Page 4,300«..1020..4,2994,3004,3014,302..4,3104,320..»

Belmont Stakes Odds 2017: Latest Vegas Betting Lines Before Post Positions Draw – Bleacher Report

Even the most ardent horse racing fans would admit this year's Belmont Stakes is missing some of its usual luster since Kentucky Derby winner Always Dreaming and Preakness winner Cloud Computing are not in the field for Saturday's event.

What's more, Classic Empire's trainer Mark CassetoldAlicia Wincze Hughesof Blood Horse on Wednesday the horse won't race because of anabscess in his right front hoof.

However, it is still one of the marquee events on the racing calendar and features a $1.5 million purse and 1.5-mile length track at Belmont Park in Elmont, New York. Horses will be tested in the longest of the three Triple Crown races.

While Wednesday's post draw is sure to impact the lines as horses receive favorable and unfavorable starting spots, here is a look at the odds and a predicted winner for the famous race.

Odds

The odds are courtesy of OddsShark, as of Tuesday at 5:30 p.m. ET and had Classic Empire as the favorite at 2-1 before news of his withdrawal broke. That left Epicharis and Lookin At Lee as the favorites before Wednesday's post draw.

Epicharis 5-1

LookinAt Lee 5-1

Senior Investment 8-1

Irish War Cry 9-1

Tapwrit 10-1

Twisted Tom 14-1

Gormley16-1

Patch18-1

J Boys Echo20-1

Multiplier25-1

Meantime25-1

Hollywood Handsome *odds unavailable

Predicted Winner: Lookin At Lee

Before the abscess knocked him out, Classic Empire was the pick. After all, heappeared primed to compete for an eventual Triple Crown when he dominated as a juvenile in 2016, with victories at the Breeders' Futurity and Breeders' Cup Juvenile.

He even won the Arkansas Derby after struggling with the foot abscess during a third-place finish at the Holy Bull Stakes andappeared to be in fine form for the majority of the Preakness when he battled Kentucky Derby winner Always Dreaming for the lead nearly throughout before Cloud Computing made a late charge and left Classic Empire in second place.

The absence of Cloud Computing and Always Dreaming,per the Associated Press (h/t USA Today), cleared the way for a win before Wednesday's news, andLookin At Lee looks the most likely to benefit.

Lookin At Lee has struggled against Classic Empire in the past, with a fourth-place finish in the G1 Breeders' Cup Juvenile andthird-place finish in the Arkansas Derby. He also placed in fourth at the Preakness and never truly challenged Classic Empire or eventual winner Cloud Computing.

Fortunately for trainer Steven M. Asmussen and jockey Irad Ortiz Jr., those top competitors are not in the way. What's more, Wednesday's post draw shouldn't represent much of a challenge either, considering Lookin At Lee already turned heads with a second-place finish at the Kentucky Derby despite drawing the unfavorable No. 1 post.

He didn't get caught on the rails and demonstrated his head-turning speed that will again be on full display Saturday.

Ortiz Jr. also gives Lookin At Lee an advantage since he won the Belmont last year atop Creator. Ortiz Jr. understands what it takes to win on this stage and will do so again against a lighter field Saturday.

See the original post:
Belmont Stakes Odds 2017: Latest Vegas Betting Lines Before Post Positions Draw - Bleacher Report

Read More..

Facebook Inc (FB) to Pull WhatsApp Off IBM Cloud Servers … – Investorplace.com

Popular Posts: Recent Posts:

According to a CNBC article this afternoon, social media juggernaut Facebook Inc (NASDAQ:FB) is making arrangements to move the WhatsApp messaging service off of cloud servers hosted by International Business Machines Corp. (NYSE:IBM) and onto its own bank of data centers instead.

However, the effects of this decision will likely be minimal forboth companies, and negligible forFB stock and IBM stock as well, even though those effects will be in direct opposition to one another.

Earlier today, some other news outlets reported thatWhatsApp is one of IBMsfive largest cloud service customers and described the messaging service as the poster child for the IBM cloud.

However, an IBM representative told me this afternoonthat WhatsApp is not actually one of the companys top five clients. She said:

Contrary to what some of the stories are saying, WhatsApp is not a top 5 cloud client at IBM not even close. We have many multi-million and even some billion dollar cloud clients, including US Army, Wal-mart, BMW, American Airlines, Lufthansa, Emirates, Workday, Chubb, AT&T, Wanda, Etihad, Maersk and many more.

So, losing the WhatsApp account could have a negative impact on IBMs bottom line, but considering thatlist of other cloud clients its likely to be almost insignificant, at least from a financial perspective.

Facebook, on the other hand, stands to gain a bit from this decision. Apparently, Facebook was spending nearly $2 million per month on the IBM cloud, according to an unnamed source for CNBC.

That means once the transition to FBs own cloud servers is complete, the company could realize as much as $24 million per year in savings (not considering, of course, the potential costs associated with maintaining the WhatsApp data on Facebook-owned servers).

While the real reason for moving WhatsApp off of IBMs cloud and onto its own servers has not been disclosed actually, the legitimacy of this entire plan has yet to be confirmed by either company there are myriad possibilities.

I can think of two simple reasons that would justify FB managements decision to pull WhatsApp from IBM: cost and control.

Even though Facebook is the worlds largest, most popular social media titan with a market cap of $440 billion, keeping expenses in check is still a top priority. If the use of the IBM cloud has been costing FB tens of millions of dollars per year, and if the ability exists to shift WhatsApp to in-house servers, then the decision is a no-brainer.

No corporation, even gigantic ones like Facebook, will continue to spend that much money when they can just as easily do the job in-house.

Next Page

Excerpt from:
Facebook Inc (FB) to Pull WhatsApp Off IBM Cloud Servers ... - Investorplace.com

Read More..

DigitalOcean releases free cloud firewalls service to strengthen security for large-scale applications – SDTimes.com

DigitalOcean, the cloud for developers, today launched Cloud Firewalls, a free service that secures Droplets (cloud servers) by reducing the surface area of a potential attack. Developers can deploy the service in seconds without installing or configuring any software, and define what ports are visible on their Droplets to minimize risk. Along with DigitalOceans free Monitoring Service launched in April 2017, Cloud Firewalls is a key part of DigitalOceans continuous effort to add value back to developers by allowing them to deploy and scale applications of any size.

We are committed to helping developers build great software. This includes offering a simple and automated way to secure their infrastructure, said Julia Austin, CTO of DigitalOcean. Teams of engineers depend on DigitalOcean to stay true to our commitment to simplicity, and Cloud Firewalls ensures they can easily manage their production workloads securely, at scale.

Developers with a large number of Droplets will find it much easier to secure their applications with Cloud Firewalls. It scales automatically from one Droplet to thousands and provides a central location to define and apply access rules to prevent unauthorized traffic from reaching them. Users can leverage tagging to group and organize any number of Droplets, and use them to define how each group of Droplets is secured.

Cloud Firewalls gives users the ability to whitelist which ports are open and which IP ranges, tags, Droplets or load balancers can access them. Users can configure the service easily and quickly through the dashboard or on the command line with doctl. They can also leverage DigitalOceans API to automate tasks and build integrations. Official client libraries are available in Go and Ruby. Rules can be changed in one place and instantly applied to every Droplet that is tagged and the service is available in every region to all Droplet customers at no additional cost.

Read more from the original source:
DigitalOcean releases free cloud firewalls service to strengthen security for large-scale applications - SDTimes.com

Read More..

What My Father Taught Me About Cloud Computing – Virtualization Review

In-Depth

Wells and city water have more in common with the cloud than you might think.

With Father's Day approaching, it got me thinking about my father, Darrel, and some of the great stories and lessons he shared with me while I was growing up. His father died when he was young, and although he had a loving mother, he had a hardscrabble childhood growing up in a small town in Utah. One lesson he inadvertently taught me when I was young that I would later reflect on was the importance of cloud computing.

As a kid, we used to visit the house he grew up in. One summer, my brother and I came across an old cemented water well on the property, and we started to talk to my dad about it. I thought that it was way cool to have this "free" source of water on the land that his family had complete dominion over. Then dad (as dads are apt to do) set me right.

Once, the well dried up and the well digger had to drill a deeper well to strike water. For the most part, we could pull water from the well on a regular basis, but during the hot Utah summers, the wind-powered well reliability was not optimal, and they had to use it judiciously.

They eventually moved to an electric well, but the cost of electricity to power the pump could get spendy. Money aside, dad said the worst part of having the well was worrying about potential health hazards; one autumn, the whole family became very ill and the doctor suspected that it had something to do with well water.

Taking these negative aspects of having a property well into account, my dad told me that it was a blessing when the city created a central water system by constructing a reservoir high up in the mountains. The city piped the water down to a station where it was monitored and treated. The vast majority of residents in the town jumped on the chance to join the new central water supply. Some agricultural and industrial users didn't cement up their wells, using them to supplement their city water; but for the most part, people found city water to be cheaper, more reliable and safer to use than well water.

So, how does my father's story about his family's well and city water relate to cloud computing? For the past 50 or so years, we've been using "well" technology in our datacenters. We put in our own servers, and although we sometimes get it right, we more than likely have to rely on getting professionals to help us set things up to make our servers efficient and workable.

We have a finite set of compute and storage resources that need to be closely monitored to prevent them from being used up. Even though we are diligent in preventing viruses and other security vulnerabilities, they still can get through the cracks and cause our datacenters great harm.

But just as a central city water supply solved problems for the citizens of my father's town, cloud computing can solve common issues and inconveniences in your datacenter. The cloud is a reservoir of compute and storage to draw upon as needed, and is almost impossible to deplete. Cloud compute centers are located near cheap, reliable power sources such as hydro-electric dams. Cloud providers can buy compute and storage devices by the boxcar load to get prices you can only dream about.

Due to the economy of scale, cloud centers can be staffed around the clock with dedicated professionals specialized in one aspect of the cloud, delivering a more reliable service. The staff can monitor compute and storage security, detecting and, more likely than not, preventing viruses and other security concerns from affecting your datacenter.

That's how my father taught me about the importance of cloud computing.

(In memory of my father, who taught me more than he realized, encouraged my curiosity, and loved his his wife and kids. He was a good man.)

About the Author

Tom Fenton works in VMware's Education department as a Senior Course Developer. He has a wealth of hands-on IT experience gained over the past 20 years in a variety of technologies, with the past 10 years focused on virtualization and storage. Before re-joining VMware, Tom was a Senior Validation Engineer with The Taneja Group, were he headed their Validation Service Lab and was instrumental in starting up its vSphere Virtual Volumes practice. He's on Twitter @vDoppler.

Continued here:
What My Father Taught Me About Cloud Computing - Virtualization Review

Read More..

IBM Losing Facebook’s WhatsApp as Cloud Customer, says CNBC – Barron’s


Barron's
IBM Losing Facebook's WhatsApp as Cloud Customer, says CNBC
Barron's
Shares of International Business Machines (IBM) are holding up alright despite a negative piece this morning from CNBC's Jordan Novet, who writes that Facebook (FB) intends to move its WhatsApp communications software off of IBM's cloud computing ...
IBM Faces Challenges in the Cloud, but That's Not Why They Lost Facebook's WhatsAppTheStreet.com
Facebook is planning to move WhatsApp off IBM's public cloud, source saysCNBC

all 7 news articles »

Read the rest here:
IBM Losing Facebook's WhatsApp as Cloud Customer, says CNBC - Barron's

Read More..

Cloudistics Announces New Cloud Computing Program That Enables High Margin Reoccurring Revenue Models for … – Marketwired (press release)

With Cloudistics StarterCloud and ReadyCloud, MSPs have new, cost-effective alternative to public clouds

NEW YORK, NY--(Marketwired - Jun 7, 2017) - Cloud Expo -- Today at the 20th International Cloud Expo at the Javits Center in New York City, Cloudistics, an on-premises cloud computing company, announced the launch of its North America Managed Service Providers (MSPs) Program, to meet growing demand from MSPs looking for an alternative to large hyperscale public clouds. The new program gives partners the opportunity to build recurring revenues by creating, hosting, and managing their own on-premises private cloud environments.

Now, MSPs can create their own high performance clouds using the Cloudistics platform. The Cloudistics platform comes with all the software and hardware needed to create your own private cloud. Recognized as an IDC 2017 Innovator and a Gartner 2017 Cool Vendor in Cloud Infrastructure, Cloudistics is the perfect platform for creating and hosting customer virtual datacenters, running resource intensive applications, or anything else your customer may need from the cloud. With native multi-tenancy built in, MSPs can create secure clouds for each customer, eliminating the need for costly dedicated environments.

Utility Datacenter, a leading data center technology integrator and cloud services provider based in Massachusetts, recently joined the Cloudistics Managed Service Provider program.

"We saw a real opportunity to offer our customers an alternative to the public cloud with the Cloudistics platform," said Joshua Opper, Managing Partner of Utility Datacenter. "With Cloudistics, we can build and host private virtual datacenters for each of our customers that deliver better performance and economics than the public cloud."

Cloudistics Managed Service Provider Program Benefits

Cloudistics gives MSPs all the tools they need to compete in the crowded cloud market:

"Cloudistics has made a commitment to help MSPs efficiently manage the specific priorities and business needs of their customers. Our dedicated team and specialized services, combined with Mimecast's cloud technology, save time, resources and cost," said Steve Conner, Cloudistics' Global VP of Sales. "It is our goal to streamline and improve the partner experience to make it the best it can be for each MSP."

The Managed Service Provider program consists of two main components:

About Utility Datacenter Utility Datacenter is a leading provider of cloud hosting, consulting and managed IT services. UDC provides architectural design, full and part time resources, implementation services, training, and strategic advice about a wide variety of IT disciplines, projects and platforms. UDC offers VM-Portal, a self-service product that allows customers to aggregate and manage their cloud, virtualization and bare metal infrastructure from a single interface.

About Cloudistics Cloudistics, an on-premises cloud computing company, delivers a complete public cloud experience with composable on-premises infrastructures to medium and large enterprises. Its software-defined technology natively converges network, storage, compute, virtualization, and management into a single platform to drive unprecedented simplicity in the datacenter. Customers can start with a base infrastructure and scale to multi-site and multi-geo infrastructures with predictable economics and performance. With open and secure virtual networking, elastic storage, application orchestration and SaaS management, Cloudistics is the blueprint for application-optimized on-premises cloud infrastructures. Learn more at http://www.cloudistics.com or follow @cloudistics on Twitter.

Read the original post:
Cloudistics Announces New Cloud Computing Program That Enables High Margin Reoccurring Revenue Models for ... - Marketwired (press release)

Read More..

Cloud Access Security Broker Netskope Raises $100M – Web Host Industry Review

Cloud access security broker (CASB) Netskope has closed a $100 million funding round to bring its enterprise cloud security platform to more businesses, the company announced Tuesday.

The oversubscribed Series E round was led by existing investors Lightspeed Venture Partners and Accel, and brings the companys funding total to $231.4 million.

Netskope claims to be the most well-funded company in the CASB market, which Gartner saidlast year will go from 5 percent penetration in 2015 to 85 percent in 2020. In 2016 Netskope tripled its revenue from 2015, grew its team to a headcount of more than 350, and added leading enterprise customers.

[Report: Short DDoS Attacks Can Have Lasting Security Impact]

The Netskope Active Platform is designed to replace traditional security products with content and context awareness, and the company told TechCrunch that it processes tens of billions of cloud transactions per day.

When we founded Netskope, we knew that the far-reaching impact of the cloud would require a fundamentally new approach to security. We started with CASB and now were expanding our cloud security platform to take on additional challenges, Sanjay Beri, founder and CEO, Netskope said in a statement. This approach has been met with a firestorm of support from CIOs and CISOs alike who have become frustrated by a security industry that has lagged behind the technology it is charged with protecting. Todays investment gives us the fuel we need to make that vision a reality for enterprises across the world. Were delighted that our existing investors vision for the future of security maps so closely to our own, and couldnt be happier to welcome Sapphire and Geodesic to the Netskope team.

Beri also told TechCrunch that the funding round may be Netskopes last on its way to an IPO. Existing investors Social Capital and Iconiq Capital also participated in the round, along with new investors Sapphire Ventures and Geodesic Capital.

Read more:
Cloud Access Security Broker Netskope Raises $100M - Web Host Industry Review

Read More..

ShoreTel brings Connect Cloud solution to Australia, enabled by 2015 acquisition of M5 – CRN Australia

Don Joos and Frederic Gillant, ShoreTel

Unified communications vendor ShoreTel has launched its cloud-hosted solution, Connect Cloud, in Australia, two years after the product was first unveiled in the United States.

The announcement was made this week as executives from the California-based company visit Australia to meet with partners. Australia represents the latest step in Shoretels unified-communications-as-a-service rollout, and continues the companys growing footprint in the region.

The introduction of the ShoreTel cloud platform allows customers to use ShoreTel UC core infrastructure either in their own server room or to have the service hosted out of one of ShoreTels two data centres in Australia.

ShoreTel says it has hit the ground running with the solution, with seven local customer contracts already signed.

ShoreTel chief executive Don Joos, visiting Sydney and Melbourne for the announcement, said the solution offered Australian customers greater flexibility in how they deployed their unified communications.

The richness of the Connect CLOUD solution combined with the enthusiasm weve seen from the Australian channel perfectly positions ShoreTel to drive cloud growth in the Asia-Pacific region, he said.

Frederic Gillant, vice president and managing director of ShoreTel Asia-Pacific, said the cloud capability made sense for many customers in Australia, who are eager in their adoption of cloud services.

We have an incredibly loyal customer base here in Australia, and are honoured to still count as customers most of the original organisations who chose ShoreTel when we opened operations here more than ten years ago, he said.

Many of our customers have been adopting cloud in other areas of their IT infrastructure and business; now they also have a low-risk cloud migration path for their ShoreTel telephony and UC environments.

ShoreTels move to cloud hosting solutions follows the vendors acquisition of M5 Networks in the US in 2012, followed by M5s Australia business in 2015. ShoreTel told CRN at the time the buy was a stepping stone to bringing Connect Cloud down under.

The rest is here:
ShoreTel brings Connect Cloud solution to Australia, enabled by 2015 acquisition of M5 - CRN Australia

Read More..

SOCIAL SECURITY: Every day is internet security day – Palm Beach Post

Being safe online is important every day. You need to be careful every time you go online.

Do you know what it takes to be safe online? Every time you go online, you need to avoid the risk of theft or fraud. Here are some tips to use while visiting the Social Security website and the other websites you use.

* Use Strong Passwords Strong passwords have at least eight characters and include capital letters, numbers and non-letter characters. These passwords make it harder for someone to hack your account.

* Dont Recycle Passwords Although it requires effort to think of new passwords constantly, it provides safety when you do. What if you use the same password for every site and you lose your password? If someone finds it, they could get access to all your accounts. Many people choose to reuse but dont be one of them.

* Take Advantage of Multifactor Authentication Many websites offer the option to use a second factor or method in addition to just a username and password to ensure that only you access your information. Using more than one factor to establish identity makes it harder for someone to get into your account and steal your personal information. Beginning Saturday, Social Security will require multifactor authentication to access a Social Security account. Customers choose whether to receive a one-time security code to either their phone or email in order create a new account or sign into their account. Visit this link to find out more about how to secure your personal my Social Security account: http://www.socialsecurity.gov/myaccount/verifyandprotectid.html. Consider using multifactor authentication whenever its offered to protect your information.

* Read Scam Alerts For information about fraudulent activities related to Social Security, you can find information at our blog Social Security Matters under the Newsroom section at blog.socialsecurity.gov. One way to avoid identity theft is to create your own Social Security account, if you havent already. When you have an account, no one else can set up an account using your information. Social Securitys Office of the Inspector General investigates fraud involving Social Security and they publish Fraud Advisories at oig.ssa.gov/newsroom/news-release. The Federal Trade Commission website publishes information about scams that appear in the news at http://www.consumer.ftc.gov/scam-alerts. Youll want to be aware of current scams to avoid being tricked.

* Review Your Online Accounts and Credit Reports Just as you review your earnings record with Social Security for accuracy at http://www.socialsecurity.gov/myaccount, you should review your bank and credit card accounts for accuracy. Get a free copy of your credit report available annually from the three credit reporting agencies (Experian, Equifax and Transunion) at http://www.annualcreditreport.com and check it for incorrect entries.

Protecting your identity can be daunting. Guarding your personal information requires investing some time, but is worth it. Discourage theft and fraud by adopting these security practices when you use the internet.

Maria Diaz is a public affairs specialist for the Social Security Administration. If you have Social Security questions, call 800-772-1213.neighborhood@pbpost.com

Read more from the original source:
SOCIAL SECURITY: Every day is internet security day - Palm Beach Post

Read More..

Inside Social Security: Make every day your internet security day – Santa Ynez Valley News

Being safe online is important every day. There may be days devoted to internet security awareness, but you need to be careful every time you go online.

Do you know what it takes to be safe online? You probably connect daily to get information, shop, socialize or work. But every time you go online, you need to avoid the risk of theft or fraud.

Here are some tips to use while visiting the Social Security website as well as the other websites you use;

Use strong passwords Strong passwords have at least eight characters and include capital letters, lower-case letters, numbers and nonletter characters. Those passwords make it harder for someone to hack your accounts.

Dont recycle passwords Although it requires effort to think of new passwords constantly, it provides safety when you do. What if you use the same password for every site and you lose your password? If someone finds it, they could get access to all your accounts. Many people choose to reuse dont be one of them.

Take advantage of multifactor authentication Many websites offer the option to use a second factor or method in addition to just a user name and password to ensure that only you can access your information.

Using more than one factor to establish identity makes it harder for someone to get into your account and steal your personal information.

Beginning June 10, 2017, Social Security will require multifactor authentication to access a My Social Security account.

Customers will choose whether to receive a one-time security code through either their phones or email in order create a new account or sign into their account.

Consider using multifactor authentication whenever its offered to protect your information.

Read scam alerts For information about fraudulent activities related to Social Security, you can find information at our blog called Social Security Matters under the Newsroom section at blog.socialsecurity.gov.

One way to avoid identity theft is to create your own My Social Security account, if you havent already. When you have an account, no one else can set up an account using your information.

The Social Security Administrations Office of the Inspector General investigates fraud involving Social Security and publishes Fraud Advisories at oig.ssa.gov/newsroom/news-release.

Youll want to be aware of current scams to avoid being tricked.

Review your accounts and credit reports Just as you review your earnings record with Social Security for accuracy at http://www.socialsecurity.gov/myaccount, you should also review your bank and credit card accounts for accuracy.

Get a free copy of your credit report, which is available annually from the three credit reporting agencies Experian, Equifax and Transunion at http://www.annualcreditreport.com/ and check it for incorrect entries.

Protecting your identity can be daunting. Guarding your personal information requires investing some time, but its worth it.

Discourage theft and fraud by adopting those security practices when you use the internet.

Essie Landry is the public affairs specialist for the Social Security Administration Sierra West Area.

Read this article:
Inside Social Security: Make every day your internet security day - Santa Ynez Valley News

Read More..