Page 4,104«..1020..4,1034,1044,1054,106..4,1104,120..»

What Is Cloud Computing? How Does Cloud Computing Work …

Cloud computing refers to any kind of hosted service that is delivered over the Internet.What Is Cloud Computing?

Cloud computing refers to any kind of hosted service delivered over the internet.These services often include servers, databases, software, networks, analytics and other computing functions that can be operated through the cloud.

Files and programs stored in the cloud can be accessed anywhere by users on the service, eliminating the need to always be near physical hardware.In the past, for example,user-created documents and spreadsheets had to be saved to a physical hard drive, USB drive or disk. Without some kind ofhardware component, the files were completely inaccessible outside the computer they originated on. Thanks to the cloud, few people worry anymore about fried hard drives or lost or corruptedUSB drives. Cloud computing makes the documents available everywhere because the data actually lives on a network of hosted servers that transmit data over the internet.

Cloud computing services are broken down intothree major categories: software-as-a-service (SaaS), platform-as-a-service (PaaS) and infrastructure-as-a-service (IaaS).

Software-as-a-ServiceSaaS is the most common cloud service type. Many of us use it on a daily basis. The SaaS model makessoftware accessible through an app or web browser. Some SaaS programs are free, but many require a monthly or annual subscription to maintain the service. Requiring no hardware installation or management, SaaS solutions are a big hit in the business world. Notable examples include Salesforce, Dropbox or Google Docs.

Platform-as-a-Service PaaS is acloud environment supporting web application development and deployment. PaaS supports the full lifecycle of applications, helping users build, test, deploy, manage and update all in one place. The service also includes development tools, middleware and business intelligence solutions. Notable examples includeWindows Azure, AWS Elastic Beanstalk and Google App Engine.

Infrastructure-as-a-Service IaaS provides users with basic computer infrastructure capabilities like data storage, servers andhardware all inthe cloud.IaaS gives businesses access to largeplatforms and applications without the need forlarge onsite physical infrastructures. Notable examples of IaaS includeDigitalOcean, Amazon EC2 and Google Compute Engine.

The cloud is basically a decentralized place to share information through satellite networks. Every cloud application has a host, and the hosting company is responsible for maintaining the massive data centers that provide the security, storage capacity and computing power needed to maintain all of the information users send to the cloud.

The most prominent companies hosting the cloud are major playerslike Amazon (Amazon Web Services), Microsoft (Azure), Apple (iCloud) and Google (Google Drive), but there's also a plethora of other players, large and small.These hosting companies can sell the rights to use their clouds and store data on their networks, while also offering the end user an ecosystem that can communicate between devices and programs (e.g., download a song on your laptop and it's instantly synced to the iTunes software on your iPhone).

Generally, cloud computing follows three delivery models:

PublicThis is the most common and all of the players mentioned above (Amazon, Microsoft, Apple & Google) run public clouds accessible anywhere with login credentials and the right web app.

PrivateThis model offers the same kind of flexibility as the public cloud, but with the infrastructure needs (hosting, data storage, IT staff, etc.)provided by the companies or users of the service. Additionally, the restricted access and hands-on management of hosting gives the private model an extra layer of security.

HybridHybrid cloud computing isa combination of the public and private models. The two cloud types are linked over the internet and can share resources when needed (e.g., if the private cloud reaches storage capacity or becomes corrupted, the public cloud can step in and save the day).

Read the original post:
What Is Cloud Computing? How Does Cloud Computing Work ...

Read More..

Top Cloud Computing ETFs

This is a list of all Cloud Computing ETFs traded in the USA which are currently tagged by ETF Database. Please note that the list may not contain newly issued ETFs. If youre looking for a more simplified way to browse and compare ETFs, you may want to visit our ETFdb.com Categories, which categorize every ETF in a single best fit category.

* Assets and Average Volume as of 2019-11-19 20:21 UTC

This page includes historical return information for all Cloud Computing ETFs listed on U.S. exchanges that are currently tracked by ETF Database.

The table below includes fund flow data for all U.S. listed Cloud Computing ETFs. Total fund flow is the capital inflow into an ETF minus the capital outflow from the ETF for a particular time period.

Fund Flows in millions of U.S. Dollars.

The following table includes expense data and other descriptive information for all Cloud Computing ETFs listed on U.S. exchanges that are currently tracked by ETF Database. In addition to expense ratio and issuer information, this table displays platforms that offer commission-free trading for certain ETFs.

Clicking on any of the links in the table below will provide additional descriptive and quantitative information on Cloud Computing ETFs.

The following table includes ESG Scores and other descriptive information for all Cloud Computing ETFs listed on U.S. exchanges that are currently tracked by ETF Database. Easily browse and evaluate ETFs by visiting our ESG Investing themes section and find ETFs that map to various environmental, social, governance and morality themes.

This page includes historical dividend information for all Cloud Computing ETFs listed on U.S. exchanges that are currently tracked by ETF Database. Note that certain ETPs may not make dividend payments, and as such some of the information below may not be meaningful.

The table below includes basic holdings data for all U.S. listed Cloud Computing ETFs that are currently tagged by ETF Database. The table below includes the number of holdings for each ETF and the percentage of assets that the top ten assets make up, if applicable. For more detailed holdings information for any ETF, click on the link in the right column.

The following table includes certain tax information for all Cloud Computing ETFs listed on U.S. exchanges that are currently tracked by ETF Database, including applicable short-term and long-term capital gains rates and the tax form on which gains or losses in each ETF will be reported.

This page contains certain technical information for all Cloud Computing ETFs that are listed on U.S. exchanges and tracked by ETF Database. Note that the table below only includes limited technical indicators; click on the View link in the far right column for each ETF to see an expanded display of the products technicals.

This page provides links to various analysis for all Cloud Computing ETFs that are listed on U.S. exchanges and tracked by ETF Database. The links in the table below will guide you to various analytical resources for the relevant ETF, including an X-ray of holdings, official fund fact sheet, or objective analyst report.

This page provides ETFdb Ratings for all Cloud Computing ETFs that are listed on U.S. exchanges and tracked by ETF Database. The ETFdb Ratings are transparent, quant-based evaluations of ETFs relative to other products in the same ETFdb.com Category. As such, it should be noted that this page may include ETFs from multiple ETFdb.com Categories.

See the original post here:
Top Cloud Computing ETFs

Read More..

Ask the Expert: Cloud Computing in 2020 – Datamation

Register for this live video webinar, Cloud Computing 2020. Get your cloud questions answered by a leading expert.

As the year 2020 approaches, the rapidly expanding cloud computing landscape is set for key changes. Specifically, the top public cloud vendors are will likely make strategic shifts that will significantly impact the future of cloud.

To shed light on these trends, Ill be speaking with Dave Bartoletti, VP, Principal Analyst, Forrester. Bartoletti recently co-authored a report, Prediction 2020: Cloud Computing.

Dave Bartoletti, Forrester analyst

James Maguire, Datamation editor

Bring your questions to this live interactive video webinarwell answer as many as we can.

Register for this live video webinar, Cloud Computing 2020.

In this webinar you will learn:

Register for this live video webinar, Cloud Computing 2020. Get your cloud questions answered by a leading expert.

Go here to read the rest:
Ask the Expert: Cloud Computing in 2020 - Datamation

Read More..

Cloud Computing: Where the Jobs Are – BlackEngineer.com

With cloud security spending in the United States expected to reach $1.93 billion by 2021, colleges and universities are paying attention to the fastest-growing job market. During a recent public session of the Morgan State University (MSU) Board of Regents fall meeting, Board members voted to allow the university to pursue the addition of a new Bachelor of Science degree in Cloud Computing.

According to a university statement, pending approval from the Maryland Higher Education Commission, a Cloud Computing degree at Morgan would advance opportunities for students in a growing field.

The proposed Bachelor of Science in Cloud Computing program would be offered online as well as in a traditional classroom setting, providing educational experiences to adult learners and other nontraditional students.

I applaud the Boards foresight as it relates to preparing Morgan for the future. For our students to solve the problems of tomorrow, we need to offer them the programs that address those problems today, and cloud computing is at the top of the list, said David Wilson, president of Morgan State University.

According to a PreciseSecurity dot com study, the increasing need for cloud security services is a result of rapid cloud computing market growth, followed by a significant number of threats and attacks.Data breaches have become one of the most critical cloud security threats, causing damage to companies. Other significant threats to cloud security are the lack of cloud security strategy, deficient access management, and account hijacking.Phishing attempts are on the top of that list.

In its statement, Morgan State University says increasingly the demand for data infrastructures that can be stored, secured and accessed from anywhere and at any time requires a cloud-based solution.

Cloud computing will give students the knowledge and skills in cloud services and applications to work in the industry, academia, and government as cloud administrators, computer architects, modelers, engineers, application developers, security specialists, analytics specialists, analysts and researchers, the statement said.

Microsoft Azure describes cloud computing as the delivery of computing servicesincluding servers, storage, databases, networking, software, analytics, and intelligenceover the Internet (the cloud) to offer faster innovation, flexible resources, and economies of scale.

See original here:
Cloud Computing: Where the Jobs Are - BlackEngineer.com

Read More..

Gartner: Cloud computing revenues to jump in coming years – The Advocate

IT consulting and research firm Gartner is headquartered at 56 Top Gallant Road in Stamford, Conn. The firm predicts cloud-computing revenues will increase by more than 50 percent between 2019 and 2022.

IT consulting and research firm Gartner is headquartered at 56 Top Gallant Road in Stamford, Conn. The firm predicts cloud-computing revenues will increase by more than 50 percent between 2019 and 2022.

Photo: Michael Cummo / Hearst Connecticut Media

IT consulting and research firm Gartner is headquartered at 56 Top Gallant Road in Stamford, Conn. The firm predicts cloud-computing revenues will increase by more than 50 percent between 2019 and 2022.

IT consulting and research firm Gartner is headquartered at 56 Top Gallant Road in Stamford, Conn. The firm predicts cloud-computing revenues will increase by more than 50 percent between 2019 and 2022.

Gartner: Cloud computing revenues to jump in coming years

STAMFORD Public cloud-services technology revenues are projected to grow by more than 50 percent worldwide in the next three years, to about $355 billion in 2022, according to a new report from IT consulting and research firm Gartner.

Cloud-application services, also known as software-as-a-service, would remain by far the largest segment of the cloud-computing market. Its predicted returns would surge by more than 50 percent in the next three years, to approximately $151 billion in 2022, reflecting companies ability to scale up their use of such subscription-based software.

Cloud-system infrastructure services, also known as infrastructure-as-a-service, would see their revenues nearly double, to about $74 billion, by 2022, Gartner projected. The firm attributes the growth to the demands of modern applications and workloads, which they say require infrastructure that traditional data centers cannot meet.

At this point, cloud adoption is mainstream, said Sid Nag, Gartner research vice president. The expectations of the outcomes associated with cloud investments therefore are also higher. Adoption of next-generation solutions are almost always cloud-enhanced solutions, meaning they build on the strengths of a cloud platform to deliver digital business capabilities.

As organizations increasingly rely on cloud technology, IT teams are embracing cloud-built applications and relocating existing digital assets, according to Gartner.

By 2022, up to 60 percent of organizations would use an external providers cloud-managed service offering, double the rate in 2018, Gartner predicted.

Building, implementing and maturing cloud strategies will continue to be a top priority for years to come, Nag said. The cloud-managed service landscape is becoming increasingly sophisticated and competitive.

pschott@stamfordadvocate.com; 203-964-2236; Twitter: @paulschott

More here:
Gartner: Cloud computing revenues to jump in coming years - The Advocate

Read More..

Nutanix Hires Former Nexenta CEO To Build ‘Hybrid Cloud Powerhouse’ – CRN: The Biggest Tech News For Partners And The IT Channel

Hyper-converged infrastructure pioneer Nutanix has hired former Nexenta CEO Tarkan Maner as its new chief commercial officer in a move to help build Nutanix into a hybrid cloud leader.

Tarkan brings an entrepreneurial mindset and an acute awareness of the computing landscape to lead Nutanix in its second decade, said Nutanix CEO and founder Dheeraj Pandey. His authentic leadership style, a clear bias for action, and a broad industry network have helped him create high-energy companies, as Ive observed him from afar. Given his deep sense of commitment to company-building, I look forward to this new partnership to build Nutanix into a hybrid cloud powerhouse.

Maner previously served as chairman and CEO for Nexenta Systems, one of the groundbreaking developers of software-defined storage technology. Nexenta was acquired this year by DataDirect Networks (DDN), which develops high-performance storage for modern workloads.

Prior to Nexenta, Maner was also president and CEO of virtual desktop computing pioneer Wyse Technology, which was acquired by Dell in 2012.

[Related: SaaS Startup Clumio Raises $135M To Drive Channel Partner Growth]

Maner said he plans to accelerate Nutanixs position as a leader in enterprise cloud computing. Nutanix has accomplished so much over the past ten years, but theres so much potential to go even further, he said in a statement. I am excited to charge ahead and play a critical role in helping realize Nutanixs vision of making computing invisible, anywhere.

Maner will lead Nutanixs global business development and corporate development efforts with a focus on strategic partnerships, system integrators and service providers.

His responsibilities include leading Nutanixs hybrid cloud strategy and product teams such as its core visualization platform (AHV) and software-defined networking. He will also lead some of Nutanixs key hybrid cloud services including Xi Frame for end-user computing, Xi Leap for disaster recovery services, Era for database-as-a-service, and the Xi Partner Network.

Maner brings over 25 years of executive experience to Nutanix including top roles for IBM, CA Technologies and currently serves as a board member of various companies including CloudCheckr and Teradici.

Maner will take over many of the tasks previously held by Sunil Potti, Nutanixs former chief product and development officer, who left this year to join Google Cloud.

View original post here:
Nutanix Hires Former Nexenta CEO To Build 'Hybrid Cloud Powerhouse' - CRN: The Biggest Tech News For Partners And The IT Channel

Read More..

Across the enterprise: Tackle Industry 4.0 with edge, fog and cloud computing – CanadianManufacturing.com

November 19, 2019by CMStaff

PHOTO: Industry 4.0/ICAPlants

As Canadian manufacturing companies learn to put digital transformation at the heart of their strategies, theyre challenged to seek better, smarter and more efficient ways to achieve their goals.

According to PwCs2016 Global Industry 4.0 Survey, industrial companies average level of digitization is expected to rise from 33% to 72% within five years. The frenetic pace of digitalization continues unabated.

Jonathan Gross, a columnist on Manufacturing AUTOMATION, advocates for a deliberate approach to digital transformation. His method: First, build a strong digital twin base thats adaptable to an unknown future state. Second, implement a proof-of-concept for an easy win. Third, take a bigger leap one thats capable of delivering significant value. Fourth, continuously enhance, optimize and improve.

His column, published on Manufacturing AUTOMATION, includes a case study on how a manufacturer that extrudes resins for a variety of applications and sectors was able to use end-to-end digitization to achieve ROI with Industry 4.0.

Originally posted here:
Across the enterprise: Tackle Industry 4.0 with edge, fog and cloud computing - CanadianManufacturing.com

Read More..

Cloud Native Computing Foundation Announces 2019 Community Awards Winners – PRNewswire

SAN DIEGO, Nov. 19, 2019 /PRNewswire/ --KubeCon + CloudNativeCon NA The Cloud Native Computing Foundation(CNCF), which builds sustainable ecosystems for cloud native software, today announced the winners of the fourth annual CNCF Community Awards. The Community Awards recognize CNCF community members working the hardest to advance cloud native technology.

"A core strength of open source is the individuals who go above and beyond normal responsibilities to benefit the community as a whole," said Chris Aniszczyk, CTO, CNCF. "As we kick off the largest KubeCon + CloudNativeCon event ever, it's an honor to recognize individuals who've been integral to making CNCF and its projects what they are today."

This year's awards are being presented in the following categories: Chop Wood Carry Water, Top Ambassador, and Top Committer.

Chop Wood Carry Water: This award is given to community members helping behind the scenes, dedicating countless hours of time to open source projects, hosting and building community meetups, and often completing thankless tasks for the benefit of the community. The winners of this award were nominated by the CNCF community and chosen by the CNCF staff and TOC. CNCF is pleased to present this award to:

Top Ambassador:This award is presented to a champion advocate for the cloud native space. This individual helps spread awareness of cloud native, CNCF, and its incubated projects. The CNCF Ambassador leverages multiple platforms, both online as well as speaking engagements, driving interest, and excitement around projects. CNCF Ambassadorsvoted for the Top Ambassador. They are pleased to present the award to:

Top Committer:This award recognizes excellence in technical contributions to CNCF and its hosted projects. The CNCF Top Committer has made key commits to projects and, more importantly, contributes in a way that benefits the project as a whole. CNCF Maintainers (committers) voted for the Top Committer, and are pleased to present the award to:

For the Top Ambassador and Top Committer categories, voting was performed using the CIVStool using Condorcet-IRV.

Previous winners of the Community Awards include Jorge Castro, Dawn Chen, Michael Hausenblas, Jordan Liggitt, Dianne Mueller, April Kyle Nassi, Kris Nova, Sarah Novotny, Paris Pittman and many more.

Additional Resources

About Cloud Native Computing FoundationCloud native computing empowers organizations to build and run scalable applications with an open source software stack in public, private, and hybrid clouds. The Cloud Native Computing Foundation (CNCF) hosts critical components of the global technology infrastructure, including Kubernetes, Prometheus, and Envoy. CNCF brings together the industry's top developers, end users, and vendors, and runs the largest open source developer conferences in the world. Supported by more than 500 members, including the world's largest cloud computing and software companies, as well as over 200 innovative startups, CNCF is part of the nonprofit Linux Foundation. For more information, please visit http://www.cncf.io.

The Linux Foundation has registered trademarks and uses trademarks. For a list of trademarks of The Linux Foundation, please see our trademark usage page. Linux is a registered trademark of Linus Torvalds.

Media ContactJessie Adams-ShoreThe Linux FoundationPR@CNCF.io

SOURCE Cloud Native Computing Foundation

http://www.cncf.io

Here is the original post:
Cloud Native Computing Foundation Announces 2019 Community Awards Winners - PRNewswire

Read More..

ExtraHop Extends Cloud-Native Network Detection and Response with Google Cloud Platform Integration – Business Wire

SEATTLE--(BUSINESS WIRE)--ExtraHop, the leader in cloud-native network detection and response, today announced a new integration between ExtraHop Reveal(x) and Google Cloud Platform (GCP) via the new packet mirroring feature announced by GCP at Google NEXT 19 UK. Google Clouds new Packet Mirroring feature enables Reveal(x) to passively and agentlessly analyze network traffic within GCP to provide robust, real-time threat detection, investigation, and response. Armed with this visibility, security teams can protect data and workloads in Google Cloud and expand control across the entire hybrid attack surface.

Reveal(x) for GCP automatically discovers, classifies, and maps dependencies between workloads, and applies advanced machine learning to surface the most critical threats. Equipped with this information, GCP customers can rapidly identify, investigate, and respond to threats, fulfilling their obligations under the shared responsibility model.

"Ulta Beauty is a company built on seeing possibilities. It's informed everything from our in-store shopping experience to how we build our business including the technology that supports it," said Diane Brown, senior director of IT risk management and CISO at Ulta Beauty. "In cloud computing, we see the ability to grow faster and deliver more 'wow' experiences to our customers. The new integration between ExtraHop Reveal(x) and Google Cloud's new packet mirroring accelerates our cloud adoption by giving us the visibility we need to secure our applications and protect our most precious asset, our customers."

Through the integration with GCP packet mirroring, ExtraHop Reveal(x) provides full threat visibility, detection, and response across cloud and hybrid workloads.

"Traffic visibility is critical to prevent security breaches and attacks as networks grow in complexity," said Mahesh Narayanan, product manager at Google Cloud. With Packet Mirroring, our customers now have a way to proactively detect network intrusions, analyze, and diagnose application performance issues for both Compute Engine and Google Kubernetes Engine, across all regions and machine types."

"Traditional security tools are falling short and new thinking is needed for hybrid enterprises today," said Jesse Rothstein, CTO and co-founder at ExtraHop. Reveal(x) for GCP Packet Mirroring provides security teams with unparalleled network visibility and cloud-scale machine learning for detection and automated response across your business's complex attack surface.

ExtraHop Reveal(x) for GCP is now available in alpha. Please contact your ExtraHop cloud security expert for more information.

To learn more about the company's industry-leading cyber analytics platform, visit https://www.extrahop.com/solutions/security/ and explore the Reveal(x) live interactive online demo: https://www.extrahop.com/demo/

About ExtraHop

ExtraHop provides enterprise cyber analytics that delivers security and performance from the inside out. Our breakthrough approach analyzes all network interactions in real time and applies advanced machine learning to help you investigate threats, ensure the delivery of critical applications, and protect your investment in the cloud. With this approach, we help the world's leading enterprises including Credit Suisse, The Home Depot, Caesars Entertainment, and Liberty Global rise above the noise of alerts, organizational silos, and runaway technology with complete visibility, real-time detection, and guided investigation. To experience the power of ExtraHop, explore our interactive online demo or connect with us on LinkedIn and Twitter.

2019 ExtraHop Networks, Inc., Reveal(x), and ExtraHop are registered trademarks or marks of ExtraHop Networks, Inc.

See the original post:
ExtraHop Extends Cloud-Native Network Detection and Response with Google Cloud Platform Integration - Business Wire

Read More..

What Is Homomorphic Encryption? And Why Is It So Transformative? – Forbes

The problem with encrypted data is that you must decrypt it in order to work with it. By doing so, its vulnerable to the very things you were trying to protect it from by encrypting it. There is a powerful solution to this scenario: homomorphic encryption. Homomorphic encryption might eventually be the answer for organizations that need to process information while still protecting privacy and security.

What Is Homomorphic Encryption? And Why Is It So Transformative?

What is homomorphic encryption?

Homomorphic encryption makes it possible to analyze or manipulate encrypted data without revealing the data to anyone. Something as simple as looking for a coffee shop when youre out of town reveals huge volumes of data with third parties as they help you satiate your caffeine cravingthe fact that youre seeking a coffee shop, where you are when youre searching, what time it is and more. If homomorphic encryption were applied in this fictional coffee search, none of this information would be visible to any of third parties or service providers such as Google. In addition, they wouldnt be able to see what answer you were given regarding where the coffee shop is and how to get there.

While we might be willing to part with the data that is exposed when we search for our next caffeine fix, homomorphic encryption has huge potential in areas with sensitive personal data such as in financial services or healthcare when the privacy of a person is paramount. In these cases, homomorphic encryption can protect the sensitive details of the actual data, but still, be analyzed and processed.

Another bonus of homomorphic encryption is that unlike other encryption models in use today, it is safe from getting broken by quantum computers.

Just like other forms of encryption, homomorphic encryption uses a public key to encrypt the data. Unlike other forms of encryption, it uses an algebraic system to allow functions to be performed on the data while its still encrypted. Then, only the individual with the matching private key can access the unencrypted data after the functions and manipulation are complete. This allows the data to be and remain secure and private even when someone is using it.

There are three main types of homomorphic encryption: partially homomorphic encryption (keeps sensitive data secure by only allowing select mathematical functions to be performed on encrypted data); somewhat homomorphic encryption (supports limited operations that can be performed only a set number of times); fully homomorphic encryption (this is the gold standard of homomorphic encryption that keeps information secure and accessible).

Dr. Craig Gentry describes homomorphic encryption as a glovebox where anybody can get their hands into the glovebox and manipulate what's inside, but they are prevented from extracting anything from the glovebox. They can only take the raw materials and create something inside the box. When they finish, the person who has the key can remove the materials (processed data).

Practical Applications of Homomorphic Encryption

While cryptographers have known of the concept of homomorphic encryption since 1978, it wasnt until Dr. Gentry created an algebraically homomorphic encryption system for his graduate thesis that the idea progressed and when Gentry established the first homomorphic encryption scheme in 2009. As mentioned, homomorphic encryption could make our searches more private on search engines, but there are other practical applications for it when using data or data is in transit.

One very relevant way homomorphic encryption can be used is to ensure democratic elections are secure and transparent. Votes could be added up while keeping the identities of the voters private; third parties could verify the results, and voting data would be protected from manipulation.

Its been challenging for highly regulated industries to securely outsource data to cloud environments or data-sharing partners for research and analytics. Homomorphic encryption could change that since it makes it possible for data to be analyzed without jeopardizing privacy. This can impact many industries, including financial services, information technology, healthcare, and more.

What are the barriers to using homomorphic encryption?

The biggest barrier to widescale adoption of homomorphic encryption is that it is still very slowso slow its not yet practical to use for many applications. However, there are companies such as IBM and Microsoft, and researchers such as Dr. Gentry who are working diligently to speed up the process by decreasing the computational overhead thats required for homomorphic encryption.

The rest is here:
What Is Homomorphic Encryption? And Why Is It So Transformative? - Forbes

Read More..