Page 86«..1020..85868788..100110..»

Bitcoin Recovered, 8 Altcoin Jumped! Here’s What Happened – Kriptokoin.com

The cryptocurrency market today paints a complex picture. Bitcoin (BTC) has mobilized after the stagnation seen in recent days and approached the 62 thousand dollar limit. The leading altcoin Ethereum (ETH) and the leading altcoins Solana (SOL), Dogecoin (DOGE) and Shiba Inu (SHIB) gained between 0.3% and 3%. However, XRP declined, contrary to the general market trend. Here are the details

Total crypto market value increased by 2.18% compared to yesterday, reaching $2.29 trillion. Despite this, the trading volume in the last 24 hours showed a significant decrease of 29.28%. Here is a brief summary of some leading cryptocurrencies and their price movements as of June 26:

As Kriptokoin.com reported, while the hourly charts of Bitcoin and Ethereum follow a very volatile course, they point to potential price fluctuations in the coming period. Altcoin charts in the same time period show a weakening movement, leading to speculation in the market.Leading this recovery were Solana (SOL) and Cardano (ADA), with the total market value rising to $2.28 trillion.

Solana stands out with an increase of more than 5% in the last 24 hours. This is an indication of investor interest and its role in the DeFi (decentralized finance) space, despite the general decline in the market. Cardano is also on the rise, up over 4%. Behind this rise lie network updates and possible interest rate cuts. Other leading cryptocurrencies such as Bitcoin and Ethereum are also making some gains. However, the market is still quite volatile overall.

To stay up-to-date with the breaking news, follow us on Twitter, Facebook, and Instagram. Join our Telegram and YouTube channel

Read this article:
Bitcoin Recovered, 8 Altcoin Jumped! Here's What Happened - Kriptokoin.com

Read More..

Fears of Mass Altcoin Delistings Spread in South Korea – Cryptonews

Last updated: June 24, 2024 23:00 EDT | 2 min read

Fears are growing that South Korean crypto exchanges will begin altcoin delisting this year at the request of the financial authorities.

Per a report from Business Post, there is a real danger that altcoins will be delisted one after the other in the coming weeks.

The media outlet reported that industry officials suspect a repeat of 2021. This was the year when most major domestic crypto exchanges purged scores of low-cap coins from their platforms.

In 2021, exchanges acted out of apparent anticipation of coming regulatory action. With a rise in public scandals surrounding so-called scam coins, regulators are under pressure to act again.

Officials have stated that they want exchanges to operate listing audits. They want exchanges to check the credentials of coin projects regularly.

Underperforming tokens, projects that lack sufficient transparency, and projects that show few signs of recent development should be placed on cautionary lists, officials insist.

Business Post claimed experts now cannot rule out the possibility that many altcoins will be delisted at once, in a repeat of 2021.

The regulatory Financial Supervisory Service (FSS) said it will present a set of best practices for exchanges to refer to when making delisting decisions.

The FSS reportedly wants to roll out its new guidelines for altcoins next month. It allegedly wants these to coincide with the launch of the Act on the Protection of Virtual Asset Users.

The act is slated to come into effect on July 19. An unnamed crypto industry official told the media outlet:

It is my understanding that the financial authorities will announce their new guidelines before the act comes into force. I believe that they are preparing to implement the guidelines as quickly as possible.

The news appears to have spooked the market. Some lower-cap altcoin prices have dropped on major exchanges.

Exchanges have been calling for calm, however. Media experts claim that high-cap coins like XRP, Solana, and Cardano with international credentials are safe.

They say that the FSS is much more likely to scrutinize lower-cap projects.

The market-leading South Korean crypto exchange Upbit said, in a press release published on June 19:

Upbit already has a maintenance review process for cryptoassets. [We] conduct reviews of the coins we list on a regular basis. The so-called lists of soon-to-be delisted coins spreading in some online communities are complete fiction.

The exchange concluded:

It is very unlikely that any such large-scale delistings will take place.

More:
Fears of Mass Altcoin Delistings Spread in South Korea - Cryptonews

Read More..

Altcoin Market Faces Winter Chill as $58 Billion in Tokens Set to Unlock Amid Dwindling Demand – West Island Blog

The altcoin market, akin to a chilly winter in the crypto landscape, is bearing witness to an accelerating sell-off. Early bird investors and project founders are rushing to unload their tokens amid a complex cocktail of factors. This downward trajectory, according to a recent analysis from Bloomberg, can be traced back to the unlocking wave of tokens held by venture capitalists (VCs) and founders, coupled with the persistent selling pressure fuelled by the intricate correlation between altcoins and dominant network tokens.

As we observe the crypto market bounce back from its steep downturn two years in the past, numerous project tokens have met their unlocking deadlines this year. These tokens, initially received by venture capitalists and founders as quid pro quo for investments or labor contributions, are now temptingly ready for sale.

A staggering 120 out of the 138 tokens under the watchful eyes of TokenUnlocks researchers share the timeline for unlocking this year. Their combined market value amounts to an approximate total of $58 billion. This potential wave of selling from these liberated VCs has inadvertently sparked a sequence of downside price reactions from non-VC holders. Tormented by the pressure to sell prematurely, they are frequently caught in the undertow of substantial price discounts.

The aftershocks of token unlocks have notably distressed the price performance of DYDX, Avalanche (AVAX), and Pyth (PYTH). Since mid-March, the token price of DYDX has more than halved, while AVAX and PYTH havent been spared the suffering either, recording similar plunges. Adding fuel to the fire, these three tokens were earmarked for unlocking in May, subsequently amplifying the selling pressure.

These token unlocks, once lauded as the essential engines propelling the prices in 2023, have now stepped into the spotlight under the intensified scrutiny of VCs and public participants. They are tipping the balance in favor of short-term profits, relegating long-term holdings for altcoins with unlocks to the backseat.

Interestingly, dating back to March 14, when Bitcoin hit an unprecedented high of $73,700, research shows that only 12 of the top 90 non-stablecoin assets tracked on centralized exchanges have yielded positive returns. In contrast, a staggering 81 have recorded negative returns. Bitcoin has tumbled around 12% following its peak, with most of the top 100 tokens recording a downturn surpassing 25%.

In the face of a plummeting market, smaller altcoins, particularly those entwined with major network tokens such as Ethereum (ETH) and Solana (SOL), are the first to feel the impact. The ripple effect of token unlocks bolsters this selling pressure, sending further shockwaves through the altcoin market.

Given this climate, Bloomberg highlighted the harsh conditions faced by infrastructure projects that emerged during the bear market phase. As these projects initiate their token release, demand from regular buyers at elevated prices appears constrained, painting a sobering picture of an altcoin market marked by a dearth of liquidity and an excess of tokens on the cusp of unlocking. This dynamic feeds into a downward spiral, dragging prices down with it.

In conclusion, the total crypto market capitalization has taken a hit and plunged to $2.19 trillion.

The rest is here:
Altcoin Market Faces Winter Chill as $58 Billion in Tokens Set to Unlock Amid Dwindling Demand - West Island Blog

Read More..

Analysts Identify 3 Altcoins: The Best Horses for the Run! – Kriptokoin.com

An analyst with a large following believes altcoins are poised for a bounce after a heavy correction. The analyst shares an altcoin that he thinks will outperform others. Analyst Aaryamann Shrivastava says there is more room above for OP and GRT.

As you have been following on Kriptokoin.com, the market is recovering from the sharp drop. However, some analysts expect a bounce for altcoins. The analyst nicknamed The Flow Horse says that altcoins will soon rise from the bottom of the market with an average return. In this context, the analyst said, Leaving Bitcoin aside, some of these altcoins will bounce very hard from the normal mean reversion. I may have to create a shopping list, but I still feel a bit indifferent about trading at least until July.

The analyst also picks Pepe (PEPE) as a meme coin that he believes will outperform others, including dogwifhat (WIF). The Flow Horse offers the following explanation for his picks:

Memecoins are not dead, but I dont know if you want to reference WIF as a representative pair or horse to bet on. WIF has fallen from its all-time high against Solana, is underperforming BTC ATH against BTC, underperforming both from their original April lows. Underperforming from recent highs. Therefore, the most suitable horse is PEPE.

Trading at $0.220 at the time of writing, The Graph (GRT) has hovered between $0.222 and $0.201 over the past week. During this time, attempts to break through resistance failed. Thus, the altcoin started testing support. Now, on-chain metrics highlight the potential for a rebound that could take the chart above $0.250. $0.222 also marks the 23.6% Fibonacci Retracement. Therefore, turning this level into support could help the rebound. The target for the GRT price is to retake $0.266 as a support level, which corresponds to the 38.2% Fib level.

However, if a bottom forms below $0.201, the altcoin is vulnerable to a correction. The bullish thesis could be invalidated if the token price drops as low as $0.151.

Optimism (OP), which was trading at $1.7 at the time of writing, is bouncing back from the $1.6 support. The altcoins target is to reclaim $1.8 as a support floor, where a break above $2.0 is necessary. The rise is supported by the bullish bias of investors; however, the chances of a rebound are slim until $2.0 is secured.

If this fails, the altcoin price could remain consolidated below $1.8 or suppressed below $2.0. Any decline below this line would invalidate the bull thesis and extend losses.

The opinions and forecasts in the article are those of analysts and are not investment advice. As Kriptokoin.com, we strongly recommend that you do your own research before investing.

Follow us on Twitter, Facebook and Instagram, and join our Telegram and YouTube channelto stay up to date with breaking news !

Read more:
Analysts Identify 3 Altcoins: The Best Horses for the Run! - Kriptokoin.com

Read More..

Best practices for protection from ransomware in cloud storage – TechTarget

Cloud storage is a tempting target for ransomware attacks because of its connections, accessibility and availability. Companies use cloud storage for their customer data and intellectual property for the same reasons.

Enterprises can take multiple measures to defend against ransomware in cloud storage. Prevention is essential to a modern cybersecurity strategy, especially for an enterprise that uses cloud storage and hybrid architectures.

Know what your company stores in the cloud, including its state and purpose.

Ensure relevant stakeholders regularly take cloud storage inventory, which can then centralize the information for easy access.

Not all data security is the same, and not all is needed for cloud storage.

Classify your data to help determine the monitoring and detection needed on data that matters most. For example, public-facing data does not require additional security measures beyond what cloud storage offers. Confidential information, IP-protected insights, financial data and personally identifiable information need complex protection and monitoring.

Protect data and workloads that access cloud storage through appropriate access controls, such as role-based access control, zero trust, multifactor authentication and the principle of least privilege.

Gated access prevents ransomware attackers from getting secondary access to cloud storage through unpatched vulnerabilities, misconfigurations and mismatched access accounts.

Network segments and perimeters can slow down cyberattackers' progress in the network regardless of their entry point.

Use load balancing tools with firewall rules that regulate the flow of authenticated traffic. Configure company policies and protocols for IP address and port access for authenticated use only. Secure and monitor all connections with other workloads to and from the cloud storage.

Sixty-eight percent of all breaches include a human element, such as privilege misuse, stolen credentials or social engineering, according to Verizon's "2024 Data Breach Investigations Report." Regular cybersecurity awareness training is critical because cyberattacks are always evolving.

Educated users and employees can help the company avoid the financial, legal and reputational costs of a ransomware attack in cloud storage. A few elements to include in ransomware training follow:

Ransomware attacks evolve quickly because criminals use AI and large language models to power their attacks. Likewise, ransomware protection has started to use AI and machine learning to defend against attacks.

Many top security products and cloud providers, such as Microsoft and Nvidia, use AI-driven adaptive protection features to automatically assess and block network connections and data transfers based on real-time predictions.

Incident response processes should include ransomware procedures, and more specifically, cloud storage ransomware attack procedures.

Consider looking beyond the first-line response teams to ensure the relevant teams know what to do. Teams that don't typically interact with cloud storage or incident response but might be impacted by a ransomware attack should have cloud-specific playbooks available.

Julia Borgini is a freelance technical copywriter and content marketing strategist who helps B2B technology companies publish valuable content.

The rest is here:
Best practices for protection from ransomware in cloud storage - TechTarget

Read More..

5 Things I Never Back Up to the Cloud – How-To Geek

Backing up your files to the cloud is super convenient since you can access them anywhere and on any device. However, there is a chance that your cloud storage could become compromised. If that ever happens, you'll be glad not to have the things on this list stored in it.

How secure your cloud files are depends on your cloud storage service, but if you use top-tier cloud services like Google Drive/One or Icedrive, you can rest easy that your data is mostly secure.

I say mostly because, no matter how many security measures the best cloud services put in place, youre still entrusting your files to a third party, and doing so creates vulnerabilities that a malicious actor can exploit to access your data.

One such vulnerability is that cloud service providers are very attractive targets for hackers and scammers. Most of the time, there's nothing to worry about as these cloud storage services have robust security systems that protect against cyber threats. But sometimes, they fail, and this can result in data breaches. An example is Dropbox, which suffered a breach that exposed customer emails, phone numbers, and passwords.

Another thing to consider is that not all cloud storage services have strict privacy policies. Some are more lax than others and do not eliminate the possibility of the company or its employees accessing the files you store.

You could also inadvertently compromise your cloud account by using a weak password or falling victim to a phishing scam.

So, while cloud storage is generally safe, its vulnerabilities make local storage a better option for some types of information. That's why I never back up these five things to the cloud.

Storing explicit images or videos on the cloud is a truly terrible idea. If your cloud storage is compromised, these images can be stolen, putting you at risk of a sextortion scam or even having these explicit images disseminated on the internet.

This is exactly what played out in the infamous 2014 iCloud celebrity photo leakan incident where cybercriminals accessed the iCloud accounts of several celebrities and obtained explicit photos. The pictures were then distributed on the internet, causing mental strain for the victims.

A more recent reminder of the risk of storing explicit photos was the iOS bug that caused pictures users had deleted months or even years ago to reappear on iPhones and iPads. Apple clarified that the cause of the bug was a corrupt database entry stored locally on the device, and not an issue with iCloud. But it was an unsettling reminder that deleted files are not truly gone until they are overwritten.

That means that explicit photos you upload to the cloud could still exist on a server somewhere, and could potentially be recovered long after they have been supposedly deleted. The chances of such a thing happening are slim, but with such high stakes, it's better to play it safe and keep all your NSFW pictures off the cloud.

Scanning your IDs and uploading them to the cloud can seem like a convenient and clever solution to carrying around physical IDs, but it comes with significant risks. If your cloud storage account is compromised, malicious actors can gain access to your personal information, which they can use for identity theft, phishing, and social engineering attacks.

Moreover, these malicious actors might also obtain crucial information about you that could compromise other accounts. For example, they may learn answers to common security questions like In what city were you born? or What high school did you attend? With this information, they can easily reset your passwords and gain access to other sensitive accounts.

Storing sensitive financial documents like tax returns, credit card numbers, and bank account details in the cloud can expose you to financial fraud. If your account is ever breached, cybercriminals can use this information to take out loans in your name or access your accounts, leaving you with large financial losses and debt you didn't anticipate.

Even if you don't lose any money or wind up saddled with any fraudulent debt, sorting out the mess is going to require time and effort. It is best to avoid the risk entirely.

These days, it feels like you need an account for everything, and it is nearly impossible to keep track of the different username and password combinations for all your accounts. Some people try to get around this by creating a text file to store their passwords and then saving it in the cloud for easy access.

However, storing all your passwords in a single file on the cloud is like handing cybercriminals the keys to your entire digital life. If they breach one layer of defense, they gain access to every account you have, leading to a cascade of security failures.

A much safer alternative is to use a password manager. With a password manager, you only need to remember one master password. The manager will securely handle the rest, generating strong, unique passwords for each of your accounts, autofilling them when you log in, and alerting you if any of your passwords are compromised.

It's a good idea to store backups of your manuscripts and other intellectual property locally, rather than in the cloud. Otherwise, if your cloud storage is breached and your work is stolen, it can be nearly impossible to regain control.

Instead of storing your sensitive files in the cloud, you'd be better off backing up your data to an external hard drive, encrypting it, and storing it somewhere safe. It might make it more difficult for you to access your data, but when it comes to sensitive data, I believe the certainty of security far outweighs the convenience of accessibility.

View original post here:
5 Things I Never Back Up to the Cloud - How-To Geek

Read More..

Cloud Breaches Impact Nearly Half of Organizations – Infosecurity Magazine

Nearly half (44%) of organizations have experienced a cloud data breach, with 14% reporting having had an incident in the past 12 months, according to Thales 2024 Cloud Security Study.

Human error and misconfigurations occurred in 31% of breaches, the top root cause of cloud breaches. This was significantly lower compared to last years report, where over half (55%) of cloud incidents were caused by human error.

Exploitation of known vulnerabilities was the next highest root cause of cloud breaches, at 28%, representing a seven-point increase compared to Thales 2023 report.

Exploitation of previously unknown vulnerabilities/zero days accounted for 24% of breaches.

Failure to use multi-factor authentication (MFA) was another significant cause of cloud breaches, identified in 17% of cases.

Read here: Vulnerability Exploitation on the Rise as Attackers Ditch Phishing

The biggest cloud targets cited by respondents were SaaS applications (31%), cloud storage (30%) and cloud management infrastructure (26%).

Of those who identified cloud management infrastructure as a target, 72% identified underlying infrastructure compromise as a target of increasing attacks.

The Thales report highlighted the expanding cloud attack surface for attackers, with 66% of organizations using more than 25 SaaS applications.

Additionally, 47% of corporate data held in the cloud is sensitive. Despite this, less than 10% of enterprises have encrypted 80% or more of their cloud data.

Nearly half of respondents said they agree or strongly agree that it is more difficult to manage compliance and privacy due to cloud complexity a similar proportion to the previous three Thales Cloud Security reports.

This complexity challenges the management of encrypted content in cloud environments, with 53% indicating that they use five or more key management systems.

The researchers said that this level of complexity raises the risk of human error occurring.

Sebastien Cano, Senior Vice President for Cloud Protection and Licensing activities at Thales, commented: The scalability and flexibility that the cloud offers is highly compelling for organizations, so its no surprise it is central to their security strategies.

He added, However, as the cloud attack surface expands, organizations must get a firm grasp on the data they have stored in the cloud, the keys theyre using to encrypt it, and the ability to have complete visibility into who is accessing the data and how it being used. It is vital to solve these challenges now, especially as data sovereignty and privacy have emerged as top concerns in this years research.

Around two-thirds (65%) of respondents identified cloud security as a current concern, and cloud security was the top category of security spending, reported by 33% of all respondents.

See more here:
Cloud Breaches Impact Nearly Half of Organizations - Infosecurity Magazine

Read More..

Cloud data breaches are becoming a serious threat for businesses everywhere – TechRadar

As the use of cloud among organizations continues to grow, hackers are increasingly targeting cloud resources, wreaking havoc among the victims, new research ahs warned.

The 2024 Thales Cloud Security Study, based on a poll of almost 3,000 IT and security professionals across 18 countries and 37 industries, Tfound almost half (44%) of respondents experienced a cloud data breach, with 14% suffering one in the last 12 months.

SaaS applications are the biggest target (31%), followed by cloud storage (30%), and Cloud Management Infrastructure (26%) categories. This share also makes sense knowing how organizations use the cloud. Two-thirds (66%) are using more than 25 SaaS applications, and almost half (47%) of the data theyre using is labeled sensitive. At the same time, data encryption rates remain low, with less than 10% of enterprises encrypting 80% or more of their sensitive cloud data.

When discussing the causes of these incidents, Thales found human error and misconfiguration continues being the biggest issue with cloud-based solutions (31%), followed by exploiting known vulnerabilities (28%), and failing to use multi-factor authentication (MFA - 17%).

All of this has forced organizations to be more proactive when it comes to defending their cloud premises, and to invest more in cybersecurity. Many are now focused on digital sovereignty, and on refactoring applications to logically separate, secure, store, and process cloud data.

The number one motivation behind digital sovereignty was future-proofing cloud environments (31%), followed by adhering to regulations (22%).

As the cloud attack surface expands, organizations must get a firm grasp on the data they have stored in the cloud, the keys theyre using to encrypt it, and the ability to have complete visibility into who is accessing the data and how it being used, said Sebastien Cano, Senior Vice President for Cloud Protection and Licensing activities at Thales.

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

It is vital to solve these challenges now, especially as data sovereignty and privacy have emerged as top concerns in this years research.

Read this article:
Cloud data breaches are becoming a serious threat for businesses everywhere - TechRadar

Read More..

AWS’ 10 Hottest New Products And Tools Of 2024 (So Far) – CRN

From Amazon Q Business and AI Agents to new cloud storage and Amazon Bedrock tools, here are the 10 coolest new AWS products launched in 2024 so far.

From its new Amazon Q Developer and Business products to new cloud storage and Amazon Bedrock offerings, Amazon Web Services product innovation engine has been on fire in 2024, specifically around artificial intelligence.

The world leader in cloud computing is pouring billions into new products and AWS data centers that power the $100 billion companys offerings and services.

AWS new generative AI products and AI-powered cybersecurity innovation are top of mind for the companys new CEO, Matt Garman.

With security as the absolute baseline, the next most critical thing for AWS today is innovating on behalf of our customers in the realm of generative AI, Garman said in a recent blog post. Generative AI is going to disrupt and change almost every industry and customer experience in the world. Its an area where we have invested heavily and will continue to do so.

[Related: AWS New CEO Garman Unveils Leadership Changes]

AWS generated a record $25 billion in revenue during first-quarter 2024, an increase of 17 percent year over year.

The Seattle-based company is the worldwide market-share leader in cloud computing services, owning 31 percent share of the global market in first-quarter 2024, followed by Microsoft at 25 percent share and Google Cloud at 11 percent share.

With Garman now at the helm, he looks to take AWS GenAI product road map to the next level.

Its our job to help customers easily build any type of generative AI applications and make sure they perform well, do so securely, responsibly, and in the most sustainable way possible, said Garman. Whatever it takes, when it comes to generative AI, AWS is well positioned to build it.

CRN breaks down the 10 biggest new AWS product launches of 2024 so far that every partner should know about.

Amazon Q Developer

Becoming generally available this year, Amazon Q is AWS new generative AI-powered assistant designed for work.

Customers can use Amazon Q to have conversations, solve problems, generate content, gain insight and take action by connecting to their companys information repositories, code, data and enterprise systems. The new GenAI collaborative assistant helps business users complete tasks using simple natural language prompts.

Launched in April, Amazon Q Developer aims to reimagine the developer experience across the entire software development life cycle.

Amazon Q Developer allows developers to offload time-consuming, manual tasks inside or outside AWS. Capabilities include Q&A and diagnosing common errors in the AWS Management Console; Amazon Q data integration to let users build data integration pipelines using natural language; conversational coding and inline code generation, and Amazon Q Developer Agent for software development.

Amazon Q Developer also includes Amazon Q Developer Agent for code transformation, a feature that can accelerate users application maintenance, upgrades and migration in minutes. In addition, the offering lists and describes resources in a users AWS account and can now help the user retrieve and analyze cost data from AWS Cost Explorer.

Guardrails For Amazon Bedrock

In one of the biggest security launches of the year, AWS unleashed Guardrails for Amazon Bedrock.

Guardrails for Amazon Bedrock implements safeguards customized to a business application requirements. AWS touts its Bedrock platform as the easiest way for businesses to build and scale generative AI-based applications.

The new Guardrails offering evaluates user input and foundation model responses based on use-case-specific policies and provides an additional layer of safeguards regardless of the underlying foundation model.

It has capabilities to safeguard your generative AI applications with more responsible AI policies. So now you have a consistent level of protection across all of your GenAI development activities, said AWS former CEO, Adam Selipsky, this year.

Guardrails can be applied across foundation models, including Anthropic Claude, Meta Llama 2, Cohere Command, AI21 Labs Jurassic and Amazon Titan Text, as well as fine-tuned models. Customers can create multiple guardrails, each configured with a different combination of controls, and use these guardrails across different applications and use cases.

Amazon WorkSpaces Thin Client

AWS recently debuted its new Amazon WorkSpaces Thin Client device for virtual desktop access for a price tag starting at $195 per device.

The hardware has purpose-built firmware and software, an operating system engineered for employees who need simple and secure access to applications in the cloud, and software that allows IT to remotely manage it.

Amazon WorkSpaces Thin Client is optimized for the AWS Cloud. For the first time, AWS has adapted a consumer devicethe Fire TV Cubeinto an external hardware product for AWS customers.

For a significant portion of the workforce, some form of remote and hybrid work is here to stay, particularly in industries such as customer service, technical support and health care, said Amazon in a blog post this year. Employees need quick, reliable access to a variety of business applications and dataregardless of where they are working. Enter the Amazon WorkSpaces Thin Client.

The devices are sold through Amazon Business, the companys B2B marketplace, with customers being able to order preconfigured hardware.

Amazon Bedrock Studio

Amazon Bedrock Studio offers a web-based experience to accelerate the development of generative AI applications by providing a rapid prototyping environment with key Amazon Bedrock features, including Knowledge Bases, Agents and Guardrails.

Amazon Bedrock Studio provides an easy way for developers across an organization to experiment with large language models (LLMs) and other foundationamodels, collaborate on projects and iterate on generative AI applications.

To enable Bedrock Studio, AWS administrators can configure one or more workspaces for their organization in the AWS Management Console for Bedrock and grant permissions to individuals or groups to use the workspace.

Amazon Q Business

Amazon Q Business recently became generally available and is aimed at revolutionizing the way that employees interact with organizational knowledge and enterprise systems.

Amazon Q Business helps users get comprehensive answers to complex questions and take actions in a unified web-based chat experienceall using an enterprises existing content, data and systems.

The offering connects seamlessly to over 40 popular enterprise systems, including Amazon Simple Storage Service (Amazon S3), Microsoft 365 and Salesforce. It ensures that users access content securely with their existing credentials using single sign-on, according to their permissions, and enterprise-level access controls.

Amazon Q Business also recently introduced custom plugins. Admins can connect any third-party application with custom plugins so that employees can use natural language prompts to perform actions like submitting time-off requests and sending meeting invites directly through Amazon Q Business.

Amazon S3 Express One Zone

On the cloud storage front, AWS unleashed Amazon S3 Express One Zone this year.

Amazon S3 Express One Zone is a high-performance, single-Availability Zone storage class purpose-built to deliver consistent single-digit millisecond data access for customers most frequently accessed data and latency-sensitive applications.

With S3 Express One Zone, storage automatically scales up or down based on a customers consumption and need, while users no longer need to manage multiple storage systems for low-latency workloads.

Amazon S3 Express One supports millions of requests per minute, with consistent single-digit millisecond latencythe fastest object storage in the cloud, said AWS Selipsky earlier this year. And up to 10 times faster than S3 standard storage.

While AWS customers have always been able to choose a specific AWS Region to store their S3 data, S3 Express One Zone enables them to select a specific AWS Availability Zone within an AWS Region to store their data. Customers can choose to co-locate their storage with their compute resources in the same Availability Zone to further optimize performance. Data is stored in a different bucket typean S3 directory bucketwhich supports hundreds of thousands of requests per second.

AI Agents for Amazon Bedrock

AI Agents for Amazon Bedrock enable generative AI applications to execute multistep tasks across company systems and data sources.

Agents for Amazon Bedrock securely connects to a companys data sources, automatically converts data into numerical representations, and augments the user request with the right information to generate an accurate and relevant response.

AWS new simplified agent creation lets users define an action schema and get the control back to perform those actions without needing to create a specific AWS Lambda function. Agents also added support for Anthropic Claude 3 Haiku and Sonnet to help build faster and more intelligent agents.

Agents for Amazon Bedrock create a prompt from the developer-provided instructions, API details needed to complete the tasks, and company data source details from knowledge bases. The automatic prompt creation saves weeks of experimenting with prompts for different foundation models.

Overall, AWS said Agents for Amazon Bedrock enhance operational efficiency, customer service and decision-making while reducing costs and facilitating innovation.

New AWS Generative AI Partner Competency

On of the most important new AWS tools on the partner front was this years launch of the new AWS Generative AI Competency.

The new competency is designed to feature partners who have technical proficiency and a track record of customer success when implementing GenAI, with the goal of winning more AI customer deals.

Leveraging technologies such as Amazon Bedrock, Amazon Q and Amazon SageMaker JumpStart, these partners have deep expertise building and deploying groundbreaking applications across industries, said Selipsky earlier this year. Our AWS Generative AI Competency Partners will make it easier than ever for customers to innovate with enterprise-grade security and privacy, choice of foundation models, generative AI applications, and a high-performance, low-cost infrastructure.

The AWS Generative AI Competency will include AWS Partner Network (APN) Technology Partners and APN Services Partners.

Software path partners will have to show their proficiency in either generative AI applications, foundation models and application development, or in infrastructure and data.

Services path partners will need to show proficiency in end-to-end generative AI consulting.

Nvidias New Blackwell GPU Platform Comes To AWS

Nvidia says its new Blackwell GPU platform will enable up to 30 times greater inference performance and consume 25 times less energy for large AI models.

Nvidias Blackwell platform is coming to the AWS cloud with the goal of speeding up inference workloads for resource-intensive, multitrillion-parameter language models.

AWS will provide the Nvidia GB200 Grace Blackwell Superchip and B100 Tensor Core GPUs on its cloud platform.

Not only will we offer Nvidias new Grace Blackwell GPU platform running seamlessly on AWS, were integrating it with our industry-leading networking, virtualization and security capabilitiesmaking it possible for customers to build and run multitrillion-parameter large language models faster, at massive scale, and more securely than anywhere else, said Selipsky.

In addition, AWS offers new Nvidia Grace Blackwell GPU-based Amazon EC2 instances and Nvidia DGX Cloud to accelerate performance of building and running inference on multitrillion-parameter LLMs.

Amazon Bedrock Revamped

The Amazon Bedrock of 2024 looks very different from the Bedrock of 2023.

Although not entirely a new product, AWS flagship AI offering, Amazon Bedrock, has been significantly revamped in 2024.

This includes a new Custom Model Import where users can import customized models into Amazon Bedrock to accelerate generative AI application development. The feature allows customers to leverage their prior model customization investments within Amazon Bedrock and consume them in the same manner as Bedrocks existing models.

Amazons Titan Image Generator model also is now generally available in Amazon Bedrock, helping users easily build and scale generative AI applications with new image generation and image editing capabilities.

A slew of the newest foundation models launched by third parties in 2024 have also become available on Bedrock, including Mistral Small FM as well as Anthropics new Claude 3 models such as Opus and Sonnet.

See original here:
AWS' 10 Hottest New Products And Tools Of 2024 (So Far) - CRN

Read More..

Proton Drive Brings Automatic Photo Backups to iOS – Lifehacker

When phones also became cameras, many of us started taking photos every day. These photos might be of your pets, your food, or even special events like weddings and birthdays. Or maybe you've got more precious photos, perhaps of a family member who's no longer with you. Lots of photos mean lots of data management, and to protect your snapshots, you'll want to back them up.

But not all cloud storage is created equal, and while Apples built-in iCloud systems are perfectly useable, Proton has now updated the iOS version of its impressive cloud storage service with automatic photo backup, allowing you to protect your most precious memories with complete end-to-end encryption.

This newly released feature, previously only available on Android, comes just weeks after some users reported their old, deleted photos coming back to their iPhones after they updated to a new version of iOS. While Apple has fixed the issue now and does offer options for end-to-end encryption, it still raised some concerns about just how in control Apple users are when it comes to their own photos, and options like Proton Drive can give you a great alternative to iCloud without having to worry about sacrificing your privacy.

There are, of course, other non-Apple cloud storage options on the App Store. Google Photos, which comes pre-installed on Android phones, is probably the most well-known and used iCloud competitor. However, Proton Drive offers something that Google Photos doesntcomplete end-to-end encryption.

Sure, your photos are protected with Google Photos, but Google still has access to your precious memories, as your photos arent encrypted until they are uploaded to Googles servers. With Proton Drive, nobody but you and the people you share your content with have access to those files. Thats because Proton Drive encrypts your photos and their metadata right there on your phone before they transfer to Protons servers. This ensures only you have access to your data, making it one of the best options for users who want to protect their memories and privacy with the utmost care.

Access the menu in the top-left hand corner, then tap Settings and toggle Photos backup to back your photos up to Proton Drive. Credit: Joshua Hawkins

Automatic photo backup is a feature that I've wanted to see in Proton Drive since I started using it several months ago, and Proton says that it has been one of the most requested features from its community, too. The feature rolled out last week, and you can enable the automatic camera uploads in the app by opening the app on your iPhone and accessing the hamburger menu in the upper left-hand corner (the icon that looks like three horizontal lines on top of each other). From there, simply tap on Settings and then toggle Photos Backup to on, and the app will start backing up your photos automatically each time you take a new one.

The addition of photo backup in Proton Drive makes it even easier to completely quit Google, something that privacy-focused individuals may want to consider, as Google and other online cloud services have access to your personal data when it is stored on their servers.

More:
Proton Drive Brings Automatic Photo Backups to iOS - Lifehacker

Read More..