Category Archives: Cloud Servers

Oracle Cloud Had A Banner 2021 And Now Very Credible – Forbes

If you haven't noticed, I am have positive on Oracle's Cloud Infrastructure (OCI) and havewritten several articleson the topic. That was not always the case. I was very critical of Oracle Cloud V1.0.

OraclesGeneration 2 Cloudisan entirely new infrastructure developed from the ground up with no resemblance to its predecessor. The design goals werebetter performance, pricing, andabove all elsesecurity.Oracle Cloud V2 is a significant improvement, more competitive, and the reason I have had a change of heart.

A year ago, in aJanuary 2021 article, I wrote, "In my view, Oracle has come a long way since Cloud V1.0, and the product is better than the market perception right now. You heard it here first. Over the next 12 to 18 months, the story will keep getting told, and you will see more key customers choosing Oracle.

A year on,it is high time to take stock of that prediction and see where OCI stands in the marketplace.

Oracle

OCI by the numbers

Oracle reported stellarQ2 earningsdue tocontinued and increased global demand for the cloud business.

The increase in OCI consumption revenue was 86% in constant currency, with total cloud customer revenue up 45%.Those are impressive numbers compared to the largest IaaS and PaaS companies. I can only imagine the disruptive transition to aconsumption-based business. Customers only pay for cloud services when consumed. A simple pay-as-you-go concept, but it changes the entire sales cycle.

And, customer momentum appears to be broad-based. Enterprise and cloud native customers are running mission-critical workloads on OCI. Oracle's sample of those customers is Deutsche Bank, Pernod Ricard, Bayer, Aviva, Santander Bank, Telefonica Brasil, Quest Diagnostics, Bechtel, Carrefour, Liberty Global, Ingersoll Rand, and the National Stock Exchange of India.

Oracle is also making strides with cloud-native companies like Kaltura, SoundHound, and independent software vendors such as Telestream, Thomson Reuters, Kaltura,Crunch Mediaworks, Ericom Software, Fastly, and SCC Soft Computer.

Oracle also continues to expand its sports partnerships with teams like theGolden State WarriorsandRed Bull Racingto showcase how those organizations are using Oracle Cloud to gain a competitive advantage on and off the court and track. Its why Oracle partners not only with individual teams but, in certain cases, entire leaguessuch asPremier LeagueandSailGP.

The industry is taking notice too.Oracles score in a recent Gartner Scorecard reportjumped to 78%ahead of Google.

Why the continued momentum? Below I dig into the reasons why I think OCI is gaining momentum.

Equivalent performance and latency in the cloud

At the very least, you expect comparable I/O performance and latency. OCI featuresisolated network virtualization, essentially moving network and IO virtualization out of the server stack to network. The result is dedicated hosts with no hypervisor overhead, interference from other servers, or shared resources with a complete software-defined Layer 3 network topology. Off-box network virtualization enables bare-metal, VM's, containers, and databases to run on the same set of APIs with the cloud-native security and governance of a Layer 3 virtual network.

OCI addresses latency concerns witha flat non-blocking network based onClos network topology(named after Charles Clos). Predictable data rates reduce the number of routers and switches that data has to pass through.

OCImeets enterprise requirements for database clustering (including OracleReal Application Clusters(RAC),Exadata, VMware, compute clustering (RDMA), and tenant isolation.

Easing migration of enterprise workloads

Migrating enterprise workloads to the cloud is non-trivial. Oracle hasthe Cloud Liftprogramthat offerstechnical expertise and white-glove services to help customers move to the cloud at no additional cost.More than1,000 global companieshave already used the program.

Financial incentives are possible withOracle Support Rewards, which enables new OCI customers to reduce software license costs, even down to zero.

Oracle Support Rewards is a program where you earn $0.25 to $0.33 in rewards for every $1 you spend on OCI. Rewards are applied to reduce your technical software license support bill. The $0.33 bonus is applicable if you are anUnlimited License Agreement (ULA)customer.

If you use Oracle's on-premises software, you become eligible for Oracle Support Rewards when you place aUniversal Credit orderand begin consuming OCI.

Redefines the Telco cloud market

Oracle continues to introduce new solutions and recently announced Oracle Cloud for Telcos, a comprehensive set of cloud solutions built on OCI, that provides telcos with an exceptional customer experience and helps drive new opportunities for growth.The solution takes advantage of Oracles decades of experience working with global telcos to support their critical data systems, applications, and network operations.Oracle has already started with key partners likeTIM (Telecom Italia),Bharti Airtel, andTelefonica Espana.

Strong support for regions and hybrid clouds

I believe the customer experience is better when the cloud resources are closer. It is that simple. Additionally,business continuity and compliance requirements dictate that applications run across geographically separated locationsoften without having sensitive data leave the country. Oracle has invested in significantGlobal cloud region expansionacross 30 commercial and seven government cloud regions in 14 countries. Oracle opened sevennew cloud regions alone in the last three months -Israel,Marseille,Abu Dhabi,Milan,Stockholm,SingaporeandJohannesburg.

Customers can run thecomplete portfolio of public cloud servicesandOracle Fusion SaaSapplications on-premises withDedicated RegionandExadata Cloud@Customer. At the edge,Roving Edge Infrastructurewith ruggedized devices enables cloud computing at the edge of networks and disconnected locations.

Notably, Oracle also sees strong hybrid adoption from customers like Deutsche Bank, Volkswagen, and Marsh McLennan.

TheOracle and Microsoft Azure interconnectdelivers a mostly seamless and private interoperability for the many customers running multi-cloud environments.Oracle now has 10 interconnects around the world with the recent addition of South Korea and Phoenix.

Oracle joined forces with Cloudflarein the Bandwidth Alliance toeliminate unnecessary data transfer feesand ease the path to multi-cloud.

Continued innovation on the platform

OCI introduced hundreds of services and features over the past year. Here are just a few that caught my attention.

Oracle Cloud for Telcosis a comprehensive set of cloud solutions built on OCI. The OCI platform runs Oracle Fusion Cloud Applications Suite, Oracle Communications core network and B/OSS solutions, and more than 60 other industry application suites, as well as third-party and custom applications and workloads. It enables telcos to build new applications or modernize existing workloads with 80 plus cloud services, including data management, developer services, analytics, and artificial intelligence.

Oracle Cloud for Telcos enables any telecommunications provider to become more agile, reduce capital expenditures and operating costs, and establish a flexible foundation for innovation. Telcos can:

Applying artificial intelligence (AI) to applicationswithout requiring data science expertise is the goal of introducing anew set of AI servicesfor OCI. Prebuilt text recognition and anomaly detection models are now available to all OCI customers, once again at attractive prices. High query performance at scaleincluding provisioning, data loading, query execution, and failure handling is now possible with anew MySQL Database service with an in-memory query acceleration engine calledHeatwave.For the first time, MySQL customers have a unified platform for Online Transaction Processing (OLTP) and Online Analytics Processing (OLAP) to run mixed workloads or real-time analytics.

Oracle introduced a new service calledOracle Autonomous JSON Databasethat automates database provisioning, securing, scaling, and tuning to reduce the risk and cost of human error.Oracle Autonomous Database scored the highest in all four use cases in the2020 Gartner Critical Capabilities for Cloud Database Management Systems for Operational Use Cases.

I would be amiss not to mention security innovations in the public cloud. Oracle'sphilosophy has always been to build security into the core product. Security features such as encryption are default enabled. There is alist of security featuresto numerous to list here that come free with the product.

Oracle also provides additional capabilities likeSecurity Zonesso administrators can automatically set up and enforce security policies across cloud compartments within OCI.

Finally,in August 2021, Oracle also released theOracle Cloud Infrastructure (OCI) Cloud Adoption Frameworkto better support customers in their cloud adoption journey. The framework was created as a resource rich center serving anyone who wants to further their cloud knowledgefrom a tech operator to a CIOand as an opportunity to learn more about OCIs unique capabilities. Recently, Oracle enhanced delivering the framework by creating theOCI Cloud Adoption Framework technical site, which hosts relevant technical content, assets, and tools to better enable organizations shifting to the cloud. The site includes templates for cloud business strategy documents, reference architectures for specific scenarios,landing zonescripts to accelerate cloud deployments, and showcases the latestOCI Governance Model.

Wrapping up

I should probably quit my predictions while I am ahead, but clearly, Oracle is making many of the right moves in the cloud space, and customers are voting with dollars.

One area I will be closely looking at OCI in 2022 is its integration of Arm-based instances to lower its customers cost of compute. Cloud companies like AWS have fully embraced the technology and Oracle has to watch this carefully. I will also be looking at composable memory architectures in a future version of OCI where customers can add more memory on-demand without having to add a compute instance.

It will be interesting to check back in at the end of 2022 to review the OCI scorecard.

Note: Moor Insights & Strategy writers and editors may have contributed to this article.

Moor Insights & Strategy, like all research and tech industry analyst firms, provides or has provided paid services to technology companies. These services include research, analysis, advising, consulting, benchmarking, acquisition matchmaking, or speaking sponsorships. The company has had or currently has paid business relationships with 88,A10 Networks,Advanced Micro Devices, Amazon,Ambient Scientific,AnutaNetworks,Applied Micro,Apstra,Arm, Aruba Networks (now HPE), AT&T, AWS, A-10 Strategies,Bitfusion, Blaize, Box, Broadcom, Calix, Cisco Systems, Clear Software, Cloudera,Clumio, Cognitive Systems, CompuCom,CyberArk,Dell, Dell EMC, Dell Technologies, Diablo Technologies,Dialogue Group,Digital Optics,DreamiumLabs, Echelon, Ericsson, Extreme Networks, Flex, Foxconn, Frame (now VMware), Fujitsu, Gen Z Consortium, Glue Networks, GlobalFoundries, Revolve (now Google), Google Cloud,Graphcore,Groq,Hiregenics,HP Inc., Hewlett Packard Enterprise, Honeywell, Huawei Technologies, IBM,IonVR,Inseego, Infosys,Infiot,Intel, Interdigital, Jabil Circuit, Konica Minolta, Lattice Semiconductor, Lenovo,Linux Foundation,Luminar,MapBox, Marvell Technology,Mavenir, Marseille Inc, Mayfair Equity, Meraki (Cisco),Mesophere, Microsoft, Mojo Networks, National Instruments, NetApp, Nightwatch, NOKIA (Alcatel-Lucent), Nortek,Novumind, NVIDIA,Nutanix,Nuvia (now Qualcomm), ON Semiconductor, ONUG, OpenStack Foundation, Oracle, Panasas,Peraso, Pexip, Pixelworks, Plume Design, Poly (formerly Plantronics),Portworx, Pure Storage, Qualcomm, Rackspace, Rambus,RayvoltE-Bikes, Red Hat,Residio, Samsung Electronics, SAP, SAS, Scale Computing, Schneider Electric, Silver Peak (now Aruba-HPE), SONY Optical Storage,Springpath(now Cisco), Spirent, Splunk, Sprint (now T-Mobile), Stratus Technologies, Symantec, Synaptics, Syniverse, Synopsys, Tanium, TE Connectivity,TensTorrent,TobiiTechnology, T-Mobile, Twitter, Unity Technologies, UiPath, Verizon Communications,Vidyo, VMware, Wave Computing,Wellsmith, Xilinx,Zayo,Zebra,Zededa, Zoho, andZscaler.Moor Insights & Strategy founder, CEO, and Chief Analyst Patrick Moorhead is a personal investor in technology companiesdMYTechnology Group Inc. VI andDreamiumLabs.

Visit link:
Oracle Cloud Had A Banner 2021 And Now Very Credible - Forbes

Cybercriminals Target Linux-based Systems With Ransomware and Cryptojacking Attacks – Yahoo Finance

VMware report finds more than half of Cobalt Strike users are using the tool illicitly

PALO ALTO, Calif., February 09, 2022--(BUSINESS WIRE)--As the most common cloud operating system, Linux is a core part of digital infrastructure and is quickly becoming an attackers ticket into a multi-cloud environment. Current malware countermeasures are mostly focused on addressing Windows-based threats, leaving many public and private cloud deployments vulnerable to attacks that target Linux-based workloads.

Today, VMware, Inc. (NYSE: VMW) released a threat report titled "Exposing Malware in Linux-based Multi-Cloud Environments."(1) Key findings that detail how cybercriminals are using malware to target Linux-based operating systems include:

Ransomware is evolving to target Linux host images used to spin workloads in virtualized environments;

89 percent of cryptojacking attacks use XMRig-related libraries; and

More than half of Cobalt Strike users may be cybercriminals, or at least using Cobalt Strike illicitly.

"Cybercriminals are dramatically expanding their scope and adding malware that targets Linux-based operating systems to their attack toolkit in order to maximize their impact with as little effort as possible," said Giovanni Vigna, senior director of threat intelligence at VMware. "Rather than infecting an endpoint and then navigating to a higher value target, cybercriminals have discovered that compromising a single server can deliver the massive payoff and access theyre looking for. Attackers view both public and private clouds as high-value targets due to the access they provide to critical infrastructure services and confidential data. Unfortunately, current malware countermeasures are mostly focused on addressing Windows-based threats, leaving many public and private cloud deployments vulnerable to attacks on Linux-based operating systems."

As malware targeting Linux-based operating systems increases in both volume and complexity amid a rapidly changing threat landscape, organizations must place a greater priority on threat detection. In this report, the VMware Threat Analysis Unit (TAU) analyzed the threats to Linux-based operating systems in multi-cloud environments: ransomware, cryptominers, and remote access tools.

Story continues

Ransomware Targets the Cloud to Inflict Maximum Damage

As one of the leading breach causes for organizations, a successful ransomware attack on a cloud environment can have devastating consequences.(2) Ransomware attacks against cloud deployments are targeted, and are often combined with data exfiltration, implementing a double-extortion scheme that improves the odds of success. A new development shows that ransomware is evolving to target Linux host images used to spin workloads in virtualized environments. Attackers are now looking for the most valuable assets in cloud environments to inflict the maximum amount of damage to the target. Examples include the Defray777 ransomware family, which encrypted host images on ESXi servers, and the DarkSide ransomware family, which crippled Colonial Pipelines networks and caused a nationwide gasoline shortage in the U.S.

Cryptojacking Attacks Use XMRig to Mine Monero

Cybercriminals looking for an instant monetary reward often target cryptocurrencies using one of two approaches. Cybercriminals either include wallet-stealing functionality in malware or they monetize stolen CPU cycles to successfully mine cryptocurrencies in an attack called cryptojacking. Most cryptojacking attacks focus on mining the Monero currency (or XMR) and VMware TAU discovered that 89 percent of cryptominers used XMRig-related libraries. For this reason, when XMRig-specific libraries and modules in Linux binaries are identified, it is likely evidence of malicious cryptomining behavior. VMware TAU also observed that defense evasion is the most commonly used technique by cryptominers. Unfortunately, because cryptojacking attacks do not completely disrupt the operations of cloud environments like ransomware, they are much more difficult to detect.

Cobalt Strike Is Attackers Remote Access Tool of Choice

In order to gain control and persist within an environment, attackers look to install an implant on a compromised system that gives them partial control of the machine. Malware, webshells, and Remote Access Tools (RATs) can all be implants used by attackers in a compromised system to allow for remote access. One of the primary implants used by attackers is Cobalt Strike, a commercial penetration testing and red team tool, and its recent variant of Linux-based Vermilion Strike. Since Cobalt Strike is such a ubiquitous threat on Windows, the expansion out to the Linux-based operating system demonstrates the desire of threat actors to use readily available tools that target as many platforms as possible.

VMware TAU discovered more than 14,000 active Cobalt Strike Team Servers on the Internet between February 2020 and November 2021. The total percentage of cracked and leaked Cobalt Strike customer IDs is 56 percent, meaning that more than half of Cobalt Strike users may be cybercriminals, or at least using Cobalt Strike illicitly. The fact that RATs like Cobalt Strike and Vermilion Strike have become a commodity tool for cybercriminals poses a significant threat to enterprises.

"Since we conducted our analysis, even more ransomware families were observed gravitating to malware targeting Linux-based systems, with the potential for additional attacks that could leverage the Log4j vulnerabilities," said Brian Baskin, manager of threat research at VMware. "The findings in this report can be used to better understand the nature of this malware and mitigate the growing threat that ransomware, cryptomining, and RATs have on multi-cloud environments. As attacks targeting the cloud continue to evolve, organizations should adopt a Zero Trust approach to embed security throughout their infrastructure and systematically address the threat vectors that make up their attack surface."

Download the full report here.

Methodology

The VMware Threat Analysis Unit (TAU) helps protect customers from cyberattacks through innovation and world-class research. TAU is composed of malware analysts, reverse engineers, threat hunters, data scientists, and intelligence analysts at VMware. To understand how to detect and prevent attacks that bypass traditional, file-centric, prevention strategies, TAU focuses on techniques that were once the domain of advanced hackers and are now moving downstream into the commodity attack market. The team leverages real-time big data, event streaming processing, static, dynamic and behavioral analytics, and machine learning.

TAU applied a composition of static and dynamic techniques to characterize various families of malware observed on Linux-based systems based on a curated dataset of metadata associated with Linux binaries. All the samples in this dataset are public and therefore they can be easily accessed using VirusTotal or various websites of major Linux distributions. TAU collected more than 11,000 benign samples from several Linux distributions, namely, Ubuntu, Debian, Mint, Fedora, CentOS, and Kali. TAU then collected a dataset of samples for two classes of threats, namely ransomware and cryptominers. Finally, TAU collected a dataset of malicious ELF binaries from VirusTotal that were used as a test malicious dataset. TAU started collecting the dataset in June 2021 and concluded in November 2021.

About VMware

VMware is a leading provider of multi-cloud services for all apps, enabling digital innovation with enterprise control. As a trusted foundation to accelerate innovation, VMware software gives businesses the flexibility and choice they need to build the future. Headquartered in Palo Alto, California, VMware is committed to building a better future through the companys 2030 Agenda. For more information, please visit http://www.vmware.com/company.

Sources & Citations

Exposing Malware in Linux-Based Multi-Cloud Environments, VMware, February 2022

Global Security Insights Report, VMware, June 2021

View source version on businesswire.com: https://www.businesswire.com/news/home/20220209005064/en/

Contacts

Kerry TuttleVMware Global Communicationsktuttle@vmware.com (470) 247-1987

Go here to see the original:
Cybercriminals Target Linux-based Systems With Ransomware and Cryptojacking Attacks - Yahoo Finance

Azure offers free inward migration with Data Dynamics and Komprise Blocks and Files – Blocks and Files

Microsofts Azure public cloud is providing free inward data migration courtesy of deals with Data Dynamics and Komprise.

An Azure Storage Blog by Karl Rautenstrauch, Microsoft principal program manager for Storage Partners, says these deals with unstructured data management partners help you migrate your file data to Azure Storage at no cost! Its recommended for use by customers with 50TB or more of data to migrate. Users with less data can use tools such as AzCopy, rsync, or Azure Storage Explorer.

He adds: We intend this new program to help our customers and partners migrate from on-premises and non-Azure deployments of Windows or Linux File Servers, Network Attached Storage, and S3-compliant object stores to Azure Blob Storage, Azure Files, or Azure NetApp Files.

This program is a complement to the Azure Migrate portfolio which many Azure customers have used to automate and orchestrate the migration of servers, desktops, databases, web applications, and more to Azure.

Customers who take up the program will be given an onboarding session to learn how to use the software and will receive access to the support knowledgebase and email support for the chosen ISV and up to two support phone calls. We have also co-authored Getting Started Guides and our ISVs have created How-To videos to help you quickly begin your migration, writes Rautenstrauch. The program does not include professional services to help you configure the software beyond the onboarding session, Getting Started Guides and How-To videos.

Data Dynamics uses its StorageX product while Komprise supplies its Elastic Data Migration (EDM) offering. EDM was launched in March 2020 and takes NFS/SMB/CIFS file data and moves it across a network to a target NAS system, or via S3 to object storage systems or the public cloud.

Komprise says EDM eliminates cost and complexity in managing file data by providing analytics-driven data migration to Azure:

Customers can upgrade to the full product,Komprise Intelligent Data Management, which means they can transparently tier across Azure Storage platforms, cutting up to 70 per cent of cloud costs.

Find out more about the Azure and Komprise migration deal here. Lets see if Amazon Web Services and the Google Cloud Platform follow in Azures footsteps.

Go here to read the rest:
Azure offers free inward migration with Data Dynamics and Komprise Blocks and Files - Blocks and Files

Future of Cloud Computing for Real Estate – The Times of India Blog

The real estate sector has transformed over the past decade with a younger crowd looking to the internet to make the first step towards buying a home or property. In order to stay competent and relevant, it is important for the real estate sector to adopt new technologies. Cloud technology is the right path for those looking to build an online presence with the help of marketing. Thanks to the pandemic, as per latest research a massive 80% of top real estate companies have switched their operations to Cloud in one form or another. It could be lead management, customer relationship management and more.

Heres how Cloud Computing can help the Real estate Sector:

1. Cost-effective

Real estate sector is depending on IT more day by day. But having an in-house infrastructure can be highly expensive since it will involve hiring resources, maintaining server and infrastructure costs. But migrating to a cloud can keep the costs to a minimum. The infrastructure used for cloud is that of the service provider, it offers pay-as-you-go model.

2. Remote Accessibility

Cloud enables files to be accessible from anywhere and on any device as long as you have a working internet connection. This will certainly help in the real estate sector when you are carrying out a client visit which will help showcase your recent work or upcoming projects as reference. All the necessary information will be at your fingertips. Cloud also enables staff to be more productive by overcoming any disruptions that can happen when physical meet is not possible during the pandemic. In such situations, having cloud accessibility makes it faster to communicate to clients in real time.

3. Increased Security

IT security is a major concern for most businesses. Implementing a robust security can be both expensive and challenging if you have limited budgets. Opting for cloud can help resolve this since cloud service providers utilize most advanced tools to protect data and deploy next-gen firewalls with intrusion and malware protection to keep cybercriminals away from servers and data.

4. Data Insights

Data is an integral part of decision making in providing insights that can help improve productivity, cost effectiveness, marketing, web design and more. Cloud technology helps analyze data and centrally manage data by providing insights needed to drive business forward.

It helps map customer journeys across all touchpoints ensuring that communications are consistent. The data also can help pinpoint poorly performing pages so that quick comebacks can be done such that customers stay on page for longer duration and this in turn helps gain advantage over competitors.

5. Superior Customer Experience

As per latest research, 86% of customers are willing to pay more if they are offered better customer experience. Migrating to the cloud provides an added advantage in providing excellent customer experience not only swiftly but cost effectively too. Using cloud helps businesses provide information to both buyers and sellers without having to visit the premises physically. To take cloud usage to the next level, some of the real estate agents even offer financial calculation tools, virtual tours, online form fills, customer service chatbots, omnichannel messaging etc. This helps buyers and sellers make an informed decision and in the long run foster strong relationships that lead to better reviews and online reputations.

6. Timely Upgrades

With cloud computing, the real estate sector does not have to worry about software upgrades.

The latest updates are generally taken care of by cloud service providers. This definitely leads to saving on investments that needs to be done towards maintaining servers, infrastructure that comes with on-premises servers.

7. Data Recovery

Data loss in the case of cloud is very minimal as cloud service providers store all the data in the cloud. In case of emergencies, there is no threat to data loss. SMEs generally cannot afford to make huge investments in terms of allocating budgets towards expensive disaster recovery systems. Cloud computing has definitely helped these businesses to thrive by providing cloud-based storage solutions that help safeguard their data.

8. Better Control of Data

Before the advent of cloud, employees had to send files back and forth before zeroing in on the final document. This would definitely lead to errors and reduced accuracy. With multiple versions of the file being tossed back and forth, it would be confusing. However, with cloud computing, multiple users can access the same file from different locations and suggest changes in real time leading to reduced error rate.

9. Enhanced Collaboration

Improving collaboration across teams and taking your business on international platforms, overcoming geographical barriers and time zones can be easily handled through cloud computing. Teams from different parts of the world can access the same document form anywhere and collaborate to perform better and in a more time-efficient manner.

10. Disaster Management and Mitigation

Cloud-based technologies are expected to only increase in disaster mitigation and management. The losses incurred by the real estate sector because of natural disasters or other calamities have been an area of concern for quite some time. With cloud-based technologies, disaster management can be handled better and more efficiently not only saving lives but minimizing the cost of repair and maintenance.

The rapid rate at which cloud technology is growing, it has become imperative that all sectors adopt the latest technology to meet the heightened expectations of consumers. Real Estate sector will need more agile environments to function better. To stay competitive and relevant, it is now more than essential to move to faster technology like cloud to achieve business continuity as well as meet customer expectations. Compared to 2020, the use of cloud computing increased by 41% in the real estate industry. The job opportunities are also booming because of the integration of cloud technology making way for new opportunities like Virtual Valuation Advisor, Virtual Leasing Manager which is of great help during the pandemic. Cloud is definitely the way to move forward for any sector, especially in the real-estate sector.

Views expressed above are the author's own.

END OF ARTICLE

See the rest here:
Future of Cloud Computing for Real Estate - The Times of India Blog

How to fix OneDrive sync issues on Windows 11 – WindowsReport.com

Cesar has been writing for and about technology going on for 6 years when he first started writing tech articles for his university paper. Since then, his passion for technology blossomed into a prosperous...Read more

XINSTALL BY CLICKING THE DOWNLOAD FILE

Microsoft OneDrive is a cloud hosting service that sees a ton of usage. It stores every kind of file on company servers with 5 GB for free, right off the bat. The client also adds file synchronization and is available on tons of platforms, some of which dont belong to Microsoft.

Just to name a few, OneDrive is on macOS, iOS, Android, the Xbox Series X, and even the Xbox 360 from over a decade ago. Plus, Microsoft Office apps are directly integrated with OneDrive to ensure no previous work is lost. Theres nothing worse than working on a giant project only to have it deleted suddenly.

All in all, OneDrive is incredibly useful and its hard to imagine life without it and it sees frequent updates. However it may be, there are times when OneDrive will stop working for whatever reason. It may get stuck and stop connecting to Microsofts servers.

There are multiple ways to fix OneDrive connection problems with no single solution that fixes everything. You may have to try out multiple methods before you find the one that works.

Also, it may take a really long time to fix the issue. One of the methods is to reset your connection to OneDrive, and depending on how big and how many files you have, it may take several minutes to resync all the data. Fortunately, you wont have to worry about losing any sort of precious data. OneDrive saves everything before issues arrive.

This guide will show you multiple ways that you can try out to fix connection problems with OneDrive. In fact, one of the easiest things that you can do is simply close and open the OneDrive app again.

Once you perform one of these steps, go back and check your OneDrive app to see if it works.

Coincidentally, there was a recent update for OneDrive for Business, which allows users to have control over who gets access to files, plus makes it easier to people to have said access. Its a pretty good quality of life change.

On February 4, Windows 11s Media Player got a major update but is only available in the Windows Insider beta channel. The new player adds album art and artist information for music and high dynamic range playback for videos.

You also may be interested to know about the wide variety of note-taking apps on Windows 11. You may think that writing notes doesnt require a specialized app, but youd be surprised at what some of these apps can do with their advanced features. Some have features that assist creatively minded people with their projects.

Feel free to leave a comment below if you have any questions on other Windows 11 apps. Also, leave comments about guides that youd like to see or information on other Windows 11 features or list guides like this.

Thank you!

Start a conversation

Read more:
How to fix OneDrive sync issues on Windows 11 - WindowsReport.com

What Are You Really Agreeing to in the Terms and Conditions for Google Drive and Microsoft OneDrive? – Coconuts

Although we highly value the privacy of our personal information, very few of us actually bother to read the terms and conditions or privacy agreements thoroughly when they sign up for cloud storage platforms, such as Microsoft OneDrive or Google Drive. Generally, users tend to trust that tech companies will always be morally upright and respectful of data privacy. Unfortunately, nothing could be further from the truth.

Did you know that terms and conditions often allow such platforms to view, use and sell everything you upload? The gold standard for privacy in cloud storage is zero-knowledge approach, which means that your provider doesnt store a copy of your encryption key, so the cloud storage service cant decrypt your files. However, did you know that neither Microsoft OneDrive nor Google Drive offer this?

Choose the right cloud storage ecosystem for you

Most personal and business data is now stored and accessed through offshore servers located in dedicated data centers connected over the internet. Cloud storage service providers differ in storage space, data encryption and server infrastructure. Google Drive offers the largest free plan and the cheapest paid cloud file storage, while OneDrive offers a secure folder locked by an extra level of two-factor authentication.

However, in comparison, Singapore-based Treasure Clouds technology promises that your privacy is never compromised. You might be pleasantly surprised to know that Treasure Cloud offers up to 800GB of free cloud storage space.

How your personal data is (ab)used in the small print

Googles attitude towards privacy has always raised eyebrows. Google Drives privacy policy states that it will collect the content you create, upload or receive from others when using our services and this includes emails, documents you create and comments you make on Google platforms like YouTube. Google states that it collects this data to provide better services as well as personalized ads, but it doesnt explicitly state that your sensitive data might be available to Google employees and algorithms. Also, its Google, so you just know its most likely tracking everything youre doing.

In comparison, Microsoft OneDrive is a little less intrusive. Its privacy policy states that it doesnt use what you say in email, chat, video calls or voicemail, or your documents, photos or other personal files to target ads to you no doubt to give users a false impression that they have some autonomy over their data. Nonetheless, its lack of zero-knowledge encryption means that Microsoft engineers can access your files whenever they want to.

By default, when signing into Windows with a Microsoft account, Windows has the ability to sync your settings and data with Microsoft servers containing information like your web browser history, favorites and sites you may have opened, along with saved app, website, mobile hotspot and Wi-Fi network names and passwords. However, users can deactivate this transfer to the Microsoft servers by changing their settings.

Microsofts updated terms also state that we collect basic information from you and your devices, including for example app use data for apps that run on Windows and data about the networks you connect to. It would thus seem that Microsoft is basically granting itself the right to collect all the data from your devices and then share it, as necessary.

Microsofts updated privacy policy not only trespasses personal privacy, but can also affect your right to free speech, as the company states: We will access, disclose and preserve personal data, including content of your emails, other private communications or files in private folders, when we have a good faith belief that doing so is necessary to, protect our customers or enforce the terms governing the use of the services. What does that even mean if it doesnt scream data manipulation? So much for transparency.

Your privacy is precious and so are your files

Real transparency starts with straightforward terms and policies that people can clearly understand, so that you and I know whats going on with our data. In a world where data is often used without meaningful consent, platforms like Treasure Cloud give control back to users. Treasure Cloud is designed specifically with such privacy invasion issues in mind. Treasure Cloud promises user privacy upfront and actually works to protect users from data manipulation, as it works seamlessly with other storage platforms you may already be using, as opposed to services like Google Drive and OneDrive that have been known to upload and use your scanned data for their own purposes.

Treasure Cloud offers client-side encryption for all files saved on its platform, so unlike other cloud storage providers, Treasure Cloud cant actually view or even open the data that you store on its platform. You are literally the only person who has access to your data, which might include sensitive recovery passwords.

There is no denying the fact that you have very little (if any) control over what such cloud storage companies can do with your data. With a provider like Treasure Cloud, you can rest assured that your data is completely secure and kept private, thanks to their zero-knowledge cloud storage and complete data encryption. Any data transferred from your existing accounts to your Treasure Cloud server becomes encrypted as well.

And theres more! Earn great incentives on Treasure Clouds referral program, such as an additional 10 GB of storage on top of your existing plan for every person who signs up when you refer friends to sign up for a storage plan too! Click here for more information on the referral program.

Sounds too good to be true? Learn more about internet security and their services on Treasure Clouds website or their blog.

Originally posted here:
What Are You Really Agreeing to in the Terms and Conditions for Google Drive and Microsoft OneDrive? - Coconuts

Connected Car Market to Show Strong Growth & Demand 2022-2031| TMR Study Business – Inter Press Service

Connected Car Market: Introduction

According to the report, the globalconnected car marketsurpassedUS$ 24.07 Bnin 2020, expanding at a CAGR of22.7%during the forecast period. Connected cars utilizes Internet services such as WLAN (Wireless Local Area Network), 4G, LTE, and 5G for creating connection with the local and cloud servers and for connecting with other vehicles. The connected cars use advanced technologies for recording the vehicle and user behavior and to recommend particular actions in the future.

Increasing production and sales of the IC engine and electric and hybrid vehicles across the globe, led by several rising demand for cars, vehicle emission laws, government incentive, and environment problems, which is expected to propel the growth of the connected car market. There is rising disposable income of consumer, which enhances their purchasing power that further leads to surge in vehicle sales. Moreover, the cars sold in the developed regions are equipped with advanced features, which has improved safety and security solutions that also leads to growth in the market. Furthermore, the adoption of luxury and premium cars in most of the countries is anticipated to boost the market growth during forecast period.

Due to the onset of COVID-19 pandemic, production and sales of the vehicles has hampered, as all the manufacturing units and sales showrooms were closed. Due to lockdowns, public was restricted from traveling, which further restrain the growth of the connected cars market. The supply chain and transportation channels where disrupted that decrease supply of raw material for vehicles production.

Get PDF Brochure for More Insights https://www.transparencymarketresearch.com/sample/sample.php?flag=B&rep_id=1617

Expansion of Connected Car Market

Rising government regulation and mandate to integrated advanced solutions in the cars, to improve the safety of the consumers and reduce road accidents. Countries like the U.S., Germany, the U.K. France, Italy, Spain, and other countries has adopted the use of autonomous and advanced technology such as artificial intelligence (AI), machine learning (ML), IoT, and other in the vehicles, as it provides real-time data from the vehicle and surveillance and monitoring feature for the government.

Moreover, connected cars has embedded dashboard camera, GPS tracking, SOS services and telematics based insurance, which records and stores the data, which is further prone to cyber-attacks. Since, rising government mandates for data security, the service providers or manufacturers provides multi-layer security for vehicle data protection, which is further expected to boost the growth of the connected car market.

Based on car type, sedan and SUV car type segment held a prominent share of the connected car market, in terms of revenue, in 2020. The consumers in the developed countries utilizes sedan and SUV cars, as these cars has more safety and security features as compared to hatchback cars. Moreover, hatchback cars are designed for high traffic regions, whereas, the traffic in the North America and European countries is very less as compared to other developing region, which is another factor for the adoption of sedan and SUV cars.

In terms of connectivity, the dedicated short range communication (DSRC) segment held a highest share of the connected car market, in terms of revenue, in 2020. The dedicated short range communication is considered as wireless communication which helps the intelligent transportation system (ITS) for creating connection with other vehicles and cloud services for tracking and surveillance purpose. Moreover, wireless connectivity is expected to witness fastest growth in the future.

Buy an Exclusive Research Report at https://www.transparencymarketresearch.com/checkout.php?rep_id=1617&ltype=S

Regional Analysis of Global Connected Car Market

In terms of region, the global connected car market has been segmented into North America, Europe, Asia Pacific, Middle East & Africa, and Latin America. Europe and North America has major share in the global connected car market in terms of revenue in 2020. In such developed regions, consumers are more tend towards technological features in their cars and as they opt for more safety and security functions. Moreover, most of cities in the Europe and North America are smart cities and hence, they have better connectivity on the highways and other parts, which make connected cars to work with high efficiency and performance. In addition, due to rising government mandates and support for integrating technology with automotive industry, the manufacturers are focusing to develop advanced and more autonomous cars, which will further propel the growth of the connected car market.

Global Connected Car Market Players

Prominent players operating in the global connected car market include Qualcomm Technologies, Inc., Robert Bosch GmbH, Continental AG, Airbiquity Inc., CloudMade, Daimler AG, Intellias Ltd., Sierra Wireless, Tesla, LUXOFT, Ford Motor Company, Audi AG, BMW Group, TomTom International, AT&T Inc., etc.

Explore Latest Reports by TMR: https://www.prnewswire.com/news-releases/growing-concerns-around-global-warming-are-set-to-drive-hypercar-market-forward-tmr-301156790.html

About Us

Transparency Market Research is a global market intelligence company, providing global business information reports and services. Our exclusive blend of quantitative forecasting and trends analysis provides forward-looking insight for thousands of decision makers. Our experienced team of Analysts, Researchers, and Consultants, use proprietary data sources and various tools and techniques to gather, and analyze information.

Our data repository is continuously updated and revised by a team of research experts, so that it always reflects the latest trends and information. With a broad research and analysis capability, Transparency Market Research employs rigorous primary and secondary research techniques in developing distinctive data sets and research material for business reports.

Contact

90 State Street, Suite 700

Albany, NY 12207

Tel: +1-518-618-1030

USA Canada Toll Free: 866-552-3453

Email:sales@transparencymarketresearch.com

Website:https://www.transparencymarketresearch.com

Go here to see the original:
Connected Car Market to Show Strong Growth & Demand 2022-2031| TMR Study Business - Inter Press Service

CISA and SAP warn about major vulnerability – The Record by Recorded Future

German enterprise software maker SAP and the US Cybersecurity and Infrastructure Security Agency have issued security advisories on Tuesday to warn SAP customers to install the companys February security patches as soon as possible in order to prevent the exploitation of a major vulnerability in a ubiquitous SAP component.

Tracked asCVE-2022-22536, the vulnerability was discovered by cloud security firm Onapsis and impacts the SAP Internet Communication Manager (ICM).

The main purpose of this component is to provide a working HTTPS web server for all SAP products that need to be connected to the internet or talk to each other via HTTP/S, meaning that if a vulnerability is present in its code, entire SAP products are exposed to attacks 24/7.

In areportpublished yesterday, Onapsis said that CVE-2022-22536 is one of those dangerous bugs, allowing attackers to use malformed packets that trick SAP servers into exposing sensitive data without the attacker needing to authenticate.

The attack, known as HTTP request smuggling, could be used to steal credentials and session information from unpatched SAP servers, even if servers are placed behind proxies, Onapsis said.

What makes these vulnerabilities particularly critical for SAP customers is the fact that the issues are present by default in the ICM component, researchers explained.

A simple HTTP request, indistinguishable from any other valid message and without any kind of authentication, is enough for a successful exploitation.

SAP patched the issueyesterday. CVE-2022-22536 is one of eight vulnerabilities that received a severity rating of 10/10 but is the one that CISA chose to highlight in its ownsecurity advisory, primarily due to its ease of exploitation and its ubiquity in SAP products.

According to SAP, known affected products include SAP WebDispatcher, SAP Content Server, SAP ABAP, and SAP NetWeaverone of SAPs most popular offerings.

According to aShodan search, there are more than 5,000 SAP NetWeaver servers currently connected to the internet and exposed to attacks, lest a patch is installed.

Since the ICM component may be active in other SAP product setups, Onapsis has also released aPython scriptso SAP customers can test their setups and see if they are vulnerable to attacks.

In ablog postyesterday, SAP Director of Security Response Vic Chung confirmed the severity of Onapsis findings and asked customers to apply the patches as soon as possible.

CISA warned that customers who fail to do so will be exposing themselves to ransomware attacks, the theft of sensitive data, financial fraud, and disruption or halt of business operations.

Catalin Cimpanu is a cybersecurity reporter for The Record. He previously worked at ZDNet and Bleeping Computer, where he became a well-known name in the industry for his constant scoops on new vulnerabilities, cyberattacks, and law enforcement actions against hackers.

Read more:
CISA and SAP warn about major vulnerability - The Record by Recorded Future

Why Security in Kubernetes Isn’t the Same as in Linux: Part 2 – marketscreener.com

Security for Kubernetes might not be quite the same as what you're used to. In our previous article, we covered why security is so important in both Linux on-premises servers and cloud Kubernetes clusters. We also talked about 3 major aspects of Linux server security - processes, network, and file system - and how they correspond to Kubernetes. So today, we'll talk more about the security concerns unique to Kubernetes.

When trying to secure your infrastructure, you have to start by configuring it well. For example, this might mean disabling all unused features or using allow-policies wherever you can to keep your files, executables, or network available only to the intended entity. Both Linux servers and Kubernetes clusters have known vulnerabilities and recommendations.

One of the famous among these is the Center for Internet Security (CIS) recommendations, which are often used for compliance for insurance. Having a cloud security platform that can help implement these recommendations can be a major boon to your security.

The Kubernetes API server is the admin panel, so to speak, of your cluster. In most deployments, this HTTP server is exposed to the internet. This means that a hacker that finds their way to the API server can have full control over your cluster.

Using the most strict authentication and authorization settings is highly recommended to prevent this. If you can set your cluster to private, with access only allowed from an internal network, you can sleep well at night. And just as with with configurations, you should be aware at all times of who (and what) can have access to which resources and operations in your cluster.

In Kubernetes, there are additional attack vectors using the Kubernetes control plane itself that don't exist in Linux server security. For example, an attack could call the Kubernetes API to load a new pod you didn't want.

Kubernetes and cloud providers invest a lot of effort in preventing unauthorized users and machines from doing this. But there is always a chance that one of your employees gets hacked or a badly configured service account has too much power. Kubernetes logs all requests to its audit log so they can be investigated later in case of a breach. Additional logs include the kube-API log or etcd (resources DB) log.

Container runtime is also a unique aspect of Kubernetes security. In Kubernetes, each node is actually a virtual Linux server running a container runtime daemon. A container runtime is responsible for managing the images and running and monitoring the containers, their storage and network provisioning, and more. You might be familiar with Docker as a container runtime. In reality, Docker is a company developing multiple container tools, and their container runtime is named containerd. Other container runtimes for Kubernetes include CRI-O, Rocket, and more.

Apart from a whole Linux server or virtual machine that uses its own single operating system, multiple containers are usually running over multiple operating systems that share the same host kernel. Although the operating systems of the containers are minimal, they may still have security holes. And the more holes the merrier for the attacker! Monitoring the container runtime activity can also yield a lot of information about what is going on in the node - what processes are running inside the container, any internal communication that might escape from network monitoring, the data being collected and created, and so on.

The unique interfaces and engines of Kubernetes can be an additional exposed surface in terms of security, especially when considering the complexity of the system. However, don't forget that distribution and containerization add to security and help isolate potential malware.

Kubernetes may come with a few new risks to watch out for, but that's no reason to be scared off. As long as you know what to look for, security for your Kubernetes clusters doesn't have to be any harder than it was for your Linux servers. And there's no need to go it alone - not when you can have handy tools like InsightCloudSec, Rapid7's cloud-native security platform, at your side.

Additional reading

Get the latest stories, expertise, and news about security today.

Originally posted here:
Why Security in Kubernetes Isn't the Same as in Linux: Part 2 - marketscreener.com

Rug pulls, spoofing and wash trading: The crypto industry is trying to clean up its act – Protocol

Good morning, and welcome to Protocol Fintech. This Tuesday: crypto aims to self-regulate, Jamie Dimon throws shade, and Tezos teams up with Manchester United.

I dont get Jamie Dimon: The crypto-skeptic schtick (see todays Overheard) was cute a couple of years ago, maybe, but it seems increasingly bizarre that JPMorgan Chase is releasing JPM Coin while its CEO badmouths bitcoin. Wealth managers are giving customers access to crypto funds which Dimon is telling them are worthless. Even if you agree with Dimon, the hypocrisy here is a problem. At some point, something has to give: Either Dimons not really running the company and the board should notice that fact, or JPMorgan Chase doesnt believe in the products its selling. Or maybe all of the above.

Owen Thomas (email | twitter)

The crypto industry has wrestled with the reputation that it operates in a world of shady players. Now it wants the world to know that its going after the bad guys. Cryptos biggest players, including Coinbase, Circle and Anchorage Digital, just launched the Crypto Market Integrity Coalition, which is taking aim at manipulation and abuse.

The timing makes sense, given the drumbeat of news about hacks and scams, but its also bound to raise eyebrows.

Its an about-face on the idea that crypto facilitates crime. For years, crypto companies have downplayed the prevalence of criminal activity on the blockchain even when careful analysis showed billions of dollars in illicit transactions.

Crypto wants to show that it can clean up its own act. If this is going to be mainstream, the sector needs credibility, especially given the popular perception that there is a fair amount of fraud and shadiness going on, Stanford Graduate School of Business lecturer Rob Siegel told Protocol.

This is the thing you do when you see regulation coming around the corner, Alex Johnson, fintech research director at Cornerstone Advisors, told Protocol. Its a very common lobbying move, he said. You try to forestall or soften that regulation by voluntarily pledging to hold yourself to certain standards.

Ben Pimentel (email | twitter)

In the wake of the pandemic, 40% of banks have planned or launched their digital transformation strategy this year. But where to start? Here are 7 steps for financial institutions to begin or accelerate digital transformation.

Learn more

On Protocol: Google Cloud added a new security layer to combat crypto-mining attacks. After noting that cryptojacking has been on the rise for the past few years, the tech giant added a security protocol to detect takeovers of cloud servers by miners in an effort to protect customers.

DriveWealth, a brokerage startup backed by SoftBank, is getting into crypto trading. The company, valued at $2.85 billion, acquired Crypto-Systems, which will allow bitcoin and ether trading for the firms partners.

A Canadian group protesting COVID-19 mandates managed to bypass fundraising restrictions through bitcoin. After GoFundMe froze about $10 million Canadian dollars (about $7.8 million) in donations due to what the fundraising service said were violations of its terms of service, the group started accepting donations in bitcoin, raising about 8.8 BTC.

Cash App is now running on Lightning. Users can send bitcoin payments instantly and for free to anywhere that accepts Lightning. But there are some odd limitations: New York state residents cant use it, Cash App said on Twitter, and users cant receive Lightning payments.

Jamie Dimon still doesnt believe in bitcoin, and continues to throw shade. I dont call them cryptocurrencies, I call them crypto-tokens, because currencies have rules of law behind them, central banks and tax authorities, the JPMorgan Chase CEO said in an interview.

The FDIC is making crypto regulation one of its top five priorities. It is imperative that the federal banking agencies carefully consider the risks posed by these products and determine the extent to which banking organizations can safely engage in crypto-asset-related activities, acting Chairman Martin J. Gruenberg said in a press release.

The NFT market could face a wave of litigation, Jeff Gluck, CEO of CXIP Labs, told Cointelegraph: There are dozens of artists preparing lawsuits against OpenSea for selling infringing NFTs.

The rapid digitization of finance is creating both unprecedented challenges and opportunities for financial services firms. In this whitepaper, we go deep on common digital transformation pitfalls for financial institutions to avoid on the path to creating experiences that customers love.

Learn more

FTX acquired Liquid Group, a digital payments company. The crypto exchange giant will enter the Japanese market through Liquid Groups subsidiary, Quoine Corp., which was among the first crypto exchanges to register with the Japanese Financial Services Agency.

Tezos signed a deal with Manchester United for $27 million. The English football club will have Tezos logo on its training kits and shoot promotional videos for the crypto company.

Baby Doge signed a deal with another soccer team, TSG Hoffenheim. The memecoin has become an official partner of the German professional football club. NFTs are in the cards.

Qredo raised $80 million. The digital asset management firms series A round was led by 10T Goldings, bringing the firms valuation to $460 million.

Cart.com raised $240 million. The ecommerce companys latest funding round was led by Legacy Knight Capital Partners. Cart.com also acquired FB Flurry, a fulfillment and customer-care company, its ninth acquisition since its founding in 2020.

Vivid Money, a bank with a super app, raised $114 million. The challenger banks latest funding round was led by Greenoaks Capital, with participation from Ribbit Capital and SoftBank Vision Fund 2.

Polygon raised $450 million. The maker of technology for scaling Ethereum had Sequoia Capital India lead the round, with investments from SoftBank Vision Fund 2, Galaxy Digital and Tiger Global.

Fiserv acquired Finxact, a cloud technology and banking solutions company. The payments and financial services infrastructure company was an early investor, and will acquire the remaining stake for $650 million to accelerate its digital banking strategy.

Thanks for reading see you tomorrow!

Visit link:
Rug pulls, spoofing and wash trading: The crypto industry is trying to clean up its act - Protocol