Category Archives: Cloud Storage

Lost in translation and adrift in cloud storage – The Register

Who, Me? Welcome to a cautionary Who, Me?, a warning to all those lured by the promises of the cloud storage giants and a language lesson for all.

Our story concerns "Dirk", who at the time of our tale was hard at work in a Netherlands IT department. Dirk himself didn't actually speak much Dutch; his first language was English but that was more than enough to get by with in the land of clogs, windmills and dikes.

Having enjoyed a few relatively peaceful months in the job, Dirk told us he was "getting on with tidying up the systems and dealing with the technical debt that had accumulated since the last Big Cleanup a number of years previously."

"One such system," he said, was "cloud-based storage." The vendor was a well-known giant of the industry, but for the purposes of this story, Dirk called it "Poodle"

The task that day was dealing with obsolete accounts, not just from a security standpoint, but also due to licencing costs and, he said ruefully "It seemed like a good idea at the time."

Dirk ploughed through obsolete accounts until he came to one with an odd name: "beheerder". Perhaps an amusing play on "beheader" by some long gone techie? Or something to do with "herding" files? Dirk checked in with his predecessor, who gave the digital equivalent of a shrug. The account had been around since things had been set up back in the day, but nobody had used it in ages.

Indeed, it had been well over a year since anyone had actually logged in using the account. The password was reset and the mailbox scrutinised.

"Perhaps some more notice should have been made of the fact that at one point it was receiving system error messages," sighed Dirk, "but what use is hindsight?"

Anyhow, the messages seemed to have stopped recently and the rest was just junk. To keep things spick and span the account was deleted and, as was standard practice, all files transferred to Dirk.

He thought no more about it until a fortnight later when he decided "to move all those transferred files to the new-fangled Poodle 'Shared Drive'." Heck, everyone else's documents were due to moved there at some point ("with the correct access permission set," he added.)

Dirk clicked "Ignore" on the standard "Files accessed by other users may be affected." This would prove to be a fateful click.

After 20 minutes, one of his colleagues to call to complain that they couldn't access one of their files.

A coincidence, surely. But Dirk began to feel the arse-swooping sensation of dread that something awful might be happening.

Perhaps a little later than he should, Dirk took a closer look at the files being moved. He looked a little closer since some were still in progress. He poked further, down two or three folder levels and saw something that looked familiar.

"Horrifyingly familiar. In fact, it almost looked exactly like the core folder structure that everyone in the office used."

A little more investigation and Dirk realised that he could skip the "almost."

As his stomach sank through the floor, Dirk realised "that over the next few hours file access will disappear for all users."

"It wasn't immediate," he added "because file storage is cloud-based and sometimes it takes its own, undefined, time to do large file moves."

The helpful interface afforded no way to stop the hellish process of borkery. In a panic he called the cloud vendor, observing: "They're rather large and helpful in inversely proportional quantities."

And, of course, they couldn't help. For whatever reason, "there didn't appear to be a way to pause or stop the oncoming slaughter. Everyone was going to lose access to their files."

Having told the increasingly anxious users that there was a "small" problem, Dirk peered at the unfolding carnage he had inadvertently wreaked upon the company's files:

"Some were still in the old location, and some were in the new location."

He tried to move the files again. And again. On the third try he got some response; the system helpfully told him that it was "moving files", but without any kind of countdown of progress bar.

"Empty folders were being created," he told us, "and since the system was still progressing the previous move requests things got very complicated - sometimes files were moving and sometimes not. And sometimes the files were copied before they were moved. On the plus side Poodle Drive would happily create folders before deciding whether or not to copy the files, so that's something isn't it?"

What had happened was that the user "beheerder" had created the root folders back in the day, and other users had created subfolders. A little too late, Dirk discovered that the Move function he had used "only affects folders that you have ownership over. This doesn't include subfolders you didn't create."

"Suddenly," he said "there was a smorgasbord of folders spewn around the system. Some stuff stubbornly in the old location, and some stuff in new locations. Hundreds of gigabytes of data in fact. Smeared everywhere."

The good news was that was a backup, so nothing was actually lost. The only challenge was decide to "Restore" or "Restore with File Permissions." Fearing what would happen to existing files, he restored without those permissions. At least then he'd be able to see all the files and put them back correctly. He could then tidy up the folders and set the correct access levels.

"It took a month," he said.

"Hindsight says that I should have checked out the other option too, but maybe next time(!)"

Our tale ends happily. The users were eventually happy. The storage was tidy. Dirk, while he obviously paid wasn't overtime for his efforts, survived. He also learned to take things a little slower and think a little harder about what those messages were telling him.

Heck, he's even learning Dutch.

Apparently, "beheerder" means "administrator".

Ever been bitten on the behind by cloud storage, or gaily skipped past a message box without fully understanding what it was telling you? Sadly, it is all too common. Share your tale of woe with the sympathetic vultures at Who, Me?

Sponsored: Practical tips for Office 365 tenant-to-tenant migration

Link:
Lost in translation and adrift in cloud storage - The Register

How to combat insider threats as organisations increasingly rely on cloud computing to telecommunicate – TechRadar

Cloud providers including Microsoft, Google, and others, have recently acknowledged that they are struggling to deal with a spike in remote tools usage.

As organisations hastily adapt for remote working, they might fail to ensure adequate data security. In particular, cloud usage increases the risk of insider threats as 53% of organisations believe detecting insider attacks is significantly harder in the cloud than on-premises, according toa recent report. Therefore, it has never been as important as it is today for organisations to implement proper measures to mitigate the insider threat to protect data in the cloud.

Firstly, remote employees use cloud applications to exchange data, including sensitive data, and could misplace it in insecure locations which could lead to a compliance violation. For example, sharing sensitive data via Microsoft Teams an increasingly popular application for telecommunication will result in data spreading across SharePoint Online storage with a high risk of unauthorised access. In fact, 39% of the UK respondents to our recent survey are sure that employees in their organisations share sensitive data via cloud applications outside of ITs control.

Secondly, remote employees often work from their personal devices which are not controlled by the corporate IT team, and as such are more prone to data breaches than their corporate PCs. Such devices are often unpatched and, therefore, vulnerable to cyber threats. Once an attacker has a foothold in the employee's device, they have "remote control" and can observe and leverage any outgoing connections from this. Essentially, they can gain access to all corporate cloud services the user connects to or even to the corporate network on-premises as soon as the user establishes their VPN connection or remote desktop (RDP) session to any internal servers.

In addition, an employee might lose his/her device, or let other family members use it, which will result in unauthorised access. In some rare cases, employees copy sensitive data to their personal devices from corporate cloud storage with malicious intent, which also is a serious security risk.

In normal circumstances, before asking employees to work from home, an organisation should ideally develop proper security policies with a specific focus on cloud security. First and foremost, it is critical to ensure that all user permissions to storages with sensitive data are granted on a 'need-to-access basis to prevent insiders from accessing the information they do not need to do their job.

In addition, it is important to establish effective access controls as well as efficient identity verification methods such as multi-factor authentication, which will also protect organisations sensitive data in the cloud from unauthorised access.

And last but not least, it is critical that the IT department trains employees on cloud dos and donts, starting from the principles of dealing with sensitive data and ending with instructions for patching and securing their personal devices. All such measures should be implemented on an ongoing basis, with the IT team being ready to support employees with any issue when they work from home, whether its an operational problem or security issue.

If an organisation does not know where its sensitive data resides in the cloud, it cannot ensure that remote employees are following security policies. This is particularly challenging as modern organisations use multiple clouds.

In fact, McAfee has calculated that an average enterprise uses around 1,427 distinct cloud services, while an average employee actively uses 36 cloud services at work. The more cloud services remote employees use, the more challenging it is for an organisation's IT team to track how they handle data. It means an increased risk of misplacing sensitive data and the bad PR and compliance findings that come with that. To reduce data overexposure, it is critical to have technologies in place to automatically discover sensitive data across multiple cloud storages and classify it according to its sensitivity on a continuous basis.

As the cloud is prone to a broad range of threat vectors for data exfiltration by insiders, it is critically important for an organisation to detect such cases in a timely manner. Is it malware trying to break into the corporate network, or an insider aiming to steal customer database? All these cloud security risks, and many others, are accompanied by anomalies in user activity. Therefore, if an organisation uses cloud computing and cloud storage, it is important to have user behaviour analysis (UBA) technologies in place that can detect deviations from normal user behavior and alert an IT team about potential cloud threats.

Examples of the most common anomalies that indicate a threat include abnormal logon activities (such as attempts to log on from multiple endpoints, multiple subsequent logons in a short period of time, and an unusually high number of logon failures); or data access patterns differing from the user's past behaviour or that of their peers. It is important to note the shift from office work to remote access will probably cause initial changes in users' access patterns. Businesses can expect a higher than normal number of false positives from Machine Learning-based behaviour anomaly detection solutions in the first couple of weeks after users move away from their central offices.

Such measures will help organisations minimise insider threats in the cloud not only during the worlds largest work-from-home experiment, asTime has dubbed the COVID-19 outbreak, but also when it comes to an end. With the subsequent economic recession that is likely to follow, cloud computing will remain a cost-effective way to run a business. A sustainable approach to cloud security will enable organisations to avoid unwanted data breaches and hefty compliance fines in the long run.

Matt Middleton-Leal is EMEA & APAC General Manager at Netwrix

See the article here:
How to combat insider threats as organisations increasingly rely on cloud computing to telecommunicate - TechRadar

What the breakup of data management and storage means to you – TechTarget

In this era of digital transformation, organizations of all sorts are becoming data-centric information managers. Technologies such as AI, IoT, 5G and edge computing are creating data at unprecedented rates. That data is being used to deliver more insights, services, customized services, products and innovation. And stricter privacy laws and regulations on personally identifiable information with harsh financial penalties for noncompliance are complicating the situation.

For organizations that want to derive value from data that's greater than the cost of storing and using it, effective data management and storage is becoming more important than ever. The abstraction of data management from storage systems to run on its own is one approach to better data management.

Data management has several meanings depending on the vendor. It has been defined as ingesting, storing, organizing and maintaining the data an organization creates. But that definition is outdated. It's adequate as data management for legacy storage systems; however, even that falls short for modern storage systems.

Data management today means considerably more, including:

That's quite a bit for a data management system to do -- and do well. Remember, the most important responsibilities of a data management and storage system are ingesting, storing, organizing and maintaining the data. All those other data management capabilities are resource-intensive and negatively impact the system's primary responsibilities.

These abstracted data management systems have an outsized positive impact on IT organizations.

And most storage systems don't generally work well with other storage systems. That's not news to storage admins. And many systems have problems working with cloud storage, too. Few -- and that's being generous -- actively work with tape systems.

Multivendor heterogeneous storage is a bigger problem. Storage vendors rarely work seamlessly with one another, which is why storage system-centric data management tends to focus on a single vendor. This approach bypasses the multivendor problem while locking in users to that specific vendor's data management and storage products.

Another data management storage issue is the complicated data management licensing structure. There's the data management software licensing, of course, but it doesn't stop there. There are typically other licensing fees, such as a capacity license fee on the data the storage system moves to cloud storage or other storage systems. Then, there's the cloud storage capacity license fee and potentially egress fees for data access. In addition, when users and applications access moved data, it often must be rehydrated back to the originating storage system. Data movement takes time adding substantial latency to each access request. It makes more sense to access the data where it resides.

One storage-centric approach to this problem is to put all an organization's data in a single scale-out, all-encompassing storage system, historically referred to as a "god box." This system would have all the storage performance and cost tiers, data protection, archiving and so on, along with all data management.

Even if that storage system could meet every performance requirement, scale every tier to meet hundreds of petabytes or exabytes of data, and do everything data management needs to do today, there are other intractable problems. The data management software would still be a heavy draw on the storage controllers negatively affecting performance. More importantly, data still must be moved or migrated from where it currently is to this system. And it fails to solve multiorganizational data sharing problems.

These issues have led to a new approach where data management is abstracted from storage systems. The data management software runs on its own server hardware. It sits out of band, in band or a combination of the two.

Abstracted data management captures the data and metadata in one of three ways. It can mount all storage systems with administrative privileges; Dell EMC ClarityNow, Hammerspace, iRODS (open source), Komprise, Spectra Logic StorCycle, Starfish Storage and StrongBox Data Solutions StrongLink do this. Or it can sit in front of the storage looking and acting like a high-speed network switch -- think InfiniteIO here. And with the third approach, it uses clients, or agents, like Aparavi does. Most of these systems have some level of AI or machine learning built into the software that optimizes operations. Each methodology and vendor have their own pros and cons that will be covered in a future article.

These abstracted data management systems have an outsized positive impact on IT organizations. They commoditize the storage system, reducing both the amount and the cost of storage for each tier. They do that by right-sizing the data to the proper tier and eliminating vendor lock-in.

Storage system compatibility is no longer an issue. Storage systems are merely the containers in which the data resides based on their locality, performance and cost characteristics. These abstracted data management systems also simplify operations in several ways:

Each of these data management systems scales differently. Some are designed to scale to hundreds of petabytes and exabytes. Others scale from terabytes to dozens of petabytes. It depends on their architecture, and most are, by definition, storage-agnostic.

Vendors have different licensing requirements. Some license by terabyte of capacity managed. Others vary that capacity licensing by hot and cold data. Still others license according to the number of servers and server cores required to run their software at the performance level an organization requires.

What does external abstracted data management mean? It means IT organizations can choose storage based on cost and performance, not data management functions. It means storage vendors will no longer have an incumbent advantage. It means simplified IT operations and lower costs. When it comes to data management and storage, all that bodes well for the future.

View post:
What the breakup of data management and storage means to you - TechTarget

How to combat insider threats as organizations increasingly rely on cloud computing for telecommunications – NewsDio

Cloud providers, including Microsoft, Google, and others, have recently acknowledged that they are struggling to cope with an increase in the use of remote tools.

As organizations hastily adapt to remote work, they may not ensure adequate data security. In particular, using the cloud increases the risk of internal threats, as 53% of organizations believe that detecting internal attacks is significantly more difficult in the cloud than on-premises, according to a recent report. Therefore, implementing appropriate measures to mitigate the internal threat to protect data in the cloud has never been as important as it is today for organizations.

First, remote employees use cloud applications to exchange data, including sensitive data, and could mislead them in insecure locations that could lead to a compliance violation. For example, sharing sensitive data through Microsoft Teams, an increasingly popular application for telecommunications, will result in data dissemination in SharePoint Online storage with a high risk of unauthorized access. In fact, 39% of UK respondents to our recent survey are confident that employees in their organizations share sensitive data through cloud applications outside of IT control.

Second, remote employees often work from their personal devices that are not controlled by the corporate IT team, and as such are more prone to data breaches than their corporate PCs. Such devices often have no patches and are therefore vulnerable to cyber threats. Once an attacker has a foothold on the employee's device, they have a "remote control" and can observe and take advantage of any outbound connections from it. Essentially, they can gain access to all corporate cloud services that the user connects to or even to the local corporate network as soon as the user establishes their VPN connection or remote desktop session (RDP) to any internal server.

Additionally, an employee may lose their device or let other family members use it, resulting in unauthorized access. In some rare cases, employees copy confidential data to their personal devices from corporate cloud storage with malicious intent, which is also a serious security risk.

Under normal circumstances, before asking employees to work from home, an organization should ideally develop appropriate security policies with a specific focus on cloud security. First, it is essential to ensure that all user permissions for storage with confidential data are granted on a "need to access" basis to prevent people with internal access from accessing information they do not need to do their job. .

In addition, it is important to establish effective access controls, as well as efficient identity verification methods, such as multi-factor authentication, which will also protect the confidential data of cloud organizations from unauthorized access.

And last but not least, it is critical that the IT department train employees on the "two" and "no" of the cloud, starting with the principles of dealing with sensitive data and ending with instructions for patching and protect your personal devices. All of these measures need to be implemented on an ongoing basis, with the IT team ready to assist employees with any issues when they work from home, be it an operational or security issue.

If an organization does not know where its confidential data resides in the cloud, it cannot guarantee that remote employees follow security policies. This is particularly challenging since modern organizations use multiple clouds.

In fact, McAfee has calculated that an average business uses around 1,427 different cloud services, while an average employee actively uses 36 cloud services at work. The more cloud services remote employees use, the harder it is for an organization's IT team to track how they handle data. It means an increased risk of misplacing confidential data and the poor public relations and compliance conclusions that come with it. To reduce data overexposure, it is essential to have technologies to automatically discover sensitive data across multiple cloud warehouses and continually classify it according to its sensitivity.

Since the cloud is prone to a wide range of threat vectors for data breaches by experts, it is vitally important that an organization detect these cases in a timely manner. Is it malware trying to break into the corporate network, or is it someone with the intention of stealing the customer database? All these security risks in the cloud, and many others, are accompanied by anomalies in user activity. Therefore, if an organization uses cloud computing and cloud storage, it is important to have user behavior analysis (UBA) technologies that can detect deviations from normal user behavior and alert an IT team. about possible threats in the cloud.

Examples of the most common anomalies that indicate a threat include abnormal login activities (such as attempts to login from multiple endpoints, multiple subsequent logons in a short period of time, and an unusually high number of login failures. session); or data access patterns that differ from the past behavior of the user or that of their peers. It is important to note that switching from office work to remote access will likely cause initial changes in user access patterns. Businesses can expect higher-than-normal numbers of false positives from machine learning-based behavioral abnormality detection solutions in the first few weeks after users move out of their headquarters.

Such measures will help organizations minimize internal cloud threats not only during the world's "biggest work-from-home experiment" as Time has called the COVID-19 outbreak, but also when it comes to an end. . With the subsequent economic downturn likely to follow, cloud computing will continue to be a profitable way to run a business. A sustainable approach to cloud security will allow organizations to avoid unwanted data breaches and heavy long-term compliance penalties.

Matt Middleton-Leal is General Manager of EMEA and APAC at Netwrix

Originally posted here:
How to combat insider threats as organizations increasingly rely on cloud computing for telecommunications - NewsDio

How to use iCloud Drive to sync files between Mac, iPhone and iPad – Macworld UK

').insertAfter('#articleBody p:nth-of-type(3):first');if(window.idgVideoDebug)console.log('JW isStandalone',$('#videoContainer-3778204').size(),$('#idg-video-infeed').size());var div = $('#videoContainer-3778204>div');div.appendTo( $('#idg-video-infeed') );$('#jw-standalone-close-button').css({'position':'relative','top':'30px','left':'92%','width':'20px','height':'20px','z-index':'999999'});}else if (window.Device.isMobile){if(window.idgVideoDebug)console.log('JW isStandalone mobile and not article - returning');return;}else{//do styles dynamicaly on floating desktop$('#videoContainer-3778204').css({'display':'inline','position':'fixed','bottom':'5px','right':'5px','height':'225px','width': '401px','border':'none','overflow':'hidden','z-index':'10000'});$('#videoContainer-3778204 .outer-wrapper').css({'top':'0px','left':'0px','width':'100%','height':'100%','border':'none','overflow':'hidden'});$('#videoContainer-3778204 .outer-wrapper #jw-standalone-close-button').css({'position':'absolute','display':'inline','top':'10%','left':'92%','width':'20px','height':'20px','z-index':'999999'});}/**GA TRACKING ***/var gaVideoData = {percentWatched:0, firstPlayEventRegistered:false};//version 2 index Xvar indexXPublisherConfig = {videoCommonArgs : {"protocols" : [ 2 , 3 , 5 , 6 ], //Player supported VAST Protocols and Wrappers"mimes" : [ "video/mp4" , "video/webm" , "application/javascript" ], //Player supported mime types"apiList" : [ 1, 2 ] //Player supported VPAID versions}};indexXPublisherConfig.siteID = (window.Device.isMobile?196306:196305);//only one watched event per video$( window ).on('beforeunload',function() {if(gaVideoData.firstPlayEventRegistered){videoDataLayerPush('Watched');}});function videoDataLayerPush(eventAction){var autoStart = true;//was this video autostartvar eventLabel = 'autoplay';if(eventAction === 'Watched'){//percentile Trackingvar percent = gaVideoData.percentWatched;if(percent >= 0 && percent = 25 && percent = 50 && percent 75 ){eventLabel += ' 100%';}}if(eventAction.indexOf('lay')>0){//autoplay and playif(gaVideoData.firstPlayEventRegistered){//playing alredy registered - dont track every play e.g. after buffer, ad etcreturn;}else{gaVideoData.firstPlayEventRegistered=true;}}/*//bit complicated this but basically JW registers Play after a Pre Roll on autoplay so if Ad Start called and we have registered a play event then fire itif(eventAction === 'Ad Start' && !gaVideoData.firstPlayEventRegistered){videoDataLayerPush('Play');}*/if( (typeof dataLayer != "undefined") ){var dl = {'event': 'videoEvent','eventCategory': 'Video','eventAction': eventAction,'eventLabel': eventLabel,'videoPlayerName': 'JW','videoTitle': 'Your iOS questions answered','videoId': '3778204','videoAutoplay': (autoStart?'True':'False')};dataLayer.push(dl);if(window.idgVideoDebug)console.log('JW videoDataLayerPush() '+ eventAction,dl);}}/**END GA TRACKING ***/require(['jquery', 'jwplayer' ], function($,jwplayer){if(typeof SpotX === 'undefined'){//not supported on siteembedVideo($,jwplayer,null)}else{if(window.idgVideoDebug)console.log('JW SpotX is active');embedVideo($,jwplayer,SpotX);}},function(){//ad blockif(window.idgVideoDebug)console.log('JW SpotX - Ad block - No SpotX');embedVideo($,jwplayer,null);});//requirevar embedVideo = function($,jwplayer,SpotX){if(window.idgVideoDebug)console.log('JW advertisingTag embedVideo() SpotX',SpotX,'VideoId','3778204','initial adTagUrl','http://pubads.g.doubleclick.net/gampad/ads?iu=/8456/IDG.UK_B2C_MacWorld.co.uk/" + adConfig.zone + "&sz=640x480&impl=s&gdfp_req=1&env=vp&output=vast&unviewed_position_start=1&url=https://www.macworld.co.uk/&description_url=https://www.macworld.co.uk/&correlator=[timestamp]&vpos=preroll&ppos=1&min_ad_duration=0&vad_type=linear&ad_rule=0&');if (typeof window.jwplayer === 'undefined') {window.jwplayer = jwplayer;}var showSpotX = (SpotX !== null);googletag.cmd.push(function(){var timestamp = new Date().getTime(),advertisingTag = "http://pubads.g.doubleclick.net/gampad/ads?iu=/8456/IDG.UK_B2C_MacWorld.co.uk/" + adConfig.zone + "&sz=640x480&impl=s&gdfp_req=1&env=vp&output=vast&unviewed_position_start=1&url=https://www.macworld.co.uk/&description_url=https://www.macworld.co.uk/&correlator=[timestamp]&vpos=preroll&ppos=1&min_ad_duration=0&vad_type=linear&ad_rule=0&",cust_params = {"playertype": 'autoplay',"video-id": "3778204","stg": "false"};if(typeof window.pageVideoCustomParams === 'undefined'){window.setupVideoCustomParams();}$.extend(cust_params, window.pageVideoCustomParams);var cust_params_url = '';var prevQuality;for(var paramKey in cust_params){var paramValue = cust_params[paramKey],delimiter = cust_params_url.length > 0 ? '&' : '';if((typeof paramValue !== 'undefined') && (paramValue.length > 0)){cust_params_url = cust_params_url + delimiter + paramKey +'=' + paramValue;}}//foradvertisingTag = advertisingTag + '&cust_params=' + encodeURIComponent(cust_params_url)+ '&lip=true&fred&correlator=' + timestamp;advertisingTag = advertisingTag.replace('&&','&');if(window.idgVideoDebug)console.log('JW advertisingTag after cust params',advertisingTag);if(showSpotX){if(window.idgVideoDebug)console.log('JW SpotX entering config, spotxChannelId=',spotxChannelId);var directAdOS = new SpotX.DirectAdOS({channel_id: spotxChannelId,slot: document.getElementById("videoContainer-3778204"),video_slot: document.getElementById("video-16DE0C1D-ECEC-4A47-9C3C1FDC07D86711"),content_width: 640,content_height: 480});if(window.idgVideoDebug)console.log('JW SpotX directAdOS',directAdOS);}else{//dummy directAdOSvar directAdOS = {addSpotXParamsToMVT: function(tag){if(window.idgVideoDebug)console.log('JW SpotX addSpotXParamsToMVT on dummy directAdOS called');return {then: function(fun){fun(advertisingTag);}}}};}var setupFunction = function(mvtURL) {advertisingTag = mvtURL;//add permutive segstry{if(window.idgVideoDebug)console.log('JW setupFunction() pre perm addition advertisingTag',advertisingTag);var playerSegsPerm = encodeURIComponent('permutive=' + encodeURIComponent(JSON.parse(localStorage._pdfps || '[]').slice(0,250).join(',')) + '&');advertisingTag = advertisingTag.replace('cust_params=','cust_params='+playerSegsPerm);}catch(err){if(window.idgVideoDebug)console.error('JW setupFunction() permutive tag addition error',err);}if(window.idgVideoDebug)console.log('JW setupFunction() final advertisingTag',advertisingTag);//advertisingTag = advertisingTag.replace( new RegExp( "640x480", "gi" ), "1x1" )var setupStruct = {fallback: "true",//floating: {dismissible: true},width: "100%",//autostart: false,autostart: false,hlshtml: "true",//mute: ((window.Device.isMobile) ? false : true),mute: true,//primary: "flash",file: "//content.jwplatform.com/manifests/xuXe4FJT.m3u8",image: "//cdn.jwplayer.com/thumbs/xuXe4FJT-720.jpg",mediaid: "xuXe4FJT",aspectratio: "1777:1000",advertising: {client: "googima",skipoffset: "5",adscheduleid: "idgukXXN" ,autoplayadsmuted: true,loadVideoTimeout: "60000",creativeTimeout: "60000",requestTimeout: "60000",admessage: "Your iOS questions answered will play in xx seconds",skiptext: "Skip now",schedule: [{offset: "pre",tag: advertisingTag},{offset: "29",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "58",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "87",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "116",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "145",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "174",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "203",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "232",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "261",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "290",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "319",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "348",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "377",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "406",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "435",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "464",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "493",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "522",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "551",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "580",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "609",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "638",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "667",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "696",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "725",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "754",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "783",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "812",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "841",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "870",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "899",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "928",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "957",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "986",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1015",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1044",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1073",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1102",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1131",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1160",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1189",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1218",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1247",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1276",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1305",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1334",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1363",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1392",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1421",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1450",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1479",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1508",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1537",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1566",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1595",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1624",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1653",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1682",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1711",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1740",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1769",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1798",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1827",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1856",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1885",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1914",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1943",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "1972",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "2001",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "midroll" )//tag: advertisingTag},{offset: "post",tag: advertisingTag.replace( new RegExp( "preroll", "gi" ), "postroll" )}]},key:"OccpdaRpvwBO35sM912RXRncb3aDZtlD99wE1A=="};var setupPlayerGeoWrapper = function(config){if(window.idgVideoDebug)console.log('JW', 'setupPlayerGeoWrapper()');jwplayer("video-16DE0C1D-ECEC-4A47-9C3C1FDC07D86711").setup(config).on('play',function(event){if(window.idgVideoDebug)console.log('JW', 'on play', event);//play actually happens after video pre roll.//dataLayer.push({"event":"Video Play"});//legacyif(event.playReason === "interaction")videoDataLayerPush('Play');else if(event.playReason === "external")videoDataLayerPush('AutoPlay');}).on('ready',function(event) {if(window.idgVideoDebug)console.log('JW', 'on ready', 'video-16DE0C1D-ECEC-4A47-9C3C1FDC07D86711');//if(window.idgVideoDebug)console.log('JW', 'onReady calling playSpotXAd()');//playSpotXAd(jwplayer("video-16DE0C1D-ECEC-4A47-9C3C1FDC07D86711"));}).on('viewable',function(event) {if(Device.isMobile){let state = jwplayer("video-16DE0C1D-ECEC-4A47-9C3C1FDC07D86711").getState();if(window.idgVideoDebug)console.log('JW', 'on viewable state=',state, event);if( 'viewable' in event)if(event.viewable==0 && (state == 'playing' || state == 'buffering') ){jwplayer("video-16DE0C1D-ECEC-4A47-9C3C1FDC07D86711").stop();if(window.idgVideoDebug)console.log('JW', 'on viewable', 'stopping');}else if(event.viewable==1 && (state == 'idle') ){jwplayer("video-16DE0C1D-ECEC-4A47-9C3C1FDC07D86711").play();if(window.idgVideoDebug)console.log('JW', 'on viewable', 'starting');}}}).on('pause',function(event) {if(window.idgVideoDebug)console.log('JW', 'on pause', 'video-16DE0C1D-ECEC-4A47-9C3C1FDC07D86711');videoDataLayerPush('Pause');}).on('complete',function(event){if(window.idgVideoDebug)console.log('JW', 'on complete', 'video-16DE0C1D-ECEC-4A47-9C3C1FDC07D86711');//dataLayer.push({"event":"Video Complete"});//legacy}).on('firstFrame', function(event) {if(window.idgVideoDebug)console.log('JW', ' on firstFrame', 'video-16DE0C1D-ECEC-4A47-9C3C1FDC07D86711');}).on('fullscreen', function(event) {}).on('adError', function(event){console.log('JW', 'on adError','video-16DE0C1D-ECEC-4A47-9C3C1FDC07D86711', event);//jwplayer("video-16DE0C1D-ECEC-4A47-9C3C1FDC07D86711").stop();//dont auto play if no advideoDataLayerPush('Ad Error');}).on('adRequest', function(event){if(window.idgVideoDebug)console.log('JW', 'on adRequest', 'video-16DE0C1D-ECEC-4A47-9C3C1FDC07D86711', event);}).on('adBlock',function(event){//only fires on being blockedif(window.idgVideoDebug)console.log('JW', 'on adBlock', event);}).on('adPlay', function(event){if(window.idgVideoDebug)console.log('JW', 'on adPlay', 'video-16DE0C1D-ECEC-4A47-9C3C1FDC07D86711', event);videoDataLayerPush('Ad Start');}).on('adComplete', function(event){if(window.idgVideoDebug)console.log('JW', 'on adComplete', 'video-16DE0C1D-ECEC-4A47-9C3C1FDC07D86711', event);videoDataLayerPush('Ad Complete');}).on('time', function(event){//if(window.idgVideoDebug)console.log('JW', 'on time', event);//work out percentvar percent = Math.ceil((event.position/event.duration)*100);gaVideoData.percentWatched=percent});//onif(window.idgVideoDebug)console.log('JW','jwplayer setup called for video-16DE0C1D-ECEC-4A47-9C3C1FDC07D86711', setupStruct);/*if (window.Device.isMobile) {jwplayer().setVolume(100);}*/setTimeout(function(){if(window.idgVideoDebug)console.log('JW','setTimeout() playing autoplay video with id','3778204');if(Device.isMobile && jwplayer().getViewable("video-16DE0C1D-ECEC-4A47-9C3C1FDC07D86711") === 0){if(window.idgVideoDebug)console.log('JW','setTimeout() not autoplaying as not in view on mobile');return;//if mobile and not in view then dont start}if(jwplayer("video-16DE0C1D-ECEC-4A47-9C3C1FDC07D86711").getState() === 'idle')jwplayer("video-16DE0C1D-ECEC-4A47-9C3C1FDC07D86711").play();//calling play if playing toggles it}, 1000);}//setupPlayerGeoWrapper//if floating but it should be only uk for certain sites then disableif('floating' in setupStruct){var floatUKOnly = true;if(window.idgVideoDebug)console.log('JW','floatUKOnly',floatUKOnly);if(floatUKOnly)window.$geoLocationDef.done(function(){if(!$('html').is('.geo-gb')){//not ukdelete setupStruct.floating;if(window.idgVideoDebug)console.log('JW deleting float property',setupStruct);setupPlayerGeoWrapper(setupStruct);}else{setupPlayerGeoWrapper(setupStruct);}});//doneelse{setupPlayerGeoWrapper(setupStruct);}}else{setupPlayerGeoWrapper(setupStruct);}//if//if(window.idgVideoDebug)console.log('JW SpotX addSpotXParamsToMVT then() returning');}//setupFunctionvar handleIndexExchange = function(mvt){var indexCallback = function (updatedMVT, indexTargeting) {if(window.idgVideoDebug)console.log('JW','indexCallback() updatedMVT', updatedMVT, 'mvt', mvt, 'indexTargeting', indexTargeting);if (typeof indexTargeting !== 'undefined' ) {var custParams = '';for(var key in indexTargeting)custParams = custParams+key+'='+indexTargeting[key]+'&';custParams = escape(custParams);//escape as adding to existing custom_params valuemvt = mvt.replace('&cust_params=','&cust_params='+custParams);if(window.idgVideoDebug)console.log('JW','indexCallback() amended mvt',mvt);}mvt = mvt+'&indexx=1';};//func//if(window.idgVideoDebug)console.log('JW Post Index X integration, indexXPublisherConfig',indexXPublisherConfig);window.getVideoAds(mvt, indexCallback, undefined, indexXPublisherConfig);//wait for 1 sec for index x to returnsetTimeout(function(){setupFunction(mvt);},1000);};// define a function to handle the video bid then request the video tag URLfunction handleVideoBid(videoBid, vastTagURL) {/*if(window.idgVideoDebug)*/console.log('JW amazon handleVideoBid() videoBid:',videoBid, 'vastTagURL:',vastTagURL);if(videoBid.length==0){return vastTagURL;}var videoBid = videoBid.filter(function(bid){return bid.mediaType === 'video'})[0];if(window.idgVideoDebug)console.log('JW amazon handleVideoBid() videoBid:',videoBid);if (videoBid) {// add the encoded query string params to the scp param on the vastTagURLvastTagURL += '&scp=' + videoBid.encodedQsParams;}return vastTagURL;}//funcfunction goAmazonGo(){apstag.fetchBids({slots: [{slotID: 'videoSlot', // NOTE: doesn't need to be the div IDmediaType: 'video'}]}, function(bids) {advertisingTag = handleVideoBid(bids, advertisingTag);if(window.idgVideoDebug)console.log('JW amazon post amazon bid, advertisingTag=',advertisingTag);directAdOS.addSpotXParamsToMVT(advertisingTag).then(handleIndexExchange);});}//func__cmp('getConsentData', null, function(data, success){if(window.idgVideoDebug)console.log('GDPR JW amazon video cmp return',data.consentData);goAmazonGo();});});//googletag.cmd.push};//embedVideo})(typeof require !== 'undefined' ? require : idguk.require);

View post:
How to use iCloud Drive to sync files between Mac, iPhone and iPad - Macworld UK

Panzura CEO: IT will never be same after COVID-19 pandemic – TechTarget

Panzura CEO Patrick Harr said he suspects the COVID-19 outbreak will forever change the way IT responds to disasters.

Even before the COVID-19 outbreak, Harr said he sensed an uptick in customers looking to expand their abilities to enable employees to work from anywhere at any time. That has helped the cloud file storage vendor's sales over the past year, and the pandemic is accelerating that trend.

Panzura claims subscription revenue for its cloud file system and data management software grew 237% and enterprise customers more than doubled their global cloud data capacity since last year. Now Harr says Panzura's current quarter could be its best ever, despite ominous economic signs.

Harr said customers are expanding and new prospects are accelerating deployments of Panzura Freedom software to help their employees collaborate, as many adopt work-from-home policies in response to the COVID-19 pandemic. Panzura struck its largest deal in history about a month ago with a large engineering firm, according to Harr.

"Certainly this pandemic has highlighted the need for business continuity," Harr said in an interview with TechTarget. "Clearly, we're focused on helping our customers work through this pandemic, and I pray that we get through this with as minimal disruption as possible to their lives."

In response to the COVID-19 outbreak, Panzura began offering a free Cloud Filer software instance for six months in either AWS or Microsoft Azure for customers that need to provide remote workers with fast access to data. Harr discussed other ways in which he expects the pandemic will have a profound impact on the storage, IT and business continuity planning. It may even, he said, "drive the final nail in the coffin of a pure data center model."

Are customer requests different than what you heard prior to the pandemic? Or, are you simply seeing an escalation?

Patrick Harr: It's more an escalation of this sense of urgency to ensure that employees can work from anywhere at any time. You used to have your users and your employees basically go to the data for the application, and it was in the data center in the office. In global cloud file systems, we'll bring the data to the user at the ultimate edge. You have the applications and the data to be able to successfully run in a remote scenario. We also have a mobile client that ties directly into the global cloud file system. We've always had the capability to do real-time collaboration and global file locking in the global file system, and now with the mobile client, you can do check-in and checkout of files as well. There's full disconnect, meaning no bandwidth. So, it gives complete uninterrupted business continuity. And, if that bandwidth comes back, obviously, you can check back in. We've spent a lot of time particularly this last year focused on business continuity and cloud mirroring and the mobile client. We're just now releasing that in full force.

Much like 9/11 did, this pandemic will forever change business continuity planning and how we have to deal with a crisis. Patrick HarrCEO, Panzura

What was very interesting about two to perhaps three weeks ago is this started becoming a board-level conversation, particularly for more leading-edge kind of planners. It was almost a seismic shift of how it went from IT-level conversations to board-level conversations in terms of what needs to be done. Much like 9/11 did, this pandemic will forever change business continuity planning and how we have to deal with a crisis.

In what ways do you think the COVID-19 pandemic will change IT?

Harr: Number one, I think you're going to see full SaaS-ification of the world -- a significant acceleration of software as a service (SaaS)-based services. Obviously, we've already seen a strong push of that. But I think this will further cement that as a way of adopting and consuming applications, business processes and data services. Second, I think you will see even further adoption of public cloud in particular, given the inherent natures of how they're built and scale, to handle significant peak loads of demand and bandwidth, etc.

The second piece goes into business continuity. I'll draw the analogy of moving from a data center 30 miles or kilometers away, which is what happened after 9/11. It was more data center to data services continuity. As we've had mobility come out, and now with this crisis, it will come down to not just data center to data center, or last-mile business continuity planning. I think it will become last block and last user, up to that remote worker at any and all times. This is somewhat counter to a couple of years ago when Yahoo, etc., was calling for everyone to come back into the office. This will change some of the dynamics of the workforce. I think you will actually encourage, not discourage, more remote working. I think that in turn will change some of the business practices for how people work together. Video will become more important technology. We're going to have sea changes that will live with us for a long time.

Has Panzura's customer base remained consistent across vertical industries, or has it changed?

Harr: When I joined the company four years ago, we were strong in engineering and manufacturing, building around the notion of helping large-scale design teams get projects out on time and on budget. Now that trend has continued into other verticals: financial services, where we brought on a very large Wall Street bank, some of the largest healthcare companies, media and entertainment, and subsets around gaming, with more collaborative team design. Software development is underpinning that. We have some large chip manufacturers that have distributed global teams.

The second key thing that's helped us expand across vertical segments is consolidation and the migration to the cloud. I think the pandemic is going to further accelerate, if not drive the final nail in the coffin of a pure data center model. Because companies are embracing cloud-first and cloud-native strategies, that's certainly benefited what we've done with them, because a majority of applications are file-based. One of the key things we do is translate files, which is NFS and SMB, into object, which is S3-compliant cloud storage. We enable them to take advantage of the deep, cheap, scalable, resilient object storage but still provide high-performance, file-based NFS and SMB services. What we find is the majority of customers need to transition their file-based applications into a cloud-based world without rewrite.

Where would you say your customers are on the continuum of on-premises versus hybrid versus public cloud?

Harr: Roughly 15% of our customers are in a pure private cloud, where they need what's called dark-site support, meaning no communication through the firewall. These are the [companies that are] heavily regulated, compliant, secure. We do have some three-letter acronym government agencies and banks that would fit that profile. The vast majority -- about 75% of our customers -- are hybrid. They are shifting into a public-cloud paradigm. High-performance access to data and applications at the edge, whether in a data center or an office, is a very significant portion of our business. We've certainly seen hybrid is real. That's what we run in a strong hub-and-spoke context. What's interesting is that the pure public grew significantly last year, meaning they're running just pure in-cloud instances. As an example, a large tax preparer is running us in Amazon [U.S.] East and West as well as in Europe to provide the same global namespace and single common access to the data for the application.

Do the pure public-cloud customers tend to be small or new companies?

Harr: There are newer companies that are more born in the cloud. There's some that are container-based, where they need NFS mounts. The second category is mid to large companies that are getting out of the data center business. They have a lot of applications that are file-based, and they simply need to get them in that public cloud context without rewrite.

Who are your main competitors these days?

Harr: There's still a large swath of status quo -- the NetApps, Dell EMC Isilons and Unity, more traditional file-based storage. They rely on multiple copies of data everywhere, replication, different pieces of backup software. There are so many different things inside that stack, which becomes pretty costly and complex.

Probably our biggest direct competitor is Nasuni. We were designed at the outset for the enterprise, whereas they were designed more from a small, medium business kind of context and from a backup/archive perspective as opposed to primary files. They've really pushed to try to catch up, adding cloud locking, et cetera.

The final area is the public clouds themselves, in terms of offerings and file services. If you are a customer that is comfortable with being in a single stack, [such as] all in Amazon, there's something to be said for having everything in one location and using all their services. I'm a firm believer in multiple clouds, including hybrid and data center.

Read more here:
Panzura CEO: IT will never be same after COVID-19 pandemic - TechTarget

Youll be shocked at how good these $24 home security cameras are on Amazon – BGR

Its difficult to focus on anything other than the novel coronavirus outbreak right now, and thats certainly understandable. Its the most important thing happening in the world and it will continue to be for months and months to come. The United States now has more confirmed COVID-19 cases than any other country in the world and thats in spite of the fact that only a fraction of people exhibiting symptoms can get tested since theres still such a shortage on coronavirus tests. Its bad and getting worse, but we also have to remember that life goes on and we have more than just the coronavirus to protect ourselves and our families from.

Amazon has two great deals right now on home security cameras that are just as good as a $200 Nest Cam for a tiny fraction of the price. The first is the Wyze Cam, which has all main features you might want as well as 14 days of free cloud storage for just $24 and change per camera. The second one is on the Yi Home Camera 3, which costs about the same amount but has some more advanced features as well as a 6-month free trial of YIs cloud service. On top of that, you can get the first Yi camera for just $19.50 by using the coupon code GAXSJC8C at checkout.

So why would anyone choose the Wyze Cam over YIs rival? The answer is simple: Amazon is shipping Wyze Cams right away, while new YI Home Camera 3 deliveries are now delayed until mid-April.

If you can wait that long, you should definitely go for the YI model. On top of all the main features youd get with the Wyze Cam, the YI Home Camera 3 also includes advanced AI features like person detection and even sound analytics. The downside is that you only get free 7-day cloud storage for 6 months, and after that youll have to subscribe to YIs cloud service if you want to keep using the cloud. $24.29 for all those features is still a crazy price though, and its great that you can get one for under $20 with the coupon.

As for the Wyze Cam 1080p HD smart home camera, its always a great value and it comes with 14 days of free cloud storage for free. Thats not a limited-time trial, mind you youll enjoy free cloud storage for as long as you own your cameras. As we also mentioned, Wyze cameras are still shipping out right away on Amazon despite the retailers shift in focus away from nonessentials. Youll pay $25.98 for one camera or $24.46 if you by them in 2-packs, and theyll be on your doorstep in just a few days.

Follow @BGRDeals on Twitter to keep up with the latest and greatest deals we find around the web. Prices subject to change without notice and any coupons mentioned above may be available in limited supply. BGR may receive a commission on orders placed through this article, and the retailer may receive certain auditable data for accounting purposes.

Read the rest here:
Youll be shocked at how good these $24 home security cameras are on Amazon - BGR

Why your data is safer in the cloud than on premises – TechBeacon

Historically, enterprises have been reluctant to migrate applications and data to the cloud due to security concerns. Executives are most worried about exposing their communications. However, when I asked these same executives where they store their sensitive emails, texts, and direct messages, the answer was almost universally "in the cloud."

In fact,moving your data to a reputable cloud hosting service such as Amazon Web Services or Microsoft Azureprovides a level of security that can't be duplicated on site. That's because most organizations simply don't have the financial or staffing resources to provide the same security benefits aslarge cloud services providers can.

Here are the other ways that cloud-based data storage solutions provide better security than those housed on premises.

When you move to the cloud, data is stored in multiple data centers that are geo-independent, with redundancy implemented throughout the system. Your data doesn't just get copied to one data center;it gets distributed to multiple data centersso if onegoes down, your data will fail over to another automatically.

Large cloud providers also protect availability through virtualization. When servers are virtualized in the cloud, providers can easily migrate the servers from one data center to another if a failureoccurs. Most on-premises systems may just have two physical servers that fail over to one another. That isn't helpful if theres a fire or a large network outage.

It takes a lot of time and money to prevent physical theft. To completely protect your on-premises servers, you need to implement heavy security, with guards, mantraps, and locked cages for the servers.

In the cloud, youreffort and expensefor all that go away. Cloud providers spend the money for round-the-clock guards and state-of-the-art physical security controls. The size and security of these data centers make targeted physical theft almost impossible.

Patching is one of the biggest security issues that companies of all sizes struggle with until they move to the cloud. In fact, some of the biggest breachesthink Equifax and the WannaCry outbreakwere a result of poor patching.

Unlike most companies, the big cloud services providers such as Microsoft, Amazon, and Google have the resources to hire full-time teams dedicated to patching their products. The patching process in the cloud is mostly automated, which eliminates the downtime that on-premises patching requires.

To properly watch data center security, you need to hire 24/7 staff to continuously monitor for attacks. Most organizations simply can't afford that. Cloud providers havefull-time staffing and around-the-clock security operations center (SOC)that constantly monitors their entire infrastructure.

A huge security advantage the cloud has over on-premises servers and infrastructure is segmentation from user workstations. The most common way attackers get into networks is through phishing and email-borne threats. The attacks almost always enter through user workstations. They rarely come directly through the server environment.

When you're hosted in the cloud, all of your workstations are completely segmented. In the cloud, users aren't sitting on the corporate network where the data lives.

Encryption can be difficult for companies to implement across the entire environment, but cloud providers usually offer encryption right out of the box. Encryption helps prevent data exposure, because the big cloud providers use military-grade AES 256 encryption so attackers won't be able to read any data they might steal.

There are certainly benefits that come withcloud data storage, but there are challenges to be aware of also. These include the following.

[ Get up to speed on new privacy laws with this Webcast: Californias own GDPR? Its not alone.Plus: Go deeper withTechBeacon's guide to GDPR and CCPA. ]

Although the cloud is solidly secure, companies must do their due diligence to create and maintain a secure environment for their sensitive data. Here are the best ways to proactively protect your server data in the cloud:

Enable multifactor authentication

Provide your own encryption keys

Limit access by IP address (i.e., office or VPN)

Choose a reputable, audited cloud provider

If you do all thatand remember your shared responsibility security model, your cloud vendors can help you remain vigilant.

Share your thoughts on cloud security in the comments below. What are your experiences?

[ Explore TechBeacon's guideto SecOpschallenges and opportunities. Plus: Downloadthe 2019 State of Security Operations report. ]

[ Get on top of access with TechBeacon's guide to identity governance. Plus: Learn how to secure and manage cloud-based Linux resources with Active Directory in this Webinar.]

Read the original:
Why your data is safer in the cloud than on premises - TechBeacon

Business Cloud Storage Consumption Market Share opportunities Trends, and Forecasts to 2020-2026: Zoolz, OpenDrive, JustCloud, MozyPro, Egnyte – Daily…

Global Business Cloud Storage Consumption Market Report 2019>This report offers a detailed view of market opportunity by end user segments, product segments, sales channels, key countries, and import / export dynamics. It details market size & forecast, growth drivers, emerging trends, market opportunities, and investment risks in over various segments in Business Cloud Storage Consumption industry. It provides a comprehensive understanding of Business Cloud Storage Consumption market dynamics in both value and volume terms.

The key players covered in this study > Zoolz, OpenDrive, JustCloud, MozyPro, Egnyte, CrashPlan, Dropbox, Carbonite, Hightail, Box

The final report will add the analysis of the Impact of Covid-19 in this report Business Cloud Storage Consumption industry.

Get Sample Copy of the Complete Report

This report focuses on the global Business Cloud Storage Consumption status, future forecast, growth opportunity, key market and key players. The study objectives are to present the Business Cloud Storage Consumption development in United States, Europe and China.

Table Of Content

1 Report Overview

2 Global Growth Trends

3 Market Share by Key Players

4 Breakdown Data by Type and Application

5 North America

6 Europe

7 China

8 Japan

9 Southeast Asia

10 India

11 Central & South America

12 International Players Profiles

13 Market Forecast 2019-2025

14 Analysts Viewpoints/Conclusions

15 Appendix

This report studies the Business Cloud Storage Consumption market status and outlook of Global and major regions, from angles of players, countries, product types and end industries; this report analyzes the top players in global market, and splits the Business Cloud Storage Consumption market by product type and applications/end industries.

Customization of this Report: This report can be customized to meet the clients requirements. Please connect with our sales team ([emailprotected]), who will ensure that you get a report that suits your needs. For more relevant reports visitwww.reportsandmarkets.com

What to Expect From This Report on Business Cloud Storage Consumption Market:

The developmental plans for your business based on the value of the cost of the production and value of the products, and more for the coming years.

A detailed overview of regional distributions of popular products in the Business Cloud Storage Consumption Market.

How do the major companies and mid-level manufacturers make a profit within the Business Cloud Storage Consumption Market?

Estimate the break-in for new players to enter the Business Cloud Storage Consumption Market.

Comprehensive research on the overall expansion within the Business Cloud Storage Consumption Market for deciding the product launch and asset developments.

If U Know More about This Report

Any special requirements about this report, please let us know and we can provide custom report.

About Us:

Market research is the new buzzword in the market, which helps in understanding the market potential of any product in the market. Reports And Markets is not just another company in this domain but is a part of a veteran group called Algoro Research Consultants Pvt. Ltd. It offers premium progressive statistical surveying, market research reports, analysis & forecast data for a wide range of sectors both for the government and private agencies all across the world.

For more detailed information please contact us at:

Sanjay Jain

Manager Partner Relations & International Marketing

http://www.reportsandmarkets.com

Ph: +1-352-353-0818 (US)

See the rest here:
Business Cloud Storage Consumption Market Share opportunities Trends, and Forecasts to 2020-2026: Zoolz, OpenDrive, JustCloud, MozyPro, Egnyte - Daily...

Many Are Unprepared for Another Kind of Disaster – Fstoppers

Just as literally billions of people were caught unprepared for the coronavirus outbreak, many are also unprepared for a data disaster. Sure, many professionals are prepared, but many others just think they are.

The old idiom "never say never" comes to mind. It surprises me how many professionals that use computer systems daily have no idea about some of the basics of computer use. Sure, sometimes, you can go years without any maintenance. So can your car, but we all know that eventually, it's going to break down, especially if you don't put oil in it.

Cloud storage company BackBlaze uses consumer-level drives for its storage andwrote an articleabout its hard-drive lifespan. It found that 5.1% of drives failed in the first 1.5 years. More worrisome is that only 78% of drives lasted four years. That means that 22% died. They also predicted that after six years, only 50% of the drives would survive. Simply put, a consumer hard drive is not built to last forever. They will die. BackBlaze also publishesquarterly statson their hard-drive failure rates.

Yes, you've heard it a million times. Now that so many people are working from home during the coronavirus outbreak, maybe now is the time you should be evaluating your backup strategy. There are a ton ofarticles on Fstoppersabout backing up your computer, so there's no need here to go over that again.

Look at the lead image for this article again. Those are just some of my old drives from just the last eight years that I replaced because they were dead or dying. Some of them were the backup drives that I found were failing when I tried to restore from a backup. That's not a good time to find out that your backup drive is dying. Luckily, I had a second backup location. The failing backup drives had over 50,800 hours of use on them - that's 5.8 years of continuous spinning.

There's no point in putting something in a safe place if you can't get it back. If you have a backup, you need to make sure that you can restore files from it. You need to test it. You need to make sure that you can restore your files.

All too often, I've encountered people that had a computer failure and didn't have a backup. Of those that thought they had a backup, most had never tested it. It's not uncommon to have a backup method only to find out that it won't restore, or that you don't even know how to access the backups to do a restore.

I once accidentally deleted all of my niece's wedding photos. Yep, nuked them with shift-delete. I had selected a folder and accidentally hit the up arrow right before delete. In under two minutes, I had restored them from one of four backup locations.

Use this time to prevent a disaster. Figure out a backup plan. If you already have a backup plan, maybe now is a good time to verify your backups. If your backup drives are getting old, consider replacing them.

Here is the original post:
Many Are Unprepared for Another Kind of Disaster - Fstoppers