Page 4,214«..1020..4,2134,2144,2154,216..4,2204,230..»

Massive Potential Attracts International Players to Iran’s Cloud Computing Market, Despite Challenges – PR Newswire (press release)

"The outsourcing culture has been low in Iran, and market entry policies and regulations are still vague," said Digital Transformation Consultant Gowtham Bandi. "Until there is improvement in infrastructure and government assistance, it will be tough for international players to establish a foothold in the Iranian cloud market. To start with, non-core business applications like web hosting and mails will help create an ecosystem to host/implement other solutions."

Iran Cloud Computing MarketMacro Outlook and Technology Trends, 2017 examines critical aspects for investing in and entering the Iranian cloud market. The study highlights industry verticals to target in order to create distinctive positioning to enter the public, private and hybrid, infrastructure-as-a-service (IaaS), product-as-a-service (PaaS), and software-as-a-service (SaaS) cloud markets.

To access more information on this analysis, please click here.

Local cloud providers, such as Afranet, DP Iran Co, and Innfinision, that operate using/reselling global products, presently dominate the Iranian data and cloud market. Integrating with telecom players for infrastructure, and European/Indian IT solution providers to enhance portfolio capabilities, will provide growth avenues for all stakeholders.

International players will have to overcome several issues to gain a foothold:

The hybrid cloud segment holds massive opportunities, driven by demand from the small and medium enterprises sector. Creating robust infrastructure and addressing security concerns will be vital for success.

"New business models are being developed to create revenue opportunities through the cloud," noted Bandi. "This will help them achieve a strong competitive standpoint against established players in the Iran cloud market."

About Frost & Sullivan

Frost & Sullivan, the Growth Partnership Company, works in collaboration with clients to leverage visionary innovation that addresses the global challenges and related growth opportunities that will make or break today's market participants. For more than 50 years, we have been developing growth strategies for the global 1000, emerging businesses, the public sector and the investment community. Is your organization prepared for the next profound wave of industry convergence, disruptive technologies, increasing competitive intensity, Mega Trends, breakthrough best practices, changing customer dynamics and emerging economies?

Iran Cloud Computing MarketMacro Outlook and Technology Trends, 20179AC2/43

Media Contact:

Anita ChandhokeCorporate CommunicationsP: +91 80 67028020E: achandhoke@frost.comhttp://ww2.frost.com

Twitter: @Frost_SullivanFacebook: http://www.facebook.com/frostandsullivan LinkedIn: https://www.linkedin.com/company-beta/4506/

View original content:http://www.prnewswire.com/news-releases/massive-potential-attracts-international-players-to-irans-cloud-computing-market-despite-challenges-300505866.html

SOURCE Frost & Sullivan

Frost New Home page v2

Go here to read the rest:
Massive Potential Attracts International Players to Iran's Cloud Computing Market, Despite Challenges - PR Newswire (press release)

Read More..

360 Cloud Solutions now offers Adaptive Insights – Accounting Today

360 Cloud Solutions, a NetSuite value added reseller, has added Adaptive Insights to its portfolio of solutions. Adaptive Insights provides financial and performance management and analytics software.

In April this year, Adaptive Insights deepened its software integration with NetSuite, offering more complex planning and reporting capabilities in conjunction with the enterprise resource planning platform.

Bringing Adaptive Insights to 360 is Mark Thurmond, who has independently been a value added reseller for Adaptive Insights for over a decade. Thurmond joined 360 Cloud Solutions this year as vice president of financial planning and analytics to build a practice around Adaptive Insights for the cloud hosting company.

Experiencing the adoption in the marketplace of this powerful tool that enables such detailed, yet flexible budgeting and modeling, has been satisfying, Thurmond said in a statement. It is a scalable tool that works for any company and can turn department leads into analysts, not just excel masters.

Monitoring key business metrics and looking at the entire operational picture is already a core practice for our clients, added 360s CEO Rufus Lohmueller in a statement. Adaptive Insights takes that information and expands the view into flexible budgeting, forecasting, modeling and projections; tasks which are crucial to running a business.

Go here to read the rest:
360 Cloud Solutions now offers Adaptive Insights - Accounting Today

Read More..

Hackers breach third party cloud vendor TekLinks – Healthcare IT News

A breach on a server managed by cloud hosting and server management provider TekLinks, may have allowed hackers to potentially access and exfiltrate the personal health information of patients from Alabama-based Surgical Dermatology Group.

TekLinks discovered unauthorized access around May 1, 2017, but access was first gained on March 23. Officials said it blocked server access after the initial discovery, but hackers could have viewed or copied data beforehand.

Surgical Dermatology hired a forensic investigation team to determine the scope of the breach. Officials said the compromised server contained patient ID numbers, names, Social Security numbers, health plan information and physician names.

[Join Your Peers at HIMSS Healthcare Security Forum! Register Today]

Financial information and credit card information werent stored on the affected server, officials said.

Surgical Dermatologys investigation team has secured the server, and officials said policies have been revised to improve security for the organization.

All patients were notified and offered a year of free credit monitoring and identity theft protection services. Officials said the organizations also reported the breach to appropriate authorities, including the FBI.

The number of breached records was not included in the notification, and the data is not yet included on the U.S. Department of Health and Human Services Office of Civil Rights breach reporting tool.

Twitter:@JessieFDavisEmail the writer: jessica.davis@himssmedia.com

Like Healthcare IT News on Facebook and LinkedIn

Go here to read the rest:
Hackers breach third party cloud vendor TekLinks - Healthcare IT News

Read More..

These Inventors Need To Conquer Cryptocurrency To Change Cloud Computing – Celebrity Net Worth

In Cambridge, Massachusetts, a team of twentysomething programmers have developed a product called Sia, which helps people to store data on other users' open storage space. They also created a digital currency, called Siacoin, which is the only way to pay for those transactions. For them, it was a way to make good on the promise of blockchain technology, which was invented alongside Bitcoin and could potentially reshape internet transactions. Instead, Siacoin has been pulled into the speculation frenzy around cryptocurrency which has led to huge fluctuations in valuation with regulators and investors struggling to keep up.

The instability has caused friction for Nebulous, the company behind Siacoin. Nebulous intends for their technology to challenge cloud storage providers like Google, Microsoft, and Amazon, but it relies on theirSiacoins holding real world value. Users buy them on public exchanges and pay for the storage, or they can earn them as payment for hosting other peoples' files. They can also earn Siacoin through a process called mining, which rewards users for helping to verify the security of transactions.

They'veunfortunately stumbled into a market with billions flowing into all types of cryptocurrency companies, from real players to coins explicitly built as jokes, such as Dogecoin. A recent report revealed that the total value of cryptocurrencies has hit an all time high of $116.9 billion. Cryptocurrency expert Galen Moore feels that Sia is a standout because it's only one aspect of a real product. But people need to trust the currency in order for the system to work, and they need to have confidence that they can cash out when they need to.

Many owners of Siacoin say they believe in the product, and pure speculators are quickly shut down on discussion groups. For them, it's not necessarily the money, but the aspect of participating in an interesting project that could reshape the cloud storage industry. Some of Sia's investors shy away from many blockchain startups but seek projects that would only be possible with the technology.

Sia raisedaround $1.7 million in investment and grantsand makes money when people use the platform.Outside trading of Siacoin doesn't benefit Sia much, and the company said it owns less than 1 percent of the coins. They estimate that monthly storage costs are about $2 per terabyte, and count 690 hosts offering 3.4 petabytes of storage, with around 2 percent being used. The company hopes to grow those numbers by developing ways to deal with the fears of using their cryptocurrency.

Read more here:
These Inventors Need To Conquer Cryptocurrency To Change Cloud Computing - Celebrity Net Worth

Read More..

The Yin-Yang of Cybersecurity Legislation The Internet of Things Cybersecurity Act – CSO Online

The dynamic of opposites permeates human culture: light and dark, push and pull, happy and sad, supply and demand, yin and yang. While we tend to prefer one over the other, the reality is that the tension between opposites is what makes them complementary. The same can be said of technology. We all know that quick and free access to information, regardless of economic status, is changing the world. But none of that would be possible without security safeguards like accountability and authentication. Without those, economics, capitalism, and even democracy itself are severely strained. Which is why security is a multi-billion dollar industry.

The recent growth of the Internet of Things (IoT) is a case study of what happens when access and availability are not counterbalanced by security. The vast majority of IoT devices available today have been built with little to no thought for security, and yet they are being integrated into the fabric of our daily lives at an unprecedented rate. As a result, massive botnets like Mirai and Hajime composed of millions of compromised IoT devices managed to take down a significant segment of the Internet and affect hundreds of thousands of businesses around the world. Most security experts agree that these attacks are just the tip of the IoT-based cyberthreat iceberg, and that they represent an extraordinarily large attack vector built into our emerging digital economy.

TheInternet of Things Cybersecurity Act of 2017 Actis a noteworthy attempt to address these challenges before they escalate further. The proposed IoTCA bill gives the problem of security and control a good deal of attention, since solving the problem of authentication (people-to-machines, software-to-hardware, data-to-processes, etc.) would be almost analogous, in the Internet security world, to solving world peace.

Over the next few years, billions more IoT devices will become part of our digital lives. If implemented properly, they could utterly transform business and society. However, their value will be limited by the degree to which we can trust their Authenticity that they are what or who they claim to be. Though the IoTCA is not a silver bullet, it attempts to help reduce the level of obvious risks in a ballooning population of Internet-connected devices.

Of course, like everything, even legislation is a two-edged sword. Im concerned about any attempt to legislate vulnerabilities, in part because technology evolves so quickly. Trying to strike a balance between progress and protection can be a tricky business, much like trying to shoe a horse at full gallop. While the government should use its power of the purse its contracting and procurement processes to move the ball forward, its probably not practical, for example, to demand written verification or certification that an IoT product is vulnerability or defect free. Security is a moving target. Frankly, the best that such a certification could mean is that at the moment a device was analyzed it was free from any known defects or vulnerabilities and was not vulnerable to any attacks that the manufacturer knew about. Knowing how fast things change in cyberspace, however, such verifications are the digital equivalent of mayflies.

Similarly, the IoTCAs proposal to require industry standard protocols, however well intentioned, may have unintended consequences because of its potential impact to innovation. These sorts of things need to be developed with care. Standards take time for a good reason. Imposing them with the force of law may unintentionally stifle breakthrough solutions that might leapfrog current technologies. And in that case, everyone would lose.

On the other hand, the proposed IoTCA legislations liability protection for those who are forthcoming about vulnerabilities is a breath of fresh air, especially compared to some of the critical infrastructure sectors that, for fear of regulatory fines, limit vulnerability disclosures.

Likewise, the bills notation about the important role of segmentationreflected a sophisticated understanding of security strategy: When it comes to cybersecurity strategy, Segmentation is still king.

Segmentation (limiting access based on need-to-know to those with authenticated credentials):

The bill rightly encourages the adoption of segmentation strategies and architectures. This approach would intelligently allow IoT devices to be incorporated into the network while limiting their potential negative impact. Visibility into devices actively connected to the network also continues to be a challenge for most organizations. Which is why the bills inventory of devices requirement would help create an excellent starting point for companies or businesses to reference when selecting and operating IoT devices. Proper segmentation and monitoring would not only separate classes of devices and data, but would also allow administrators to pinpoint and isolate misbehaving devices, check them against an inventory, and then extend remediation to all related devices, and not just the one that had been identified.

Intentional design is a strategy whereby vulnerabilities and potential attack vectors are identified and architected out of the network during the network architecture design phase, rather than relying exclusively on security technology. Segmentation is a fundamental part of such a design strategy. At Fortinet, were experimenting with a strategy called Earned Trust, where IoT devices would be allowed access based on their stated trust levels, but whose network behaviors would be automatically and actively monitored to ensure they are performing as advertised. If their behavior, or level of earned trust changes, the network could automatically adjust their access policies. At the same time, the level of monitoring or access for similar devices could be elevated while we determine if the observed behavior was an anomaly or endemic to an entire class of devices.

Of course, the boom of IoT across its many classes (consumer, commercial, industrial) means that the majority of data is no longer contained inside traditional networks. Which means that securing only a few points within the network will no longer be good enough. Security strategies like segmentation need to be woven deep into the core of the network and at the same time expand out to the cloud, remote locations, and even end users. These security technologies need to be able to work as an integrated system to automatically identify, understand, and protect infrastructures from the massive attack surfaces and new attack vectors created by IoT across todays and tomorrows increasingly distributed and elastic network environment.

While the adoption and integration of IoT is going to require taking a fresh look at existing security solutions and strategies, the questions we need to ask about business goals, related risks, and risk mitigation havent changed. Network security not only needs to continue to actively prevent intrusions, it also needs to minimize the risk of serious breaches by reducing the time taken to detect and respond to new threats. Security solutions need to become better at collecting and sharing intelligence. They will need to be able to correlate indications of compromise and automatically coordinate a response to a threat or breach regardless of where it occurs or what attack vector was used. Given the scope and scale at which networks are evolving, achieving this will require a broad, powerful, and automated approach to security that many agencies and organizations do not yet have in place.

Id like to see a little more consultation with industry as this bill progresses. Businesses and even nations are staking their financial futures on the new digital economy.

Back to the topic of synergistic opposites:

Which is the truth? Right now, they both are, in part. But the good news is that, going forward, we can ensure that we maintain a healthy balance between the yin of ubiquitous IoT (and the convenient and instant access to information/services it represents), and the yang of holding it accountable to doing what we expect it to do, and nothing more, through authentication and the adoption of the principles of Earned Trust.

Read more here:
The Yin-Yang of Cybersecurity Legislation The Internet of Things Cybersecurity Act - CSO Online

Read More..

Stronger security and disaster planning fuel healthcare’s migration to the cloud – Healthcare IT News

Healthcare did not lead the charge into the cloud. But it has been making up for lost time. The use of cloud platforms has grown substantially within healthcare provider organizations.

See the Guide:Cloud computing decision guide: Breaking down 7 top solutions for healthcare

A recent HIMSS Analytics survey of provider C-suite executives found that more than half are using Infrastructure-as-a-Service (Iaas) cloud platforms to provide an environment for a wide range of uses ranging from hosting internally developed programs to a running fully functional EHR.

HIPAA privacy and security concerns were one reason for the slow start. But once HHS provided clear guidance on how to address PHI issues and work through Business Associate (BA) relationships, everything changed.

Today, very few healthcare CIOs consider security a reason to avoid the cloud. Quite the opposite. The HIMSS Analytics survey found that disaster preparedness is now one of the leading reasons why healthcare CIOs are making the decision to shift resources onto cloud platforms. The savings are compelling. Why rent storage in a redundant data center to maintain a fully functioning backup when you can pay for only what you need in the cloud?

You don't have to worry about your infrastructure and data center, said Jason Bickford, Applications Director of Health Information Management Systems at Banner Health and president of the HIMSS Arizona Chapter. Cloud-based is the right way to go.

Disaster recovery in the cloud also has value as a stepping stone on the way to moving production-level clinical applications into a cloud environment. The logic is compelling. Once the backup clinical application has been confirmed to be running smoothly in parallel, the cloud option has proved itself reliable, so why not take advantage of the potential savings?

That is not to say that security isnt a priority. After budget limitations, HIMSS Analytics survey respondents cited security concerns as a reason to move slowly toward the cloud.

Regardless of whether a solution is hosted in your own data center or in the cloud, security should be a critical factor in your review, advises Susan Snedaker, Director, IT Infrastructure & Operations at Tucson Medical Center and author of the book IT Security Management. Theres nothing inherently more or less secure about a cloud option, but some cloud-based solutions may not meet todays stringent security requirements.

In selecting a cloud platform vendor, Snedaker advises a careful review of the vendors documentation and contracts. Pay attention to the providers security program and make sure that audits take place on a regular basis.

If your database is going to be hosted on the same server as another database from another company, what happens if the other database is attacked? Can the attacker then gain access to your data? Snedaker says. Be sure to understand the specifics of the hosting solution so you are clear about your vulnerabilities. Then take steps to mitigate them select a different solution, select a different hosting model, ask the vendor to modify policies, processes, procedures, access methods, etc. or accept the risk if it cannot be overcome and there are no better options.

Security consultant Tod Ferran of Halock Security Labs has performed audits of the large cloud platforms, Microsoft, Amazon and Google, and found the services are maintaining a very high level of security. In many ways, Ferran said, the cloud is a better choice because many hospitals cant afford the staff to make their systems secure enough.

As the nature of risk has changed, so has the value equation. Strong security means constant maintenance of operating systems and applications with the healthcare enterprise. HIT managers can gain peace of mind from knowing the updates are being performed by a vendor that is guaranteeing round-the-clock support, rather than by a hospital staff already stretched with aggressive internal project loads.

Many healthcare providers use multiple cloud vendors, cherry picking among the different options to align with specific demands of each application.

Organizations are not putting all their eggs in one basket, said Sandra Yu, cloud client executive at CDW. Its a multi-cloud world. CDW partners with a wide number of cloud hosts in providing managed cloud services, so Yu has experience with many vendors.

If you have needs for hyper computing, we would recommend a public hyper-scalar for that, she said. For PHI she would recommend a private cloud.

When it comes to applications that have a heavy computational workload, you need to be sensitive to the clouds latency and so she would recommend a cloud data center that is geographically closer. But for something that is not PHI-sensitive, she would recommend a public cloud where the costs should be lower.

The clinical apps that can work well in the cloud are typically those that are not transferring large files or data streams, Snedaker says. If youre going to host a data intensive clinical application in the cloud, you should be sure you have the right connectivity solution in place.

When factoring in all of the reasons to move to the cloud, in the end, cost is still a prime motivation. The savings are derived not only from reducing the cost of maintaining data centers. The pricing for IaaS continues to go down.

Its like a race to the bottom, Yu said, noting that when one of the major vendors lowers its price, the others are quick to match it. Pricing among the leading public cloud vendors is generally on par now, so decisions should be made after shopping for the services and support that youll need. Pay as you go options are readily available, so trials are simple to setup.

Twitter:@GusVendittoEmail the writer: gus.venditto@himssmedia.com

Like Healthcare IT News on Facebook and LinkedIn

More:
Stronger security and disaster planning fuel healthcare's migration to the cloud - Healthcare IT News

Read More..

Hackers hit dermatology practice through cloud vendor – Information Management

A cyber attack that affected a cloud-hosting and service provider resulted in access to patient data of Surgical Dermatology Group in Alabama, a specialty practice that has offices in Birmingham, Montgomery and Huntsville.

Hackers were able to penetrate TekLinks, which provides cloud services to Surgical Dermatology; the cloud provider notified the practice of the about the intrusion in early June.

TekLinks has assured us that all unauthorized access was terminated on May 1, 2017, and that monitoring by TekLinks from April 22 through May 1 showed no further malicious activity during that time period, the practice told patients in a notification letter.

Also See: Dermatology practice struck by ransomware attack

Information that was compromised included patient names, addresses, home and mobile telephone numbers, email addresses, Social Security numbers, medical record numbers, physician names, health plans, and charges and payments for services rendered.

Drivers license numbers and financial information were not affected. Surgical Dermatology Group is offering affected individuals one year of credit monitoring and identity theft protection services.

The practice declined to provide additional details about the incident, including the number of affected individuals. If the information of more than 500 individuals was compromised, the practice will be reporting further details of the breach on the website of the HHS Office for Civil Rights.

This article originally appeared in Health Data Management.

Goedert is senior editor of Health Data Management, a SourceMedia publication.

Continued here:
Hackers hit dermatology practice through cloud vendor - Information Management

Read More..

Oracle expands database offering to its cloud services – Network World

Oracle is now offering its Exadata Cloud service on bare-metal servers it provides through its data centers. The company launched Exadata Cloud two years ago to offer its database services as a cloud service and has upgraded it considerably to compete with Amazon Web Services (AWS) and Microsoft Azure.

Exadata Cloud is basically the cloud version of the Exadata Database Machine, which features Oracles database software, servers, storage and network connectivity all integrated on custom hardware the company inherited from its acquisition of Sun Microsystems in 2010.

The upgrade to the Exadata Cloud infrastructure on bare metal means customers can now get their own dedicated database appliance in the cloud instead of running the database in a virtual machine, which is how most cloud services are offered. Bare metal means dedicated hardware, which should increase performance.

Exadata Cloud is the same as the on-premises device, and customers can allocate all the CPUs and storage they want. But its also compatible with its databases deployed on-premises, which makes it easy for customers with data centers to transition to the cloud or to deploy a hybrid cloud strategy.

With the power of Oracle Exadata, customers using our infrastructure are able to bring applications to the cloud never previously possible, without the cost of re-architecture, and achieve incredible performance throughout the stack. From front-end application servers to database and storage, we are optimizing our customers most critical applications, said Kash Iftikhar, vice president of product management for Oracle Cloud, in a statement.

Oracle claims customers can self-provision multiple bare-metal servers in less than five minutes, with each server supporting more than 4 million input/output operations per second (IOPS). Its cloud infrastructure also provides block storage that linearly scales by 60 IOPS per GB.

Oracle is targeting customers already using Exadata on-premises that want to migrate to the cloud, as well as organizations that want a hybrid solution, to split the load between on-premises and the cloud.

Oracle has beefed up its offering in recent years, pushing virtually all of its on-premises software into a SaaS model, as well as building its own massive data centers to offer cloud services such as Exadata Cloud. It recognizes the writing on the wall that the move to the cloud is inevitable, but it remains to be seen how much of what Oracle specializes in will go to the cloud.

Do companies really want to shuttle multi-petabytes of data around the cloud and their data center? Do they want sensitive data in the cloud? Or critical line-of-business apps?

There have been numerous stories of firms moving the cloud and then moving right back on premises, either in full or part. Dont get me wrong; Im sure some data will move to the cloud, and Oracle will be able to protect its business with cloud offerings. Just how much remains to be seen. I think some things will stay close to home.

Read more:
Oracle expands database offering to its cloud services - Network World

Read More..

Voices Cloud security from all angles – Accounting Today

Cloud accounting systems are cheaper, scalable and more advanced than most local and desktop alternatives. They help small businesses connect with their accountants in real time to collaborate on live documents. Accountants can process end of year adjustments in real time simply by accessing their clients online file. So given all these positives, why are accountants still slow to adopt cloud-based technology?

The answer may lie in increasing concerns around security. Recent data leaks and hacks have hit huge organizations like Yahoo, JP Morgan Chase and the European Central Bank. These high-profile incidents could be making accountants, possessors of incredibly sensitive client information, wary.

Irene Marullo, a CPA and partner at Babaian CPA Associates PLLC in New York City, says her firm has experienced quick wins in efficiency using cloud solutions, but it isnt ready to migrate all of its data to the cloud just yet. The firm is using mostly desktop-based software, though some of their clients have already transitioned to the cloud using programs offering cloud-hosted options such as QuickBooks.

So far, Babaians accountants have used the cloud to back up their files, replacing outdated backup tapes. The firm agree that this is a more secure, reliable and space-efficient method. Babaian also moved its staffs email into the cloud using Office 365. They no longer experience email outages around tax deadlines due to server overloading. Now, users at the firm have 24/7 email access from any device, anywhere.

If the cloud has worked this well so far, why doesnt Babaian migrate all its data?

Marullo said that the firm is constantly vigilant about security risks and that clients are reluctant to move their information into the cloud. The firm lets clients decide when to move their data to the cloud, which is one reason why a full-scale cloud adoption is not possible yet.

The IT perspective

Chris Cevallos is CEO of Point to Point Solutions, an IT consultancy in New York City that has many accounting and professional services firms as clients. He works closely with these firms to identify potential cyberthreats and implement solutions.

Cevallos said that the kinds of attacks accounting firms are vulnerable to are:

Always consider that youre under attack," he said.

The legal perspective

While legitimate, these concerns arent reason enough to forego cloud-based solutions. Justin Hectus, CIO and CISO of Keesal, Young & Logan, a law firm with accounting clients and a cybersecurity practice, thinks it surprising that people are still questioning the cloud in its entirety.

There is a misconception about cloud storage and a lack of certainty of where the data is and how its controlled, he said. Data is still on computers when its in the cloud the computers are just somewhere else rather than in your office. The basic concepts of security still apply.

Hectus added that the right cloud-based solutions present the possibility of an improved approach to data security compared with a company that stores its data in an on-site server room. Cloud solutions can provide better and up-to-date encryption, patching, and upgrades so accounting firms have the latest tools to protect them from hackers and security breaches.

For those businesses using on-site servers and legacy systems, Hectus said that this kind of patchwork approach can be riskier and more complex than centralizing on the cloud. There are more passwords to manage and more out-of-step or outdated products. Done right, having a cloud-based system can provide a simple, even approach across the board.

Hectus recalled a time where small firms could not afford the same technology that larger companies had access to. Now, with cloud-based versions of a document management system or secure file transfer technology, smaller firms can use the same tools as the largest organizations in the world.

To mitigate security risks accounting firms should choose a reputable and diligent cloud provider. Hectus advised that before deploying any cloud solutions, firms need to put vendors through their risk management and due diligence process to ensure the provider is doing its part to secure their data. He also recommended looking for vendor certifications and International Organization for Standardization (ISO) standards to help vet vendors.

Cevallos said firms under FINRA compliance requirements need to make sure their cloud provider is compliant as well.

Customizing a solution

Reputable cloud providers should have appropriate measures in place for data loss prevention, including antivirus and anti-ransomware, of which you only need to look to the recent global cyber attack dubbed WannaCry to understand the importance. Cloud solutions should have two-factor authentication and encryption not just on your computer at the office, but when in transit mobile devices are vulnerable, too.

Hectus reminds firms that, Any cloud vendor can provide a laundry list of qualifications, but determine whats more important to your firm when creating your own list.

Real industry workflows show that cloud solutions mean greater efficiency and capabilities and, often, even greater security than on-site solutions. Accounting firms are understandably cautious in moving data to the cloud. However, by choosing the right vendors and establishing strong policies and procedures to protect both internal and client information, accountants can make the transition successfully. Efficiency benefits both accountants and their clients, so if your firm has been reluctant to consider the cloud, maybe its time to reconsider.

Dean Sappey is the president and co-founder of DocsCorp.

More:
Voices Cloud security from all angles - Accounting Today

Read More..

Physicists Have Made Exotic Quantum States From Light – Futurism

In BriefPhysicist have learned how to use light to create quantum states that flow from one point to another. This puts us one step closer to living in a world with quantum computers.

Five years ago, Martin Weitz and his team accomplished what other physicists had thought impossible: they created a photonic Bose-Einstein condensate, a completely new source of light.

A photonic Bose-Einstein condensate is when individual photons are collected together in a single location, cooled, and brought together to create what is known as a super-photon. Recently,Weitz of theInstitute of Applied Physics at Germanys University of Bonn set out to conduct an experiment with a newly made one.

In this new experiment, Weitz and his team were able to create wells that allowed super-photons toflow from one well to the next, an achievement that could one day lead to much-anticipated quantum computing.

The team accomplished this task by bouncing a laser between two mirrors, moving the light through a pigment between the mirrors thatcooled the light and turned it into a super-photon.Before introducing the laser light, a polymer was mixed in with the cooling pigment used to cool the light.Using this polymer allowed Weitz to influence the experiments refractive index using heat; increasing the temperature would let longer light wavelengths travel back and forth between the two mirrors.

By inducing different temperature patterns, Weitzs team was able to induce apseudo-warping effect in the polymer, creatingwells at certain points that had a different refractive index than the polymer as a whole. The team then found that the super-photon would flow into the wells, just as a liquid might flow into a hollow space.

The special thing is that we have built a kind of optical well in various forms, into which the Bose-Einstein condensate was able to flow, Weitz said in a press release. With the help of various temperature patterns, we were able to create different optical dents.

Following the creation of the photonic Bose-Einstein condensate, Weitz team of researchers observed the behavior of two adjacent optical wells. By adjusting the temperatures of the polymer, the light in both wells came to have similar energy levels, thereby allowing the created super-photon to move from one to the other.

According to Weitz, thisinnovation could be the precursor for quantum circuits, which are expected to play a large role in the future of quantum computers and communication.

The work done by Weitz and his group could also lead to better developed lasers, such as ones used for welding or drilling.

Computing applications of this technology arent expected for quite a while, but some believe the first true quantum computers may debut as early as next year. It was only in July that two Swedish PhD studentsbroke a quantum computing record, nudging use slightly closer to such a reality.

Its currently a race to see who gets us to that point first, but its only a matter of time before we figure out how to create the right machines capable of handling quantum circuits. When we do, whole new aspects of our universe may become open to us, as our computer systems inevitably become faster and more powerful.

See original here:
Physicists Have Made Exotic Quantum States From Light - Futurism

Read More..