Page 4,253«..1020..4,2524,2534,2544,255..4,2604,270..»

Microsoft rumor: Company to reorganize cloud computing division – Network World

Andy Patrizio is a freelance technology writer based in Orange County, California. He's written for a variety of publications, ranging from Tom's Guide to Wired to Dr. Dobbs Journal.

Your message has been sent.

There was an error emailing this page.

Multiple news outlets in Seattle and the tech press report that Microsoft plans to announce a significant reorganization in an effort to refocus its cloud computing division. In the process, a lot of people are going to lose their jobs.

The Seattle Times, Puget Sound Business Journal, Bloomberg and TechCrunch all cite sources claiming that the news could come this week, and that could mean layoffs in the thousands.

The Seattle Times said it was unclear what groups would be affected and where they are located but that the move would be to get its sales teams to emphasize its cloud computing products instead of pushing packaged software.

The Puget Sound Business Journal predicted the news would come Wednesday, July 5, but that has not happened.

The group likely to be affected is the Worldwide Commercial Business group under Judson Althoff and Jean-Philippe Courtois. Its a part of the global sales and marketing group. Job cuts were expected to be in local markets rather than across the board.

Last September, Althoff told The Seattle Times that Microsoft had had the wrong approach to selling cloud computing products by treating them much like its packaged software offerings and that he planned to change the sales pitch.

It was a flawed strategy to try to sell Azure like, Do you want fries with that? Althoff told the Times.

There have already been some moves in this area. At the beginning of June, ZDnet noted Microsoft consolidated some of its cloud computing, AI and data platform business units into a new Cloud AI Platform organization, which would oversee Microsoft Azure and other data science groups.

And the reorganization rumor comes just days after Microsoft acquired Cloudyn, which offers cloud services management and monitoring tools to help companies stay within their budgets. Bills for cloud services, which charge for everything you use, have a habit of running away, and keeping an eye on your monthly usage is a really good idea.

Cloudyn supports cloud services monitoring on Microsoft Azure, as well as Amazon, Google and Openstack. Microsoft did not say if Cloudyn would continue to support the competition, but youd have to think if Microsoft cuts them off, there will be hell to payespecially from the European Commission, which just loves to slap Microsoft with billion-dollar fines.

Since Cloudyn is privately held, Microsoft did not disclose what it paid for the firm. It also has not given a timeline for the deal to be finalized or for any work on further integrating Cloudyn and Azure.

Andy Patrizio is a freelance journalist based in southern California who has covered the computer industry for 20 years and has built every x86 PC hes ever owned, laptops not included.

Sponsored Links

More:
Microsoft rumor: Company to reorganize cloud computing division - Network World

Read More..

Public cloud infrastructure spending continues to rise, says IDC – Cloud Tech

Public cloud services will be the fastest growing market segment for IT deployment in 2017, according to the latest note from IDC.

Spending on traditional data centres, which ranked at more than 60% of the market in 2016, will dip to less than half by 2021, the analyst firm argues, with public cloud taking the majority of the slack.

Total spending on IT infrastructure for deployment in cloud environments server, enterprise storage and Ethernet switches will reach $40 billion (31.1bn) in 2017, at an increase of 12.4% year over year. Public cloud will grow at the fastest rate, of 13.8%, with off-premises private cloud environments at 11.9% growth and on-prem private clouds growing 9.6% year on year.

iCharts

For cloud IT environments, Ethernet switches will represent the fastest growing segment, with 25.8% year on year growth in 2017, with spending on enterprise storage at 12.0% and servers 9.1%.

IDC had previously examined the numbers by vendor, finding Dell and HPE just ahead of the faster-growing Cisco, and saying global cloud IT infrastructure revenues hitting $8 billion in the first quarter of 2017.

Natalya Yezhkova, IDC enterprise storage research director, said spending will continue on 2016 trends in general, not counting differences in specific technology segments.

Enterprise adoption of hybrid and multi-cloud IT strategies and the proliferation of cloud-native applications and areas such as the Internet of Things, which embrace a cloud-first approach to supporting IT resources, will fuel further increases in end-user spending on services-based IT.

In turn, this move will be reflected in a shift of the overall spending on IT infrastructure from on-premises to off-premises deployments and from traditional IT to cloud IT, Yezhkova added.

More here:
Public cloud infrastructure spending continues to rise, says IDC - Cloud Tech

Read More..

10 ways to protect your data on the AWS platform – Cloud Tech

One of theworst data breachesin US history recently made the headlines, and it's a powerful reminder of the importance of protecting data on platforms such as Amazon Web Services (AWS).

The personal details of nearly four out of every five adult Americans, including virtually every registered voter, were recently exposed online thanks to sloppy security practices. The data not only included contact details and birth dates, but also information on the perceived political views of individuals. Media analytics company Deep Root Analytics had stored the data in an AWS S3 bucket and mistakenly left it exposed for two weeks.

Deep Root Analytics failed to use protected access settings, meaning that the data was accessible to anyone who knew, found, or guessed the six-character subdomain name that Amazon uses to identify an individual bucket.

While in this case it was a very simple user error that was to blame, it's also a reminder of the wider risks of IaaS platforms such as AWS. Amazon has put a great deal of time and money into AWS's security, but it's always possible that either a security misconfiguration by an AWS customer or a particularly powerful attack could create a breach.

Organizations that use AWS also need to take into account the risk of malicious or mistaken activity from their own staff and users along with third parties such as business partners or vendors that require some degree of access to data. The average business faces around 11 threats every month where somebody inside the organization is responsible, whether deliberately trying to compromise security or acting negligently. Meanwhile, third parties with access to data are often to blame for security breaches.

Simply leaving AWS security up to Amazon is neither legally or practically sensible. That's because AWS uses a shared responsibility system when it comes to security. Amazon itself takes full responsibility for the protection of its cloud systems, including both the software set-up and the physical computers, servers and connections. It's also in charge of detecting and blocking any intrusions or fraudulent attempts to gain access.

However, the customer is responsible for managing and configuring everything that happens inside AWS. This includes any applications it runs using AWS's identity and access management system (IAM), along with password protection of the data. The customer organisation is also responsible for protecting its own systems and connections to AWS, including any firewall.

This isn't an all-encompassing list, but it covers the main points and lays a good groundwork for a sensible and effective approach.

Enable CloudTrail everywhere you use AWS: This creates comprehensive logs of all user activities in an AWS service and provides an audit trail for compliance purposes. Remember to do this on all services, including non-geographic services such as CloudFront. You should also switch on multi-region logging as this will pick up any activity in regions you don't use, a strong sign of a security breach.

Enable multifactor authentication (MFA) on your root user account: This is absolutely key as this account can access all your AWS resources. Use a dedicated device for this MFA rather than have the requests sent to a personal mobile device. That cuts the chances that a lost device or a change in personnel can lead to a breach.

Enforce a strict strong password policy: A good minimum threshold is 14 characters with at least one uppercase letter, one lowercase letter, one number and one symbol. Set passwords to expire after no more than 90 days and don't let staff reuse passwords.

Keep CloudTrail log access as tight and narrow as possible: This will reduce the number of staff who could compromise security by falling prey to a phishing attack or being blackmailed.

Make sure multifactor authentication is required to delete CloudTrail buckets: This will reduce the chances of a hacker covering their tracks after getting unauthorized access.

Never use access keys on root accounts: Doing so is simply too big a risk given how much access somebody could gain after compromising an account.

Restrict access for commonly used ports: These can include CIFS, DNS, FTP, MongoDB, MSSQL and SMTP.

Set accounts to automatically expire after 90 days without any use: An inactive account brings you no benefits but increases the number of potential points of entry for somebody trying to breach your setup.

Turn on access logging for your S3 buckets: This compiles the log data from CloudTrail and makes it much easier to track access requests, authorized and otherwise. If the worst happens, these logs can help with breach investigations.

Use restricted access on any EC2 security groups: This cuts out less sophisticated attack tactics such as Denial of Service, man-in-the-middle or brute force. Make sure access is done via IAM roles rather than through individual credentials that can easily be compromised.

As well as taking care of the restrictions and policies of your AWS infrastructure, you should also follow best practice when you use any custom applications deployed in AWS. By following these best practices, enterprises and users alike can safely store their data in the cloud without compromising security, creating a more secure AWS environment.

Read more: Report argues 'concerning' lack of understanding over IaaS shared responsibility models

See more here:
10 ways to protect your data on the AWS platform - Cloud Tech

Read More..

Overcoming File Sharing, Healthcare Cloud Security Concerns – HealthITSecurity.com

Source: Thinkstock

July 07, 2017 -Potential file sharing and healthcare cloud security risks must be addressed in covered entities and business associates risk analyses, according to the latest OCR cybersecurity newsletter.

These collaboration tools can greatly benefit organizations, but the possible privacy and security risks cannot be ignored. Risk management policies and business associate agreements (BAAs) should also review any file sharing or cloud computing options to ensure PHI security, OCR maintained.

Misconfigurations of file sharing and collaboration tools, as well as cloud computing services, are common issues that can result in the disclosure of sensitive data, including ePHI, the newsletter stated. Too often, access, authentication, encryption and other security controls are either disabled or left with default settings, which can lead to unauthorized access to or disclosure of that data.

Any errors or misconfigurations should be included in the risk analysis or risk management approach, and should also be part of the entitys evaluation process in response to environmental or operational changes within the organization.

A vulnerability scan can also be greatly beneficial in terms of pinpointing technical issues, such as missing patches or obsolete software.

These considerations should be made before a covered entity or business associate implements file sharing software or cloud computing technology that creates, receives, maintains, or transmits ePHI, OCR stressed.

For healthcare cloud computing, the agency reminded organizations that it released updated guidance in 2016 on how to properly implement the technology.

Cloud service providers (CSPs) offering cloud services were a main focus of the guidance, and will be considered a business associate under HIPAA regulations when its services are engaged from a covered entity, the guidance stated.

However, a business associate agreement will help ensure that each party will be contractually liable for meeting the terms of the BAA and directly liable for compliance with the applicable requirements of the HIPAA Rules.

Among other things, the BAA establishes the permitted and required uses and disclosures of ePHI by the business associate performing activities or services for the covered entity or business associate, based on the relationship between the parties and the activities or services being performed by the business associate, OCR wrote in its guidance. The BAA also contractually requires the business associate to appropriately safeguard the ePHI, including implementing the requirements of the Security Rule.

Along with a BAA, OCR also recommended that a Service Level Agreement (SLA) can also be used to address business expectations between a CSP and its customer. SLAs can address the following areas:

Even if a CSP does not have an encryption key, it is still considered a business associate, the OCR guidance states. Regardless of whether a CSP can actually view the ePHI it is maintaining, it is considered a HIPAA business associate.

In its newsletter, OCR also noted that it does not endorse, certify, or recommend specific technology or products. Covered entities and business associates should ensure that they are HIPAA compliant when implementing new products or technologies.

A recent survey indicated that file sharing is an increasingly common issue within healthcare organizations.

Forty-nine percent of 1,400 respondents stated that they had at least one confirmed file sharing data breach in the last two years, according to Ponemon Institute and Metalogix.

Fifty-eight percent also said that their entity does not adequately ensure that SharePoint users appropriately interact with confidential or sensitive data. Nearly three-quarters of those surveyed 79 percent added that they did not think that existing tools are "very effective" at protecting sensitive content from accidental exposure or a targeted breach.

"SharePoint houses a vast amount of sensitive data, but organizations are not taking sufficient steps to keep it safe," Ponemon Institute Chairman and Founder Dr.Larry Ponemon said in a statement. "The pressure to be productive is causing employees to put sensitive data at risk. Security and SharePoint professionals must understand where this content resides and how it is accessed and shared."

The survey also revealed that data loss prevention (DLP) and automation are top priorities for organizations to properly address security challenges with file sharing options.

Here is the original post:
Overcoming File Sharing, Healthcare Cloud Security Concerns - HealthITSecurity.com

Read More..

Maxthon Offers Free Cloud Storage Space And Cash Bonus For Its … – PR Newswire (press release)

With more and more online browsing and tracking records added, the demand for data storage among general users increases. So at early May, Maxthon brought out the Maxthon Cloud Storage plan officially, hoping to break the previous data uploads limitation, and better serve each of its users. As the company claimed in their official blog (http://www.maxthon.com/blog/), for all users using its product Maxthon Browser V5.0.4.500 betaand above version, he/she will get 5GB cloud storage for all Maxthon Cloud service for free. Maxthon stood out to be the first browser maker that offers free cloud storage space to users.

Meanwhile, this software company also initiated another major event, which is to call for users' contribution to wrote review articles of Maxthon's MX5 browsers and submit for publication on either traditional media like newspapers or online media like websites. Maxthon stated in its official blog that if a user wrote a review article about MX5 Browser's features, and submit for publication, then they'll give the user cash bonus once the article has been published by the media. The specific amount of the cash bonus varies from 5USD to 200USD (per thousand words) depending on the popularity of the media. It demonstrated Maxthon's determination to promote its product innovatively, that is to establish its brand image through users' testimony and 3rd party media's reputation and credibility, and then attract more people's attention and interests.

About Maxthon

Founded in 2005, Maxthon is a global software company that develops state-of-the-art web browsers that give users a seamless browsing experience across multiple platforms. Committed to high standards for innovation, the Maxthon suite of browsers supports a wide range of devices from computer to mobile. Maxthon browsers are used each month by more than 100 million people in 140 countries around the globe. Maxthon has offices inSan Francisco,Hong KongandBeijing.

More information about Maxthon can be found at:http://www.maxthon.com/

Zhiyue (Travis) Hu Cell Number+86-15201660881 E-mail:huzhiyue@maxthon.net

To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/maxthon-offers-free-cloud-storage-space-and-cash-bonus-for-its-users-to-raise-awareness-300484501.html

SOURCE Maxthon

http://www.maxthon.com/

See the rest here:
Maxthon Offers Free Cloud Storage Space And Cash Bonus For Its ... - PR Newswire (press release)

Read More..

Save 20 Percent on AVG Internet Security Unlimited, AVG Ultimate – PCMag

When it comes time to invest in an internet security suite, it only makes sense to protect everything.

Most homes aren't limited to a single internet-connected device anymore. The whole family is spread over laptops, tablets, and smartphones, and all of them are potentially at risk for the worst kinds of malware. So when it comes time to invest in an internet security suite, it only makes sense to protect everything. And now for a limited time, you can pick up AVG Internet Security Unlimited or AVG Ultimate for 20 percent off.

Get this deal

First, let's look at AVG Internet Security Unlimited. Normally priced at $69.99 per year, today's discount will drop that down to just $55.99. Not only does it protect against the likes of trojans and spyware, but it also blocks phishing links, filters spam, delivers real-time security updates, re-enforces your security with an enhanced firewall, and encrypts your most important data.

If you're looking for some performance benefits as well, consider opting for AVG Ultimate instead. You'll receive the same protections as the Unlimited suite above, but it's also capable of performing automatic routine maintenance, de-cluttering your drive, updating your apps, improving your battery life, and stamping out duplicate files. And despite typically costing $99.99 annually, you'll only end up paying $79.99 per year with today's deal.

The best part? Both Unlimited and Ultimate come with a 30-day money-back guarantee. Try out this service, install it on your devices, and see if it's a good fit for you. If you're not happy with this suite, AVG will issue a refund.

Note: Terms and conditions apply. See the AVG site for more information.

For more great deals, go to TechBargains.com.

Our commerce group sources the best deals and products for the PCMag Deals posts. We operate independently of Editorial and Advertising and may earn a percentage of the sale, if you buy something via a link on the post. If you are interested in promoting your deals, please contact us at commerce@ziffdavis.com.

Go here to see the original:
Save 20 Percent on AVG Internet Security Unlimited, AVG Ultimate - PCMag

Read More..

The internet, security and privacy – TechTarget (blog)

Security and privacy are always hot topics when it comes to discussions about the internet. And with the emerging internet of things, security and privacy questions are becoming even more prevalent.

The Internet of Things (IoT) world may be exciting, but there are serious technical challenges that need to be addressed, especially by developers. In this handbook, learn how to meet the security, analytics, and testing requirements for IoT applications.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Its one thing to safeguard your passwords or to carefully designate who can view your online photos. But connecting your home to the internet? That could be dangerous or just plain unnerving. Imagine someone hacks your house and can turn lights on and off, or open the front door at will. So its no surprise that many companies are spending a lot of money and engineering hours on making smart home systems safe and secure.

At the same time, a new generation of products is getting popular. Take Alexa (and her cousins): a microphone in the middle of the room where you call and she answers whatever your question may be. The weather in Rome. The news in Atlanta. The business hours of a nearby store. Its essentially a browser you can talk to that understands what you are asking and, most of the time, provides solid answers.

This technology is a big step forward, both in technology and as a new way of connecting and interacting with the internet. The screen and keyboard are now a microphone and speaker. Technology prognosticators are already predicting that this method of computer interaction will soon become dominant.

So, back to security and privacy. Product manufacturers let us install passwords, and they implement encryption along with a host of other security features so that our secrets stay secret. But we suddenly fall in love with Alexa, believing that Alexa only listens if we say, Hi Alexa, before asking a question. Right? Just like we believe that our smartphone only listens if we say, Hey Siri. Right? Or that our voice-enabled remote control only listens if we push the voice button (Right?)

Recently I met someone who had placed a sticker over the camera on his laptop. I asked him why, and the answer was not terribly surprising: I want to make sure that I am not being watched. But what about being listened to? Which is potentially more damaging someone looking at your face while you are at your computer or someone able to listen to what you are saying anytime you are near the computer?

In addition to a sticker over the camera, should there be earbuds on the microphone? And what about cell phones? Is your cell phone listening to your conversations when youre not using it? Well, probably not, at least not so far. But with this promising new user interface, replacing the keyboard and screen with a microphone and speaker is becoming mainstream.

Now, think about introducing this concept in every piece of equipment in our homes. We could talk to the washing machine, dishwasher, refrigerator, television and so forth, but all these appliances and electronics would be permanently listening. What we say could be sent over the internet to an interpreter that translates words into code that can be executed, as if we had typed it into a browser. The result is either sent back over the internet as an action to do something (for example, turn on off the lights, start the dishwasher), or it is sent back as a voice stream that comes out of the speaker.

So, yes, we care about security and we heed the warnings to pay attention to privacy. But on the other hand, we all now walk around with cameras and microphones that 007 (the Sean Connery version, at least) could only dream of. How do we balance installing microphones in every room in our house with paranoia?

Product developers and manufacturers should put security and privacy first in building technology for voice-enabled wireless equipment like remote controls. Do not develop technology that listens to anything not intentionally shared and, by the way, the remote batteries would die quickly without the option to turn the microphone on and off. But we cannot control who uses our technology, in what kinds of products and with what intent.

Put security and privacy first, not because there may be a little man in your TV listening to conversations in your living room, but because this next generation of technology is rolling out quickly and skyrocketing in popularity. Without putting security first, will there ever be a legal framework protecting the consumer and defining responsibilities? Who will be responsible if a third party hacks or otherwise abuses the technology capabilities?

Headline-making cyberattacks on big companies and their customers passwords, credit card numbers and email addresses are just the beginning. With the arrival of IoT and technology advancements in our homes and in our lives, security and privacy are becoming more important than ever.

All IoT Agenda network contributors are responsible for the content and accuracy of their posts. Opinions are of the writers and do not necessarily convey the thoughts of IoT Agenda.

Originally posted here:
The internet, security and privacy - TechTarget (blog)

Read More..

New ICO Promises Mainstream Adoption of Cryptocurrencies – HuffPost

Cryptocurrencies like Bitcoin and Ethereum, while potentially transformative on the macro level, are hard for most people to adopt on the micro-level. Indeed, the opportunities created by Bitcoin and its underlying technologyblockchainare only being used by 8-10 million people (1% of the worlds population), and a significant share of that number comprises government entities, stock exchanges, banks, financial services firms, and startups.

For the large majority of people, the technology is hard to grasp, and the cryptocurrency is difficult to mine given the hard-earned cryptographical skill set needed to mine it. Bitcoin and Ethereum are relatively popular cryptocurrencies, but with new digital wallets with no instruction manuals and no single platform to centralize trading for the everyday consumer, progress towards full integration of the currency in world economies remains slow. Yet, as with many affairs in the world of financial services, there may be hopeand it comes from Switzerland.

Corion, a unified, unregulated, decentralized, mobile cryptocurrency platform operating on the Ethereum Classic blockchain, is underway in its Initial Coin Offering (ICO). The offering, which will close on July 30, will pay out between 3-25% bonus to participants, with early birds earning 0.2% daily during the offering and service providers generating between 5-10x more return on existing 0-2.5% coin supply growth in the medium term.

The ICO gives both service providers and consumers the opportunity to invest in a new cryptocurrency that allows them to help build the Corion ecosystem, a multifunctional platform allowing businesses and individuals to transact between each other on the Corion platform, which provides and hosts secure, convenient, and real-time financial transactions between members using Corion coin.

The main pain point within the overall blockchain environment Corion seeks to alleviate is that the current collection of cryptocurrencies operate in centralized and debt-based contexts. The value of these cryptocurrencies, especially Bitcoin with its various and controversial hard forks over the last few years, are volatile, with Ethereum being held up as Bitcoins potential yet uncertain successor. Driving such volatility is the scarcity-based value of cryptocurrencywith only so many cryptographers and developers able to mine and distribute it, demand simply isnt part of the equation here. And, with only 1% of the worlds population actively using any such currency right now, theres just not the level of adoption present to transition it from short-term, speculative income for a majority of people.

Corions main goal is to create a blockchain-based, decentralized cryptocurrency ecosystem driving demand based on coin rewards and benchmarking against current fiat currencies. The ecosystem, accessible through the Corion platform, would focus cryptocurrency into mainstream usage, taking it from short-term speculative income to continuous passive income through community management. More, Corion consists of separate smart contracts, implemented in Solidity language for maximum transparency and trust.

Corion has created an ecosystem and suite of services that rival emerging blockchain services offered by bulge-bracket banks like Citi and BNY Mellon, integrating payment, finance, and trading functionalities on its singular mobile platform, accessible by any user. At the same time, Corions developers are working B2B to increase the total user base of all cryptocurrencies, something no company has done until now. This innovative business model encourages cross-currency exchange, and inter-wallet and inter-platform cooperation and synergy.

To facilitate the transition of cryptocurrencies to mainstream use that Corion looks to achieve, the Corion platform features seven unique features to humanize the cryptocurrency experience for the average user. These features include a marketplace that promotes commerce, a stable cryptocurrency to promote mainstream use, a reward system for users based on Schelling points which allows users to grow their coins, a multifunctional wallet that operates as the main interface of the platform, and more.

Currently, the battle for cryptocurrency supremacy is ongoing. Corion enters with high aspirations, and well have to keep watch to see if this innovative platform can change the crypto world.

The Morning Email

Wake up to the day's most important news.

See more here:
New ICO Promises Mainstream Adoption of Cryptocurrencies - HuffPost

Read More..

The latest cyber attacks show why the cloud is safer – InfoWorld

Thank you

Your message has been sent.

There was an error emailing this page.

Computer systems from the Ukraine to the United States were affected last week by the Petya cyber attack. Its similar to the recent WannaCry ransomware attack last month.

The WannaCry ransomware took advantage of vulnerabilities in the older versions of Windows that allowed the infection to spread. All someone needed to do was click a malicious link andbang!they were infected. That is, if they hadnt installed the patches and updates.

These attacks are a reminder of why the cloud is a safer place to do your computing.

The parade of attacks in recent years have forced enterprise IT tobecome more diligent about holistic security. These attacks are successful when security is not holistic, such as when patches and fixes are not applied.

But the generalized security fears have also caused many IT organizations to delay the adoption of new technologies, such as cloud computing. Theres a sense that something new, especially something managed by others, will make things more vulnerable.

Actually, the opposite is true.

Using the public cloud makes you less likely to get attacked and breached. The layers of security in the cloud are more than a deterrent for most attacks. The cloud providers proactively monitor these clouds, and they quickly spot and quickly block them. And they automatically apply operating system, application, and service patches and fixes are automatically behind the scenes.

Extremely few IT organizations do the same.The cost of security is just too much for most enterprises to bear, and most cant keep up with all that needs to be done to keep their systems and users secure enough from WannaCry, Petya, and other malware that shut down systems.

Enterprises should not run in place when these attacks occur, but instead do a look in the mirror assessment around the state of systems and security. Youre likely to find deep issues that cant be solved overnight.From there, youll need to plan the to be state of things, including how data, processes, PCs, mobile devices, IoT devices, and other elements are going to be secure.

As you undertake that effort, youll find that using the cloud is becoming the best fit for security. It may be counterintuitive to those who equate hands-on control with effective control, but its simply true. The cloud has had outages, yes, just like enterprise IT systems. But no major cloud provider has fallen victim to all the malware attacks of the last few years. What does that tell you?

David S. Linthicum is a consultant at Cloud Technology Partners and an internationally recognized industry expert and thought leader. Dave has authored 13 books on computing and also writes regularly for HPE Software's TechBeacon site.

Sponsored Links

Here is the original post:
The latest cyber attacks show why the cloud is safer - InfoWorld

Read More..

Baidu Deploys Xilinx FPGAs in New Public Cloud Acceleration … – Design and Reuse (press release)

Target applications to include machine learning and data security

SAN JOSE, Calif., July 5, 2017 -- Xilinx, Inc. (XLNX) today announced that Baidu has deployed Xilinx FPGA-based application acceleration services in their public cloud. The Baidu FPGA Cloud Server, a new service in Baidu Cloud, features highly efficient Xilinx Kintex FPGAs, tools, and the software needed to develop and deploy hardware-accelerated data center applications such as machine learning and data security.

"FPGAs have the capability to deliver significant performance for deep learning inference, security, and other high growth data center applications," said Liu Yang, Head of Baidu Technical Infrastructure, Co-General Manager of Baidu Cloud. "Years of research and FPGA engineering expertise at Baidu has culminated in our delivery of proven acceleration infrastructure for industry and academia."

The Baidu FPGA Cloud Server provides a complete FPGA-based hardware and software development environment, including numerous hardware and software design examples to help users achieve rapid development and migration while reducing development costs. Each FPGA instance is a dedicated acceleration platform, never shared between instances or users. The design examples cover deep learning acceleration, encryption and decryption, among others. Visit https://cloud.baidu.com/product/fpga.html to access the Baidu FPGA Cloud Server.

About Xilinx FPGAs in the Data Center

Xilinx FPGA-enabled servers provide a 10x-80x performance/watt advantage compared to CPU-only servers. Because they are dynamically reconfigurable, Xilinx FPGAs can support a wide range of workloads, including machine learning, data analytics, security, and video processing. Learn more about Xilinx data center acceleration at http://www.xilinx.com/accelerationstack.

About Xilinx

Xilinx is the leading provider of All Programmable semiconductor products, including FPGAs, SoCs, MPSoCs, RFSoCs, and 3D ICs. Xilinx uniquely enables applications that are both software defined and hardware optimized powering industry advancements in Cloud Computing, 5G Wireless, Embedded Vision, and Industrial IoT. For more information, visit http://www.xilinx.com.

See the rest here:
Baidu Deploys Xilinx FPGAs in New Public Cloud Acceleration ... - Design and Reuse (press release)

Read More..