Daily Archives: May 3, 2021

Gods of the market – newframe.com

Posted: May 3, 2021 at 6:48 am

In 2007, actor Robert Downey Jr was doing research for his role in the superhero movie Iron Man. He played reformed arms dealer Tony Stark. To portray this fictional, self-described genius, billionaire, playboy [and] philanthropist, he consulted SpaceX founder Elon Musk, who gave him a tour of his Tesla facility in Los Angeles. According to Musks biographer Ashlee Vance, this Hollywood endorsement was a big ego boost for the attention-hungry tycoon.

Tony Stark dies to save the Earth from the apocalypse in the 2019 blockbuster Avengers: Endgame. In the real world, however, expecting our billionaires to display such self-sacrifice would be woefully naive.

Plutocrats such as Jeff Bezos have resoundingly failed to use their bottomless wealth to help the world respond to the dual shocks of Covid-19 and economic depression. In contrast, the super-rich experienced a bumper year of profits and accumulation.

The worlds billionaires which comprise fewer than 3000 people saw their collective wealth increase by $4trillion, or 54%. Such income inequality has become so glaring that even an ultra-capitalist institution like the International Monetary Fund has now called for a new pandemic wealth tax.

In contrast, the financial and business press has continued to produce fawning coverage of billionaire excess and wealth hoarding. Publications such as Forbes Africa, with headlines like Why $825 million means nothing to me, flaunt extreme wealth in a way that contrasts jarringly with the dysfunction of everyday life. This is especially stark during a pandemic, when the average shopper stands in a physically distanced queue, face mask on, while Musk, the Pretoria-born oligarch, looks smugly into his bright future from a magazine cover featuring the words, The Richest Man on Earth: The Billionaire with Interplanetary Ambitions.

According to this boosterism, plutocrats are the vanguard of human civilisation, offering incredible technological solutions to social problems. At the same time, billionaires such as Bill Gates and Mark Zuckerberg are also disingenuously framed as modest, relatable technocrats. The meritocracy myth creates the belief that anyone can become super-rich with enough personal dedication and grit.

Yet, as Rob Larson demonstrates in his book Bit Tyrants: The Political Economy of Silicon Valley, platforms such as Microsoft and Amazon were built through the ruthless crushing of smaller commercial rivals, political lobbying and overworked labour forces.

In the 2010s, for example, conditions were so bad at the iPhone complex in Shenzhen, China, that hundreds of workers took their own lives, which lead the company to install suicide proof nets around buildings.

Bezos, meanwhile, has responded to exposure of the dismal working conditions at Amazon warehouses with a public relations campaign in which online bots pose as cheerful members of his workforce.

Big tech is now in control of large sections of the global economy. Platforms such as Microsoft, Google and Facebook have become monopolies that oversee how people conduct business, receive information and communicate.

The most recent historical period in which individual capitalists enjoyed such concentrated wealth and power was the so-called Gilded Age of the late 19th century. In the United States, robber barons, tycoons such as Corneilus Vanderbilt and JP Morgan, owned vast industrial monopolies over key infrastructure such as railroads. The robber barons crushed smaller rivals and unleashed private security forces to violently clamp down on striking workers. As JP Morgan once said, I owe the public nothing.

The greed and arrogance of the robber barons ultimately lead to calls for reform. Tycoons such as Andrew Carnegie worked to soften their image by donating money to charity and keeping their excessive lifestyles out of the public eye. But, as Mike Davis and Daniel Bertrand Monk write, the Ronald Reagan and Margaret Thatcher counter-revolution of the 1980s unleashed the new and greatest gilded age.

Neoliberal policies and deregulation have allowed an unprecedented transfer of wealth upwards. It was also accompanied by a cultural shift towards conspicuous consumption, in which the wealthy are seen as the ultimate sources of value and social progress.

This reverent attitude towards extreme wealth often blurs into quasi-religious devotion, such as when Fortune magazine published a 2016 cover depicting Bezos as an avatar of the Hindu god Lord Vishnu. But deification of the super-rich is also combined with the paradoxical idea that anyone can become a billionaire through sheer willpower. A new self-help book by a South African investor epitomises this. According to The Billionaire Mindset, wealth can be achieved by rejecting self-imposed limitations.

The hollowness of this dream is revealed in the deceit and manipulation that accompanies start-up culture, as chief executives often exaggerate and distort the impact of their technology. An emblematic example is the rise and fall of celebrity con artist Elizabeth Holmes, who raised almost a billion dollars from investors by presenting herself as the Steve Jobs of medical technology. But her company, Theranos, was outright fabricating claims that it possessed a revolutionary new form of blood testing.

This myth of the self-made, start-up billionaire omits both how the likes of Musk were born into affluent backgrounds, and the political and economic contexts that allowed them to gain such concentrated wealth and influence.

Much of the internet and information technology of today has its origins in government-funded military research during the Cold War. From the late 1970s, programmers and technicians in Silicon Valley built on this existing technology and created a revolution in personal computing.

Inspired by the counterculture of the 1960s, computers were seen as more than just machines but as tools for personal emancipation. But the other side of this libertarian utopianism was a fanatical embrace of the unrestrained free market.

In the 1990s, publications such as the widely influential Wired magazine said capitalism was a revolutionary force for change that would blow away existing hierarchies and authorities, leaving a frictionless world of commerce and instant communication.

According to Wired, tech chief executives were the vanguard of this revolution. People like Gates were not only successful businesspeople but also disruptors forcing rapid technological change on society.

But, as Keith White wrote in 1994, this obscured how much of the business of Silicon Valley was exploitation as usual, driven by particularly unscrupulous executives. Breathless tech-speak normalised corporate control of the internet and presented government regulation and social obligations as antiquated forces that stood in the way of progress.

Despite this excessive marketing, companies such as Microsoft were not universally loved. In particular, Gates was seen to embody corporate greed as he used underhanded tactics to ensure a global monopoly over computer operating systems.

In contrast to his current image, pop culture depicted him as a sinister figure. According to the title of Douglas Couplands 1995 novel, his employees were treated as Microserfs. Films like South Park: Bigger, Longer & Uncut (1999) offered scathing depictions of the worlds then richest man.

Gates faced an even more serious backlash when he was forced to testify at Congressional hearings about Microsoft business practices in 2001. Under scrutiny he came off as arrogant and evasive, more a standard robber baron than a tech visionary. This was echoed in 2018 when Zuckerberg gave a similarly damaging congressional appearance.

The hearing pushed the Microsoft chief executive to adopt a softer public image by starting the Bill and Melinda Gates Foundation. This organisation is often assumed to be doing good work in health and education because of the large sums of money it donates publicly to initiatives. But it and other corporate philanthropy projects are run like venture capitalist firms rather than charitable organisations. The Gates Foundation, for example, explicitly promotes corporate interests and neoliberal economic policy, while also increasing its founders personal influence over global healthcare.

As the pandemic has highlighted, billionaire charity has failed to address the crisis. It has been public institutions and government doctors and nurses who have most effectively responded to Covid-19.

Relying on the largess and generosity of the billionaire class will not solve social ills. Futurists like Musk and Bezos combine personal narcissism, including the belief that they are messianic figures, with base self-interest. Instead of paying their workers decent wages or sponsoring constructive social projects, they are investing their obscene personal fortunes in space travel.

They are not doing this for exploration or to increase our understanding of the cosmos. Rather, Musk and Bezos seem to think that space is a new frontier for them to occupy and exploit. But their grandiose schemes to build space platforms and Mars colonies are often completely detached from reality.

While they claim they are securing a permanent human presence in outer space, they deliberately omit how global warming, ecological collapse and catastrophic social inequality are already making life more difficult for the billions of ordinary people who dont have billions of dollars.

While Gates has now appointed himself an expert on climate change with his book How to Avoid a Climate Disaster, his dismal solutions include extending corporate control and maintaining the economic status quo.

The future that Gates, Musk and Bezos imagine is determined by power and privilege, where top-down technological solutions are handed down by elites. As Lizzie OShea observes, In the digital age, we are witnessing an ideological revitalisation of the idea that utopia can be achieved by building more extreme versions of technology capitalism.

Rather than expanding democracy or equality, the cultural veneration of the billionaire class is having sinister political ramifications. In recent years, the growth of extreme inequality and global monopolies has led many sociological commentators to warn that society is retreating into neofeudalism, echoing the feudal systems of pre-modern times. The increased fragmentation of state power and economic precarity and unemployment makes it seem possible that we are witnessing the emergence of a new system of peasants and kings, with the rulers being tech billionaires and global financiers.

The future being built is one where billionaires hoard their vast fortunes in luxury fortified enclaves, while climate change and economic suffering make life a bleak struggle for the vast majority.

Real social and political change has never been handed down voluntarily by the wealthy and powerful. Instead it has been won from popular struggle, as ordinary people come together in unions and social movements to agitate for lasting change. Many of these hard-won advances from the right to collective bargaining to laws against monopoly are now being undermined by the super-rich. Instead of being benevolent public figures, they are the overbearing, entitled beneficiaries of a rigged and increasingly dysfunctional system.

Originally posted here:

Gods of the market - newframe.com

Posted in Mars Colony | Comments Off on Gods of the market – newframe.com

Using 3D-printed microalgae to make artificial leaves – Innovation Origins

Posted: at 6:48 am

An international research team led by the Delft University of Technology (the Netherlands) has used 3D printers to turn algae into a living and environmentally friendly material. This new material has multiple potential uses. One of the most promising applications is in the form of artificial leaves.

According to TU Delft, these are materials that mimic real leaves. They use sunlight to convert water and carbon dioxide into oxygen and energy, just like leaves do during photosynthesis, the university stated in a press release.

PhD student Kui Yu says that the artificial leaves make it possible to produce renewable energy. Yes is especially beneficial in places where plants dont grow well, such as in future space colonies. We have created a material that produces energy as soon as it is exposed to light. The biodegradable nature of the material itself and the recyclable nature of microalgal cells make it a sustainable living material

Want to be inspired 365 days per year? Heres the opportunity. We offer you one "origin of innovation" a day in a compact Telegram message. Seven days a week, delivered around 8 p.m. CET. Straight from our newsroom. Subscribe here, it's free!

The living cells in the materials can also pick up on signals in the environment and respond to them. This may eventually lead to a new category of photosynthetic and responsive living materials, as Elvin Karana of the Faculty of Industrial Design explains.

Karana: What if our everyday products were alive: could sense, grow, adapt, and eventually die? This unique collaborative project shows that this question is beyond the realm of speculative design. We hope our article will spark new conversations between design and science communities and inspire new directions for an investigation into future photosynthetic living materials.

The full study can be read in the journal Advanced Functional Materials.

TU Delft took bacterial cellulose as the basic material in order to make the artificial leaves. This is a non-living organic compound that is produced and secreted by bacteria.

This bacterial cellulose produces a material with a number of unique mechanical properties, such as flexibility, strength and the ability to retain its shape even when twisted, crushed or deformed in some other way.

The research team then used a 3D printer to apply live algae to the bacterial cellulose. When you do this, you could compare the bacterial cellulose to paper in a printer, while the living algae act as the ink, as TU Delft describes it.

The combination of living microalgae and non-living bacterial cellulose creates substances that have the photosynthetic quality of the algae and the robustness of the bacterial cellulose. The material is both strong and durable, while at the same time environmentally friendly, biodegradable, and easy to scale up.

The plant-like nature of the material allows it to feed itself for weeks by means of photosynthesis. Whats more, it can also self-regenerate. A small sample of the material can be grown into something bigger within a short period of time.

What else can you do with microalgae? Read more about it in our archive.

Original post:

Using 3D-printed microalgae to make artificial leaves - Innovation Origins

Posted in Mars Colony | Comments Off on Using 3D-printed microalgae to make artificial leaves – Innovation Origins

The Most In-Demand Cloud Computing Jobs For 2021 – CRN

Posted: at 6:47 am

The Top 10 Cloud Computing Jobs Being Sought In 2021

With the need for cloud computing on the rise, organizations across the country are seeking to hire cloud experts at an unprecedented rate, according to new 2021 job data from Indeed.

Throughout the last decade, Amazon, Google and Microsoft, among others, have invested heavily in building vast infrastructure and useful services, all while competing with one another to improve pricing, performance and reliability, said Scott Bonneau, vice president of global talent attraction at Indeed, in an email to CRN. Essentially every meaningful consumer application or service that you can think of today is based on cloud technology. As a result, the demand for cloud talent has shot up.

From March 2018 to March 2021, the share of cloud computing jobs per million increased by a whopping 42 percent, according to data from Indeed. During the same time period, searches per million for cloud computing jobs grew by nearly 50 percent.

CRN breaks down Indeeds top 10 most in-demand cloud computing jobs for 2021.

Originally posted here:

The Most In-Demand Cloud Computing Jobs For 2021 - CRN

Posted in Cloud Computing | Comments Off on The Most In-Demand Cloud Computing Jobs For 2021 – CRN

Business push for cloud computing to be tax deductible – The Australian Financial Review

Posted: at 6:47 am

But corporate Australia, as well as small and medium sized business, now wants to expand what can be depreciated, arguing that standard software has now transitioned to more cloud-based service models.

Cloud-based services are unlikely to be depreciable because they are considered services, not assets. Government investment incentives are only aimed at fixed capital assets, not services, and so are not effective for encouraging cloud computing services.

Enter the Business Council. The BCA is pushing the government to change the way it thinks about digital services as an asset.

We want to make sure tax settings recognise digital investment in the same way as a physical one, Business Council President Tim Reed said last week when releasing new modelling on the benefits of digitisation.

The BCA provided modelling from EY that showed Australia could be $210 billion better off over the next 20 years if the shift to a digital economy was sped up.

The BCA recommends driving digital investment by including digital services in a 20 per cent investment allowance for businesses of all sizes, to encourage digital investment in areas such as using services based on the cloud.

The BCA wants to include these cloud-based services in the governments trophy investment allowance announced in the budget last year. However, including what is technically a service as an asset would cost billions of dollars.

Westpacs King set out the advantages of investing more in cloud computing.

The benefit of cloud is not only you variabilise the cost but the software built to run on the cloud is whats called evergreen so it upgrades itself regularly you dont have to hop between versions, Mr King said.

Thats so beneficial in helping us change the bank, helping it improve over time. Its also beneficial from a cyber security perspective because you are running on the latest patches and they are easy to upgrade.

Executive director of the Institute of Certified Bookkeepers and Small Business Council director Matthew Addison said allowing some services to be depreciable like an asset would be a significant change.

If the government were to increase concessions and or incentives to encourage businesses to invest in technology and cloud computing that would be a good thing. Cloud computing is [currently] considered software as a service, which is like a subscription service, so it is considered a recurring expense and not a fixed asset, Mr Addison said.

There are some cloud-computing platforms that are actually a piece of infrastructure added to a fixed asset and that could be considered capital expenditure because it could pass the test of enduring quality, which is that it lasts for more than 12 months.

For Westpac they are pretty much adding a piece of infrastructure on top of existing infrastructure, so that could be considered capex, Mr Addison said.

Westpacs Peter King outlined several areas where Westpac was actually adding infrastructure to the cloud computing services, such as application programming interfaces (APIs).

If you think about standard messaging and how we use it, some of the things we built in the customer service hub, decision engines, the way we bring customers into the bank they can be used across our operations and our different brands.

Deloittes Chris Richardson said the cheapening cost of technology services presented a deceptive picture about how much investment was actually taking place.

Current business investment is much smaller as a share of the economy than it was during the mining boom, but still in line with its average since the 1980s.

But if you only look at nominal investment, which ignores how much further your dollar goes on tech stuff these days then youd think business investment today is well below its average since the 1980s.

Visit link:

Business push for cloud computing to be tax deductible - The Australian Financial Review

Posted in Cloud Computing | Comments Off on Business push for cloud computing to be tax deductible – The Australian Financial Review

The next big thing in cloud computing? Shh It’s confidential – Help Net Security – Help Net Security

Posted: at 6:46 am

The business-driven explosion of demand for cloud-based services has made the need to provide highly secure cloud computing more urgent. Many businesses that work with sensitive data view the transition to the cloud with trepidation, which is not entirely without good reason.

For some time, the public cloud has actually been able to offer more protection than traditional on-site environments. Dedicated expert teams ensure that cloud servers, for example, maintain an optimal security posture against external threats.

But that level of security comes at a price. Those same extended teams increase insider exposure to private datawhich leads to a higher risk of an insider data breach and can complicate compliance efforts.

Recent developments in data security technologyin chips, software, and the cloud infrastructureare changing that. New security capabilities transform the public cloud into a trusted data-secure environment by effectively locking data access to insiders or external attackers

This eliminates the last security roadblock to full cloud migration for even the most sensitive data and applications. Leveraging this confidential cloud, organizations for the first time can now exclusively own their data, workloads, and applicationswherever they work.

Even some of the most security-conscious organizations in the world are now seeing the confidential cloud as the safest option for the storage, processing, and management of their data. The attraction to the confidential cloud is based on the promise of exclusive data control and hardware-grade minimization of data risk.

Over the last year, theres been a great deal of talk about confidential computingincluding secure enclaves or TEEs (Trusted Execution Environments). These are now available in servers built on chips from Amazon Nitro Enclaves, Intel SGX (Software Guard Extensions), and AMD SEV (Secure Encrypted Virtualization).

The confidential cloud employs these technologies to establish a secure and impenetrable cryptographic perimeter that seamlessly extends from a hardware root of trust to protect data in use, at rest, and in motion.

Unlike the traditional layered security approaches that place barriers between data and bad actors or standalone encryption for storage or communication, the confidential cloud delivers strong data protection that is inseparable from the data itself. This in turn eliminates the need for traditional perimeter security layers, while putting data owners in exclusive control wherever their data is stored, transmitted, or used.

The resulting confidential cloud is similar in concept to network micro-segmentation and resource virtualization. But instead of isolating and controlling only network communications, the confidential cloud extends data encryption and resource isolation across all of the fundamental elements of IT, compute, storage, and communications.

The confidential cloud brings together everything needed to confidentially run any workload in a trusted environment isolated from CloudOps insiders, malicious software, or would-be attackers.

This also means workloads remain secure even in the event a server is physically compromised. Even an attacker with root-access to a server would be effectively prevented from seeing data or gaining access to data and applicationaffording a level of security traditional micro-segmentation cant today.

A strong argument can already be made that reputable major cloud providers deliver both the resources and focus needed to secure a vast majority of internal IT infrastructure. But data-open clouds bring the risk of greater data exposure to insiders, as well as the inability to lock down a trusted environment under the total control of the CISO.

Data exposure has manifested itself in some of the most publicized breaches to date. CapitalOne became the poster child for insider data exposure in the cloud when its data was breached by an AWS employee.

Implementing a confidential cloud eliminates the potential for cloud insiders to have exposure to data, closing the data attack surface that is otherwise left exposed at the cloud provider. Data controls extend wherever data might otherwise be exposedincluding in storage, over the network, and in multiple clouds.

OEM software and SaaS vendors are already building confidential clouds today to protect their applications. Redis recently announced a secure version of their high-performance software to run over multiple secure computing environmentscredibly creating what may be the worlds most secure commercial database.

Azure confidential computing has partnered with confidential cloud vendors to enable the secure formation and execution of any workload over existing infrastructure without any modification of the underlying application. Support for similarly transparent multi-cloud Kubernetes support isnt far behind.

Taking advantage of confidential computing previously required code modifications to run applications. This is because initial confidential computing technologies focused on protecting memory. Applications had to be modified to run selected sensitive code in protected memory segments. The need to rewrite and recompile applications was a heavy lift for most companiesand isnt even possible in the case of legacy or off the shelf packages.

A new lift and shift implementation path enables enterprises to create, test, and deploy sensitive data workloads within a protected confidential cloud without modifying or recompiling the application. Nearly all cloud providers, including Amazon, Azure, and Google, offer confidential cloud-enabling infrastructure today.

Confidential cloud software allows applications and even whole environments to work within a confidential cloud formation with no modification. Added layers of software abstraction and virtualization have the advantage of making the confidential cloud itself agnostic to the numerous proprietary enclave technologies and versions developed by Intel, AMD, Amazon, and ARM.

A new generation of security vendors has simplified the process to implement private test and demo environments for prospective customers of the public cloud. This speeds the process to both enclave private applications and generate full-blown confidential cloud infrastructure.

Data security is the last barrier to migrating applications to the cloud and consolidating IT resources. The resolution of cloud security flaws took a great step in migrating all but the most sensitive application and data. Eliminating data vulnerability opens a broad new opportunity for businesses to simply deploy a new and intrinsically secure hosted IT infrastructure built upon the confidential cloud.

More:

The next big thing in cloud computing? Shh It's confidential - Help Net Security - Help Net Security

Posted in Cloud Computing | Comments Off on The next big thing in cloud computing? Shh It’s confidential – Help Net Security – Help Net Security

Global Cloud Computing Market (2021 to 2025) – Featuring Adobe, Alphabet and Amazon Among Others – ResearchAndMarkets.com – Business Wire

Posted: at 6:46 am

DUBLIN--(BUSINESS WIRE)--The "Global Cloud Computing Market 2021-2025" report has been added to ResearchAndMarkets.com's offering.

The publisher has been monitoring the cloud computing market and it is poised to grow by $287.03 billion during 2021-2025, decelerating at a CAGR of over 17% during the forecast period.

The report on the cloud computing market provides a holistic analysis, market size and forecast, trends, growth drivers, and challenges, as well as vendor analysis covering around 25 vendors.

The report offers an up-to-date analysis regarding the current global market scenario, latest trends and drivers, and the overall market environment. The market is driven by the increased inclination towards cloud computing for cost-cutting and the rise in the adoption of cloud among SMEs.

The cloud computing market analysis includes service segment and geographic landscape. This study identifies the control over data backup and recovery as one of the prime reasons driving the cloud computing market growth during the next few years.

Companies Mentioned

The report on cloud computing market covers the following areas:

The study was conducted using an objective combination of primary and secondary information including inputs from key participants in the industry. The report contains a comprehensive market and vendor landscape in addition to an analysis of the key vendors.

The publisher presents a detailed picture of the market by the way of study, synthesis, and summation of data from multiple sources by an analysis of key parameters such as profit, pricing, competition, and promotions. It presents various market facets by identifying the key industry influencers. The data presented is comprehensive, reliable, and a result of extensive research - both primary and secondary. The market research reports provide a complete competitive landscape and an in-depth vendor selection methodology and analysis using qualitative and quantitative research to forecast the accurate market growth.

Key Topics Covered:

1. Executive Summary

2. Market Landscape

3. Market Sizing

4. Five Forces Analysis

5. Market Segmentation by Service

6. Customer landscape

7. Geographic Landscape

8. Vendor Landscape

9. Vendor Analysis

10. Appendix

For more information about this report visit https://www.researchandmarkets.com/r/9t23ff

Visit link:

Global Cloud Computing Market (2021 to 2025) - Featuring Adobe, Alphabet and Amazon Among Others - ResearchAndMarkets.com - Business Wire

Posted in Cloud Computing | Comments Off on Global Cloud Computing Market (2021 to 2025) – Featuring Adobe, Alphabet and Amazon Among Others – ResearchAndMarkets.com – Business Wire

Cloud Computing For Business Operations Market: The Development Strategies Adopted By Major Key Players And To Understand The Competitive Scenario …

Posted: at 6:46 am

Cloud Computing For Business Operations Market: The Development Strategies Adopted By Major Key Players And To Understand The Competitive Scenario

Cloud Computing For Business Operations Marketincludes Overview, classification, industry value, price, cost and gross profit. It also covers types, enterprises and applications. To start with, analytical view to complete information of Cloud Computing For Business Operations market. It offers market view by regions with countries, development in Cloud Computing For Business Operations industry, opportunity with challenges, sales strategies, growth strategies and revenue analysis to include price.

Get Free Sample PDF for Professional Insights:https://www.researchmoz.us/enquiry.php?type=S&repid=2601742

Cloud Computing For Business Operations Market report helps to analyses competitive developments such as joint ventures, strategic alliances, mergers and acquisitions, new product developments, and research and developments in the Cloud Computing For Business Operations Market: The Development Strategies Adopted By Major Key Players And To Understand The Competitive Scenario

The key players covered in this study:

Market Segment by Type, covers

Cloud Computing For Business Operations Market Segment by Applications, can be divided into

Market Segment by Regions, regional analysis covers North America (United States, Canada and Mexico) Europe (Germany, UK, France, Italy, Russia, Spain and Benelux) Asia Pacific (China, Japan, India, Southeast Asia and Australia) Latin America (Brazil, Argentina and Colombia) Middle East and Africa

Enquiry for Discount or to Get Customized Reporthttps://www.researchmoz.us/enquiry.php?type=D&repid=2601742

Table of Contents:

Get Assistance on this report at: https://www.researchmoz.us/enquiry.php?type=E&repid=2601742

About ResearchMoz

ResearchMoz is the one stop online destination to find and buy market research reports & Industry Analysis. We fulfil all your research needs spanning across industry verticals with our huge collection of market research reports. We provide our services to all sizes of organisations and across all industry verticals and markets. Our Research Coordinators have in-depth knowledge of reports as well as publishers and will assist you in making an informed decision by giving you unbiased and deep insights on which reports will satisfy your needs at the best price.

For More Information Kindly Contact:ResearchMoz90 State Street,Albany NY,United States 12207Tel: +1-518-621-2074USA-Canada Toll Free: 866-997-4948Email:sales@researchmoz.usFollow us on LinkedIn @http://bit.ly/1TBmnVGMedia Release:https://www.researchmoz.us/pressreleaseFollow me on :https://nextgenmarketresearch.blogspot.com/

See original here:

Cloud Computing For Business Operations Market: The Development Strategies Adopted By Major Key Players And To Understand The Competitive Scenario ...

Posted in Cloud Computing | Comments Off on Cloud Computing For Business Operations Market: The Development Strategies Adopted By Major Key Players And To Understand The Competitive Scenario …

Dell to sell its cloud business Boomi to Francisco Partners and TPG for $4 billion – Economic Times

Posted: at 6:46 am

Computer maker Dell Technologies on Sunday said private-equity firms Francisco Partners and TPG Capital have entered a definitive agreement to buy its cloud business, Boomi, in a $4 billion cash transaction.

The company said the deal was expected to close by the end of this year but did not disclose additional terms of the transaction. The Wall Street Journal had reported that Dell was nearing a deal to sell Boomi.

Liking this story?

Get one mail covering top tech news of the day in under 5 minutes!

Thank you for subscribing to Tech Top 5

Please wait...

The company this month said it would spin off its majority stake in cloud computing software maker VMware, which would trim down its business and make the firm nimbler.

Follow this link:

Dell to sell its cloud business Boomi to Francisco Partners and TPG for $4 billion - Economic Times

Posted in Cloud Computing | Comments Off on Dell to sell its cloud business Boomi to Francisco Partners and TPG for $4 billion – Economic Times

Creating Cloud Security Policies that Work | The State of Security – tripwire.com

Posted: at 6:46 am

Now that the ongoing worldwide trend toward going digital has been accelerated by COVID-19, taking extra precautions to protect your organizations data, communications and information assets is more important than ever.

Of course, there are many traditional and emerging ways to protect and secure your business:

However, the chief focus of this discussion will be on protecting your organization by creating and implementing cloud security policies or by updating and fortifying existing ones.

This is essential because, as reported in CIO, nearly all enterprises (96%) use cloud computing in some capacity, with a strong majority (81%) now employing multi-cloud scenarios and strategies.

Cloud security refers broadly to measures undertaken to protect digital assets and data stored online via cloud services providers, says Investopedia, which notes that common threats to cloud security include data breaches, data loss, account hijacking, service traffic hijacking, insecure application program interfaces (APIs), poor choice of cloud storage providers and shared technology that can compromise cloud security.

The good news is that the major cloud computing providers (including the Big Three of Amazon, Google and Microsofts Azure) invest heavily in providing cloud security to their users. What is crucial to understand, however, is that even though cloud computing itself is considered to be relatively safe, significant risk does come into play in terms of how you, the user, implement safety protocols and precautions on your side of the cloud computing experience.

More on this in a moment, but first, here is a quick review from Cloud Security Alliance and Tripwire on some of the top cloud security challenges:

There are many complex explanations out there that aim to answer the question: Why do I need a cloud security policy? Heres a simplified answer in four bullet points:

Perhaps the most important reason to implement and update cloud security policies for your organization is connected to a central tenet of cloud security known as the shared responsibility model.

Operationally speaking, security is broken into two components:

Cloud service providers (CSPs) are responsible for this. As explained in this article on the shared responsibility model: CSPs have the responsibility to ensure that their infrastructure is free from vulnerabilities. Theyre also responsible for the physical security of the cloud service and ensuring that unauthorized physical access to the hardware or software is prevented, as well as disaster and incident response. And doing so doesnt come cheap. Microsoft reportedly spends over $1 billion each year on security protections, including research and development.

This is your responsibility. OK, perhaps not you personally, but definitely your organization. According to an informative Wall Street Journal article, Gartner Inc. estimates that up to 95% of cloud breaches occur due to human errors such as configuration mistakes, and the research firm expects this trend to continue.

Connecting with a cloud security provider has many advantages, but can also be an extremely complex proposition. According to the article Human Error Often the Culprit in Cloud Data Breaches, Amazon Web Services has a130-page instruction guidefor how to operate Amazon Simple Storage Service (Amazon S3). The cloud users responsibility necessitates ongoing vigilance around password security, internal and external sharing of data, third-party access and much more. For many companies and organizations, cloud security also comes with regulatory requirements (for example: information access rules set forth HIPAA, GDPR, Sarbanes-Oxley, etc.).

For obvious reasons, creating a cloud security policy is an extremely complex undertaking. This is not a situation where you task the new guy in IT with whipping something together by end of day Friday. Youll need to engage senior leadership, IT leadership and perhaps even outside consulting firepower to create a comprehensive policy that truly protects your organization from risk.

Here is an overview of some of the key elements of creating a cloud security policy from TechTarget:

Global IT services provider PhoenixNAP offers a simplified look at several key aspects that must be addressed in a cloud security policy. These include:

Here are a couple of other helpful resources when it comes to developing an effective cloud security policy:

Digital Guardian provides a list of 50 cloud-based security tips. Weve curated a few of the most useful ones to help with your cloud security policy journey:

Finally, being transparent about your rigorous cloud security policies and protocols can be important in providing added peace of mind to customers or other organizations with which you do business.

About the Author:Michelle Moore, Ph.D., is academic director and professor of practice for theUniversity of San Diegos innovative online Master of Science in Cyber Security Operations and Leadership program. She is also a researcher and author with over two decades of private-sector and government experience as a cybersecurity expert.

Editors Note:The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

Go here to see the original:

Creating Cloud Security Policies that Work | The State of Security - tripwire.com

Posted in Cloud Computing | Comments Off on Creating Cloud Security Policies that Work | The State of Security – tripwire.com

Exceeding planned budget after migrating to the Cloud? – Express Computer

Posted: at 6:46 am

By Rajesh Thadhani, Executive Director, Digital Transformation and Services, Crayon Software Experts

It isno doubtthat migrating to the cloud is not just a trend. It is hereto stay. Today, many businesses have either already begun migrating or are under pressureof doingso. With this transition, however, many are discovering unexpected expenses and are exceeding their budget. Crayon examines the cloud migration, identifiesthe explanationsfor these unwanted expenses, and analyses how Cloud usage analysis can also create a culture of accountability ensuring ROI on your cloud spend.

What is happening under cover

The cloud itself is acollection of computing services accessed throughthe web. The cloud provides access to tools and resources foreasy scalingand adaptability. This is oftengreat for speed and innovation but has completely changed the way finance and procurement would look at budgeting. Cloud migration movesphysical workloads, IT resources, and applications from on-premise to the cloud environments.

Before boarding this journey to the cloud, every company should first consider how to leverage the cloud strategies thats cost-effective. Paying attention to cloud economics is critical, cloud consumptions forecasting can directly impact bottom lines.

A step back to understand what migration strategies include:

Rehost: This sort of migration is as is lift and shift moves your current on-premises assets on to the cloud as is. The model has its limitations as some may require re-architecting for compatibility with the new environment. Keeping everything as is during the migration also can mean forgoing additional cloud functionality. Having said that, this method is great for moving straightforward assets that do not need any alterations but is a risk to software compliance with respect to license mobility.

Replatform: While Rehost does not use any advantages of the Cloud other than migrating to the cloud. Re-platforming, with some additional re-architecting supports cloud infrastructure optimisation. The assets in the new cloud environment can now scale, automate and update infrastructure as required, thereby saving you costs.

Refactoring: We rebuild digital assets from scratch by replacing the old assets with new cloud-native ones. While refactoring is exhaustive process, it needs to be done very systematically by experts. And of courses, some applications need to be rebuilt using cloud technologies for optimum use.

Some tips for those who have already moved and need to optimise costs:

+ Delete disk storage if it has been unattached for two weeks, as it is unlikely the same storage will be used again.

+ Set a standardised policy in your organisation for the number of snapshots or images to be retained per object and for how long. Note, a recovery occurs from the most recent snapshot.

+ Check to shut down VMs that have a max CPU < 5 percent over the past 30 days, it is worth investigating.

+ VMs that have an average CPU < 5 percent and max CPU < 20 percent for 30 days are a good place to start rightsizing or termination.

+ Analysis has revealed that upgrading VMs to the latest generation saves millions of dollars per year.

+ Premium storage is billed based on the total disk size, regardless of consumption or use. Keep a close eye on utilisation of premium storage to minimize wasted cost.

+ For further cost savings, organisations can opt for the standard availability model and local redundancy.

+ There could be greater cost savings by leveraging reservations combined with the Azure Hybrid Benefit, this allows you to leverage your existing on-premise Windows Server and SQL Server licenses in Azure. Set targets for weekly hours of running non-production systems. A planned target of example, less than 80 hours per week, could save you thousands of dollars per month. Convert any hot tier objects older than 30 days to a cool tier.

If you have an interesting article / experience / case study to share, please get in touch with us at [emailprotected]

More here:

Exceeding planned budget after migrating to the Cloud? - Express Computer

Posted in Cloud Computing | Comments Off on Exceeding planned budget after migrating to the Cloud? – Express Computer