The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Category Archives: Cloud Computing
This Cloud Computing Company Is A Better Pick Over Boston Scientific Stock – Trefis
Posted: December 3, 2021 at 5:19 am
We think thatVeeva Systems stock (NYSE: VEEV), a cloud-computing company focused on pharmaceutical and life sciences industry applications, currently is a better pick compared to Boston Scientific stock (NYSE:BSX), despite Veeva being the more expensive of the two. Veeva trades at about 23x trailing revenues, compared to just 5x for Boston Scientific. We are comparing these two companies given their similar operating income levels.
Both the stocks have underperformed with mid-single-digit growth year-to-date, compared to 22% growth for the broader S&P 500. While Boston Scientific saw a fall in demand for medical devices and supplies during the pandemic, due to fewer surgical procedures, Veevas business expanded with increased adoption of digital communication channels. In fact, Boston Scientifics revenue declined 8% during the pandemic, while Veevas revenue expanded a solid 28%. However, there is more to the comparison. Lets step back to look at the fuller picture of the relative valuation of the two companies by looking at historical revenue growth as well as operating margin growth. Our dashboard Boston Scientific vs Veeva:Similar Operating Income; Which Stock Is A Better Bet?has more details on this. Parts of the analysis are summarized below.
1. Veevas Revenue Growth Has Been Better
2. Veeva Is More Profitable
The Net of It All
Now that nearly 60% of the U.S. population is fully vaccinated against Covid-19, with overall economic activity picking up, the demand for medical devices and supplies is likely to rise going forward, boding well for Boston Scientific. For Veeva, a broader shift to digital communication is likely to pave way for continued growth for the company.
That said, Covid-19 is proving more difficult to contain than initially thought, due to the spread of more contagious virus variants and infections in some of the geographies, including Europe, are higher than what they were a few months back. The concerns around Omicron have spooked the markets at large with one confirmed case in the U.S. as well. If there is another large spike in Covid-19 cases from the new variant, it will disrupt economic recovery and impact sales as well as earnings growth of many companies. This may result in pressure on margins in the near term, especially for Boston Scientific.
Wondering how Boston Scientific peers stack up? Check out Boston Scientific Stock Comparison With Peers to see how BSX stock compares against peers on metrics that matter. You can find more such useful comparisons on Peer Comparisons.
What if youre looking for a more balanced portfolio instead? Heres ahigh-quality portfoliothats beaten the market consistently since the end of 2016.
[1] Month-to-date and year-to-date as of 12/2/2021[2] Cumulative total returns since 2017
View original post here:
This Cloud Computing Company Is A Better Pick Over Boston Scientific Stock - Trefis
Posted in Cloud Computing
Comments Off on This Cloud Computing Company Is A Better Pick Over Boston Scientific Stock – Trefis
Amazon Way Behind Microsoft, Salesforce, and Oracle in Cloud Software – Business Insider
Posted: at 5:19 am
Amazon Web Services is considered the market leader in cloud computing because of its dominance in the infrastructure space, such as computing power and storage services that enable other applications.
But it still lags behind its biggest competitors, like Microsoft, Salesforce, and Oracle, in one major piece of cloud computing: business applications, more broadly called software as a service, or SaaS.
In a recent survey of this sector bySynergy Research Group, five companies Microsoft, Salesforce, Adobe, Oracle, and SAP accounted for over 50% of the market. AWS, meanwhile, failed to crack the top 20.
"For SaaS, AWS is more of a channel to market for software vendors rather than a SaaS provider in its own right," John Dinsdale, Synergy's chief analyst and research director, told Insider.
For AWS, it's a big market to miss out on. The market for business applications, including everything from Microsoft Office 365 and Salesforce sales and marketing software to Zoom's videoconferencing app, is forecast to be the largest segment among all cloud services, reaching $145.4 billion in 2022,according to Gartner.
Amazon is aware of this. For years, the company has tried to build and grow its own applications business, across email, word processing, and video conferencing, to name a few. But those efforts have so far failed to gain traction, both internally and externally, as Insider previously reported.
To solve this, Amazon recently discussed the idea of acquiring a more high-profile software company to make a splash. Among the list of companies discussed was HubSpot, the $40 billion marketing software maker, as Insider previously reported.
"We have several applications that are very large successes," Amazon's representative wrote in a statement to Insider, highlighting Amazon WorkSpaces and Amazon AppStream, which support tens of thousands of active customers. "Others are earlier in their journey, but we continue to believe they have meaningful potential."
Do you work at Amazon? Contact the reporter Eugene Kim via the encrypted messaging apps Signal or Telegram (+1-650-942-3061) or email (ekim@insider.com). Reach out using a nonwork device.Check out Insider's source guidefor other tips on sharing information securely.
View original post here:
Amazon Way Behind Microsoft, Salesforce, and Oracle in Cloud Software - Business Insider
Posted in Cloud Computing
Comments Off on Amazon Way Behind Microsoft, Salesforce, and Oracle in Cloud Software – Business Insider
Are You Getting the Most Value from Your Data in the Cloud? – SPONSOR CONTENT FROM EDB – Harvard Business Review
Posted: at 5:19 am
Are You Getting the Most Value from Your Data in the Cloud?
By Marc Linster
It may be tempting to hire a large cloud computing provider that markets itself as a one-stop shop with a huge menu of offerings, including the choice of database. Temptingbut a potentially bad idea.
Although the cloud has become an equalizer giving all users access to the same infrastructure and technology capabilities, it can also flatten out competitive differentiation. This is because youre giving control of your datayour most important business assetto a generalist that specializes in infrastructure, not databases.
The Danger of Giving Up Control
Your database is the information store of your business, and it underpins every asset you want to inspect, analyze, and make better. Its the tool thats essential to informing a smart strategy, developing potential new revenue streams, and maintaining not just infrastructure agility but also business agility so you can react quickly to volatile market conditions.
In an era of increasing digitization of customer interactions, trusting your database to a generalist cloud vendor is risky because youre handing over not just control of your IT infrastructure but also how you manage and extract value from your data. Especially for demanding workloads and digital capabilities that are part of your market differentiation, you must trust that your vendor understands the technology that you need to support the intricacies of your business. Your vendor must also continuously improve the data-management capabilities of its technology to help you maintain your competitive edge and to enable you to move fully to the cloud.
Love Your Data
Data is the new oil. Data is the new gold. Youve heard the clichs, but its true that data offers power. That power doesnt reveal itself easily and needs to be protected. (As the computer scientist Kurt Bollacker has said, Data that is loved tends to survive.) If you really cherish your data and see your organization as being or becoming data-enabled or data-driven, then it makes sense to show your data some love.
You cant treat your database as a commodity line item, so you need to have a high-quality innovative product backed up by immediately accessible experts who know the technology because they built it. That way, any questions, problems, or new needs can be addressed fast. If you work with a specialist database provider, you can expect support for:
In a globalizing economy where technology is lowering barriers to entry and commoditizing products and services, competitive differentiation is becoming ever more reliant on data and how well your company uses it to identify opportunities and engage with customers.
Certainly, this use of data is helping accelerate the move to the cloud. But at EDB, we are seeing companies reconsidering their cloud-migration strategies, especially when it comes to recalibrating which data-management capabilities they require. This reconsideration is not just about reducing infrastructure and IT expenditure costs; it also is about making data in the cloud work harder for business outcomes.
In the days before the cloud, different partners might have supported different aspects of your on-premises data-center infrastructure. Today, if you want to extract the most value from your applications, moving to the cloud does not remove that need. Data is your differentiator, so it is critical for your cloud provider to have the specialized skills and knowledge you need to manage and drive innovation in your database stack. Without such strategic partnerships, you might limit how much you can capitalize on your data to drive competitive advantage.
EDB offers the first fully managed PostgreSQL database in the cloud with compatibility for Oracle database technology. Learn how EDB can help your organization deploy your most demanding applications to the cloud.
Marc Linster is chief technology officer at EDB.
Here is the original post:
Posted in Cloud Computing
Comments Off on Are You Getting the Most Value from Your Data in the Cloud? – SPONSOR CONTENT FROM EDB – Harvard Business Review
Industrial Cyber Security Market: High Investment in Infrastructure as a Service and Cloud Computing Tools to Augment Growth During Coronavirus -…
Posted: at 5:19 am
Pune, India, Dec. 01, 2021 (GLOBE NEWSWIRE) -- The global Industrial Cyber Security Market size is excepted reach to reach USD 29.41 billion by 2027, exhibiting a CAGR of 8.2% during the forecast period. The integration of cybersecurity solutions and advanced cloud services by various industries will spur opportunities for the global market during the forecast period, states Fortune Business Insights, in a report, titled Industrial Cyber Security (ICS) Market Size, Share & COVID-19 Impact Analysis, By Component (Product, Software and Services), By Security Type (Network Security, Cloud Application Security, End-point Security, Internet Security, and Others), By Industry (Process Industry and Discrete Industry) and Regional Forecasts, 2020-2027. The market size stood at USD 15.84 billion in 2019.
Request to Sample PDF Brochure:https://www.fortunebusinessinsights.com/enquiry/request-sample-pdf/industrial-cybersecurity-market-104557
The emergence of COVID-19 has brought the world to a standstill. We understand that this health crisis has brought an unprecedented impact on businesses across industries. However, this too, shall pass. Rising support from governments and several companies can help in the fight against this highly contagious disease. There are some industries that are struggling, and some are thriving. Overall, almost every sector is anticipated to be impacted by the pandemic.
The Report Lists the Key Companies in the Market:
We are making continuous efforts to help your business sustain and grow during COVID-19 pandemics. Based on our experience and expertise, we will offer you an impact analysis of coronavirus outbreaks across industries to help you prepare for the future.
Ask for Customization: https://www.fortunebusinessinsights.com/enquiry/customization/industrial-cybersecurity-market-104557
The report on industrial cyber security incorporates essential understandings of the market, all-inclusive data about prominent players, distinguished facts and figures, latest developments, key drivers and restraints, along with imperative information about dominant regions. Moreover, the report also provides a brief study regarding the impact of the COVID-19 pandemic impact on the industry.
Increasing Acceptance of AI-based Industrial Robots to Bolster Growth
The growing implementation of cloud-based ICS-as-a-service and industrial robots across manufacturing and industrial plants will contribute positively to the markets growth. According to the International Federation of Robotics, in 2018, there were around 125.6 thousand industry robots deployed across the automotive industry, 105.2 thousand deployed across the electronic industry, and 43.6 thousand deployed across the metal and mining industry worldwide. Similarly, as per the Robotic Industries Association (RIA) report, in 2018, around 422,000 industry robots shipped globally. Cybersecurity solutions secure industrial robots from cyber-attacks, thus supporting smooth operations. Moreover, governments heavy investments in cybersecurity will foster the market's healthy growth in the forthcoming years. For instance, in May 2017, the Singaporean government declared an investment for four years (2017 2021) of around USD 1.76 billion in economic strategies. This investment includes the advancement of various Cybersecurity Agency (CSA) of Singapore.
Investment Plans of Prominent Companies to Uplift Market Amid Coronavirus
The coronavirus has adversely affected the IT sector around the world, consequently hampering the market. However, noteworthy companies are focused on investment strategies to improve the market scenario. According to IDC, worldwide IT spending is expected to decline by 2.7% due to COVID-19. Moreover, the expenditure on infrastructure as a service (IaaS) and cloud computing tools is projected to increase in the near future. For instance, in May 2020, Rockwell Automation, Inc., announced that it has acquired Kalypso, LP., software delivery and consulting organization. The company intends to provide control products and solutions using Kalypsos abilities to develop security solutions. Moreover, the temporary closure of manufacturing facilities, industrial plants, factories, and other industries has restricted the market's expansion.
Quick Buy Industrial Cybersecurity Market Research Report:https://www.fortunebusinessinsights.com/checkout-page/104557
Implementation of Cloud-Based Security Solutions to Boost Growth in the Asia Pacific
The market Asia Pacific is expected to rise excellently during the forecast period due to existing companies in China, India, Taiwan, Japan, Australia, South Korea, and other ASEAN countries. The heavy investments in cloud-based security applications will contribute positively to the growth of the market in Asia Pacific. The emergence of new companies coupled with small and medium enterprises (SMEs) will foster the healthy development of the market in Asia Pacific. Europe is expected to expand radically during the forecast period owing to the rising investment for secure IT infrastructure across industries. For instance, according to UBS Group AG, in Europe, the estimated electric vehicle revenue is likely to reach around 6.33 million units by 2025.
Key Development:
August 2019: Cisco System Inc., an American multinational technology conglomerate headquartered in San Jose, California, completed the acquisition of Sentryo, a Lyon, France-based company. Sentryo offers cybersecurity solutions and asset visibility for industrial control systems (ICS).
Speak to Analyst:https://www.fortunebusinessinsights.com/enquiry/speak-to-analyst/industrial-cybersecurity-market-104557
Have a Look at Related Research Insights:
Access Control Market Size, Share & COVID-19 Impact Analysis, By Component (Hardware, Software, and Services), By Type (DAC, MAC, RBAC), By Application (Homeland Security, Commercial, Residential, and Industrial), and Regional Forecast, 2020-2027
Chatbot Market Size, Share & COVID-19 Impact Analysis, By Component (Platform/Software Development Kit and Services), By Deployment (Cloud and On-premises), By Application (Website, Contact Centers, Social Media and Mobile Application), By Industry (Banking, Financial Services and Insurance (BFSI), Retail and ecommerce, Information Technology (IT) and Telecom, Media and Entertainment, Healthcare and Others and Regional Forecast, 2020-2027
Speech and Voice Recognition Market Size, Share & Industry Analysis, By Component (Solution, Services), By Technology (Voice Recognition, Speech Recognition), By Deployment (On-Premises, Cloud), By End-User (Healthcare, IT and Telecommunications, Automotive, BFSI, Government, Legal, Retail, Travel and Hospitality and Others) and Regional Forecast, 2019 2026
Facial Recognition Market Size, Share & Covid-19 Impact Analysis, By Component (Solutions, Services), By Technology (2D Facial Recognition, 3D Facial Recognition, Thermal Face Recognition, Skin Texture Analysis, and Others, By Application (Face Identification, Access Control, Security & Surveillance, and Others, By End-user (BFSI, Healthcare, Government & Defense, IT & Telecom, Retail & ecommerce), and Regional Forecast, 2020-2027
Cyber Security Market Size, Share & COVID-19 Impact Analysis, By Component (Solution and Services), By Deployment Type (Cloud and On-Premise), By Enterprise Size (Small & Medium Enterprise and Large Enterprise), By Industry (BFSI, IT and Telecommunications, Retail, Healthcare, Government, Manufacturing, Travel and Transportation, Energy and Utilities and Others) and Regional Forecast, 2021-2028
About Us:
Fortune Business Insights delivers accurate data and innovative corporate analysis, helping organizations of all sizes make appropriate decisions. We tailor novel solutions for our clients, assisting them to address various challenges distinct to their businesses. Our aim is to empower them with holistic market intelligence, providing a granular overview of the market they are operating in.
Contact Us:
Fortune Business Insights Pvt. Ltd.
308, Supreme Headquarters,
Survey No. 36, Baner,
Pune-Bangalore Highway,
Pune - 411045, Maharashtra, India.
Phone:
US :+1 424 253 0390
UK : +44 2071 939123
APAC : +91 744 740 1245
Email: sales@fortunebusinessinsights.com
LinkedIn: https://www.linkedin.com/company/fortune-business-insights
Facebook: https://www.facebook.com/FortuneBusinessInsightsPvtLtd
Read Press Release: https://www.fortunebusinessinsights.com/press-release/global-industrial-cyber-security-market-10414
More here:
Posted in Cloud Computing
Comments Off on Industrial Cyber Security Market: High Investment in Infrastructure as a Service and Cloud Computing Tools to Augment Growth During Coronavirus -…
Cloud Security Alliance Issues Guidance to Help Organizations Optimize Business Outcomes When Using Cloud-native Key Management Services with External…
Posted: at 5:19 am
Paper offers recommendations for choosing, planning, and deploying cloud-native key management systems when organizations want to or must import key material
SEATTLE, December 02, 2021--(BUSINESS WIRE)--The Cloud Security Alliance (CSA), the worlds leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today released Cloud Key Management System with External Origin Key. Written by the Cloud Key Management Working Group to help organizations optimize such business outcomes as security, agility, cost, and compliance, the paper provides general guidance for choosing, planning, and deploying cloud-native key management systems (KMS) in cases where organizations either want to or must import key material (e.g., keys, vaults, secrets, policies) from an external source.
"A cloud service providers KMS often has strong ties to its other cloud services, and this same cloud-native KMS using EKO can be used with a customers on-premises technologies and cloud services from other providers. Unsurprisingly, integrating a cloud KMS with an organizations assets spanning traditional private data centers, as well as private and public cloud services in various geographic locations presents a host of challenges," said Paul Rich, co-chair of the Cloud Key Management Working Group and one of the papers authors. "Its our hope that after reading this document, program and project managers who have been tasked with leading their organization through the selection, planning, and deployment stages of cloud-native KMS using EKO will be able map considerations to their organization."
The guidance addresses the technical, operational, legal, regulatory, and financial aspects of leveraging a cloud-native KMS using external key origin (EKO) for each of the three stages of the lifecycle (choosing, planning, and deploying). Each aspect is broken down into further considerations and their accompanying justifications. Because cloud-native key management systems using EKO are relatively new, there isnt a large repository of best practices from which to draw. This guidance, therefore, combines best practices drawn from experience with traditional key management systems, cloud services in general, and cloud-native key management systems.
Story continues
For further reading, Key Management in Cloud Services: Understanding Encryptions Desired Outcomes and Limitations provides the foundation for the choice of cloud KMS pattern and general guidance for using KMS whether the KMS is native to a cloud platform, external, self-operated, or yet another cloud service. Additionally, Recommendations for Adopting a Cloud-Native Key Management System provides more specific guidance for choosing, planning, and deploying cloud-native key management systems.
The Cloud Key Management Working Group aims to facilitate the standards for seamless integration between cloud service providers and key broker services. Those interested in participating in future research and initiatives involving cloud key management are invited to join the working group.
Download Cloud Key Management System with External Origin Key now.
About Cloud Security Alliance
The Cloud Security Alliance (CSA) is the worlds leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, training, certification, events, and products. CSA's activities, knowledge, and extensive network benefit the entire community impacted by cloud from providers and customers to governments, entrepreneurs, and the assurance industry and provide a forum through which different parties can work together to create and maintain a trusted cloud ecosystem. For further information, visit us at http://www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.
View source version on businesswire.com: https://www.businesswire.com/news/home/20211202005230/en/
Contacts
Media Contacts Kristina Rundquist for the CSAkristina@zagcommunications.com
Read more here:
Posted in Cloud Computing
Comments Off on Cloud Security Alliance Issues Guidance to Help Organizations Optimize Business Outcomes When Using Cloud-native Key Management Services with External…
Dark clouds on the horizon: How to close the gaps in cloud security – SecurityBrief Asia
Posted: at 5:19 am
Article byGigamon A/NZ general managerGeorge Tsoukas.
These days cloud security is more trusted than ever. According to a recent study in a survey of 2,000 IT leaders from around the globe, nearly 85% of respondents said that they trust cloud security practices as much as, or more than, those associated with their on-premises data infrastructures.
Counterintuitive though it may seem, the reality is that in most cases, data is actually more secure when it is maintained offsite. Cloud computing eliminates the dangers associated with on-site threats (disgruntled employees, break-ins, disasters and regional emergencies, and so on).
At the same time, cloud vendors tend to take a more proactive approach to keep security measures fully patched and up to date, often well beyond standards maintained by individual organisations.
As such, cloud computing is enjoying a golden age of trust and capability. This is why it's all the more important to recognise that cloud security isn't infallible. There are still gaps in cloud security, and the first step to closing those gaps is identifying them.
What are the major problems of cloud security? A solid cloud infrastructure brings with it a number of advantages.
In addition to the obvious benefits associated with unrestricted availability (authorised users can access their cloud solutions at any time, from anywhere in the world) and improved collaboration (having a single, centralised set of cloud-based tools empowers team members to connect easily and share information), cloud computing is also capable of improving data capture and analysis, reporting, business continuity and resilience, and scalability.
Given the current business environment, these are essential factors in retaining a competitive edge. But let's not discuss the strengths of the cloud. Instead, let's focus on some of its potential weaknesses.
Modern problems in cloud security, though not as obvious as the fears when the cloud first began to gain prominence, can still represent a clear danger to businesses and their customers.
Taking a closer look at several gaps in cloud security and considering how these dark clouds may be casting a shadow on organisations can help understanding.
The inability to replicate on-prem security and compliance models is a serious issue. When people operate within the cloud, they play on someone else's field and have to abide by their rules.
While cloud vendors implement effective security solutions, these are seldom the same as those in which organisations have already invested significant time and energy in creating. So what happens to those security investments when a business switches to the cloud? In many cases, they risk being lost, along with essential data visibility.
This issue also extends to concerns with compliance models. Data compliance is a major issue, with new and upcoming legislation taking an ever-more-aggressive approach to ensuring safe and ethical data practices.
Non-compliance with regulatory measures may result in serious consequences, including fines, jail time for company executives, or even the forced dissolution of the offending company.
Unfortunately, issues related to data compliance in the cloud can be difficult to define fully, but even when data is managed entirely by cloud vendors, the business assumes at least a portion of the liability.
And when the organisation has almost no say in what compliance models are being implemented, it also has little control over the outcome.
Modifying cloud apps to meet security controls is a difficult process. The gaps in cloud security extend into cloud applications, and cloud apps may not be designed to meet the security standards of the organisations that depend on them.
While it may be possible to modify or extend some applications for improved security, doing so is generally a time-consuming, expensive and highly complex task.
If a business does not have access to the available resources, expertise or funding to modify cloud apps to meet security controls, then organisations may find themselves looking for other options.
All the previous points come together to create this final gap in cloud security. Because many organisations recognise all the issues, full cloud adoption may be slowed, lessened, or even completely halted. This can result in a less effective cloud security posture.
Security and compliance solutions
In many (or possibly most) cases, a company's data and reputation are still safer in the cloud than they would be if they were confined strictly to on-premises solutions.
That said, those gaps in cloud security should not be overlooked. To help ensure optimal data protection in the cloud, organisations need optimal cloud visibility.
Selected technology can provide unfiltered visibility into any private or hybrid cloud infrastructure, giving more control over everything that happens to assets in the cloud.
It enables users to eliminate many blind spots that stand in the way of optimal cloud security and experience. Organisations can see exactly how their data is being handled.
With visibility-as-code, essential monitoring can be embedded directly into cloud automation, easily scaling up or down to match users' needs.
With improved visibility comes increased control. Organisations are able to migrate their entire existing security posture directly to the cloud and ensure that investment in on-premises solutions and essential compliance frameworks becomes part of a complete cloud security plan.
Visibility also extends to cloud applications, delivering a reliable, easy and inexpensive way to connect cloud apps with your proven security controls.
In other words, advanced solutions are closing the most prominent cloud security gaps, enabling users to blow away the dark clouds blocking the view of their data.
See original here:
Dark clouds on the horizon: How to close the gaps in cloud security - SecurityBrief Asia
Posted in Cloud Computing
Comments Off on Dark clouds on the horizon: How to close the gaps in cloud security – SecurityBrief Asia
Google Cloud Selected by EMBL-EBI as Strategic Partner to Accelerate the Pace of Research – HPCwire
Posted: at 5:19 am
SUNNYVALE, Calif.andCAMBRIDGE, U.K.,Dec. 2, 2021 Hosting the worlds most comprehensive set of freely available and up-to-date molecular data resources,EMBLs European Bioinformatics Institute (EMBL-EBI)announced today it has chosen Google Cloud as a strategic cloud partner.
As part of a new, comprehensive, five-year partnership, EMBL-EBI will tap Google Clouds innovative technologies and global infrastructure to accelerate the pace of service delivery to its global user community, which includes research labs, pharmaceutical companies, academic institutions, and more.
EMBL-EBI hosts a range of open data resources for the life sciences community, spanning genomics, proteins, chemical data, and more. These data resources are freely and openly available for anyone to use, similar to a digital public library. This approach supports open science and speeds up scientific discovery on a global scale.
EMBL-EBI will use Google Clouds cloud infrastructure and services to accelerate the processing of data from the community, providing more value for researchers and stakeholders, and delivering new insights through EMBL-EBIs data resources.
The partnership between Google Cloud and EMBL-EBI aims to:
The use of cloud infrastructure will support EMBL-EBIs goals, and will not change researchers access to EMBL-EBI data. The global research community will continue to have open access to the institutes data resources and tools. The data hosted by EMBL-EBI will continue to be stored in the institutes data centers and will remain accessible via existing methods indefinitely. Over time, copies of selected data may be stored and processed in Google Cloud, in compliance with EMBLs internal data classification and data protection policies, and leveraging Google Clouds advanced data protection capabilities. All data stored on Google Cloud by EMBL-EBI remains under EMBL-EBI control and delivery.
Steven Newhouse, Head of Technical Services, EMBL-EBI said:Google has an incredible network of life science expertise as well as infrastructure services that provide a tremendous opportunity to work together to help speed up scientific discovery. Were excited about the possibilities that Google Clouds secure, flexible, and connected infrastructure can provide to EMBL-EBI to enable our services to be accessed globally.
Mark Palmer, Head of Public Sector, EMEA, Google Cloud, commented:As we continue our work with customers in the research space, the impact of cloud computing becomes increasingly clear. As part of this new partnership, we have the opportunity to accelerate research by providing EMBL-EBI with high performance computing solutions that will provide researchers with the tools and compute to drive more effective and efficient research.
About Google Cloud
Google Cloud accelerates organizations ability to digitally transform their business with the best infrastructure, platform, industry solutions and expertise. We deliver enterprise-grade solutions that leverage Googles cutting-edge technology all on the cleanest cloud in the industry. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems.
About EMBLs European Bioinformatics Institute (EMBL-EBI)
TheEuropean Bioinformatics Institute (EMBL-EBI)is a global leader in the storage, analysis and dissemination of large biological datasets. We help scientists realise the potential of big data by enhancing their ability to exploit complex information to make discoveries that benefit humankind.
We are at the forefront of computational biology research, with work spanning sequence analysis methods, multi-dimensional statistical analysis and data-driven biological discovery, from plant biology to mammalian development and disease.
We are part of EMBL and are located on the Wellcome Genome Campus,Cambridge UK, one of the worlds largest concentrations of scientific and technical expertise in genomics.
Funding
As part of the European Molecular Biology Laboratory (EMBL), the majority of EMBL-EBIs funding comes from the governments ofEMBLs member states. EMBL-EBIstechnical infrastructure development is also supported by capital investment fromUK Research and Innovation (UKRI). EMBL-EBI is extremely grateful to its funders for their continued support in helping the institute develop its technical infrastructure, which is crucial for making biological data freely and openly available to the international scientific community.
Source: Google Cloud
See the article here:
Google Cloud Selected by EMBL-EBI as Strategic Partner to Accelerate the Pace of Research - HPCwire
Posted in Cloud Computing
Comments Off on Google Cloud Selected by EMBL-EBI as Strategic Partner to Accelerate the Pace of Research – HPCwire
Running business on Cloud – The Hindu
Posted: at 5:19 am
From SaaS to IaaS to PaaS, the application of cloud computing has now become universal
If you want to sell something, the most important thing to focus on is the business model. And if you want to sell your products or services online, then you need a web portal that supports a business process that goes from taking the request,delivering the product and collecting the payment. Twenty years ago one would have to set up a technical team to manage all the computer infrastructure. However, that is no longer the case.
With Cloud Computing, you only have to subscribe to a service provider to obtain the hardware and operating system that your software needs. This lets you focus on the core business problem and not worry about computer infrastructure which will reside in a datacentre in your country or somewhere else. And the pricing for this mix of hardware product and service is based on how long the computers are used, the type of hardware and how much data is stored etc.. In other words, Cloud Computing brings the utility model to computer infrastructure: like electricity, we only pay for how much we use. Cloud computing business had a valuation of $370 billion in 2020 and it reflects how critically important Cloud Computing is to any business that uses software. Almost 50% of all corporate data is stored in the Cloud.
At the heart of Cloud computing are two vital technologies: virtualisation which lets computer resources be shared through multiple virtual machines; and network that lets data requests flow to and from the datacentre or the Cloud through the Internet. It needs to be noted that resource sharing and utility computing have existed in some form for many years. A good example is the IBM mainframe which accepted job requests and allocated computing resources. But the difference with Cloud computing is that hardware resources are distributed across multiple locations and there is a diverse choice of software that is available to consumers. Mainframes typically were high power computers but Cloud computing offers more computing power with commodity hardware and more choice of software pre-installed as per our demand.
This model of utility computing is called pay-as-you-go and it is the same principle behind Software as a Service (SaaS). With SaaS, a software user is charged based on how many transactions a customer makes and the volume of those transactions, instead of a flat fee. An example is Google Photos where a customer pays based on the giga-bytes that is required to store photos. Other popular examples are Zoho applications and Google Applications. SaaS model is now present in various complex businesses. Even Cloud Computing services like Amazon Web Services or Microsoft Azure, work on the principle of SaaS but because they offer Infrastructure, they are Infrastructure as a Service (IaaS) if we order hardware with minimal software, or Platform as a Service (PaaS) if we order hardware with more than minimal software installed on it.
When software is built and run on the Cloud, depending on where the servers (ie, the computer infrastructure) are located, the response time will differ. To provide quick responses especially when customers are present in multiple geographies (think Google or Amazon or IRCTC), it is prudent to host the Cloud in multiple locations. This is called Edge computing. By Cloud we refer to the same datacentre and network circuits that are used by multiple customers including possibly our business competitors. It is also called public Cloud. In contrast to this is the private Cloud where geographically distributed hardware are cordoned off virtually such that the computing resources are allotted only to one customer. A recent trend is to manage data security issues by using hybrid Cloud: the extremely vital, private information is stored in the private Cloud while the less critical data is stored in the public Cloud.
Cloud Computing unleashes unlimited computing resources and to use these resources to the fullest, new software development paradigms need to be adopted. For example, the recent trend known as Cloud native development is developing software that runs on multiple parallel threads or can automatically request for extra servers when demand is high and turn off servers when demand is low.
In order to automate launching new servers, managing them, running software in them, scaling them down etc. automation software like Terraform is used. These are called Infrastructure-as-a-service software. There are many solutions built around infrastructure failing over to a back-up, spawn new virtual machines called containers and ensure High Availability etc.. These solutions all come under the umbrella called Devops (Development and Operations).
When Cloud Computings potential is used well, one can launch rich features faster and put customers on cloud nine.
Read more:
Posted in Cloud Computing
Comments Off on Running business on Cloud – The Hindu
Empowering the military and first responders with IoT – TechTarget
Posted: at 5:19 am
Interconnected devices, machines and things affect every facet of industry and modern life, including consumer and retail spaces or industrial and manufacturing plants implementing environmental sensors, automation and edge computing. Technology has even changed modern warfare.
The internet of military things is a rapidly growing segment of IoT 2.0 accelerating in 2022 across operations in every branch of the armed forces and intelligence community.
In stark contrast to many of the edge computing use cases of the future like self-driving cars and drone-based deliveries, the internet of military things is about saving lives today by establishing information superiority in the field.
Despite increased tactical military sophistication, civilian, first responder and warfighter deaths rose in 2020. According to the National Law Enforcement Officers Memorial Fund, first responder casualties were up 96% in 2020. The final year of the U.S. campaign in Afghanistan saw the highest military and civilian casualty rate since operations began to diminish in 2015. The average number of natural disasters in the last decade has climbed nearly 10% over the first 10 years of the century.
Escalating conflicts abroad and increased civil strife at home combined with a global pandemic and ever more frequent demand for natural disaster response means the risk to human life is at an all-time high.
Over 20 years ago, the concept of network-centric tactical engagement transformed traditional command structures, enabling data sharing between both new and old assets to create information superiority.
The proliferation of sensors, unmanned vehicles, command posts and mobile-enabled personnel has resulted in a field scenario that is increasingly complex and sophisticated.
During the same period, the market has seen the rapid adoption of centralized cloud computing services. Organizations have attempted to create sustainable competitive advantages using the cloud's benefits, namely the ability to deliver more agile IT infrastructure at a reduced cost.
But centralized cloud computing appears ill-suited for the era of network-centric tactical engagement. The mismatch is partly because of the outsourced, centralized nature of cloud computing and partly because of the untenable nature of applying traditional cloud application architectures to deployment scenarios characterized by impermanent and transient infrastructure.
Tactical edge computing can be described as decentralized cloud computing whereby services can be used in geographically remote areas where reliance on communication with a centralized cloud is no longer needed. Given this decoupling of traditional cloud architectures, organizations can shape tactical edge computing to suit the environment. Decentralized computing will usher in the era of the "bizarre" looking data centers -- such as forward operating bases, personnel carriers, or data centers in a box.
More importantly, tactical edge computing will enable augmented intelligence for warfighters and first responders by embracing distributed application development and deployment. Distributed computing is the key to delivering real-time performance for data processing and data fusion algorithms that will drive innovation, such as real-time threat assessment and response, autonomous traffic systems for emergency services and precision navigation. These are future applications that will save lives by decentralizing decision-making and bringing the power of real-time data to the field.
The internet of military things is no trend. It's imperative for the success and safety of civilians, first responders and warfighters in dangerous situations worldwide. The foundation of the internet of military things is tactical edge computing. It is coming, and in 2022 it will become a national imperative to create a secure, resilient and strong infrastructure capable of meeting the needs of the nation and the world.
About the author
John Cowan is co-founder and CEO of EDJX. He is regarded as the company's business model visionary and is the author of the company's overall commercial strategy. Cowan is approaching 20 years of experience leading early stage company strategy execution, including raising and managing venture capital, identifying and executing potential mergers and acquisitions, and recruiting and developing high-performance teams and advisory boards.
Cowan presently serves on the board of directors of 6fusion USA Inc., Requis LLC and EDJX Inc., and was previously a member of the board of managers for Unified Communication X LLC.
View original post here:
Empowering the military and first responders with IoT - TechTarget
Posted in Cloud Computing
Comments Off on Empowering the military and first responders with IoT – TechTarget
The FTC is suing to block Nvidias $40 billion purchase of Arm – The Verge
Posted: at 5:19 am
Nvidias $40 billion acquisition of Arm just ran into another massive hurdle: the Federal Trade Commission, which announced today that its suing to block the merger from going through due to concerns that the combined companies would stifle competing next-generation technologies. The suit comes after an FTC investigation into the deal following complaints from Google, Microsoft, and Qualcomm shortly after the merger was announced.
The FTC is suing to block the largest semiconductor chip merger in history to prevent a chip conglomerate from stifling the innovation pipeline for next-generation technologies, said FTC Bureau of Competition director Holly Vedova in a statement. Tomorrows technologies depend on preserving todays competitive, cutting-edge chip markets. This proposed deal would distort Arms incentives in chip markets and allow the combined firm to unfairly undermine Nvidias rivals. The FTCs lawsuit should send a strong signal that we will act aggressively to protect our critical infrastructure markets from illegal vertical mergers that have far-reaching and damaging effects on future innovations.
The FTCs complaint notes that Nvidia already uses Arm-based products for several areas, including high-level advanced driver systems for vehicles, Arm-based CPUs for cloud computing, and DPU SmartNICs (networking products used in datacenters). The concern is that by acquiring Arm, Nvidia would gain an unfair advantage in those markets.
Additionally, the FTC raises concerns that Nvidia would gain access to sensitive information from Arm licensees who already compete with Nvidia, in addition to de-incentivizing Arm from working on new products and designs that would conflict with Nvidias own interests by benefiting competitors.
For its part, Nvidia has promised that it would keep Arms existing open licensing model, which sees the company provide semiconductor designs to a massive list of companies, including Apple, Qualcomm, Samsung, Amazon, and more. Nvidia CEO Jensen Huang wrote at the time in a Financial Times editorial that he could unequivocally state that Nvidia will maintain Arms open licensing model. We have no intention to throttle or deny Arms supply to any customer.
In a statement provided to The Verge, an Nvidia spokesperson stated that we will continue to work to demonstrate that this transaction will benefit the industry and promote competition. The company also reiterated its commitment to preserving Arms open licensing model and ensuring that its IP is available to all interested licensees, current and future, arguing that the merger would boost competition, [and] create more opportunities for all Arm licensees and expand the Arm ecosystem thanks to Nvidias added resources.
The FTC isnt the only regulator closely examining the $40 billion deal: the European Union opened a formal investigation into the deal in October, while the UKs Competition and Markets Authority started a more in-depth examination of potential national security risks and competition concerns last month.
Huang acknowledged back in August that the regulatory review would likely take longer than the companys originally estimated 18-month timeframe but told the Financial Times that [were] confident in the deal, were confident regulators should recognize the benefits of the acquisition. The original plan was for the merger to be completed by March 2022 (although Nvidias deal with Softbank gives it until the end of the year to clear things with regulators). But with the FTC now suing to block the deal, it seems that Nvidia and Arms list of hurdles has just gotten much longer.
Update December 2nd, 5:42pm: Added Nvidia statement.
Read the rest here:
The FTC is suing to block Nvidias $40 billion purchase of Arm - The Verge
Posted in Cloud Computing
Comments Off on The FTC is suing to block Nvidias $40 billion purchase of Arm – The Verge