Page 4,244«..1020..4,2434,2444,2454,246..4,2504,260..»

ARRIS Launches First Gateway with ARRIS Secure Home Internet by McAfee; Exclusively at Best Buy – PR Newswire (press release)

Cyberattacks in the connected home are a growing consumer concern. A recent McAfee study** revealed that 81 percent of consumers think it's important that their online identity and internet-connected devices are secure. As consumers install increasing numbers of connected devices into their home, savvy cybercriminals have morphed their focus to those new devices, knowing that many consumers fail to take the proper security precautions to protect themselves. Today, any device that connects to the internet is a potential target if not properly secured. This is why ARRIS partnered with McAfee, a leading independent cybersecurity company, to enable best-in-class security at the point where data flows in and out of the home.

Product Highlights

"The ARRIS SBG7580-AC is the first gateway to incorporate device security into the gateway, the entry point for internet into the home. In doing so, we've created a single product that delivers cybersecurity protection to devices in the home, including unsecured IoT devices," said Sandy Howe, SVP and GM, Consumer Products Group at ARRIS. "Instead of installing and updating security software on every single connected device, now people can simply connect to protect. ARRIS pioneered gateway technology, and the SBG7580-AC with ARRIS Secure Home Internet by McAfee showcases our 20+ years of technology communications expertise."

"We pioneered the digital life protection space where we made it our mission to protect all the devices that our customers use," said John Giamatteo, Executive Vice President, Consumer Business Group at McAfee. "With the integration of Secure Home Internet into the ARRIS gateway, we are delivering on this mission with an industry leader. The best security software is the kind that people actually use, and together with ARRIS, McAfee is making it easier than ever for consumers to protect every connected device in the home."

Pricing and Availability The ARRIS SURFboard SBG7580-AC with ARRIS Secure Home Internet by McAfee is available exclusively at BestBuy.com for $199.99.

About ARRIS ARRIS International plc. (NASDAQ: ARRS) is a world leader in entertainment and communications technology. Our innovations combine hardware, software, and services across the cloud, network, and home to power TV and internet for millions of people around the globe. The people of ARRIS collaborate with the world's top service providers, content providers, and retailers to advance the state of our industry and pioneer tomorrow's connected world. For more information, visitwww.arris.com.

For the latestARRISnews:

ARRIS, theARRISLogo, and SURFboard are trademarks or registered trademarks ofARRIS Enterprises, LLC. McAfee and the McAfee logo are trademarks of McAfee, LLC or its subsidiaries in the US and/or other countries. All other trademarks are the property of their respective owners. ARRIS Enterprises, LLC.2017. All rights reserved.

* Exclusively at Best Buy until Sept 30, 2017.

** In September 2016, McAfee commissioned OnePoll to conduct a survey of 9,800 consumers (aged 18-55+). Respondents were individuals who use an internet-enabled device on a daily basis in the following countries: Australia, Canada, France, Germany, Italy, Mexico, Netherlands, Spain, the U.K., and the U.S.

***ARRIS Secure Home Internet by McAfee blocks connected devices from reaching a known malicious site. As new and unknown sites are identified by McAfee, ARRIS Secure Home Internet by McAfee will automatically detect, block and secure connected devices from them.

****Actual rates may vary depending on a number of factors including, but not limited to: the services offered by cable service providers, network traffic, computer equipment, type of server, number of connections to server, and availability of internet router(s).An approximate value of $240 when compared to comparable offerings.

View original content with multimedia:http://www.prnewswire.com/news-releases/arris-launches-first-gateway-with-arris-secure-home-internet-by-mcafee-exclusively-at-best-buy-300486799.html

SOURCE ARRIS International plc

http://www.arris.com

See original here:
ARRIS Launches First Gateway with ARRIS Secure Home Internet by McAfee; Exclusively at Best Buy - PR Newswire (press release)

Read More..

Cloud Storage Privacy Policies: What It All Means – Cloudwards

Privacy in the cloud was a hot topic well before it became known that the U.S. government had partnered with some of the biggest names on the Internet to collect user data. Whether for hunting would-be terrorists or selling skivvies, data has value and somebody wants yours.

The problem with privacy is that as fascinating and important a topic as it might be, slogging through the thick soup of assurances and exceptions typical in most privacy policies is a good cure for insomnia. To help lessen the load, Cloudwards.net decided it was time to address the subject head on.

Read on to learn more about what to look for in a privacy policy and how much it all matters.

Dont mistake cloud privacy for cloud security. While good security can help ensure your privacy, security is more about preventing illegal access to your content. Privacy, on the other hand, is about restricting legal access: how the cloud provider can and cant use your data, and who they can and cant share it with.

A privacy policy, by definition, is an agreement by which the company holding your data must tell you what data gets collected and how it gets used. In general, such policies are considered standard practice if a company collecting the data has enough information to identify who you are. However, laws mandating these policies vary from country to country.

Since most cloud storage and backup companies are based in the United States, were going to focus our attention there.

Surprisingly (or not), the United States doesnt have a single federal law that states companies collecting data must have a privacy policy. However, based on a subset of federal, state and international laws, the FTC developed a best practice guideline for businesses to follow called the Fair Information Practice Principles (FIPPS).

There are five core principles businesses are encouraged to follow:

That last point might be a bit confusing. In a nutshell, while the FTC doesnt directly regulate privacy, should a company be caught violating its privacy policy by using your data in a way that it said it wouldnt, you can sue them and the government can fine them.

Of course, remember that technically FIPPS are guidelines, not law. At the same time, FIPPS, while not legally binding itself, is based on a broad set of laws that include:

These laws give you an avenue to seek redress if your information is used improperly. All of this is to say that you can generally take a privacy policy at its word. So, thats step one.

Any good cloud storage or backup privacy policy is going to tell you:

To illustrate with a policy that hits all of these points, were going to use Carbonite (read our Carbonite review for more information), a backup provider, as an example. While not without its moments, the Carbonite privacy policy provides one of the friendlier reads of any privacy policy weve analyzed. Any policy that doesnt take seven shots of espresso and a law degree to interpret is okay in our book.

Following a quick introduction affirming its respect for user privacy and establishing that it wont use your data for any other means thats described in the policy, Carbonite launches a rundown of the points listed above. The policy tends to go back and forth a bit, so to keep things simple weve extracted the relevant parts for you.

No surprise, Carbonite collects information like your name, address and email. If you sign up for the service, it also includes your billing information. Carbonite also monitors your website visits and pulls some information from your device. This includes the usual tracking cookies and logging your IP addresses, browser type, browser language and activity dates.

As a backup service, Carbonite also collects file system information from your computer. This includes:

And of course, it stores your data, too, which gets kept in secured data centers.

Carbonite labels the information it collects as either account information (name, billing information, etc.) and diagnostic information (IP address, file system information, etc.). The purpose of account information is primarily for identification and billing. It would be hard to run a subscription service without it. Diagnostic information is used several things. In part, thats analytics and customer support. Having your device information helps Carbonite better help you.

However, its also used for marketing. Carbonite doesnt state what specific marketing purposes it has in mind. At the very least, youre going to start seeing Carbonite ads pop up around the Internet.

On top of that, Carbonite gives itself leeway to share your information with third parties, whether for analytics, management, support or marketing:

Carbonite may also use Your Account Information and Diagnostic Information, and share such information with contracted third parties that perform functions on Carbonites behalf and under Carbonites instruction, in order to perform analytics and assist with customer support, account management, and our marketing efforts.

Carbonite does affirm that any third parties your information is shared with must abide by the terms in its privacy policy. Such statements should be standard practice. If a service doesnt explicitly make that connection, stay away, although no examples come to mind.

As far as your files content itself, Carbonite states that its employees will not view the contents of Your encrypted stored data, which is hosted within the United States and/or internationally with third-party cloud storage providers, without Your consent (sic).

That said, there is one big exception to this, which are legal matters: Carbonite may disclose Your information if such action is necessary to comply with applicable law or to enforce Carbonites Terms of Service (sic). So, if the government comes calling with a warrant or Carbonite decides to sue you for breaching its services terms, all bets are off.

Collecting information for billing and support is a necessary part of providing a subscription service like cloud backup. Collecting information for marketing is not.

People can have varying attitudes towards targeting online marketing that uses their personal information. For some, its a way of discovering products they might be interested in. For others, its an invasion of privacy. In fact, numbers from a Pew Research study indicated that 28 percent of Americans have used the Internet in some way to block or avoid advertisers.

If youre anti-marketing, the good news is that Carbonite follows suggestion two of the FIPPS by giving you the ability to opt out of having your information used for that purpose. There are a few different ways you can do this, but the easiest is to just email privacy@carbonite.com. If you dont, the company assumes youre fine with it.

Additionally, as Carbonite notes in its privacy policy, you can set your browser to reject cookies in order to curb targeted marketing.

Carbonite takes an additional step in protecting user privacy by complying with two privacy shield frameworks designed to secure transatlantic data transfers: the EU-U.S. Privacy Shield Framework and the U.S.-Swiss Safe Harbor Framework.

These two protocols were created by the the U.S. Department of Commerce, the European Commission and the Swiss Administration to give companies guidance on how to protect the personal information of their users, plus some safeguards against the U.S. improperly using data and routes for legal action in case of violations.

Both frameworks are completely voluntary. Both are also relatively new, with the EU-U.S. agreement receiving approval in July, 2016 and the Swiss-U.S. agreement in January, 2017. Adherence relies on self-regulation on the part of the company. It also requires a public statement in the companys privacy policy that it agrees to the frameworks terms.

Once a company joins, commitment is enforceable by law. Given that the joining is voluntary and subjects the joining company to additional legal trouble once joined, finding a statement of adherence makes for a welcome indication of a U.S.-based company stance on user privacy.

You can check if your cloud storage or backup provider has been certified in either framework by visiting the U.S. Department of Commerces Safe Harbor website:

Privacy policies are legally binding, which is important to understand. True, such privacy laws in the U.S. havent been enough to hinder government surveillance programs, but in most cases you can rest somewhat easy that your information isnt going to be used in ways you dont want it to be, especially if you opt out of marketing.

That said, the law can be a tricky thing and doesnt always favor the consumer over the corporation. Given that, the best rule of thumb is for private citizens to take control of their own privacy.VPN services are a good first step. They can be used to spoof your IP address and location to counter targeted marketing, government surveillance and hacking activities. There are many great VPN options for consumers out there, which you can read more about in our 2017 guide to finding the best VPN.

If cloud-stored metadata and file content is a concern, consider a zero-knowledge provider. Such providers let you create your own encryption key that only you know. Without access to that key, the company holding your content cant decrypt it, even if men in black suits come knocking.

Carbonite, in case you were wondering, does let you set up your own private encryption key.

Many other Cloudwards.net online backup favorites, including IDrive, Backblaze and CrashPlan, do too. As far as cloud storage, our article on the best zero-knowledge cloud storage services will give you some nice alternatives to services that arent zero-knowledge, like Dropbox, Google Drive and OneDrive.

Other steps you can take include:

Combined with making sure the privacy policy of the cloud service you choose hits all the right points, these steps should help ensure your private information stays that way.

Sign up for our newsletter to get the latest on new releases and more.

Have some privacy concerns of your own? Let us know in the comments below. Thanks for reading.

See the article here:
Cloud Storage Privacy Policies: What It All Means - Cloudwards

Read More..

Scality Zenko.io brings hybrid cloud storage virtualisation – ComputerWeekly.com

Object storage specialist Scality has launched Zenko.io, an open source cloud storage control layer that allows customers to manage storage across in-house storage and public cloud tiers.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

The Zenko.io cloud controller is based on Scalitys 2016 launch of its S3 server, which provided via Docker container deployment S3 access to Scality Ring object storage.

Paul Turner, chief marketing officer (CMO) for Scality, said Zenko.io would allow users to mix and match Scality on-site storage with storage from different cloud providers.

Users want a multi-cloud environment, to be able to choose between the differing qualities of different clouds. Zenko.io provides a single interface to any cloud via S3 APIs[application programming interfaces], he said.

S3 is Amazons cloud storage protocol, which has emerged as a de facto standard for input/output (I/O) to and from cloud environments. Storage is the most popular use case for cloud customers, a recent survey found.

Zenko.io is freely downloadable and allows Scality customers to maintain their datas native cloud format, carry out metadata searches and build in workflow-based triggers to, for example, replication.

The offering is likened by Scality to being a control layer. It effectively provides a form of storage virtualisation that is a layer of abstraction in which the customer can manage in-house and public cloud storage from a single screen.It allows the customer to decide what to do with data, how it is stored, mirrored and protected, said Turner.

It is aimed at customers wanting to burst workloads to the public cloud, for example, runninganalytics using cloud compute instances or machine learning workloads that have heavy central processing unitrequirements at key phases.

What Zenko.io does not solve, however, is the issue of data portability. Data is held in each cloud in that clouds data format, and migrating data from that cloud to another is not an automatic process. This means data can potentially be trapped in a providers cloud or incur a cost to move it elsewhere.

Turner said Scality is working on the ability to drag and drop between clouds.This doesnt provide the answer to data portability between clouds. It provides the ability to read back with a single S3 call and to write to another cloud, he said.You could drag and drop between clouds, but not yet. We havent written that yet, but it could be extended to move, map and exchange data.

Read the rest here:
Scality Zenko.io brings hybrid cloud storage virtualisation - ComputerWeekly.com

Read More..

Hybrid Cloud Gives Government Flexibility for Storage Needs [#Infographic] – FedTech Magazine

Federal data center operators face a major challenge. The amount of data they must store is growing rapidly, and applications that rely on this information to provide new capabilities such as data analytics and the Internet of Things require reliable, ready access to it.

Many agencies are implementing an innovative solution to this problem: hybrid cloud storage. By adding cloud services to their other storage components, such as flash arrays and hard disk drives, data center operators address not only the challenges they have now, but also those theyll face in the future.

Hybrid cloud storage provides the flexibility and scalability that data centers need for heavy workloads, while delivering optimum availability. Advanced storage management solutions take the burden off IT staff to make sure that data goes where it should.

Check out the infographic below to learn how hybrid cloud solutions provide an innovative answer to your most challenging storage questions.

CDW's innovative solutions and services can help your organization solve its storage challenges.Find out more atCDWG.com/datacenter.

Follow this link:
Hybrid Cloud Gives Government Flexibility for Storage Needs [#Infographic] - FedTech Magazine

Read More..

Security lapse leaks data from millions of Verizon customers – KKTV 11 News

NEW YORK (AP/KKTV) - A security researcher says a lapse has exposed data from millions of Verizon customers, leaking names, addresses and personal identification numbers, or PINs.

Verizon Wireless says 6 million customers were affected, but the company says that none of the information made it into the wrong hands. The company says the only person who got access to the data was the researcher who brought the leak to its attention.

The security firm, UpGuard, says the problem stemmed from a cloud server that a third-party vendor had misconfigured.

Gartner analyst Avivah Litan says the issue comes down to human error and it doesn't make sense to blame cloud service providers like Amazon and Google. She says such lapses are likely common, but it's hard to know since we only know what's disclosed.

The following is a statement about the incident from Verizon:

As a media outlet recently reported, an employee of one of our vendors put information into a cloud storage area and incorrectly set the storage to allow external access. We have been able to confirm that the only access to the cloud storage area by a person other than Verizon or its vendor was a researcher who brought this issue to our attention. In other words, there has been no loss or theft of Verizon or Verizon customer information.

By way of background, the vendor was supporting an approved initiative to help us improve a residential and small business wireline self-service call center portal and required certain data for the project. The overwhelming majority of information in the data set had no external value, although there was a limited amount of personal information included, and in particular, there were no Social Security numbers or Verizon voice recordings in the cloud storage area.

To further clarify, the data supports a wireline portal and only includes a limited number of cell phone numbers for customer contact purposes. In addition, to the extent PINs were included in the data set, the PINs are used to authenticate a customer calling our wireline call center, but do not provide online access to customer accounts. Finally, the number of subscriber accounts included in the media report is overstated. The actual number is approximately 6 million unique customers.

Verizon is committed to the security and privacy of our customers. We regret the incident and apologize to our customers.

Continued here:
Security lapse leaks data from millions of Verizon customers - KKTV 11 News

Read More..

Quantum to Present on Cloud Storage for Media Workflows at SMPTE17 in Sydney – Below the Line

Quantum Corp.has announced that Christopher Jenkins, solutions consultant at Quantum, will present a paper on cloud storage for media workflows at the SMPTE Australia Sections Conference & Exhibition (SMPTE17) in Sydney. Jenkins will focus on the most beneficial uses of public and private cloud storage in a multi-tier storage and content management strategy that meets users performance, capacity, access and cost requirements.

Title: Cloud: Its Raining Bits

Paper Title: Lost in the Clouds? Cloud Storage Fits Into Media Workflows Just Not Everywhere

Date: Tuesday, July 18, 2017

Time: 16:00 AEST

Location: International Convention Centre, Darling Harbour in Sydney

The question is not whether to use the cloud for media storage, but how best to use it, said Jenkins. Media companies can realize big cost savings, significant efficiency gains and unprecedented flexibility if they pursue the right strategy for incorporating the cloud into their storage infrastructure and workflows. I look forward to providing some insights on how companies can make the most of the cloudand all tiers of storage supporting their operations.

Quantum will also be exhibiting at SMPTE17 (stand A14) July 18-21. The company will show StorNext 6, a major new release of its shared storage platform, and highlight its award-winning Xcellisworkflow storage solutions, recently enhanced with lab-validated 4K reference architectures.

Focusing on the theme Embracing Connective Media, SMPTE17 will feature exhibits and conference sessions showcasing some of the industrys most innovative technologies and brightest minds. Registration for the show is open now, and further information is online at smpte.com.au.

Here is the original post:
Quantum to Present on Cloud Storage for Media Workflows at SMPTE17 in Sydney - Below the Line

Read More..

What cloud computing really means – InfoWorld

The cloud in cloud computing originated from the habit of drawing the internet as a fluffy cloud in network diagrams. No wonder the most popular meaning of cloud computing refers to running workloads over the internet remotely in a commercial providers data centerthe so-called public cloud model. AWS (Amazon Web Services), Salesforces CRM system, and Google Cloud Platform all exemplify this popular notion of cloud computing.

But theres another, more precise meaning of cloud computing: the virtualization and central management of data center resources as software-defined pools. This technical definition of cloud computing describes how public cloud service providers run their operations. The key advantage is agility: the ability to apply abstracted compute, storage, and network resources to workloads as needed and tap into an abundance of pre-built services.

From a customer perspective, the public cloud offers a way to gain new capabilities on demand without investing in new hardware or software. Instead, customers pay their cloud provider a subscription fee or pay for only the resources they use. Simply by filling in web forms, users can set up accounts and spin up virtual machines or provision new applications. More users or computing resources can be added on the flythe latter in real time as workloads demand those resources thanks to a feature known as auto-scaling.

The array of available cloud computing services is vast, but most fall into one of the following categories:

This type of public cloud computing delivers applications over the internet through the browser. The most popular SaaS applications for business can be found in Googles G Suite and Microsofts Office 365; among enterprise applications, Salesforce leads the pack. But virtually all enterprise applications, including ERP suites from Oracle and SAP, have adopted the SaaS model. Typically, SaaS applications offer extensive configuration options as well as development environments that enable customers to code their own modifications and additions.

At a basic level, IaaS public cloud providers offer storage and compute services on a pay-per-use basis. But the full array of services offered by all major public cloud providers is staggering: highly scalable databases, virtual private networks, big data analytics, developer tools, machine learning, application monitoring, and so on. Amazon Web Services was the first IaaS provider and remains the leader, followed by Microsoft Azure, Google Cloud Platform, and IBM Cloud.

PaaS provides sets of services and workflows that specifically target developers, who can use shared tools, processes, and APIs to accelerate the development, test, and deployment of applications. Salesforces Heroku and Force.com are popular public cloud PaaS offerings; Pivotals Cloud Foundry and Red Hats OpenShift can be deployed on premises or accessed through the major public clouds. For enterprises, PaaS can ensure that developers have ready access to resources, follow certain processes, and use only a specific array of services, while operators maintain the underlying infrastructure.

Note that a variety of PaaS tailored for developers of mobile applications generally goes by the name of MBaaS (mobile back end as a service), or sometimes just BaaS (back end as a service).

FaaS, the cloud instantiation of serverless computing, adds another layer of abstraction to PaaS, so that developers are completely insulated from everything in the stack below their code. Instead of futzing with virtual servers, containers, and application runtimes, they upload narrowly functional blocks of code, and set them to be triggered by a certain event (e.g. a form submission or uploaded file). All the major clouds offer FaaS on top of IaaS: AWS Lambda, Azure Functions, Google Cloud Functions, and IBM OpenWhisk. A special benefit of FaaS applications is that they consume no IaaS resources until an event occurs, reducing pay-per-use fees.

The private cloud downsizes the technologies used to run IaaS public clouds into software that can be deployed and operated in a customers data center. As with a public cloud, internal customers can provision their own virtual resources in order to build, test, and run applications, with metering to charge back departments for resource consumption. For administrators, the private cloud amounts to the ultimate in data center automation, minimizing manual provisioning and management. VMwares Software Defined Data Center stack is the most popular commercial private cloud software, while OpenStack is the open source leader.

A hybrid cloud is the integration of a private cloud with a public cloud. At its most developed, the hybrid cloud involves creating parallel environments in which applications can move easily between private and public clouds. In other instances, databases may stay in the customer data center and integrate with public cloud applicationsor virtualized data center workloads may be replicated to the cloud during times of peak demand. The types of integrations between private and public cloud vary widely, but they must be extensive to earn a hybrid clouddesignation.

Just as SaaS delivers applications to users over the internet, public APIs offer developers application functionality that can be accessed programmatically. For example, in building web applications, developers often tap into Google Maps API to provide driving directions; to integrate with social media, developers may call upon APIs maintained by Twitter, Facebook, or LinkedIn. Twilio has built a successful business dedicated to delivering telephony and messaging services via public APIs. Ultimately, any business can provision its own public APIs to enable customers to consume data or access application functionality.

Data integration is a key issue for any sizeable company, but particularly for those that adopt SaaS at scale. iPaaS providers typically offer prebuilt connectors for sharing data among popular SaaS applications and on-premises enterprise applications, though providers may focus more or less on B-to-B and ecommerce integrations, cloud integrations, or traditional SOA-style integrations. iPaaS offerings in the cloud from such providers as Dell Boomi, Informatica, MuleSoft, and SnapLogic also enable users to implement data mapping, transformations, and workflows as part of the integration-building process.

The most difficult security issue related to cloud computing is the management of user identity and its associated rights and permissions across private data centers and pubic cloud sites. IDaaS providers maintain cloud-based user profiles that authenticate users and enable access to resources or applications based on security policies, user groups, and individual privileges. The ability to integrate with various directory services (Active Directory, LDAP, etc.) and provide is essential. Okta is the clear leader in cloud-based IDaaS; CA, Centrify, IBM, Microsoft, Oracle, and Ping provide both on-premises and cloud solutions.

Collaboration solutions such as Slack, Microsoft Teams, and HipChat have become vital messaging platforms that enable groups to communicate and work together effectively. Basically, these solutions are relatively simple SaaS applications that support chat-style messaging along with file sharing and audio or video communication. Most offer APIs to facilitate integrations with other systems and enable third-party developers to create and share add-ins that augment functionality.

Key players in such industries as financial services, healthcare, retail, life sciences, and manufacturing provide PaaS clouds to enable customers to build vertical applications that tap into industry-specific, API-accessible services. Vertical clouds can dramatically reduce the time to market for vertical applications and accelerate domain-specific B-to-B integrations. Most vertical clouds are built with the intent of nurturing partner ecosystems.

The clouds main appeal is to reduce the time to market of applications that need to scale dynamically. Increasingly, however, developers are drawn to the cloud by the abundance of advanced new services that can be incorporated into applications, from machine learning to internet-of-things connectivity.

Although businesses sometimes migrate legacy applications to the cloud to reduce data center resource requirements, the real benefits accrue to new applications that take advantage of cloud services and cloud native attributes. The latter include microservices architecture, Linux containers to enhance application portability, and container management solutions such as Kubernetes that orchestrate container-based services. Cloud-native approaches and solutions can be part of either public or private clouds and help enable highly efficient devops-style workflows.

Objections to the public cloud generally begin with cloud security, although the major public clouds have proven themselves much less susceptible to attack than the average enterprise data center. Of greater concern is the integration of security policy and identity management between customers and public cloud providers. In addition, government regulation may forbid customers from allowing sensitive data off premises. Other concerns include the risk of outages and the long-term operational costs of public cloud services.

Yet cloud computing, public or private, has become the platform of choice for large applications, particularly customer-facing ones that need to change frequently or scale dynamically. More significantly, the major public clouds now lead the way in enterprise technology development, debuting new advances before they appear anywhere else. Workload by workload, enterprises are opting for the cloud, where an endless parade of exciting new technologies invite innovative use.

Read more from the original source:
What cloud computing really means - InfoWorld

Read More..

Forbes dubs Utah ‘cloud computing’s new capital’ – KSL.com

SALT LAKE CITY Forbes dubbed Utah the cloud computing's new capital Tuesday after six Utah tech companies were named to the Forbes annual 2017 Cloud 100 list and three were ranked in the top 20.

Qualtrics (No. 6), Domo (15), and Pluralsight (20) all made the top of the coveted list while Workfront (58), Health Catalyst (64) and InsideSales (92) filled out the rest of what Forbes calls a list of the worlds best cloud companies.

The cloud is a trendy term thats bandied about quite a bit in the tech world but is less easily defined. The cloud is not a physical thing but a network of servers with different functions, whether that be to store data, run applications or deliver a service.

Each Utah company on the list bases their software in the cloud while providing unique services including:

(The) sales prowess, mixed with business-friendly policies, an educated workforce, low energy prices and a culture of deliberate growth, dovetails with a new tech era that requires huge server capacity and even larger contracts, Forbes reported.

The Beehive State hosts six companies led by Qualtrics, Domo and Pluralsight on the Forbes Cloud 100, a list of the leading private tech companies in cloud computing, which today spans everything from infrastructure to business software to cybersecurity.

Dozens of cloud-focused startups in Utah are incubating behind the leaders in the field, Forbes said, and while Silicon Valley is known for its cutthroat culture, Utah has taken a more traditional approach to slow and steady growth by focusing on profits over nascent market share.

With flameouts proliferating in Silicon Valley, the Utah bootstrapping culture has been attracting investments from the likes of Benchmark, Insight Venture Partners and Sequoia Capital albeit usually after the companies are profitable and thus can negotiate with the VCs from strength, Forbes reported.

Many of Utahs startups, including Qualtrics and Pluralsight, bootstrapped their way to the top before taking funding, crediting Utahs exceptional sales talent as an important part of that success. Utahs culture has tended to produce remarkable salesman and is now beginning to see that same kind of tech talent, though perhaps not enough.

Utahs cloud-based surge remains contingent on one thing: more outside talent, Forbes reported.

While local universities like the University of Utah and Brigham Young University produce growing pools of talent, tech leaders have also been looking for out-of-staters to fill a gap. Qualtrics alone has relocated 160 people to Utah so far this year, according to Forbes.

And though theyre competing for talent, revenue and to become Utahs next public company, Utahs cloud companies have seen a lot of progress via collaboration with each other as well. Ryan Smith (Qualtrics), Josh James (Domo) and Aaron Skonnard (Pluralsight) often meet as CEOs to discuss everything from the gender disparity in tech to the future of Silicon Slopes.

"We all have a chance to do something great," Smith said. "We know the enormity of what we are doing."

And while Utah is still growing, even those outside the state have started to take notice of Silicon Slopes.

"Utah's culture generates extremely ambitious entrepreneurs who tend to be quite frugal," Bryan Schreier, a partner at Sequoia Capital who led its investment in Qualtrics, told Forbes. "I think there are more great companies per capita in Utah than anywhere else."

Load More Comments

Showing of 2 comments

Read this article:
Forbes dubs Utah 'cloud computing's new capital' - KSL.com

Read More..

Security specter still haunts cloud computing – GCN.com

Security specter still haunts cloud computing

As the move into cloud environments isnt slowing down anytime soon, security professionals are working to ensure the security of these computing and storage solutions.

If you start looking at operational day-to-day needs, the biggest problem that I have today is securing the cloud, SallieMae's Chief Security Officer Jerry Archer told a crowd at the Cyber Security R&D Showcase hosted by the Department of Homeland Security's Science and Technology Directorate. If were going to move successfully to the cloud, then were going to have to change security in some significant ways.

There are a number of areas where security will have to improve in order to ensure the safety of cloud environments, Archer said. This includes continuous monitoring, resilient operations, highly granular access control and incident response. It also means better encryption. Data should be always be encrypted, he said: while it's being analyzed, while it's at rest and while it's moving.

If we could have fully homomorphic encryption we would change everything, he said. I wouldnt say it would be the holy grail, but its close to it. Fully homomorphic encryption, which allows users to work with encrypted data without decrypting it, has made strides in the last decade to the point where it can be used for some applications. But for the most part, it slows down operations so much that its just not feasible.

The way security professionals think about the network is also changing as organizations move to the cloud. Were going to change the scope of where we are as a perimeter, he said. We have to know where we are in order to protect ourselves.

Additionally, security features offered by large cloud providers would be hard to incorporate into older environments. Retrofitting legacy systems with security that meets the same standards as whats offered by the large cloud providers is almost impossible, he said.

While Archer has concerns, he said he isnt shying away from cloud technology and has full confidence in its security abilities.

I think what well see is we can create security in the public cloud that is better than any security I can create in a current infrastructure, he said.

Large cloud providers have created security capabilities that would be hard to build into distributed systems that are, at this point in their life, legacy systems. Retrofitting legacy systems with security system that meet the same standards as whats offered by the large cloud providers is almost impossible, he said.

Northrop Grumman Chief Information Security Officer Michael Papay offered a qualification.

I think the technology for security in the cloud could rival the security in the current infrastructure, but it only will if people remember to turn it on and use it correctly, he said.

Alma Cole, the CISO at U.S. Customs and Border Protection, agreed.

I think it is good that when you look at the major cloud providers they do have lots and lots of secure capabilities. But it certainly still is your responsibility to figure out how you architect security both in that environment and then how you spread that out in a hybrid environment or something else, Cole said.

For Archer, the notion that having to remember to turn it on and use it correctly is a barrier to better security. You cant fix stupid," he said. "If you cant turn it on, then you shouldnt be there to begin with."

About the Author

Matt Leonard is a reporter/producer at GCN.

Before joining GCN, Leonard worked as a local reporter for The Smithfield Times in southeastern Virginia. In his time there he wrote about town council meetings, local crime and what to do if a beaver dam floods your back yard. Over the last few years, he has spent time at The Commonwealth Times, The Denver Post and WTVR-CBS 6. He is a graduate of Virginia Commonwealth University, where he received the faculty award for print and online journalism.

Leonard can be contacted at mleonard@gcn.com or follow him on Twitter @Matt_Lnrd.

Click here for previous articles by Leonard.

Read more:
Security specter still haunts cloud computing - GCN.com

Read More..

FASB eyes cloud computing implementation costs | Accounting Today – Accounting Today

The Private Company Council discussed the implementation costs of cloud computing during a meeting Tuesday and is asking its associated organization, the Financial Accounting Standards Board, to provide guidance on how to account for those costs.

During the meeting, PCC members confirmed that accounting for implementation costs in a cloud computing arrangement is a prevalent issue for private companies. A PCC member also recommended FASB provide application guidance to specify the types of implementation costs that may be appropriate for capitalization.

Two years ago, FASB issued Accounting Standards Update 2015-05, which provides guidance about a customers accounting for fees paid in a cloud computing or hosting arrangement. In general, an entity evaluates a cloud computing arrangement to determine whether the arrangement provides the entity with control of a license to internal-use software. In comment letters on the exposure draft that led to the update, some of FASBs stakeholders expressed concerns, however, about the scope of some of the amendments, and asked for more guidance on accounting for implementation costs associated with cloud computing arrangements that dont meet certain criteria and are instead considered service contracts.

They argued that, without explicit guidance, diversity in practice would continue when accounting for implementation costs such as setup and other upfront fees. The costs can include training, creating or installing an interface, reconfiguring existing systems, and reformatting data. Companies have looked at different parts of the standards for guidance on how to account for such implementation costs in cloud computing arrangements that are considered a service contract because there is no explicit guidance on them right now.

At a FASB meeting in May, the board decided to add the matter to the agenda of the Emerging Issues Task Force. The EITF plans to discuss it at a meeting next Friday.

Also at Tuesdays PCC meeting, FASBs staff delivered updates and the PCC provided feedback on a number of other FASB projects, including targeted improvements to the related-party guidance for variable interest entities during consolidations. PCC members commended FASB for proposing an alternative for private companies to provide a scope exception from the application of the VIE guidance to companies that are under common control, when certain requirements are met.

PCC members also supported FASBs plans for targeted improvements in liabilities and equity to simplify the accounting of financial instruments with down rounds. The PCC also offered feedback on FASBs proposal for nonemployee share-based payment accounting improvements and expressed support for the private company alternatives within the proposal.

Many PCC members lent their support to FASBs continuing implementation and education efforts for recently issued standards but suggested the board should keep in mind the pace of change when considering possible new projects.

A majority of PCC members recommended FASB finalize its proposed guidance on the balance sheet classification of debt, along with some minor improvements on balance sheet presentation. The members also expressed interest in helping FASB decide on the appropriate transition provisions to make and educational efforts.

FASB and the PCC plan to hold a Town Hall meeting on August 31 in conjunction with the Georgia Society of CPAs. The next PCC meeting will happen on September 19.

Michael Cohn, editor-in-chief of AccountingToday.com, has been covering business and technology for a variety of publications since 1985.

View original post here:
FASB eyes cloud computing implementation costs | Accounting Today - Accounting Today

Read More..