Page 4,257«..1020..4,2564,2574,2584,259..4,2704,280..»

Shielding data from the "five eyes": we need to stand up for … – Open Democracy

Street art by Banksy near Hyde Park, London. Credit: David Maddison/Flickr. Some rights reserved.The Five Eyes is a surveillance partnership of intelligence agencies consisting of Australia, Canada, New Zealand, the United Kingdom, and the United States. According to a joint communique issued after the meeting, officials discussed encryption and access to data. The communique states that encryption can severely undermine public safety efforts by impeding lawful access to the content of communications during investigations into serious crimes, including terrorism.

In the letter organized by Access Now, CIPPIC, and researchers from Citizen Lab, 83 groups and security experts wrote, we call on you to respect the right to use and develop strong encryption. Signatories also urged the members of the ministerial meeting to commit to allowing public participation in any future discussions.

Read the full letter here.

Security experts and cryptographers are as united in their views on encryption as scientists are on climate change.

Massive surveillance operations conducted by the Five Eyes partnership inherently put the human rights of people around the world at risk. The joint communique commits to human rights and the rule of law, but provides no detail as to how these powerful, secretive spy agencies plan to live up to those commitments. We call for public participation and meaningful accountability now; otherwise, those commitments are empty. Amie Stepanovich, U.S. Policy Manager at Access Now

Our political leaders are putting people around the world at greater risk of crime when they call for greater powers to weaken our digital security. Security experts and cryptographers are as united in their views on encryption as scientists are on climate change. Politicians need to listen to them before they make decisions that could put us all at risk. Jim Killock, ORG

Attempting to undermine the free use and development of strong encryption technology is not only technologically misguided, it is politically irresponsible. Both law enforcement and intelligence agencies have access to more dataand more powerful analytical toolsthan ever before in human history. Measures that undermine the efficacy or public availability of encryption will never be proportionate when weighed against their profound threat to global human rights: encryption is essential to the preservation of freedom of opinion, expression, dissent, and democratic engagement. Without it, meaningful privacy, trust, and safety in the digital sphere would not be possible. Lex Gill, Research Fellow, Citizen Lab, Munk School of Global Affairs

Encryption protects billions of ordinary people worldwide from criminals and authoritarian regimes. Agencies charged with protecting national security shouldnt be trying to undermine a cornerstone of security in the digital age. Cynthia Wong, Senior Internet Researcher, Human Rights Watch

Encryption is used by governments, businesses, and citizens alike to secure communications, safeguard personal information, and conduct business online. Deliberately weakening encryption threatens the integrity of governance, the safety of online commerce, and the interpersonal relationships that compose our daily lives. We must not sacrifice our core values to the threat of terrorism: the solution to such threats must entail better protecting our basic rights and the technologies that advance them. Christopher Parsons, Research Associate and Managing Director of the Telecom Transparency Project at the Citizen Lab, Munk School of Global Affairs

Encryption is a necessary and critical tool enabling individual privacy, a free media, online commerce and the operations of organisations of all types.

Calls to undermine encryption in the name of national security are fundamentally misguided and dangerous. Encryption is a necessary and critical tool enabling individual privacy, a free media, online commerce and the operations of organisations of all types, including of course government agencies. Undermining encryption therefore represents a serious threat to national security in its own right, as well as threatening basic human rights and the enormous economic and social benefits that the digital revolution has brought for people across the globe. Jon Lawrence, EFA

Assurances of strong encryption not only benefit civil liberties and privacy, but the economy as well. A vibrant and dynamic internet economy is only possible if consumers and users trust the environment in which theyre conducting business. While law enforcement and intelligence services have legitimate concerns over their ability to access data, those concerns need to be balanced with the benefits encryption provides to average users transacting in cyberspace. A strong Internet economy, buttressed by the trust that encryption produces, is vital to national interests around the globe. National policies should support and defend, not weaken and abridge, access to encryption. Ryan Hagemann, Niskanen Center

The strength of the tools and techniques that our government and members of the public have and use to secure our nation and protect our privacy is of significant public interest. Transparency and accountability around a nations policy regarding the use of encryption is a bedrock importance in a democracy, particularly given the potential of backdoors to put billions of online users at greater risk for intrusion, compromise of personal data, and breaches of massive consumer or electoral databases. The democracies in the Five Eyes should be open and accountable to their publics about not only the existence of these discussions but their content, removing any gap between what is being proposed and the consent of those governed by those policies. Alex Howard, Sunlight Foundation

Encryption is a vital tool for journalists, activists, and everyone whose lives and work depend on using the internet securely. It allows reporters to protect their confidential sources from reprisal, and to fearlessly pursue stories that powerful actors dont want told. It offers protection from mortal danger for dissidents trying the communicate under repressive regimes. Undermining the integrity of encryption puts lives at risk, and runs directly counter to the mandate of the Five Eyes Signals Intelligence agencies to keep their citizens safe. Tom Henheffer, Executive Director, Canadian Journalists for Free Expression

The answer to concerns on going dark is to help bring our law enforcement and counterterrorism officials into the future, not send encryption to the past. We hope to hear back from the Five Eyes that they were looking for how to adapt to digital security measures, not break them to the detriment of everyday Americans and our national security. As Five Eyes leaders work on a strategy to protect against cyberattacks, it is important to have a transparent process and cooperation between governments and civil society without stifling innovation or weakening other parts of security. Austin Carson, Executive Director, TechFreedom

Strong encryption is essential for modern society. Broken technologies undermine commerce, security, and human rights. Jeramie Scott, EPIC

Any attempt by the U.K. government to attack encrypted messengers would be nothing less than an attack on the right to a private conversation.

Any attempt by the U.K. government to attack encrypted messengers would be nothing less than an attack on the right to a private conversation. Far from making the internet safer, by undermining the technology that protects everything from our bank accounts to our private conversations, governments around the world are putting us all at risk. Transparency is vital around any coordinated plans that could jeopardize both our security and our rights. Silkie Carlo, Policy Officer, Liberty

We increasingly rely on a secure internet for work, personal relationships, commerce, and politics. While we support justifiable lawful intercept with appropriate oversight, we dont think we should be seriously weakening the security of the internet to achieve it. Attempts to weaken encryption will do more damage to our society and our freedom than the possible threats its meant to be protecting us from. Thomas Beagle, Chairperson, NZ Council for Civil Liberties

All sensitive personal data must be encrypted as a matter of human rights to privacy, especially health data, i.e., all information about our minds and bodies, wherever it exists. Today health data is the most valuable personal data of all, the most attractive to hackers, and the most sold and traded by the massive, hidden global health data broker industry. Dr. Deborah Peel, Patient Privacy Rights

We lock our devices for good reason. Introducing backdoors weakens security and violates our right to privacy. The very existence of backdoors means unwelcome guests will come knocking. Linda Sherry, Director of National Priorities, Consumer Action

Originally posted here:
Shielding data from the "five eyes": we need to stand up for ... - Open Democracy

Read More..

Encrypting police transmissions is a blow to transparency and openness in government – LancasterOnline

By Thanksgiving, the public will no longer be able to listen in on police dispatches in Lancaster County, as LNP reported last week. The Lancaster County commissioners on Tuesday directed Lancaster County-Wide Communications to encrypt police transmissions, blocking the public and media from hearing whats going on in the county. West Hempfield Township police Chief Mark Pugliese, who heads the county police chiefs association, says the change will protect police from ambushes and secure personal information about crime victims and witnesses.

Police officers have a dangerous, difficult job more difficult and dangerous than most of us can probably imagine.

And we wouldnt support any measure that would make life more perilous for a police officer.

But some sort of balance between protecting officers and ensuring the publics right to information must be struck.

We understand the other side of the argument.

We live in a changed and changing world, Commissioner Dennis Stuckey told LNP. Gone are the days when you can talk to a 15- or 20-year veteran who says hes only had to pull his gun out twice.

Pugliese also said there have been several incidents in the county where the public or the media interfered with investigations, in some cases by getting to crime scenes more quickly than police.

As Commissioner Josh Parsons, who supports encryption, said, The fake 911 ambush scenario could happen no matter what we do today. However, he said, encryption does provide some percentage of safety.

Pugliese was off-base when he scolded the media for being in such a rush to get the news out. Thats the medias job, especially when it comes to a public safety issue.

The fact of the matter is and this is not a criticism law enforcement relies on the media when its convenient.

When police are hunting a fugitive, they ask the media to post a photo of the suspect. When prosecutors announce a major conviction, they call a news conference.

When a house exploded outside Millersville on Sunday, people who heard and felt the blast were desperate for information about what had happened. Emergency responders were busy doing what they do best, and supervisors at Lancaster County-Wide Communications had no information. The only way LNP could inform the public about the situation in the moments after the explosion was by monitoring the police scanner.

Come November, when the media wants to hear what police are doing in the community silence.

So, the message seems to be that the media and public are to be kept out of the loop until further notice. We will be informed strictly on a need-to-know basis.

Theres no evidence that radio transmissions have made policing more dangerous or more difficult.

Melissa Melewsky, media law counsel for the Pennsylvania NewsMedia Association, told LNP that media organizations have used emergency radio transmissions for decades without incident to keep the public informed about emergency situations in the community.

As Knapp reported, Commissioner Craig Lehman said hes also concerned about police safety but said officers may become further isolated from their communities if they decrease transparency.

Lehman is correct. Encryption will limit transparency and serve as an obstacle to the media. And, as he pointed out, less transparency breeds mistrust and suspicion. Thats the last thing anyone including police needs.

Lehman suggested a compromise: Encrypt public transmissions, but give news outlets access.

The commissioners and the county police chiefs should give this serious consideration, though we dont believe the public should be shut out either.

From the medias standpoint, radio silence will only make a reporters job more difficult and very well could, in turn, limit the publics access to information.

In an emergency situation, and you can imagine any number of them natural disaster, active shooter, fire the media needs to work with law enforcement to keep the public informed. In such situations, media outlets monitor radio transmissions for information and logistics. Encrypting such transmissions would not be in the best interest of the public.

And Lehman said blocking transmissions might actually make police less safe if public trust is lost.

The decision to encrypt was administrative and did not require a vote.

We urge the commissioners to reconsider this order and, at the very least, seek a compromise.

This is not about getting to the crime scene first.

Were big fans of transparency here because when it begins to erode, were all in trouble.

View post:
Encrypting police transmissions is a blow to transparency and openness in government - LancasterOnline

Read More..

Encryption: Turnbull continues his Man of La Mancha ways – iTWire

An exclusive report this morning says that Australian Prime Minister Malcolm Turnbull plans to ask US President Donald Trump to demand that US technology companies break into encrypted messages sent by suspected terrorists.

It is an indication that the publishing company, Fairfax Media, and the writer, Peter Hartcher, are prepared to print any kind of bunkum as long as it comes from a sufficiently "official" source.

Whether the statement makes sense or not is never the issue, it would appear. The reader is also given no indication that Turnbull is speaking nonsense.

Without any proof, Turnbull also told Hartcher: "The point is, what are the responsibilities that a WhatsApp or a Telegram or a Signal, what are the responsibilities they owe to public safety You have got a very real global threat where terrorist organisations, Islamist terrorist organisations, are using these digital platforms to do us harm."

To put it rather bluntly, short of rolling back encryption altogether, there is no way of ensuring that all people who are not behind bars do not have access to encryption.

Tom Sulston (right), a software delivery consultant who works for ThoughtWorks, agrees. "Given that the best encryption libraries are open source, that genie is out of the bottle," he said during an informal exchange with iTWire.

"While governments might choose to compel companies to put backdoors in their individual implementations, the library code remains secure," said Sulston, who recently addressed the Canberra press gallery on the tools journalists could use to help protect their sources from unwanted intrusion.

"So attempts to roll back encryption not only wouldnt work, theyd punish ordinary citizens while criminals used other, un-backdoored tools, or simply move their communications to other jurisdictions."

Somehow, the Australian government, which can afford to pay any number of consultants steep fees, cannot find a man with the simple common sense that someone like Sulston has. Or is that because the kind of logic that Sulston dishes out would mean that Turnbull would be unable to bloviate as he has in the exclusive interview mentioned at the start of this piece?

Sulston was asked what was the best option for governments in the existing scenario. Pat came the answer: "Governments need to realise the limitations of technology encryption tools are either broken or not. They cant be compromised just for intelligence agencies and no-one else. There is a huge gap where our society has gone digital and our government has failed to understand what this means."

Unlike our good Prime Minister, Sulston also knows his limitations as a technologist. "Im not a legal or security expert, so I dont have strong (or relevant!) opinions on how governments should tackle terrorism," he confessed.

"But I do believe that their efforts to do so need to remain within the boundaries set by existing laws, including the Universal Declaration of Human Rights."

Turnbull would do well to contemplate the fact that the whole debate about encryption was brought to the fore by the US National Security Agency. Its blanket surveillance of Americans was exposed in 2013 by one Edward Snowden and this led US companies to do everything possible to convince their customers that their data was safe.

Microsoft went so far as to set up a data centre in Germany where it would not be subject to the remit of US laws.

Encryption is built into products like WhatsApp for a reason the owners, in this case Facebook, want to attract more and more people with the selling point being that whatever they say is secure.

Try asking companies which are making billions hand over fist by offering such apps free, to cut back on encryption.

Empty promises can be made some of the time, but even Turnbull, who probably holds the record for the use of the words "innovative" and "agile" in recent times, should realise that you cannot blow hot air on encryption all the time and expect people not to become cynical as to the motives behind such talk.

Visit link:
Encryption: Turnbull continues his Man of La Mancha ways - iTWire

Read More..

Why breaking WhatsApp encryption is such a bad idea – Mashable


Mashable
Why breaking WhatsApp encryption is such a bad idea
Mashable
However, in this video British YouTuber Tom Scott passionately explains why forcing services like WhatsApp to break their end-to-end encryption is actually a very dangerous idea. "The devil is in the detail," Scott says. "If we could replicate the way ...
How WhatsApp encryption works and why we need ithtxt.africa

all 3 news articles »

See the article here:
Why breaking WhatsApp encryption is such a bad idea - Mashable

Read More..

Reporters Without Borders: UK Government targeting of encryption after terror attacks is threat to journalism – Press Gazette

Free speech campaign group Reporters Without Borders (RSF) is concerned that Government threats to crack down on encryption technology could make it harder for investigative journalists to keep their sources safe.

Prime Minister Theresa May spoke out about the need to regulate cyberspace after the 3 June London Bridge terror attack.

RSF London bureau chief Rebecca Vincent told Press Gazette: TheresaMays recentcomments about the internetare worrying,especially following Amber Rudds previous remarksthat tools that use end-to-end encryption such as Whatsapp are completely unacceptable'.

RSF is concerned that restrictions on the use of encryption tools might be on the horizon, which iseven more damaging in the light of the vast surveillance powers the government has gained through the Investigatory Powers Act. It is part of a worrying broadertrend of moves to restrict press freedom in the UK.

The Investigatory Powers Act (IPA) was passed by parliament in November 2016 and gives the state widespread powers to conduct electronic surveillance.

Vincent has previouslywarned the IPA could serve as a death sentence for investigative journalism in the UK because it lacks sufficient mechanisms to protect whistleblowers, journalists, and their sources.

She told Press Gazette: This Government is making it harder and harder for journalists to do their jobs, in particular investigative journalists who need to use secure forms of communication. As with the IPA, such measures undermine the ability of journalists to protect their sources and carry out effective investigations into sensitive topics that are in the public interest.

RSF has said it welcomes the Conservative partys manifesto pledge to repeal Section 40 of the Crime and Courts Act 2013 and not to proceed with part two of the Leveson Inquiry. But, Vincent said, RSFwill be monitoring the situation closely to ensure that these pledges are fulfilled.

She also welcomed the fact that repealing the Human Rights Act wont be revisited until after Brexit but reiterated that this is a move which RSF opposes altogether. The HRA currently provides protection for journalists and others by setting out the right to freedom of expression.

One of RSFs major concerns is the proposed Espionage Act set out in a Law Commission proposal published in February.

Vincent said: It doesnt appear to be something they are moving forward with imminently. But we are really alarmed by the idea that such a law could see journalists and bloggers labelled as spies and possibly jailed for up to 14 years for receiving leaked information.

A decision isexpected at the end of the year on whether the Government will proceed with the proposed shake-up of Official Secrets legislation.

Vincent said: We would very much like to see this proposalscrapped. If such legislation had been in place when the Guardians 2013 Snowden revelations came out, the journalists involved in those stories could have been sent to jail.

It would have an immediate chilling effect and restrict the ability of journalists to do their jobs in the UK.

Vincent also said that some of the recent public comments by UK government ministers are a cause for concern, not least because other countries around the world look to the UK to set an example on press freedom and other human rights issues.

She cited the statement from Leader of the House of Commons Andrea Leadsom that journalists should be more patriotic when it comes to covering Brexit and foreign secretary Boris Johnsons recent suggestion that people have had enough about this freedom of speech stuff.

Vincent also said that RSF continues to press the UK government to return the passport of exiled Syrian journalist Zaina Erhaim. It was seized by UK border officials in September at the behest of the Assad regime and has left her at risk, restricting her ability to move around the world freely.

Vincent warned of the precedent it sets for Syrians and other critical journalists and activists travelling to the UK and said it still needs to be addressed.

Overall, she said: The UK fell down the World Press Freedom Index last year and we would like to see it climb back up rather than drop further.

In April this year RSF ranked the UK 40th out of the 180 countries worldwide that it ranks for press freedom.

This piece was produced in association withReporters Without Borderswhich is a sponsor of the British Journalism Awards.

Continue reading here:
Reporters Without Borders: UK Government targeting of encryption after terror attacks is threat to journalism - Press Gazette

Read More..

You need to encrypt all your data. This is how it’s done – TNW

The increasing amount of data were all generating is everywhere: in smartphones, laptops, thumb drives, and dozens of online services. How can we secure all of them against unwarranted access?

We virtually cant.

Smartphones get stolen, thumb drives get lost, email passwords get brute-forced, cloud servers get breached, unwary users get phished, WiFi networks get tapped, and eventually, malicious users obtain access to your data.

So how do you protect your data against unwelcome parties?

You encrypt it. In case you dont know it, encryption is the science of modifying data to prevent intruders from making sense of it. When you encrypt your data, only you and anyone else holding the decryption keys will be able to unlock and read it. This means that even if an attacker gains access to your data by breaking into a server or stealing your hard drive, they wont be able to make sense of it if they dont have the keys.

As Ive argued before, encryption is your last line of defense, the one thing that can protect your data when all else goes wrong.

So without further ado, heres are some of the key ways you can encrypt the data that youre scattering everywhere.

Email has become a de facto medium for exchanges of all sorts. We use email to send business secrets, financial data, personal data and various kinds of sensitive information. There are few things that are as damaging as a hacked email account.

You should obviously do everything you can to protect your email accounts, such as choosing strong passwords or enabling two-factor authentication. But in case your account does get breached, you have a few viable options to encrypt your messages and prevent hackers from actually seeing the contents of your messages.

One is the use of Pretty Good Privacy (PGP), a tool that adds a layer of encryption to your emails. Basically, PGP generates a public and private encryption key and ties it to your email address. You publish the public key for everyone to see and keep the private key to yourself.

Anyone who wants to send you a confidential message will encrypt it with your public key before sending it to you. Only your private key will be able to decrypt the message, and as long as you keep it safe, you can rest assured that only you will be able to read those messages. This means that even the owner of the server where your emails are stored wont be able to read them.

There are a handful of free PGP tools such as Mailvelope, which work with all major webmail clients such as Gmail and Hotmail, and will get you started with encryption in a couple of easy steps.

Of course, if you want your outgoing messages to be encrypted as well, the recipient needs to have a PGP key too, so youll have to convince your friends to set up PGP accounts.

An alternative to PGP is using an end-to-end encrypted mail service such as ProtonMail or LavaBit. End-to-end encryption makes sure that anything that gets stored in your account is only viewable by you, the person who holds the key. No surveillance or massive databreach will give access to the content of your emails.

The same threats that can out your emails apply to the files you store in cloud services such as Google Drive and Dropbox. Even the biggest services you entrust with your files can get hacked, and the sensitive files youve stored in the cloud can fall into the wrong hands.

The most basic choice is to protect your files with a compression tool that supports encryption and password protection features, like zip, before storing them in your cloud server.

In case you find it too cumbersome to manually encrypt and decrypt your files, you can use tools such as Boxcryptor or Whisply, which integrate with most popular cloud services and add an easy-to-use layer of encryption.

Another alternative is to use an encrypted storage service such as SpiderOak One, Tresorit or Cryptobox, which have end-to-end encryption incorporated into their service. This means only you and whomever you share your files with will have access to the contents.

Messaging apps are perhaps the most popular applications we use on our phones. But theyre not all equally secure. Some applications will encrypt your messages in transition, but not in storage, which means your data can become exposed in case of data breaches or compromised accounts.

The most secure messaging apps are those that have end-to-end encryption features, making messages exclusively visible to the parties taking part in a conversation. Weve discussed how to evaluate messaging apps in terms of security here on The Next Web before.

Some of the viable options include Open Whisper Systems Signal, WhatsApp and Wickr, which are end-to-end encrypted by default. Telegram and Facebook Messenger also have end-to-end encryption, though youll have to enable them manually.

You might also want check out this interesting project by two Canadian students, who are working to add strong encryption to a variety of web communication tools.

While you consider the security of your online data, you shouldnt forget about the devices you physically own. Your phone, laptop, memory cards and flash drives hold quite a lot of sensitive information.

Your smartphone in particular is very vulnerable. It has a lot of functionality, it holds your communication apps and sensitive information and pictures, among others. And you carry it everywhere with you, which means theres a greater chance you might lose it or get it stolen from you.

Fortunately, most desktop and mobile operating systems support full-disk encryption, a feature that will encrypt everything on your phone, computer or flash drive. By enabling full-disk encryption, youll protect your on-device data against physical theft. Good encryption cant be circumvented, even by device manufacturers or government agenciesat least not without spending a huge bunch of money.

Credit: Juan Buis / TNW

In iOS version 8 and later, device encryption is turned on by default if your device has a passcode. Newer Android devices also come with device encryption enabled out of the box, but with the variety of devices available out there, you might want to verify to make sure yours is encrypted.

For your laptops and removable media, depending on which operating system you have, there are always good encryption tools available. Windows has BitLocker, which can easily encrypt your hard drives or removable storage in a few easy clicks. The Mac OS has a native encryption tool as well, called FileVault.

Hackers have many ways to steal your information on the fly, especially if youre using a public WiFi network. In fact, your internet service provider too might be interested in having a look at your internet traffic.

Adding a layer of encryption to your internet traffic will make sure you enjoy full privacy while surfing the web. One of your viable options is to use a Virtual Private Network (VPN). VPN services encrypt all your traffic and redirect them through their own servers. All eavesdroppers will be able to see is a bunch on encrypted data being exchanged between you and your VPN service.

VPN services are available for both mobile devices and desktop computers.

To be fair, VPN is not a perfect solution. Your VPN provider will have full visibility over your non-HTTPS traffic. Free VPN services in particular have a tendency to use customer data for commercial purposes. But its much safer than letting hackers scrutinize your traffic.

Encryption is not a complete security solution and it doesnt obviate the need for basic security measures such as keeping your operating system and software up to date with the latest security patches. And dont forget that encryption is only as secure as you make it, which means you have to keep your keys secure.

But encryption is definitely one of your best friends in the hostile world of digital information, connected devices and online services. Encrypt your data, and stay safe out there.

Read next: 8 reasons why Berlin will outpace London as Europes Silicon Valley

See original here:
You need to encrypt all your data. This is how it's done - TNW

Read More..

Africa’s first impact-focused equity crowd funding portal founder … – CNBCAfrica.com

She is a pioneer in numerous fields: an entrepreneur who can recognise a great idea, and a philanthropist by nature who believes in profit with purpose. She is the quintessential modern woman and her name is Uneku (Neku) Atawodi.

Neku is the CEO and founder of Malaik, Africas first impact-focused equity crowd funding portal. Malaik was created to connect global and local investors with entrepreneurs raising equity finance. It aims to offer potential investors the chance to participate in Africas growth story.

Africa is brimming with entrepreneurs with growing high-impact businesses that could not only positively impact Africa, but the world, Neku says.

It is no wonder then that social entrepreneur and presenter of Chivas, Win the Right Way, Audu Maikori, tracked her down to share career insights over a glass of Chivas Regal 12 Year Old Whisky. Chivas, Win the Right Way is a TV series on CNBC Africa, featuring Africas most inspiring social entrepreneurs who run their business based on profit with purpose and use their shared success to inspire other African entrepreneurs to join a growing movement.

Neku is one of the few international female polo players in Africa her non-profit organisation, Ride to Shine, is the first self-funded NPO based in Abuja, Nigeria. Ride to Shine gives orphaned children access to equestrian activities and experiences. The organisation has a strong belief in the power of sports to develop key individual characteristics in a child.

Ride to Shine aims to use the sport of polo as a tool to open unimaginable doors for our children, giving them a global reach to develop into responsible individuals that go on to inspire their peers with a strong pay-it-forward ideology, says Neku.

When she is not working to enrich her community, she is a World Economic Forum Global Shaper, an associate fellow of the Royal Commonwealth Society and a Clinton Global Initiative Lead mentor. In addition, the Meltwater Entrepreneurial School of Technology (MEST) recently scooped her up as General Manager in its Lagos Incubator programme, which provides training, investment and mentoring to aspiring technology entrepreneurs. The programmes goal is to create globally successful companies that generate wealth and jobs locally in Africa.

I am a believer in all things that spur innovative disruption across sectors, says Neku. Technology is proving to challenge the status quo globally, and is now offering a solid route to empowering Africas youth.

Neku is living proof that opportunities are plentiful when you are willing to aim high and work hard. For her, the biggest rewards are gained through living a lifestyle that is inclusive and generous, and for Chivas, she is undoubtedly winning the right way.

Chivas, Win the Right Way is profiling six African social entrepreneurs, and has been airing on CNBC Africa, DStv channel 410, every Wednesday since September 7, 2016. Follow Chivas, Win the Right Way on social media: #WinTheRightWay http://www.chivas.com

Read the original post:
Africa's first impact-focused equity crowd funding portal founder ... - CNBCAfrica.com

Read More..

Interoute named a Leader in Gartner’s MQ for Managed Hybrid Cloud Hosting, Europe for 4th consecutive year – RealWire (press release)

London, 4 July 2017 Interoute has been named a Leader in the Gartner Magic Quadrant for Managed Hybrid Cloud Hosting, Europe[1], for the fourth consecutive year. The annual report provides businesses with an impartial evaluation of vendors strengths and capabilities.

Interoute continues to be a leader in the field for managed infrastructure platforms with a strong focus on automation, self service and application portability. Interoutes unique Cloud Fabric simplifies the integration of public & private cloud, colocation and traditional hosting with its software defined platform. The approach streamlines hybrid cloud adoption strategies by enabling anything from physical legacy hardware to cloud based containers to service enterprise applications together.

Interoute offers customers 13 cloud locations across Europe, in addition to resilient locations in Asia and the US. These allow applications to be distributed across major user locations, minimising latency and supporting data sovereignty requirements. Interoute has also integrated network capabilities into its VDC hosting platform and promotes free data-transfers between regions.

Existing customers can directly connect their ICT infrastructure into the Interoute Cloud at over 300 locations worldwide, including major 3rd party data centres, through Interoute Connect. Enterprise branch offices can also be integrated with the platform and the global cloud ecosystem through Interoutes Edge SD-WAN offering.

Our combination of a robust, secure and high performance global cloud infrastructure means both digitally native and established enterprises, can improve performance and maintain compliance. The ability to integrate legacy, third party and digital environments on our platform also means they can build on their past while driving their digital transformation initiatives, said Matthew Finnie, CTO at Interoute.

The report led by analyst Tiny Haynes, and co-authored by analysts Gregor Petri, Gianluca Tramacere and Ross Winser, said: Leaders have proved they have staying power in this market, can frequently innovate on their existing products and can be relied on for enterprise-class needs. They have proved their technical competence and ability to deliver services to a wide range of customers. They address multiple use cases with stand-alone or integrated solutions. They also have a presence in multiple European locations to offer solutions around data sovereignty requirements.

The Gartner Magic Quadrant for Managed Hybrid Cloud Hosting can be found here http://www3.interoute.com/2017-gartner-mhch-europe-release.

More details on Interoute and the Enterprise Digital Platform can be found here http://www.interoute.com/digital-transformation.

Notes: [1] Gartner, Magic Quadrant for Managed Hybrid Cloud Hosting, Europe, June 2017, Tiny Haynes, Gianluca Tramacere, Gregor Petri, Ross Winser.

About the Magic Quadrant Gartner does not endorse any vendor, product or service depicted in their research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartners research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Interoute Interoute is the owner-operator of one of Europe's largest networks and a global cloud services platform which encompasses 15 data centres, 17 virtual data centres and 33 colocation centres, with connections to 206 additional third-party data centres across Europe. Its full-service Unified ICT platform serves international enterprises and many of the worlds leading service providers, as well as governments and universities. Interoutes Unified ICT strategy provides solutions for enterprises seeking connectivity and a scalable, secure advanced platform on which they can build their voice, video, computing and data services, as well as service providers in need of high capacity international data transit and infrastructure. With established operations throughout Europe and USA, Interoute also owns and operates 24 connected city networks within Europe's major business centres. http://www.interoute.com

Forward-Looking Statements This communication contains certain forward-looking statements. A forward-looking statement is any statement that does not relate to historical facts and events, and can be identified by the use of such words and phrases as according to estimates, aims, anticipates, assumes, believes, could, estimates, expects, forecasts, intends, is of the opinion, may, plans, potential, predicts, projects, should, to the knowledge of, will, would or, in each case their negatives or other similar expressions, which are intended to identify a statement as forward-looking. This applies, in particular, to statements containing information on future financial results, plans, or expectations regarding business and management, future growth or profitability and general economic and regulatory conditions and other matters affecting Interoute.

Forward-looking statements reflect the current views of Interoutes management (Management) on future events, which are based on the assumptions of the Management and involve known and unknown risks, uncertainties and other factors that may cause Interoutes actual results, performance or achievements to be materially different from any future results, performance or achievements expressed or implied by these forward-looking statements. The occurrence or non-occurrence of an assumption could cause Interoutes actual financial condition and results of operations to differ materially from, or fail to meet expectations expressed or implied by, such forward-looking statements.

Interoutes business is subject to a number of risks and uncertainties that could also cause a forward-looking statement, estimate or prediction to differ materially from those expressed or implied by the forward-looking statements contained in this communication. The information, opinions and forward-looking statements contained in this communication speak only as at its date and are subject to change without notice. Interoute does not undertake any obligation to review, update, confirm or to release publicly any revisions to any forward-looking statements to reflect events that occur or circumstances that arise in relation to the content of this communication.

-ENDS-

Excerpt from:
Interoute named a Leader in Gartner's MQ for Managed Hybrid Cloud Hosting, Europe for 4th consecutive year - RealWire (press release)

Read More..

Choosing an LMS: Cloud or Hosted? – HR Technologist

Installing a learning management system (LMS) is not a new thing; many organizations have already done it and embraced e-learning as a culture. The change lies in the way the learning management system is hosted. The popularity of the cloud has touched the space of learning and development too, and the cloud-based LMS is the latest on company wish list. But before blindly foregoing the current LMS and rushing to adopt the next best cloud-based LMS, it is important to know what each entails.

Learning management systems are basically of two types:

On the face of it there may not seem much difference in both these types, but each has a unique impact on the hosting capacity, architecture and infrastructure, resources and budgets etc. Also, the user experience is entirely different in each. Here is a closer look at the cloud-based LMS:

Cloud LMS presents many advantages especially from the point of view of becoming future ready. The most important thing is that cloud-based learning can be the booster for your learning and development initiatives by creating an engaging learning experience. It will not only help you achieve your training objectives, but also act as a driver of employee engagement and retention.

See the original post here:
Choosing an LMS: Cloud or Hosted? - HR Technologist

Read More..

Cloud Computing: What is Infrastructure as a Service …

Provisioning processing, storage, networks, and other fundamental computing resources means the consumer of those resources does not manage or control the underlying cloud physical infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components.

In defining Infrastructure as a Service we need to drill into specific characteristics that a cloud platform provider must provide to be considered Infrastructure as a Service. This has been no easy task as nearly every cloud platform provider has recently promoted features and services designed to address the infrastructure as a service and cloud computing market. Fortunately, as the technology has evolved over time, a definition of cloud computing has emerged from the National Institute of Standards and Technology (NIST) that is composed of five essential characteristics, three service models, and four deployment models.

Two dimensions are used to classify the various deployment models (see Figure 1) for cloud computing:

Figure 1 Cloud computing deployment models

Our reference architecture will be based upon the NIST definition as we define the core principals, concepts and patterns used throughout the reference architecture and subsequent implementation guidance in this content series. The reference architecture will consist of reference frame that outlines the overall cloud computing stack based on the NIST definition and defines the core principals, concepts and patterns of a good reference architecture. This is then followed by service delivery guidance to guide the business on solution based delivery of an on-premise private cloud infrastructure.

The reference architecture presented contain practices that are independent of any specific platform provider and generally should be present on any Infrastructure as a Service platform or service engagement available from or through a provider of cloud based computing capability. Where applicable we will link with solution implementation guidance that is based on the use of Microsoft Server products to illustrate the capability discussed in the reference architecture.

The cloud provides options for approach, sourcing, and control. It delivers a well-defined set of services, which are perceived by the customers to have infinite capacity, continuous availability, increased agility, and improved cost efficiency. To achieve these attributes in their customers minds, IT must shift its traditional server-centric approach to a service centric approach. This implies that IT must go from deploying applications in silos with minimal leverage across environments to delivering applications on pre-determined standardized platforms with mutually agreed service levels. A hybrid strategy that uses several cloud options at the same time will become a norm as organizations choose a mix of various cloud models to meet their specific needs.

Cloud options typically are categorized by the following service and sourcing models (see Figure 2 for a comparison):

Software as a Service (SaaS) delivers business processes and applications, such as CRM, collaboration, and e-mail, as standardized capabilities for a usage-based cost at an agreed, business-relevant service level. SaaS provides significant efficiencies in cost and delivery in exchange for minimal customization and represents a shift of operational risks from the consumer to the provider. All infrastructure and IT operational functions are abstracted away from the consumer.

Platform as a Service (PaaS) delivers application execution services, such as application runtime, storage, and integration, for applications written for a pre-specified development framework. PaaS provides an efficient and agile approach to operate scale-out applications in a predictable and cost-effective manner. Service levels and operational risks are shared because the consumer must take responsibility for the stability, architectural compliance, and overall operations of the application while the provider delivers the platform capability (including the infrastructure and operational functions) at a predictable service level and cost.

Infrastructure as a Service (IaaS) abstracts hardware (server, storage, and network infrastructure) into a pool of computing, storage, and connectivity capabilities that are delivered as services for a usage-based (metered) cost. Its goal is to provide a flexible, standard, and virtualized operating environment that can become a foundation for PaaS and SaaS.

IaaS is usually seen to provide a standardized virtual server. The consumer takes responsibility for configuration and operations of the guest Operating System (OS), software, and Database (DB). Compute capabilities (such as performance, bandwidth, and storage access) are also standardized.

Service levels cover the performance and availability of the virtualized infrastructure. The consumer takes on the operational risk that exists above the infrastructure.

Figure 2 Comparison of cloud service models

Deployment models (shared or dedicated, and whether internally hosted or externally hosted) are defined by the ownership and control of architectural design and the degree of available customization. The different deployment models can be evaluated against the three standards - cost, control, and scalability.

Figure 3 Cloud deployment defined by ownership and control

The Public Cloud is a pool of computing services delivered over the Internet. It is offered by a vendor, who typically uses a pay as you go or "metered service" model. Public Cloud Computing has the following potential advantages: you only pay for resources you consume; you gain agility through quick deployment; there is rapid capacity scaling; and all services are delivered with consistent availability, resiliency, security, and manageability. Public Cloud options include:

The private cloud is a pool of computing resources delivered as a standardized set of services that are specified, architected, and controlled by a particular enterprise.

The path to a private cloud is often driven by the need to maintain control of the service delivery environment because of application maturity, performance requirements, industry or goverment regulatory controls, or business differentiation reasons. For example, banks and governments have data security issues that may preclude the use of currently available public cloud services. Private cloud options include:

The array of services delivered by the combination of service and sourcing models can be dizzying. CIOs will need to evaluate their business requirements and the experience of the provider to select the appropriate Cloud models.

Figure 4 Comparison of Cloud Deployment Models

Figure 5 Reference Model - Infrastructure as a Service View

Bill Loeffler is a principal knowledge engineer, ISD IX, in Microsoft's Windows Server & Solutions.

View original post here:
Cloud Computing: What is Infrastructure as a Service ...

Read More..