Page 4,325«..1020..4,3244,3254,3264,327..4,3304,340..»

Cryptocurrency Market Cap History: Ethereum Surpasses US$20bn, Bitcoin Goes Over US$40bn – The Merkle

It appears some important market cap milestones are being hit as of right now. Bitcoin is inching closer toward the US$40bn market cap, a target that has been in the sights for some time now. Ethereum, on the other hand, recently saw major growth, as its market cap grew from US$11bn to US$20bn. All of this goes to show there is a lot of money flowing into cryptocurrency right now.

It has been an incredible roller coaster ride for the world of cryptocurrency these past few years. A lot of people doubted the success of Bitcoin and other currencies not all that long ago. We have certainly come a very long way ever since that time, and the results are nothing short of amazing. In fact, the total cryptocurrency market cap now sits at just over US$90bn.

As is to be expected, the vast majority of that money is injected into Bitcoin directly. With nearly US$42bn in total value, the Bitcoin ecosystem is the most valuable in all of cryptocurrency right now. Earlier today, the Bitcoin price briefly hit the US$2,400 mark, although it will hit that target again at some point in the coming hours or days. Demand for Bitcoin has never been bigger, and it looks as if the trend will not settle down anytime soon.

However, Bitcoin is no longer the only top dog in the world of cryptocurrency. Although Bitcoin still has a substantial market cap lead over its closest rival in the form of Ethereum, the gap has been closing rapidly. The total Ethereum market cap was around US$11bn not too long ago. Fast forward to today, and it has just surpassed the US$20bn mark. It is evident investors are not looking just at Bitcoin these days, although that will remain the gateway to most other cryptocurrencies for quite some time to come.

There has been a lot of good news for Ethereum which attributed to this market cap increase. The formation and growth of the Ethereum Enterprise Alliance should not be overlooked by any means.At the same time, the underlying technology has been of great interest to many enterprises. Plus, a lot of new innovative tokens and projects are issued on the Ethereum blockchain around the clock. All of these token ICOs reduce the amount of ETH in circulation and bring more prestige to ETH as a whole.

It is unclear what the future will hold for the cryptocurrency, although there is plenty of reason to be excited. Money continues to pour in as we speak, and it seems this trend will not slow down anytime soon. Moreover, Ethereum Classic has just overtaken Litecoin by market cap, indicating the demand for alternative cryptocurrencies will only grow further. This is absolute madness, but cryptocurrency enthusiasts are loving every second of it.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

See more here:
Cryptocurrency Market Cap History: Ethereum Surpasses US$20bn, Bitcoin Goes Over US$40bn - The Merkle

Read More..

A cloud storage architecture for the enterprise – InfoWorld

Yaniv Romem is co-founder and CTO and Tom Leyden is VP of corporate marketing at Excelero

Tech giants such as Amazon, Facebook, and Google have redefined IT for web-scale applications, leveraging standard servers and shared-nothing architectures to ensure maximum operational efficiency, flexibility, and reliability. As new application workloads cloud, mobile, IoT, machine learning, and real-time analytics drive the need for faster and more scalable storage, enterprises are seeking to optimize their infrastructures in the same way as these tech giants.

Exceleros NVMesha unified, scale-out, software-defined, block storage solution that runs on industry standard serverswas designed in response to these needs. NVMesh leverages NVMe high-performance flash, a highlydistributed architecture, intelligent clients that minimize cluster communications, and a proprietary storage access protocol that bypasses the CPU on storage targets.

The result is a high-performance block storage system, with extremely low latency overhead. In a nutshell, server access to remote storage devices is a mere 5 microseconds (s) slower than access to local devices, and that overhead is mostly in the network. Further, NVMesh can be flexibly deployed as converged (combining compute and storage) or disagreggated (storage server or JBOD) infrastructure, and scales simply and granularly by adding drives or nodes to the cluster.

As storage has moved from the mechanical world of hard drives to the silicon world of SSDs, we have experienced rapid improvements in performance, capacities, and reliability. Today, the absolute tops in flash storage interfaces is NVMe, which is powered by a much faster protocol that eliminates the bottleneck of ATA and SCSI.

NVMe essentially gives us a much better way to access the performance of flash both todays SSDs and future innovations. By being placed on the PCIe bus, NVMe opens up a whole new range of opportunities. It can provide the performance, latency, and power efficiencies required by todays massive web and supercomputing applications as well as powerful data analytics environments such as industrial IoT.

In this article well take a deep dive into the technology that Excelero engineers developed to take advantage of NVMe and the paradigm shift to server-based, software-defined storage.

Excelero designed NVMesh to meet the block storage requirements of modern scale-out applications, leveraging state-of-the-art flash on standard servers. The key requirements for such environments are:

NVMesh enables customers to design server-based SAN infrastructures for the most demanding enterprise and cloud-scale applications, leveraging standard servers and multiple tiers of flash. The primary benefit of NVMesh is that it enables converged infrastructure by logically disaggregating storage from compute.

NVMesh features a distributed block layer that allows unmodified applications to use pooled NVMe storage devices across a network at local speeds and latencies. Distributed NVMe storage resources are pooled with the ability to dynamically create arbitrary virtual volumes that can be striped, mirrored, or both. Volumes can be spread over multiple hosts and utilized by any host running the NVMesh block client. In short, applications can enjoy the latency, throughput, and IOPs of a local NVMe device while at the same time getting the benefits of centralized, redundant, and centrally managed storage.

A key component of Exceleros NVMesh is the patented Remote Direct Drive Access (RDDA) functionality, which bypasses the CPU and, as a result, avoids the noisy neighbor effect on application performance. The shift of data services from centralized CPU to complete client-side distribution enables linear scalability, provides deterministic performance for applications, and allows customers to maximize the utilization of their flash drives.

NVMesh is deployed as a virtual, distributed, non-volatile array. It supports both converged and disaggregated architectures, giving customers freedom in their architectural design.

NVMesh consists of four main software components: the NVMesh Target Module, the Topology Manager (TOMA), the Intelligent Client Block Driver, and the centralized management system.

The NVMesh Target Module identifies storage hardware, such as NVMe drives and compatible NICs, and sets up RDDA pathways into the NVMe drives on behalf of the storage clients. The module runs on target nodes, which are physical nodes containing non-volatile storage elements to be shared. Once the Target Module sets up the connections from clients to the NVMe drives, it steps back and hence is not in the data path. The Target Module is also involved in error detection and handling.

The Topology Manager, which comes bundled with the target module and runs on the same hardware elements, executes in user space and provides volume control plane functionality. TOMA tracks the activity of drives and storage target modules to maintain seamless volume activity upon element failure. Upon recognizing a failure, the topology manager performs the actions required to ensure data consistency. It also manages and engages in recovery operations upon element resumption or replacement.

The Intelligent Client Block Driver implements block device functionality for storage consumers. This software runs on client nodes. A host or node that has one or more NVMe devices to share and also participates as a client is called a converged node. Converged nodes run both the block storage client and the storage target module. If desired, the storage management module can also run on a client, target, or converged node.

The centralized management system provides, yes, configuration and monitoring functionality. In addition to a web GUI, it provides a RESTful API management interface for integration with data center management systems and orchestration mechanisms.

Being a true software-defined storage solution, NVMesh separates the control path and data path. Most of NVMeshs control path functionality is executed by the storage management modules, which avoid broadcasting management communications to ensure scalability. The control path functionality includes:

The data path serves the actual storage I/O operations, which are sent from the block storage client to the storage devices using several mechanisms. NVMe devices are accessed at local speeds using Exceleros patented RDDA protocol. Other target block devices, such as SATA SSDs, are accessed using standard RDMA queue pairs to interact with the storage target module that will subsequently perform the I/O operation. NVMf devices are accessed directly using the NVMf protocol.

Besides Exceleros RDDA protocol, NVMesh supports the open protocol NVMf as a wire transport. NVMf may be preferable from the standards perspective, but is less desirable in terms of performance overhead, as using it will require invocation of target side software (and CPU). RDDA typically provides better access latency without requiring target-side CPU usage.

Employing RDDA provides an immediate latency benefit of 10 microseconds (or more) compared to kernel-based NVMe-over-Fabrics (more on performance below). RDDA significantly reduces load on the target side by avoiding running the kernel software stack including potentially computationally expensive interrupt handling.

Lastly, NVMf is a low latency protocol for NVMe over a network fabricits not a storage solution. The NVMf client and target allow you to access drives remotely, but do nothing for adding redundancy, logical volumes, failover, or centralized monitoring and management.

A key benefit of RDDA is that it bypasses the CPU on targets. As a result, planning resource allocation for applications is simpler and more consistent. A second benefit is the ability to spread data across failure zones for high availability, which calls for distributed data layout. Client-side storage service implementation enables single hop data access also when the data is spread across disparate physical entities.

Excelero NVMesh was designed to scale naturally. Targeting larger data centers with upwards of 100,000 converged nodes, NVMesh was designed to avoid any centralized capability in the data path that could become a bottleneck. This means no centralized metadata or lock management. Client, target, and management functionalities are built as scale-out technologies as well. Because it is critical to ensure that the networking pattern supports web-scale deployments, clients are completely independent. Knowledge sharing among clients is rare and occurs indirectly and anonymously via targets. Client independence ensures easy client scaling.

Storage targets communicate only with other targets that are protecting the same data. Volumes are spread out in a way that minimizes the amount of such communication. In contrast, other products spread the volumes in a way that has every node mirroring something from every other node. Typically, a target will have to communicate with only a handful of other nodes, even in a large-scale environment, due to this volume allocation strategy.

Further, cross-target communication is limited to keep-alives, quorum communication, and rebuilds.Data protection is done by the clients themselves, with the number of elements participating in data protection of any specific stored data element limited to reduce system chatter and enable wide scaling.

Centralized management is comprised of a stateless web serving framework (Node.js) and a transactional, scale-out data store (MongoDB) on the back end. This ensures that the management framework has the required scale-out and failover characteristics to support the largest data centers.

The client-target communication pattern rests on the intelligence of the Intelligent Client block driver. Clients know to approach the correct group of targets thereby reducing both the number of network hops and the number of communication lines. The result is that the number of connections is a small multiple of domain size.

The performance of storage systems is influenced by many elements, including the storage hardware components, the servers, the network, and the efficiency of the software. NVMesh was designed to let applications enjoy the full performance, capacity, and processing power of the underlying servers and storage. The software was designed to add virtually no latency and not impact the target CPU. As NVMesh is a pure software-defined storage solution, performance varies with choices made by the customer. To give an idea of what NVMesh is capable of, we provide a brief summary of tests performed during alive demo for an audience of tech analysts:

The tests were performed on about $13,000 worth of hardware, including

The system generated 2.5M IOps for 4KB random writes and 4.5M IOps for 4KB random reads. Random write average response time was less than 350 microseconds and the random read average response time was 227 microseconds. During the 4.5M IOps random read benchmark, the storage target CPU was at 0.3 percent utilization (mostly running Linux services to display process status).

Excelero NVMesh is a software-defined storage solution designed to meet the requirements of web-scale applications. It leverages state-of-the-art NVMe flash and industry standard servers to deliver consistent, low-latency, high-performance block storage that also meets the cost, scalability, flexibility, and reliability requirements of the modern data center.

NVMesh facilitates performant and cost-effective converged deployments by avoiding noisy neighbor disruptions and effectively disaggregating compute and storage logically without having to do so physically. The key is a new architecture that combines direct access to remote storage devices by clients, a client-side storage service implementation, and a scalable communication pattern.

Scalability is achieved by careful design choices for the communication patterns and scale-out components for the management, control, and data planes. And by providing a block storage API and volume definition flexibility, NVMesh allows administrators to decide how to balance performance, data layout, and availability in the way that meets their requirements.

New Tech Forum provides a venue to explore and discuss emerging enterprise technology in unprecedented depth and breadth. The selection is subjective, based on our pick of the technologies we believe to be important and of greatest interest to InfoWorld readers. InfoWorld does not accept marketing collateral for publication and reserves the right to edit all contributed content. Send all inquiries tonewtechforum@infoworld.com.

Visit link:
A cloud storage architecture for the enterprise - InfoWorld

Read More..

Data Synchronization: A Key Benefit to Cloud Storage – Samsung Business Insights (blog)

Smartphones are quickly becoming the most important piece of technology we own. They are communication devices, cameras, messaging tools and they allow us to work more efficiently and with greater flexibility. The problem is that as smartphones become more integral to our lives, losing control of them and their data can be disastrous.

To avoid this, consumers and enterprises need to make sure they are utilizing the best possible data synchronization and data restoration techniques available and that means looking to the cloud.

Cloud computing has slowly become the status quo. This increased rate of adoption is, in part, thanks to a rollout of services that are easy-to-use, secure and reliable, like Samsung Cloud. It also means that youll be seeing cloud technology become a part of your workflow if it isnt already.

Data Synchronization in the Cloud

Samsung Cloud offers business users an easy and hassle-free way to backup the most important data on their smartphones. It means that if your device is lost, stolen or compromised by a cyberattack, you can quickly restore your data without having to worry about losing anything.

Samsung Cloud is available on its latest smartphones, including the Galaxy S8 and Galaxy S8+, allowing users to easily restore everything from your most important work files to your Wi-Fi settings just by logging into your individualized Samsung account.

Additionally, the service works across multiple devices, meaning you can link your Samsung tablet and will soon be able to link your notebook to your Samsung Cloud account and seamlessly access files and data on any of your devices. This system allows users to take a photo on their smartphone and have it instantly available on their tablet as long as they are using the same account.

By utilizing these data restoration and synchronization features, users can ensure that their data is safe. Samsung Cloud gives all users 15GB of storage space for free, meaning they can get up-and-running without needing to buy additional storage.

The app automatically backs up all first-party Samsung apps, such as Calendar and Contacts, and saves settings like home screen layout, preferred Wi-Fi networks, passwords and even keyboard data. The service also backs up a large amount of other data, including phone call logs, clock settings (including alarms), apps (complete with APK, app data and app settings), messages, music and documents.

Samsung Cloud also gives users control over what data they backup. Each of the Samsung apps can be toggled on or off depending on whether the user wants to backup that apps particular data. There are also granular controls over what data is shared, for example in the Gallery app, users can choose to sync all photos or just specific albums with other devices sharing the same account.

Getting the Most Out of Cloud

Putting your data in the cloud is more than just hardware and network settings. Here are a few tips to help you get the most out of your cloud backup system:

With business moving to the cloud at an almost accelerated rate, its essential to gauge what type of cloud applications could be most beneficial for your everyday work-life so that you can ensure youre as productive as possible in the office and on the go.

See how enterprise mobility solutions are changing the way that employees work on a daily basis.

Originally posted here:
Data Synchronization: A Key Benefit to Cloud Storage - Samsung Business Insights (blog)

Read More..

Zoolz dual cloud will give you 1TB of online storage for life – Popular Science

Like any insurance, failing to back up your files is just asking for trouble. You might baulk at the price of Dropbox or iCloud, but Zoolz Dual Cloud is truly affordable. Right now, you can get a lifetime of 1TB of online storage for just $29.99 via the Popular Science Shop.

Ever heard of the 3-2-1 rule? It means that your files are never truly safe unless you have three backups, with two nearby and one off-site. Zoolz takes care of the off-site part, and stores extra copies of your data across multiple secure facilities. You get 500GB for files you need regularly, while the other 500GB is cold storagelike your own digital attic.

The app automatically backs up new files on Mac and PC, with all your data protected by military-grade AES-256 encryption. You have full control over bandwidth usage and file retention, along with many other options for personalizing your settings. You can access all your uploaded files via any desktop web browser, and via the free Zoolz apps on iOS and Android.

Lifetime storage is worth $3,600, so this deal is pretty mind-blowingorder now for $29.99 to start backing up your files.

Continued here:
Zoolz dual cloud will give you 1TB of online storage for life - Popular Science

Read More..

Cloud computing streamlines oil field monitoring – Williston Daily Herald

The oilfield has always been in a tech race, but the downturn helped light a fire under some feet. Among the new inventions and systems that surfaced as a result is one recently recognized by the American Petroleum Institute. It is a cloud computing system designed by AE2S that can help maximize the deluge of data produced by oilfield sites.

For now, the system is being used primarily on saltwater disposal sites, but it would be useful in the oil and gas sector as well, according to Instrumentation and Control Systems Division Manager for AE2S Jason G. Sanden.

The oil and gas sector is looking to become more active, but it faces a tight labor pool. Cloud computing could help them meet their obligations more efficiently and with fewer people, Sanden believes. Typically, Bakken oilfield companies have sent employees directly on site to take readings and check tank levels, but the AE2S cloud computing system can handle that remotely. Alarms can be set to go off when parameters fall outside the desired range, triggering automatic adjustments to prevent problems before they happen.

We took the power of the internet and put the information up in the cloud, so you can get the information wherever you are, Sanden said.

Larger oilfield operators may have something like this already, Sanden said, but many of the smaller operators do not. Since the system is cloud-based, there are no special computers, nor particular software programs, for companies to buy, which makes it more cost-effective. Data that the company is already generating with its own systems can be pushed to the cloud into a customized program for real-time monitoring and control.

The company can access the resulting reports and schematics through a secure webpage on a device of choice, whether mobile or desktop. Encryption ensures that the page is not accessible to anyone who isnt authorized.

While sending employees driving around to well sites has been typical in the Bakken, its not necessarily the most efficient way to do it.

If something is shut down for a day, and you didnt know about it until you came around, thats a lot of lost production, a lot of lost operation, Sanden said. With real-time monitoring and control, you can see those as they happen and even take action remotely to change a pump, reset a valve and things like that.

The programs can even tag a variety of data for the particular equipment in question, such as maintenance schedules, run times and the last calibration. Being able to link so much historical data is another feature that makes the AE2S system unique, Sanden said. Another is the customizability that the company offers.

We didnt develop the technology, but we adapted it for the industry and have made it economical for the smaller operators, Sanden said. One thing we do a bit differently is we really customize our system for the client. There are some satellite-based systems out there, but theyre not that customizable. They are pretty canned as far as the services offered.

The AE2S system can be laid out physically the same as the operation, so it is easier to follow from beginning to end.

Companies that did this while they were booming have been able to take advantage of it in the downturn, Sanden said.

The company is now working on a data management system for day to day operations of a facility. Its not specific to the oil and gas industry, but its definitely applicable, Sanden said.

Read the original:
Cloud computing streamlines oil field monitoring - Williston Daily Herald

Read More..

Is This the Airbnb of Cloud Computing? – Bloomberg – Bloomberg

Its too late to invest in Airbnb Inc. but a company that bills itself as the Airbnb of cloud computer storage is raising cash -- and anyone with an Internet connection can get in on the action.

Storj Labs Inc. is sellingdigital coins at 50 cents apiece to raise $30 million in an early stage financing round. In just five days, hundreds of contributors signed up for a piece of what they hope will be the next Silicon Valley unicorn. But theres a catch -- unlike traditional venture capital investments, the tokens dont confer a claim on Storjs equity or future profits.

Instead, the tokens value derives from their utility in the firms app, by providing access to data storage on a distributed network. They are the latest entry in the growing ledger of cryptocurrencies, digital coins that unlock myriad apps across the computing world. The coins are tradable on dozens of online exchanges and demand for all sorts of them has exploded as people speculate on the next big tech startup.

The average investor is missing out on the Ubers and AirBnbs of the world, said Bart Stephens, a managing partner at Blockchain Capital, a VC firm thats invested in blockchain-related startups since 2012. If the next Uber decides to issue tokens, that would be an opportunity for more investors to get access to the most exciting technologies out there.

The Storj sale is known as an initial coin offering, a model of finance spreading across the tech sector.Investors spent $332 million on tokens in the past year, more than double what VCs handed over in seed rounds, according to data compiled by coin-focused blog The Control.The haul is slated to hit $600 million in 2017, it says, adding to a market for tokens thats nearly tripled in the past year.

ICOs are possible thanks to blockchain, the catchall term for a digital ledger that promises incorruptible storage of financial transactions. Banks and stock exchanges have spent millions on it, looking for ways to cut the costs for transferring money or recording equity sales. One of the latest to back the technology wasthe chief executive officer of Fidelity Investments, AbigailJohnson. Most famously, its the technology that underpins bitcoin -- just as it does for every token offered in an ICO.

Their massive increase in popularity has more than a few detractors warning of a bubble, worried that the allure of finding the next tech lottery ticket is fueling rampant speculation. The concern is particularly acute at a time when investors are fretting about stretched valuations for tech startups, with the likes of Uber commanding multibillion-dollar price tags even as they burn through cash.

The most important market news of the day.

Get our markets daily newsletter.

Take Gnosis, a prediction market application based on the Ethereum blockchain that raised $12.5 million in 12 minutes on April 24, resulting in a market cap of almost $300 million. Its generated no revenue and has little more than a white paper describing what it intends to do. Yet its tokens, which would allow users to bet on things such as election outcomes, soared eightfold in the three weeks since May 2, giving it a valuation of over $2 billion -- more than the average Russell 2000 Index stock.

Gnosiss runup is just part of the craze thats gripped the cryptocurrency market in the last month, with the price of a bitcoin surging over 30 percent in the past week alone to more than $2,500. Thats pushed the market capitalization of digital currencies over 50 percent higher to more than $90 billion.

Even after that surge, the market is still relatively small, though its taking steps toward maturity as the ICO boom spreads. There are platforms to track historical prices and volume, and reports on individual issuances to help prospective buyers assess a firms prospects.

The offerings happen outside the purview of regulators -- quite by design -- as technically, the coins are part of the app and not securities. ICOs dont have disclosure requirements, and the issuer can accept an unlimited number of U.S. investors, instead of the 99 vetted investors limited to traditional VC funding rounds.

The space has also been a breeding ground for scams, and some coins have turned out to be vulnerable to attacks. Hackers were able to steal $50 million from a fund called Decentralized Autonomous Organization after it raised $150 million in the biggest issuance ever in April 2016.

For entrepreneurs, the appeal is obvious. A white paper published online replaces weeks of pitches to VC firms, followed by an online auction that can take minutes. The technology can be poked and prodded by geeks around the world, providing a depth of expertise often missing at even the best Silicon Valley firms.

You dont have to limit yourself, said Jae Kwon, who raised $16.8 million in a coin sale for Cosmos, which aims to provide custodian-like servicefor transactions across different blockchains. There are just not that many VCs and theyre not experts. People who contributed to our fundraiser are the experts.

Go here to see the original:
Is This the Airbnb of Cloud Computing? - Bloomberg - Bloomberg

Read More..

Make Sense of Edge Computing vs. Cloud Computing – Linux.com (blog)

Make Sense of Edge Computing vs. Cloud Computing
Linux.com (blog)
Edge computing will not replace cloud computing, though the two approaches can complement each other. The internet of things is real, and it's a real part of the cloud. A key challenge is how you can get data processed from so many devices. Cisco ...

Continued here:
Make Sense of Edge Computing vs. Cloud Computing - Linux.com (blog)

Read More..

Microsoft cloud servers are taking business across the globe to South Africa – The American Genius


The American Genius
Microsoft cloud servers are taking business across the globe to South Africa
The American Genius
Scott Guthrie, executive vice president of Microsoft's Cloud and Enterprise Division, explained the company recognizes immense opportunity for innovation in Africa, where Microsoft data centers can support many promising entrepreneurs who are hard at ...
The great data myth: Is cloud really less secure than on-premise?Computer Business Review

all 12 news articles »

See the original post here:
Microsoft cloud servers are taking business across the globe to South Africa - The American Genius

Read More..

Foreign firms grapple with China’s ‘punitive’ cybersecurity laws – South China Morning Post

Just days before Chinas new cybersecurity law goes into force, foreign companies are grappling with rules that could tighten what is already one of the worlds most restricted technology regimes.

Recent changes to the language of the law ahead of its June 1 implementation, such as a broader definition of those affected, could drag in a wider array of services and products. While industry groups are lobbying for a delay, the government is moving ahead.

China is bringing in a raft of new measures, giving the government unprecedented access to foreign companies technology, as it bolsters control of the collection and movement of data. Forcing companies to store information within the mainland has already led some to tap cloud computing providers with more local server capacity, a potential boon to homegrown Alibaba Group Holding and Tencent Holdings Ltd. at the expense of Amazon.com and Microsoft. Alibaba Group is the owner of the South China Morning Post.

Almost all our companies are making moves to ensure that the majority of the data they collect in China is stored on servers located within China, said Jake Parker, vice-president of the US-China Business Council in Beijing. Its not just the technology companies its financial services, semiconductor manufacturers, every sector of business in China, thats impacted.

China pushes through cybersecurity law despite foreign business fears

One organisation that could feel the pinch of the regulations is GreatFire.org, which monitors blocked websites in China and helps users behind the nations controls. The non-profit group creates copies of banned sites hosted outside the mainland, putting them on Amazon Web Services cloud servers to circumvent government restrictions known as the Great Firewall.

Our strategy would collapse because if foreign businesses host all of their data in China, they would face minimal disruption if the authorities cut off access to the foreign internet, said GreatFire.org founder Charlie Smith.

Alibaba said in a statement it follows all local laws where we conduct our business. Microsoft declined to comment, Tencent could not immediately comment and Amazon did not immediately respond to a request for comment.

In addition to the restrictions on moving data beyond the mainland, provisions in the law include a more comprehensive security review process for key hardware and software deployed in China and a requirement to assist authorities conducting security investigations.

While individual firms in China rarely speak out publicly against government policy, more than 50 trade associations and chambers of commerce signed a letter in May to the government seeking a delay.

They argued that the law could affect billions of dollars of cross-border trade and lock out foreign cloud operators because of limits on how they operate in the country.

These measures will add costly burdens, restrict competition and may decrease the security of products and jeopardise the privacy of Chinese citizens, according to the letter from bodies representing businesses based in the US, Europe, Japan, Korea, Australia and elsewhere.

Foreign firms are pushing for change, but the law has support from some domestic experts, such as Li Yuxiao, a professor who studies internet regulation at Beijing University of Posts and Telecommunications. He sees secure information systems as integral to protecting the economy while also placing value on domestic operating systems over foreign products.

Cybersecurity is crucial to national security, he said.

Is China making life difficult for foreign companies?

Gabriela Kennedy, a Hong Kong-based partner at the law firm Mayer Brown JSM, said the National Peoples Congresss Standing Committee passed the law in 2016 ahead of its implementation, giving companies and others time to adjust. Subsequent language published by the government expanded the scope of a law that was considered quite onerous to begin with, she added.

For example, rules limiting the transfer of data outside Chinas borders originally applied only to critical information infrastructure operators. But that was changed mid-April to network operators, which could mean just about any business.

Even a small e-business or email system could be considered a network, said Richard Zhang, director of KPMG Advisory in Shanghai.

Another provision requires IThardware and services to undergo inspection and verification as secure and controllable before companies can deploy them in China. That appears to be already tilting purchasing decisions at state-owned enterprises.

Weve heard from our members that domestic banks and SOEs are being much more thoughtful about purchasing domestic technology and shifting away from foreign products, despite the fact that theres no specific requirement for them to do so, said Parker.

While the laws affect all companies in China, its expected to hit the foreign firms the hardest. That is because they typically have more businesses, headquarters and data processing centres overseas with a greater need to move information outside the mainland, according to Scott Thiel, a Hong Kong-based partner at the law firm DLA Piper.

Why foreign companies are shutting shop in China

Sophisticated or widespread cyberattacks, such as the recent WannaCry ransomware attack that exploited versions of Microsoft Windows, may bolster the governments resolve.

Adam Segal, director of the Digital and Cyberspace Policy Programme at the Council on Foreign Relations in New York, said: We can assume that Chinese leadership will use it as an example of why China needs its own technology and cannot continue to rely on foreign suppliers.

See the original post here:
Foreign firms grapple with China's 'punitive' cybersecurity laws - South China Morning Post

Read More..

CWCS Managed Hosting Awarded G-Cloud 9 Supplier Status – SWNS

Nottingham based cloud hosting provider CWCS have been successful in their application for Government Cloud Computing (G-Cloud 9) supplier status in the categories of Cloud Hosting and Cloud Support.

G-Cloud is a U.K. government programme to promote government-wide adoption of cloud computing. The initiative focuses on cloud computings capability for economic growth, and flexibility to create a more efficient way of delivering public services.

Also, for procurement purposes IT departments can browse potential suppliers safe in the knowledge that every company listed has met strict standards set out by the UK government.

Karl Mendez, Managing Director comments: Changes from G-Cloud 8 were made with the assistance from the National Cyber Security Centre, and compliance to this new framework strongly backs up our ongoing commitment to secure and reliable hosting.We already work with a number of government bodies as well as NHS Trusts, and this accreditation endorses our commitment and investment to position us at the forefront for hosting within the public sector.

For more information about CWCS Managed Hosting and its services, call +44 (0)800 1 777 000 or visit the website.

Category: Business

See the original post:
CWCS Managed Hosting Awarded G-Cloud 9 Supplier Status - SWNS

Read More..