Page 4,139«..1020..4,1384,1394,1404,141..4,1504,160..»

Next Generation Encryption – blogs.cisco.com

A transition in cryptographic technologies is underway. New algorithms for encryption, authentication, digital signatures, and key exchange are needed to meet escalating security and performance requirements. Many of the algorithms that are in extensive use today cannot scale well to meet these needs. RSA signatures and DH key exchange are increasingly inefficient as security levels rise, and CBC encryption performs poorly at high data rates. An encryption system such as an IPsec Virtual Private Network uses many different component algorithms, and the level of security that it provides is limited by the lowest security level of each of those components. What we need is a complete algorithm suite in which each component provides a consistently high level of security and can scale well to high throughput and high numbers of connections. The next generation of encryption technologies meets this need by using Elliptic Curve Cryptography (ECC) to replace RSA and DH, and using Galois/Counter Mode (GCM) of the Advanced Encryption Standard (AES) block cipher for high-speed authenticated encryption. More on these algorithms below, but first, some good news: the new ISR Integrated Services Module brings these next-generation encryption (NGE) technologies to IPsec Virtual Private Networks, providing a security level of 128 bits or more. These technologies are future proof: the use of NGE enables a system to meet the security requirements of the next decade, and to interoperate with future products that leverage NGE to meet scalability requirements. NGE is based on IETF standards, and meets the government requirements for cryptography stipulated in FIPS-140.

NGE uses new crypto algorithms because they will scale better going forward. This is analogous to the way that jets replaced propeller planes; incremental improvements in propeller-driven aircraft are always possible, but it was necessary to adopt turbojets to achieve significant advances in speed and efficiency.

The community that needs a new technology most leads its adoption. For instance, the transition from propellers to jet engines happened for military applications before jets were adopted for commercial use. Similarly, governments are leading the transition to next generation encryption. The U.S. government selected and recommended a set of cryptographic standards, called Suite B because it provides a complete suite of algorithms that are designed to meet future security needs. Suite B has been approved for protecting classified information at both the SECRET and TOP SECRET levels. Suite B sets a good direction for the future of network security, and the Suite B algorithms have been incorporated into many standards. (Cisco supported the development of some of these standards, including GCM authenticated encryption and implementation methods for ECC.) NGE uses the Suite B algorithms for two different reasons. First, it enables government customers to conform to the Suite B requirements. Second, Suite B offers the best technologies for future-proof cryptography, and is setting the trend for the industry. These are the best standards that one can implement today if the goal is to meet the security and scalability requirements ten years hence, or to interoperate with the crypto that will be deployed in that timescale.

A network encryption system must meet the networks requirements for high throughput, high numbers of connections, and low latency, while providing protection against sophisticated attacks. Cryptographic algorithms and key sizes are designed to make it economically infeasible for an attacker to break a cryptosystem. In principle, all algorithms are vulnerable to an exhaustive key search. In practice, this vulnerability holds only if an attacker can afford enough computing power to try every possible key. Encryption systems are designed to make exhaustive search too costly for an attacker, while also keeping down the cost of encryption. The same is true for all of the cryptographic components that are used to secure communications digital signatures, key establishment, and cryptographic hashing are all engineered so that attackers cant afford the computing resources that would be needed to break the system.

Every year, advances in computing lower the cost of processing and storage. These advances in computing accrue over the years and make it imperative to periodically move to larger key sizes. Because of Moores law, and a similar empirical law for storage costs, symmetric cryptographic keys need to grow by a bit every 18 months. In order for an encryption system to have a useful shelf life, and be able to securely interoperate with other devices throughout its operational lifespan, it should provide security ten or more years into the future. The use of good cryptography is more important now than ever before, due to the threat of well-funded and knowledgeable attackers.

A complete crypto suite includes algorithms for authenticated encryption, digital signatures, key establishment, cryptographic hashing. I touch on each of these below, to explain the need for technology changes. The Rivest-Shamir-Adleman (RSA) algorithms for encryption and digital signatures are less efficient at higher security levels, as is the integer-based Diffie-Hellman (DH). In technical terms, there are sub-exponential attacks that can be used against these algorithms, and thus their key sizes must be substantially increased to compensate for this fact. In practice, this means that RSA and DH are becoming less efficient every year.

Elliptic Curve Cryptography (ECC) replaces RSA signatures with the ECDSA algorithm, and replaces the DH key exchange with ECDH. ECDSA is an elliptic curve variant of the DSA algorithm, which has been a standard since 1994. ECDH is an elliptic curve variant of the classic Diffie-Hellman key exchange. DH and DSA are both based on the mathematical group of integers modulo a large prime number. The ECC variants replace that group with a different mathematical group that is defined by an elliptic curve. The advantage of ECC is that there are no sub-exponential attacks that work against ECC, which means that ECC can provide higher security at lower computational cost. The efficiency gain is especially pronounced as one turns the security knob up.

The AES block cipher is widely used today; it is efficient and provides a good security level. However, the Cipher Block Chaining (CBC) mode of operation for AES, which is commonly used for encryption, contains serialized operations that make it impossible to pipeline. Additionally, it does not provide authentication, and thus the data encrypted by CBC must also be authenticated using a message authentication code like HMAC. NGE improves on the combination of CBC and HMAC by using AES in the Galois/Counter Mode (GCM) of operation.

Fifteen years ago, it was considered a truism that encryption could not keep up with the fastest networks. Ten years ago, it was realized that the counter mode of operation (CTR) could keep up, but that did not resolve the need for data authentication. GCM solves this problem by incorporating an efficient authentication method, based on arithmetic over finite fields. GCM is an authenticated encryption algorithm; it provides both confidentiality and authenticity. Combing both these security services into a single algorithm improves both security and performance. (For instance, it prevents subtle attacks that exploit unauthenticated encryption, such as the recent BEAST attack against the TLS/SSL protocol and similar attacks.) AES-GCM is efficient even at very high data rates, because its design enables the use of full data pipelines and parallelism. Its efficiency is showcased by its use in the IEEE MACsec protocol, where it has kept up with 802.1 data rates of 10, 40, and even 100 gigabits per second without adding significant latency.

NGE follows Suite B and uses the SHA-2 family of hash functions. These functions replace the ubiquitous SHA-1 hash with SHA-256, SHA-384, and SHA-512. SHA-1 only targets an 80-bit security level, and has been shown to not meet that goal. If you are still using SHA-1, you should transition to SHA-256, which provides a 128-bit security level.

For more information about Ciscos offering for faster next-generation encryption, see the Cisco VPN Internal Service Module for the ISR G2 page.

Share:

Originally posted here:
Next Generation Encryption - blogs.cisco.com

Read More..

Bitcoin Crypto-Economics Index – coindesk.com

Blockchain 101 Bitcoin What is Bitcoin? How Can I Buy Bitcoin? How Does Bitcoin Mining Work? How Do Bitcoin Transactions Work? How Can I Sell Bitcoin? Blockchain What is Blockchain Technology? How Does Blockchain Technology Work? What Can a Blockchain Do? What is a Distributed Ledger? Why Use a Blockchain? Ethereum What is Ethereum? How Do I Use Ethereum? How Does Ethereum Work? What is a Decentralized Application? How Do Smart Contracts Work? Technology Bitcoin Ethereum Other Public Protocols Distributed Ledger Technology Reviews Markets Investments Venture Capital Initial Coin Offerings Markets Bitcoin Ethereum Exchanges Other Public Protocols Business Use Cases & Verticals Payments Capital Markets Banking Insurance Supply Chain Security Identity Healthcare Energy Internet of Things Merchants Startups Legal Regulation Central Banking Tax Crime US & Canada Asia-Pacific Europe Data & Research Crypto-Economics Explorer Bitcoin Price Index Ethereum Price Data Analysis Bitcoin Calculator Blockchain Venture Capital ICO Tracker ICO Calendar About the BPI Bitcoin Legality Map Bitcoin Price Ticker Widget CoinDesk API Industry Research State of Blockchain Q2 2018 State of Blockchain Q1 2018 State of Blockchain Q4 2017 State of Blockchain Q3 2017 State of Blockchain Q2 2017 State of Blockchain Q1 2017 Consensus Consensus 2019 Consensus: Invest 2018 Consensus: Singapore 2018 Consensus 2018 Invest 2017 Consensus 2017 Construct 2017 Consensus 2016 Event Schedule Webinars Search Top nav Blockchain 101 Bitcoin What is Bitcoin? How Can I Buy Bitcoin? How Does Bitcoin Mining Work? How Do Bitcoin Transactions Work? How Can I Sell Bitcoin? Blockchain What is Blockchain Technology? How Does Blockchain Technology Work? What Can a Blockchain Do? What is a Distributed Ledger? Why Use a Blockchain? Ethereum What is Ethereum? How Do I Use Ethereum? How Does Ethereum Work? What is a Decentralized Application? How Do Smart Contracts Work? Technology Bitcoin Ethereum Other Public Protocols Distributed Ledger Technology Reviews Markets Investments Venture Capital Initial Coin Offerings Markets Bitcoin Ethereum Exchanges Other Public Protocols Business Use Cases & Verticals Payments Capital Markets Banking Insurance Supply Chain Security Identity Healthcare Energy Internet of Things Merchants Startups Legal Regulation Central Banking Tax Crime US & Canada Asia-Pacific Europe Data & Research Data Bitcoin Price Index Ethereum Price Data Analysis Bitcoin Calculator Blockchain Venture Capital ICO Tracker ICO Calendar About the BPI Bitcoin Legality Map Bitcoin Price Ticker Widget CoinDesk API Industry Research State of Blockchain Q2 2018 State of Blockchain Q1 2018 State of Blockchain Q4 2017 State of Blockchain Q3 2017 State of Blockchain Q2 2017 State of Blockchain Q1 2017 Consensus Consensus: Invest 2018 Consensus: Singapore 2018 Consensus 2018 Invest 2017 Consensus 2017 Construct 2017 Consensus 2016 Event Schedule Webinars Announcing: CoinDesk's Crypto-Economics ExplorerRelated ArticlesIranian Bitcoin Users Are Already Being Affected By New US SanctionsBitcoin Sees Biggest Single-Day Price Gain Since AprilPricing NewsBitcoin Price Eyes Double Bottom Reversal After $4K DefenseXRP Nears Longest Stretch as Worlds Second-Largest CryptocurrencyBitcoin Likely to Close Below Key Price Support in First Since 2015ICE Founder: Were Kind of Agnostic on Bitcoins PriceEmployees Say Startup Civil Hyped Crypto Returns, But Failed to PaySEC Chair Clayton: Crypto ETF Needs Exchanges Free From ManipulationNasdaq, VanEck Partner to Launch Crypto 2.0 Futures ContractsBack Over $4K: Bitcoins Price Bounce is Gathering PaceFeatured NewsWATCH: SEC Chairman Jay Claytons Full Consensus: Invest InterviewBelow $4k: Bitcoins Price Drops to a 420-Day LowHash Power Favors Craig Wright Camp in Looming Bitcoin Cash ForkSexual Assault Survivor Uses Crypto to Crowdfund Anonymously About Press Events Editorial policy Comments policy Terms & Conditions Privacy policy Jobs Advertising Newsletters

English Korean

Excerpt from:
Bitcoin Crypto-Economics Index - coindesk.com

Read More..

Were Close to a Universal Quantum Computer, Heres Where We’re At

Quantum computers are just on the horizon as both tech giants and startups are working to kickstart the next computing revolution.

U.S. Nuclear Missiles Are Still Controlled By Floppy Disks - https://youtu.be/Y8OOp5_G-R4

Read More:Quantum Computing and the New Space Racehttp://nationalinterest.org/feature/q...In January 2017, Chinese scientists officially began experiments using the worlds first quantum-enabled satellite, which will carry out a series of tests aimed at investigating space-based quantum communications over the course of the next two years.

Quantum Leap in Computer Simulationhttps://pursuit.unimelb.edu.au/articl...Ultimately it will help us understand and test the sorts of problems an eventually scaled-up quantum computer will be used for, as the quantum hardware is developed over the next decade or so.

How Quantum Computing Will Change Your Lifehttps://www.seeker.com/quantum-comput... The Perimeter Institute of Theoretical Physics kicked off a new season of live-streamed public lectures featuring quantum information expert Michele Mosca.

Sign Up For The Seeker Newsletter Here - http://bit.ly/1UO1PxI

____________________Seeker inspires us to see the world through the lens of science and evokes a sense of curiosity, optimism and adventure.

Visit the Seeker website https://www.seeker.com/

Subscribe now! https://www.youtube.com/user/DNewsCha...

Seeker on Twitter http://twitter.com/seeker

Seeker on Facebook https://www.facebook.com/SeekerMedia/

Seeker http://www.seeker.com/

View original post here:
Were Close to a Universal Quantum Computer, Heres Where We're At

Read More..

Invest in Cryptocurrency With Spare Change – Black Enterprise

Dmitri Love pitchedBundilan app that takes your spare change and invests in cryptocurrencyon Season 10 of Shark Tank. Cryptocurrency (Bitcoin, Ethereum, etc..) and the blockchain technology that powers it, has created new opportunities for investors, startups, and professionals in a variety of industries.

Musician and philanthropist, Akon created his own: Akoin.PatientoryCEO Chrissa McFarlane raised millions for her blockchain startup with an Initial Coin Offering (ICO), and online communities like Wacoinda have developed to share news and financial information about the cryptocurrency market. Knowledge is power but wading through the deluge of news about digital assets can make investing in the speculative asset class daunting.

Thats why Dmitri Love created Bundil, to make it easier for everyday investors to add cryptocurrency to their portfolio. After his appearance on Shark Tank, Black Enterprise contributor Brandon Andrews sat down with Love for an interview about the show and his business.

BUNDIL CEO Dmitri Love on Shark Tank (ABC/Eric McCandless)

Give us a quick overview of the crypto landscape. What is it and how does it work?

Thats a pretty loaded question. The crypto world is an ever-evolving space filled with prowess and ingenuity.Lets start with bitcoins because they are so well known. Bitcoin is like regular money and in a small way, stocks.Its like money in that it has value and you can use it to buy goods and services. Its also like stock because the value fluctuates based on supply and demand. Bitcoin operates on technology called blockchain. Other crypto, like Ethereum, are using that same blockchain technology to allow people to rent out (and make money with) part of their computing power when they arent using it. Its an exciting space thats still in its infancy.

Why should I invest my spare change in crypto instead of saving it or using it for another opportunity?

You should do both! We always advocate diversifying your portfolio. Save some, invest some, repeat. We are actually in the works of adding a savings feature to our platform in coming weeks.

How did you build the Bundil app? What was your biggest challenge in the development process?

Well, lots of code and late nights, haha. We knew who we wanted to help build the system. I had some software friends in my hometown of Fayetteville, Arkansas, who are absolutely brilliant. I cant express enough how much we value them and what they have done for Bundil. The biggest challenge for us was mitigating risk management in the roundup investment process. We knew traditional roundups may provide poor monthly investments for those who dont use their debit/credit cards often enough. We came up with the idea to add different round-up options so users can choose how much to round up based on their spending habits.

Bundil App (enjoybundil.com)

You appeared on Season 10 of Shark Tank! How did you connect with the show? Tell us the story.

Its actually pretty crazy. We were contacted by a Shark Tank producer within two days of launching the initial iOS app back in April. My co-founder and I didnt believe it at first, but after doing some research we learned that it was real. We were asked to send in a pitch video and shortly after I was flown out to LA to film. Its still a little surreal.

You took the Sharks to crypto school, with a chalkboard and everything, how was that experience?

Comfortable. I thought I would be intimidated pitching our tiny startup to the Sharks, but once the pitch started, I felt like I was educating and explaining my business just like I would to anyone else. I used the chalkboard to show how complicated investing in Bitcoin and other crypto can be without using the Bundil app. I felt comfortable throughout the interaction.

Give us an update, what have you been working on since being on the show?

Weve been working on scaling up and adding new features. We know that Bundils an amazing tool for the old and new members of the crypto community and we want to make sure we exceed our users expectations.

BUNDIL CEO Dmtri Love on Shark Tank (ABC/Eric McCandless)

How do you plan to grow the business in 2018 and beyond?

The exposure from the show is going to give us great visibility, which is a good start. We want to show the world that crypto is nothing to be afraid of. I think our efforts in providing a secure, safe, and easy platform to invest in crypto will speak for itself. We also plan to continue engaging the investment community. In the coming weeks, we will provide other features to skyrocket their portfolios, and show them that investing is fun!

Why should African Americans be interested in crypto? Are their specific opportunities for black investors?

There are definitely opportunities for black investors. I think a lot of African Americans feel intimidated by investing in crypto or any other asset, because we often dont have the same financial opportunities. We want to bridge that gap with Bundil. We also want to empower black investors with knowledge. You can invest no matter your background or economic status. Thats the core of why we built Bundil. To engage the people that dont know where to start, and provide an easy and fun way to participate. No matter where theyre from, what their economic status is, or what they look like.

Brandon Andrews is a senior consultant at Values Partnerships. He leads a nationwide casting tour for ABC's Shark Tank. He writes about business, politics, and crowdfunding. Website - http://www.brandonandrews.me Twitter - http://www.twitter.com/brandontalk IG - http://www.instagram.com/yesbrandon Facebook - http://www.facebook.com/mr.brandonandrews Snap - @brandontalk

Read more from the original source:
Invest in Cryptocurrency With Spare Change - Black Enterprise

Read More..

What is Mining Cryptocurrency? What you need to know…

Mining cryptocurrency can be a lucrative endeavor with enough computing power

Mining cryptocurrency is in the news a lot lately. People are finding their computers have been compromised by malware and are mining, or in some cases entire botnets are mining. But what does that mean?

This isnt mining in the traditional sense. There are no pick axes or canaries involved. Instead. its more about trying to win a blockchain lottery to earn the reward at the end.

What does that all mean? Lets hash it out.

To begin a discussion of mining cryptocurrency we need to start with what cryptocurrency is. Cryptocurrency is a digital form of currency with a cryptographic underpinning that is used as a secure medium of exchange. There are literally hundreds of different cryptocurrencies with varying real-world values. Many believe its the future of currency.

The most popular cryptocurrency is bitcoin, you may have heard of others like Etherium, too. While cryptocurrencies may differ in terms of the algorithms and encryption they use, they all share one similiarity: blockchain. And thats what we need to talk about next.

Blockchain is a digital ledger of transactions that is impossible to alter. It uses hashing and a concept similar to salting to continuously complete blocks of information that chain to form an immutable ledger.

Hashing is the act of mapping data of any length to a fixed-length output. When cryptography is involved its a one-way function. The most popular hashing algorithm is SHA-256, which outputs at a length of 256 bits. Every hash value is unique. Even the tiniest alteration to the data being hashed caused the entire value to change.

Hashing is considered one-way because of the amount of computing power it would take to reverse-hash it. For a 256-bit output, calculate 2 to the power of 256 (2 X 2 X 2 256 times). Your odds of finding the correct value are 1 in the product of that equation. Those are astronomical odds. It would take a supercomputer thousands of years to compute that.

Now lets fit it all together. With a cryptocurrency blockchain, as transactions occur they are broadcast and added to various private ledgers. Each one of these transactions is digitally signed for the sake of authenticity. On the other end, there are people or groups collecting these transactions and building ledgers. They are also computing to find a value that when hashed along with the ledger, produces a set number of 0s at the beginning of the hash value. Thats the portion thats similar to salting.

So lets say that for our example cryptocurrency, weve set the total to 10 0s. That means the first 10 spots of the 256-character hash value should all be 0s.

When the correct value is found, the block is closed, its broadcast officially and added to everyones blockchain, then the hash of the old block is put atop the new ledger and the process begins again. This is how blocks are created in the chain.

The act of computing the correct value to satisfy the hash function in blockchain is called mining. When it comes to cryptocurrency, a reward is provided to whoever solves for the correct value. That makes it lucrative to compute the correct value, though it takes quite a bit of power to accomplish that.

Oftentimes people pool their computing power together and split the reward if they solve for the correct value. In other cases, hackers have been known to co-opt others computers and use some of their computing power behind the scenes to mine cryptocurrency. There are entire botnets doing nothing but mining.

Really, solving for the correct value is like winning the lotto. There are countless people and botnets attempting to find the value and whoever finds it first gets the reward.

Of course, if you can accumulate enough computing power you could solve for the value enough of the time that you could accrue a substantial amount of cryptocurrency.

When someone says mining cryptocurrency what theyre referring to is the act of trying to compute a specific hash value by producing a set value that, when hashed along with the block ledger, produces a specific result. This requires considerable computing power, but considering the rewards its well worth it.

Heres what we covered in todays discussion:

More:
What is Mining Cryptocurrency? What you need to know...

Read More..

Saudi Arabia Will Launch Its Own Cryptocurrency in 2019 …

Various countries mull creating their own cryptocurrencies. That is not an easy feat, as many different aspects need to be considered. In Saudi Arabia, such a new currency will be finalized in mid-2019. This currency will have the backing of the Saudi central bank. Despite this timeline, the working group behind this project is still evaluating the potential impact of such a currency.

The success of Bitcoin hasnt gone by unnoticed. Despite falling prices, the currency highlights some interesting potential. Digital cash is something a lot of consumers and corporations seem to favor at this time. This means governments and central banks need to cater to this demand. Creating a native cryptocurrency seems to fit this will quite well in that regard.

In Saudi Arabia, such a currency is being developed. It is a venture between the country itself and the United Arab Emirates. Not too much is known about the currency at this time. It has no official name, and its potential success remains unclear. The Saudi Arabian Monetary Authority is still investigating the feasibility of such a currency. Transforming finance in Saudi Arabia will not be without potential risks.

It is expected this new currency will come to market in mid-2019. More importantly, it will be supported by a limited number of banks. The central bank of Saudi Arabia wants to improve upon cross-border payments. Which banks will support this currency from day one, has not been officially communicated as of yet. This somewhat cautious approach to digital currency shows a lot of questions remain unanswered.

It is not the first time a country mulls creating a native cryptocurrency. To date, none of those regions have put any plans in motion to do so. It appears Saudi Arabia is leading the pack in terms of exploring the opportunities. Making cross-border payments more efficient is a worthy goal. It is something that can benefit consumers and corporations alike.

This news comes at a bit of an odd time. Ripple, the company developing xRapid and the XRP asset, has begun making inroads in Saudi Arabia. The countrys National Commercial Bank is a member of RippleNet. This move is also part of streamlining cross-border payments to and from the Kingdom. Additionally, the Saudi Arabian Monetary Authority conducted a Ripple-oriented pilot earlier in 2018.

Putting all of ones eggs in the same basket is never a smart idea. Diversification is key, especially in the financial industry. For banks, exploring different technologies and implementations will often yield the best results. This also confirms Ripple and a central bank-issued digital currency can potentially co-exist in the same country.

Do you think more countries will begin to consider issuing national cryptocurrencies? Let us know in the comments below.

Images courtesy of Shutterstock

More here:
Saudi Arabia Will Launch Its Own Cryptocurrency in 2019 ...

Read More..

3 Different Data Encryption Methods – DataShield blog

Its no secret that we at DataShield are large proponents of data security. Not only are data breaches incredibly expensive, but there are also laws regarding data securitythat need to be followed if businesses want to avoid large fines.

And while we are obviously advocates of shredding hard drivesonce its time to get rid of your computer, doing that only guarantees the safety of your data once its time for new hard drives. So what about all the time in between?

Enter data encryption: a highly recommended way to keep your data out of the wrong hands the entire time its on your computer.

Encryption is a technique for transforming informationon a computer in such a way that it becomes unreadable. So, even if someone is able to gain access to a computer with personal data on it, they likely wont be able to do anything with the data unless they have complicated, expensive software or the original data key.

The basic function of encryption is essentially to translate normal text into ciphertext. Encryption can help ensure that data doesnt get read by the wrong people, but can also ensure that data isnt altered in transit, and verify the identity of the sender.

There are three different basic encryption methods, each with their own advantages (list courtesy of Wisegeek):

Any of these methods would likely prove sufficient for proper data security, and a quick Google search will reveal the multitude of software available for data encryption. Data encryption is a necessity (both for legal reasons and otherwise) when transmitting information like PHI, so no matter what method you choose, make sure youre doing everything you can to protect data.

Dont just stop with encryption, though. DataShield offers compliance consultingto ensure that all of your business data and policies are up-to-spec for local and federal laws.

Contact us today for more information on how DataShield can help your data stay safe through its entire life cycle, from its conception to its destruction, when your computer is finally thrown out.

Excerpt from:
3 Different Data Encryption Methods - DataShield blog

Read More..

Samsung Cloud

Description

"Your photos, data and settings are important, so we made it safe, convenient and seamless to access, backup and restore what you need across Samsung devices.Backup and restore data and settings . Keep your data backed up because it couldn't be easier with Samsung Cloud. Having everything you need in the cloud also means you have one less thing to worry about when your device stops working or you lose it. Restoring your data and settings, whether to an existing device or a new one, is simple, and impressive. From the home screen layout and its apps to the alarm and Wi-Fi settings, everything's just the way you like it.Your photos on multiple devices any time . Take a photo on your Samsung smartphone and it's saved both in the gallery and in the Samsung Cloud. You only need to sign into your Samsung account on your device; No need for a separate cloud app. Now you're able to access your photos and albums from your other devices whenever you want. And since the range of supported devices continues to grow, soon you'll be able to access your data from wherever you want.15 GB of free storage. Upgrade for more.With Samsung Cloud you get to store up to 15 GB worth of your photos, apps and data for free. When you need more, you can buy additional space right from the Settings menu on your device. And it's not just for your photos and videos, you can also keep your contacts, bookmarks, even your device settings. You won't have to delete a thing.*Availability of services and storage plans may vary depending on the country and/or carrier."

See the article here:
Samsung Cloud

Read More..

Cloud Storage Cost Comparison: Which One Is Best?

When it comes to choosing a cloud storage service, which one offers the best value?

Cloud storage is becoming increasingly popular. This is mostly because it allows you to store all sorts of files and access them whenever and wherever you want, as long as you have a device that can access these files.

Perhaps the best part, though, is that your files arent stored locally on your computer or mobile device, but rather in the cloud. Of course, when we mention the cloud, were essentially referring to what is for some a magical place on the internet where everyones files are stored, but its really nothing more than a remote server farm that houses all of your photos, videos, etc.

There are a handful of cloud storage services that you can choose from: Dropbox, Google Drive and OneDrive are some of the major players in this market. They offer various competitive features in order to gain their users. However, it really comes down to price for many consumers; getting the best value overall for their hard-earned dollar. That is why cloud storage cost is such a big deal.

Well be comparing six popular cloud storage services and trying to find which one offers the best value: Dropbox, Google Drive, Microsofts OneDrive, Apples iCloud Drive, Box or Amazon Cloud Drive.

iCloud Drive doesnt really compare to the other cloud storage services because its really not quite the same theres no standalone iCloud Drive mobile app for the iPhone or iPad. But you can at least get a file explorer-type view of your iCloud Drive files on Mac, just as long as youre running OS X Yosemite or newer.

Heres how these six cloud storage services compare to each other and what you should look out for when shopping for one to use.

Below youll find a handy chart that gives you lets you quickly compare six cloud storage services with ease.

Perhaps the two most important things to look for when deciding on a cloud storage service is the amount of free storage you get, as well as the price-per-GB, if you choose to go with a paid plan.

For many users the free tier is the most common option, as you can use it to store a handful of files without paying anything. The more free storage you have, the better (obviously).

When it comes to paid plans, you want a plan that gives you as much storage as possible for the lowest price possible. Of course, there are other factors like different features, device support and the overall cost, so keep those in mind as well.

Now, lets go over each cloud storage service briefly and highlight the pros and cons of each one.

Dropbox is perhaps the easiest service to use out of the bunch and the simple user interface helps make that happen.

Plus, there are Dropbox apps for pretty much every platform and device you can think of. So whether youre an iOS, Android, Windows Phone or even a BlackBerry user, its all the same to Dropbox.

The desktop apps, especially, blend in well with both Windows and OS X, making it easy to add and remove files from your computer. Perhaps the biggest downside of the service, though, is that youonly get 2GB free, which is the least amount of storage out of the six services compared. However, thats usually enough to store most of your important files and Dropbox makes it really easy to earn more storage anyway.

Google Drive is a lot like Dropbox in that the desktops apps also blend in well with the stock file explorers in Windows and OS X. But Google Drive might be the superior service for avid Google users since it seamlessly integrates with Gmail, allowing you to save email attachments directly to Google Drive and even attach files to an email from Google Drive.

Plus, Google Drive offers a solid 15GB for free thats shared with Gmail, giving you plenty of space for your files without paying anything.

However, uploading photos from your phone is a kind of a pain. The app can automatically upload photos that you take to your Google+ profile, but theres no way to have them sync to the Google Drive desktop app.

Without a doubt, OneDrive is the best cloud storage service to use if youre a Windows user. It works seamlessly with Windows and Windows apps and if youre running Windows 8 or newer, its already built into the platform.

It works great with the Office apps, allowing you to open and save files right from OneDrive without any hassle.

There is still appeal for those who arent Windows users, since there are Mac and iOS apps available. But you have to sign up for a Microsoft account in order to use OneDrive, which really isnt worth it, especially with other cloud options available.

iCloud Drive is Apples own cloud storage service and it works seamlessly with all Apple products running iOS 8 or newer and OS X Yosemite and newer. Its a bit limited compared to an actual cloud storage service, since theres no standalone iCloud Drive app for iOS. Because of that, you cant really access any of your iCloud Drive files like you would with Dropbox or Google Drive. Plus, its paid plans are a bit on the expensive side.

However, the biggest use for iCloud Drive is probably storing photos, thanks to iCloud Photo Library that automatically syncs photos that you take with your iPhone to your Mac and other Apple devices.

Even if you use iCloud Drive, wed recommend using something else, like Dropbox, in order to have a true cloud storage service at your fingertips.

Box is great for collaboration, so its perhaps the best option for students and small businesses, but it can be used by anyone. Plus, you get 10GB for free, which is pretty respectable. While Google Drive offers more storage for free, it has to be shared with Gmail, making it a bit inferior because of that.

Box has the features that make it a good and simple cloud storage service, butits probably a bit too much for users just looking to simply store their photos and other files.

Box does have a business plan that offers unlimited storage for just $15/month but, again, its mostly just aimed at businesses rather than individuals.

Amazon Cloud Drive is a unique option and it may be the best option for those who have a ton of photos that theyre wanting to store in the cloud.

The service offers unlimited photo storage and 5GB for other files for free for Amazon Prime members ($11.99 per year otherwise) and if you use Amazon at all, you probably already have Prime.

Amazon Cloud Drive is also the only service out of the six that offers a non-business plan where you can store an unlimited amount of files. This costs a very reasonable $59.99 per year (or $5 per month).

When it comes down to it there is no right or wrong choice and the cloud storage service that you should use can depend on what devices you use.

Dropbox is great for any platform, while OneDrive, Google Drive, and iCloud Drive are fantastic for Windows users, Google users and Apple users, respectively.

If youre looking for the best value, though, Amazon Cloud Drive is technically the one to go with, since it offers some kind of unlimited storage. Since many people likely already have an Amazon Prime membership they wont have to pay a cent for it.

OneDrive also offers a good value at $0.007 per GB, with Dropbox close behind at $0.008 per GB. However, if youre looking for the cloud service that offers the most free storage, OneDrive gives you 15GB for free with the chance to earn 20GB more, giving you the potential for 35GB of free cloud storage.

View post:
Cloud Storage Cost Comparison: Which One Is Best?

Read More..

Cloud Storage on Your Windows 10 PC – dummies

By Dan Gookin

The most common cloud service is file storage. A branch of folders and files on your PCs mass storage system are duplicated on the Internet, available on the web or from any other Internet-connected gizmo.

Whether your PC has a cloud storage subscription or not, you can always get one. Several services are available, which include a modicum of free online storage. They all work in a similar manner:

Install the cloud storage software on your computer.

This is the program that synchronizes your files from the PCs mass storage system to the Internet.

Create an account.

The account provides the Internet access, not only to coordinate the files but also to a website where you can access your files online.

Start using the service.

You copy files to the folders on your PC, which are echoed to the Internet and synchronized across any device that also uses that cloud storage.

Three popular online storage services are Microsofts OneDrive, Googles Google Drive, and Dropbox. Here is a list of these services and their web addresses. Visit the address to download the software.

To add the cloud storage to your PC, follow the general steps. Visit the web page to install the software, create an account, and then start using the service.

One drawback to cloud storage is limited storage capacity. That can be addressed if youre willing to pay for more storage.

More cloud storage options exist than the three you find here. Some are open to anyone, but many are paid subscription only for example, Adobes Creative Cloud.

Microsofts cloud storage service was originally called SkyDrive. Then they found out someone else owned the name SkyDrive, so Microsoft changed it.

To make cloud storage work, save files and create folders within the cloud storage folder tree on your PCs mass storage system. The folders are found in your accounts home folder, given the name of the cloud service that youre using. For example:

Dropbox

Google Drive

OneDrive

Open those folders and you often find additional folders, such as Documents, Pictures, Music, and so on. You may find documentation on how to use some of the folders.

As an example, here are the steps to copy a file from your home folders Documents folder to the OneDrive Documents folder:

Press Win+E to summon a File Explorer window.

Choose Documents from the left side of the window.

What you see is actually a library, not the specific documents folder for your account. Thats okay; the same files are available.

Click to select a file, and then press Ctrl+X to move (cut) the file.

From the left side of the window, choose OneDrive.

It should appear in the Quick Access list. In fact, you may also see Dropbox and Google Drive in that list as well.

Double-click on the Documents folder to open it.

Technically, youre now looking at the contents of the OneDriveDocuments folder.

Press Ctrl+V to paste the file.

The file is moved from the Documents folder to the OneDriveDocuments folder. (If you want to move it back, press Ctrl+Z to undo the operation.)

After the file is copied, its immediately synchronized with cloud storage on the Internet. After a few information superhighway moments, that file is available via the web or on any other device that has access to cloud storage.

These steps demonstrate copying a file to cloud storage, but you can also copy a file from cloud storage, move files, rename them, add folders, and so on.

When you delete a file from cloud storage, its removed from all cloud storage devices.

You can move files between devices by copying them to cloud storage.

Both Google Drive and Dropbox folders are accessible through teensy-weensy icons in the taskbars notifications area.

You can still use your PCs cloud storage folders while the Internet is offline. Any files you add or modify in the cloud storage folders are instantly synchronized after the connection is resumed.

Windows uses the backslash character, , to separate folder names when specifying a path. The term path describes the folder hierarchy, listing all parent folders for a specific folder or just the relevant parent folders.

The most common way to access your cloud storage is from any web browser; navigate to the cloud storage website and log in, and there are your files. OneDrive even lets you preview and examine files online; you can edit Microsoft Office documents if you subscribe to the Office 365 service.

On other devices, you must obtain the cloud storage app. For example, on Android phones and tablets, visit the Google Play Store to obtain apps for Dropbox and OneDrive; Google Drive is included on all Android devices (the app is named Drive).

You see the Dropbox folder on a PC right next to how that folder looks when accessed on an Android tablet. To do so, you open the Dropbox app. Files and folders are identical and synchronized between both devices.

For a laptop or another PC, add the cloud storage software as you did for your first PC. On Windows 10, the OneDrive connection is made automatically, so theres nothing more to set up.

Read more:
Cloud Storage on Your Windows 10 PC - dummies

Read More..