Page 3,691«..1020..3,6903,6913,6923,693..3,7003,710..»

Global Cloud Server Market Analysis 2020-2025: by Key Players with Countries, Type, Application and Forecast Till 2025 – Germany English News

This report studies the global Cloud Server market size, industry status and forecast, competition landscape and growth opportunity. This research report categorizes the global Cloud Server market by companies, region, type and end-use industry.

A cloud server is a logical server that is built, hosted and delivered through a cloud computing platform over the Internet.In 2017, the global Cloud Server market size was xx million US$ and it is expected to reach xx million US$ by the end of 2025, with a CAGR of xx% during 2018-2025.

ACCESS THE PDF SAMPLE OF THE REPORT @HTTPS://WWW.ORBISRESEARCH.COM/CONTACTS/REQUEST-SAMPLE/2188240

This report focuses on the global top players, coveredIBMHPDellOracleLenovoSugonInspurCISCONTTSoftlayerRackspaceMicrosoftHuawei

Market segment by Regions/Countries, this report coversUnited StatesEuropeChinaJapanSoutheast AsiaIndia

MAKE AN ENQUIRY OF THIS REPORT @HTTPS://WWW.ORBISRESEARCH.COM/CONTACTS/ENQUIRY-BEFORE-BUYING/2188240

Market segment by Type, the product can be split intoLogical TypePhysical Type

Market segment by Application, split intoEducationFinancialBusinessEntertainmentOthers

The study objectives of this report are:To study and forecast the market size of Cloud Server in global market.To analyze the global key players, SWOT analysis, value and global market share for top players.To define, describe and forecast the market by type, end use and region.To analyze and compare the market status and forecast between China and major regions, namely, United States, Europe, China, Japan, Southeast Asia, India and Rest of World.To analyze the global key regions market potential and advantage, opportunity and challenge, restraints and risks.To identify significant trends and factors driving or inhibiting the market growth.To analyze the opportunities in the market for stakeholders by identifying the high growth segments.To strategically analyze each submarket with respect to individual growth trend and their contribution to the marketTo analyze competitive developments such as expansions, agreements, new product launches, and acquisitions in the marketTo strategically profile the key players and comprehensively analyze their growth strategies.

Browse the complete report @https://www.orbisresearch.com/reports/index/global-cloud-server-market-size-status-and-forecast-2025

In this study, the years considered to estimate the market size of Cloud Server are as follows:History Year: 2013-2017Base Year: 2017Estimated Year: 2018Forecast Year 2018 to 2025For the data information by region, company, type and application, 2017 is considered as the base year. Whenever data information was unavailable for the base year, the prior year has been considered.

Key StakeholdersCloud Server ManufacturersCloud Server Distributors/Traders/WholesalersCloud Server Subcomponent ManufacturersIndustry AssociationDownstream Vendors

Available CustomizationsWith the given market data, QYResearch offers customizations according to the companys specific needs. The following customization options are available for the report:Regional and country-level analysis of the Cloud Server market, by end-use.Detailed analysis and profiles of additional market players.

Table of Contents

Global Cloud Server Market Size, Status and Forecast 2025

Chapter One: Industry Overview of Cloud Server

1.1 Cloud Server Market Overview

1.1.1 Cloud Server Product Scope

1.1.2 Market Status and Outlook

1.2 Global Cloud Server Market Size and Analysis by Regions (2013-2018)

1.2.1 United States

1.2.2 Europe

1.2.3 China

1.2.4 Japan

1.2.5 Southeast Asia

1.2.6 India

1.3 Cloud Server Market by Type

1.3.1 Logical Type

1.3.2 Physical Type

1.4 Cloud Server Market by End Users/Application

1.4.1 Education

1.4.2 Financial

1.4.3 Business

1.4.4 Entertainment

1.4.5 Others

Chapter Two: Global Cloud Server Competition Analysis by Players

2.1 Cloud Server Market Size (Value) by Players (2013-2018)

2.2 Competitive Status and Trend

2.2.1 Market Concentration Rate

2.2.2 Product/Service Differences

2.2.3 New Entrants

2.2.4 The Technology Trends in Future

Chapter Three: Company (Top Players) Profiles

3.1 IBM

3.1.1 Company Profile

3.1.2 Main Business/Business Overview

3.1.3 Products, Services and Solutions

3.1.4 Cloud Server Revenue (Million USD) (2013-2018)

3.2 HP

3.2.1 Company Profile

3.2.2 Main Business/Business Overview

Continued.

Orbis Research (orbisresearch.com) is a single point aid for all your market research requirements. We have vast database of reports from the leading publishers and authors across the globe. We specialize in delivering customized reports as per the requirements of our clients. We have complete information about our publishers and hence are sure about the accuracy of the industries and verticals of their specialization. This helps our clients to map their needs and we produce the perfect required market research study for our clients.

Hector CostelloSenior Manager Client Engagements4144N Central Expressway,Suite 600, Dallas,Texas 75204, U.S.A.Phone No.: +1 (972)-362-8199 ; +91 895 659 5155

See more here:
Global Cloud Server Market Analysis 2020-2025: by Key Players with Countries, Type, Application and Forecast Till 2025 - Germany English News

Read More..

China-backed hacking of the world’s servers uncovered – Radio Canada International (en)

BlackBerry researchers say they've uncovered work by five Chinese-affiliated hacker groups that have accessed vast amounts of data from world computer systems, possibly undetected for a decade (Shutterstock)

Blackberry Ltd. says it has discovered what it claims is Chinese-backed hacking of the worlds servers. Originally known as Research In Motion based in Waterloo Ontario, the company says its researchers have discovered how hackers have managed to infiltrate many of the worlds servers unnoticed for up to a decade.

Likely with an intended pejorative double-entendre, the 44-page report by BlackBerry, is called Decade of the Rats.(pdf).

The title refers (also) to a popular remote administration tool (NetWire-rat) that BlackBerry found to have striking code similarities to a remote access android trojan (RAT) that was discovered two years before the business tool came on to the commercial market, raising questions about the origins of each says the report.

The report notes that While Chinese IP (intellectual property) theft is now a story old enough for the history books, there continue to be new chapters to add with new lessons to learn for security teams and the organizations they serve.

The report details activities of 5 APT- advanced persistnat threat- groups noting they avoided detection because cyber security was focussed elsewhere. (BlackBerry)

The company says some five separate groups with ties to the Chinese government have been extracting vast quantities of information through Linux operating systems as well as Windows and Android systems. Linux is used to run the New York, London, and Tokyo stock exchanges, and major tech giants like Amazon, Yahoo, and Google also rely on it and indeed dominates the back-end infrastructure ofalmost all advanced supercomputers around the world, including computers used by many U.S. government agencies and the Department of Defense.

The report notes that While Chinese IP (intellectual property) theft is now a story old enough for the history books, there continue to be new chapters to add with new lessons to learn for security teams and the organizations they serve.

The five groups although apparently have different objectives and targets, the report says they share tools and tactics and so appear to be coordinated. One of the succesful methods used to escape cyber-security is through theft of adware certificates that prove a products authenticity and which are considered low security threats and then their disguised spyware can communicate through innocuous domain names on cloud servers.

BlackBerry says the hackers have been able to gather vast amounts of data and intellectual property, potentially worth billions.

Additional information-sources:

See the original post:
China-backed hacking of the world's servers uncovered - Radio Canada International (en)

Read More..

How to build your own firewall with pfSense – IT PRO

Having migrated your IT infrastructure and services to the cloud, you need a decent enterprise firewall to handle your internet connection and any site-to-site or site-to-cloud VPN requirements.

The licensing costs for devices from Cisco, Juniper, Sonicwall et al are often extremely high, however. Many admins live in fear of the yearly license renewal invoice turning up, knowing that itll take a significant chunk out of their yearly IT budget, especially if some bright spark in senior management suddenly decides that the firm needs to roll out a costly extra feature.

Advertisement - Article continues below

pfSense is an open source enterprise firewall based on FreeBSD, with comparable features to many of the most expensive enterprise firewall devices and a huge range of packages available to extend its capabilities. As an open source solution, the software is free, and all the features are available without any commercial licensing requirements. Support for pfSense is provided by Netgate, which also manufactures network appliances that use the operating system.

This tutorial will take you through the installation and basic setup of a pfSense device. We will be using the scenario of a business with no on-premises servers, using cloud services or hosting for their IT requirements.

The minimum requirements to run pfSense are an x86 or x64 compatible device with 1GB or more of memory, two or more network interfaces and at least 4GB of storage (this can be a hard disk or a flash device such as an SD card).

Advertisement - Article continues below

Advertisement - Article continues below

How fast a processor you need, and how much memory, will depend on the number of rules, VPNs, and so on that you will have on your device, and the amount of data flowing through it. VPN performance, in particular, is dependent on how much processor power your endpoint has. Depending on the size and complexity of your local network layout, you may want a device with more than two network interfaces.

Purpose-built pfSense devices are available from many manufacturers, including the makers of pfSense themselves. However, you can also set it up on a virtual machine running on your choice of hypervisor, or build your own using a standard desktop PC or server.

Whatever hardware youre using, the setup process is the same. Hook up a monitor and keyboard to your device or use the virtual console if you are installing on a virtual machine. Do not connect any of the network interfaces to a network yet: well get to that later in the installation and setup process.

Download the installer from the pfSense website, taking care to get the version that matches your environment and preferred installation method. Burn the CD or write the image to a USB drive as required.

Advertisement - Article continues below

Boot your device from the installation media you created and wait until it has completed booting, and displays the software license screen. Go through and accept the license terms and move on to the installation. Select Install from the menu, choose the correct keyboard layout for your region, then select continue.

From the next menu, select automatic partitioning and hit enter to continue.

pfSense will partition the disk, and move straight on to the installation. Nows a good time to make some coffee whilst you wait for the installation to complete. When the installation has finished, say no to opening a shell to edit the system. Finally, remove the installation media and hit enter on the next screen to reboot into your new pfSense system.

After the system has rebooted, youll be prompted to set up basic networking. Answer no when asked if VLANs should be set up now. Next, move on to the network interface setup. Hit a to start auto-detection of the WAN interface and follow the instructions on screen, connecting the cable when required, in order to correctly identify the interface. Repeat the process for the LAN interface. Dont forget to physically label the interfaces on the device as well.

Once you have both the LAN and WAN interfaces identified correctly, hit y to continue. pfSense will carry on booting, then display the status of the network interfaces and present you with the console admin menu.

The LAN interface defaults to an IPv4 address of 192.168.1.1/24. If you need to change this to match your existing network, select option 2 (set interface IP address) from the menu, then option 2 again to edit the LAN interface. Enter the desired LAN IPv4 address and subnet mask for the device when prompted. Dont enable IPv6 or DHCP right now; well do that later from the web admin interface.

Configure a computer with a static IPv4 address in the same range as the IPv4 address you assigned to the LAN interface on the firewall. You can connect this computer directly to the LAN port on the firewall (using a crossover cable if youre working with older hardware that doesnt support Auto-MDIX) or connect via a switch.

Advertisement - Article continues below

Advertisement - Article continues below

Using your web browser, go to the LAN IPv4 address that we configured in the previous step. Log in using the username admin and the default password pfsense. You will be presented with the initial setup wizard. Click on next, then next again at the following screen to begin the setup of your new firewall.

Enter the name you want to give your firewall, and the domain associated with your internal office network. Were going to be boring and use firewall for the name, and local for the domain, but you should probably come up with something more distinctive.

Click on next to move on to step 3 of the wizard. The time server can be left on the default, or set to a different one if you have a preferred NTP server for devices on your network. Set your time zone, and then click next to move on to step 4.

Now you need to set up your WAN interface. Were using DHCP, so can leave everything on the defaults, but if you are connecting this device to an ADSL line via a DSL modem in bridge mode, you should select PPPoE here and enter the details provided by your ISP in the PPPoE section of this page. Once youve completed WAN configuration, scroll to the bottom of the page and click next to move on to step 5, where we can review the LAN IPv4 address we configured earlier, and change it if necessary. Click next to keep the address the same and move on to step 6.

Advertisement - Article continues below

Set a new admin password, not forgetting to make a note of it somewhere, and then click next to move on to step 7.

Click on reload to apply these changes to the device. If you changed the LAN IPv4 address in step 5, you will need to enter that address in your browser after this to access the device. Wait for the reload to complete, then click Finish on the last screen to exit the wizard and go to the device dashboard. Read and accept the license for the software again when prompted, then click close to clear the Thank you popup.

If your ISP offers IPv6 (as almost all do now) this is the time to set up the WAN interface IPv6 options to match those provided by your ISP. Select the Interfaces pull-down menu from the top menu bar, and select the WAN interface.

You will also need to set up IPv6 on your LAN interface. pfSense supports a range of different IPv6 configurations, from static IPv6 and DHCPv6 to stateless address autoconfiguration (SLAAC), 6to4 tunnelling and upstream interface tracking. Exactly which one you need will depend on the IPv6 provision from your ISP, who should provide you with adequate setup information to correctly configure your connection.

From the menu bar across the top of the pfSense admin page, open the Services pull-down menu and select DHCP server. Tick the Enable box to turn on the DHCP server for your LAN interface, then enter the range of IPv4 addresses that will be allocated to devices on your LAN. Well set up a range of 200 addresses in this instance. Leave the DNS and WINS server options unset, as the firewall will use those allocated by the ISP on the WAN interface.

Scroll down to the bottom of the page and hit save. The DHCP service will start automatically. The setup wizard will have automatically created a single outbound NAT rule for you, so you should be able to access the internet from devices behind your new firewall.

If you require VPN links to your cloud provider, or to other offices, you can now set them up. We will not go into detail about that here as there are too many different types of VPN to cover, and the process is largely the same with any enterprise firewall device.

Advertisement - Article continues below

Additional services such as traffic prioritization, web filtering, load balancing multiple internet connections and so on are all available, either already built in or via add-on packages. These can be installed from the package manager, found on the System menu pull-down at the left of the top menu bar.

Take some time to explore the various menus and services to familiarize yourself with your new firewall and discover its many features.

Successful digital transformations are future ready - now

Research findings identify key ingredients to complete your transformation journey

Cyber security for accountants

3 ways to protect yourself and your clients online

The future of database administrators in the era of the autonomous database

Autonomous databases are here. So who needs database administrators anymore?

The IT experts guide to AI and content management

Your guide to the biggest opportunities for IT teams when it comes to AI and content management

More:
How to build your own firewall with pfSense - IT PRO

Read More..

5 ways CIOs can curb costs before recession hits – CIO

Now that CIOs have completed step 1 of their ad-hoc coronavirus crises playbook hammering out remote work and business continuity strategies many are evaluating step 2: cost containment, ranging from right-sizing instances of cloud software and renegotiating SaaS contracts to eliminating excess applications and shuttering legacy servers and other hardware.

Such are the moves CIOs may take to get ahead of any financial fallout the coronavirus crisis may have on their business, as the pandemic rages on, crippling productivity across every sector, and CFOs get increasingly skittish about budgets.

Eighty-seven percent of finance leaders reported great concern for their business, with 80 percent expecting COVID-19 to decrease revenue or profits in 2020, according to a recent survey of 55 CFOs in the U.S. and Mexico polled by PwC. Sixty-seven percent of these CFOs say they are prepared to reduce costs to counteract the financial impact of the COVID-19 pandemic. Translation: Its knives out time.

CFOs are just doing their jobs and focusing on driving value, says ServiceNow CIO Chris Bedi. They will start to question things that are not on the value side of the ledger. Accordingly, its more important than ever for CIOs to show quantitative proof that their investments are providing value to the business, Bedi says.

Read this article:
5 ways CIOs can curb costs before recession hits - CIO

Read More..

Five Of The Biggest Challenges Faced By Cloud Analytics In 2020 – Analytics India Magazine

The Cloud Analytics market globally has been projected to grow by $39.1 billion, with a compound growth rate of 7.6%. While many companies view these services as economical, they also choose cloud analytics because it makes it easier for them to handle and process massive volumes of data from different sources. It offers real-time information while providing excellent security. So, it comes as no surprise when we read that 91% of the industry say that analytics should be moved to the cloud at a faster rate.

While many analytics companies look to adopt cloud and search for the cheapest cloud platform or a way to optimize their network costs, they still battle a lot of problems:

Security is a significant factor when it comes to cloud analytics and computing challenges. Security has been the most significant concern because it involves a lot of data. Analytics deals with a lot of private data, so the cloud-based software that is used should have built-in flexibilities that allow it to work efficiently with popular security tools. Security is such a big concern that software vendors and organizations have to always be on the lookout for the latest trends and new designs for their software to work with different security protocols.

Finding an application which can be efficiently implemented and functions properly is one of the most important challenges when it comes to cloud analytics. The software has to run on almost all the operating systems or hardware configurations.

Ideally, the analytics software should not be operating under a predefined processing strategy, and it should be capable enough to distinguish between different processing scenarios and dynamically choose how the analytics should be executed without moving a lot of data around. This is not something that is achieved easily, and a lot of organizations struggle to find an appropriate software solution.

IT departments in an organization generally advise business users not to install software they cannot control or support. Also, most apps which are critical to the process, need 100% uptime, which gives no scope for the server that is being shut down to replace or upgrade it. Maintenance can be made more accessible by building redundancies into the software so that duplication of control and processing exists.

Companies nowadays struggle with controlling their cloud spending. In fact, controlling spending is as important to them as cloud security. Nowadays, the mistake of cloud spending is committed not only by beginners, but also by companies who have been using cloud services for a long time. It was estimated in a report that in the year 2020, wasted cloud spending could exceed $17.6 billion. As cloud computing grows, companies are still struggling to manage their cloud spending.

Many online vendors offer services which appear cheap at first, but when it comes to using the analytics results, the costs do not seem reasonable anymore. What is presented as a low-cost solution at the front end represents accumulated costs for data storage, bandwidth, database access, numbers of users, memory allocations, row-level scoring, and many tasks along with other resources.

To assess the profitability, the entire lifecycle of the analytics has to be quantified and evaluated, so that hidden costs can be avoided. This will allow cloud users to know whether the technology they are using is cheaper than using software on a server.

comments

Link:
Five Of The Biggest Challenges Faced By Cloud Analytics In 2020 - Analytics India Magazine

Read More..

The EDPB gives its view on connected car technology – but will it reach the chequered flag? – Lexology

In February, the European Data Protection Board (EDPB) published its draft guidelines on the processing of personal data in the context of connected vehicles and mobility-related applications (the Guidelines). These are draft guidelines published for public consultation.

These are the first European-wide guidelines issued on connected car technology by privacy regulators. In France, the CNIL published its "compliance package" in 2017 and previous guidance has been issued in Germany. The Article 29 Working Party had previously issued guidance on the Internet of Things, but never ventured into the connected car space.

So, while perhaps overdue, it is helpful to have the views of the EDPB and, through them, the collective views of the European supervisory authorities on important issues this technology raises.

Some of the views adopted in the Guidelines will not be surprising an expansive view on the concept of personal data and the applicability of the ePrivacy Directive, to take two examples. These may still, however, cause operational challenges for many actors in the connected car space currently wrestling with using this innovative technology in a privacy-compliant way.

Equally, there are some areas of the Guidelines that are arguably more controversial particularly on the interface between GDPR and the ePrivacy Directive. The Guidelines also focus heavily on an owner-use scenario which, for some data privacy issues, lends itself to more practical solutions particularly where consent-led solutions are appropriate. However, as mobility service models have become more sophisticated, the Guidelines would benefit from being expanded to consider other scenarios where the issues they raise are not so easily handled e.g. company fleets, vehicle leasing arrangements, car sharing clubs and various forms of long-term and short-term vehicle rental services. The Guidelines specifically exclude employee use of vehicles, due to employee monitoring issues. However, they could address the other privacy issues that are raised in this context.

Due to the current COVID-19 crisis, the deadline for responses to the consultations remains open to the public (delayed to 1 May). So, interested organisations still have time to submit their views.

At the time of writing, more than 20 responses to the public consultation have been published, with many raising challenges with legal interpretations adopted in the Guidelines, as well practical difficulties in some of the solutions and restrictions proposed. Some of these represent important points of substance that, if not addressed by the EDPB in the final Guidelines, could lead to the "flashing of hazard lights" in developments in this area in the years to come.

We have set out below a selection of the key themes from the Guidelines, along with our thoughts.

What constitutes personal data?

The Guidelines widely construe the concept of personal data in the context of connected vehicle data. Under the Guidelines "personal data" could include directly identifiable personal data, such as the driver's name, as well as indirectly identifiable data, including data relating to driving style, mileage, vehicle wear and tear and metadata, such as the maintenance status of the vehicle. This is not surprising and is consistent with the approaches of regulators (and European case law) to date.

However, the Guidelines would benefit from acknowledging some flexibility here. Context and intention of processing are important considerations in determining when information constitutes personal data under GDPR in any scenario. This is the case both in law and under case law. This is particularly relevant for connected car technologies in scenarios other than user-owner arrangements. Should corporates have to treat "wear and tear" data of their assets as "personal data"?

The Guidelines also flag specific categories of personal data warranting special consideration due to the sensitive/high-risk nature of the information.

The Guidelines provide recommendations when processing such high-risk data, including ensuring consents obtained are valid and unbundled from other terms, defining a limited retention period, encouraging local processing within the vehicle where possible, providing alternatives (e.g. non-biometric access) and allowing for drivers to turn off certain tracking, such as location. Many are sensible privacy-enhancing measures. However, in certain scenarios, these requirements will present some controllers with challenges.

Interplay between GDPR and ePrivacy Directive

This is perhaps the most controversial topic that the Guidelines touch on. There is also, arguably, a degree of internal inconsistency with how the Guidelines address this issue.

The Guidelines are clear that, in addition to GDPR, the ePrivacy Directive will apply. Specifically, that connected vehicles and all devices connected to them are "terminal equipment" for the purposes of the ePrivacy Directive in the same way as a mobile device or laptop is "terminal equipment". This activates the requirement for consent to the storage of information, or gaining access to information stored, on the connected vehicle and other connected devices.

Strictly, this seems a fair interpretation of the applicability of the ePrivacy Directive (although a technical assessment of whether information is "accessed" from the vehicle for some technologies may permit some flexibility).

However, the Guidelines arguably fail to accommodate all potential solutions for obtaining consent resulting in a potentially unduly restrictive application, particularly in scenarios where the user (or, in this case, driver) is not the owner of the vehicle. The ePrivacy Directive allows for consent to be given by the "user or subscriber" of the relevant service. So, consent by actors other than the driver may be appropriate in some circumstances. The Guidelines could acknowledge this flexibility to allow the law to accommodate other connected car scenarios without fundamentally undermining the protection the ePrivacy Directive seeks to provide.

The challenges of obtaining a consent under the ePrivacy Directive in certain circumstances also arguably demonstrate a need for updates to it. Consent is not required for access to data requested as part of an "information society service" (i.e. a digitally delivered service; think Spotify or Netflix). This exemption makes sense. However, it is too inflexible to accommodate technology-enabled services that also involve a "real world" element that may, therefore, not constitute "information society services". For example, the Guidelines suggest that this issue in the context of "pay-as-you-drive" insurance can be managed by obtaining the consent of the driver. However, is that truly an "unbundled" and "freely given" consent (as required under GDPR)? Would it not be neater, and maintain consistent logic, if a similar exemption applied where connectivity was an inherent part of service delivery? Or should there be some recognition of the potential to rely on legitimate interests, subject to certain safeguards, as has been included in the most recent proposal on the new ePrivacy Directive issued by the Croatian Presidency?

In addition, and potentially most importantly, the Guidelines also appear to adopt an unduly restrictive interpretation of the ability to rely on legal basis other than consent under GDPR in scenarios where the ePrivacy Directive is also engaged.

The Guidelines state that any consent requirement under Article 5(3) ePrivacy Directive takes precedence over GDPR in relation to the storage/collection of information from the connected vehicle and other linked devices. In addition, further processing of personal data collected from the connected vehicle or device will require an Article 6 GDPR lawful basis of processing. This is in line with the EDPB's Opinion 5/2019 on the interplay between the ePrivacy Directive and the GDPR.

However, the Guidelines go further and suggest that, where consent is required under Article 5(3) ePrivacy Directive, then consent will generally be the most appropriate lawful basis under Article 6 GDPR for further processing activities. This is a direction of travel we have seen in the ICO's recent guidance on adtech. So, it is not entirely surprising. The stated intention is to ensure that the protection under the ePrivacy Directive is not undermined and this is potentially understandable in certain circumstances. However, it is debatable whether this is what GDPR says. There is no hierarchy to the lawful bases under GDPR.

There is clearly a concern that saying otherwise would, in the regulator's eyes, open the "floodgates" to allow controllers to rely on legitimate interests as a legal basis under GDPR. However, setting aside legalistic arguments for a moment, this is also potentially unfair on responsible controllers. Even if legitimate interests are properly available as a legal basis, this does not mean a "free for all". Responsible controllers understand the balancing tests that need to be carried out and the requirements to deal with issues such as proportionality, transparency and accountability this entails.

Indeed, the case studies included in the Guidelines acknowledge that appropriate reliance on basis other than consent under GDPR does not necessarily undermine the protection under the ePrivacy Directive. For example, in the "pay-as-you-drive" insurance scenario, the EDPB acknowledges that performance of contract would also be appropriate legal basis.

As it stands, the Guidelines leave significant scope for confusion here and clarification would be welcomed.

Other key concerns

The EDPB also helpfully highlights specific concerns and recommendations in relation to connected vehicles and mobility, and focuses on the need for:

These are all existing obligations under GDPR that would need to be considered when processing personal data in any event although some issues are more relevant and high risk in a connected vehicle context. This should all effectively be considered in an associated data protection impact assessment.

However, it is clear from these recommendations that there is need for reliance on multiple actors across the connected car space from OEMs to mobility service providers. Each will have a different ability to implement the measures needed to ensure privacy-compliant deployment of this technology. Again, it would be beneficial for the Guidelines to recognise this.

The Guidelines include a number of case studies applying the recommendations to specific scenarios including:

However, these are some of the most useful sections of the Guidelines. It would be helpful for the Guidelines to consider use cases in other scenarios. In particular, the inclusion of a use case relating specifically to the collection of vehicle maintenance and diagnostics data in a corporate or fleet scenario would be of value, being one of the most prominent use cases for this type of technology.

The consultation period for public submissions closes on 1 May.

Read the original here:
The EDPB gives its view on connected car technology - but will it reach the chequered flag? - Lexology

Read More..

Virus sends Chess Kenya back to the drawing board – Daily Nation

By VICTOR OTIENO More by this Author

Chess Kenya has been thrown into confusion following the postponement of the 2020 World Chess Olympiad due to coronavirus pandemic.

Last month, the World Chess Federation announced the postponement the 44th edition of the Olympiad, which was due to be held in Russia from August 5 to 18, with a view of protecting the well-being of the entire chess community.

It rescheduled the biennial competition to the same time next year.

Chess Kenya is undecided on whether to hold new qualifier or to maintain the team of 10 players who had been selected.

The 10 had clinched tickets for the Olympiad in the qualifiers held last month at Kenya Commercial Bank (KCB) Sports Club in Nairobi.

Normally, the team that represents Kenya in the Olympiad is selected from the national championships of the year preceding the global competition.

The top 24 players in national championships in both mens and womens categories battle for tickets in two stages, with the top five in every category qualifying for the biennial event.

The postponement means we have to go back to the drawing board. We will sit as a national executive and decide on which way forward, said Chess Kenya chairman Benard Wanjala.

He noted the need to get players who are on form, as the main reason why Chess Kenya uses the national championship to select the national team for the prestigious competition.

The mens players who had booked tickets to the 44th Olympiad are KCB Chess Clubs Ben Magana, Ben Nguku, Joseph Maragu, Jackson Kamau and Ricky Sang.

Their female counterparts are Woman Fide Master Sasha Mongeli, Woman Candidate Masters (CM) Joyce Nyaruai and Lucy Wanjiru, Nakuru Chess Clubs Julie Mutisya and Glenda Matelda of Equity Chess Club.

Magana who is also a CM, was due to feature in his seventh Olympiad, while Mongeli, Nyaruai, Wanjiru were due to make a return, having competed in the 2018 event held in Baitumi Georgia.

Should Chess Kenya decide to hold new selection exercise of the team to represent country in the Olympiad, reigning mens champion Mehul Gohil will have an opportunity to make amends after failing to qualify for the competition.

Gohil finished a disappointing seventh in the March qualifiers.

As Chess Kenya awaits to make a decision on the matter on a date yet to be agreed on, Wanjala has asked the players not to lose focus.

They (players) should take advantage of extended time and continue training to better themselves, because as a country, we want to improve on our performance, he said.

See more here:
Virus sends Chess Kenya back to the drawing board - Daily Nation

Read More..

Pentagon IG says giant cloud computing contract properly went to Microsoft – Roll Call

A top Pentagon watchdog said Wednesday that the Defense Department acted properly when it awarded a potential $10 billion contract for cloud computing to Microsoft over Amazon and other competitors.

The contract is known in Pentagon circles as the JEDI the Joint Enterprise Defense Infrastructure Cloud, or JEDI Cloud.

The Defense Department Inspector General released a 313-page report summarizing the findings of the 10-month investigation that began in June 2019. The report concluded that the Pentagon's October 2019 decision to award the contract to Microsoft and no other contractors was consistent with applicable law and acquisition standards.

The contract, which is potentially worth up to $10 billion over a 10-year period, allows the Defense Department to obtain cloud computing services and overhaul its old computer systems.

However, the report did not provide an unvarnished exoneration of the procurement process. Amazon accused President Donald Trump in December last year of applying improper pressure on the Pentagon to keep the contract away from Amazon Web Services, and the inspector generals office concluded that it could not definitively determine the full extent or nature of any White House influence on the contract process.

Read the rest here:
Pentagon IG says giant cloud computing contract properly went to Microsoft - Roll Call

Read More..

Enterprises need cloud for innovation but security and automation gap remains, says report – Cloud Tech

The gap between the haves and have nots when it comes to enterprise cloud implementation continues to be ploughed: according to a new study from security provider DivvyCloud, less than half of enterprises polled are equipped to operate in the cloud securely.

The 2020 State of Enterprise Cloud Adoption and Security report, which polled around 2,000 IT professionals, found that while 85% of enterprise organisations believe cloud adoption is necessary for innovation, only two in five (40%) said they had a cloud and container security approach in place.

58% of respondents said their organisation had clear guidelines and policies in place for developers building and operating apps in the public cloud and of that number, a quarter said policies were not enforced.

A similar gap exists when it comes to automation policies. More than two thirds of those polled said automation could provide benefits to their organisations cloud security strategy, but less than half (48%) admitted their strategies currently incorporated automation. 49% of respondents said their developers and engineers at times ignore or circumvent cloud security and compliance policies.

The report describes the muddle adroitly. Too often, enterprises are making a false choice: either embrace cloud rapidly and carelessly, or approach it with such timidity that inhibits true cloud adoption, the executive summary reads. Some enterprises are finding a middle ground: the ability to adopt cloud at pace but doing so in a way that embraces friction-free, continuous security and compliance.

Brian Johnson, CEO of DivvyCloud, noted in a statement that this choice between innovation and security ought to be a misnomer, with just over a third (35%) of those polled believing security does not impede developers access to best in class cloud services.

Speaking to CloudTech earlier this month, Jeremy Snyder, VP business/corporate development and international strategy, noted the importance of automation applied towards governance, particularly in the current climate. In the current situation, youve got a lot of people needing to get things done, so the default behaviour is to give people access to go and do whatever they want to do, he said. What we see happening is that people are really good at creating stuff, but theyre not good at cleaning up after themselves.

You can read the full report here (email required).

Photo byFarnoosh AbdollahionUnsplash

Interested in hearing industry leaders discuss subjects like this and sharing their experiences and use-cases? Attend theCyber Security & Cloud Expo World Serieswith upcoming events in Silicon Valley, London and Amsterdam to learn more.

Here is the original post:
Enterprises need cloud for innovation but security and automation gap remains, says report - Cloud Tech

Read More..

Benefits of Cloud Computing in Healthcare – Express Healthcare

Deepak Singh, Director Strategic Initiatives & Planning, G7 CR Technologies India talks on how cloud computing could change the healthcare scenario as we see it and the advantage it provides to tackle pandemics such as the one we are faced with currently

I write this at a time, when the world is battling one of the worst pandemics in the last three decades. As I write this, COVID-19 has already spread its tentacles across 162 countries, consumed over 117021 precious lives and has jeopardised the health and well being of another 1844863 human souls. It is ironical that an organism invisible to the naked eye can wreak such havoc. But then history is laced with many such examples. While it is unfortunate; it does present us with an opportunity to look beyond conventional wisdom, shed conservatism and embrace technology at a faster pace to better manage and in some cases prevent health hazards.

Why technology? Back in January 2020 when I first read about Corona virus, my intellectual curiosity drove me to history of pandemics, in this otherwise beautiful world. Since the turn of the 20th century, the world has witnessed five major pandemics. From 6th Cholera pandemic in 1910-1911 to the Flu pandemic in 1968, millions of promising lives were lost; in one of the cases a 3rd of worlds population was infected. While there have been flu outbreaks since 1968, none as deadly as the ones before 1968. The time period post 1968, interestingly, coincides with development of personal computers and more importantly the emergence of information and communication technology. Being a technology enthusiast, it was natural of me to think, whether technology had anything to do with better management of flu outbreaks post 1968. While I do not have enough data points to conclude technologies role in pandemic management, subsequent to 1968; its safe to presume that it has played an increasingly important role as evidenced in the recent past.

If technology can save lives, why arent we seeing more of it in the healthcare vertical? Historically healthcare has been the slowest to adopt technology. Further, it has seen far less disruption than other industry verticals. While there are varying opinions about the slow adoption rate; four things standout,

The very same life and death nature of the industry makes it imperative for healthcare stakeholders to embrace technology and innovation, as time assumes paramount importance. Further, I am an advocate of data privacy but wouldnt prioritise it over a human life. Accessibility to patient information across geographies to authorised personnel only will save a lot of time and effort for all parties involved and improve the decision-making process. An electronic health record is the need of the hour and with smart use of technology it can be implemented within the framework of the regulations. Similarly, right technology can save significant cost for healthcare providers thereby making it affordable. Lastly, modern medicine is overwhelmingly reactive than proactive. The approach, Get sick, Seek help is an expensive model and fraught with dangers.

I reiterate, the importance of technology in healthcare cannot be underrated and all the challenges I have discussed thus far can be addressed with effective utilisation of technology. The advent of cloud technology is a revolution of sorts. Cloud computing technologies, if implemented and used appropriately, addresses all the of the concerns mentioned above. The advantages of cloud computing far outweigh the perceived risks associated with data privacy. In fact, cloud service providers undergo more scrutiny and are required to comply by any and all privacy standards, including but not limited to HIPAA (Health Insurance Portability and Accountability Act).

I have the privilege of hosting a health-tech start-up on cloud, that provides a secure, compliant and fully integrated platform for adherence and patient management. Healthcare staff can log into their portal to register and follow up with patients, whose adherence reports from any of their integrated technologies appear side-by-side including 99DOTS, evriMED devices and VOT. Their application powers, Government of Indias healthcareplatform which supports the full digitisation of the cascade of care and is used by every healthcare worker across the country for activities spanning patient management of details, diagnostics, adherence, DBT payments, treatment outcomes, test results, and follow up.

Apart from being safe and secure, cloud provides elasticity and scalability. Daily / seasonal peaks and troughs in workload create a sudden increased demand on the system. Instead of spending budget on additional permanent infrastructure capacity to handle a constant yet temporary workload, this is a good opportunity to use an elastic solution. The additional infrastructure to handle the increased volume is only used in as pay-as-you-grow model and then shrinks back to a lower capacity for the remainder of the duration. One of the largest chain of hospitals happens to be our client and they have effectively utilised the clouds elasticity for their benefit. Their IT infrastructure experiences peak volumes every morning and evening and on weekends and the clouds elasticity helps them manage their infrastructure without manual intervention. It scales up when the demand is high and scales down when the demand reduces. Other features and functionalities of cloud, for e.g. storage and networking, provide connectivity, mobility and accessibility to information. This drives collaboration and faster sharing of information over a secured network. One of our clients is a leading pharmaceutical company and hosts a patient management system on cloud. Through this application client manages the distribution and administration of insulin pen, sending real-time alerts to patients and reminders for refills.

In a nutshell, through a pay per use model, cloud provides a cost effective and efficient way of utilising the best technologies which would otherwise be very expensive, due to high capital expenditure involved in procuring them. Advanced technologies like artificial intelligence, machine learning, Internet of things are all available on a cloud platform and are easy to use unlike the traditional methods. These advanced technologies have the potential to drive a new wave in healthcare industry that of preventive healthcare. These systems if used appropriately have the ability to predict future health outcomes and present an opportunity to mitigate them even before you are infected or affected. Healthcare community has a wonderful opportunity to promote healthy and happy living by providing preventive healthcare through the use of technology, especially cloud.

An ounce of prevention is better than a pound of cure.

View post:
Benefits of Cloud Computing in Healthcare - Express Healthcare

Read More..