Joget Awarded Funding Through Catalyst Fund 7 for Its No-code Application Integration with the Cardano Blockchain – PR Newswire

"We welcome all builders and innovators creating useful applications on the Cardano blockchain and are impressed by the growth of the ecosystem facilitated by community decision making and the decentralized governance of Project Catalyst," said Kriss Baird, Product Owner of Input Output Global (IOG).

Citizen Developers, typically business users with little coding experience, can now visually develop applications integrated with the Cardano blockchain using the recently released Cardano Blockchain Pack. Joget plans to use the fund to further enhance the development of the plugin and expand its capabilities with more advanced features. By integrating blockchain technology with a no-code/low-code application platform like Joget, organizations can rapidly kick start their digitalization journey while lowering the associated costs and risks. This helps to narrow the gap between traditional application development methodology and a modernized no-code/low-code approach.

"We see blockchain as a critical component to the foundation of next-generation technological innovations, and we want to bring it to the masses with our no-code/low-code approach," said Raveesh Dewan, CEO of Joget, Inc. "We are thankful to the Cardano Community and the Catalyst Fund team for believing in and supporting our approach."

The Cardano Blockchain Pack is published on JogetOSS, an open source repository for the Joget platform, and a step-by-step tutorial is available on the Joget Knowledge Base.

About Joget, Inc.Joget, Inc is the developer of the Joget open source no-code/low-code application platform. Joget empowers business users, non-coders (Citizen Developers) or coders to create enterprise applications across industries and countries. With more than 200,000 downloads, 3,000 installations and 12,000 community users worldwide across various industries (including finance, manufacturing, IT, and more), Joget is a proven platform for a wide spectrum of organizations ranging from Fortune 500 companies to government agencies and small businesses.

ContactsMedia Relations[emailprotected]1.888.60J.OGET (1.888.605.6438)

SOURCE Joget

View original post here:

Joget Awarded Funding Through Catalyst Fund 7 for Its No-code Application Integration with the Cardano Blockchain - PR Newswire

Free security training from the Open Source Security Foundation – IT Brief Australia

A free training course on developing secure software from the Open Source Security Foundation is now available.

Cybersecurity breaches have become household names in recent years, Log4Shell, SolarWinds Compromise, Heartbleed, to name a few. These are costing organisations billions of dollars in prevention and remediation costs and are becoming more and more common.

Reacting to breaches after the fact is helpful, but not enough; such reactions fail to protect users in the first place. Security needs to instead be baked into the software before its released. Unfortunately, most software developers dont know how to do this.

The Open Source Security Foundation (OpenSSF) has partnered with Linux Foundation Training & Certification to release a free online training course, Developing Secure Software. The two organisations say the training course will help elevate these security issues and improve access to cybersecurity training for everyone from developers to operations teams to end-users.

Those who complete the course and pass the final exam will earn a certificate of completion valid for two years.

The course is geared towards software developers, DevOps professionals, software engineers, web application developers, and others interested in learning how to develop secure software. It focuses on practical steps that can be taken, even with limited resources, to improve information security.

The goal is to make it easier to create and maintain systems that are much harder to successfully attack, reduce the damage when attacks are successful, and speed the response so that any latent vulnerabilities can be rapidly repaired.

The course discusses the basics of cybersecurity, such as what risk management means. It discusses how to consider security as part of the requirements of a system and what potential security requirements you might consider. It then focuses on designing software to be secure, including various secure design principles that will help you avoid bad designs and embrace good ones.

The course also covers how to secure your software supply chain and more securely select and acquire reused software (including open-source software) to enhance security.

There is also a focus on key implementation issues and practical steps that you can take to counter the most common kinds of attacks. It also discusses more specialised topics, such as how to develop a threat model and how to apply various cryptographic capabilities. The course content mirrors the Secure Software Development program offered with edX, but in a single course instead of three.

The self-paced course can be completed in about 14-18 hours and includes quizzes to test the knowledge gained. Upon completion, participants will receive a digital badge verifying they have completed all required coursework and have learned the material. The digital badge can be added to resumes and social media profiles.

See original here:

Free security training from the Open Source Security Foundation - IT Brief Australia

Kestra: A Scalable Open-Source Orchestration and Scheduling Platform – InfoQ.com

Kestra, a new open-source orchestration and scheduling platform, helps developers to build, run, schedule, and monitor complex pipelines.

It is built upon well-known tools like Apache Kafka and ElasticSearch. The Kafka architecture provides scalability: every worker in Kestra cluster is implemented as a Kafka consumer and the state of the execution of a workflow is managed by an executor implemented with Kafka Streams. ElasticSearch is used as a database that allows displaying, searching and aggregating all the data.

The concept of a workflow, called Flow in Kestra, is at the heart of the platform. It is a list of tasks defined with a descriptive language based on yaml. It can be used to describe simple workflows but it allows more complex scenarios such as dynamic tasks and flow dependencies.

Flows can be based on events such as results of other flows, detection of files from Google Cloud Storage or results of a SQL query. Flows can also be scheduled at regular intervals based on a cron expression. Furthermore, Kestra exposes an API to trigger a workflow from any application or simply start it directly from the Web UI.

Kestra, in fact, provides a rich web interface that allows developers to edit, run, and monitor flows in real-time.

A Kestra web interface is shown below:

Kestra can be employed as a data orchestrator: to handle complex workflow, moving, transforming and loading large datasets (ETL or ELT); as distributed crontab to schedule work on multiples workers and monitor all these processes; or as events driven workflow to react to external events like API calls.

It can be deployed anywhere, for example, on Kubernetes, Cloud Compute, Docker or even on-premises. And thanks to its pluggable architecture, additional features can be added with plugins such as integration with Amazon S3, Apache Avro, Google BigQuery and MongoDB.

The Kestra platform is similar to Apache Airflow, but the latter relies on workflows written in Python instead of yaml.

An example of a flow written in yaml is shown below:

The latest release improved the overall performance by reducing CPU usage and latency and introduced a new JDBC plugin that allows for bulk queries.

The software is still relatively new since the team announced the first public release in February 2022. The latest version, 0.4.2, is available on the Github repository, but it is already used in production by Leroy Merlin, one of the retail leaders in Europe.

Originally posted here:

Kestra: A Scalable Open-Source Orchestration and Scheduling Platform - InfoQ.com

How Atlassian’s dual-CEO structure has helped the Australian software company thrive – CNBC

Atlassian's founders and co-CEOs, Scott Farquhar, left, and Mike Cannon-Brookes.

Atlassian

In this weekly series, CNBC takes a look at companies that made the inaugural Disruptor 50 list, 10 years later.

In early March, collaboration software maker Atlassian published a blog post titled, "Atlassian stands with Ukraine," laying out the company's plans to support employees and customers in the region and announcing it was "pausing the sale of all new software to Russia."

The post was signed by co-CEOs Scott Farquhar and Mike Cannon-Brookes. They went back and forth on the content and the main points. But Farquhar did most of the work, freeing up Cannon-Brookes.

That's one of many conveniences of keeping two people at the top of a company. The atypical structure has helped propel the Australians' 20-year-old firm into the top tier of the competitive software industry, with products so well known that big companies might find it difficult to move away.

In 2013, Atlassian landed on CNBC's inaugural Disruptor 50 list of private companies worth watching, ahead of its 2015 Nasdaq debut. The stock has risen almost 1,000% since then, compared with 124% growth for the S&P 500 over the same period.

The duo have had the same job at the same company for 20 years, they were born one month apart, they became parents three months apart, they were best men at each other's weddings, and they own property next to each other in Sydney. "Our stock ticker is TEAM, and so, yeah, that's what we're about," Farquhar said.

But they're different people. Cannon-Brookes is a long-haired idealist, who became an owner of a U.S. basketball team and attempted a takeover of Australian utility company AGL Energy. His comments are sprinkled with obscenities. Farquhar is clean-cut and careful as he speaks. Early investor Rich Wong of Accel calls Farquhar more analytical.

"Mike is kind of the quintessential unreasonable man," Farquhar said. "'The world should work this way.' 'Mike, it doesn't yet.'"

Farquhar and Cannon-Brookes became friends in the late 1990s after taking the same course at the University of New South Wales. The technology bubble broke around the time they graduated, and facing a dearth of job prospects, they formed a business. Initially it offered support for another company's application server. Then it changed direction and started building its own software. The first version of Jira, a tool for tracking issues and projects, appeared in 2002.

Within about five years, many Accel-backed start-ups had embraced Jira. "It was already the standard that you had to integrate your software with," Wong said. The company widened its portfolio with the 2004 launch of document-collaboration service Confluence and the 2012 acquisition of team messaging app HipChat. Along the way, Atlassian released versions of Jira for different types of workers.

Today Jira is a market leader, transcending its status as Silicon Valley darling and overtaking heavyweights with decades of experience selling to enterprises. Atlassian controlled greater share than any other company in the market for software change, configuration and process management tools in 2020, ahead of Microsoft, IBM and Broadcom, according to an estimate from researcher IDC. Atlassian's revenue in the market grew about 22% year over year, faster than the overall category, which expanded almost 15% to $4.8 billion, based on IDC's data.

Part of the momentum derives from programmers getting to try out Atlassian's software for free before they pay for it. The strategy goes back to the founders.

"Our exposure to software started with things like games," Farquhar said. "Back then, games had different business models. You could buy your PlayStation ones shrink-wrapped. If you look at Id Software, they came out with a shareware model, sort of try before you buy. We thought that was a great way to sell software, because of course you want to try before you buy. At SAP, there's no trying. You get to see what it looks like, because it takes that long to implement it." (SAP does offer free trials for some of its products.)

Atlassian was either the first or very early to sell software with a freemium offer, Farquhar said, adding that cloud file sharing app maker Dropbox made it more popular. And in the late 1990s Red Hat, which IBM later acquired, gave away CDs containing its distribution of the open-source Linux operating system and permitted people to download it free of charge.

Lacking a pile of money from venture capitalists for its first eight years, Atlassian skipped the custom of assembling a squadron of salespeople to score deals. Now, though, there are a few on staff who pursue select business opportunities, Farquhar said.

Focusing less on selling hard and more on delivering products people actually want to use has given rise to a robust financial profile. Atlassian enjoys the fifth widest gross margin of all 76 constituents of the WisdomTree Cloud Computing Fund, at 83%.

That status has caught the attention of investors.

"In my history of 33 years of doing this, I have seen more than a handful of companies that have tried to do it without an internal salesforce, or an external salesforce, either. The thing I would say about Atlassian is they're the most successful at it," said Brendan Connaughton, founder and managing partner of Catalyst Private Wealth, which held $91 million in Atlassian stock at the end of 2021, its largest position at the time.

Like many other cloud stocks, Atlassian isn't actually profitable. Connaughton said Cannon-Brookes and Farquhar would find it easier to turn Atlassian into an actual moneymaker than its peers, thanks to its relatively sparse sales team.

A more prominent feature of Atlassian's 7,000-person organization is the group that actually builds the company's wares. Engineering, product and design report to Cannon-Brookes. Farquhar supervises legal, human resources, finance, sales, marketing and customer-support teams. "I'm sort of the grandparents," Farquhar said. "I leave him to deal with the temper tantrums and the screaming."

When they talk about responsibility, they consider both skills and enjoyment. You don't want someone who's good at handling a task but doesn't like doing it, and vice-versa, Cannon-Brookes said.

Marketing and sales reported to Cannon-Brookes for 15 years, and engineering once reported to Farquhar. And they've both run the entire company at different times. They've gone on sabbaticals. Last year Farquhar took three months off to caravan with family around northwestern Australia. "We sort of got to travel unencumbered," he said. "I think other CEOs would have to retire or quit to be able to take a break that long."

The structure has contributed to Atlassian's success, said Gregg Moskowitz, an analyst at Mizuho.

"I think it has helped, having two strong executives at the very top who see eye to eye, at least on all the important issues," he said. Other technology companies have employed CEOs in pairs, including Autodesk, Ceridian, Oracle, Salesforce, SAP and Workday. Alphabet's autonomous-driving subsidiary Waymo recently went the co-CEO route.

The strategy has a mixed history, Moskowitz said, saying it didn't work well at all at handset maker BlackBerry. The relationship between co-CEOs Jim Balsillie and co-founder Mike Lazaridis "had gone cold," according to one account, and the two stepped down.

What's different for Atlassian is both Cannon-Brookes and Farquhar are founders, said Wong, the Accel investor. Their combined knowledge helps them move faster, he said.

Wong pointed to Atlassian's 2017 acquisition of task-management app Trello for $384 million, still the company's largest deal to date. At Trello it was a shock, because Atlassian's Jira was viewed as a competitor, said Stella Garber, who ran marketing at Trello at the time.

"I think it took conviction of the founders to say, 'I know we could have built it, but it would take us time, and it would really expand the organization if we make the choice now and pay what it takes to get the acquisition done,'" Wong said.

When there's an issue on Cannon-Brookes' turf, it's his decision to make. But when it's something big, he consults with Farquhar, because it's almost certainly going to affect them both. There are plenty such examples in and around the company right now, and it's natural that they divvy things up.

"The pandemic and Russia and Ukraine at the moment Sydney is under floods," Cannon-Brookes said. "Put it all together, and there's a lot of things you need to deal with in a growth biz that aren't just the product."

Farquhar said he and Cannon-Brookes had long conversations about what to do with their team-messaging app Stride, which arrived in 2017 as Slack and Microsoft Teams were gaining momentum.

"It was weird, actually, because everyone was talking about how good Slack is. We were using Stride internally," Farquhar said. "The product was actually better. The Slack thing is amazing. It's actually not as good as what we had. We had to make a decision."

Ultimately, Atlassian shut down Stride and HipChat Cloud and sold the intellectual property to Slack. It also bought an equity stake in Slack, which shot up in value as Slack stock appeared on the New York Stock Exchange in 2019.

When Cannon-Brookes and Farquhar were younger, they could close the office door and have a conversation with each other about a crisis, and for fun they might go mountain biking or drink beer together. The pandemic stopped them from seeing each other in person so often. They've gotten good at connecting on Zoom, Farquhar said.

Cannon-Brookes doesn't need to massage what he says to Farquhar. Without prompting, he imagined what would happen if Farquhar were to leave.

"I'd be constantly explaining things, which would feel like I was talking down to someone," he said. "'Good idea, but let me tell you what happened in 2012.'"

Sign upfor our weekly, original newsletter that goes beyond the annual Disruptor 50 list, offering a closer look at companies like Atlassian before they go public, and founders like Cannon-Brookes and Farquhar who continue to innovate across every sector of the economy.

View post:

How Atlassian's dual-CEO structure has helped the Australian software company thrive - CNBC

New ‘AcidRain’ malware may be connected to Viasat attack – TechTarget

A post from SentinelOne describes a new wiper malware dubbed "AcidRain" that may be connected to last month's Viasat attack.

Viasat, a U.S.-based communications company, confirmed via press release Wednesday that it suffered a cyber attack last month. The attack targeted the company's KA-SAT satellite internet network and affected "several thousand" customers in Ukraine, as well as tens of thousands of fixed broadband customers across Europe.

The internet provider called the attack "multifaceted and deliberate," and gave some specific attack details in its press release. Viasat did not attribute the attack to a specific threat actor however, nor did it provide complete details regarding how the attack occurred.

A Thursday blog post by SentinelOne's SentinelLabs discussed the attack as well as a potential malware -- and threat actor -- behind it. The security vendor described AcidRain as a "malware designed to wipe modems and routers."

Wipers are a destructive class of malware intended to erase the storage contents of the devices it infects, as opposed to something like ransomware, which typically has an end goal of extortion. SentinelLabs researchers and post authors Juan Andres Guerrero-Saade and Max van Amerongen referred to AcidRain as the seventh wiper used in the ongoing Russian war with Ukraine.

The authors described the wiper's functionality as "relatively straightforward."

"AcidRain's functionality is relatively straightforward and takes a brute-force attempt that possibly signifies that the attackers were either unfamiliar with the particulars of the target firmware or wanted the tool to remain generic and reusable," the post read. "The binary performs an in-depth wipe of the filesystem and various known storage device files. If the code is running as root, AcidRain performs an initial recursive overwrite and delete of non-standard files in the filesystem."

SentinelOne hypothesized that AcidRain was utilized alongside other potential binaries and scripts through a supply chain attack, mainly due to the functionality of the malware and how it matches with open source intelligence surrounding the attack.

Viasat told SearchSecurity in a statement that it does not view the incident as a supply chain attack or vulnerability, and the company expects to share more details when the investigation is complete.

"The facts provided in the Viasat incident report yesterday are accurate," the statement read. "The analysis in the SentinelLabs report regarding the ukrop binary is consistent with the facts in our report; specifically, SentinelLabs identifies the destructive executable that was run on the modems using a legitimate management command, as Viasat previously described."

SentinelOne did not attempt to directly attribute AcidRain to any specific threat actor. However, the vendor assessed "with medium confidence" developmental and code overlaps between the malware and a VPNFilter plugin attributed to prominent Russian APT Sandworm. Sandworm is known for the 2017 NotPetya ransomware attacks and, more recently, a botnet known as "Cyclops Blink."

Guerrero-Saade told SearchSecurity that the destructive motivations of AcidRain "fit the bill perfectly" with the Sandworm seen in 2018 and prior, but added he and van Amerongen "wanted to present the development overlaps with the least possible hyperbole given the sensitive nature of the attack."

Asked to explain the code overlap further, Guerrero-Saade said that judging such similarities "takes a lot of expertise and care."

"This isn't source code compared to source code, but rather the output of a compiler (with all of its settings and optimizations) that creates an executable binary," he said via email. "That means there's a lot of boilerplate standard library code, there are compiler optimizations, and then there's custom written code. It appears that the compiler and its settings are the same, the same standard library (libc), and some code implementation similarities (and dissimilarities), hence putting it at medium confidence. It's worth noting that there's an approximate four-year gap between the development of that VPNFilter plugin and AcidRain, and changes are to be expected."

Alexander Culafi is a writer, journalist and podcaster based in Boston.

See original here:

New 'AcidRain' malware may be connected to Viasat attack - TechTarget

The Importance of Open Source to an XDR Architecture – SecurityWeek

No longer satisfied with infecting files or systems, adversaries are now intent on crippling entire enterprises. Damaging supply chain, ransomware and wiper attacks are making headline news, impacting not only the organization but their stakeholders too. As threat actors approaches and targets change, our approach to detection and response is changing as well.

Extended Detection and Response (XDR) is now widely considered to be the most effective path forward to enable detection and response across the infrastructure, across all attack vectors, across different vendors, and across security technologies that are cloud based and on premises. Delivering on this promise requires ALL tools and ALL teams working in concert, so the X factor in an XDR architecture is integration. And this integration must be broad and deep so that organizations can get the most value out of their existing best-of-breed security solutions, including their free, open source tools.

[ Read:XDR is a Destination, Not a Solution]

Myriad open source threat feeds and intelligence sources provide important information and preventative measures for defending against existing and emerging threats. Additionally, MISP is a great source for information sharing. The MITRE ATT&CK extensive knowledgebase helps teams more deeply understand adversary campaigns and risk mitigations based on real-world observations. And connecting with TheHive accelerates incident response, which is the priority for many organizations. Individually, these tools offer tremendous benefits. But when you integrate them as part of an overall XDR architecture, their benefits are magnified in three ways.

1.Enrich events with critical data about the latest threats. Detection now requires a breadth and depth of information from disparate systems and sources brought into a single view, so you can gain a comprehensive understanding of the threat you are facing and know what you must defend. On their own, events from all internal data sources, including your SIEM system, log management repository, case management system and security infrastructure on premise and in the cloud, appear to be independent. But when you can aggregate this data and then augment and enrich it automatically with threat data from the multiple sources you subscribe to open source, commercial, government, industry and existing security vendors as well as open-source frameworks like MITRE ATT&CK, you start to see the bigger picture. Whats more, when new crises and outbreaks occur, much of the information and preventative measures that flood the security community come from a variety of open sources and in a variety of formatsincluding research blogs, commercial and government reports, news websites and GitHub repositories. A security operations platform that includes out-of-the-box connectors makes importing this information easy. While custom connectors that can be written and deployed within hours allow you to ingest data from additional sources of threat data as they become available.

2.Capture more value from existing teams and tools. Bi-directional integration ensures that data flows between teams and tools as part of existing workflows. With a software development kit (SDK) and easy-to-use APIs, integration with existing tools, including MISP and TheHive, is fast. When the right data can get to the right systems and teams at the right time, data utilization improves and teams are more efficient and effective because they are able to share actionable intelligence using tools they know and trust. Organizations get more value from all their existing resources, while accelerating detection and response. Bi-directional integration also enables a feedback loop so teams can capture and store data for learning and improvement. New data and observations from the MISP community, TheHive, MITRE ATT&CK, your internal analysts and other trusted sources continue to improve analysis, decision-making and actions.

3.Take the right actions faster. Multiple systems are now involved in attacks, so response requires the capability to look beyond one file or system to find all related events and data across the organization. Connecting the dots and contextualizing with additional intelligence accelerates remediation and response to an incident across the infrastructure. MITRE ATT&CK plays a central role in helping teams expand their search for artifacts associated with a campaign within their environment, test hypotheses to confirm or disprove findings, and make decisions quickly about response and remediation. TheHive can support incident response, but you can also integrate with an ecosystem of tools to support a variety of use cases including spear phishing, threat hunting, alert triage and vulnerability management. With a deeper understanding of what is happening across your environment and integration across different tool sets, you can send associated data back to the right tools across your defensive grid immediately and automatically to take the right actions faster.

Many organizations first turn to open-source tools because they are free. Today, these tools have earned a loyal following as result of the tremendous value they deliver, and teams will continue to rely on them as an essential part of their security toolkit for decades to come. Now, as part of an XDR architecture where integration is broad and deep, there is an opportunity to elevate open source tools even further because, as ESGs Jon Oltsik has said, XDR assumes the whole is even greater than the sum of its parts. Open source tools are an important part.

Related:3 Questions for MDRs Helping to Get Your Enterprise to XDR

Related: Three Approaches to an XDR Architecture

Continued here:

The Importance of Open Source to an XDR Architecture - SecurityWeek

mimik Technology edgeEngine Extends the Reach of IBM Edge Application Manager to Smart Devices – Business Wire

OAKLAND, Calif.--(BUSINESS WIRE)--mimik Technology today announced that mimik has completed an edgeEngine integration with the Linux Foundations Open Horizon project and contributed the code to LF Edge. This first-of-its-kind intelligent workflow management and DevOps tool manages containerized workloads from the central cloud all the way to endpoints on heterogeneous edge devices. The integration creates an array of opportunities in use cases such as factory automation, retail management, fintech, healthcare, telecommunications and automotive, where commodity endpoint devices can now become part of a fully integrated and simply managed software delivery solution. In recognition of their significant contribution to Open Horizon, mimik has been invited to join the Technical Steering Committee (TSC) as a voting member and as a partner of the project alongside IBM, providing valuable input on the technical strategy for the platform as it delivers AI-driven distributed workflow management solutions.

mimik is delighted to contribute to Open Horizon and we are honored to join the steering committee and serve as partner for this important initiative, said Michel Burger, chief technology officer of mimik. We are excited by the opportunities created by the integration of mimiks platform with the IBM Edge Application Manager and are actively engaged in a number of deployments and proofs of concept that demonstrate the power of the combined solution.

The addition of mimiks edgeEngine software as a deployable target to Open Horizon enables IBM Edge Application Manager a downstream, commercially-supported product based on Open Horizon to extend its workload management capabilities beyond Linux gateways all the way down to smart devices such as smartphones and sensors. This extension allows solution providers to manage these commodity heterogenous computing devices in a wide range of applications, for instance, where they can be used as robot-assisted inspection cameras or point of sale terminals. The mimik edgeEngine software, running on these smart devices, provides the essential bridge to the Open Horizon solution.

The Open Horizon project is glad to accept mimiks contribution and is eager to collaborate with them as our first new project partner since being founded by IBM, said Joe Pearson, chair of the Open Horizon project at LF Edge. The integration of Open Horizons application deployment and lifecycle management solution with mimik Technologys edgeEngine helps us to fulfill the fundamental promise of edge computing: to manage applications and machine learning securely and efficiently across large fleets of heterogeneous devices regardless of their connected state. I cant wait to see how this cooperation will begin to transform communications, retail, automotive, and agriculture in the very near future.

mimiks significant contribution to the Open Horizon project has led to its appointment to the projects Technical Steering Committee, a group that sets the development roadmap, manages governance rules, and sets code management policies for the project. mimik is the first contributing software company to join the committee and as a partner of the project, underscoring its commitment to the initiative and willingness to open-source its code to further industry development and adoption of edge software solutions. Open Horizon is an open-source software project within the LF Edge umbrella group and serves as a cornerstone project within the organization. As a platform for managing the service software lifecycle of containerized workloads and machine learning assets, it supports autonomous application management to edge computing nodes and devices at massive scale.

About mimik Technology

mimik has pioneered hybrid edge cloud computing to enable any computing device to act as a cloud server to help app developers unlock the next generation of apps for the hyper-connected world. The platform includes a run-time engine for developers to develop and host microservices on all kinds of end-user devices such as smartphones, smart IoT devices, and AI-based sensors. The engine is agnostic to OS, device, networks, and public/private cloud. It is non-proprietary and works with existing standard development tools and language. mimik also provides ready-to-deploy application domain SaaS (cloud and/or edge) for a wide range of industry verticals including fintech. The mimik platform enables an edge-in versus a cloud-out approach to build applications faster and drastically reduce infrastructure cost, minimize latency, improve security and data privacy, and enable direct app-to-app communication via the standard RESTful API first and serverless microservice-driven architecture. For more information visit: https://mimik.com and https://developer.mimik.com .

Read the original:

mimik Technology edgeEngine Extends the Reach of IBM Edge Application Manager to Smart Devices - Business Wire

iSIGN Media Announces the Signing of a Licensing Agreement with SIMBL for Advanced Technologies and Associated Platforms – GlobeNewswire

TORONTO, March 30, 2022 (GLOBE NEWSWIRE) -- iSIGN Media Solutions Inc. (iSIGN or Company) (TSX-V: ISD) (OTC: ISDSF), a leading provider of interactive mobile proximity marketing and public security alert solutions, announced that on March 30, 2022 the Company signed an exclusive worldwide Licensing Agreement (Agreement) in perpetuity with SIMBL Business Enablement Inc. (SIMBL) for its Passive Historical Contact Tracing (PHACT) and underlying framework, including SPE Asset Management System for smart location analytics and monitoring Intellectual Property (IP).

The PHACT IP provides smart location analytics and monitoring. Conceived as a contact tracing platform, the overall platform enables one to monitor the movement, congregation behaviours, and general movements of individuals within a monitored space, while maintaining compliance with all public privacy policies. PHACT provides real-time and historical information regarding individual movement, dwell, and crowd behavior.

Under the terms of this arms length Agreement iSIGN has a right-of-first offer and a right of first refusal (First Rights) in respect for the further acquisition of two additional IP items, on terms and conditions to be mutually agreed upon:

The First Rights in respect of the above may be exercised in respect of either or both of the additional IP, as the parties may determine. Acquisition would be subject to the approval of the TSX-Venture Exchange (TSX-V).

Under the terms of the Agreement, SIMBL has contracted that they will not use the IP for their own purposes or to issue new licenses to any third party and that any new licenses issued, will be issued through iSIGN. Ownership of the IP will remain with SIMBL while iSIGNs existing forbearance agreement remains in effect. Ownership of the IP will transfer to iSIGN upon the mutual consent of the parties at a later date which will not be unduly withheld with no further additional payment required for the transfer. The fee for all ongoing maintenance, upgrades and support services to the IP, however, will continue in perpetuity.

iSIGN will be acquiring this Agreement by the issuance of 19.1 million common shares from treasury with a deemed value of $0.05 per share for a value of $955,000. Additionally, iSIGN will issue a further 3.390 million common shares from treasury to settle an outstanding debt of $169,500 for technology services rendered by SIMBL as of the end of January 2022.

The shares issued under this Agreement, totaling 22.490 million will result in SIMBL owning 9.93% of the resulting outstanding shares of the Company.

Under the terms of the Agreement, SIMBL has agreed to provide all ongoing maintenance, upgrades and support services to the IP for the duration of the Agreement, at a fee of 10% of revenues generated from their technology.

The agreement will not result in any transfer of any liabilities or contingent liabilities nor will there be any transfer of existing SIMBL clients From SIMBL to iSIGN.

Additionally, this Agreement and the resulting issuance of shares is subject to the approval of the TSX Venture Exchange. All securities issued would be subject to a four month hold period.

For this transaction, the Company has relied on the exemption from the formal valuation requirements of MI 61-101 contained in section 5.5(a) of MI 61-101 and has relied on the exemption from the minority shareholder approval requirements of MI 61-101 contained in section 5.7(a) of MI 61-101.

About iSIGN MediaiSIGN, a Canadian company based in Toronto (Richmond Hill), Ontario is a data-focused, software-as-a-service (SaaS) company that is a pioneering leader in the areas of location-based security alert messaging and proximity marketing utilizing Bluetooth and Wi-Fi connectivity in complete privacy. Creators of the Smart suite of products, a patented interactive proximity marketing technology, iSIGN enables the delivery of messages to mobile devices in proximity, with real-time reporting and analytics on a variety of metrics. 2019 winner of Richmond Hills Innovator of the Year award. Partners include IBM, Keyser Retail Solutions, Baylor University, Verizon Wireless, and Mtrex Network Solutions. http://www.isignmedia.com

About SIMBLSIMBL, a Canadian company based in Toronto, Ontario is a business enablement firm that specializes in the development of innovative software solutions. We have expertise in defining the framework for SaaS deployments and developing complete solutions from website and market development to pricing and infrastructure. http://www.simbl.ca

Forward-Looking StatementsThis news release may include certain forward-looking statements that are based upon current expectations, which involve risks and uncertainties associated with iSIGN Medias business and the environment in which the business operates. Any statements contained herein that are not statements of historical facts may be deemed to be forward-looking, including those identified by the expressions anticipate, believe, plan, estimate, expect, intend and similar expressions to the extent they relate to the Company or its management. The forward-looking statements are not historical facts but reflect iSIGN Medias current expectations regarding future results or events. These forward-looking statements are subject to a number of risks and uncertainties that could cause actual results or events to differ materially from current expectations. iSIGN Media assumes no obligation to update the forward-looking statements, or to update the reasons why actual results could differ from those reflected in the forward-looking statements.

2022 iSIGN Media Solutions Inc. All Rights Reserved. All other trademarks and trade names are the property of their respective owners.

Company contacts:

Alex RomanoviSIGN Media Solutions Inc.(905)780-6200 alex@isignmedia.com

Neither the TSX Venture Exchange nor Its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the accuracy of this release.

See the original post:

iSIGN Media Announces the Signing of a Licensing Agreement with SIMBL for Advanced Technologies and Associated Platforms - GlobeNewswire

This Alexandria supply chain startup just nabbed a spot in the FinTech Innovation Lab accelerator – Technical.ly

Plenty of local startups in the DMV get their start in the powerhouse defense and government contracting spaces in DC. But Alexandria, Virginia-based supply chain risk startup Ion Channel has picked a new lane for its software.

The 16-person startup, which also has offices in Portland, Oregon, was recently selected to participate in the FinTech Innovation Lab in New York City, an accelerator for startups moving into fintech. The 12-week cohort, which is funded by Accenture and the Partnership Fund for New York City, features nine other companies from around the world, and allows participants to work with large financial institutions. According to Maria Gotsch, president and CEO of the Partnership Fund cofounder of the innovation lab, the accelerator primarily focuses on finding potential customers for participants.

Its for companies like Ion Channel that are further along in their development and are at the point of wanting to, in a really accelerated way, access the financial services market broadly, Gotsch told Technical.ly.

Ion Channel, which was founded in 2016, works in the risk assurance space of supply chain technology for clients in national security, defense and beyond. Cofounder and CEO JC Herz said Ion launched to mitigate risk along the supply chain by offering insight into the risks from software suppliers like vendors and government contractors, and allows users to more effectively manage their work with these partner companies.Alongside the accelerator, the company is in the midst of raising an $8 million to 10 million Series A.

What Ion Channel allows the third-party risk people and procurement people to do is understand whether the outside is bright and shiny, but is the inside brittle and moldy? Herz said.

At the moment, Herz said, supply chain risks and threats often come from the components being used to build software, since theres a lot of open source code and information. Ion looks beyond known vulnerabilities and into leading indicators and threat information.

With the accelerator, she hopes that she can grow the company and get a leg up in the fintech space.

In financial services, Herz said, the organizations her company would look to work with are so vast that you really do need a sherpa to help you get to the top. So I would view, in that analogy, the New York FinTech Innovation Lab is almost like the base camp for the people who are going to scale those mountains to actually acclimate and get ready to scale those peaks.

As the company grows, both with the accelerator and the funding round, Herz plans to expand the Ion team on both the engineering side and sales and marketing. Herz said she plans at least double the size of the team following the program, in both its hometown of NoVa and in NYC.

What she really hopes, though, is that the program can help bring the software beyond government and defense and into the fintech and financial services space.

Ion Channel and the other nine that are in the cohort, the fact that they were selected by the financial institutions is really an interesting insight into what the priorities are and really speaks to the fact that what theyre doing is of high interest to the financial services sector, Gotsch said.

View post:

This Alexandria supply chain startup just nabbed a spot in the FinTech Innovation Lab accelerator - Technical.ly

RedGrid Launches the Internet of Energy Network (IOEN) Protocol on the Back of a Pioneering Collaboration With Monash University – The Daily Hodl

March 31, 2022 Melbourne, Australia

The microgrid project at Monash Universitys Clayton campus sought to establish a testbed for industry-led and research-led experiments, including how a distributed agent-based energy market connects and optimizes energy assets, from large buildings to solar PV systems.

One of the many experiments was to explore the scalability and performance of RedGrids unique agent-based software approach when applied to a commercial grid-scale transactive energy market.

Since that time, and on the back of the work performed in that collaboration, RedGrid further developed the software to release it in the form of the open source IOEN software protocol, version one.

Using learnings from the RedGrid collaboration with Monash, the IOEN protocol focuses on the accessibility of the approach. The protocol allows developers and clean energy industry participants to record peer-to-peer energy trading transactions so they can then apply them to different market scenarios.

It also includes peer-to-peer energy value transfer solutions which pave the way for new products, services and innovations that aim to accelerate the clean energy transition and enable the decarbonization of energy around the world.

Dr. Steve Quenette, deputy director at Monash eResearch Centre, said,

RedGrid making those learnings accessible to energy innovators through the open IOEN protocol is an excellent demonstration of the research sector sharing with SMEs the technology development necessary to drive disruptive solutions to grand challenges.

Dr. Adam Bumpus, chief energy officer at IOEN and CEO at RedGrid, said,

The implementation and development of the protocol through RedGrids work with Monash has been a huge stepping stone to provide seamless energy transaction services between devices and users. Our deployment and testing within the Smart Energy City project shows how an agent-based approach could scale and directly create multiple markets and bidders that respond to the needs of the grid in real-time.

Simon Wilson, chief technical officer at RedGrid, said,

The IOEN protocol is entirely unique in its agent-based architecture and approach. Over the last two years at RedGrid, we have been working closely with the team at MeRC to explore and develop innovative solutions to real-world problems through the use of our open source code. We are thrilled at RedGrid that we can now release these learnings and continue to develop them further with Monash, as well as a world of open source creators and energy innovators all over the world.

The Internet of Energy Network (IOEN) is an international non-profit delivering the next generation of web 3.0-led digital energy management and optimization. IOEN tech enables an interconnected system of virtual microgrids that facilitate transactions within and between local energy ecosystems from the appliance level to energy generation, storage and consumption.

We are the backbone of the new tokenized energy ecosystem, building out the global clean energy ecosystem wherever you are, device by device.

For more information on IOEN protocol, visit here.

RedGrid is a Melbourne-based clean energy technology company. Our software seamlessly teams up with the appliances in peoples homes to save them money and use renewable energy more often. RedGrid is delivering its software across property developments, neighborhood battery initiatives, solar sharing installations and electric vehicle charging stations.

For more information, visit here.

Monash eResearch Centre (MeRC) accelerates research by applying advanced computing and IT to impactful research problems. It partners with individual researchers, research institutions and facilities and global research communities to co-design and co-operate what digitization means to them.

It also consolidates the needs of thousands of researchers, leading to a world-renowned engineering team designing and operating high-performance computing, cloud and data (storage/life-cycle) facilities.

For more information, visit here.

Dr. Steve Quenette, deputy director at Monash eResearch Centre

Marco Gritti, RedGrid

Thing Thing Khor, chief marketing officer at IOEN

Follow Us on Twitter Facebook Telegram

More:

RedGrid Launches the Internet of Energy Network (IOEN) Protocol on the Back of a Pioneering Collaboration With Monash University - The Daily Hodl