Page 3,861«..1020..3,8603,8613,8623,863..3,8703,880..»

Cloud Is On The List – BroadcastProME.com

Cloud offers several benefits in terms of speed, efficiency and cost compared to a traditional LTO storage, and can help solve problems in production that would usually call for an on-site investment in hardware, says Jim McKenna of Facilis.

Jim McKenna is VP of Sales & Marketing at Facilis.

This is the time when budgets are being planned. For the average content creator, there are several items that could make 2020 a good year starting with that amazing new Mac Pro, the new RED 8K camera and some additional terabytes in the storage pool for all that 8K media that youll be shooting. Also, the IT guys think it may be smart for us to offsite some critical data, so perhaps its time to think about cloud storage.

The Cloud Conundrum

On-premise back-up and archival systems have been commonplace in media production since before centralised storage was a thing. The available technology 15 years ago in AIT and DLT recorded data to tape at about the same speed as files upload to the average cloud storage today. In the age of low-capacity ATA/IDE hard drives, this wasnt a big problem. In 2019, we saw HDDs closing in on 20TB each and tape cartridges (now LTO8) at 12TB capacity uncompressed. Since LTO generations always double in capacity, were due to see a 24TB cartridge soon.

Cloud, on the other hand, is limitless. Seems like a good resource to have, but consider the cost of limitless. Even though you only pay for what you use, there is little to no economy of scale. When buying an LTO system, the drive and robotic library come at a large up-front cost, but as you use it, the price per TB goes down because youre just buying the cartridges.

Its common to consider the nice round number of 100TB as the point of convergence between cloud and LTO, at least when deploying a small-scale library system. That number may decrease in the next generation of LTO, as you will be able to reach 100TB with only four tapes and large libraries may not be required.

Still, the idea of an externally managed, disaster-proof (multi-site replicated) store of data is very attractive, especially if your company normally flexes with the changing workload. A big back-up system to manage your big back-up jobs will sit idle in slow times. Cloud back-up costs you nothing if you delete the uploaded material at the completion of the job. Its an OpEx, not a CapEx if you decide its not worth the ongoing cost, shut it off. Weve all seen large investments justified in this way.

However, its still the speed that brings some thoughtfulness to the conversation. In the early days of tape-based back-up, entire networks were rarely more than a few terabytes. With todays increased media file sizes, and with the average speed of cloud upload at about 1TB per day, how long will it take to run a full back-up of your storage system? How much data does your facility ingest and generate in a single day during busy times? When you need to get that data back, how long are you willing to wait?

The Storage Hierarchy Workflow

Tiered storage management is big business in the enterprise world. Use of complex algorithms to cache the most-used objects and shuffle off the seldom used ones to slower media is a tenet of good enterprise storage dataflow. In content creation, however, this can leave some things to be desired. Front-end caching for speed in media production needs to represent a lot more of the capacity of the overall system because the file sizes are so much larger. When elements needed immediately fall outside that speedy cached capacity, it can be disastrous for a screening or supervised edit session. As a result, tier 1 storage is large and files are seldom moved unless theyre sure to be unused for an extended time.

This workflow lends itself to the cloud in an interesting way. Assuming the warm category of the cloud storage account, there is no faster tier 3 for random file access. Cloud is a medium that can be used for deep archive while still maintaining instant access to the video and audio files that may be needed in production. This offers a workflow in which the entirety of a production shoot can be uploaded via an on-premise cloud cache, maintaining tier 1 access of all assets on the cache until after the initial rough cut.

Media can then be managed (moved) into an alternate location on tier 1, where it resides for the duration of the extended editorial process, and the remaining production assets are flushed from the disk but remain on the cloud location. The flushed files maintain their same locations in the directory structure on cache but take up no disk space.

The savings in tier 1 capacity can be realised immediately, and redundancy is achieved for all the production assets on cloud storage. The best part is, the shots that werent used in the initial rough cut are all still available and restoration of the high-bitrate master is only moments away. Add an asset management interface that saves preview clips of the uploaded assets for offline viewing, and the workflow comes together quite nicely random access to needed assets in a familiar interface, through a common directory structure, without taking up space on expensive tier 1 storage.

Whos Who in Cloud

Since were only discussing the usage model of cloud as storage, not cloud computing for image processing, analytics or virtual machines, this should be an easy choice, right? But its never easy with the cloud.Search something like best cloud storage and weed through the dozens of consumer-focussed services that simply rebrand someone elses storage with a new edge toward desktop integration, file search and analytics, multi-device continuous synchronisation and collaborative features, to name a few. These consumer and SME-focussed services want to be your end-to-end solution, so they often dont have the common interfaces (APIs) to live inside a larger workflow. For cloud storage to be usable in an enterprise or rich media content creation environment, it must be compatible with the internal network and have some ability to be integrated within the company applications.

Narrowing down the list to a few services that are pointed toward professional environments and integrate well within these environments yields some familiar brands and some new faces. Amazon and Microsoft have focussed on corporate environments the most, making them the top choices for many facilities. The AWS S3 interface has been adopted by some other cloud storage providers (like Wasabi) in order to leverage the existing compatibility that many media management applications have with AWS. Other providers chose to create their own interface, like Backblaze B2, considering this to be a more streamlined and less costly way to interface with cloud storage.

Regardless of how you get to the storage, these services all have one thing in common you pay by the GB/TB. In some cases, you only pay for what youre currently using, while in some cases you pay for any data uploaded, with a standard retention period thereafter.

In most cases, youll also pay for download or egress (because you may not always be downloading you may be moving or copying within the cloud). Egress cost can put a damper on the random access of media within the workflow outlined above. More importantly, it can have a big impact on the monthly bill, and the finance department doesnt like inconsistent costs.

The Wasabi method of calculating pricing eliminates the egress cost but replaces it with a mandatory retention period of 90 days. If you upload a file, youre charged for that file storage for at least 90 days, no matter when you delete that file. This period is well within the range of retention for most data placed in cloud storage, so the savings in egress cost make this solution worth a look.

The Bigger Picture

Cloud cant be everything to everyone, but it can help solve certain problems in production that would ordinarily call for on-premise hardware investment. For the big data producers in our industry, tape-based localised archive and back-up solutions may make sense, unless external file access and business continuity protection are higher priorities than cost. For those who want to integrate cloud for the purpose of structured tier 1 offload with random access, look for the companies that integrate the right cloud service into your content creation environments and offer the accountability that theyll work for your specific need.

Go here to read the rest:
Cloud Is On The List - BroadcastProME.com

Read More..

Xiaomi is offering a REALLY LONG Mi Cloud subscription plan that spans 60-YEARS – gizmochina

Xiaomi is now offering a couple of long-term Mi cloud subscription plans to its users in China with the longest one spanning 60 years. This would give users access to up to 200GB of storage on its cloud platform for what is, for most existing subscribers, a lifetime.

The Mi cloud long term plans come in two options, a 10-year plan, and a 60-year plan. There are two membership types: Gold and Platinum. The pricing is as follows.

10-year cloud storage 639 (~$92)

60-year cloud storage 1599 (~$230)

10-year cloud storage 199 (~$29)

60-year cloud storage 499 (~$72)

Mi cloud users have regular 1,3,6, and 12-month plans as well in addition to these long term options.

The Xiaomi Mi Cloud service offers data backup, synchronization, and storage for your contacts, texts, settings, personal app data, and personal photos.

While we dont have an official figure for the number of people using the Mi cloud service, it should run in millions. After all, there were over 291 million MIUI users in 2019, with 112.8 million from China alone. And Mi cloud comes as default on MIUI running phones.

(Via)

Continued here:
Xiaomi is offering a REALLY LONG Mi Cloud subscription plan that spans 60-YEARS - gizmochina

Read More..

Google Drive: Lost your Android phone or WhatsApp backup? Here’s where to find them – Express

If anything has failed, or there are changes that need to be made to your backups, the smartphone which is being backed-up to Drive will let you know. It's only via the device itself that you'll be able to make any meaningful changes too.

To find your smartphone backups within Google Drive following the latest change, you should click on the numbers under the "Storage" shortcut on the navigation sidebar.

From there, tap on the blue "Backups" label at the top of the Drive window and you'll be shown a complete view of your Google Drive backups, including device backups as well as those from WhatsApp.

If you prefer, you can also manually navigate there viadrive.google.com/drive/backupsor bookmark the URL if you need to regularly access these important files from your desktop.

Read the original here:
Google Drive: Lost your Android phone or WhatsApp backup? Here's where to find them - Express

Read More..

BackBlaze reports unexpectedly high failure rate for one of Seagate’s 12TB drives – Blocks and Files

BackBlaze has reported a higher-than-typical failure rate among some of our 12TB Seagate drives at its cloud storage facility.

In a recent hard drive stats report, Yev Pusin, BackBlazes director of marketing, notes Seagates ST12000NM0007 12TB drive has a 3.32 per cent annualised failure rate (AFR).

This is worse than the previous least-reliable drive, a 4TB Seagate model with two per cent AFR. Backblaze has two HGST 12TB drive models and their AFRs are 0.4 per cent and 0.56 per cent, as the table below shows.

A chart of the drive model AFRs indicates how Seagates 12TB drive stands out.

In 2017 and 2018, the 12TB Seagate drives AFR was 2.01 per cent and 1.39 per cent.

Its worth noting that situations like this are not uncommon in our industry and often go unnoticed by the end-users of the services, Pusin wrote, as most cloud providers do not inform customers or the public when they experience issues like what were describing.

BackBlaze is working with Seagate to understand whats going on. This work involves things like testing new drive platforms in real workload environments, providing telemetry tools to predict failures, performing ongoing custom adjustments, and employing firmware development and replacement units (RMAs). were also working together on a migration effort to replace these particular drives in our data centres.

As a fix, the company is migrating to a different Seagate 12TB drive model, the ST12000MN0008, and is also looking at 14TB and 16TB drives.

Pusin said: In the near term, we expect to see moderately increased failure rates for this specific subset of 12TB drives, but as we complete the drive migration, we project our fleets failure rates will restore to historical norms.

Backblaze customers should be unconcerned because the companys processes mask drive failures and recovery.

See original here:
BackBlaze reports unexpectedly high failure rate for one of Seagate's 12TB drives - Blocks and Files

Read More..

Data Deduplication Market Analysis, Growth by Top Companies, Trends by Types and Application, Forecast to2018 2026 – TechNews.mobi

Data deduplication is an advanced data compression technique used for reducing duplicate copies of the same data. Data deduplication is the process of identifying and eliminating identical information in a batch of stored data. Data deduplication solutions take a broader view to compare the same blocks or files across large storage data sets and remove redundant files. Network data deduplication is used to reduce the amount of bandwidth required to transfer data. This technique is used in an organization to reduce the amount of storage space utilized to save the same data. Data deduplication solutions allow enterprises to save storage and bandwidth cost. Further, data deduplication offers organizations benefits such as reducing hardware cost, increased storage capacity, and network efficiency.

Data deduplication is a trending technology used by organizations to reduce the need to store the same information file in a storage system. It plays an important role in primary storage by reducing the amount of data duplication. Companies operating in the data deduplication market are investing in advanced solutions. Demand for data deduplication solutions is increasing due to organizations need for reducing the redundancy of data in their primary storage. There is a rise in demand for a platform to store data in every industry. Industries such as information & technology; banking, financial services & insurance; oil & gas; and government require data storage solutions. A significant rise in the amount of data and a rise in the need for managing, analyzing, and storing this data are driving the data dedupilcation market. Further, an increase in demand for cloud storage is expected to significantly boost demand for data deduplication in the near future. Increase in demand for innovative time saving technologies to handle the large amount of data generated by enterprises is also anticipated to propel the data deduplication market in the coming years.

However, lack of security in cloud- and server- based services is likely to restrain the data deduplication market during the forecast period. Challenges in data deduplication are numerous, owing to the technological complexity and consistency required in data storage. Development of data storage technology is another challenge for the data deduplication market. Nevertheless, demand for data deduplication solutions from small & medium enterprises is expected to provide an opportunity to the market. The data deduplication market can be segmented based on enterprise size, application, and region. In terms of enterprise size, the data deduplication market can be classified into large enterprises and small & medium enterprises. Based on application, the data deduplication market can be divided into banking and financial services (BFSI), entertainment, digital marketing, education, IT, telecom, government, and others.

Get Sample Copy of this report at https://www.marketresearchreports.biz/sample/sample/8165?source=atm

In terms of region, the data deduplication market can be segmented into North America, Europe, Asia Pacific, Middle East & Africa, and South America. North America is a dominant region of the data deduplication market. The market in Asian countries such as China, Japan, and India is expected to expand at a significant rate compared to that in other regions. This is due to the presence of a large number of IT companies in the region. Moreover, companies are investing in the cloud storage model for storing data. This requires the deployment of security solutions for the protection of data and solutions to reduce the redundancy of files. This is likely to propel demand for data deduplication solutions. In data deduplication market, vendors are expanding data deduplication offerings with advancements in solutions as per demand from end-users.

Some of the players offering data deduplication are Oracle Corporation, IBM Corporation, EMC Corporation, FalconStor Software, Quantum Corporation, Symantec Corporation, Hitachi Protection Platform, Sepaton, Dell Inc., and ExaGrid.

The report offers a comprehensive evaluation of the market. It does so via in-depth qualitative insights, historical data, and verifiable projections about market size. The projections featured in the report have been derived using proven research methodologies and assumptions. By doing so, the research report serves as a repository of analysis and information for every facet of the market, including but not limited to: Regional markets, technology, types, and applications.

The study is a source of reliable data on: Market segments and sub-segments Market trends and dynamics Supply and demand Market size Current trends/opportunities/challenges Competitive landscape Technological breakthroughs Value chain and stakeholder analysis

Get Discount of this report at https://www.marketresearchreports.biz/sample/checkdiscount/8165?source=atm

The regional analysis covers: North America (U.S. and Canada) Latin America (Mexico, Brazil, Peru, Chile, and others) Western Europe (Germany, U.K., France, Spain, Italy, Nordic countries, Belgium, Netherlands, and Luxembourg) Eastern Europe (Poland and Russia) Asia Pacific (China, India, Japan, ASEAN, Australia, and New Zealand) Middle East and Africa (GCC, Southern Africa, and North Africa)

The report has been compiled through extensive primary research (through interviews, surveys, and observations of seasoned analysts) and secondary research (which entails reputable paid sources, trade journals, and industry body databases). The report also features a complete qualitative and quantitative assessment by analyzing data gathered from industry analysts and market participants across key points in the industry value chain.

A separate analysis of prevailing trends in the parent market, macro- and micro-economic indicators, and regulations and mandates is included under the purview of the study. By doing so, the report projects the attractiveness of each major segment over the forecast period.

Highlights of the report: A complete backdrop analysis, which includes an assessment of the parent market Important changes in market dynamics Market segmentation up to the second or third level Historical, current, and projected size of the market from the standpoint of both value and volume Reporting and evaluation of recent industry developments Market shares and strategies of key players Emerging niche segments and regional markets An objective assessment of the trajectory of the market Recommendations to companies for strengthening their foothold in the market

Note: Although care has been taken to maintain the highest levels of accuracy in TMR reports, recent market/vendor-specific changes may take time to reflect in the analysis.

Enquiry before buying at https://www.marketresearchreports.biz/sample/enquiryBuy/8165?source=atm

Tags: Data Deduplication MarketData Deduplication Market DynamicsData Deduplication Market GrowthData Deduplication Market KeyplayersData Deduplication Market Trends

See more here:
Data Deduplication Market Analysis, Growth by Top Companies, Trends by Types and Application, Forecast to2018 2026 - TechNews.mobi

Read More..

Preparing IT teams against growing online security threats The Manila Times – The Manila Times

TONY MAGHIRANG

Cybersecurity threats are growing in number and sophistication, but recent reports indicate that more than half of organizations worldwide do not give due priority to cybersecurity. This is especially troubling in Southeast Asia, where cybersecurity preparedness levels are scattered along the spectrum, from underdeveloped to advanced.

Gibu Mathew, vice president and general manager, Asia Pacific, Zoho Corp., recommended some basic steps that information technology (IT) departments could take to proactively ensure the safety of the network and the valuable data it contains.

Mathew said as a first step, enterprises should select cloud and application vendors who follow data security best practices. It is just as important to choose software and platform providers who offer a comprehensive set of practices, technologies, and policies in data security. Service providers with security certifications such as ISO/IEC 27001 and SOC 2, provisions for redundancy and business continuity, network security, and protection measures for data center should be at the top of the list of prospective vendors.

The Zoho executive also suggested that companies should provide cybersecurity training to employees. He underscored that the latest Global Encryption Trends study found that employee mistakes are considered a greater threat to data security than external hackers and malicious insiders. The need to train employees in the appropriate ways to handle company information couldnt be overemphasized in light of the fact that many organizations employ more remote workers than ever. As experts have noted, training and educating employees act as the first line of defense that help reinforce the organizations cybersecurity initiatives. Simple tips, such as resetting the passwords of all other online accounts when prompted to change it on one site and using unique passwords for each site, could go a long way in preventing security breaches.

Another useful advice is for IT departments to constantly ensure the security and privacy of information in the cloud. Cloud storage should have a more controllable data boundary layer to help maintain the privacy and security of confidential files. One security measure is for IT departments to have an online file management software that allows IT staff to restrict documents from being shared outside of the organization, as well as specify users who can access sensitive information based on their IP addresses or cause a file shared to the public to expire after 30 days. This level of control makes it unnecessary for an employee to download any document to a local device, especially confidential files and those pertaining to highly sensitive aspects of the business.

Mathew further advised that strengthening company passwords and employee credentials must be a standard best practice within the enterprise. IT staff should make sure employees regularly change the passwords they use for cloud business products even if its not mandated by the software service itself. Documents shared outside of the organization must also be password protected and equipped with an expiration date to invalidate the password after a set period of time.

There must also be a protocol to control and manage passwords across the organization, Mathew added. Designating or even employing an online password manager could be an effective means to manage all of the organizations passwords. Business requirements often demand selective sharing of passwords with others, which could pose a risk if employees with access to privileged information leave these passwords on sticky notes or on personal email. IT departments should also clearly define password ownership internally and enlist the help of software solutions to create audit trails when a shared password is used. Furthermore, alerts should be sent to the owner of the password or to the IT department leader when the passwords to sensitive resources are accessed. At any point, IT administrators should have a clear picture of who is accessing which passwords.

While cyberthreats would remain a part of corporate life, the foregoing security protection steps offered by Zoho Corp. Gibu Mathew would prepare and arm companies against the daily barrage of breach attempts. At the same time, IT administrators and teams could be proactive in protecting valuable and sensitive company data through online, cloud-based solutions that help manage enterprise passwords, monitor employee activity and secure documents shared with other employees and external partners.

Original post:
Preparing IT teams against growing online security threats The Manila Times - The Manila Times

Read More..

Fungible aims to slay the CPU bogeyman with composable microprocessor – Blocks and Files

Fungible Inc, a US composable systems startup, wants to front-end every system resource with its DPU microprocessors, offloading security and storage functions from server CPUs.

The company has not announced product yet, but a set of videos and white papers on its website provide a fairly detailed picture. We think product launch is likely in mid-to-late 2020.

Fungible is building a fully programmable microprocessor it calls this a data processing unit (DPU) that interlinks all resource elements in a composable system infrastructure.

According to Fungible, server CPUs are compute-centric and are ill suited for data-centric workloads. The company notes general-purpose server CPUs were developed to process as many instructions per second as possible. However, Moores Law is plateauing and CPUs can no longer keep up with the IO burden of todays data-intensive environments.

Many workloads are already offloaded to specialised GPUs and FPGAs which are more efficient at processing certain kinds of tasks. But Fungible claims server CPUs and other specialised compute resources can be used much more efficiently by linking them to storage resources across an Ethernet network. The network and its DPU edge devices perform the data-centric work, freeing server CPUs for application processing.

The server CPUs, GPUs, FPGAs, ASICs are thereby made fungible. (A fungible resource is one whose function can be carried out by any other unit of that resource, just like a single dollar bill can be replaced by any other dollar bill, or a gallon of gas by another gallon of gas.)

The server processors can be dynamically composed into processing systems sized for particular workloads, and their elements returned to the pool for re-use when the job is finished.

Fungibles DPUs enable this composability of the varied compute resources, plus persistent memory (Optane), SSDs and disk drives. They offload certain storage and security-related functions from the server CPUs, such as encryption and decryption, compression and decompression and firewall services.

Fungible was founded in 2017 by CEO Pradeep Sindhu and Bertrand Serlet, and is based in Santa Clara, California.

LinkedIn lists 181 employees and the startup has taken in $292.5m in three rounds of funding, including a $200m C-round led by Softbank Vision in 2019.

Sindhu and Serlet both worked at Xerox PARC back in the day.

Sindhu was the founding CEO and chairman of Juniper Networks, then Vice Chairman, CTO, and Chief Scientist. He left the company in February 2017 to found Fungible.

Serlet founded Upthere, a consumer cloud storage business acquired by Western Digital in 2017. Prior to that he was SVP of Software Engineering at Apple.

Fungible will face competition from five composable vendors.

At time of writing, only Liqid can compose a set of resources as extensive as Fungible aims to provide. It is funded to the tune of $50m considerably less than Fungible but has live product in the market.

Fungible says its DPUs offload storage and security services from server CPUs. On that basis, a Fungible setup with the same set of server resources as a Liqid system should outperform the latter in terms of application workload.Lets wait for launch and performance benchmarks.

More here:
Fungible aims to slay the CPU bogeyman with composable microprocessor - Blocks and Files

Read More..

Crowd Funding Market to Witness Slow Growth Owing to Unfavorable Government Policies in 2016 2022 – Redhill Local Councillors

The global Crowd Funding Market reached ~US$ xx Mn in 2019 and is anticipated grow at a CAGR of xx% over the forecast period 2016 2022. The business intelligence study of the Crowd Funding Market covers the estimation size of the market both in terms of value (Mn/Bn USD) and volume (x units).

In a bid to recognize the growth prospects in the Crowd Funding Market, the market study has been geographically fragmented into important regions that are progressing faster than the overall market.

Each market player encompassed in the Crowd Funding Market study is assessed according to its market share, production footprint, current launches, agreements, ongoing R&D projects, and business tactics. In addition, the Crowd Funding Market study scrutinizes the strengths, weaknesses, opportunities and threats (SWOT) analysis.

ThisPress Release will help you to understand the Volume, growth with Impacting Trends. Click HERE To get SAMPLE PDF (Including Full TOC, Table & Figures) athttps://www.persistencemarketresearch.co/samples/8422

What insights readers can gather from the Crowd Funding Market report?

The Crowd Funding Market report answers the following queries:

Get Access To TOC Covering 200+ Topics athttps://www.persistencemarketresearch.co/toc/8422

key players in crowd funding market, which are having their websites as the crowd funding platforms are as follows:-

The report covers exhaustive analysis on:

Regional analysis for Crowd Funding Market includes

Report Highlights:

In order to get a strategic overview of the market,Access Research Methodology Prepared By Experts athttps://www.persistencemarketresearch.co/methodology/8422

Why Choose PMR?

About us:

Persistence Market Research (PMR) is a third-platform research firm. Our research model is a unique collaboration of data analytics and market research methodology to help businesses achieve optimal performance.

To support companies in overcoming complex business challenges, we follow a multi-disciplinary approach. At PMR, we unite various data streams from multi-dimensional sources. By deploying real-time data collection, big data, and customer experience analytics, we deliver business intelligence for organizations of all sizes.

Contact us:

Persistence Market Research305 Broadway, 7th FloorNew York City, NY 10007United StatesPh.no. +1-646-568-7751

Read the original here:
Crowd Funding Market to Witness Slow Growth Owing to Unfavorable Government Policies in 2016 2022 - Redhill Local Councillors

Read More..

How the sands have shifted on Awaroa, ‘New Zealand’s beach’ – Stuff.co.nz

Not long after Awaroa became New Zealand's beach, resident Geoff Philips found a woman camping on the sand.

"I said, 'what are you doing here?' She said, 'I paid money towards this'. I said, 'where did you go to the toilet?' 'Oh, I didn't go', she told me.

"I said, 'really? In 24 hours you didn't go to the toilet?'"

The furtive camper was one of many Kiwis who chipped in for the 2016 Givealittle campaignthat raised $2.8m to buy Awaroa Beach for New Zealand. The 2.8-hectare (6.9 acre) property, with its 800 metres of coastline, later became part of Abel Tasman National Park.

READ MORE:*Awaroa Beach officially becomes part of Abel Tasman National Park*A year on - visiting Awaroa Bay, the beach that Kiwis bought*Adam Gard'ner: Community spirit at heart of buy the beach campaign

For a while, interest in the beach was strong, Philips said. Tourists sprawledon the white stretch of sand and hikedalong the 2km-long inlet.Tour guides cashed in on the beach's fame.

BRADEN FASTIER/STUFF

After the crowdfunding campaign, boat operators would point the beach out to visitors, said Geoff Philips. "All the boat operators made a meal of it, come down and see your beach."

"All the boat operators made a meal of it, 'come down and see your beach'."

Four years later, the dust has settled, Philips said. But as part of one of the country's most visited coastlines,Awaroa Beach has hitched its wagon tothe fortunes of the national park,home to golden beaches, turquoise waters and one of the country's favouritewalks.

Last year, about 300,000 people visited the park, a tenfold increase since Philips built his property on a bankoverlooking theestuary30 years ago.

For a long timethe home was a summer getaway, butthree years ago, after a couple of health scares, Philips packed in his Wellington job and moved to the beach. His wife, Elva, keeps a foot in each camp, dividing her time between the capital and Awaroa.

BRADEN FASTIER/STUFF

The sands have always shifted on Awaroa Beach. In 2018, when Cyclone Fehi's storm surge coincided with a king tide, vegetation and sand was swept away.

Summers are busy for Philips, who works for tour company Wilsons. Heferriespeople to and from water taxis, and rescues stranded kayakersandlost hikers. During colder months, he has the beach to himself,an unofficial caretaker for the handful of baches that line the inlet.

Over the decades, Philips has watched thelandscape change.

Twenty-five years ago, the sea forged a new path into the inlet, taking out a house and a slice of land. And in 2018, the storm surge of ex-Tropical Cyclone Fehi coincided with a king tide, inundatingcampsites around the park. Awaroa Beach lost a large section of dunes, including habitat for nesting birds.

"When the spitwashere we had 300 ternsbut now there'snowhere for them to go," Elva said.

BRADEN FASTIER/STUFF

Geoff and Elva Philips are the sole year-round residents of the Awaroa Bay community.

"The cyclone took a lot of sand. It's good that people boughtthe beach, but it's half what it was."

Last year, aDepartment of Conservation reportoutlined the expected impact of an expected 0.5 to 1msea level rise by 2100 on New Zealand's coastal areas.

Sixty-two Abel Tasman assets, including huts and campsites,and more than five per cent of the track are at risk, the report said.Higher tides are coming, and DOC plansto move some campsites to safer ground.

When Awaroa Beachbecame part of the national park in 2016, DOC said work would be done to restore the dune ecology.

BRADEN FASTIER/STUFF

To get to Awaroa Beach, you'll need to take a water taxi, or park at the end of the long inlet.

Operations manager Dave Winterburn said the first priorities after the beach changed hands were fencing off nesting areas and arranging access for walkers and boat operators.

Over the coming year, DOC will "explore options for restoration", he said.

"While the cyclones did impact some private beachfront properties around theAwaroaestuary they weren't a determining factor for whether work was done or not done on the 'People'sBeach'.

"If anything they have prompted more discussion about restoration work."

With the sea nibbling away at their front garden, the Philips can't help think about Awaroa's future.

But for now, they do what they can to preserve the beach.

BRADEN FASTIER/STUFF

Catherine Taylor was working in Doubtful Sound when she donated $20 to the crowdfunding campaign in 2016. Now, she's a chef at Meadowbank Lodge, on the beach she helped buy.

"It's our backyard," Elva said. "If there's rubbish on the ground we pick it up. We just think, we have to look after it."

Catherine Taylor works as a chef at Meadowbank Homestead, catering to package tours of hikers and kayakers making their way along the coastal track.

Four years ago, she was working on a cruise boat in Doubtful Sound,a job that ignited alove of wildand remote landscapes.

After work, Taylor and her colleagues would turn to the quiz in The Southland Times. Flipping through the pages one evening, the crew spotted a story about the crowdfunding campaign.

BRADEN FASTIER/STUFF

Meadowbank Lodge chef Catherine Taylor caters for crowds of hungry kayakers and trampers passing through Awaroa Bay.

"It reminded us of where we were, andwhat if that was sold off overseas," Taylor said."I felt very strongly I wanted [Awaroa] to stay in New Zealand."

Taylor pledged $20 to the campaign, then forgot about the white-sand beach until acouple of years later, when she got a job on tour boats travelling along the Abel Tasman.

"One day, I was on the boat and they were like, this is your beach. It was a shock when I realised.

"I put towards it without knowing [where it was], and now I'm working here."

Visiting Awaroa Beach means a water taxi journey, or a 2kmhike along the inlet from the end of an unsealed road.

The remoteness preserves the beach's tranquility, Taylor said.

"Other parts of the park are very busy. To come to Awaroa and have the whole beach to yourself is amazing."

BRADEN FASTIER/STUFF

Kayak guide Rob Barth loves to show off the Abel Tasman's bird life, estuaries and beaches to visitors.

RobBarthhas spent two summers working as a kayak guide on the Abel Tasman.

It's easy to see why visitors love the park.

"The golden beaches, the clear waters, the estuaries,the bird life," Barth said.

Working on the water, Barth has a keen eye for the way the coastline has altered. AfterFehi, it was "exciting" to see how dramatic some of the changes were, he said.

But the effect on the bush and the birdlife was sobering, he said.

"The waves are changing and the sand is shifting,"Barthsaid."I think about it a lot."

There were few tourists on the beach when Stuff visited.

BRADEN FASTIER/STUFF

German visitors Theresa Hasmann and Jens Haumann thought the beach would be packed. But they found it "lonely".

Theresa Hasmann and her partner, Jens Haumannwere on holiday from Germany. They stayed in Nelson the night before and visited Awaroa on a recommendation from their hostel. With limited time, they planned to view the rest of the park from the top deck of a water taxi.

"The landscape isreally pretty," Hasmannsaid. "I thought because it ishighseason there'sgoing to be a lot of people. But there'snot;it'slonely."

Irish couple Catriona and Eugene Scally were soaking up the sun ahead of a walk to Tonga Quarry to meet their water taxi.

"We couldn't be further away from Ireland," Eugene said.

He hadn't heard of the crowdfunding efforts, but wasn't surprised that Kiwis had thrown their weight behind the campaign.

"People have pride in where they live, I think that's absolutely fantastic.

BRADEN FASTIER/STUFF

"We couldn't be further away from Ireland." Irish couple Eugene and Catriona Scally enjoyed the solitude on Awaroa Beach.

"We heard [New Zealand] was beautiful but it's exceeded our expectations."

Christchurch manAdamGard'nerwas another visitorto Awaroathis summer.The beach has special significance forthe Christchurch man and his family:Gard'nerandhis brother-in-lawDuaneMajor were behindthe 2016Givealittlecampaign.

Hetriesto getback each year, butJanuary wasthe firsttime he'd visited with his children for sometime.

"We justlove it.The pristine beach,the beautiful green ofthe bush land, it's magical."

MARTIN DE RUYTER/STUFF

Adam Gard'ner and Duane Major dreamed up the crowd funding campaign to buy Awaroa Beach for New Zealanders.

The family walkedthroughthe bush, swam inthe sea, and chattedto other visitors.

"They mentioned how cool itwasthatit's partofthe park now and can be shared by everyone."

Gard'nerkeptsilentabouthis partinthe beach, butitwas a meaningful moment.

"Whenthe land can connectpeople,thatcan be really powerful."

See the original post here:
How the sands have shifted on Awaroa, 'New Zealand's beach' - Stuff.co.nz

Read More..

Security of online voting questioned | News, Sports, Jobs – The Daily Times

CHARLESTON An internet voting app that has been used in pilots in West Virginia, Denver, Oregon and Utah has vulnerabilities that could allow hackers to change a persons vote without detection, according to researchers at the Massachusetts Institute of Technology.

The analysis of the Voatz app, which has mostly been used for absentee voters and overseas military personnel, found that attackers could alter, stop or expose how an individual has voted.

Voting security experts have long argued that online voting is dangerously insecure.

We all have an interest in increasing access to the ballot, but in order to maintain trust in our elections system, we must assure that voting systems meet the high technical and operation security standards before they are put in the field, Daniel Weitzner, an MIT scientist who oversaw the report, said Thursday.

The researchers said they were forced to reverse engineer an Android version of the app because Voatz hasnt allowed transparent third-party testing of the system.

Boston-based Voatz disputed the research methods, issuing a statement that said the analysts used an old version of the app and accused them of acting in bad faith. The company noted it hasnt had any reported issues in its counting of less than 600 votes over nine pilot elections.

Although few voters are expected to cast ballots on such apps in the coming election, the report casts a harsh light on the looming proposition of online voting. In 2018, Alaska explored using an online voting system but shuttered the program because of security concerns.

To some experts, a study finding holes in a smartphone voting app wasnt a shock.

Not to in any way diminish this (excellent) work, but the fact that an online mobile voting scheme has serious security flaws is ultimately unsurprising, tweeted Matt Blaze, a professor of computer science and law at Georgetown University. Every serious expert has warned against Internet voting.

Voatz was used in West Virginias 2018 elections, but state officials were quick to point out that it counted fewer than 200 ballots and had no reported problems. The app also was used in the 2016 Massachusetts Democratic Convention and the 2016 Utah Republican Convention.

The study comes as West Virginia prepares to choose an online voting system for a newly passed law requiring that it allow people with physical disabilities to vote electronically. Donald Kersey, a general counsel in the secretary of states office, said officials havent decided on which platform they will use to conform to the new law but maintained that public confidence is paramount.

Obviously, integrity and security are prime, but voter confidence is equally important, he said.

STEUBENVILLE The last of three superloads will be traveling through Weirton and Jefferson and Harrison counties ...

CHARLESTON (AP) The West Virginia Senate on Friday passed a bill encouraging power companies to use solar ...

CHARLESTON A new report detailing possible issues with a mobile voting app that could be rolled out to voters ...

See the original post here:
Security of online voting questioned | News, Sports, Jobs - The Daily Times

Read More..