Page 4,094«..1020..4,0934,0944,0954,096..4,1004,110..»

Global Cloud Computing in Education Sector Industry Forecast to 2025 with Top Key Manufacturers – Eastlake Times

TheGlobal Cloud Computing in Education Sector Marketstatus, future forecast, growth opportunity, key market and key players. The study objectives are to present the Cloud Computing in Education Sector development in United States, Europe and China.

Cloud computing is the on demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. Large clouds, predominant today, often have functions distributed over multiple locations from central servers. If the connection to the user is relatively close, it may be designated an edge server.

In 2018, the global Cloud Computing in Education Sector market size was xx million US$ and it is expected to reach xx million US$ by the end of 2025, with a CAGR of xx% during 2019-2025.

Request a sample of this report @http://orbisresearch.com/contacts/request-sample/2986623.

The key players covered in this study

Amazon Web Services

Microsoft Azure

IBM

Aliyun

Google Cloud Platform

Salesforce

Rackspace

SAP

Oracle

Dell EMC

Adobe Systems

Verizon Cloud

NetApp

Baidu Yun

Tencent Cloud

Blackboard

Market segment by Type, the product can be split into

Infrastructure as a Service (IaaS)

Platform as a Service (PaaS)

Software as a Service (SaaS)

Market segment by Application, split into

K-12 Schools

Higher Education

Market segment by Regions/Countries, this report covers

United States

Europe

China

Japan

Southeast Asia

India

Central & South America

If enquiry before buying this report @http://orbisresearch.com/contacts/enquiry-before-buying/2986623.

The study objectives of this report are:To analyze global Cloud Computing in Education Sector status, future forecast, growth opportunity, key market and key players.To present the Cloud Computing in Education Sector development in United States, Europe and China.To strategically profile the key players and comprehensively analyze their development plan and strategies.To define, describe and forecast the market by product type, market and key regions.

About Us:Orbis Research (orbisresearch.com) is a single point aid for all your market research requirements. We have vast database of reports from the leading publishers and authors across the globe. We specialize in delivering customized reports as per the requirements of our clients. We have complete information about our publishers and hence are sure about the accuracy of the industries and verticals of their specialization. This helps our clients to map their needs and we produce the perfect required market research study for our clients.

Contact Us:Hector CostelloSenior Manager Client Engagements4144N Central Expressway,Suite 600, Dallas,Texas 75204, U.S.A.Phone No.: +1 (214) 884-6817; +912064101019Email ID:sales@orbisresearch.com

See more here:
Global Cloud Computing in Education Sector Industry Forecast to 2025 with Top Key Manufacturers - Eastlake Times

Read More..

The Top Cloud Computing Books You Need to Read in 2020 – Solutions Review

Are you looking for the best books on cloud computing to read in 2020? The cloud is one of the quickest-growing technologies of recent years; more and more businesses are looking for cloud knowledge and expertise in their current and prospective employees. Books, whether hardcover or digital, are an excellent source for people looking to learn about a specific field of technology, and the cloud is no exception.

Weve listed the top 12 cloud computing books that you should add to your reading list below! These books are intended for beginners and experts alike and are written by authors with proficiency and/or recognition in the field of cloud computing.

If youre looking for a managed service provider to help you manage your cloud deployments, you should check out our free MSP Buyers Guide! The guide contains profiles on the top cloud managed service providers for AWS, Azure, and Google Cloud, as well as questions you should ask vendors and yourself before buying. We also offer an MSP Vendor Map that outlines those vendors in a Venn diagram to make it easy for you to select potential providers.

by Stephen Orban

Cloud computing is the most significant technology development of our lifetimes. It has made countless new businesses possible and presents a massive opportunity for large enterprises to innovate like startups and retire decades of technical debt. But making the most of the cloud requires much more from enterprises than just a technology change. Stephen Orban led Dow Joness journey toward digital agility as their CIO and now leads AWSs Enterprise Strategy function, where he helps leaders from the largest companies in the world transform their businesses.

by Michael J. Kavis

Cloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a cloud model, you need to determine what the ideal cloud service model is for your business. Architecting the Cloud is vendor neutral and guides you in making one of the most critical technology decisions that you will face: selecting the right cloud service model(s) based on a combination of both business and technology requirements.

by Moe Abdula, Ingo Averdunk, Roland Barcia, Kyle Brown, and Ndu Emuchay

As cloud technologies continue to challenge the fundamental understanding of how businesses work, smart companies are moving quickly to adapt to a changing set of rules. Adopting the cloud requires a clear roadmap backed by use cases, grounded in practical real-world experience, to show the routes to successful adoption. The Cloud Adoption Playbook helps business and technology leaders in enterprise organizations sort through the options and make the best choices for accelerating cloud adoption and digital transformation.

by Thomas Erl

Thomas Erl, one of the worlds top-selling IT authors, teams up with cloud computing experts and researchers to break down proven and mature cloud computing technologies and practices into a series of well-defined concepts, models, technology mechanisms, and technology architectures, all from an industry-centric and vendor-neutral point of view. In doing so, the book establishes concrete, academic coverage with a focus on structure, clarity, and well-defined building blocks for mainstream cloud computing platforms and solutions.

by Thomas Erl

Best-selling service technology author Thomas Erl has brought together the de facto catalog of design patterns for modern cloud-based architecture and solution design. More than two years in development, this books 100+ patterns illustrate proven solutions to common cloud challenges and requirements. Its patterns are supported by rich, visual documentation, including 300+ diagrams.

by Ray Rafaels

Your Complete Guide to Cloud Computing and Migrating to the Cloud. This book covers not only the technical details of how public and private cloud technology works but also the strategy, technical design, and in-depth implementation details required to migrate existing applications to the cloud. After reading this book, you will have a much better understanding of cloud technology and the steps required to quickly reap its benefits while at the same time lowering your IT implementation risk.

by Joe Weinman

Cloudonomics radically upends the conventional wisdom, clearly explains the underlying principles and illustrates through understandable examples how Cloud computing can create compelling valuewhether you are a customer, a provider, a strategist, or an investor. Cloudonomics covers everything you need to consider for the delivery of business solutions, opportunities, and customer satisfaction through the Cloud, so you can understand it. Cloudonomics also delivers insight into when to avoid the cloud, and why.

by Raj Samani, Brian Honan, and Jim Reavis

CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance. For years the CSA has been at the forefront of research and analysis into the most pressing security and privacy related issues associated with cloud computing. CSA Guide to Cloud Computing provides you with a one-stop source for industry-leading content, as well as a roadmap into the future considerations that the cloud presents.

by James Bond

If youre planning your long-term cloud strategy, this practical book provides insider knowledge and actionable real-world lessons regarding planning, design, operations, security, and application transformation. This book teaches business and technology managers how to transition their organizations traditional IT to cloud computing. Rather than yet another book trying to sell or convince readers on the benefits of clouds, this book provides guidance, lessons learned, and best practices on how to design, deploy, operate, and secure an enterprise cloud based on real-world experience.

by Zeal Vora

Automating security tasks, such as Server Hardening with Ansible, and other automation services, such as Monit, will monitor other security daemons and take the necessary action in case these security daemons are stopped maliciously. In short, this book has everything you need to secure your Cloud environment with. It is your ticket to obtain industry-adopted best practices for developing a secure, highly available, and fault-tolerant architecture for organizations.

by Kief Morris

Ideal for system administrators, infrastructure engineers, team leads, and architects, this book demonstrates various tools, techniques, and patterns you can use to implement infrastructure as code. In three parts, youll learn about the platforms and tooling involved in creating and configuring infrastructure elements, patterns for using these tools, and practices for making infrastructure as code work in your environment.

by Edward Mahon

An inconsistency exists between actual cloud adoption rates and the viewpoints and direct actions of those responsible for corporate information technology operations. On the one hand, information technology (IT) leaders generally believe the cloud more easily enables the implementation and management of technology services, from web and mobile application development to on-demand computing and storage. These leaders also appreciate the clouds consumption-based pricing model over their current capital-intensive cost structures.

Looking for more info on managed service providers for your cloud solutions? OurMSP Buyers Guidecontains profiles on the top cloud managed service providers for AWS, Azure, and Google Cloud, as well as questions you should ask vendors and yourself before buying. We also offer anMSP Vendor Mapthat outlines those vendors in a Venn diagram to make it easy for you to select potential providers.

Check us out onTwitterfor the latest in Enterprise Cloud news and developments!

Dan is a tech writer who writes about Enterprise Cloud Strategy and Network Monitoring for Solutions Review. He graduated from Fitchburg State University with a Bachelor's in Professional Writing. You can reach him at dhein@solutionsreview.com

Related

See the original post here:
The Top Cloud Computing Books You Need to Read in 2020 - Solutions Review

Read More..

Microsofts Biggest Business Could Be the Cloud by 2023, Analyst Says – Barron’s

Text size

Microsoft stock has had a remarkable renaissance with CEO Satya Nadella at the helm, driven in particular his full embrace of cloud computing, with the companys Azure public cloud business at the heart. And as one analyst notes this morning, Azure could become a bigger operation than you likely imagine.

In a research note Monday, Stifel Nicolaus analyst Brad Reback notes that Azure is already at a $17 billion annualized revenue run ratebut that businesses that are potential customers are still in the early stages of shifting computing to the could, with less than 10% penetration so far. He notes that there is potential for more of the kind of gigantic contracts like the recent Defense Department $10 billion JEDI contract, in which Microsoft beat out a competing bid by Amazon.coms (AMZN) Amazon Web Services.

Reback rates Microsoft stock (ticker: MSFT) at Buy with a $160 price target.

Over the last several quarters, it has become increasingly clear, based on large cloud deal activity and strong hybrid cloud growth, that as enterprises of all sizes begin their respective digital transformation journeys, Microsoft is effectively tapping into sizable Tier-1 enterprise workloads that it was not directly exposed to in the client/server world, Reback writes. The emergence of the hyperscale cloud has fundamentally changed the landscape, allowing Microsoft to now provide many of the services to customers that it used to leave for partners.

In his note, Reback rattles off a string of recent large public cloud contracts. Snap (SNAP) has a $2 billion, five-year deal with Alphabets (GOOGL) Google Cloud, and a $1.1 billion commitment over five years to AWS. Pinterest (PINS) has a $750 million six-year deal with AWS. Apple (AAPL) spent $350 million with AWS in 2018. And he points out that Allianz, AT&T, BMW, Campbell, Columbia Sportswear, GAP, Kroger, Nuance, Salesforce.com, Sony, Walgreens Boots Alliance and Walt Disney Studios, among others have all announced large Azure deals with Microsoft in recent quarters.

His point is that there remains a huge opportunity for the public cloud players, including AWS, Google Cloud, and Azure.

Reback models the Azure business, which was $12.4 billion in the June 2019 fiscal year, at $26.7 billion in fiscal 2021, $35.2 billion in fiscal 2022, and more than $90 billion by fiscal 2030. By FY 2023, he says, it will be larger than Microsoft Office, Windows, and the Server and Tools businesses.

Microsoft stock is down 0.3%, to $149.59.

Write to Eric J. Savitz at eric.savitz@barrons.com

Excerpt from:
Microsofts Biggest Business Could Be the Cloud by 2023, Analyst Says - Barron's

Read More..

Cisco Restructuring To ‘Strongly Position The Company Against Our Competitors’ – CRN: The Biggest Tech News For Partners And The IT Channel

Cisco Systems is shaking up several of its business units, along with its leadership, to better address how customers are buying its networking and cloud products, according to an internal email obtained by CRN after a published report on Wednesday.

Cisco's enterprise networking and data center networking units will be combined, according to the email sent by David Goeckeler, Cisco's executive vice president and general manager of Networking and Security, which was first viewed and reported by The Information.

Cisco is also renaming its existing cloud computing business to Cloud Strategy and Compute and expanding the segment to include server products, the email explained.

While I know these updates may seem like a significant change, its important to understand, this alignment will strongly position the company against our competitors, according to Goeckeler in his email.

[Related: Former Cisco Channel Exec Nirav Sheth Jumps To Google Cloud]

"We are focused on the tremendous opportunities in front of us across cloud, automation, 5G, security and collaboration, said a Cisco spokesperson. To continue the great progress already made, we are making some organizational updates to our networking and security business. This changes will better align our development process with our customer's needs as they transition to a multi-domain approach."

In the midst of the shakeup, several Cisco executives are being reassigned, according to the email. Perhaps the biggest change-up is Cisco's Dave Ward, chief technology officer of engineering and chief architect, who will be stepping down from his post to take a new role inside the company. Roland Acra, senior vice president and general manager of Ciscos Data Center business unit, will be his replacement, according to the email.

The soon-to-be combined enterprise and data center networking unit will be led by Cisco's Senior Vice President and General Manager of enterprise networking, Scott Harrell, who has spent the last two years leading the enterprise networking business unit and has an 18-year tenure with Cisco.

Liz Centoni, a 19-year Cisco veteran and current senior vice president and general manager of IoT for the tech giant, will be heading up the new Cloud Strategy and Compute business unit. Cloud computing's former leader, Kip Compton, will move to Ciscos Networking and Security Business group, Goeckeler said in his email.

Cisco's network orchestration products, which are currently part of the Cloud Platforms and Solutions group, will become part of the Service Provider Business. Leading the group will still be Jonathan Davidson, Cisco's senior vice president and general manager of Service Provider Networking.

Cisco's restructure comes at a time in which the San Jose, Calif.-based networking titan is seeing some impact from a "challenging" macro-economic climate, according to Cisco CEO Chuck Robbins. Cisco's stock declined by 5 percent in after-hours trading following its Q2 2020 earnings call last Wednesday.

Cisco in recent years has felt the pinch in its data center business as more service providers virtualize their networks and are buying cheaper, white box gear. Many business customers are also moving to public cloud environments and out of the their private data centers.

A reorganization isn't a surprise, especially as more customers move to the cloud and evolve their IT infrastructures, according to one executive for a Cisco partner that did not want to be identified.

"We're not leading with Cisco today but we are using them as needed. We are also displacing Cisco in some cases," the executive said. "But no matter how many times they restructure, they are still the behemoth."

Cisco said it will not be changing any of its products in the wake of the reshuffle.

See original here:
Cisco Restructuring To 'Strongly Position The Company Against Our Competitors' - CRN: The Biggest Tech News For Partners And The IT Channel

Read More..

Kubernetes and the misconception of multi-cloud portability – Diginomica

Container news is flowing hot and heavy this week with the Linux Foundation KubeCon event, now 12,000 strong, serving as the backdrop for no less than 70 vendor and foundation announcements by my count of the pre-event press packet.

Most of these are feature updates and enhancements to a products container support, i.e. routine vendor news piggybacking off a major conference to magnify their reach.

However, the overriding theme of the event is the expanding penetration of containers in general and the Kubernetes management software in specific as an application platform.

Indeed, as Martin Banks recent column on VMworld Europe illustrated, much of the Kubernetes enthusiasm comes from enterprises seeing it as an alternative to full VMs, particularly now that VMware has given its imprimatur by tightly integrating containers into its ubiquitous infrastructure management software.

There are several incentives for the transition from VMs to containers, including more efficient resource usage, the availability of sophisticated workload management software like Kubernetes, a robust and growing software ecosystem (as evidenced at KubeCon) and a more rapidly scaled platform. However, one of the oft-cited reasons for container adoption, easy workload portability between cloud platforms, seems based more in theory than in practice.

Banks states the commonly-held container portability case this way:

But in practice, the Kubernetes/container movement has already created an environment where it is possible to package up an application and its associated data and move it to a more suitable platform. In future years that is likely to become the common approach, a move made without even thinking or, perhaps, not knowing it has happened.

I contend that such transparent, incognizant workload movement is only possible on vanilla container platforms for the simplest of applications and that in actuality, the dream of automated, multi-cloud application migration depends on moving the platform lock-in risk up a level of abstraction, from infrastructure environments to managed container services and their accompanying workload management systems.

That is, Kubernetes, even with its associated ecosystem of cloud-agnostic add-ons, wont be enough to provide transparent multi-cloud portability, particularly given the seduction of using managed container platforms and cloud-specific platform and application services, along with the friction of multi-cloud data movement and security policy enforcement.

With the understanding that most analogies are imperfect, here goes since it illustrates an underlying concept of implementation-specific complexity: Containerized workloads on Kubernetes are portable across clouds the same way Unix source code is portable between systems. As anyone who has ported application code between Unix platforms in the era before the ascendency of Linux on x86 can attest, there are plenty of devilish details to iron out before make installactually works.

When it comes to container/Kubernetes usage for real-life applications, I see the following issues all thwarting the goal of transparent platform portability:

Banks acknowledges one of these issues, namely how data gravity promotes platform lock-in via following the path of least resistance when he writes:

The issues of extracting data and applications at the end of a [cloud service] contract and the possibilities that a move to another supplier will involve some degree of re-engineering or at least re-optimising to suit the new environment all threaten the possibility of an additional cost burden in making such a move, adding to the possibility of remaining locked in being seen as the safest option.

However, data friction is one of the easier problems to solve, and not what I see as the chief source of lock-in.

Data movement and replication can be costly, but there are known solutions and thus, isnt the most forbidding problem, particularly for the new generation of cloud-native applications. Indeed, the term cloud-native captures a larger lock-in threat, once we clear up some confusion. Many people conflate the term cloud-native with containerized applications, particularly those using a microservice, i.e. disaggregated design. Its a constrained definition that I dispute since the primary advantage of cloud services is the opportunity to offload the implementation details of commodifiable functions to a service provider.

Such services naturally started at the lowest logical layers with infrastructure services like compute instances, object storage containers and network file shares, but have continually moved to higher levels of service abstraction; first to infrastructure applications like load balancers and nameservers, but later to application components like databases, message queues, notification systems, event-driven functions (serverless) and AI-based components.

Each of these cloud-specific features is the Lilliputian ropes of lock-in tying Gulliver, the enterprise developer, to a particular service provider and implementation by using proprietary APIs and other non-portable cloud features. The point isnt that the same functionality couldnt be implemented on another cloud, it could, since any clever feature introduced by one is quickly mimicked by the others. Its that the implementations are different and thus require significant effort by both developers and cloud operations teams to change.

The notion of seamless Kubernetes container-based application portability requires:

Alternatively, it requires shifting the platform and vendor lock-in to another layer by adopting a multi-cloud PaaS or meta-container implementation that abstracts the management control plane from the infrastructure implementation.

Think my scenario is a stretch and that the Kubernetes cognoscenti have more discipline than that? Think again. Datadog used Kubecon as the backdrop for an update to its container orchestration and Docker research reports and while brief, it has some relevant insights. Notably, Datadog found that of the 45 percent of organizations running Kubernetes, those doing so on cloud platforms (likely, most), are gravitating to managed Kubernetes services.

On Google Cloud, more than 90 percent run GKE, while on AWS, about a third use EKS. Whats the problem here, its standard Kubernetes you say? Consider this from the Pulumi blog , developers of a multi-cloud development platform, which summarizes the portability problem of CaaS products (emphasis added):

Kubernetes clusters from the managed offerings of AWS EKS, Azure AKS, and GCP GKE all vary in configuration, management, and resource properties. This variance creates unnecessary complexity in cluster provisioning and app deployments, as well as for CI/CD and testing. Additionally, if you wanted to deploy the same app across multiple clusters for specific use cases or test scenarios across providers, subtleties such as LoadBalancer outputs and cluster connection settings can be a nuisance to manage.

Irrespective of whether developers invoke cloud-native services from an application container, each managed container environment has different settings, cloud network interfaces and management interfaces. Sure, once you get them all set up it might be possible to move workloads between them, but what happens when you need to create a new cluster in a new region? Manual work recreating the configuration; that is unless youve taken the initiative to develop some automation scripts on each cloud to do most of the drudgery.

Source: Datadog survey; 8 facts about the changing container landscape

Datadog also found that almost a fifth of its AWS users run containers on Fargate, its managed instance service that eliminates the need to provision EC2 instances as cluster nodes. Indeed, Fargate usage has almost quadrupled in the past year and for good reason. Services like Fargate are incredibly convenient, but what happens when you want to shift workloads to a new cluster on Azure using Azure Container Instances (ACI)? How transparent is that going to be?

Source: Datadog survey; 8 facts about the changing container landscape

Finally, Datadogs survey found that 70 percent of Kubernetes users turn to NGINX for cluster traffic routing, but again, how will that change when DevOps teams get comfortable with service meshes and start using cloud services like AWS App Mesh, Azure Service Fabric Mesh and GCP Istio? How easily will routing policies and configurations port between implementations, since each is based on a different software platform and has different features?

Many of the products announced at KubeCon address the portability issues identified above. For example, Datadog announced multi-cloud performance monitoring for Kubernetes clusters, Yugabyte released a distributed database that works across multi-cloud clusters and several companies updated multi-cloud configuration management and automation tools to support Kubernetes. Indeed, theres a swarm of companies racing to solve the problem of multi-cloud infrastructure and application management, typically by introducing another level of software abstraction and dependence to handle the meta-level configurations.

See the article here:
Kubernetes and the misconception of multi-cloud portability - Diginomica

Read More..

How did Iran’s government pull the plug on the Internet? – Euronews

One of Iran's biggest internet blackouts means details about the impact of recent protests over fuel price hikes remains sketchy.

NetBlocks corroborated reports in Iranian media on Thursday that internet had been partly reinstated, "some connectivity is being restored, although only partially, national connectivity has risen further to 10%".

On Tuesday, Amnesty International said 100 protesters have been killed in 21 cities since last week's protests.

There has been no official confirmation and Tehran has called the figures "fabricated".

Experts say the lack of detail emerging about the protests is because the internet has been shut off in much of Iran as authorities attempt to stop people mobilising.

Irans judiciary spokesman, Gholamhossein Esmaili, said calm had been restored but some social media videos posted in defiance of an internet block showed protests continued in several cities on Monday night and a heavy presence of security forces in streets.

UN human rights spokesman Rupert Colville has called on authorities in Iran to restore the internet service cut off since Saturday, and uphold the demonstrators rights to freedom of expression and peaceful assembly.

The struggle of ordinary Iranians to make ends meet has become harder since last year when President Donald Trump withdrew the United States from Tehrans nuclear deal with world powers and reimposed sanctions on the country.

Combined with the rising inflation, growing unemployment, a slump in the rial and state corruption, Washingtons maximum pressure has caused Irans economy to deteriorate.

The government said the gasoline price rises of as much as 50% aim to raise around $2.55 billion (2.30 bn) a year for extra subsidies to 18 million families struggling on low incomes. The monthly cash payments are set at just 550,000 rials (4.01) per person.

Doug Madory, director of internet analysis at Oracle's Internet Intelligence team, noted on Twitter: "Unlike previous efforts at censorship and throttling, Iran is experiencing a multi-day wholesale disconnect for much of its population arguably the largest such event ever for Iran."

Whilst NetBlocks similarly affirmed reports on Tuesday: the last remaining networks are now being cut and connectivity to the outside world has fallen further to 4% of normal levels".

The international community and Iranians abroad have condemned the shutdown, with the UNs David Kaye asking on Twitter: "Whats being hidden from Iranians and the world?"

With reports of violence on the street increasing, a further concern is shouldered by those with families in Iran.

Sina Toossi, a research associate at the National Iranian American Council (NIA Council), told Euronews: "Unfortunately for us Iranian Americans, and the Iranian community abroad, its been immensely difficult to contact our loved ones back home. Usually, I use WhatsApp / Skype / Viber, all of these apps we cant access right now. Its very disconcerting that we have lost communication with our loved ones in the past few days

Many are questioning why this internet outage has been so widespread and devastating.

Amir Rashidi, an Iran internet security and digital rights researcher, who also works for the Center for Human Rights Iran, told Euronews the reasons are twofold.

"The Iranian government has realised they need to have control over the Internet, otherwise people can mobilise themselves, they have invested a lot in creating a local network National Information Network (NIN)," he said.

"Iran encouraged users and businesses to move services and servers inside Iran and use its national infrastructure."

The internet is the main platform and communication tool for Iranians to share their thoughts with each other and the world. With more platforms migrating to NIN, Iranians turned to circumvention tools and VPNs to access information, read about the protests, and communicate with one another.

Rashidi said: Since the US started their maximum pressure campaign, they imposed more pressures on Iran, Iranians werent able to use international platforms such as Amazon Cloud Web Services, Google Cloud, Github."

"US sanctions are further enabling the Iranian governments internet blackout," Toossi said.

"Weve seen an overcompliance with US sanctions by US tech companies. Google Cloud Services, Amazon Web Services, platforms that many Iranians use to access private virtual networks to circumvent filtering in Iran, in recent months, these companies have banned Iranians from their services directly citing US sanctions."

Nat Friedman, CEO of GitHub, wrote on Twitter in July: "It is painful for me to hear how trade restrictions have hurt people... to comply with US sanctions, we, unfortunately, had to implement new restrictions on private and paid accounts in Iran, Syria, and Crimea.

Amongst many others like Slack, these platforms have been forced to migrate off of these services onto Irans NIN, Toossi told Euronews: "This has allowed the Iranian government to be remarkably successful" in restricting internet access to a lot of ordinary users."

Rashidi concludes: "These sanctions were the biggest gift anyone could give the Iranian government."

It has long been levelled that Iranian civilians bear the brunt of western-imposed sanctions in terms of medicine and food shortages and money problems.

The US Department of the Treasury says sanctions target the "Iranian regime", not ordinary individuals.

In July, the US Department of State addressed these accusations in a video featuring US Special Representative for Iran, Brian Hook.

"The United States does not sanction hardware, software or services related to personal communications," Hook said, "Unlike your regime, we believe strongly in the free flow of communication and information."

However, Toossi notes: "The general license in US law, aimed at protecting ordinary Iranians and allowing them to circumvent government censors ... is five year-olds and its out of date".

Amongst others, the National Iranian American Council is calling for a revamp of General License D-1, which was issued in 2014.

Toossi says, If the Trump administration is sincere about helping Iranian people, they need to issue a new rule to this license, that expands the scope, and makes the necessary revisions."

At this point, many companies, out of a fear being fined and pressured by the US government for violating sanctions - are over complying with the license".

President of NIA Council, Jamal Abdi wrote on Twitter, Iranians are vulnerable to blackouts & abuse by Iran's government.

On the one hand, the Trump administration's aggressive hostile policies and maximum pressure campaign is impoverishing Iranian people and setting the two countries up for war Toossi tells Euronews.

"On the other hand, the repressive state, empowered hardliners in Iran who are cracking down, in light of gas price hike and suppression, is leading to more destructive situation internally.

When we talk about ingredients for peaceful democratic change and empowering Iranian people, these collectively punishing sanctions and scenario that has been created - this isnt the path to democratic change.

With #internet4iran trending, a petition has now been launched asking the White House to help reinstate internet to the Iranian people.

Rashidi noted: "The internet is so important, its the only place people can express themselves, without fear of being arrested, of course, some have been arrested for online activity, but you can be anonymous, if you know how to protect yourself, you can express your opinion and no one can find you."

Twitter has also become a platform on which ordinary Iranians can voice their concerns to people of authority.

Officials, ministers, Supreme Leaders, politicians, low-level city councillors are all on Twitter, Iranian people on Twitter try to keep them accountable and responsible, these are the tools people can use to pursue their request for more freedom and democracy for Iran.

See the rest here:
How did Iran's government pull the plug on the Internet? - Euronews

Read More..

Expert: Education industry ranks one of the worst when it comes to cyber security – FOX 59 Indianapolis

INDIANAPOLIS, Ind. The education industry is a target for cyber security attacks. Indiana school districts and universities are constantly detecting attackers trying to get your personal information.

Last week, a school district in northern Indiana had to restore its servers. Thats after a ransomware attack knocked out all of their internal systems district wide. The hackers wanted money to restore their service.

Thousands of students, staff and faculty make up a district or university. In moments, personal information can be compromised.

Our job is to stay one step ahead of that, said Andrew Korty, the Chief Information Security Officer at IUPUI, These groups are sophisticated groups, the attack groups that were talking about. Its organized crime.

He says hes dealt with his share of challenges.

Theres money that can be made out of identity theft, extortion, ransomware. So, theyre going to try and pick off the easiest targets, said Korty.

The education industry is one of those easy targets.

Weve always been faced with a fairly substantial level of attack attempts against us, said Korty.

Korty says personal information that school districts and universities require has value on the black market. IUPUI has had to add multiple safe guards to block hackers.

We have what we call two-step login, Korty explained, Which you may have seen with your bank, Facebook and things.

Maya Levine, a Security Engineer with Check Point Software says its more challenging for school districts because of funding.

I think a big portion of that is funding. Schools dont have money for textbooks, for overcrowded classrooms, not enough money to pay for teachers, things like that. That same concept is going to apply to technology and security, said Levine.

Other than adding two-step logins, Levine says everyone needs to learn the tricks hackers try to pull.

Really educate your users because humans are going to be the weakest point in anybodys cybersecurity defense posture. Thats just the way it goes, said Levine.

Staying a step ahead to protect our schools online.

Something bad could happen in the next 10 minutes and we just have to be ready for that, said Korty.

IUPUI has partnered with four other universities to form a security operations center. That way if an attack is detected at one of the institutions, IUPUI can know about it, before it hits.

There are some ways you can protect yourself against cyber crimes.

First, use a full-service internet security site to protect against hackers.

Then, youll want to create strong passwords. Experts recommend a combination of 10 letters, numbers and symbols.

Finally, keep your software updated, doing so can prevent hackers from exploiting known flaws.

Visit link:
Expert: Education industry ranks one of the worst when it comes to cyber security - FOX 59 Indianapolis

Read More..

Putin: ‘Thank God’ election interference accusations have stopped amid US ‘political battles’ | TheHill – The Hill

Russian President Vladimir PutinVladimir Vladimirovich PutinPutin: 'Thank God' election interference accusations have stopped amid US 'political battles' Live coverage: Impeachment spotlight shifts to Fiona Hill, David Holmes As Buttigieg rises, Biden is still the target MORE said Wednesday that he was thankful "internal political battles" in the United States were putting an end to accusations that Moscow interfered in the 2016 presidential election.

"We see what is going on there in the U.S. now," Putin said while speaking during an economic forum in the Russian capital, according to an English translation of his comments. "Thank God nobody is accusing us anymore of interfering in the U.S. elections. Now theyre accusing Ukraine."

Here's how Putin feels about the impeachment hearings: "Thank God nobody is accusing us any more of interfering in the U.S. elections."

"Now they're accusing Ukraine" pic.twitter.com/zQ14uRgWKG

Putin's comments appeared to reference allegations at the center of the House impeachment inquiry into President TrumpDonald John TrumpWatergate prosecutor says that Sondland testimony was 'tipping point' for Trump In private moment with Trump, Justice Kennedy pushed for Kavanaugh Supreme Court nomination: book Obama: 'Everybody needs to chill out' about differences between 2020 candidates MORE's dealings with Ukraine. During a July 25 phone call, Trumpurged Ukrainian President Volodymyr Zelensky toinvestigate former Vice President Joe BidenJoe BidenKamala Harris receives new Iowa endorsements after debate performance Watergate prosecutor says that Sondland testimony was 'tipping point' for Trump Overnight Defense Presented by Boeing Deal on defense bill proves elusive | Hill, Holmes offer damaging testimony | Trump vows to block Navy from ousting officer from SEALs MORE, who is running for president, and a conspiracy theory related to the 2016 election.

Trump called on the Ukrainian leader tolook into matters related to CrowdStrike, a U.S.-based internet security company that initiallyexaminedthe breach of the Democratic National Committee (DNC) servers in 2016. The request was an apparent reference to a conspiracy theory that casts doubt on the assessment that Russians were responsible for hacking the DNC.

There is no evidence to suggest that Ukraine was involved in any 2016 election interference. The U.S. intelligence community has also concluded that Russia sought to interfere in the election to harm Democratic nominee Hillary ClintonHillary Diane Rodham ClintonDemocratic strategist laments 'low bar' for Biden debate performance Wasserman Schultz makes bid for House Appropriations Committee gavel Trump to hold campaign rally in Pennsylvania next month MORE's candidacy and help Trump.

Trump's promotion of the theory has gained attention amid the House impeachment inquiry, with some Republicans defending the president's motives.

Once you understand that Ukrainian officials were cooperating directly with President Trump's political opponents to undermine his candidacy, it's easy to understand why the president would want to learn the full truth about these operations and why he would be skeptical of Ukraine," Rep. Devin NunesDevin Gerald NunesHill, Holmes offer damaging impeachment testimony: Five takeaways Putin: 'Thank God' election interference accusations have stopped amid US 'political battles' The Hill's 12:30 Report Presented by Johnson & Johnson Witness dismisses 'fictional' GOP claims of Ukraine meddling MORE (R-Calif.), the ranking member of the House Intelligence Committee, said during the fifth day of public impeachment hearings.

Nunes's comments came afterFiona Hill, a former top Russia analyst for the White House, strongly disputed the narrative that Ukraine interfered in the 2016 election.

Based on questions and statements I have heard, some of you on this committee appear to believe that Russia and its security services did not conduct a campaign against our country, and that perhaps, somehow, for some reason, Ukraine did, Hillsaid in heropening statementThursday.

This is a fictional narrative that has been perpetrated and propagated by the Russian security services themselves," she continued.

Hill isn't the first former administration official to dismiss the theory that Ukraine interfered in the 2016 election; Tom Bossert, a former White House homeland security adviser, said in late Septemberthat the allegation was a "completely debunked" conspiracy theory.

He added that he communicated that to Trump during his time working in the administration.

Read more:
Putin: 'Thank God' election interference accusations have stopped amid US 'political battles' | TheHill - The Hill

Read More..

The internet as we know it is off in Iran. Heres why this shutdown is different – WGNO New Orleans

(CNN) Iranians are still offline, three days after the government pulled the plug on the internet amid nationwide anti-government protests.

Experts say the shutdown is an attempt by the government to stop the flow of information and quash the demonstrations. David Kaye, the UN Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression, told CNN that the blackout makes it harder for people to organize, harder for people to protest.

The impact is extraordinarily disproportionate because (it makes) it almost impossible for people to communicate with one another on the ground (and) with friends and family overseas and impossible for people to get information, Kaye said.

Irans minister of telecommunications Mohammad Javad Azari Jahromi said that the government had ordered the cutoff on Saturday and promised that it would return soon, state broadcaster Press TV reported Monday.

Internet will return to the life of the Iranian people soon and the government [will] continue to develop it, Mohammad Javad Azari Jahromi said, according to Press TV. He added that some essential online services had been switched to Irans National Information Network (NIN), a centralized national intranet.

But on Tuesday, connectivity in Iran was down to just 4% of normal levels, according to Netblocks, a non-governmental organization that monitors internet governance.

Despite authorities attempts to make some internal services available to a limited number of users, the shutdown continues and the internet as we know it is not available in Iran, NetBlocks executive director Alp Toker told CNN.

This is not the first time that Tehran has shuttered online access to stop information from spreading. After the 2009 presidential election, the Iranian government realized that the internet is key for communication between people not just inside the country, but also outside the country, Amir Rashidi, an internet security and digital rights researcher at the Center for Human Rights in Iran, told CNN. The center is a civil society non-profit organization based in New York.

When the mass protests were going on in Iran in December 2017 and January 2018, as soon as they shut down Telegram, basically the protest was finished because people were not connected to each other and they couldnt communicate, he added.

This time though, the shutdown appears different.

Toker described the blackout as the most severe disconnection tracked by NetBlocks in any country in terms of its technical complexity and breadth. According to NetBlocks data, the switch off itself was so complex that it took 24 hours to complete.

And Doug Madory, the director of internet analysis at Oracle, said the latest incident is unusual in its scale. In the past, he said, Iran would either intentionally slow down the internet through bandwidth throttling, or block individual websites such as Facebook and Twitter.

This current blackout is way more advanced. Were seeing a variety of different actions take place some networks have withdrawn their routes while others continue to announce routes but block traffic, Madory wrote in a blog on Oracles website.

Kaye added that while Iran has been blocking websites for many years, it has not previously cracked down on the use of VPNs, private networks that allow users to bypass bans. He said the move suggests that the concern isnt merely that Iranians might communicate with one another, but also that they might communicate with the outside world and tell people whats happening.

Madory added that while the internet has grown bigger and more complex in Iran in recent years, the basic structur remains the same: Connectivity between Iran and the rest of the world flows only through state-controlled entities, which serve as bottlenecks between Iran and the global internet.

These chokepoints suggest the Iranian government has architected, and will likely retain, the ability to control (and in recent days block) internet access of its people, he said.

The drastic measure taken by Iran is not unique. Myanmar, China, India, Zimbabwe, Venezuela and other nations have also previously blocked the internet.

Theres a kind of epidemic of internet shutdowns around the world. And they all seem to have the same kind of impact and motivation, Kaye said. Its a real effort to deprive people of their basic human rights to access information worldwide.

Apart from blocking people from talking to each other, the blackouts are also radically limiting the amount of information that gets out of the country.

That has been the case in Indian-controlled Kashmir, where authorities imposed an almost complete communications blackout in August.

We dont know whats happening in the country except through kind of intermittent information that might get out of the country, Kaye said. The design is clearly to make it harder for people to tell their story outside of the country.

Here is the original post:
The internet as we know it is off in Iran. Heres why this shutdown is different - WGNO New Orleans

Read More..

The eyes have it – Telegraph India

Social media is a boon as long as it can be used as a propaganda tool by the State. It is a bane when people use it to criticize the government. Asian countries, including Bangladesh, Singapore, Vietnam and China, which launched the digital revolution in the past few years, are giving the impression that they are allowing people to be a part of the global cyberspace. In reality, they are curtailing cyber freedom in the name of national security. India will join the bandwagon soon. After all, the ruling Bharatiya Janata Party doesnt like dissenters.

In Bangladesh, the government has used the Digital Security Act, 2018 to target people who called for reforms in government service recruitment and for better road safety measures through social media campaigns. The police invoked the law against demonstrators for allegedly spreading false propaganda online. The law also came down heavily on press freedom and was used to arrest journalists and confiscate their equipment without a court order. This year itself, at least four journalists have been arrested for publishing false information online about the government and posting provocative status on social media.

Vietnam enacted its cybersecurity law this year to stave off cyberattacks and weed out hostile forces. The ruling communist government stated that Facebook violated this law, allowing Vietnamese users to post anti-government content, and delayed removing such content even after being requested to do so. Interestingly, in Vietnam, it is the governments prerogative to decide what is illegal.

Similarly, Singapores Protection from Online Falsehoods and Manipulation Act, which has come into effect, gives the government the power to order social media sites to put warnings next to posts that the authorities label false and damaging to Singapores interests. People fear that this would stifle free speech online and empower the ruling Peoples Action Party to curb dissent. According to the law, individuals who post false statements that threaten public interest on social media would risk up to five years in prison or a fine of 37,000 US dollars. In a country where the rhetoric of nationalism is shrill, there isnt a clear indication of what is considered to be public interest.

China, characteristically, has gone a step ahead by blocking access to non-China based online communications platforms. As per the China Internet Security Law in 2016, network operators need to cooperate with Chinese security agencies and allow them full access to data on request. Again, this is being done in the name of national security and to safeguard public interest.

Picking up a cue from its adversary, India has proposed the personal data protection bill, which would allow the government to access encrypted messages on apps. The BJP, which used online platforms extensively to run campaigns such as #MainBhiChowkidar and #ModiHaiTohMumkinHai, has now turned against it. Once the law is enacted, the government would have the right to ask online platforms to remove content that it considers to be false and against national interest. Such a legislation would give sweeping powers to the government to access personal data, thereby posing a threat to the peoples constitutional right to privacy. This could leave no place safe for people to speak freely in the worlds largest democracy.

Last year, the government had authorized 10 of its agencies to intercept and monitor information from any computer. This April, an Israeli firm reportedly hacked into WhatsApp messages to spy on activists, journalists and political dissidents. Even though the Indian State claimed its innocence, the Israeli firm clarified that it only works with government agencies. This is illuminating, given the BJPs approach towards peoples freedoms and constitutional rights.

The question is this: is the new data protection bill the final nail in the coffin before India turns into a surveillance State?

Link:
The eyes have it - Telegraph India

Read More..