Category Archives: Cloud Servers
Internet of Medical Things Market Assessment, By Component, By Mode of Delivery, By Product, By Type, By Application, By End-user, By Region,…
ReportLinker
Internet of Medical Things Market Assessment, By Component [Hardware, Software, Services], By Mode of Delivery [On-premises, Cloud], By Product [Stationary, Implanted, Portable, Wearable, Others], By Type [Vital Signs Monitoring Devices, Implantable Cardiac Devices, Respiratory Devices, Others], By Application [Telemedicine, Medication Management, Patient Monitoring, and Others], By End-user [Hospitals, Clinics, Home Care, Research & Academic Institutions, Others], By Region, Opportunities, and Forecast, 2016-2030F.
New York, June 28, 2023 (GLOBE NEWSWIRE) -- Reportlinker.com announces the release of the report "Internet of Medical Things Market Assessment, By Component, By Mode of Delivery, By Product, By Type, By Application, By End-user, By Region, Opportunities, and Forecast, 2016-2030F" - https://www.reportlinker.com/p06470936/?utm_source=GNW
Global Internet of Medical Things (IoMT) Market size was valued at USD 152.87 billion in 2022 which is expected to reach USD 561.82 billion in 2030 with a CAGR of 17.67% for the forecast period between 2023 and 2030. IoMT is becoming increasingly popular due to its numerous advantages such as real-time patient monitoring, improved health outcomes, increased patient engagement and better chronic care management.IoT has accelerated the development of telemedicine, remote patient monitoring, interactive medicine, fitness & wellness assessment devices, and automation in healthcare institutions.
The global IoMT market has witnessed significant growth in recent years, driven by several key factors such as increasing focus on active patient engagement & patient-centric care, the rising burden on healthcare facilities with higher incidences of chronic health conditions, and greater usage of mobile computing devices.
For instance, IoMT devices are largely being recommended by doctors for finding the cause of gastrointestinal bleeding, diagnosing cancer, celiac disease, and so on. One such emerging trend is capsule endoscopy which is done via smart or digital pills for the areas which are not easily accessible through traditional endoscopy. Medtronic, Olympus Corporation, and CapsoVision are some of the organizations that manufacture and sell capsule endoscopy.
Additionally, with the help of smart bracelets and AI-synchronized cloud servers, patients now have access to individualized care with real-time monitoring. To automate these procedure s and implement effective safety regulations, sanitation and disinfection manufacturers had also launched UV-based mobile solutions. Medical device manufacturers are introducing AI-based IoT devices and machine learning solutions to promote improved detection and enhance treatment capabilities.
Digitization is Accelerating the Market Expansion
The healthcare industry has adopted digital technology to transition from mechanical and analogue electrical devices to existing digital technology. Digital technology is frequently used in the healthcare industry to monitor patient care quality, enhance clinical supp ort, and search medical information resources. Rapid digitization of healthcare systems has aided in effective patient care. Digitization helps in the improvement of treatment continuity, the promotion of good health, and illness prevention. The use of digital tools has the potential to improve the way health data is used in research and innovation, supporting more individualized treatment, superior health interventions, and improved health and wellness services.
The American Medical Association (AMA) reported that 85% of doctors in the United States acknowledged that telehealth improved the timeliness of care, and more than 70% of them were willing to increase the use of telehealth.
Increasing Demand for Real-Time Patient Health Monitoring
Internet of medical things (IoMT) connects the physical & digital world which tracks and adjusts patient behaviour in real-time to treat chronic illnesses such as- high blood pressure, diabete s, and asthma. Furthermore, IoMT technology can also improve the flow of information and various clinical processes by connecting people (patients, care givers and clinicians), patient or performance data, processes (care delivery and monitoring), and enablers (medical devices and mobile applications). With the help of this technology, patients can receive care at home, in ambulatory care facilities, or elsewhere not connected to a hospital. For instance, in June 2022, GYANT, the patient journey automation company, launched Asynchronous Care Platform to automate patient intake in EHR to making virtual visits more efficient and timesaving with minimal physical contact.
Government Regulations
In June 2022, the American Hospital Association introduced the Protecting and Transforming Cyber Healthcare (PATCH) Act, which represents nearly 5,000 healthcare delivery organizations and millions of healthcare professionals. Under the PATCH Act, device manufacturers would have to exhibit cybersecurity precautions to the FDA before going to the market; provide transparent software bill of materials (SBOM) for transparency and greater security insights into device software components and vulnerabilities; and provide timely device security information throughout their products lifecycles. Depending on their level of cybersecurity maturity, most organisations should look at stricter governance to assess the risk of the new devices they plan to build and apply for FDA approval for to comply with the Patch Acts requirements and upcoming FDA requirements.
Wearable Medical Devices Will Grow at a Faster Rate
Wearable medical devices are becoming popular among patients of all age-groups. Even though they are among the most basic and innovative types of wearable technology, they are enduring because they easily connect with smartphone apps to provide users with priceless health and fitness tips. Companies are allocating a significantly higher percentage of their R&D budget to the development of wearable devices. Many new businesses are approaching the market with cutting-edge wea rables.
Smartwatches, which formerly served merely as timepieces and step counters, have evolved into clinically useful healthcare tools. For instance, in September 2022, Apple unveiled its latest smartwatch models. The Series 8 model is jam-packed with industry-leading health features, such as a temperature sensor that enables sophisticated functions for womens health and crash detection for car accidents. With a faster processor and longer battery life than its predecessor, the second-generation Apple Watch SE is a great Series 8 alternative for those looking for a budget friendly option.
Smart Pills Gradually Gaining Traction
Smart pills are the upcoming trend in remote patient monitoring and personalized medicine applications. Smart pills offer the ability to collect real-time data on medication adherence, vital signs, and other physiological parameters, allowing healthcare providers to monitor patients health remotely and tailor treatment plans accordingly. This trend aligns with the broader shift towards telemedicine and digital health solutions, which aim to improve patient care, increase efficiency, and reduce healthcare costs. For instance, Proteus has developed an FDA-approved smart pill system that combines sensor-enabled medication with a wearable patch and a mobile app. Their system allows for remote monitoring of medication adherence and patient health data.
Remote Patient Monitoring Will Revolutionize Healthcare
Remote patient monitoring aims to decrease healthcare costs by decreasing the requisite for in-patient visits and hospital stays while maintaining timely and efficient care. It also improves patient outcomes by enabling healthcare professionals to identify and address health issues early, lowering the likelihood of complications. The remote patient monitoring segment is anticipated to expand due to the steadily increasing elderly population. Companies are focusing on bringing in new innovative products and monitoring devices that are more convenient for usage at home. For instance, in January 2022, Omron Healthcare launched VitalSight, a remote patient monitoring programme that enables patients to commit to routine heart health monitoring from the convenience of their homes.
World Health Organization (WHO) reports that the percent age of people aged 65 and older has increased from 6% in 1990 to 9% in 2019 and is expected to reach 16% in 2050. Nearly half of Americans are very supportive of integrating remote patient monitoring into medical care.
Impact of COVID-19
The sudden emergence of the COVID-19 virus had put the whole healthcare sector on high alert. It had compelled healthcare facilities, hospitals, and diagnostic centers worldwide to embrace the utilization of IoMT technology. The creation of a new smart healthcare system based on early detection, spreading control, education and medication has been supported by Internet of Medical Things and COVID-19, making living in the new norm easier. Patients with various health conditions were forced to use techno logy-driven approaches and remote care because traditional care facilities were closed or reserved for COVID-19 patients. Telehealth and IoT-enabled wearables were in high demand during the pandemic and helped in treating patients with serious illnesses.
Key Players Landscape and Outlook
Healthcare providers and technology companies are engaging in mergers and acquisitions, joint ventures, and extensive collaborations in the IoMT sector. IoMT applications are becoming more mainstream, which is creating new challenges and opportunities for businesses in the digital health sector and driving up merger and acquisition activity. For instance, Medtronic Plc. and Surgical Theater, Inc. have jointly developed StealthStation S8 , launched in June 2023, which is a surgical navigation system. The unique Stealth-Midas MR8 high-speed drill, provides the ability to easily navigate Midas Rex tools with StealthStation navigation during spinal surgery.
Additionally, Healthcare companies like Philips and Medtronic, as well as technology giants such as Cisco Systems, Inc., IBM Corporation, Abbott Healthcare Pvt Ltd and Boston Scientific Corporation are all creating capabilities in IoMT segment.Read the full report: https://www.reportlinker.com/p06470936/?utm_source=GNW
About ReportlinkerReportLinker is an award-winning market research solution. Reportlinker finds and organizes the latest industry data so you get all the market research you need - instantly, in one place.
__________________________
Story continues
See the rest here:
Internet of Medical Things Market Assessment, By Component, By Mode of Delivery, By Product, By Type, By Application, By End-user, By Region,...
Edge AI Market to Hit USD 54.38 Bn by 2029 at a CAGR of 20.1 percent: Says Maximize Market Research – Yahoo Finance
MAXIMIZE MARKET RESEARCH PRIVATE LIMITED
Edge AI Market is segmented into Component, Application, Device Type, Data Sources and Industry for market analysis. Increasing advancement of hardware technology and the increasing demand for real-time and low-latency processing are expected to drive Edge AI Market. The Edge AI Market was estimated using a bottom-up approach.
Pune, June 29, 2023 (GLOBE NEWSWIRE) -- A global Information Technology & Telecommunication business-consulting firm, Maximize Market Research, has delivered a market intelligence and competitive landscape report on the Edge AI Market. The report is a combination of primary data and secondary data and domain expert has analyzed the Edge AI Market from a local as well as a global point of view. Over the forecast period, Maximize Market Research expects the Edge AI market growth from USD 14.54 Bn in 2022 to USD 54.38 Bn in 2029 at a CAGR of 20.1 percent.
Edge AI Market Report Scope and Research Methodology
Market Size in 2022
USD 14.54 Bn.
Market Size in 2029
USD 54.38 Bn.
CAGR
20.1 percent (2022-2029)
Forecast Period
2022-2029
Base Year
2022
Number of Pages
276
No. of Tables
114
No. of Charts and Figures
112
Segment Covered
Component, Application, Device Type, Data Sources and Industry
Regional Scope
North America, Europe, Asia Pacific, Middle East and Africa, South America
Report Coverage
Market Share, Size & Forecast by Revenue | 20222029, Market Dynamics, Growth Drivers, Restraints, Investment Opportunities, and Key Trends, Competitive Landscape, Key Players Benchmarking, Competitive Analysis, MMR Competition Matrix, Competitive Leadership Mapping, Global Key Players Market Ranking Analysis.
Request For Free Sample Report: https://www.maximizemarketresearch.com/request-sample/190417
Edge AI Market Report Scope and Research Methodology
The Edge AI market report includes the extensive usage of both primary and secondary data collection methods. The report involves various factors affecting the industry, including the competitive landscape, historical data, current trends in the market, upcoming technologies, and the market risks, opportunities, barriers, and challenges for the Edge AI market. For the competitive analysis of the Edge AI market, major industry players are mentioned by region, along with their price, financial standing, product, product portfolio, technical developments, mergers and acquisitions, joint ventures, and strategic alliances.
Story continues
The bottom-up approach was used to establish the Edge AI market size and its estimation by various segments. Component, Application, Device Type, Data Sources and Industry are the segments used to analyze Edge AI to determine the favorable and unfavorable aspects that affect market growth. Regional analysis of Edge AI market was conducted at a local, regional and global level to understand Edge AI market penetration, price and demand analysis and competitive landscape. The report offers fundamental information on the Edge AI market such as stakeholders, investors and new entrants used to develop marketing plans and investments. SWOT analysis was used to provide the strengths and weaknesses of the Edge AI Market while PESTLE was employed to understand the potential impact of the micro-economic factors affecting the Edge AI Market.
Edge AI Market Overview
Edge AI is a computing paradigm that combines artificial intelligence (AI) with edge computing. It includes deploying AI algorithms and models directly on edge devices including sensors, cameras, gateways, and edge servers. The concept of Edge AI emerged as a response to the increasing need for real-time data processing and analysis, particularly in scenarios where latency, bandwidth, privacy, and security are critical. By bringing AI capabilities to the edge of the network, Edge AI enables faster decision-making and analysis without the need for continuous connectivity to the cloud.
Edge AI Market Dynamics
Edge AI brings artificial intelligence capabilities directly to edge devices, allowing for real-time processing and this is especially used in applications where low-latency decision-making is critical such as industrial automation, autonomous vehicles and Internet of Things (IoT) deployments. As a result, the increasing demand for real-time and low-latency processing boosts the Edge AI Market growth. The increasing advancement of hardware technology such as edge computing devices, system-on-chips (SoCs), and specialized AI accelerators is the driving factor for the market growth. These hardware advancements enable the efficient execution of AI algorithms on resource-constrained edge devices and help to grow the market. The growth of IoT devices and data, increasing concerns about data privacy and security and increasing need for real-time analytics are also the fuelling factors for the Edge AI Market growth.
The limited computing resources available on edge devices compared to cloud servers act as a major restraint for market growth. Data privacy and security and limited computational capabilities and connectivity on edge devices are also hampering factors for the market growth.
Edge AI Market Regional Insights
North America dominated the Edge AI Market in 2022 and is expected to maintain its dominance over the forecast period. Edge AI brings the power of artificial intelligence and machine learning algorithms closer to the data source, enabling real-time processing and analysis. This is particularly crucial for applications that need low latency including autonomous vehicles, industrial automation and healthcare. The increasing demand for real-time decision-making and immediate insights is driving the adoption of Edge AI technologies in the region. The proliferation of Internet of Things (IoT) devices, increasing concerns about data privacy and security, advancements in hardware technology, industry-specific applications and a supportive regulatory environment are also the boosting factors for the regional Edge AI market growth
Europe is a significantly growing region for the Edge AI market. The strong focus on data privacy and security and the significant adoption of Edge AI in sectors such as industrial automation, transportation, and smart cities are the influencing factors for regional market growth. The countries in Europe emphasize regulations including GDPR, which influence the development of Edge AI solutions.
Edge AI Market Segmentation
By Component
On the basis of the Component, the market is segmented into Hardware, Software, Edge Cloud Infrastructure and Services. The Hardware is expected to have significant growth for the Edge AI Market during the forecast period. Hardware components envelop the physical devices and equipment used in Edge AI deployments. This involves edge servers, gateways, IoT devices, sensors, cameras, AI accelerators, and specialized chips designed to help AI workloads. Hardware is used for the processing, storage, and connectivity capabilities needed at the edge.
Get Customization on this Report for Specific Research Solutions: https://www.maximizemarketresearch.com/request-customization/190417
By Application
Video Surveillance
Access Management
Autonomous Vehicles
Energy Management
Others
Based on application, the market is categorized into Video Surveillance, Access Management, Autonomous Vehicles, Energy Management and Others. Video Surveillance is expected to grow at a significant CAGR for the Edge AI Market. Video surveillance is a widely adopted application of Edge AI. By deploying AI algorithms at the edge, video surveillance systems have been performing real-time video analytics, object detection and anomaly detection. Edge AI enables fast decision-making, minimizes bandwidth needs by transmission of only relevant video footage and enhances security and response times in critical situations.
By Device type
Smartphones
Cameras
Robots
Wearables
Smart speakers
Surveillance Cameras
Edge Servers
Smart Mirrors
By Data Sources
By Industry
Automotive
Manufacturing
Healthcare
Energy and Utility
Consumer Goods
IT & Telecom
Others (Retail)
Edge AI Market Key Players Include:
Apple Inc. (United States)
Oracle Corporation (United States)
NVIDIA Corporation (United States)
Intel Corporation (United States)
Microsoft Corporation (United States)
General Electric Company (GE) (United States)
Honeywell International Inc. (United States)
Hewlett Packard Enterprise (HPE) (United States)
Amazon Web Services (AWS) (United States)
Advanced Micro Devices, Inc. (AMD) (United States)
Google LLC (United States)
Advanced Micro Devices, Inc. (AMD) (United States)
Xilinx, Inc. (United States)
Cisco Systems, Inc. (United States)
Dell Technologies Inc. (United States)
IBM Corporation (United States, but major presence in Europe)
IBM Corporation (United States, but major presence in Europe)
Accenture PLC (Ireland)
Siemens AG (Germany)
SAP SE (Germany)
Huawei Technologies Co., Ltd. (China)
Samsung Electronics Co., Ltd. (South Korea)
MediaTek Inc. (Taiwan)
NEC Corporation (Japan)
Get the Sample PDF of the Report: https://www.maximizemarketresearch.com/request-sample/190417
Key questions answered in the Edge AI Market are:
What is Edge AI?
What was the Edge AI market size in 2022?
What is the growth rate of the Edge AI Market?
Which are the factors expected to drive the Edge AI market growth?
What are the different segments of the Edge AI Market?
Read this article:
Edge AI Market to Hit USD 54.38 Bn by 2029 at a CAGR of 20.1 percent: Says Maximize Market Research - Yahoo Finance
Wi-Fi Sensing Technology Application Analysis – Light Reading
The Wi-Fi network has been widely used and become an important communication infrastructure in the current society. In fact, Wi-Fi can not only be used for communication, but also be used to perceive and measure the activity of a particular target in an environment, as it constantly sends wireless electromagnetic waves like radar. Researchers are actively researching the Wi-Fi Sensing technology to expand the use of Wi-Fi network devices.
Wi-Fi Sensing Technical Principles
Influenced by the environment and human activities, Wi-Fi signals have effects such as fading, shadow, and multipath during transmission. By measuring the linear transformation relationship between transmitted signals and received signals, the Channel State Information (CSI) that defines channel properties can be obtained. Based on signal processing, feature analysis, and deep learning technologies, Wi-Fi Sensing filters signal noise and extracts features from CSI, and then identifies the activity status, action types, and activity patterns of a person in the environment.
Wi-Fi Sensing Technical Features
Compared with traditional cameras and infrared technologies, Wi-Fi Sensing has the following technical features:
Wi-Fi Sensing Applications
In recent years, mainstream Wi-Fi chip vendors have gradually launched chips that support real-time output of the CSI information to upper-layer applications. Wi-Fi router vendors at home and abroad have launched routers with the capability of sensing the CSI. At the same time, telecom operators have deployed cloud Wi-Fi Sensing services, which support real-time analysis of CSI flow data, statistics of activity patterns, and exception alarms. At the same time, the IEEE-802.11bf working group is actively promoting the standardization of Wi-Fi Sensing, developing the standard format and process of collecting and distributing the CSI in the Wi-Fi network.It can be concluded that the implementation and application of the Wi-Fi Sensing technology has a certain foundation. With the rapid development of AI and big data processing technologies, we expect to see more products integrating the Wi-Fi Sensing technology in our lives in the Integrated Sensing And Communication (ISAC) era, which will bring convenience to people's lives in terms of home security, intelligent elderly-care, and health monitoring.
Home security
With ubiquitous Wi-Fi signals in the home, the Wi-Fi Sensing system can accurately determine whether anyone in the monitored area is active without increasing extra hardware costs. When the homeowner is at work and there is no one at home, or when the homeowner is sleeping at night, the Wi-Fi Sensing intrusion detection function of the home router can be enabled to ensure the security of the home.
Intelligent elderly-care
In terms of intelligent elderly-care, Wi-Fi Sensing has two major typical application scenarios: fall detection and activity pattern analysis. Wi-Fi Sensing fall detection can timely detect falls of the elderly, inform their children and community assistants to take rescue measures in order to prevent tragedy. Based on the activity analysis capability of Wi-Fi Sensing, data of the elderlys daily activity frequency, trajectory, amplitude, and pattern can be collected, and a behavioral model for the elderly can be established. When the elderly's behavior suddenly changes, exception warnings will be given, and family members will be notified in advance to eliminate health hazards.
Health monitoring
The millimeter wave Wi-Fi device using the 802.11ad protocol has excellent range resolution, direction resolution, and Doppler speed measurement precision. By using the professional Wi-Fi Sensing algorithm for this type of device, the heartbeat frequency and breathing frequency of a person can be analyzed, and whether the person suffers from asphyxiation during sleep can be monitored. If the health data has an exception, the Wi-Fi network can be used to report the result in real time to gain valuable rescue time.
Conventional medical devices often require contact with the human body, and require medical professionals to perform operation and analysis, which results in high costs. In comparison, the Wi-Fi Sensing health monitoring device can implement all-time, passive and non-contact detection, and is characterized by convenient, cheap, real-time, and high accuracy, which can be used as a beneficial supplement to the professional medical devices.
ZTE has designed and trained a deep learning algorithm model that can precisely senses human activities and identify falls. Together with Wi-Fi chip vendors, ZTE is verifying the CSI sampling performance of Wi-Fi baseband chips and building CSI sample libraries related to several types of actions. Taking into account market and customer needs and specific application scenarios, ZTE is poised to combine these algorithms and models into commercial Wi-Fi router devices or cloud servers based on the 802.11bf WLAN sensing standard, and bring more commercial and social value to customers.
This content is sponsored by ZTE.
See the article here:
Wi-Fi Sensing Technology Application Analysis - Light Reading
Wasm: 5 things developers should be tracking – InfoWorld
As browser-based WebAssembly (Wasm) gains interest as a back-end technology, developers are moving from Hmm, that sounds interesting to Lets see what Wasm can really do beyond browsers, video gaming, and content streaming.
At the same time, Wasm itself is starting to morph and shift. All of this makes it a good time to take another look at WebAssembly technology. As you evaluate Wasm for new uses, here are five things you should be keeping in mind.
Wasm was originally designed for the browser, and without a system interface to improve its overall security stance. The authors of the original web-focused Wasm didnt want applications to be able to request resources, in much the same way that Java applets are restrained within a browser.
But back-end developers using Wasm want an interface, so that they can port and use existing programs and programming paradigms (think Python, Ruby, web servers, etc). Enter the WebAssembly System Interface extension, aka WASI, a set of POSIX-like APIs that provide for OS-style functionality such as file systems, networking, and cryptography. WASI improves on execution and portability for existing software as well as new programs written with common, existing paradigms (using files, ports, etc.).
There has been a lot of push and pull between those who think Wasm should remain pure and those who want a POSIX-like systems interface. In fact, its a hotly contested issue in the upstream community. Some in the back-end server community have proposed a kind of compromise, suggesting that those who want to use Wasm as it was originally intended should do so, but that the interface could be added on top for those who want it. Me? I think WASI is necessary for the server side to succeed.
In some benchmark testing, Wasm demonstrates impressive performance. Wasm is fast and efficient, no doubt, but benchmark numbers should be taken with a grain of salt. For example, in the recent Vercel benchmark testing, Wasm performance was excellent. In the e-digit section, which is a computationally intensive assessment, Wasm was much faster than Java. But the dirty secret is, using the native Rust compiler written in C, running on bare metal, is still something in the neighborhood of four times as fast as Wasm. Further, in some of the other Vercel subtests, Java is much faster than Wasm.
Granted, the full performance of an application is going to be some smattering of a number of different benchmarks, but its important to note that Wasm is not a slam dunk performance-wise. This will be especially true if more elementssuch as WASIare laid on top of Wasm. Also, stay tuned for garbage collection, and how that might affect performance.
As noted earlier, Wasm is limited in scope for system security reasons. By making it less restrictive, such as when adding the WASI interface, you increase the attack surface. Its likely that the more popular Wasm gets, the more will be added to it, which will lead to more venues for human error or malicious actions. Multi-tenancy in particular is an area of concern. Is Wasm more secure than containers? Less than virtual machines? Does Wasm create a sweet security spot between the two? Maintaining this balance between functionality and security will be critical moving forward. Developers considering expanding their use of Wasm will need to be on top of (and part of) the debate.
One of Wasms biggest draws is its cross-platform portability. Wasm is a neutral binary format that can be shoved in a container and run anywhere. This is key in our increasingly polyglot hardware and software world. Developers hate compiling to multiple different formats because every additional architecture (x86, Arm, Z, Power, etc.) adds to your test matrix, and exploding test matrices is a very expensive problem. QE is the bottleneck for many development teams.
With Wasm, you have the potential to write applications, compile them once, test them once, and deploy them on any number of hardware and software platforms that span the hybrid cloud, from the edge to your data center to public clouds. A developer on a Mac could compile a program into a Wasm binary, test it locally, and then confidently push it out to all of the different machines that its going to be deployed on.
All of these machines will already have a Wasm runtime installed on them, one that is battle tested for that particular platform, thereby making the Wasm binaries extremely portable, much like Java. And when you compile a program down to that Wasm binary you can ship it out to a container registry, pull it down on another machine that has a Wasm runtime, and then run it anywherewhether the host is an M1 or M2 Mac, or an x86 system, or whatever.
When you look at how Arm and RISC are taking off, you realize that our polyglot world is only going to become more polyglot in the next five years, if not sooner. Containers plus Wasm looks like a big cross-platform win.
Another area of debate around Wasm is whether Wasm binaries should be run natively, alongside containers, or within containers. The beauty is, it really doesnt matter, as long as we all adopt the OCI Container Image format. Whether you run a Wasm binary natively on a Wasm runtime, or if that Wasm runtime runs within an OCI container (remember, theyre just fancy processes), you can create one image that can then be deployed across multiple architectures.
A single image saves disk space and compile time and, as previously noted, prevents your test matrix from getting out of hand. The benefits of running Wasm within a container is that you get defense in depth with very little performance impact. The benefit of running Wasm binaries side-by-side with containers is still to be studied, but either way, we should be able to preserve the value of the Kubernetes ecosystem. If you want to schedule Wasm containers, it will be easy because they'll all live in an OCI registry and youll be able to pull them down in Kubernetes (or Podman or Docker) and run them.
We know Wasm works well in the browser. Now its time to get excited about how Wasm could work on the server side. I think were all still learning about what Wasm might become, but in particular, Im most excited by the cross-platform potential. Could Wasm, combined with containers, truly deliver the promise of ultimate portability? I think its possible, but as technologists, well have to wait and see, and guide it where we need it to go.
Wasm is still emergingand mostly untestedon the back end. It will be important to continue to keep an eye of Wasms progress and think about how it could benefit each of our organizations. Will performance really be as good as bare metal? Will Wasm retain enough security, even with a new systems interface, to enable multi-tenancy? Lets find out together over the coming months and years!
At Red Hat, Scott McCarty is senior principal product manager for RHEL Server, arguably the largest open source software business in the world. Scott is a social media startup veteran, an e-commerce old timer, and a weathered government research technologist, with experience across a variety of companies and organizations, from seven person startups to 12,000 employee technology companies. This has culminated in a unique perspective on open source software development, delivery, and maintenance.
New Tech Forum provides a venue to explore and discuss emerging enterprise technology in unprecedented depth and breadth. The selection is subjective, based on our pick of the technologies we believe to be important and of greatest interest to InfoWorld readers. InfoWorld does not accept marketing collateral for publication and reserves the right to edit all contributed content. Send all inquiries tonewtechforum@infoworld.com.
Follow this link:
Wasm: 5 things developers should be tracking - InfoWorld
Congratulations to the 2023 Microsoft Partner of the Year Awards … – Microsoft
It is once again my honor to announce our Microsoft Partner of the Year Award winners and finalists. Over the past year, our global and diverse partner ecosystem has supported customers in their digital transformation with Microsoft Cloud applications, services, devices, and AI innovation. Across the cloud and edge, you have delivered unmatched value and helped organizations grow, run, and manage their businesses in new ways. The stories recognized with these awards are a showcase of your success in creating innovative solutions for our customers on the Microsoft Cloud.
We will celebrate these outstanding achievements together with all our partners across the globe at Microsoft Inspire 2023, which were hosting from July 1819. Visit the Inspire website to view event details and register.
Our partners are transforming to address evolving customer needs, responding to their increased demand for the cloud, and delivering IP and services that enable innovation, productivity, and customer success. Along the way, we have seen partners adapt to the opportunities presented by new technology from innovative uses of AI in every industry, to solutions enabling industries to operate more sustainably to drive global impact. Through the strength of our collaboration, our partner community and track record of success has continued to grow: this year we received more than 4,200 nominations across 106 countries/regions for the Partner of the Year Awards.
Your partnership is a key element to the success of our continued mission to empower every person and organization on the planet to achieve more, and is why we come together and celebrate this community every year.Together, we are more agile, inventive, and inclusive with our solutions. Thank you for your ongoing impact and creativity, which keep us on our industrys leading edge.
Congratulations to this years winners and finalists, and to all our partners who have demonstrated innovation, commitment to their customers, and consistent delivery of meaningful, accessible, inclusive, and sustainable solutions around the globe. We look forward to virtually gathering as a community to recognize and celebrate your achievements from the past year, and to share new opportunities to develop and expand your business.
Chief Partner Officer and Corporate Vice President, Global Partner Solutions
Nicole Dezen serves as Chief Partner Officer and Corporate Vice President, Global Partner Solutions (GPS) at Microsoft. She leads the commercial partner business and is responsible for building and selling Microsoft Cloud applications, services and devices with partners. She collaborates with a broad set of commercial partners including Advisory partners, device partners, Global System Integrators (GSIs), Independent Software Vendors (ISVs), and services partners to drive digital transformation, scale, business growth and profitability with partners.Nicole believes in empowering people to drive growth. She works to help partners unlock the virtually limitless power of the Microsoft Cloud to provide solutions that create new value for customers.Prior to leading GPS, Nicole led the Microsoft Device Partner Sales organization, where she successfully drove business growth and innovation across the device ecosystem by developing strategies with the most innovative original device and equipment manufacturers, silicon partners, along with resellers and distributors. Under her leadership, the team delivered opportunity and growth across Microsofts device and edge partner ecosystem spanning Windows PCs, IOT, Collaboration devices, Servers and Mixed Reality.With more than 25 years of sales experience in tech, Nicole's innate curiosity has led her from several years in telecommunications, to leading tech start-ups as CEO, to driving Microsoft's multi-billion-dollar commercial partner business today. Nicole joined Microsoft in 2007 and served in multiple roles in the US, Asia and EMEA.Nicole is a proud Los Angeleno living in the Pacific Northwest. In her personal time, Nicole is a foodie, and loves cooking family recipes, or crushing a Peloton ride. She loves to travel and experience the local culture and food in the cities and countries she visits.
View all posts
View post:
Congratulations to the 2023 Microsoft Partner of the Year Awards ... - Microsoft
Charming Kitten APT Group Uses Innovative Spear-phishing Methods – GBHackers
Charming Kitten APT Group Uses Innovative Spear-phishing Methods. Volexity researchers recently noticed that threat actors are actively intensifying their efforts to compromise the credentials or systems of their targets by employing Spear-phishing Methods.
While spear-phishing techniques involve sending personalized messages and engaging in dialogue for days before delivering malicious links or attachments.
Volexity often observes Charming Kitten, an Iranian-based threat actor, using these techniques, and their main focus is gathering intelligence through compromised credentials and spear-phishing emails.
The Charming Kitten APT group extracts additional access and attempts to shift to corporate VPNs or remote access services.
In this spear-phishing campaign, Charming Kitten was found to be distributing an updated version of the backdoor, dubbed POWERSTAR (aka CharmPower), by the security analysts at Volexity.
Volexity analyzed the latest version of the POWERSTAR backdoor, unveiling Charming Kitten APT Groups enhanced spear-phishing techniques and malware evolution.
However, despite all the challenges, Volexity successfully analyzed the new variant with all essential components.
Security researchers discovered a complex POWERSTAR variant, possibly aided by a custom server-side component for automated actions.
Notably, this version employs interesting features like IPFS and publicly accessible cloud hosting for decryption and configuration details.
Here below is the POWERSTAR timeline:-
Charming Kitten focused on a recent attack target, using an email address mimicking an Israeli media reporter to send a message.
However, before deploying malware, the attacker casually inquired if the target would review a document on US foreign policy, a common request resembling those from journalists seeking opinions on relevant topics.
Charming Kitten sustained interaction through a harmless email exchange with a question list, followed by the targets answers to deepen the targets trust.
After several days of legitimate communication, they sent a malicious LNK file embedded into a password-protected RAR file that is disguised as a draft report along with the password.
Here below, we have mentioned all the phishing operations that the phishing operator follows:-
Here below, we have mentioned all the features of POWERSTAR:-
The POWERSTAR backdoor payload collects system info and sends it to the compromised systems C2 address via a POST request.
In the analyzed sample, the C2 address was a subdomain on Clever Cloud, fuschia-rhinestone.cleverapps[.]io. It includes a victim identifier token for Charming Kittens tracking.
Volexity noticed the C2 updating the AES key dynamically, and POWERSTAR sets a random IV and sends it to C2 via the Content-DPR header.
While the earlier versions used a custom cipher instead of AES, which improves the operations of the malware. POWERSTAR has the capability to carry out commands using two programming languages, and here below we have mentioned them:-
Volexity successfully obtained access to nine modules of POWERSTAR, which are listed below:-
Since 2021, when Volexity initially detected POWERSTAR, Charming Kitten enhanced the malware to increase detection complexity.
The considerable alteration involves downloading the decryption function from remote files, making it harder to detect the malware except in memory.
Moreover, this technique gives the attacker a kill switch, which allows them to prevent further analysis of the crucial functionalities of the malware and its operations.
Implementing AI-Powered Email security solutions can secure your business from todays most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware
Read the original here:
Charming Kitten APT Group Uses Innovative Spear-phishing Methods - GBHackers
Schools Say US Teachers’ Retirement Fund Was Breached By … – Slashdot
An anonymous reader quotes a report from TechCrunch: Two U.S. schools have confirmed that TIAA, a nonprofit organization that provides financial services for individuals in academic fields, has been caught up in the mass-hacks targeting MOVEit file transfer tools. Middlebury College in Vermont and Trinity College in Connecticut both released security notices confirming they experienced data breaches as a result of a security incident at the Teachers Insurance and Annuity Association of America, or TIAA. According to its website, TIAA serves mire than five million active and retired employees participating at more than 15,000 institutions and manages $1.3 trillion in assets in more than 50 countries.
Both of the security notices confirm that TIAA was affected by hackers' widespread exploitation of a flaw in MOVEit Transfer, an enterprise file transfer tool developed by Progress Software. The mass-hack has so far claimed more than 160 victims, according to Emsisoft threat analyst Brett Callow, including the U.S. Department of Health and Human Services (HHS) and Siemens Energy. Only 12 of these victims have confirmed the number of people affected, which already adds up to more than 16 million individuals.
While TIAA notified affected schools of its security incident, the organization has yet to publicly acknowledge the incident. In response to a Twitter user questioning the organization's silence, TIAA responded saying that its offices were closed. It's not yet known how many organizations have been impacted as a result of the cyberattack on TIAA. TIAA has not yet been listed on the dark web leak site of the Russia-linked Clop ransomware gang, which has claimed responsibility for the ongoing MOVEit cyberattacks.
Read more here:
Schools Say US Teachers' Retirement Fund Was Breached By ... - Slashdot
Outlook on the Oman Data Center Market to 2028: Increasing Demand for Migration to Cloud Platforms by Various Sectors Attracts Local and Global Cloud…
Company Logo
Omani Data Center Market
Omani Data Center Market
Dublin, June 09, 2023 (GLOBE NEWSWIRE) -- The "Oman Data Center Market - Investment Analysis & Growth Opportunities 2023-2028" report has been added to ResearchAndMarkets.com's offering.
The Oman data center market is expected to grow at a CAGR of 9.60% from 2022-2028.
Key Highlights
The increasing demand for migration to cloud platforms by various sectors attracts local and global cloud service providers in the Oman data center market. For instance, Global Cloud Service operators such as AWS, Microsoft, Oracle, and Google have a presence with local operators in Oman.
In December 2022, the Ministry of Transport, Communications and Information Technology (MTCIT) in Oman signed a Memorandum of Understanding (MoU) with Amazon Web Services (AWS) for the launch of cloud service data centers in the country.
Regarding 5G connectivity, telecom operators like Omantel, Ooredoo, Nokia, Ericsson, and Vodafone are working towards deploying 5G technology in the country.
The government has launched its strategies, such as Vision 2040 and National Energy Strategy, which aim to generate around 30% of the electricity from renewable energy sources by 2030.
In August 2022, the Ministry of Housing and Urban Planning, part of Oman Vision 2040, was involved in developing three smart cities in the country. The smart cities are expected to be developed in Salala, Nizwa, and Suhar in Oman.
Reasons to Buy
Market size available in the investment, area, power capacity, and Oman colocation market revenue.
An assessment of the data center investment in Oman by colocation, hyperscale, and enterprise operators.
Investments in the area (square feet) and power capacity (MW) across states in the country.
A detailed study of the existing Oman data center market landscape, an in-depth industry analysis, and insightful predictions about industry size during the forecast period.
Snapshot of existing and upcoming third-party data center facilities in Oman
The Oman data center market investments are classified into IT, power, cooling, and general construction services with sizing and forecast.
A comprehensive analysis of the latest trends, growth rate, potential opportunities, growth restraints, and prospects for the industry.
Business overview and product offerings of prominent IT infrastructure providers, construction contractors, support infrastructure providers, and investors operating in the industry.
A transparent research methodology and the analysis of the demand and supply aspects of the industry.
Story continues
VENDOR LANDSCAPE
The Oman data center market has the presence of several local and global operators, such as Equinix, Ooredoo, Datamount, Cloud Acropolis, and Oman Data Park.
The prominent growth potential of the industry has also attracted several new entrants; for instance, Gulf Data Hub is expanding its footprints across the Middle Eastern region, where the company also has two pipeline projects in Oman.
EXISTING VS. UPCOMING DATA CENTERS
REPORT COVERAGE:
This report analyses the Oman data center market share. It elaboratively analyses the existing and upcoming facilities and investments in IT, electrical, mechanical infrastructure, general construction, and tier standards. It discusses market sizing and investment estimation for different segments.
The segmentation includes:
IT Infrastructure
Servers
Storage Systems
Network Infrastructure
Electrical Infrastructure
UPS Systems
Generators
Switches & Switchgears
PDUs
Other Electrical Infrastructure
Mechanical Infrastructure
Cooling Systems
Racks
Other Mechanical Infrastructure
Cooling Systems
CRAC & CRAH Units
Chiller Units
Cooling Towers, Condensers & Dry Coolers
Other Cooling Units
General Construction
Core & Shell Development
Installation & Commissioning Services
Engineering & Building Design
Fire Detection & Suppression Systems
Physical Security
Data Center Infrastructure Management (DCIM)
Tier Standard
Tier I & Tier II
Tier III
VENDOR LANDSCAPE
Major Vendors
IT Infrastructure Providers
Data Center Construction Contractors & Sub-Contractors
AECOM
DC Pro Engineering
Direct Services
Hill International
Turner & Townsend
Support Infrastructure Providers
Data Center Investors
Equinix
Ooredoo
Oman Data Park
Datamount
CloudAcropolis
New Entrants
KEY QUESTIONS ANSWERED:
How much is the Oman data center market investment expected to grow?
What is the growth rate of the Oman data center market?
How many data centers have been identified in Oman?
What are the driving factors for the Oman data center market?
Who are the key investors in the Oman data center market?
Key Attributes:
Report Attribute
Details
No. of Pages
92
Forecast Period
2022 - 2028
Estimated Market Value (USD) in 2022
$247 Million
Forecasted Market Value (USD) by 2028
$428 Million
Compound Annual Growth Rate
9.6%
Regions Covered
Oman
Key Topics Covered:
1. Existing & Upcoming Third-Party Data Centers in Oman1.1. Historical Market Scenario1.2. 5+ Unique Data Center Properties1.3. Data Center It Load Capacity1.4. Data Center White Floor Area Space1.5. Existing Vs Upcoming Data Center Capacity by Cities1.6. Cities Covered1.6.1. Muscat1.6.2. Other Cities1.7. List of Upcoming Data Center Projects in Oman
2. Investment Opportunities in Oman2.1. Microeconomic and Macroeconomic Factors in Oman 2.2. Investment Opportunities in Oman2.3. Investment by Area2.4. Investment by Power Capacity
3. Data Center Colocation Market in Oman3.1. Colocation Services Market in Oman3.2. Retail Vs Wholesale Data Center Colocation3.3. Colocation Pricing (Quarter Rack, Half Rack, Full Rack) & Add-Ons
Serverless is the future of PostgreSQL – InfoWorld
PostgreSQL has been hot for years, but that hotness can also be a challenge for enterprises looking to pick between a host of competing vendors. As enterprises look to move off expensive, legacy relational database management systems (RDBMS) but still want to stick with an RDBMS, open source PostgreSQL is an attractive, less-expensive alternative. But which PostgreSQL? AWS was once the obvious default with two managed PostgreSQL services (Aurora and RDS), but now theres Microsoft, Google, Aiven, TimeScale, Crunchy Data, EDB, Neon, and more.
In an interview with the founder and CEO of Neon Nikita Shamgunov, he stressed that among this crowd of pretenders to the PostgreSQL throne, the key differentiator going forward is serverless. We are serverless, and all the other ones except for Aurora, which has a serverless option, are not, he declares. If hes right about the importance of serverless for PostgreSQL adoption, its possible the future of commercial PostgreSQL could come down to a serverless battle between Neon and AWS.
In some ways, serverless is the fulfillment of clouds promise. Almost since the day it started, for example, AWS has pitched the cloud as a way to offload the undifferentiated heavy lifting of managing servers, yet even with services like Amazon EC2 or Amazon RDS for PostgreSQL, developers still had to think about servers, even if there was much less work involved.
In a truly serverless world, developers dont have to think about the underlying infrastructure (servers) at all. They just focus on building their applications while the cloud provider takes care of provisioning servers.In the world of databases, a truly serverless offering will separate storage and compute, and substitute the databases storage layer by redistributing data across a cluster of nodes.
Among other benefits of serverless, asAnna Geller, Kestras head of developer relations, explains, serverless encourages useful engineering practices. For example, if we can agree that its beneficial to build individual software components in such a way that they are responsible for only one thing, she notes, then serverless helps because it encourages code that is easy to change and stateless. Serverless all but forces a developer to build reproducible code. She says, Serverless doesnt only force you to make your components small, but it also requires that you define all resources needed for the execution of your function or container.
The result: better engineering practices and much faster development times, as many companies are discovering. In short, there is a lot to love about serverless.
Shamgunov sees two primary benefits to running PostgreSQL serverless. The first is that developers no longer need to worry about sizing. All the developer needs is a connection string to the database without worrying about size/scale. Neon takes care of that completely. The second benefit is consumption-based pricing, with the ability to scale down to zero (and pay zero). This ability to scale to zero is something that AWS doesnt offer, according to Ampt CEO Jeremy Daly. Even when your app is sitting idle, youre going to pay.
But not with Neon. As Shamgunov stresses in our interview, In the SQL world, making it truly serverless is very, very hard. There are shades of gray in terms of how companies try to deliver that serverless promise of scaling to zero, but only Neon currently can do so, he says.
Do people care? The answer is yes, he insists. What weve learned so far is that people really care about manageability, and thats where serverless is the obvious winner. [It makes] consumption so easy. All you need to manage is a connection stream. This becomes increasingly important as companies build ever-bigger systems with bigger and bigger fleets. Here, Its a lot easier to not worry about how big [your] compute [is] at a point in time. In other systems, you end up with runaway costs unless youre focused on dialing resources up or down, with a constant need to size your workloads. But not in a fully serverless offering like Neon, Shamgunov argues. Just a connection stream and off you go. People love that.
Not everything is rosy in serverless land. Take cold starts, for example. The first time you invoke a function, the serverless system must initialize a new container to run your code. This takes time and is called a cold start. Neon has been putting in a non-trivial amount of engineering budget to solving the cold-start problem, Shamgunov says. This follows a host of other performance improvements the company has made, such as speeding up PostgreSQL connections.
Neon also uniquely offers branching. As Shamgunov explains, Neon supports copy-on-write branching, which allows people to run a dedicated database for every preview or every GitHub commit. This means developers can branch a database, which creates a full copy of the data and gives developers a separate serverless endpoint to it. You can run your CI/CD pipeline, you can test it, you can do capacity or all sorts of things, and then bring it back into your main branch. If you dont use the branch, you spend $0. Because its serverless. Truly serverless.
All of which helps Neon deliver on its promise of being as easy to consume as Stripe, in Shamgunovs words. To win the PostgreSQL battle, he continues, You need to be as developer-friendly as Stripe. You need, in short, to be serverless.
Originally posted here:
Serverless is the future of PostgreSQL - InfoWorld
A data privacy law is becoming more urgent every day – The Dallas Morning News
Last month, the Irish Data Protection Commission (DPC), a leading European Union privacy regulator, issued a landmark ruling suspending Metas cross-border transfer of personal data from its EU users to its U.S.-based servers. The DPCs ruling includes a record $1.3 billion fine and could potentially shutter access to Facebook and Instagram across the EU.
The consequences, though, could extend far beyond Meta. In its ruling, the DPC held that businesses cannot rely on the so-called Standard Contractual Clauses, a legal framework used by Meta and others to transfer data from the EU to the U.S. in compliance with European privacy law. That framework is used by more than 90% of businesses engaged in transatlantic commerce, a nearly $7.1 trillion industry.
A disruption in transatlantic data flows would not only take a bite out of the economy, but also impact any company doing business in the EU which relies on U.S.-based software or cloud hosting.
The DPCs ruling against Meta is the latest in a long line of high-profile EU decisions that raise fundamental questions about whether European privacy law permits any type of transatlantic data transfer given the potential for U.S. intelligence agencies to surveil personal data held by American companies.
Opinion
Get smart opinions on the topics North Texans care about.
In other words, the concern driving the EU to ban data transfers to companies like Meta closely resembles the concern driving Americans to ban TikTok: That a foreign government may be able to surveil personal data held by a foreign company.
The upshot of this overlap aside, perhaps, from a gut check that Europeans view the U.S. like Americans view China is that both problems can be addressed through a single solution: a comprehensive federal privacy law.
This law can empower consumers to manage their own data in a way that minimizes what information businesses can collect or retain and, by extension, what governments can glean from those businesses. This would solve the problem from the bottom up, with consumers themselves limiting what data is potentially subject to corporate misuse or government surveillance.
The U.S. has much to gain from passing a comprehensive federal privacy law. Such a law would not only strengthen consumer privacy (by giving consumers more control) and protect national security (by reducing what data companies like TikTok can collect), but also provide American businesses with much-needed regulatory certainty.
The latter is particularly salient given the DPCs recent ruling against Meta. It is not tenable for American businesses to operate in a state of limbo as to whether their services or software will one day be banned in Europe or other privacy-conscious jurisdictions. And European policymakers have indicated that passing a comprehensive U.S. privacy law is the best way to stabilize EU-U.S. data flows over the long term.
Indeed, the European Commission is currently rushing to finalize a new transatlantic data transfer mechanism known as the EU-U.S. Data Privacy Framework. This new framework accounts for recent changes in U.S. surveillance policy made to address EU concerns. Yet these changes have been poorly received by European policymakers because they are the product of executive rather than legislative action, and the U.S., unlike most developed countries, lacks a comprehensive privacy law that enshrines baseline protections.
In the short term, these concerns should not stop the European Commission from finalizing the new framework to sustain data flows in the wake of the DPCs Meta decision. The commission has already indicated that, at least provisionally, the new framework adequately addresses concerns about mass surveillance, and a $7.1 trillion economic disruption would harm both the U.S. and Europe.
Even if the framework is finalized, though, it may not deliver the long-term certainty that American businesses need. Like its predecessors, it will face almost immediate legal jeopardy unless or until the United States passes a comprehensive privacy law.
Rarely can a single act of legislation serve the interests of industry, consumers and national security. A federal privacy law would do just that, but the clock is ticking.
Jordan E.M. Sessler serves as privacy counsel for BigCommerce, a Texas-based ecommerce software provider. The views expressed are his own and not those of BigCommerce. He wrote this column for The Dallas Morning News.
We welcome your thoughts in a letter to the editor. See the guidelines and submit your letter here.
Follow this link:
A data privacy law is becoming more urgent every day - The Dallas Morning News