Page 2,254«..1020..2,2532,2542,2552,256..2,2602,270..»

How to fix OneDrive sync issues on Windows 11 – WindowsReport.com

Cesar has been writing for and about technology going on for 6 years when he first started writing tech articles for his university paper. Since then, his passion for technology blossomed into a prosperous...Read more

XINSTALL BY CLICKING THE DOWNLOAD FILE

Microsoft OneDrive is a cloud hosting service that sees a ton of usage. It stores every kind of file on company servers with 5 GB for free, right off the bat. The client also adds file synchronization and is available on tons of platforms, some of which dont belong to Microsoft.

Just to name a few, OneDrive is on macOS, iOS, Android, the Xbox Series X, and even the Xbox 360 from over a decade ago. Plus, Microsoft Office apps are directly integrated with OneDrive to ensure no previous work is lost. Theres nothing worse than working on a giant project only to have it deleted suddenly.

All in all, OneDrive is incredibly useful and its hard to imagine life without it and it sees frequent updates. However it may be, there are times when OneDrive will stop working for whatever reason. It may get stuck and stop connecting to Microsofts servers.

There are multiple ways to fix OneDrive connection problems with no single solution that fixes everything. You may have to try out multiple methods before you find the one that works.

Also, it may take a really long time to fix the issue. One of the methods is to reset your connection to OneDrive, and depending on how big and how many files you have, it may take several minutes to resync all the data. Fortunately, you wont have to worry about losing any sort of precious data. OneDrive saves everything before issues arrive.

This guide will show you multiple ways that you can try out to fix connection problems with OneDrive. In fact, one of the easiest things that you can do is simply close and open the OneDrive app again.

Once you perform one of these steps, go back and check your OneDrive app to see if it works.

Coincidentally, there was a recent update for OneDrive for Business, which allows users to have control over who gets access to files, plus makes it easier to people to have said access. Its a pretty good quality of life change.

On February 4, Windows 11s Media Player got a major update but is only available in the Windows Insider beta channel. The new player adds album art and artist information for music and high dynamic range playback for videos.

You also may be interested to know about the wide variety of note-taking apps on Windows 11. You may think that writing notes doesnt require a specialized app, but youd be surprised at what some of these apps can do with their advanced features. Some have features that assist creatively minded people with their projects.

Feel free to leave a comment below if you have any questions on other Windows 11 apps. Also, leave comments about guides that youd like to see or information on other Windows 11 features or list guides like this.

Thank you!

Start a conversation

Read more:
How to fix OneDrive sync issues on Windows 11 - WindowsReport.com

Read More..

What Are You Really Agreeing to in the Terms and Conditions for Google Drive and Microsoft OneDrive? – Coconuts

Although we highly value the privacy of our personal information, very few of us actually bother to read the terms and conditions or privacy agreements thoroughly when they sign up for cloud storage platforms, such as Microsoft OneDrive or Google Drive. Generally, users tend to trust that tech companies will always be morally upright and respectful of data privacy. Unfortunately, nothing could be further from the truth.

Did you know that terms and conditions often allow such platforms to view, use and sell everything you upload? The gold standard for privacy in cloud storage is zero-knowledge approach, which means that your provider doesnt store a copy of your encryption key, so the cloud storage service cant decrypt your files. However, did you know that neither Microsoft OneDrive nor Google Drive offer this?

Choose the right cloud storage ecosystem for you

Most personal and business data is now stored and accessed through offshore servers located in dedicated data centers connected over the internet. Cloud storage service providers differ in storage space, data encryption and server infrastructure. Google Drive offers the largest free plan and the cheapest paid cloud file storage, while OneDrive offers a secure folder locked by an extra level of two-factor authentication.

However, in comparison, Singapore-based Treasure Clouds technology promises that your privacy is never compromised. You might be pleasantly surprised to know that Treasure Cloud offers up to 800GB of free cloud storage space.

How your personal data is (ab)used in the small print

Googles attitude towards privacy has always raised eyebrows. Google Drives privacy policy states that it will collect the content you create, upload or receive from others when using our services and this includes emails, documents you create and comments you make on Google platforms like YouTube. Google states that it collects this data to provide better services as well as personalized ads, but it doesnt explicitly state that your sensitive data might be available to Google employees and algorithms. Also, its Google, so you just know its most likely tracking everything youre doing.

In comparison, Microsoft OneDrive is a little less intrusive. Its privacy policy states that it doesnt use what you say in email, chat, video calls or voicemail, or your documents, photos or other personal files to target ads to you no doubt to give users a false impression that they have some autonomy over their data. Nonetheless, its lack of zero-knowledge encryption means that Microsoft engineers can access your files whenever they want to.

By default, when signing into Windows with a Microsoft account, Windows has the ability to sync your settings and data with Microsoft servers containing information like your web browser history, favorites and sites you may have opened, along with saved app, website, mobile hotspot and Wi-Fi network names and passwords. However, users can deactivate this transfer to the Microsoft servers by changing their settings.

Microsofts updated terms also state that we collect basic information from you and your devices, including for example app use data for apps that run on Windows and data about the networks you connect to. It would thus seem that Microsoft is basically granting itself the right to collect all the data from your devices and then share it, as necessary.

Microsofts updated privacy policy not only trespasses personal privacy, but can also affect your right to free speech, as the company states: We will access, disclose and preserve personal data, including content of your emails, other private communications or files in private folders, when we have a good faith belief that doing so is necessary to, protect our customers or enforce the terms governing the use of the services. What does that even mean if it doesnt scream data manipulation? So much for transparency.

Your privacy is precious and so are your files

Real transparency starts with straightforward terms and policies that people can clearly understand, so that you and I know whats going on with our data. In a world where data is often used without meaningful consent, platforms like Treasure Cloud give control back to users. Treasure Cloud is designed specifically with such privacy invasion issues in mind. Treasure Cloud promises user privacy upfront and actually works to protect users from data manipulation, as it works seamlessly with other storage platforms you may already be using, as opposed to services like Google Drive and OneDrive that have been known to upload and use your scanned data for their own purposes.

Treasure Cloud offers client-side encryption for all files saved on its platform, so unlike other cloud storage providers, Treasure Cloud cant actually view or even open the data that you store on its platform. You are literally the only person who has access to your data, which might include sensitive recovery passwords.

There is no denying the fact that you have very little (if any) control over what such cloud storage companies can do with your data. With a provider like Treasure Cloud, you can rest assured that your data is completely secure and kept private, thanks to their zero-knowledge cloud storage and complete data encryption. Any data transferred from your existing accounts to your Treasure Cloud server becomes encrypted as well.

And theres more! Earn great incentives on Treasure Clouds referral program, such as an additional 10 GB of storage on top of your existing plan for every person who signs up when you refer friends to sign up for a storage plan too! Click here for more information on the referral program.

Sounds too good to be true? Learn more about internet security and their services on Treasure Clouds website or their blog.

Originally posted here:
What Are You Really Agreeing to in the Terms and Conditions for Google Drive and Microsoft OneDrive? - Coconuts

Read More..

Connected Car Market to Show Strong Growth & Demand 2022-2031| TMR Study Business – Inter Press Service

Connected Car Market: Introduction

According to the report, the globalconnected car marketsurpassedUS$ 24.07 Bnin 2020, expanding at a CAGR of22.7%during the forecast period. Connected cars utilizes Internet services such as WLAN (Wireless Local Area Network), 4G, LTE, and 5G for creating connection with the local and cloud servers and for connecting with other vehicles. The connected cars use advanced technologies for recording the vehicle and user behavior and to recommend particular actions in the future.

Increasing production and sales of the IC engine and electric and hybrid vehicles across the globe, led by several rising demand for cars, vehicle emission laws, government incentive, and environment problems, which is expected to propel the growth of the connected car market. There is rising disposable income of consumer, which enhances their purchasing power that further leads to surge in vehicle sales. Moreover, the cars sold in the developed regions are equipped with advanced features, which has improved safety and security solutions that also leads to growth in the market. Furthermore, the adoption of luxury and premium cars in most of the countries is anticipated to boost the market growth during forecast period.

Due to the onset of COVID-19 pandemic, production and sales of the vehicles has hampered, as all the manufacturing units and sales showrooms were closed. Due to lockdowns, public was restricted from traveling, which further restrain the growth of the connected cars market. The supply chain and transportation channels where disrupted that decrease supply of raw material for vehicles production.

Get PDF Brochure for More Insights https://www.transparencymarketresearch.com/sample/sample.php?flag=B&rep_id=1617

Expansion of Connected Car Market

Rising government regulation and mandate to integrated advanced solutions in the cars, to improve the safety of the consumers and reduce road accidents. Countries like the U.S., Germany, the U.K. France, Italy, Spain, and other countries has adopted the use of autonomous and advanced technology such as artificial intelligence (AI), machine learning (ML), IoT, and other in the vehicles, as it provides real-time data from the vehicle and surveillance and monitoring feature for the government.

Moreover, connected cars has embedded dashboard camera, GPS tracking, SOS services and telematics based insurance, which records and stores the data, which is further prone to cyber-attacks. Since, rising government mandates for data security, the service providers or manufacturers provides multi-layer security for vehicle data protection, which is further expected to boost the growth of the connected car market.

Based on car type, sedan and SUV car type segment held a prominent share of the connected car market, in terms of revenue, in 2020. The consumers in the developed countries utilizes sedan and SUV cars, as these cars has more safety and security features as compared to hatchback cars. Moreover, hatchback cars are designed for high traffic regions, whereas, the traffic in the North America and European countries is very less as compared to other developing region, which is another factor for the adoption of sedan and SUV cars.

In terms of connectivity, the dedicated short range communication (DSRC) segment held a highest share of the connected car market, in terms of revenue, in 2020. The dedicated short range communication is considered as wireless communication which helps the intelligent transportation system (ITS) for creating connection with other vehicles and cloud services for tracking and surveillance purpose. Moreover, wireless connectivity is expected to witness fastest growth in the future.

Buy an Exclusive Research Report at https://www.transparencymarketresearch.com/checkout.php?rep_id=1617&ltype=S

Regional Analysis of Global Connected Car Market

In terms of region, the global connected car market has been segmented into North America, Europe, Asia Pacific, Middle East & Africa, and Latin America. Europe and North America has major share in the global connected car market in terms of revenue in 2020. In such developed regions, consumers are more tend towards technological features in their cars and as they opt for more safety and security functions. Moreover, most of cities in the Europe and North America are smart cities and hence, they have better connectivity on the highways and other parts, which make connected cars to work with high efficiency and performance. In addition, due to rising government mandates and support for integrating technology with automotive industry, the manufacturers are focusing to develop advanced and more autonomous cars, which will further propel the growth of the connected car market.

Global Connected Car Market Players

Prominent players operating in the global connected car market include Qualcomm Technologies, Inc., Robert Bosch GmbH, Continental AG, Airbiquity Inc., CloudMade, Daimler AG, Intellias Ltd., Sierra Wireless, Tesla, LUXOFT, Ford Motor Company, Audi AG, BMW Group, TomTom International, AT&T Inc., etc.

Explore Latest Reports by TMR: https://www.prnewswire.com/news-releases/growing-concerns-around-global-warming-are-set-to-drive-hypercar-market-forward-tmr-301156790.html

About Us

Transparency Market Research is a global market intelligence company, providing global business information reports and services. Our exclusive blend of quantitative forecasting and trends analysis provides forward-looking insight for thousands of decision makers. Our experienced team of Analysts, Researchers, and Consultants, use proprietary data sources and various tools and techniques to gather, and analyze information.

Our data repository is continuously updated and revised by a team of research experts, so that it always reflects the latest trends and information. With a broad research and analysis capability, Transparency Market Research employs rigorous primary and secondary research techniques in developing distinctive data sets and research material for business reports.

Contact

90 State Street, Suite 700

Albany, NY 12207

Tel: +1-518-618-1030

USA Canada Toll Free: 866-552-3453

Email:sales@transparencymarketresearch.com

Website:https://www.transparencymarketresearch.com

Go here to see the original:
Connected Car Market to Show Strong Growth & Demand 2022-2031| TMR Study Business - Inter Press Service

Read More..

CISA and SAP warn about major vulnerability – The Record by Recorded Future

German enterprise software maker SAP and the US Cybersecurity and Infrastructure Security Agency have issued security advisories on Tuesday to warn SAP customers to install the companys February security patches as soon as possible in order to prevent the exploitation of a major vulnerability in a ubiquitous SAP component.

Tracked asCVE-2022-22536, the vulnerability was discovered by cloud security firm Onapsis and impacts the SAP Internet Communication Manager (ICM).

The main purpose of this component is to provide a working HTTPS web server for all SAP products that need to be connected to the internet or talk to each other via HTTP/S, meaning that if a vulnerability is present in its code, entire SAP products are exposed to attacks 24/7.

In areportpublished yesterday, Onapsis said that CVE-2022-22536 is one of those dangerous bugs, allowing attackers to use malformed packets that trick SAP servers into exposing sensitive data without the attacker needing to authenticate.

The attack, known as HTTP request smuggling, could be used to steal credentials and session information from unpatched SAP servers, even if servers are placed behind proxies, Onapsis said.

What makes these vulnerabilities particularly critical for SAP customers is the fact that the issues are present by default in the ICM component, researchers explained.

A simple HTTP request, indistinguishable from any other valid message and without any kind of authentication, is enough for a successful exploitation.

SAP patched the issueyesterday. CVE-2022-22536 is one of eight vulnerabilities that received a severity rating of 10/10 but is the one that CISA chose to highlight in its ownsecurity advisory, primarily due to its ease of exploitation and its ubiquity in SAP products.

According to SAP, known affected products include SAP WebDispatcher, SAP Content Server, SAP ABAP, and SAP NetWeaverone of SAPs most popular offerings.

According to aShodan search, there are more than 5,000 SAP NetWeaver servers currently connected to the internet and exposed to attacks, lest a patch is installed.

Since the ICM component may be active in other SAP product setups, Onapsis has also released aPython scriptso SAP customers can test their setups and see if they are vulnerable to attacks.

In ablog postyesterday, SAP Director of Security Response Vic Chung confirmed the severity of Onapsis findings and asked customers to apply the patches as soon as possible.

CISA warned that customers who fail to do so will be exposing themselves to ransomware attacks, the theft of sensitive data, financial fraud, and disruption or halt of business operations.

Catalin Cimpanu is a cybersecurity reporter for The Record. He previously worked at ZDNet and Bleeping Computer, where he became a well-known name in the industry for his constant scoops on new vulnerabilities, cyberattacks, and law enforcement actions against hackers.

Read more:
CISA and SAP warn about major vulnerability - The Record by Recorded Future

Read More..

Why Security in Kubernetes Isn’t the Same as in Linux: Part 2 – marketscreener.com

Security for Kubernetes might not be quite the same as what you're used to. In our previous article, we covered why security is so important in both Linux on-premises servers and cloud Kubernetes clusters. We also talked about 3 major aspects of Linux server security - processes, network, and file system - and how they correspond to Kubernetes. So today, we'll talk more about the security concerns unique to Kubernetes.

When trying to secure your infrastructure, you have to start by configuring it well. For example, this might mean disabling all unused features or using allow-policies wherever you can to keep your files, executables, or network available only to the intended entity. Both Linux servers and Kubernetes clusters have known vulnerabilities and recommendations.

One of the famous among these is the Center for Internet Security (CIS) recommendations, which are often used for compliance for insurance. Having a cloud security platform that can help implement these recommendations can be a major boon to your security.

The Kubernetes API server is the admin panel, so to speak, of your cluster. In most deployments, this HTTP server is exposed to the internet. This means that a hacker that finds their way to the API server can have full control over your cluster.

Using the most strict authentication and authorization settings is highly recommended to prevent this. If you can set your cluster to private, with access only allowed from an internal network, you can sleep well at night. And just as with with configurations, you should be aware at all times of who (and what) can have access to which resources and operations in your cluster.

In Kubernetes, there are additional attack vectors using the Kubernetes control plane itself that don't exist in Linux server security. For example, an attack could call the Kubernetes API to load a new pod you didn't want.

Kubernetes and cloud providers invest a lot of effort in preventing unauthorized users and machines from doing this. But there is always a chance that one of your employees gets hacked or a badly configured service account has too much power. Kubernetes logs all requests to its audit log so they can be investigated later in case of a breach. Additional logs include the kube-API log or etcd (resources DB) log.

Container runtime is also a unique aspect of Kubernetes security. In Kubernetes, each node is actually a virtual Linux server running a container runtime daemon. A container runtime is responsible for managing the images and running and monitoring the containers, their storage and network provisioning, and more. You might be familiar with Docker as a container runtime. In reality, Docker is a company developing multiple container tools, and their container runtime is named containerd. Other container runtimes for Kubernetes include CRI-O, Rocket, and more.

Apart from a whole Linux server or virtual machine that uses its own single operating system, multiple containers are usually running over multiple operating systems that share the same host kernel. Although the operating systems of the containers are minimal, they may still have security holes. And the more holes the merrier for the attacker! Monitoring the container runtime activity can also yield a lot of information about what is going on in the node - what processes are running inside the container, any internal communication that might escape from network monitoring, the data being collected and created, and so on.

The unique interfaces and engines of Kubernetes can be an additional exposed surface in terms of security, especially when considering the complexity of the system. However, don't forget that distribution and containerization add to security and help isolate potential malware.

Kubernetes may come with a few new risks to watch out for, but that's no reason to be scared off. As long as you know what to look for, security for your Kubernetes clusters doesn't have to be any harder than it was for your Linux servers. And there's no need to go it alone - not when you can have handy tools like InsightCloudSec, Rapid7's cloud-native security platform, at your side.

Additional reading

Get the latest stories, expertise, and news about security today.

Originally posted here:
Why Security in Kubernetes Isn't the Same as in Linux: Part 2 - marketscreener.com

Read More..

Arm CPUs To Take A Bite Out Of The HPC Market – The Next Platform

Arm-based servers have had a somewhat checkered history that has seen many abortive attempts to challenge the X86 processor hegemony, but the firm appears bullish about its chances in the high performance computing (HPC) sector, where it believes its licensing model and the energy efficiency of its architecture give it an edge.

Speaking at anHPC community event hosted by Dell, Arms senior director for the HPC business, Brent Gorda, said that the company is really driving hard in the HPC community and highlighted its partnership with companies such as Nvidia, Silicon Pearl, and Fujitsu to develop Arm-based silicon to drive HPC and AI applications.

In fact, Gorda pointed out that Arm has already secured a place in the HPC industry, right at the top with the Fugaku supercomputerat RIKEN Laboratory in Japan that has been ranked as the fastest in the world with its 152,064 48-core Fujitsu A64FX processors.

However, Fujitsu followed the path of acquiring an architecture license from Arm, which meant that it was able to design and manufacture its own custom Arm-compatible processor pretty much to suit its own requirements. This meant the addition of 512-bit Scalable Vector Engine units to support the kind of calculations Fujitsu had in mind, plus its own Tofu D high-speed interconnect.

But few HPC sites can design their own chip from scratch. Fortunately, Arms business model also lets partners take a ready-made core design and add custom modules to it, Gorda explained.

Theres something called a core license whereby you can license Arm Neoverse, which is our IP. And that gives you the core building blocks, the logic itself, around which you customize and build the chip that you want to build, he said.

Surrounding all this is the Arm ServerReady compliance program, which certifies that a specific chip meets compatibility requirements for the Arm server ecosystem.

Once you pass this certification, the software world is available to you. It guarantees functionality for the software, and you can then pay for supported OS releases like Red Hat.

This ability to customize the chip for a specific application or set of applications is where Arm has an advantage, Gorda claimed, especially with where HPC and AI appears to be heading. Customers can take the Arm core engine plus the on-chip network, and add custom accelerators for their target workload.

Bill Dally from Nvidia will say you can get three orders of magnitude performance improvement by putting custom gates down on your silicon chip. That plays exactly to where Arm is going, he said. Everybodys got an idea for an accelerator. And if you know your workload well enough, you can optimize that and just get crazy good performance. And in fact, thats the reason why the A64FX is so good. They took ten years, they studied the ten or twelve applications that they had, and they nailed it. The processor came out and it just completely nailed the applications that the Japanese wanted on their system.

Arm launched its Neoverse effort back in 2018 to target datacenter infrastructure rather than the mobile device market. The Neoverse designs were expanded last year and now comprises three families of processor designs: the V series, which emphasizes performance; the N series, which is focused on scale-out applications such as cloud infrastructure; and the E series, which is targeted more at edge applications.

Silicon Pearl, the company involved with the European Processor Initiative (EPI) project is using the Neoverse V1 design, Gorda disclosed. Meanwhile, the N1 design has been used in the Quicksilver and Mystique Altra server chips from Ampere Computing, the startup founded by former Intel executive Rene James. Amazons Graviton2 chip that powers some AWS EC2 instances uses the N1 core, and the Graviton3 uses the V1 core. Neoverse V series cores also apparently feature inNvidias planned Grace chipaimed at supercomputing, and in a server chip being developed by South Koreas Electronics and Telecommunications Institute (ETRI).

One of the issues that has hindered Arm in the server market is software support, with many key software packages developed for X86 processor platforms. When asked if all the pieces are now in place to deploy HPC on Arm, Gorda said that in general, the answer is yes.

The place where you will find some softness is that, while I believe its accurate to say all of the ISVs have an Arm port in progress, not all of the ISVs are publicly supporting Arm in silicon just yet. So if youre dependent on ISV licenses and software, you will have to poll your ISV to understand the status of things, he explained.

However, Gorda cited the example of the Lustre parallel file system, widely used in HPC environments. There has been Arm support for the Lustre client for many years, but there are very few Arm-based storage servers, Gorda says, and so Lustre server components for Arm are not currently supported by Whamcloud, the division within DDN that oversees Lustre development. This is something Arm is trying to address, he added.

Gorda also pointed out that Arm acquired Allinea Software, a leading provider of software tools for HPC, about five years ago, in order to bolster Arms HPC software ecosystem support.

Another factor in Arms favor is greater power efficiency, according to Gorda. This is something that may become more important as supercomputers expand into exascale territory and ongoing energy costs become a greater concern for HPC operators. Although Arms Neoverse V architecture emphasizes performance rather than power efficiency, the chips based on it still consume less energy than rival X86 processors, according to Gorda.

The X86 guarantee is that you can run a 286 binary on it, and all of that historical legacy of being a CISC architecture with a RISC underlying it calls for a whole lot of logic up front in decode reordering, fixing up instructions, all of that is overhead that goes into the chip and consumes energy, he said. In contrast, you can think of Arm as a clean sheet of paper, to some extent.

Gorda also claimed that end users no longer care what silicon their software is running on, citing the adoption of Arm-powered cloud servers by the likes of AWS.

Theres new big players in town that get to control the architecture. And the things they care about are different than what historically has been cared about. They care about the cost, they care about the energy consumption, they care about turnaround time, and the software stack running on top of things, he said.

If you take a look at what Amazons doing with the Graviton2, they talk about it being 40 per cent cheaper. From an end users perspective, they dont care what the silicon is, they care that its 40 per cent cheaper, and that the turnaround time is on par with what theyre used to.

Earl Joseph, CEO of HPC analyst firmHyperion Research, said that he expects to see high growth of HPC servers based on Arm processors over the next several years.

We expect that to see a five year growth rate of over 31 percent, while the base market moves at around 7 percent to 8 percent, Joseph said. That would equate to Arm-based systems accounting for about 10 percent of the HPC market by 2025, he added.

However, Joseph also cautioned that the revenue numbers can be misleading, as massive supercomputer projects can skew the figures, as the close to $1 billion Fugaku system did in 2020.

The market can thus shift dramatically due to such large individual installations, and Hyperion Research said it anticipates two European exascale machines based on Arm processors in 2025.

Many forthcoming HPC systems are expected to feature a mix of processors, Arm and X86 as well as other processor types, he added.

Read more here:
Arm CPUs To Take A Bite Out Of The HPC Market - The Next Platform

Read More..

Rug pulls, spoofing and wash trading: The crypto industry is trying to clean up its act – Protocol

Good morning, and welcome to Protocol Fintech. This Tuesday: crypto aims to self-regulate, Jamie Dimon throws shade, and Tezos teams up with Manchester United.

I dont get Jamie Dimon: The crypto-skeptic schtick (see todays Overheard) was cute a couple of years ago, maybe, but it seems increasingly bizarre that JPMorgan Chase is releasing JPM Coin while its CEO badmouths bitcoin. Wealth managers are giving customers access to crypto funds which Dimon is telling them are worthless. Even if you agree with Dimon, the hypocrisy here is a problem. At some point, something has to give: Either Dimons not really running the company and the board should notice that fact, or JPMorgan Chase doesnt believe in the products its selling. Or maybe all of the above.

Owen Thomas (email | twitter)

The crypto industry has wrestled with the reputation that it operates in a world of shady players. Now it wants the world to know that its going after the bad guys. Cryptos biggest players, including Coinbase, Circle and Anchorage Digital, just launched the Crypto Market Integrity Coalition, which is taking aim at manipulation and abuse.

The timing makes sense, given the drumbeat of news about hacks and scams, but its also bound to raise eyebrows.

Its an about-face on the idea that crypto facilitates crime. For years, crypto companies have downplayed the prevalence of criminal activity on the blockchain even when careful analysis showed billions of dollars in illicit transactions.

Crypto wants to show that it can clean up its own act. If this is going to be mainstream, the sector needs credibility, especially given the popular perception that there is a fair amount of fraud and shadiness going on, Stanford Graduate School of Business lecturer Rob Siegel told Protocol.

This is the thing you do when you see regulation coming around the corner, Alex Johnson, fintech research director at Cornerstone Advisors, told Protocol. Its a very common lobbying move, he said. You try to forestall or soften that regulation by voluntarily pledging to hold yourself to certain standards.

Ben Pimentel (email | twitter)

In the wake of the pandemic, 40% of banks have planned or launched their digital transformation strategy this year. But where to start? Here are 7 steps for financial institutions to begin or accelerate digital transformation.

Learn more

On Protocol: Google Cloud added a new security layer to combat crypto-mining attacks. After noting that cryptojacking has been on the rise for the past few years, the tech giant added a security protocol to detect takeovers of cloud servers by miners in an effort to protect customers.

DriveWealth, a brokerage startup backed by SoftBank, is getting into crypto trading. The company, valued at $2.85 billion, acquired Crypto-Systems, which will allow bitcoin and ether trading for the firms partners.

A Canadian group protesting COVID-19 mandates managed to bypass fundraising restrictions through bitcoin. After GoFundMe froze about $10 million Canadian dollars (about $7.8 million) in donations due to what the fundraising service said were violations of its terms of service, the group started accepting donations in bitcoin, raising about 8.8 BTC.

Cash App is now running on Lightning. Users can send bitcoin payments instantly and for free to anywhere that accepts Lightning. But there are some odd limitations: New York state residents cant use it, Cash App said on Twitter, and users cant receive Lightning payments.

Jamie Dimon still doesnt believe in bitcoin, and continues to throw shade. I dont call them cryptocurrencies, I call them crypto-tokens, because currencies have rules of law behind them, central banks and tax authorities, the JPMorgan Chase CEO said in an interview.

The FDIC is making crypto regulation one of its top five priorities. It is imperative that the federal banking agencies carefully consider the risks posed by these products and determine the extent to which banking organizations can safely engage in crypto-asset-related activities, acting Chairman Martin J. Gruenberg said in a press release.

The NFT market could face a wave of litigation, Jeff Gluck, CEO of CXIP Labs, told Cointelegraph: There are dozens of artists preparing lawsuits against OpenSea for selling infringing NFTs.

The rapid digitization of finance is creating both unprecedented challenges and opportunities for financial services firms. In this whitepaper, we go deep on common digital transformation pitfalls for financial institutions to avoid on the path to creating experiences that customers love.

Learn more

FTX acquired Liquid Group, a digital payments company. The crypto exchange giant will enter the Japanese market through Liquid Groups subsidiary, Quoine Corp., which was among the first crypto exchanges to register with the Japanese Financial Services Agency.

Tezos signed a deal with Manchester United for $27 million. The English football club will have Tezos logo on its training kits and shoot promotional videos for the crypto company.

Baby Doge signed a deal with another soccer team, TSG Hoffenheim. The memecoin has become an official partner of the German professional football club. NFTs are in the cards.

Qredo raised $80 million. The digital asset management firms series A round was led by 10T Goldings, bringing the firms valuation to $460 million.

Cart.com raised $240 million. The ecommerce companys latest funding round was led by Legacy Knight Capital Partners. Cart.com also acquired FB Flurry, a fulfillment and customer-care company, its ninth acquisition since its founding in 2020.

Vivid Money, a bank with a super app, raised $114 million. The challenger banks latest funding round was led by Greenoaks Capital, with participation from Ribbit Capital and SoftBank Vision Fund 2.

Polygon raised $450 million. The maker of technology for scaling Ethereum had Sequoia Capital India lead the round, with investments from SoftBank Vision Fund 2, Galaxy Digital and Tiger Global.

Fiserv acquired Finxact, a cloud technology and banking solutions company. The payments and financial services infrastructure company was an early investor, and will acquire the remaining stake for $650 million to accelerate its digital banking strategy.

Thanks for reading see you tomorrow!

Visit link:
Rug pulls, spoofing and wash trading: The crypto industry is trying to clean up its act - Protocol

Read More..

How to Use pCloud in 2022 [Easy Step-by-Step Instructions] – Cloudwards

pCloud is one of the most popular cloud storage services on the market. Its a reputable, secure, speedy and well-designed service, so its not surprising that its a magnet for cloud storage newbies. If youre one of them and want to give pCloud a whirl, this guide will show you how to use pCloud and get it up and running.

Lucky for you, pCloud is exceedingly simple to use, so youll have an easy enough time with getting it set up. It has quite a few advanced features which you can read about in our pCloud review but theyre intuitively integrated into pClouds applications. Even better, you can try it with a free account. Read on to learn more about how to set up pCloud.

Like all other cloud services, pCloud lets you upload files to the cloud for remote access. It works by taking your files, encrypting them and sending them to remote cloud servers.

pClouds user interface is very intuitive and easy to use. Everything you need is clearly labeled and easily found in the interface.

You can access pCloud via its website. Once you have an account, you can access your files via the desktop app or the web interface.

pCloud is one of the better-designed cloud services out there, in terms of both appearance and ease of use. The user experience should be smooth for anyone, as uploading files is as simple as dragging and dropping them to your pCloud drive or the website.

Coming up, well be covering how to set up pCloud on your computer and go over its various features. Well go over topics like uploading files and sharing them, setting up file syncing, setting up a backup and using pClouds Transfer feature.

The main purpose of pCloud, like any other cloud storage, is to store your files securely so that you can access them remotely and share them with others. However, pCloud has a few more tricks up its sleeve that make it stand out from the crowd.

Take the way pCloud handles file syncing. It attaches a virtual drive to your computers storage, which looks just like the other drives like Local Disk (C:). This virtual drive or network drive uses your pCloud storage to store files, essentially expanding your hard drives storage capacity. The downside is that you need to be online at all times to access this virtual drive, but, really, when are you not online?

pCloud also features the most capable media player weve seen in a cloud storage service. It allows you to create playlists and can automatically sort by artist, album or folder. Its video player is also pretty advanced, giving you the ability to adjust the playback speed and even download a converted version of the video file in a different file format.

Now lets talk security. This is one of pClouds strengths, yet its probably the area where pCloud could stand to improve the most. It offers zero-knowledge encryption, which is a security measure that prevents anyone but you from accessing your files (not even pCloud can see their contents).

Unfortunately, you have to pay extra for this kind of encryption, which takes the form of an add-on called pCloud Crypto. The service creates a Crypto folder where all files are covered by zero-knowledge protection. Thankfully, its privacy policy is clean, and it allows you to store files on European pCloud servers. This ensures youre covered by strong privacy laws, like the GDPR.

See the original post here:
How to Use pCloud in 2022 [Easy Step-by-Step Instructions] - Cloudwards

Read More..

Cloud computing just hit another huge milestone – ZDNet

Businesses globally spent $53.5 billion on cloud infrastructure in the fourth quarter of 2021, hitting the milestone for the first time and bringing full-year spending to $191.7 billion, or nearly $50 billion more than in 2020.

As usual, the big three dominated cloud infrastructure spending, accounting for 61% of the $53.5 billion in Q4 2021, according to analyst Canalys.

Managing the Multicloud

It's easier than ever for enterprises to take a multicloud approach, as AWS, Azure, and Google Cloud Platform all share customers. Here's a look at the issues, vendors and tools involved in the management of multiple clouds.

Read More

Amazon Web Services had a 33% share, followed by Microsoft Azure's 22%, and Google Cloud's 9%. Other cloud providers took 36%.

SEE: Cloud computing is the key to business success. But unlocking its benefits is hard work

Growth followed the standard order, too: though still a loss-making part of Alphabet, Google Cloud revenues grew fastest at 63% year on year, followed by Azure's 46%, and AWS's 40%. Signaling the industry's maturity, cloud infrastructure spending year-on-year growth has slowed from 2018 levels of around 50% to this quarter's 34%.

Canalys' cloud infrastructure spending update follows Amazon's Q4 2021 earnings report on Thursday. While Amazon missed analyst estimates, its giant AWS subsidiary's revenues grew 40% year on year to $17.78 billion, leaving it with a $71 billion revenue run rate.

Alphabet this week reported Q4 2021 Google Cloud revenue grew 45% year over year, but it's still working to trim back its quarterly operating losses that historically have exceeded $1 billion. This quarter the loss was $890 million, down from the huge $1.24 billion loss in Q4 2020.

Microsoft last month boasted that growth in "the number of larger, long-term Azure contracts" powered its cloud growth of 46% in fiscal Q2 2022.

Canalys sees the so-called metaverse and related augmented and virtual reality technologies driving cloud services spending and infrastructure deployment over the next decade.

While the metaverse is still being hashed out, Canalys sees use cases for the burgeoning virtual world in gaming, social media, workplace collaboration, education, real estate, ecommerce and digital commerce. Whatever it will become, it's all good news for cloud providers.

"Compute will be in high demand in virtual and augmented reality environments, while storage, machine learning, IoT and data analytics will be essential to support operations such as digital twinning, modeling and interactivity in the metaverse," said Canalys research analyst, Blake Murray.

Read more here:
Cloud computing just hit another huge milestone - ZDNet

Read More..

Google One VPN Arrives on iPhone, But Wheres the Windows App? – Review Geek

Sorry for making you see this meme. Prostock-Studio/Shutterstock.com

Back in 2020, Google launched a free VPN service for all Google One customers on a 2TB+ cloud storage plan. Its a killer bonus, especially if you (like me) sprang for a top-shelf Google One membership after Google Photos killed its free unlimited storage offering. Now, the Google One VPN works on iPhone but what about Windows?

Offering a free VPN that only works on mobile devices (and Chromebooks) defeats the purpose of giving away a free VPN in the first place. Why would I use Google One VPN on my phone when I have no option but to pay for Tunnelbear, ExpressVPN, or another great VPN service that supports PCs?

Well, if you happen to own a Chromebook, an iPhone, and a 2TB Google One plan, then I guess youre in luck. Although I have a feeling that most people paying for that much Google One storage own an Android smartphone and Windows device.

On the bright side, the Android version of Google One VPN has some new features. A new safe disconnect setting shuts off internet access if you suddenly disconnect from the VPN service, which will prevent websites from seeing your real IP address or location. Additionally, Android users can now program select apps to bypass the VPN.

Huh, so you still cant spoof your location to look like youre in another country with Google One VPN. Thats a shame, I heard the European Netflix has some cool stuff.

Source: Google

Follow this link:
Google One VPN Arrives on iPhone, But Wheres the Windows App? - Review Geek

Read More..