Page 1,622«..1020..1,6211,6221,6231,624..1,6301,640..»

Hardcoded API keys threaten data security in the cloud – TechHQ

Mobile apps are ubiquitous. Smartphones do a great job of running software that would have previously meant lugging a laptop around, and thats made mobile apps a popular choice for enterprises. Delving into the software, there are a number of use cases. But a common one is the use of mobile apps as a gateway to accessing information in the cloud for example, to query a corporate database (or more likely, several databases). For businesses, the productivity gains are clear. And often software designed to be run on smartphones, tablets, or other devices (vehicles are becoming another popular environment for app developers) turns out to be more widely used than its PC equivalent. So far so good, until security issues get in the way.

Search online for hardcoded credentials on mobile apps and the problem becomes clear (for the MITRE definition, check out CWE-798). In the early stages of software development it can be tempting to write API keys into the code for example, to quickly test an app idea, or prototype different solutions. These keys (which are unique and allow servers to identify the application making the request) provide authorization for software on a remote device to read values stored in a database hosted in the cloud. API keys, in themselves, work well and can help servers in other ways too for example, by allowing them to rate-limit requests; quenching denial of service (DoS) attacks. But keys are keys, and like the real world versions in your pocket or bag, you wouldnt want everyone to have access to them, while they remain valid.

Security search engines such as CloudSEKs BeVigil found (in April 2021) that 0.5% of mobile apps expose AWS API keys. And given how many apps are out there, thats a lot of keys and a lot of data that is potentially at risk of being breached. Its important to note that AWS is not the story here. AWS is one of the most popular cloud hosts on the planet, so theres no surprise to see its keys being widely used. The problem is at the app level and in the software supply chain that goes with it. More recently, Symantec looked into the issue and reported in September 2022 that in a survey of 1859 publicly available apps (featuring Android and iOS operating systems) it had found:

Worst still, hardcoded credentials is a problem that hasnt gone away Symantecs team raised the same issue three years ago. One reason for the problems persistence is that there are numerous ways that these API issues can arise. Kevin Watkins, a security researcher at the firm, notes that some companies outsource the development of their mobile apps, which can lead to vulnerable external software libraries and SDKs being unknowingly introduced. Internally, the use of cross-team libraries can also present issues, when vulnerabilities havent been picked up. And shared libraries add to the problem too, where access tokens have been hardcoded.

If the issue lies in an upstream library, vendors may not even realize that they are using hardcoded credentials, which emphasizes the importance of running security scanning and safe coding tools during software development Snyk is one example, and there are others too. And touching back on the software supply chain issue raised by Symantec, there are solutions that can be deployed here as well, such as software composition analysis integrations provided by Sonatype.

At this point in the discussion, its worth noting that adversaries may have to do a little digging to get their hands on the baked-in secrets. But they will find them. And if those API keys open the doors to a treasure trove of sensitive business data then victims of the breach will be in trouble. There are online guides showing how easy it is to scan code repositories such as GitHub for secrets and credentials. And even simply typing the Linux command strings (which lists all of the strings used in a program) could be enough to reveal clumsily hidden secrets. Tools such as MobSF a security framework for analyzing Android and iOS software are useful indicators of how good, or bad, the situation is. And Microsoft is very clear in its advice to coders. When a key is hard-coded, it is easily discovered, writes the computing giant. Even with compiled binaries, it is easy for malicious users to extract it.

Data breaches happen for all kinds of reasons, but shutting the door on the use of hardcoded credentials will certainly help to raise defenses. And there are lots of useful cheat sheets on how to implement secure cryptographic key management. Also, cloud providers such as Google and Amazon offer tools for keeping secrets such as API keys safe. Solutions such as AWSs secrets manager take much of the heavy lifting out of belt and braces approaches, which includes key rotation a way of further bolstering security. API hubs can help too. RapidAPI has a useful section explaining how to perform API key rotation or reset an API key that you know to be compromised.

Continued here:
Hardcoded API keys threaten data security in the cloud - TechHQ

Read More..

Common Email Security Practices Called Into Question as 89% of Organizations Suffered Breaches In the Past Year – Digital Information World

Email security is one of the foundational aspects of an organizations security protocols because of the fact that this is the sort of thing that could potentially end up keeping many threats at bay. In spite of the fact that this is the case, most widespread email security practices appear to be failing to protect organizations that use them, with 89% of them suffering an email breach over the past year.

This data comes out of a survey conducted by Osterman Research, and it was done at the request of Cyren. With all of that having been said and now out of the way, it is important to note that many businesses that use Microsoft 365 participated in this survey so its findings are thought to be fairly accurate. Just under half of organizations said that they felt like their security protocols were effective, and a similar number felt that they were able to successfully ward of potential threats that would target their email servers.

Whats more is that the total quantity of breaches of this variety have more than doubled in less than three years, with current numbers being twice that of those seen in 2019 with all things having been considered and taken into account. A truly concerning fact in this report is that 99% of organizations train their users to spot suspicious emails and flag them, but the vulnerabilities still get exploited despite them investing in frequent training for employees.

That might be because organizations only analyze a quarter of the emails that get flagged, something that indicates that theyre not going too far beyond the standard things that they know to do. Organizations need to be start being more proactive about things like this, because no matter how many suspicious emails their employees point out, these systems wont have an impact on improving security if organizations dont play their part by analyzing said emails and looking into how these threats might have worked out. Using nothing but the basic security protocols is why these threats are continuing to be common.

Excerpt from:
Common Email Security Practices Called Into Question as 89% of Organizations Suffered Breaches In the Past Year - Digital Information World

Read More..

Hybrid Cloud: Benefits and Barriers – Techopedia

In the beginning, cloud computing was just a utility -- commonly known as Infrastructure as a Service (IaaS).

But issues with primitive public cloud platforms (mainly revolving around security, compliance and customizability) has since caused many businesses to opt for the hybrid cloud model: a combination of the public and private cloud models, which gives organizations the best of both worlds and makes for an efficient cloud strategy. (Also read: Public Cloud vs. Private Cloud: How to Choose.)

However, is hybrid cloud as good as it seems?

Let's find out. But first,

Before we can examine the pros and cons of the hybrid cloud model, we need to know what we're talking about.

In general, hybrid cloud can be defined as a combination of public and private cloud infrastructures.

More specifically, the hybrid cloud model is a cloud solution that meets both of the following criteria:

As cloud computing technology has evolved, the hybrid cloud concept has extended. It now covers multiple heterogeneous on-premise infrastructures -- like private cloud, servers, containers and virtualized infrastructure -- and also includes multiple public clouds from various cloud providers. Moreover, these diverse cloud components are not in silos; they are well-connected and integrated to deliver seamless processing power. A proper hybrid cloud integration also makes it easier to manage and monitor the entire cloud infrastructure, allowing smooth portability for both data and applications.

In short, with hybrid cloud, the name says it all: It's truly hybrid in nature and spans multiple dimensions. (Also read: 3 Key Aspects of Effective Hybrid Cloud Management.)

First, the hybrid cloud optimizes the workload in both the private and public cloud infrastructures it comprises. It balances cost, security, speed, availability, and scalability efficiently.

Other major advantages of hybrid cloud include:

The hybrid cloud helps the enterprise optimize capital expenditure (CAPEX) and operational expenditures (OPEX).

Infrastructure cost is one of the biggest challenges in any enterprise; and hybrid cloud helps pacify this by bringing a balanced combination of public and private resources. This allows organizations to make a proper plan for workload distribution.

A combination of public and private cloud brings the best combination of security solutions.

That's because the public cloud, by nature, is configured with automated and highly efficient security systems. This reduces error, as human intervention is minimized, and is more cost-effective than traditional cloud security measures. At the same time, the private cloud provides more customized security to protect organizations' sensitive data.

Bringing these benefits together, hybrid cloud gives the enterprise the most bang for its buck in terms of security. (Also read: Cloud Security 101.)

The hybrid model can help the enterprise overcome availability issues.

Public cloud services rarely fail -- but if/when they do, it can be detrimental to client organizations. Private cloud and local data centers can provide the backup for public cloud downtime, but to really ensure airtight availability, organizations distribute their workload between the public and private clouds (i.e., the hybrid cloud). Ideally, store your critical data in the private cloud and/or your local data center so service continuity can be maintained even if there is any downtime in the public cloud infrastructure.

The above factors can also apply to latency; using the hybrid cloud model can help reduce the time it takes for data to travel.

In today's competitive business environment, scaling up to catch the growing market demand is the key to success. And the hybrid cloud is the perfect solution

The private cloud does not scale up quickly, but public cloud infrastructure is highly scalable. Since it combines the two models, hybrid cloud allows the enterprise to scale up the public part of its cloud infrastructure whenever necessary and in a cost-effective way.

Hybrid cloud solutions are easy to manage because they provide efficient and reliable management solutions for the infrastructure as a whole.

Public cloud solutions also provide lots of automation (sometimes AI-based), which is very helpful for managing the infrastructure.

Because the hybrid model is highly cost-effective, organizations can experiment with it without having to invest upfront.

This creates a great opportunity to innovate and grow: With a hybrid cloud, you can take calculated risks, test new ideas and implement them. (Also read: Experts Share the Top Cloud Computing Trends to Watch for.)

Along with great promises, hybrid model brings some challenges. Some key drawbacks to this model include:

There's no denying it: Hybrid cloud implementation is a complex task.

A proper migration strategy and planning are very important. Organizations should run a pilot project before migrating their workload into the hybrid cloud because, sometimes, the distribution of workload distribution between public and private clouds may go wrong, which can have a negative impact on the business.

While the hybrid model can be a cost-effective way to improve security, it can also be a serious concern if not designed properly.

The hybrid cloud has a public cloud component, which comes with unique risks that differ from the on-premise setup. (Also read: Is Your Organization Aware of These 6 Key Public Cloud Risks?)

If proper security tools and technologies are not implemented, data can be at risk with the hybrid cloud model. To protect it, organizations must ensure their entire public/private setup is protected from intrusions.

Again, while the hybrid cloud can also be a great tool to reduce network latency, it can also increase it if not done properly.

Transferring data to the public cloud can be an issue if your internet is slow. To avoid this, implement a backup plan to overcome latency-related issues.

Hybrid cloud management is another critical challenge.

The most important factor is to ensure consistency in multiple areas like infrastructure, operations, resources, and security. So, organizations should look for an experienced and trusted cloud partner for hybrid cloud deployment. Any management failure can cause severe damage to the business.

For a cloud strategy to succeed, an organization must consider two truths:

That's why hybrid cloud is an ideal fit: The most critical factor is proper workload management. The failure of the hybrid model is mostly caused due to poor workload planning and improper management. Enterprises should know that public cloud migration is not a simple lift and shift process. The hybrid cloud implementation journey should start when an organization is cloud matured and planning for work-load optimization.

For a cloud strategy to succeed, an organization must consider two truths:

That's why hybrid cloud is an ideal fit: it allows you to keep the public cloud's scalability and growth potential while housing your most sensitive data on-premise.

However, keep in mind that poor workload planning and improper management can cause even the best hybrid cloud strategies to fail. Public cloud migration is not a simple lift-and-shift process; your hybrid cloud implementation journey should start when an organization is cloud-mature and planning for workload optimization.

Go here to see the original:
Hybrid Cloud: Benefits and Barriers - Techopedia

Read More..

StorPool Launches New AWS Capabilities Enabling Migration of Demanding Monolithic Applications to the Public Cloud – Business Wire

SOFIA, Bulgaria--(BUSINESS WIRE)--StorPool Storage today announced a full-featured solution on Amazon Web Services (AWS) metal instances that enables the deployment of performance-intensive enterprise applications on hyperscale public clouds, which is not economically efficient with other technologies.

The new solution was developed in cooperation with Amazon Web Services and is designed to deliver extremely low latency and high IOPS to traditional applications such as transactional databases, monolithic applications and heavily loaded e-commerce websites. In the past, it was difficult and expensive to reach the same levels of storage performance in the cloud that are available in traditional on-premise deployments. With the StorPool on AWS solution, companies benefit from single-instance storage performance that matches or exceeds the performance of high-end, on-premises block storage, yet with all the advantages of the cloud.

Traditional applications that rely heavily on vertical scaling (i.e. scale up) are harder to lift and shift to AWS, demanding much more storage performance per instance than the cloud provider can deliver, even with the most expensive AWS EBS io2 Block Express. With its cost per IOPS, storage efficiency, advanced features and optimal performance even when engaging snapshots and other features that decrease performance in other storage architectures StorPool enables more than 5 times the maximum performance of io2 while reducing latency by 50 percent.

StorPool delivers blazing-fast 1.3+ million balanced random read/write IO/s to a single EC2 r5n instance. This frees businesses of per-instance storage limitations and the performance can be achieved for any compatible instance type with sufficient network bandwidth. StorPool achieves these numbers while utilizing less than 17 percent of client CPU resources for storage operations, leaving the remaining 83 percent for user applications and databases.

In terms of storage throughput, StorPool can deliver more than 10GB/s to a single client instance. StorPool saturates 100Gbps network connections with storage operations with block size of 8KB or larger all while keeping a complete set of benefits from StorPools advanced features.

"With the StorPool on AWS technology solution, organizations can now move traditional on-premises deployments to AWS to decrease capital expenditures and enjoy the more flexible OpEx model offered by the public cloud," said Boyan Ivanov, CEO at StorPool Storage. "Healthcare providers, insurance companies, SaaS vendors, those in financial services, or someone else with performance-hungry monolithic applications can leverage StorPool on AWS to get the extreme reliability and ultra-fast data access times they need in situations that would otherwise have been cost-prohibitive before."

The StorPool on AWS solution is currently available to partners interested in performing hybrid-cloud deployments of StorPool Storage on AWS i3en.metal instances for applications and use cases requiring exceptional storage performance. StorPool experts will architect, deploy, tune, monitor and maintain each StorPool Storage system so that users can focus on running their business with the peace of mind that their applications foundation is running optimally. Interested parties can email aws@storpool.com for more information.

You can find more technical details about the StorPool on AWS solution here.

About StorPool Storage

StorPool Storage is a primary storage platform designed for large-scale cloud infrastructure. It is the easiest way to convert sets of standard servers into primary storage systems. The StorPool team has experience working with various clients Managed Service Providers, Hosting Service Providers, Cloud Service Providers, enterprises and SaaS vendors. StorPool Storage comes as a software, plus a fully managed data storage service that transforms standard hardware into fast, highly available and scalable storage systems.

Here is the original post:
StorPool Launches New AWS Capabilities Enabling Migration of Demanding Monolithic Applications to the Public Cloud - Business Wire

Read More..

bmobile partners with TTMA to Create More Resilient Businesses through Cloud Solutions – Trinidad Guardian

bmobile has partnered with TTMA in creating one of the most resilient and secure Cloud solutions in the Caribbean. According to this press release, this technological leap will be critical for businesses seeking to grow. Details follow in this release...

bmobile has invested heavily in creating one of the most resilient and secure Cloud solutions in the Caribbean. This technological leap will be critical for businesses seeking to grow and will also be essential as more organisations, including the Government of the Republic of Trinidad and Tobago (GoRTT), seek greater digitisation.

While digitisation allows organisations to benefit in terms of data, speed and efficiency, it also brings inherent risks if not managed properly, as evidenced by recent ransomware attacks in the Caribbean Basin. To help businesses better understand secure Cloud solutions (and the availability of world-class facilities here in Trinidad and Tobago),bmobilepartnered with theTTMAto host a webinar as part of the2022 Trade and Investment Conference (TIC).

The virtual meeting,Creating More Resilient Businesses through Cloud Solutions, allowed several local and international experts to demystify Cloud solutions and showcase how businesses of any size, including SMEs, can benefit from Cloud services.

Tanya Muller, Senior Manager of IT Infrastructure, TSTT,welcomed attendees with several case studies to emphasise the urgency of implementing Cloud solutions. One client of ours was the victim of a ransomware attack which froze their critical financial data. Thankfully as they had been backed up to our Cloud, we were able to restore their data and have them operational soon after. Another client suffered a hardware failure on their internal servers. Still, as they were backed up via our offsite Cloud facilities, we were able to have them back in operation in just an hour too, Muller highlighted. For customers that already have on-site servers, Muller noted that TSTT could house those on behalf of customers in a secure, climate-managed facility that can extend the life of those servers. Doing so can also significantly reduce in-house expenses consumed through IT staffing, maintenance and electricity usage.

Muller also highlighted the primary benefits of the bmobile Cloud solution to attendees. According to Muller, customers considering Cloud solutions would be interested in three things: availability, flexibility and continuity. We are always available and fortunately for our customers we had 100% availability over the past 11 years. In terms of flexibility, we can also scale as needed starting off storing data for ten customers, but if you now have three hundred, we can scale that for you within minutes without you needing to buy more servers. Continuity is also vital. Our Disaster Recovery (DRaaS) service can back up your data easily to avoid events as we shared from our customers stories.

Muller noted that the bmobile Cloud service is not only designed for large businesses, but most SMEs can also benefit. Data and customer information is important today, and we can automate information that you normally write down manually. From the hairdresser to the hardware, we have solutions and apps that can be designed around your needs to make your life easier by making management of your business easier, Muller added.

TSTTs data centre and facilities are rated and inspected annually and hold several international and independent certifications, some of which are unique in the Western Hemisphere and the Caribbean. The TIA-942 Rated 3 certification merits the annual physical inspection of the facilities. The DCOS-3 rating is given on review of the operations, maintenance and personnel management aspects of the companys Cloud and data centre operations. Extensive background checks are also conducted on staff.

Mauricio Pennini, Senior Business Development Manager, VMware,emphasised that not even TSTT has access to the data it hosts for its clients. The data is more secure in the Cloud, than it is in your own facility, he added. VMware is a leading provider of multi-cloud services for all apps, enabling digital innovation with enterprise control with headquarters in Palo Alto, California.

Sean Koon Koon, Manager of IT Networks and Cloud, TSTT,also noted the extensive security measures that the company puts in place - that go well beyond what many companies can do in-house. We have designed our Cloud with collaboration and security architecture at their core. Using the Governance, Operations and Technology framework, the bmobile Cloud solution is built to be used by large clients like the GoRTT, which can share space but have those spaces differentiated by Ministry and be accessible in multiple locations while remaining secure, he added. Or be used by smaller clients just as securely.

Joseba Calvo, Managing Partner, EPI Latam, also shared insights with virtual attendees. In terms of certifications, TSTT has certifications to mitigate what we often call Murphys Law. And these reliable Cloud services will become more critical in the coming years. The number of internet users is projected to increase from 3.8 billion in 2019 to 5 billion by 2025, he highlighted. As a result, businesses poised to benefit are those with secure and reliable Cloud services, supporting their client databases, apps and operations. EPI is the global certification agency that verifies quality and provides independent audit services with specialisations in the ICT and Data Centre sectors.

Attendees also had the opportunity to ask direct questions of the team of experts assembled by bmobile and explore the Cloud solutions for their businesses. The event was hosted byKhamal Georges, Senior Manager Corporate, Environmental, Social, Reputation Management, TSTT.

Link:
bmobile partners with TTMA to Create More Resilient Businesses through Cloud Solutions - Trinidad Guardian

Read More..

What Do You Do Online? Survey Highlights Digital Habits Of Users Worldwide – Digital Information World

In case you didnt know, most of us spend a huge fraction of our lives staring at our devices but what is it that really takes up so much of our time?

Well, to help bring an end to the curious mystery, NordVPN has surveyed a number of global citizens representing different countries to see where they stand in terms of digital habits. And this is what they managed to gather so far.

Brazil led the pack, followed up closely by South Korea, Taiwan, and then Spain. Canada took the 11th position, beating out the United Kingdom at rank 13, which was closely followed by the US.

Here is a summarized version of what the study was able to conclude:

Well, first things first, youll find all of your bank details here. Secondly, relationship status and your address are other valuable information seen online. In the same way, your likes and dislikes along with your clothing size are other unique personal details that you are likely to come across when searching online.

Certainly, this study was a complete handful of insightful information for so many of us. The survey was commissioned by NordVPN where quotas were placed on a number of factors like age, address, and gender.

The time spent online was calculated through the average lifespan in a particular nation and its amazing to see how particular activities were measured individually.

Go here to read the rest:
What Do You Do Online? Survey Highlights Digital Habits Of Users Worldwide - Digital Information World

Read More..

A Study Reveals That 95% Of The Worlds Contact Centers Will Be Automated By Next Year – Digital Information World

According to a joint study between Replicant and Demand Metric, 95% of contact centers across the globe have implemented automation as a part of their services, or plan to within the next year.

Automation has become an essential part of contact centers ever since the voice answering machine entered the fold (and probably took a few hundred people out of their jobs in the process). Naturally, of course, the human element still needs to be a part of such centers because customer queries rarely ever fit a singular mold that AI can attend to. However, there is still a lot that can be automated and continually is by such services. Greeting and holding messages dont need a separate branch of individuals when they can be left up to AI. Redirect numbers on phone lines can be directed by pre-recorded messages instead of a real person waiting to fill in each individual. With contact centers having evolved from landlines to involving all forms of communication including social media as a whole, theres a lot of room that can be made for automation, and everyones eager to save themselves a few bucks here and there by doing so.

Replicant is a firm that exclusively deals in contact center automation, and I love its Blade Runner-inspired name. There are a lot of fun layers there, but I digress; the firm conducted a study with marketing guru Demand Metric to conduct research, consisting of over 300 contact center leaders, on just how prevalent automation is within the contact center industry. An easier question would have been something along the lines of how prevalent is the opposite?. It does warrant mentioning that automation isnt just a desire to reduce production costs (even if I suspect that this ranks very high), but also a necessity that arises out of the need for effective customer service. The actual figures reported by this study reveal that 77% of respondents had customer care as a top priority, and 60% reported workforce concerns as also being a major concern. No one in the digital age likes to wait for long hours on telephones or message platforms. The goal is an efficient, quick call where work gets done and no ones waiting for any longer than necessary.

Read the original post:
A Study Reveals That 95% Of The Worlds Contact Centers Will Be Automated By Next Year - Digital Information World

Read More..

American Thermoform Corporation Acquires Zychem Limited – Benzinga

LA VERNE, Calif. - September 8, 2022 - (

)

Patrick N. Nunnelly, President of American Thermoform Corporation (ATC), Braillo Norway and BraillePaper.com, announced today that the acquisition of Zychem Limited was done in July of this year.

"This is an exciting time for us, as we are now adding Zychem to our family of companies that have long provided quality products and services to the blind and visually impaired community," stated Nunnelly.He added, "We have worked with Zychem for decades and have seen the impact that they have made in our industry by providing innovative solutions for producing unparalleled tactile graphics that weren't previously available - they revolutionized the industry."

Zychem was established in 1991 with the development of the revolutionary Swell Form machine (ZyFuse) and Swell Touch paper (ZyTex), which made production of on-demand tactile graphics for the blind and visually impaired possible. Since then, they have continued to develop their products, have won many awards, and are recognized as the global leader in the production of equipment and supplies used to make tactile graphics for the blind and visually impaired.

Nunnelly strongly believes that "between ATC, Braillo, BraillePaper.com and now Zychem, not only will we be able to deliver the highest quality braille and tactile graphics solutions on the market, but we will continue to expand upon them and bring new and exciting product lines to our customers."

These four companies have established themselves as innovators in their respective markets within the blind and low vision community.Since inception, their goal has been to share the benefits of braille and tactile graphics production throughout the world, while providing superior products, solutions, services and support.

We invite you to explore our product lines, and to please share any comments, questions or suggestions with us directly.

To learn more about American Thermoform, please visit:https://americanthermoform.com

To learn more about Zychem, please visit:https://zychemltd.com

To learn more about Braillo, please visithttps://Braillo.com

To learn more about BraillePaper.com, please visithttps://braillepaper.com

American Thermoform Corporation(909) 593-6711sales@americanthermoform.com

Press Release Service by

Original Source:

See the original post here:
American Thermoform Corporation Acquires Zychem Limited - Benzinga

Read More..

Changing of the guard: Q&A with edge-computing startup EDJX’s new CEO – WRAL TechWire

RALEIGH EDJX, an edge computing platform, is one of the Triangles most promising startups. But in recent months, its undergone a major shakeup. Two of its original founders, John Cowan, then its chief executive officer, and James Thomason, its former chief technology officer, left the company in March due to creative and strategic differences of opinion with its board.

Since then,EDJX (pronounced Edge-X) has replaced Cowan with Benjamin Thomas, a former general partner with DC-based Novington Capital. It has also added $3 million to its coffers led by Intersouth Partners, bringing its total raised to date to $15 million.

Global edge computing is expected to hit $17.8 billion by 2026. The word edge, in the context of computers, means literal geographic distribution. Edge computing is computing thats done at or near the source of the data, instead of relying on the centralized public cloud at one of a dozen data centers to do all the work.

WRAL TechWires Chantal Allam had the chance to catch up with Thomas to discuss the companys recent developments. Heres what he had to say:

EDJXs technological foundation is sound and cutting edge; the original vision of the founders was spot on. We have built architecture from scratch explicitly for the edge. In fact, our founding chief technology officer, Delano Seymour, who was EDJXs original chief technology officer, has remained and is doing a super job. I feel lucky to have become CEO at such a critical time in the companys growth. Our focus now is commercialization of our products and services.

Right now, were onboarding developers to join us to build and run applications in fact, more are joining each week. EDJX does not require server management or the maintenance of underlying infrastructure. Businesses can onboard to our serverless EDJX Platform to start building their apps. Were at the cusp of a growth spurt, and I am excited for the companys future.

I have a track record of identifying opportunities early in various industries, jumping in as senior leadership, and creating meaningful results. I have done this in veterinary medicine and the travel industry. Ive also made a number of other active investments in technology and financial services.

My career started as an engineer at NASA/Lockheed Martin and later as a business analyst at Accenture, so I am very comfortable in the tech domain. I have also personally managed offshore teams and built over 100 software applications. An engineer by training, I completed my bachelors in Mechanical Engineering at Tulane University and a masters in Management from Stanford University.

When I learned about EDJX and the potential to lead the next wave of computing, I made an investment and joined as CEO. I started in a consulting capacity in April, and officially joined in July. The team is terrific, passionate, experienced, and motivated. Also, taking a business from concept to reality is invigorating for me as a serial entrepreneur.

Shakeup: Raleigh edge-computing startup EDJX founders out; new CEO; $3M cash infusion

Were so fortunate to have friends, close associates and believers in our technological vision. Intersouth Partners led this round, and they have been great partners. This latest raise is recognition of the groundbreaking work were doing, EDJX is gaining market momentum and accelerating the adoption of serverless edge computing, and the need to forge ahead to power next generation architecture for the edge.

As with the launch of any new platform, it takes substantial capital to gain broad traction. Were raising funds to keep driving our positive momentum, to keep innovating, building and acquiring customers who require compute located close to where they are.

We have an unfailing belief in EDJXs technology and use cases. Were not a $1 billion company, but we believe we have the pieces in place to become that, just not within that 12-18 month time frame. Our momentum is growing, and as I mentioned we are adding new users each week.

EDJX opened its global serverless platform for developers in July. Tell us about EDJXs decision to pursue this vertical, and the Smash Your Servers! campaign.

We see Smash Your Servers as encouragement for developers to build from scratch for the edge. EDJX brings compute, storage and sensor hosting services close to the developer where they can build and run applications without the need to manage servers or maintain underlying infrastructure. EDJX services include a serverless computing environment for applications currently built with C++ or Rust. More languages will be added soon.

There are a number of serverless platforms out there, but most of them are built using centralized architecture, using traditional cloud tools designed for cozy, protected data centers. A lot of the developers of these platforms just assume centralized is the answer and its what they know. The edge is a messy place, and you have to leave the data center to discover the edge.

In the future where you have hundreds of billions of devices, compute and storage will need to move out to the edge. The sheer amount of data and processing will require hyper-local compute and storage to process the data generated. The cloud wont be able to keep up, and micro-data centers at the far edge will be necessary.

This is where EDJX comes in with our operating system. At EDJX, we believe weve solved the problem with proprietary, decentralized architecture; a self-healing mesh network that is able to live on the edge; that allows enterprises to quickly and efficiently deploy to the edge at lower cost and complexity. Also, developers can connect their sensors directly to our EdjBlocks for virtual real time signal processing, something that you cant do, or would not want to do, in a data center.

For EDJX, our involvement in the PINN initiative has provided great exposure to the possibilities of the first unified open standard to support 5G wireless, edge computing, radar, lidar, enhanced GPS, and intelligent transportation systems. PINNs deliver a multitude of advanced edge sensors and computing capabilities.

We have been in close contact with many U.S. based vendors, who see our operating system as a vital component to their offering. These manufacturers recognize our multi-tenant edge mesh network is unique and critical to making it all work at the edge. Many of these deployments are part of public funding initiatives by the U.S. Department of Transportation, and they take time to materialize. We hope to see some of these come to fruition in 2023 as these important initiatives get funded.

Cubic has been a great partner for us EDJX. Were working with Cubic on a number of initiatives.

We continue to see a great deal of flux as 5G continues to roll out. For one, our IOMT edge platform has significant implications for IoT and advanced AI solutions at the far edge of the network combining to form a transformational end-to-end IoT solution from base to battlefield, solving immediate challenges for the military and civilian first responders.

Were still working with the Autonomy Institute Alpha Lab at Camp Mabry where developers build, test, and deploy next generation Internet of Things solutions providing the blueprint for public safety, military, and civilian use cases. The work is ongoing.

EDJX is growing. At present, we have around 40 team members. Like most internet companies, our team is wherever we find the best talent. Of course, were headquartered right here in Raleigh, with several key people based here. Our chief financial officer is based in Raleigh. We also have significant investors in North Carolina. I am based in Washington D.C., an easy drive to Raleigh.

We are also proud to note that we employ people from all over the world. Were in the midst of onboarding a team of developers and expanding our employee role in this way. Were also looking to hire a developer evangelist ideally based in Research Triangle Park, and we are looking for additional sales executives at this time.

Our priority is to carefully listen to feedback from developers as we grow our base. Were also onboarding customers that have some exciting use cases, like sub 5 millisecond sensor response rate. To my knowledge, only EDJX can accomplish this.

We also plan to launch new features at upcoming conferences, including ITS World Congress, and Edge Computing World, where we will be running a hackathon with lots of cool prizes. We want to be the easy-button solution for the edge.

Link:
Changing of the guard: Q&A with edge-computing startup EDJX's new CEO - WRAL TechWire

Read More..

Vasion to bring PrinterLogic and serverless printing to GITEX Global 2022 – Intelligent CIO

PrinterLogic, a leader in serverless printing infrastructure, has announced its participation at GITEX Global 2022, to help organizations eliminate print servers with the companys next generation cloud-native print management solution, and eliminate the PrintNightmare security vulnerability.

The company is keen to meet with channel partners at the event with the intention of building local partnerships and increasing market coverage.

Simon Hill, Managing Director for EMEA and APAC at Vasion, said: Over the past couple of years, we have witnessed companies embarking on their Digital Transformation journeys and the transition to the cloud has been one of the integral parts of their digitization process.

Cloud-based solutions have made tremendous strides, driven by factors like business expansion imperatives, the remote work scenario as a result of Covid-19, Smart City projects, and governmental initiatives.

According to predictions from Gartner, global spending on cloud services is expected to reach over US$482 billion in 2022, up from US$314 billion in 2020. Against this scenario, we have seen an increased interest and uptake of the PrinterLogic solution that helps organizations move their printing infrastructure to the cloud and improve their print security.

The Middle East and Africa market is a high potential growth market for our company. With GITEX being the biggest regional technology event, it is the perfect platform for us to expose our brand and capabilities and enter into high level discussions with customers and the channel in order to gain insights that will help us tailor our offerings to the needs of the market. We are also looking to strengthen our channel ecosystem by signing new partners that share our strategic vision and can help us penetrate the market.

Channel partners have a distinct advantage working with PrinterLogic. The print management software market is worth circa US$650m worldwide and this is all driven by Managed Print Service (MPS) contracts.

However, only around 40% of print is covered by MPS. The potential of the market is closer to US$1.6bn.

As organizations move to cloud-native print management they will want a solution that manages all their printers, and this is what we do best, said Mr. Hill.

The elimination of the physical infrastructure is a critical step in an organizations Digital Transformation journey. Print servers cost a lot of money and time relating to provisioning, licensing, cooling and powering, physical security, on-going management and maintenance including upgrades, virus scans etc. PrinterLogic modernizes enterprise print management by eliminating all print servers and delivering a highly available Serverless Printing Infrastructure, thereby eliminating all these costs.

By moving from print servers to a cloud-native solution like PrinterLogic, companies significantly reduce the pains associated with deployment (no more scripting or GPOs), ongoing support (customers report 60-90% less print related IT support calls) and significantly lower resolution times. They also eliminate the security vulnerability of print servers PrintNightmare.

With the centrally managed Direct IP printing platform delivered as a SaaS application, enterprises can empower end users with mobile printing, secure release printing, and many advanced features that legacy print management applications cant provide.

PrinterLogic supports the future of work and the hybrid workplace. Customers can confidently and securely ensure their organization can deliver best in class serverless print management, wherever work happens, concludes Mr. Hill.

PrinterLogic will be exhibiting from stand number H4-62.

Facebook Twitter LinkedInEmailWhatsApp

Read more from the original source:
Vasion to bring PrinterLogic and serverless printing to GITEX Global 2022 - Intelligent CIO

Read More..