the root of trust for certificates.

And just before the billionth certificate was issued, Lets Encrypt implemented a security technique, the first by a CA, that effectively blocks the ability of a malicious party to subvert a flaw in the internets data routing system and obtain a domain certificate fraudulently. (It fully documented its new technology so others could benefit from it too.)

In many ways, Lets Encrypt is a throwback to the precommercial internet, when a combination of generosity, mutual benefit, and enlightened self-interest allowed for rapid improvements. Its free certificates are a ticket to that pastbut with modern technological efficiencies that keep it pointing toward the future.

Visit link:
How Let's Encrypt changed the web with free, easy encryption - Fast Company

Read More..

Advanced Encryption Standard (AES): What It Is and How It Works – Security Boulevard

Understanding advanced encryption standard on basic level doesnt require a higher degree in computer science or Matrix-level consciousness lets break AES encryption down into laymans terms

Hey, all. We know of security of information to be a hot topic since, well, forever. We entrust our personal and sensitive information to lots of major entities and still have problems with data breaches, data leaks, etc. Some of this happens because of security protocols in networking, or bad practices of authentication management but, really, there are many ways that data breaches can occur. However, the actual process of decrypting a ciphertext without a key is far more difficult. For that, we can thank the encrypting algorithms like the popular advanced encryption standard and the secure keys that scramble our data into indecipherable gibberish.

Lets look into how AES works and different applications for it. Well be getting a little into some Matrix-based math so, grab your red pills and see how far this rabbit hole goes.

Lets hash it out.

You may have heard of advanced encryption standard, or AES for short but may not know the answer to the question what is AES? Here are four things you need to know about AES:

The National Institute of Standards and Technology (NIST) established AES as an encryption standard nearly 20 years ago to replace the aging data encryption standard (DES). After all, AES encryption keys can go up to 256 bits, whereas DES stopped at just 56 bits. NIST could have chosen a cipher that offered greater security, but the tradeoff would have required greater overhead that wouldnt be practical. So, they went with one that had great all-around performance and security.

AESs results are so successful that many entities and agencies have approved it and utilize it for encrypting sensitive information. The National Security Agency (NSA), as well as other governmental bodies, utilize AES encryption and keys to protect classified or other sensitive information. Furthermore, AES is often included in commercial based products, including but limited to:

Although it wouldnt literally take forever, it would take far longer than any of our lifetimes to crack an AES 256-bit encryption key using modern computing technology. This is from a brute force standpoint, as in trying every combination until we hear the click/unlocking sound. Certain protections are put in place to prevent stuff from like this happening quickly, such as a limit on password attempts before a lockdown, which may or may not include a time lapse, to occur before trying again. When we are dealing with computation in milliseconds, waiting 20 minutes to try another five times would seriously add to the time taken to crack a key.

Just how long would it take? We are venturing into a thousand monkeys working on a thousand typewriters to write A Tale of Two Cities territory. The possible combinations for AES 256-bit encryption is 2256. Even if a computer can do multiple quadrillions of instructions per second, then we are still in that eagles-wings-eroding-Mount-Everest time frame.

Needless to say, its waaaaaaaaaaaaaaaaaaay (theres not enough memory on our computers to support the number of a letters that I want to convey) longer than our current universe has been in existence. And thats just for a 16-byte block of data. So, as you can see, brute forcing AES even if it is 128 bits AES is futile.

That would likely change, though, once quantum computing becomes a little more mainstream, available, and effective. Quantum computing is expected to break AES encryption and require other methods to protect our data but thats still a ways down the road.

Manage Digital Certificates like a Boss

14 Certificate Management Best Practices to keep your organization running, secure and fully-compliant.

To better understand what AES is, you need to understand how it works. But in order to see how the advanced encryption standard actually works, however, we first need to look at how this is set up and the rules concerning the process based on the users selection of encryption strength. Typically, when we discuss using higher bit levels of security, were looking at things that are more secure and more difficult to break or hack. While the data blocks are broken up into 128 bits, the key size have a few varying lengths: 128 bits, 196 bits, and 256 bits. What does this mean? Lets back it up for a second here.

We know that encryption typically deals in the scrambling of information into something unreadable and an associated key to decrypt the scramble. AES scramble procedures use four scrambling operations in rounds, meaning that it will perform the operations, and then repeat the process based off of the previous rounds results X number of times. Simplistically, if we put in X and get out Y, that would be one round. We would then put Y through the paces and get out Z for round 2. Rinse and repeat until we have completed the specified number of rounds.

The AES key size, specified above, will determine the number of rounds that the procedure will execute. For example:

As mentioned, each round has four operations.

So, youve arrived this far. Now, you may be asking: why, oh why, didnt I take the blue pill?

Before we get to the operational parts of advanced encryption standard, lets look at how the data is structured. What we mean is that the data that the operations are performed upon is not left-to-right sequential as we normally think of it. Its stacked in a 44 matrix of 128 bits (16 bytes) per block in an array thats known as a state. A state looks something like this:

So, if your message was blue pill or red, it would look something like this:

So, just to be clear, this is just a 16-byte block so, this means that every group of 16 bytes in a file are arranged in such a fashion. At this point, the systematic scramble begins through the application of each AES encryption operation.

As mentioned earlier, once we have our data arrangement, there are certain linked operations that will perform the scramble on each state. The purpose here is to convert the plaintext data into ciphertext through the use of a secret key.

The four types of AES operations as follows (note: well get into the order of the operations in the next section):

As mentioned earlier, the key size determines the number of rounds of scrambling that will be performed. AES encryption uses the Rjindael Key Schedule, which derives the subkeys from the main key to perform the Key Expansion.

The AddRoundKey operation takes the current state of the data and executes the XOR Boolean operation against the current round subkey. XOR means Exclusively Or, which will yield a result of true if the inputs differ (e.g. one input must be 1 and the other input must be 0 to be true). There will be a unique subkey per round, plus one more (which will run at the end).

The SubBytes operation, which stands for substitute bytes, will take the 16-byte block and run it through an S-Box (substitution box) to produce an alternate value. Simply put, the operation will take a value and then replace it by spitting out another value.

The actual S-Box operation is a complicated process, but just know that its nearly impossible to decipher with conventional computing. Coupled with the rest of AES operations, it will do its job to effectively scramble and obfuscate the source data. The S in the white box in the image above represents the complex lookup table for the S-Box.

The ShiftRows operation is a little more straightforward and is easier to understand. Based off the arrangement of the data, the idea of ShiftRows is to move the positions of the data in their respective rows with wrapping. Remember, the data is arranged in a stacked arrangement and not left to right like most of us are used to reading. The image provided helps to visualize this operation.

The first row goes unchanged. The second row shifts the bytes to the left by one position with row wrap around. The third row shifts the bytes one position beyond that, moving the byte to the left by a total of two positions with row wrap around. Likewise, this means that the fourth row shifts the bytes to the left by a total of three positions with row wrap around.

The MixColumns operation, in a nutshell, is a linear transformation of the columns of the dataset. It uses matrix multiplication and bitwise XOR addition to output the results. The column data, which can be represented as a 41 matrix, will be multiplied against a 44 matrix in a format called the Gallois field, and set as an inverse of input and output. That will look something like the following:

As you can see, there are four bytes in that are ran against a 44 matrix. In this case, matrix multiplication has each input byte affecting each output byte and, obviously, yields the same size.

Now that we have a decent understanding of the different operations utilized to scramble our data via AES encryption, we can look at the order in which these operations execute. It will be as such:

Note: The MixColumns operation is not in the final round. Without getting into the actual math of this, theres no additional benefit to performing this operation. In fact, doing so would simply make the decryption process a bit more taxing in terms of overhead.

If we consider the number of rounds and the operations per round that are involved, by the end of it, you should have a nice scrambled block. And that is only a 16-byte block. Consider how much information that equates to in the big picture. Its miniscule when compared to todays file/packet sizes! So, if each 16-byte block has seemingly no discernable pattern at least, any pattern that can be deciphered in a timely manner Id say AES has done its job.

We know the advanced encryption standard algorithm itself is quite effective, but its level of effectiveness depends on how its implemented. Unlike the brute force attacks mentioned above, effective attacks are typically launched on the implementation and not on the algorithm itself. This can be equated to attacking users as in phishing attacks versus attacking the technology behind the service/function that may be hard to breach. These can be considered side-channel attacks where the attacks are being carried out on other aspects of the entire process and not the focal point of the security implementation.

While I always advocate going with a reasonable/effective security option, a lot of AES encryption is happening without you even knowing it. Its locking down spots of the computing world that would otherwise be wide open. In other words, there would be many more opportunities for hackers to capture data if advanced encryption standard wasnt implemented at all. We just need to know how to identify the open holes and figure out how to plug them. Some may be able to use AES and others may need another protocol or process.

Appreciate the encryption implementations we have, use the best ones when needed, and happy scrutinizing!

Recent Articles By Author

*** This is a Security Bloggers Network syndicated blog from Hashed Out by The SSL Store authored by Ross Thomas. Read the original post at: https://www.thesslstore.com/blog/advanced-encryption-standard-aes-what-it-is-and-how-it-works/

Read the original post:
Advanced Encryption Standard (AES): What It Is and How It Works - Security Boulevard

Read More..