Page 3,862«..1020..3,8613,8623,8633,864..3,8703,880..»

This may be the last piece I write: prominent Xi critic has internet cut after house arrest – The Guardian

The Chinese professor Xu Zhangrun, who published a rare public critique of President Xi Jinping over Chinas coronavirus crisis, was placed under house arrest for days, barred from social media and is now cut off from the internet, his friends have told the Guardian.

Xus passionate attack on the governments system of controls and censorship, Viral Alarm: When Fury Overcomes Fear, was published this month a rare, bold expression of dissent from the liberal camp under Xis rule.

A friend of Xus who spoke on Sunday on the condition of anonymity to avoid reprisals said police placed Xu under house arrest soon after he returned to Beijing from his lunar new year break at his home town in Anhui province.

They confined him at home under the pretext that he had to be quarantined after the trip, the friend said. He was in fact under de facto house arrest and his movements were restricted.

During those days, at least two people stood guard in front of his house around the clock and a car with a signal box was parked in front of his residence. Security agents also went into his house to issue warnings to him, the friend said.

Those restrictions were lifted late last week, but his internet connection has been cut off since Friday, the friend added.

He tried to get it mended but found out that his IP [internet protocol address] has been blocked. He lives on the outskirts of Beijing and is far away from shops and other services. Under the current [coronavirus] situation, things are very difficult for him.

Friends say that since publication, Xus account has been suspended on WeChat, a Chinese messaging app, and many have been unable to get in touch with him for days. His name has been scrubbed from Weibo, a Twitter-like microblog, with only articles from official websites several years ago showing up on the countrys biggest search engine, Baidu. Calls to his mobile phone went unanswered on Sunday.

Phone calls to the Ministry of Public Security also went unanswered on Sunday. The staff member who answered the phone at Changping branch of Beijing Public Security Bureau said she had no knowledge of Xu.

Another friend who also spoke on the condition of anonymity had managed to correspond with him through text messages but said his situation was worrying. I fear he might be under surveillance, said this friend. He has not directly responded (to my queries) but just told me not to worry.

When Xu published his essay, he warned that he was likely to be punished. He said he had already been suspended from teaching and had freedoms curtailed over critiques published nearly a year earlier.

I can now all too easily predict that I will be subjected to new punishments; indeed, this may well even be the last piece I write, he wrote at the end of his latest essay.

Xus criticism of the countrys leadership came shortly before a widespread debate on freedom of speech convulsed the country. The death on 7 February of whistleblowing doctor Li Wenliang, who had tried to warn colleagues about the virus but was reprimanded and silenced by security forces, triggered an outpouring of grief and anger and an unusual public discussion about censorship.

Lis death has thoroughly exposed the ills of the partys governance and control; this has a huge impact on peoples minds, said Hong Zhenkuai, an independent historian who is currently working outside China, as a visiting scholar at Tokyo University.

The mechanisms that normally constrain Chinese journalists have also eased slightly, with some of the most powerful stories about life in quarantined Wuhan and the latest news about the evolution of the outbreak coming from mainland newsrooms like that of magazine Caixin.

But public anger over censorship, and the particular circumstances of a national emergency, should not be mistaken for any fundamental change within the Chinese Communist party, which has been honing its ability to control the national conversation for decades, activists and intellectuals say.

In a further reminder of the governments strict controls, two citizen journalists who were reporting from the epicentre of Chinas coronavirus outbreak have vanished this week, apparently detained.

The Chinese military surgeon who exposed the governments cover-up of the Sars outbreak in 2002-2003 has been under de facto house arrest since last year, the Guardian revealed this month. Detention came after he wrote to the top leadership asking for a reassessment of the 1989 Tiananmen Square pro-democracy movement.

There is no space for speech freedom in China now, said Hong. The impacts on the individuals are multi-faceted. Economically, they would cut off your livelihood [academics get fired, writers cant publish and no one dares hire you]. You would get sidelined by mainstream society, youd lose friends and, worse than that, you might lose your personal freedoms, so a number of intellectual elites have chosen to leave China.

Since he took power in late 2012, Xi has tightened ideological control and suppressed civil freedoms across the nation, reversing a trend under his predecessor to give Chinese media some limited scope to expose and report regional corruption and lower-level officials misdeeds.

Even within the Communist party, cadres are threatened with disciplinary action for expressing opinions that differ from the leadership.

Under Xis crackdown on speech and academic freedoms, a number of prominent liberal intellectuals, journalists, rights lawyers and NGO workers have either been silenced, jailed or escaped abroad.

The rest is here:
This may be the last piece I write: prominent Xi critic has internet cut after house arrest - The Guardian

Read More..

An Alternative to Windows 7 – Budapest Business Journal

Balzs Barabs

Sunday, February 16, 2020, 00:04

On January 14, Microsoft ended support for Windows 7, one of the most widely adopted operating systems for desktop computers and notebooks. Many home users and enterprises stuck with Windows 7 despite a very intensive pro-Windows 10 campaign by Microsoft in 2015, when it launched the new operating system.

According to web analytics companies, the market share in December 2019 was roughly 50% for Windows 10, 30% for Windows 7, and the remaining 20% split between Mac OS X, Windows 8 and Linux. There are no specific figures for Hungary, but about one-third of world PC users must now take a decision on whether to keep using Windows 7, and face security risks, or migrate to Windows 10. Or perhaps, explore other options.

Probably not that many are familiar with the name of Mark Shuttleworth; more may be aware of his accomplishments. In the mid-1990s he founded Thawte Consulting. The company, specialized in digital certificates and internet security, was later acquired by VeriSign, earning Shuttleworth a substantial amount of money. From 2004, Shuttleworth invested in developing Ubuntu Linux.

For a long time, the public perception of Linux software has been that is only something IT professionals are able to use, requiring a lot of additional coding and fine-tuning. While this is true for a specific part of the Linux ecosystem, there are many projects designed to bring Linux as close as possible to everyday users. Ubuntu is one of them. So what are the pros and cons of considering Ubuntu Linux as a replacement for Windows 7.

While not openly admitting as such, Ubuntu developers were probably aware that the only way to bring down barriers to new users is through a graphic interface similar to Windows. Looking at the latest LTS version (more about that later), the menu system and icons are very similar to the Windows interface, making the transition easy from the Windows ecosystem.

Again, pretty much the same as for any Windows version, no system administrator-level knowledge required. The system is available for free download from the Ubuntu website in one single file, which needs to be transferred to DVD or USB drive (step-by-step instructions are available on the website). The system may be used either after full installation or using it in live mode, that is, without installing it, for those who wish to try it first. Also, Ubuntu can be installed alongside Windows, with the two systems available side by side, if needed.

Ubuntu comes with preinstalled free software for office use. This includes mail client, web browser, ftp client, and a full office suite, all supporting Windows formats for word processor, spreadsheets, presentations, database etc., using OpenOffice or LibreOffice, depending on preference. Note that there may be some minor format compatibility issues between these suites and the Microsoft software. A broad range of additional software is available for download, but not all programs available for Windows are translated to Ubuntu Linux (see the cons at the end).

Ubuntu uses a different file system from Windows, but this does not mean that old files previously used in Windows are not seen by Ubuntu. Drives, folders and files stored in different file system are accessible through Ubuntu too.

As with Windows, Ubuntu receives regular updates. These can be downloaded and installed automatically or manually, depending on the user preference. Ubuntu usually comes in two variants: the normal version and the LTS, or long-term support. LTS means that support for this version will be offered for a longer period than the normal version, but both can be easily updated to the latest version, as the process is fully automatic. Linux systems present a significantly lower risk of virus or malware infection than Windows.

While a huge advantage of Ubuntu and the programs available for the platform is that they are free, only a small percentage of the software released for Windows is available for Ubuntu too. This issue must be carefully examined before opting for Ubuntu or, in case of a company, an option may be to keep one computer with Windows and the rest, with Ubuntu.

Ubuntu is a free and open-source Linux system and is, according to Wikipedia officially released in three editions: Desktop, Server, and Core. All can run on the computer alone, or on a virtual machine. Ubuntu is a popular operating system for cloud computing, with support for OpenStack.

The rest is here:
An Alternative to Windows 7 - Budapest Business Journal

Read More..

North Koreas Internet Use Surges, Thwarting Sanctions and Fueling Theft – The Indian Express

By: New York Times | Published: February 10, 2020 8:44:47 am Nearly half that traffic now flows through a new connection in Russia, avoiding the Norths longtime dependency on a single digital pipeline through China.

Written by David E. Sanger

North Korea has vastly expanded its use of the internet in ways that enable its leader, Kim Jong Un, to evade a maximum pressure U.S. sanctions campaign and turn to new forms of cybercrime to prop up his government, according to a new study.

The study concludes that since 2017 the year President Donald Trump threatened fire and fury like the world has never seen against the country the Norths use of the internet has surged about 300%. Nearly half that traffic now flows through a new connection in Russia, avoiding the Norths longtime dependency on a single digital pipeline through China.

The surge has a clear purpose, according to the report released Sunday by Recorded Future, a Cambridge, Massachusetts, group known for its deep examinations of how nations use digital weaponry: circumventing financial pressure and sanctions by the West. Over the past three years, the study concluded, North Korea has improved its ability to both steal and mine cryptocurrencies, hide its footprints in gaining technology for its nuclear program and cyberoperations, and use the internet for day-to-day control of its government.

What this tells you is that our entire concept of how to control the Norths financial engagement with the world is based on an image of the North that is fixed in the past, said Priscilla Moriuchi, a former National Security Agency analyst who directed the study and has long focused on North Korea and Iran. They have succeeded at an easy-to-replicate model of how to move large amounts of money around the world, and do it in a way our sanctions do not touch.

Our sanctions system needs a radical update, she concluded.

The report helps solve the mystery of why the countrys economy appears to have survived, and in some sectors actually grown, as the United States and its allies have talked about their success in choking off oil supplies and cracking down on North Koreas skillful production of counterfeit U.S. currency.

It also further complicates the Trump administrations paralysis in dealing with the North. Sanctions have remained in place, though Trump does not like to talk about them, even as his personal diplomacy with Kim sputters.

An expected resumption of intercontinental ballistic missile tests, which North Korea appeared to threaten at the end of 2019, has not materialized. But even if the situation remains in a quiet stalemate, the report suggests that Kim is poised to take advantage: Just as he is continuing to invest in his nuclear program, he is also pouring resources into a cyberprogram that is both a potent weapon and a revenue generator.

Moreover, the report, titled How North Korea Revolutionized the Internet as a Tool for Rogue Regimes, concludes that other nations are watching the North Korean model, and beginning to replicate it.

Iran has begun to pursue cryptocurrencies as a method for facilitating international payments and circumventing U.S. financial controls, it notes.

Moriuchi, who left the National Security Agency in 2017, began tracking the internet use of the North Korean elite 2 1/2 years ago, a period that encompassed Trumps confrontational approach to the North, the countrys missile launches and then the stalled diplomacy that has followed the presidents three meetings with Kim.

In 2017, Moriuchi could easily see the content of the North Korean elites searches, most of which appeared to be for leisure: While ordinary North Koreans have access only to a restricted, in-country version of the internet, the countrys leaders and their families downloaded movies, shopped and browsed the web on nights and weekends.

But that has changed. Internet use has surged during office hours, suggesting the leadership is now using its internal networks the same way the West does: conducting daily government and private business. Now the country has developed its own version of a virtual private network, a technique to tunnel through the internet securely that has long been used by Western businesses to secure their transactions.

Meanwhile, the countrys efforts to encrypt data and hide its activities on the web have become far more sophisticated. And through a network of students, many in China and India, the North has learned how to exploit data that could improve its nuclear and missile programs.

The largely home-built effort to hide traffic, the report concluded, was being used to steal data from the networks of unsuspecting targets, or as a means of circumventing government-imposed content controls. Such methods have long been used by Chinese and Russian hackers, often working for intelligence agencies.

The North has managed to surprise the world before with its digital savvy: In November 2014, its devastating cyberattack on Sony Pictures Entertainment in an effort to kill The Interview, a comedy about two bumbling journalists sent by the CIA to kill Kim, exposed U.S. digital vulnerabilities. That was followed by a bold effort to steal nearly $1 billion from the Bangladesh central bank through the international financial settlement system called SWIFT. Other central bank attacks followed.

North Koreas most famous cyberattack, using code called WannaCry, disabled the British health care system for days and created havoc elsewhere. It was based on vulnerabilities that had been stolen from the National Security Agency, and published by a group that called itself the Shadow Brokers. U.S. officials have never publicly acknowledged their inadvertent role in fueling the attacks.

But the report suggests the North has now moved on. It has figured out more effective ways to steal cryptocurrencies. And it has begun to produce, or mine, its own, chiefly through Monero, a lesser-known alternative cryptocurrency to Bitcoin that advertises that it obfuscates sending and receiving addresses as well as transacted amounts. In short, it is perfect for any nation and its financial partners seeking to avoid United Nations and U.S. sanctions.

The Indian Express is now on Telegram. Click here to join our channel (@indianexpress) and stay updated with the latest headlines

For all the latest World News, download Indian Express App.

Go here to read the rest:
North Koreas Internet Use Surges, Thwarting Sanctions and Fueling Theft - The Indian Express

Read More..

Microsoft Patch Tuesday fixes IE zeroday and 98 other flaws – We Live Security

February may be the shortest month of the year, but it brings a bumper crop of patches

This months Patch Tuesday is here and with it come fixes for no fewer than 99 security vulnerabilities in Windows and other Microsoft software.

Twelve flaws have received the highest severity ranking of critical, while 5 security holes are listed as publicly known at the time of release.

In fact, one vulnerability ticks both boxes an actively exploited zero-day in Internet Explorer (IE). Microsoft disclosed this flaw, indexed as CVE-2020-0674, three weeks ago but didnt roll out a patch until now. Successful exploitation of this remote code execution (RCE) vulnerability enables remote attackers to run code of their choice on the vulnerable system.

Per this summary by the SANS Technology Institute, another 16 RCE holes are being plugged as part of this months bundle of security patches. This includes two severe vulnerabilities in the Windows Remote Desktop Client, CVE-2020-0681 and CVE-2020-0734, where exploitation is seen as likely by Microsoft.

Updates have been released for various flavors of Windows, as well as for Office, Edge, Exchange Server, SQL Server and a few more products. The number of fixes this month is unusually high; for example, last months Patch Tuesday rolloutfixed 49 vulnerabilities.

The highest vulnerability score, 8.8 out of 10 on the CVSS scale, has been assigned to a memory corruption vulnerability in Windows Media Foundation. An attacker who abused this vulnerability, tracked as CVE-2020-0738, could run arbitrary code on the impacted system. A host of elevation-of-privilege and denial-of-service vulnerabilities are also being patched.

All updates are available via this Microsoft Update Catalog for all supported versions of Windows. Its the first time that Windows 7 usersare out of luck (unless they pay for Extended Security Updates, that is) as the operating system reached end of life last month.

See the original post:
Microsoft Patch Tuesday fixes IE zeroday and 98 other flaws - We Live Security

Read More..

‘More guidance and regulation’: Zuckerberg requests government rules on ‘what discourse should be allowed’ – Washington Examiner

MUNICH Facebook chief executive Mark Zuckerberg called on Western governments to provide regulatory guidance for how social media companies can identify the boundaries of what discourse should be allowed on their platforms.

There should be more guidance and regulation from the states on basically take political advertising as an example what discourse should be allowed? Zuckerberg told an assembly of Western leaders Saturday at the Munich Security Conference. Or, on the balance of free expression and some things that people call harmful expression, where do you draw the line?

Facebook has faced accusations of mismanagement since Russia launched a series of high-profile election interference operations against Western countries, most notably the 2016 U.S. presidential campaign. Sen. Josh Hawley, a Missouri Republican, said federal legislation is necessary to counteract anti-conservative political censorship, while European Union officials are mulling antitrust proposals targeting Facebook.

There are a lot of decisions in these areas that are really just balances between different social values, Zuckerberg said. It's about coming up with an answer that society feels is legitimate and that they can get behind and understand that you drew the line here on the balance of free expression and safety. It's not just that there's one right answer. People need to feel like, OK, enough people weighed in, and thats why the answer should be this, and we can get behind that.

That argument gives a preview of the charm offensive that Zuckerberg will attempt during his meetings next week with European Union officials. His meeting in 2018 with members of the European Parliament backfired, as Zuckerbergs performance left European Union leaders stewing that he had avoided giving specific answers to their most pressing questions. This time, he is prepared to argue that regulations are necessary to preserve free speech and privacy rights from authoritarian rule-makers.

We need to make sure that the internet can continue to be a place where everyone can share their views openly and where the legal framework around this is one that encodes democratic values, he said. I do think that as part of that, we've got to move forward on regulation. Hopefully, we move forward quickly before a more authoritarian model gets adopted in a lot of places first.

Excerpt from:
'More guidance and regulation': Zuckerberg requests government rules on 'what discourse should be allowed' - Washington Examiner

Read More..

Internet of Things (IoT) Security Product Market: Development Factors and Investment Analysis by Leading Manufacturers 2018 2026 – TechNews.mobi

As per a report Market-research, the Internet of Things (IoT) Security Product economy is likely to see a CAGR increase of XX% within the forecast period (2019-2029) and reach at a value of US$ at the ending of 2029. The macro economic and micro elements which are predicted to influence the trajectory of this market are examined from the market analysis that was presented.

Light onto the material throws Providers, vendors, manufacturers, and market participants at the value string of their industry that is Internet of Things (IoT) Security Product . Whats more, its particular influence on the market and the political and economic scenarios of regions are discussed within the analysis.

Critical Details included from this record:

Request Sample Report @ https://www.transparencymarketresearch.co/sample/sample.php?flag=B&rep_id=58632

Competitive Outlook

Light onto the throws Business prospects of players operating from the industry that is Internet of Things (IoT) Security Product . The item pricing plans, marketing stations that were preferred and product portfolio of most players, and promote presence of every and every provider is contained in the title. The players comprise Business 4, Business two, Business 3, and Business.

Regional Assessment

The marketplace research that is introduced sheds light onto the Marketplace Scenario in numerous markets. Additionally, the effects of the governmental and regulatory policies to this market in every regions prospects is examined from the report.

Market segmentation based on geography:

This report gives access to decisive data, such as:

Key highlights of this report include:

Note:Although care has been taken to maintain the highest levels of accuracy in TMRs reports, recent market/vendor-specific changes may take time to reflect in the analysis.

Request For Discount On This Report @ https://www.transparencymarketresearch.co/sample/sample.php?flag=D&rep_id=58632

The report Suits the questions pertaining Into the Internet of Things (IoT) Security Product economy:

Reasons TMR Sticks out

RequestTOC For ThisReport @ https://www.transparencymarketresearch.co/sample/sample.php?flag=T&rep_id=58632

Tags: China Internet of Things (IoT) Security Product Market TrendEurope Internet of Things (IoT) Security Product Market GrowthUK Internet of Things (IoT) Security Product MarketUS Internet of Thi

Visit link:
Internet of Things (IoT) Security Product Market: Development Factors and Investment Analysis by Leading Manufacturers 2018 2026 - TechNews.mobi

Read More..

Our personal health history is too valuable to be harvested by the tech giants – The Guardian

Health data paints a rich picture of our lives. Even if you remove your name, date of birth and NHS number to anonymise yourself, a full health history will reveal your age, gender, the places where you have lived, your family relationships and aspects of your lifestyle.

Used in combination with other available information, this may be enough to verify that this medical history relates to you personally and to target you online. Consequently, whenever the NHS shares health data, even if it is anonymised, we need to have confidence in who it goes to and what they can do with it.

Recent Observer coverage raises big questions over the transparency and claims of anonymity in NHS data transfers through the research scheme used by the health service. It appears that individual-level UK medical data ends up being sold to American drug companies and there appears to be little transparency or accountability around the process.

Society has largely lost control over how our personal data is collected and shared. The effects of this may feel creepy when they lead to an unexpectedly appropriate online recommendation, for example when I received ads for dog grooming, apparently as a consequence of posting pictures of dogs. But when data about us influences a credit rating, a hiring decision or a reoffending risk assessment in a probation case, we are unlikely ever to find out a breach has occurred. The University of Maryland law professor, Frank Pasquale, calls this the black box society.

When data about us influences a credit rating or a hiring decision, we are unlikely ever to find out

Much of what happens is likely to be illegal, but the volume of internet data collection and sharing is such that existing wide-ranging data protection laws, such as the GDPR, are impossible to enforce at scale and across jurisdictions.

For the internet giants, we have little information to go on beyond what they wish to tell us, which historically has not always been accurate and never complete. Most people will feel that this surveillance capitalism is unethical, crossing the boundaries of their rights and expectations, but financial profit remains the determining driver.

This story is not new. We have heard it in terms of our online buying behaviour and the internet advertising market. In recent years, the Observer has covered extensively how the surveillance of online behaviour and profiling can be used to influence our political position, for example through social media.

It is clear that the black box society does not only feed on internet surveillance information. Databases collected by public bodies are becoming more and more part of the dark data economy. Last month, it emerged that a data broker in receipt of the UKs national pupil database had shared its access with gambling companies. This is likely to be the tip of the iceberg; even where initial recipients of shared data might be checked and vetted, it is much harder to oversee who the data is passed on to from there.

Health data, the rich population-wide information held within the NHS, is another such example. Pharmaceutical companies and internet giants have been eyeing the NHSs extensive databases for commercial exploitation for many years. Google infamously claimed it could save 100,000 lives if only it had free rein with all our health data. If there really is such value hidden in NHS data, do we really want Google to extract it to sell it to us? Google still holds health data that its subsidiary DeepMind Health obtained illegally from the NHS in 2016.

Although many health data-sharing schemes, such as in the NHSs register of approved data releases], are said to be anonymised, this offers a limited guarantee against abuse.

There is just too much information included in health data that points to other aspects of patients lives and existence. If recipients of anonymised health data want to use it to re-identify individuals, they will often be able to do so by combining it, for example, with publicly available information. That this would be illegal under UK data protection law is a small consolation as it would be extremely hard to detect.

It is clear that providing access to public organisations data for research purposes can serve the greater good and it is unrealistic to expect bodies such as the NHS to keep this all in-house.

However, there are other methods by which to do this, beyond the sharing of anonymised databases. CeLSIUS, for example, a physical facility where researchers can interrogate data under tightly controlled conditions for specific registered purposes, holds UK census information over many years.

These arrangements prevent abuse, such as through deanonymisation, do not have the problem of shared data being passed on to third parties and ensure complete transparency of the use of the data. Online analogues of such set-ups do not yet exist, but that is where the future of safe and transparent access to sensitive data lies.

Prof Eerke Boiten is director of the Cyber Technology Institute at De Montfort University, Leicester, which is recognised by the National Cyber Security Centre and EPSRC as an academic centre of excellence in cyber security research

Read the original:
Our personal health history is too valuable to be harvested by the tech giants - The Guardian

Read More..

How to protect against the most pressing threat to healthcare clouds today – Healthcare IT News

The most pressing threat against clouds in healthcare today is the insufficient protection of sensitive data both where physical and logical safeguards are implemented, especially when new cloud technology is introduced to existing systems.

That is the conclusion of Howard Young, director, solutions architecture, at Zadara Storage, a hybrid cloud storage vendor that delivers enterprise storage as a fully managed service.

Often, protective controls are overlooked or missed in megalithic hyperscale clouds simply due to the sheer nature of the platform, whereas smaller, agile cloud providers may provide a better fit in the healthcare industry, he contended. Since the cloud is a third-party environment, routine security checks such as PEN testing are necessary to ensure environment configurations remain consistent and intact.

Young points to three aspects of cloud computing with regard to this pressing threat that healthcare CIOs and CISOs need to be aware of: physical, logical and evolution.

Howard Young, Zadara Storage

For physical, cloud servers and networking are physically protected within a data center, but what controls are in place when physical equipment is added or removed? What happens to your data on the failed drive that was removed? he pointed out. For logical, the healthcare deployment model within the cloud increases the likelihood of outside attacks and unauthorized access to patient data. For example, object storage has a public component, which has been a source of unintentional data breaches.

And for evolution, technology continues to improve, but with new each iteration, evaluating safeguards may become complex in the future, he added.

So how can healthcare CIOs and CISOs best defend against the threat of insufficient protection of sensitive data both where physical and logical safeguards are implemented? Young offers some advice.

Cloud deployment strategies are very straightforward when addressing this threat, he explained. At the physical layer, a hybrid cloud where CISOs have more control and insight of the configuration, protection and destruction of data, will provide better mapping to HIPAA requirements. The hybrid cloud then becomes an extension of the hyperscale cloud, which performs the edge operations. Hybrid clouds simply are secure network connections between the public providers and a colo or on-premises data center.

At the logical layer, deployment of workloads needs to be scrutinized against the security requirements for the given layer at which the workload operates, he advised. A simple way to do this is to categorize the framework into three security levels: red, yellow and green, where red has the highest security requirements and green is often a scrubbed-down presentation of the data to the end user at the edge, he explained.

Mapping a web app to this framework may then have a red security boundary for the database, a yellow boundary for cached or transient database lookups, and green for an https web page shown to the patient, he added.

Some requirements may map all to a red layer for highest security levels, he continued. An example of this is remote healthcare worker access using encrypted thin-client access to a workspace running within the cloud.

When new cloud functionality is integrated into the existing system, the primary concern is to maintain layers of separation otherwise processing artifacts or transient data may become an area of unwanted disclosure, Young warned. Take extra care when enabling capabilities that may make data publicly available elsewhere, he advised.

Twitter:@SiwickiHealthITEmail the writer:bill.siwicki@himssmedia.comHealthcare IT News is a HIMSS Media publication.

Original post:
How to protect against the most pressing threat to healthcare clouds today - Healthcare IT News

Read More..

How Much Does It Cost To Build Cloud Computing Service? – Customer Think

Dedicated resources are the reliable source for handling the business. The cost of infrastructure and the requirement of hiring the system engineers, increases the cost. This fears the new organisations from setting up the infrastructure. The lack of scalability and the urgent requirement of the resources are met by Cloud computing. Cost investment funds are obviously one of the principal reasons why organizations are moving to the Cloud.

Despite the fact that Cloud Computing services can offer your organization numerous budgetary favorable circumstances, it is essential to plainly comprehend the cost ramifications of the Cloud and how it could affect your organization.

No enormous forthright capital investmentDiminished programming costs with upgrades included in the month to month chargesDecreased spending for IT supportBusiness Continuity is inculcated in the Cloud conditionReserve funds increase through higher human capital productivity and more noteworthy effectivenessTax cuts

Here in this article, well investigate every single one of these in somewhat more detail so you can begin to see signs of improvement in the cost reserve funds related to moving to the Cloud.

With cloud computing services, you never again need to spend a lot of upfront capital on the software and hardware important to run your system. In most of the cloud environment, these expenses and the cost to keep up your system are recognized for a level, month to month charge. Moreover, when the server and system spine (switches, firewalls, stockpiling) should be improved, it is the duty of the cloud supplier to do these redesigns with no additional expense to the client. In this way disposing of large monetary responsibilities of performing future company-wide updates.

Read the Article:- What is GCP (Google Cloud Platform) and how does it work?

Cloud Servers and Network Hardware are of Higher Quality

A significant distinction in the foundation of the onsite-based system versus a cloud-based system is that the servers and hardware of the network are the absolute best and most excellent when obtained for cloud situations. An excellent premise-based server may cost $10,000 $15,000 though a Cloud-based server may cost $70,000 $100,000 or more. The same is found for the switches, the firewalls and the entirety of the remainder of the hardware that is utilized in a cloud situation. Sap development services suppliers cant bear the cost of hardware failure, so great gear is utilized and every last bit of it is exceptionally redundant inside the data center.

No expenditures on costly hardware

when all is said and done, big data solutions dont require the outright acquisition of server equipment, storage of network, reinforcement frameworks, recovery systems for disasters, power or cooling frameworks, utility costs or data centers. At the point when a business moves to a cloud environment, they dispense with the requirement for servers and the physical space expected to house those servers.

No requirement for the Upfront Expense of Capital for Infrastructure Software

Cloud Integration services eradicate the requirement for the upfront capital prerequisite of obtaining programs like Windows Server, SQL Server, Application and Database Servers, Client Access Licenses, Middleware, SharePoint, Citrix Server, and customer licenses, etc. These expenses are paid in the month to month charges for the cloud condition and backing.

Less Expensive Software Upgrades

Many developers are including free programming upgrades for applications that are facilitated in the cloud and are paid as a membership inside the month to month cloud environment charges. This implies no costly programming updates and none of the interference that product upgrades make in organizations.

The Cloud renders unsurprising IT costs

The unpredictable nature of the current Break-Fix arrangement for PC systems has baffled entrepreneurs for a long time. One of the largely favorable circumstances of cloud computing for entrepreneurs and their staff is the consistency that it brings. Cost of continuous updates, replacement of outdated servers and other variable expenses are for all intents and purposes dispensed with Cloud processing. Most organizations that have moved to the Sap development services enormously welcome the predictability and consistency of paying a fixed month to month cost for their IT needs.

This consistency occurs on two or three levels. To start with, organizations pay for the services they use, rather than paying for software, hardware, power and the help for keeping these things secure, steady and working appropriately.

Second, in the old, on-premise model, when you buy programming you are left with that adaptation for a long time, alongside the products multi-year upgrade cycles. While you can work around this with outsider additional items, its not so proficient as cloud programming

Cut-down expenses made on IT Operations

This is ordinarily perhaps the best wellspring of reserve funds when a business moves a few or the entirety of its frameworks to the Cloud. Staffing costs in the IT division or for redistributed IT Support for sending, working and keeping up applications and hidden foundation can be way too expensive and a considerable lot of these expenses are incredibly decreased in a cloud domain.

At the point when a business is working in the cloud, the big data cloud solutions merchant takes on almost the entirety of the expenses related to introducing, running and keeping up the applications, the basic programming framework, and the related equipment. For most organizations, this speaks to reserve funds of a full time IT proficiency. Also, this doesnt constantly mean disposing of employments in the IT office it can likewise be viewed as evacuating unnecessary, low worth work from IT, which permits the IT group to concentrate on increasingly vital, esteem services.

Tax advantages of Cloud Computing

As opposed to representing hardware and software as a capital cost, and afterward devaluing those costs over the long run, with the Clouds membership-based model, those costs are viewed as operational and can be deducted each year, instead of more than quite a while.

We comprehend that creating a change to Cloud Integration services can be a troublesome choice. However, Cloud offers the option to receive the rewards of innovation and utilize that innovation to settle on better business choices, expand your benefits, and simultaneously limiting dangers and in general expenses.

Original post:
How Much Does It Cost To Build Cloud Computing Service? - Customer Think

Read More..

Q&A: Digging Into the Channel Significance of the AppScale-Packet News – Channel Futures

AppScale CEO Woody Rollins talks importance of hybrid cloud, AWS compatibility and channel plans.

As more enterprises seek to avoid cloud vendor lock-in through hybrid options, providers are innovating and accommodating.

The latest such news this week comes from AppScale Systems and Packet.

First, though, some background. AppScale is an Amazon Web Services-compatible IaaS platform. It is basically the former Eucalyptus same code, same people, AppScale says on its blog after a years-long M&A saga that involved Hewlett Packard. Eventually, the inventors of Eucalyptus got their product back and have rebranded it as AppScale.

Packet, meanwhile, specializes in public cloud data centers and bare-metal automation. Together, AppScale and Packet are enabling enterprises to deploy AWS workloads on Packets bare-metal servers without modifying those workloads. The companies say this allows for use cases including development and testing, placing computation close to data, and moving workloads to the appropriate platform based on current application requirements.

AppScales Woody Rollins

Channel Futures wanted to know what this all means for the channel and get a better feel for AppScales plans for its indirect partners. In this edited Q&A, AppScale CEO Woody Rollins explains.

Channel Futures: Talk about what the Packet deal means for channel partners. Whats the significance for them and their ability to build their businesses?

Woody Rollins: Today, almost 60% of enterprises are driving a hybrid cloud strategy that aligns application requirements and platform capabilities. Many of these enterprises want to leverage their existing AWS investments and embrace a single AWS development and deployment paradigm across hybrid cloud environments (Gartner sees 20% of enterprise customers deploying an AWS hybrid cloud by 2022).

The AppScale-Packet solution, which allows deployment of AWS workloads on Packets bare-metal servers, is a significant growth opportunity for partners as enterprises look to deploy AWS hybrid environments; and at the same time, fulfill key business objectives: vendor independence, data control and cost effectiveness. The complexities of hybrid cloud deployments will push the majority of enterprises to enlist partners to help with the assessment, migration and management of these AWS public/non-public environments.

Partners who have invested in AWS expertise, hybrid cloud professional services, and who can deliver attractive solution options that address unique enterprise requirements should see strong demand as the market for hybrid cloud solutions based on the public cloud market leader accelerate.

CF: Can you provide a concrete example of what the AppScale-Packet partnership might look like to a partner? In other words, what kind of client would a partner target with this combined capability and what specific business-outcome value would the partner bring to the table?

WR: AppScale and Packet are looking for partners that offer a full range of hybrid cloud services (assessment, migration, management) that complement the joint AWS-compatible infrastructure as a service platform offering. Partners can target a wide variety of enterprise customers who have embraced the AWS public cloud, intend to deploy a hybrid cloud solution based on AWS technology, and who find themselves looking for a solution that maintains business flexibility, allows for control of business-critical data and ensures cost objectives are met.

Today, partners can start by helping enterprises with

See the article here:
Q&A: Digging Into the Channel Significance of the AppScale-Packet News - Channel Futures

Read More..