Page 4,417«..1020..4,4164,4174,4184,419..4,4304,440..»

Free cloud storage buyer beware – Network World

By Brandon Butler, Senior Editor, Network World | Mar 30, 2017 7:13 AM PT

Cloud Chronicles is written by Network World Senior Writer Brandon Butler, who tracks the ins and outs of the cloud computing industry.

Your message has been sent.

There was an error emailing this page.

There are three things that are certain in life: Death, taxes and volatility in the free cloud storage market. Yes, it turns out free cloud storage comes with a price: putting up with a fickle market.

Network World has a running list of the best places in the cloud to find free storage. Many vendors offer their services on a freemium basis, meaning an introductory cloud storage offering, typically of 5 GB is free, with additional storage costing a variety of prices. But businesses dont typically like to give away their services for free. So, these offers change frequently.

+MORE AT NETWORK WORLD: 18 Free Cloud Storage Offerings +

In the past two years, more than half of the free cloud storage vendors we highlighted in our report withdrew or reduced their free cloud storage offering. More than half of the vendors that appeared on our list two years ago but did not make the cut this year no longer exist.

DumpTruck, which used to offer 5 GB of free cloud storage, sunset its service in late 2015.

Copy was a cloud storage service from networking vendor Barracuda but in February 2016 the company announced it would be discontinuing the service. Two months later in April 2016, Bitcasa, another company that had offered 5 GB of free cloud storage, also shuttered. DumpTruck, a service from Golden Frog, closed its service in late 2015.

Other vendors have made their free cloud storage offerings less attractive. Microsoft OneDrive, for example, reduced its free cloud storage from 15 GB to 5 GB. ADrive, a company that used to offer 50 GB of free cloud storage now has no free offering, just paid plans. SpiderOak, which says it has a zero-knowledge policy of data stored in its cloud, used to offer 2 GB free - now it offers 250 GB for free, but only for 21 days.

The point is these offers for free cloud storage change frequently. They also can come with ambigousterms of where the data is stored and what the vendors can do with it. So, the good news is there are plenty of free cloud storage offers on the web. But be sure to read the terms of service and buyer beware: nothing is free forever.

Senior Editor Brandon Butler covers the cloud computing industry for Network World by focusing on the advancements of major players in the industry, tracking end user deployments and keeping tabs on the hottest new startups.

Sponsored Links

Read more from the original source:
Free cloud storage buyer beware - Network World

Read More..

Hybrid Cloud Storage Delivers Performance and Value | Linux Journal – Linux Journal

Just in the past two years, technology has created a veritable ocean of data. And like an ocean, that data, created by social technology, mobile technology and IoT, is vast, bountiful and dynamic. And also like an ocean, the climate, or temperature of data, constantly shifts and changes. Chances are that your enterprise has perhaps not an ocean, but certainly a sea or lake of data readily available. The challenge is how to measure the temperature, navigate the vastness of that data and reap its waiting bounty. Data generally can be grouped into three classifications: hot, warm and cold. Hot data is data (such as customer behavior) that is accessed frequently and so needs to be available immediately. Cold data (for example, prior year financials), on the other hand, is used infrequently, and it does not need to be accessed as often. Warm data is somewhere in between, and as you can imagine, each class of data has different storage requirements. And, like the shifting nature of an ocean, your data may move between those classifications, making the challenge of storing and accessing your data in the most cost-effective way a huge challenge, and opportunity. Most enterprises have relied on one of two general methods for storing data: on-site or cloud. Each of these approaches has its merits, but using one or the other also creates certain constraints for your enterprise. On-site storage provides all the benefits of localized control, but as your data grows or shifts between hot and cold, it can present cost issues. To respond to the cost and scalability issues, your enterprise can move its data to the cloud, but potentially at the risk of availability or regulatory compliance, like PII (personally identifiable information). But if your enterprise could blend the two--on-site and cloud storage--in a way that helped manage down costs while providing for your enterprise availability, scalability, security and compliance needs, it would provide a viable solution. Hybrid Cloud Storage (HCS) creates a perfect method for your enterprise to place data exactly where it makes sense, depending on its class, and it helps manage costs effectively. To derive the most benefit from HCS, look for a partner that provides deployment options based on your data workloads and that uses the same technology for on-site and cloud storage. This will make management of data and balancing much easier than trying to blend different technologies for cloud and on-site storage. Ask how your partner allows you to manage your storage needs. It is important to be able adjust and scale at as granular a level as possible with simplicity and ease. Keep in mind also the need to manage seasonal and unforeseen data storms in a way that doesnt break your budget. A good partner will help you keep costs and performance on keel across your application and data portfolio in response to sudden data growth so that the right applications get the right data in the right timing to fuel your business. A good HCS partner will provide a solution that allows your enterprise to move data to the most efficient storage location while simplifying the management of that data through automation of defined policies. Your enterprise should expect real-time access and availability, reliability, scalability and disaster recovery at lower costs than a strictly on-site solution. There is a lot of data out there. If your job is figuring out the most accessible, secure and cost-effective way of storing and serving that data to your business, hybrid cloud storage is worth your strong assessment. Whether your enterprise is using on-site or cloud storage now, a move to HCS is a smart move. Learn More about Hybrid Cloud StorageSpecial thanks to IBM for sponsoring this blog, a series independently written by Linux Journal.

Read more:
Hybrid Cloud Storage Delivers Performance and Value | Linux Journal - Linux Journal

Read More..

The ups and downs of cloud storage for SMEs – BusinessZone (blog)

There is huge interest among businesses in cloud storage at the moment because of the advantages claimed for a streamlined process that sees data stored on and accessed by the Internet, without the need for expensive software and applications on in-house hard-drives.

Cloud storage providers claim they offer flexibility, portability and security to customers who place data on their remote servers. While it can be centralised and stored in one location, it is accessible anywhere via PCs, laptops, iPads, netbooks and mobile phones. Crucially, data backup and recovery should be automatic, which means that users should never have to worry about losing anything placed on the cloud.

However, businesses must also be aware that there are pitfalls and dangers to cloud services.

Dont assume high security thresholds that will protect from hacking and attacks; you must ensure that the provider has these in place and that data is encrypted so that only authorised parties can read it. This is vital to comply with data protection legislation, especially the new EU General Data Protection Regulations (GDPR). Due to come into force in May 2018, penalties for violations could run to 20m and UK companies must prepare for and adhere to them for some time, despite the Brexit vote.

Users may be charged for unwanted additional features, while they have no control over updates and software releases and can also have limited control over how their data is hosted, stored and backed up, depending on which type of cloud system is used.

Some storage services have set bandwidth allowances and additional charges may be levied if a client goes over allowance. Even with high bandwidth, network speeds can affect access and performance, while cloud connection can be impaired if too many people are online. Remember, should you be without Internet access for any reason, you cannot access your data.

Businesses may find that the costs of cloud computing are not as competitive as they thought, especially for small amounts of data or over limited periods.

It all means that you must ensure you know what your business does and doesnt need from cloud storage - and understand fully whether there is a fit with what the vendor is selling you.

Consider which type of cloud system is best for you - public cloud on third parties shared physical hardware, private cloud for greater levels of control and security, or a hybrid of the two, where the public cloud is used for non-critical information and the private for sensitive material?

Get guarantees on levels of security, performance, allowances, bandwidth, what services you will be paying for and the backup systems in place to protect data from being lost.

It is critical that you read and understand the service level agreements (SLAs) before signing up. And if there are areas you dont understand, seek professional advice before making a commitment; invariably, this will be a far smaller outlay than being stuck with the wrong choice.

There is no doubt that cloud storage offers many advantages in terms of cost savings, efficiencies and convenience. However, it is a complex, fast-changing field and it is important that you have somebody who knows the landscape to guide you through it.

More:
The ups and downs of cloud storage for SMEs - BusinessZone (blog)

Read More..

Nexinto Selects Cloudian Object Storage for Cost-effective Cloud Storage – Benzinga

Leading German service provider adds Cloudian HyperStore to meet demand for cost-effective cloud storage for Tier 2 and Tier 3 data in Germany

San Mateo, CA., Hamburg and Amsterdam (PRWEB) March 30, 2017

Cloudian, Inc., a global leader in hybrid cloud object storage systems, announced today that Nexinto has selected Cloudian HyperStore as the storage solution for its new S3-compatible public cloud storage service.

As a leading German cloud service provider, Nexinto manages approximately 15% of the entire German e-commerce market, including the operations of Germany's largest online retailers. To support its customers as they moved Tier 2 and Tier 3 data to and from the public cloud, the firm sought an S3-compatible storage solution that could grow without limit in a single storage environment.

After researching the market, Nexinto chose Cloudian HyperStore. As a software-defined object storage solution, it provided Nexinto with several key benefits. First, because the software runs on industry-standard servers, Nexinto could leverage existing hardware from their longstanding server suppliers.

Second, the solution enables Nexinto to offer S3-compatible storage that would meet the compliance requirements and data protection guidelines in Germany -- including GDPR -- as customers move data between the public cloud and Nexinto.

"German service providers face a complex challenge: their customers are asking for more affordable cloud storage for their Tier 2 and Tier 3 data, but they don't want to, or are not allowed to, use low-cost public cloud offerings they don't fully trust," said Christian Thies, Cloudian's German Sales Manager. "Nexinto has closed this gap in the market and can now meet the needs of their customers with a high-performance and cost-effective service."

Nexinto Chief Digital Officer Tobias Reisberger commented: "At Nexinto we always strive to find the best possible solution for our clients. With Cloudian HyperStore we are able to offer customers the advantages of the S3-API and combine them with the trusted reliability and security of all Nexinto services."

About Cloudian Based in Silicon Valley, Cloudian is a leading provider of hybrid cloud object storage systems. Our flagship product, Cloudian HyperStore, enables service providers and enterprises to build reliable, affordable and scalable hybrid cloud storage solutions. Join us on LinkedIn, follow us on Twitter (@CloudianStorage) and Facebook, or visit us at http://www.cloudian.com.

About Nexinto Nexinto enables digital business by delivering customer specific IT-services. Based on 3-tier and 4-tier multi-cloud infrastructure with own German data centers, Hamburg based Nexinto provides managed environments and services for IT-virtualization, digital workplaces, cyber-security, business intelligence and internet of things.

Nexinto runs the online-shops of major German E-Commerce players, operates industrial installations and cloud platforms for software services. Nexinto is certified in accordance with ISO 9001, ISO 27001 as well as ISAE 3402. Visit http://www.nexinto.com/en/, follow Nexinto on Twitter (@nexinto), Facebook and LinkedIn.

For the original version on PRWeb visit: http://www.prweb.com/releases/2017/03/prweb14196333.htm

More:
Nexinto Selects Cloudian Object Storage for Cost-effective Cloud Storage - Benzinga

Read More..

Cloud computing in Poland third lowest in EU – thenews.pl

PR dla Zagranicy

Roberto Galea 30.03.2017 16:05

The use of cloud computing services in Poland in 2016 was the third lowest in the European Union, according to a new report by Eurostat, the blocs statistics office.

The agency said that Significant differences can be observed across the EU Member States.

More than half the businesses in Finland used cloud computing (57 percent), Eurostat said, adding that the figures were also high in Sweden (48 percent) and Denmark (42 percent).

At the opposite end of the scale, cloud computing services were used by less than 10 percent of enterprises in Bulgaria and Romania (both seven percent), Latvia and Poland (both eight percent) as well as Greece (nine percent), the report read.

Enterprises can access computing resources hosted by third parties on the internet instead of building their own IT infrastructure. This shared pool of resources is most commonly known as cloud computing. (rg)

Here is the original post:
Cloud computing in Poland third lowest in EU - thenews.pl

Read More..

IBM Unveils Quantum Computing Initiative for Business and … – CIO Today

Some problems are too complex to be tackled by even the most advanced high-power computers, so IBM aims to take them on with a new approach: an "industry-first" plan to build universal quantum computing systems for businesses, researchers and others.

Instead of using the standard computing building blocks of bits -- the binary digits "0" and "1" -- quantum computers use qubits that can function as either 0s, 1s or both simultaneously. This enables quantum computers to handle calculations and analyses that are beyond the reach of even the smartest "regular" computers.

In addition to unveiling its "IBM Q" initiative, which will be enabled through its cloud platform, IBM today released an API (application program interface) for developers who want to build quantum computing-based applications. Big Blue also launched an upgraded simulator on its IBM Quantum Experience that can model quantum computing systems with up to 20 qubits.

'Implications Are Huge'

Quantum computing experts say such systems will be able to handle massive memory and processing demands that are out of the reach of standard computers. For example, they could help researchers better understand the many different states that molecules, such as caffeine, can exist in, which could help pave the way for new medicines, chemical compounds and materials.

"In terms of applications, I think the one type of really big challenge that many of us who are working on this really want to be able to solve is to see the simulation of chemistry, the simulation of nature," said Jerry Chow, manager of experimental quantum computing for IBM Research, in an IBM video. "If you're going to try to understand nature, which is naturally quantum mechanical, there's no reason to use bits -- 0s and 1s -- to do it, but to actually use other objects that follow those same natural laws, quantum bits, to try and simulate that and try and understand that. The implications for this are huge."

Beyond medicine and chemistry, quantum computers could also deliver benefits for financial data and risk modeling, cloud-based computing security and logistics. For instance, they could help businesses with large and complex global supply chains optimize their fleet operations for more efficient deliveries during busy holiday seasons.

Applications for Business, Education

IBM first made quantum computing available in May, opening up its quantum processor to the public via the IBM Cloud. Since then, some 40,000 users have used the IBM "Quantum Experience" to run more than 275,000 different experiments.

Big Blue has also partnered with a number of academic institutions, including MIT, which has used the Quantum Experience for online students who want to run experiments or test quantum computing theories.

In addition, the IBM Research Frontiers Institute consortium works to develop and test new computing technologies for business use. Founding members of the consortium include Canon, Hitachi Metals, Honda, JSR, Nagase and Samsung.

"We envision IBM Q systems working in concert with our portfolio of classical high-performance systems to address problems that are currently unsolvable, but hold tremendous untapped value," Tom Rosamilia, IBM Systems senior vice president, said in a statement.

Pictured above: IBM Quantum Computing Scientists Hanhee Paik (left) and Sarah Sheldon (right). Image Credit: Connie Zhou for IBM.

Read the original here:
IBM Unveils Quantum Computing Initiative for Business and ... - CIO Today

Read More..

Oracle Expands Cloud Services with Launch of Exadata Cloud … – CIO Today

By Shirley Siluk / CIO Today. Updated March 06, 2017.

Instead of using the standard computing building blocks of bits -- the binary digits "0" and "1" -- quantum computers use qubits that can function as either 0s, 1s or both simultaneously. This enables quantum computers to handle calculations and analyses that are beyond the reach of even the smartest "regular" computers.

In addition to unveiling its "IBM Q" initiative, which will be enabled through its cloud platform, IBM today released an API (application program interface) for developers who want to build quantum computing-based applications. Big Blue also launched an upgraded simulator on its IBM Quantum Experience that can model quantum computing systems with up to 20 qubits.

'Implications Are Huge'

Quantum computing experts say such systems will be able to handle massive memory and processing demands that are out of the reach of standard computers. For example, they could help researchers better understand the many different states that molecules, such as caffeine, can exist in, which could help pave the way for new medicines, chemical compounds and materials.

"In terms of applications, I think the one type of really big challenge that many of us who are working on this really want to be able to solve is to see the simulation of chemistry, the simulation of nature," said Jerry Chow, manager of experimental quantum computing for IBM Research, in an IBM video. "If you're going to try to understand nature, which is naturally quantum mechanical, there's no reason to use bits -- 0s and 1s -- to do it, but to actually use other objects that follow those same natural laws, quantum bits, to try and simulate that and try and understand that. The implications for this are huge."

Beyond medicine and chemistry, quantum computers could also deliver benefits for financial data and risk modeling, cloud-based computing security and logistics. For instance, they could help businesses with large and complex global supply chains optimize their fleet operations for more efficient deliveries during busy holiday seasons.

Applications for Business, Education

IBM first made quantum computing available in May, opening up its quantum processor to the public via the IBM Cloud. Since then, some 40,000 users have used the IBM "Quantum Experience" to run more than 275,000 different experiments.

Big Blue has also partnered with a number of academic institutions, including MIT, which has used the Quantum Experience for online students who want to run experiments or test quantum computing theories.

In addition, the IBM Research Frontiers Institute consortium works to develop and test new computing technologies for business use. Founding members of the consortium include Canon, Hitachi Metals, Honda, JSR, Nagase and Samsung.

"We envision IBM Q systems working in concert with our portfolio of classical high-performance systems to address problems that are currently unsolvable, but hold tremendous untapped value," Tom Rosamilia, IBM Systems senior vice president, said in a statement.

Pictured above: IBM Quantum Computing Scientists Hanhee Paik (left) and Sarah Sheldon (right). Image Credit: Connie Zhou for IBM.

More here:
Oracle Expands Cloud Services with Launch of Exadata Cloud ... - CIO Today

Read More..

Achieving Peak Cloud Performance Don’t Do It Alone – The Media Temple Blog (press release) (blog)

Achieving Peak Cloud Performance Don't Do It Alone
The Media Temple Blog (press release) (blog)
Enlisting the help of a managed services provider can help organizations better leverage the potential of cloud hosting while lessening the burden on their internal IT team. It can also provide a deeper level of assistance and expertise, and ...

Originally posted here:
Achieving Peak Cloud Performance Don't Do It Alone - The Media Temple Blog (press release) (blog)

Read More..

MTN woos firms with cloud plan – Daily Nation

Thursday March 30 2017

A woman walks past the entrance of the headquarters of South Africa's MTN Group in Johannesburg. FILE PHOTO | REUTERS

Telecommunications firm MTN has opened a data centre at its Mombasa Road offices in Nairobi as part of a strategy to attract smaller businesses to its cloud computing services.

The tier III facility, the second highest classification level for data centres, will provide MTN clients with robust remote computing capabilities.

The data centre offers redundancy and service availability about 99.9 per cent of the time, with maximum interruptions of 1.6 hours per year. It also offers power outage protection for at least 72 hours.

MTN says that it is particularly interested in extending the reach of its cloud accounting application and growing its business reselling Microsofts cloud service Azure.

The SME space is quite big. These are small guys that cannot afford to invest a lot in infrastructure. We want them to be able to their business using online applications, said MTN Business managing director, Mr Kennedy Chinganya.

The data center has the capacity for 70 racks, of which 24 are connected. A rack is basically shelving space on which servers sit. Each of the racks at MTNs new data centre can accommodate 42 high density servers.

MTNs new facility is relatively small. Liquid Telecoms East Africa Data Centre, a tier III facility, has 600 racks at its Nairobi. Mr Chinganya said that MTN has data centers with capacities of 5,000 racks in other parts of the continent.

Technology companies, globally and locally, are positioning themselves to compete on cloud computing and data hosting services. American multinational IBM last month brought its cognitive cloud computing services to Kenya through a deal with Sidian Bank.

Estimate is designed to spur consumption, woo investors and promote local goods.

ODM leader maintains Kalonzo Musyoka will not quit alliance.

Go here to see the original:
MTN woos firms with cloud plan - Daily Nation

Read More..

Encryption FAQs

1. What is an encryption registration? How long does it take to receive a response from BIS for my encryption registration?

2. Who is required to submit an Encryption Registration, classification request or self-classification report?

3. What are my responsibilities for exporting or re-exporting encryption products where I am not the producer?

4. What should I do if I cannot obtain the encryption registration Number (ERN) or the Export Control Classification Number (ECCN) for the item from the producer or manufacturer?

5. Can a third-party applicant submit an encryption registration and self-classification report on my behalf?

6. How do I report exports and reexports of items with encryption?

7. Can I export encryption technology under License Exception ENC?

8. What is non-standard cryptography?

9. How do I complete Supplement No. 5 if I am a law firm or consultant filing on behalf of a producer of encryption items?

10. What if you are not the producer of the item or filing directly on behalf of the producer (e.g., law firm/consultant)?

11. What do I need to submit with an encryption commodity classification request in SNAP-R?

12. Is Supplement No. 6 to Part 742 required for obtaining paragraph 740.17(b)(1) authorization?

13. How do I submit a Supplement No. 8 Self-Classification Report for Encryption Items?

14. When do I file Supplement No. 8 Self-Classification Report for Encryption Items?

15. What is Note 4?

16. I have an item that was reviewed and classified by BIS and made eligible for export under paragraph (b)(3) of License Exception ENC in 2009. The encryption functionality of the item has not changed. This item is now eligible for self-classification under paragraph (b)(1) of License Exception ENC. What are my responsibilities under the new rule?

17. When do I need a deemed export license for encryption technology and source code?

18. Does the EAR definition of "OAM" include using encryption in performing network security monitoring functions?

1. What is an Encryption Registration? How long does it take to receive a response from BIS for my Encryption Registration?

Encryption registration is a prescribed set of information about a manufacturer and/or exporter of certain encryption items that must be submitted to the Bureau of Industry and Security as a condition of the authorization to export such items under License Exception ENC or as mass market items.

Advance encryption registration is required for exports and reexports of items described in paragraphs 740.17(b)(1), (b)(2), and (b)(3) and paragraphs 742.15(b)(1), and (b)(3) of the Export Administration Regulations (EAR). Registration is made through SNAP-R by submitting the questionnaire set forth in Supplement No. 5 to part 742 of the EAR (point of contact/company overview/types of products/ etc.). Registration of a manufacturer authorizes the manufacturer as well as other parties to export and reexport the manufacturers encryption products that the manufacturer has either self-classified or has had the items classified by BIS, pursuant to the provisions referenced above. A condition of the authorization is that the manufacturer must submit an annual self-classification report for relevant encryption items.

How long does it take to receive a response from BIS for my encryption registration?

Once you have properly registered with BIS, the SNAP-R system will automatically issue an Encryption Registration Number (ERN), e.g., R123456, upon submission of a request. BIS estimates that the entire registration procedure should take no more than 30 minutes.

2. Who is required to submit an encryption registration, classification request or self-classification report?

Any party who exports certain U.S.-origin encryption products may be required to submit an encryption registration, classification request and/or self-classification report; however, if a manufacturer has registered and has self-classified relevant items and/or had items classified by BIS, and has made the classifications available to other parties such as resellers and other exporters/reexporters, such other parties are not required to register, to submit a classification request, or to submit an annual self-classification report.

3. What are my responsibilities for exporting or re-exporting encryption products where I am not the product manufacturer?

Exporters or reexporters that are not producers of the encryption item can rely on the Encryption Registration Number (ERN), self-classification report or CCATS that is published by the producer when exporting or reexporting the registered and/or classified encryption item. Separate encryption registration, commodity classification request or self-classification report to BIS is NOT required.

Please continue to the next question if the information is not available from the producer or manufacturer.

4. What should I do if I cannot obtain the Encryption Registration Number (ERN) or the Export Control Classification Number (ECCN) for the item from the producer or manufacturer?

If you are not the producer and are unable to obtain the producers information or if the producer has not submitted an encryption registration, self-classification report or commodity classification for his/her products to BIS, then you must register with BIS. The registration process will require you to submit a properly completed Supplement No. 5 to part 742 and subsequent Supplement No. 8 Self Classification Report for the products. You will receive an ERN for the registered products or CCATSs as appropriate. BIS recognizes that non-producers who need to submit for encryption registration may not have all of the information necessary to complete Supplement No. 5 to part 742. Therefore, special instructions have been included in Supplement No. 5 to account for this situation.

For items described in Part 740.17(b)(2) and (b)(3) or Part 742.15(b)(3) that require the classification by BIS, the non-producer is required to submit as much of the technical information required in Supplement No. 6 to part 742 - Technical Questionnaire for Encryption Items as possible.

5. Can a third-party applicant submit an encryption registration and self-classification report on my behalf?

Yes, special instructions for this purpose are provided in paragraph (r) of Supplement No. 2 to part 748 of the EAR for this purpose. The information in block 14 (applicant) of the encryption registration screen and the information in Supplement No. 5 to part 742 must pertain to the company that seeks authorization to export and reexport encryption items that are within the scope of this rule. An agent for the exporter, such as a law firm, should not list his/her name in block 14. The agent however may submit the encryption registration and list himself/herself in block 15 (other party authorized to receive license) of the encryption registration screen in SNAP-R.

6. How do I report exports and reexports of items with encryption?

All reports (i.e., the semi-annual sales report and the annual self-classification report) must be submitted to both BIS and the ENC Encryption Request Coordinator.

An annual self-classification report is required for producers of encryption items described by paragraphs 740.17(b)(1) and 742.15(b)(1) of the EAR. The information required and instruction for this report is provided in Supplement No. 8 to Part 742-Self-Classification Report for Encryption Items. Reports are submitted to BIS and the Encryption Request Coordinator in February of each year for items exported or reexported during the previous calendar year (i.e., January 1 through December 31) pursuant to the encryption registration and applicable sections740.17(b)(1) or 742.15(b)(1) of the EAR. Annual self-classification reports are to be submitted to This email address is being protected from spambots. You need JavaScript enabled to view it. and This email address is being protected from spambots. You need JavaScript enabled to view it..

Semi-annual sales reporting is required for exports to all destinations other than Canada, and for reexports from Canada for items described under paragraphs (b)(2) and (b)(3)(iii) of section 740.17. Paragraph 740.17(e)(1(iii) contains certain exclusions from this reporting requirement. Paragraphs 740.17(e)(1)(i) and (e)(1)(ii) contains the information required and instructions for submitted the semi-annual sales reports. The first report is due no later than August 1 for sales occurring between January 1 and June 30 of the year, and the second report is due no later than February of the following year for sales occurring between July 1 and December 31 of the year. Semi-annual sales reports continue to be submitted to: This email address is being protected from spambots. You need JavaScript enabled to view it. and This email address is being protected from spambots. You need JavaScript enabled to view it..

7. Can I export encryption technology under License Exception ENC?

Yes, License Exception ENC is available for transfer of encryption technology. Specifically, paragraph 740.17(b)(2)(iv) has been amended to permit exports and reexports of encryption technology as follows:

(A) Technology for "non-standard cryptography". Encryption technology classified under ECCN 5E002 for "non-standard cryptography", to any end-user located or headquartered in a country listed in Supplement No. 3 to this part;

(B) Other technology. Encryption technology classified under ECCN 5E002 except technology for "cryptanalytic items", "non-standard cryptography" or any "open cryptographic interface," to any non-"government end-user" located in a country not listed in Country Group D:1 or E:1 of Supplement No. 1 to part 740 of the EAR.

8. What is non-standard cryptography?

Non-standard cryptography, defined in Part 772 Definition of Terms, means any implementation of cryptography involving the incorporation or use of proprietary or unpublished cryptographic functionality, including encryption algorithms or protocols that have not been adopted or approved by a duly recognized international standards body (e.g., IEEE, IETF, ISO, ITU, ETSI, 3GPP, TIA, and GSMA) and have not otherwise been published.

9. How do I complete Supplement No. 5 if I am a law firm or consultant filing on behalf of a producer or exporter of encryption items?

The information in Supplement No. 5 to Part 742must pertain to the registered company, not to the submitter. Specifically, the point of contact information must be for the registered company, not a law firm or consultant filing on behalf of the registered company.

10. What if you are not the producer of the item or filing directly on behalf of the producer (e.g., law firm/consultant)?

You may answer questions 4 and 7 in Supplement No. 5 to part 742as not applicable if your company is not the producer of the encryption item. An answer must be give for all other questions. An explanation is required when you are unsure.

11. What do I need to submit with an encryption commodity classification request in SNAP-R?

Encryption commodity classification determinations should be submitted through SNAP-R. Before entering SNAP-R, you should prepare the following supporting documents:

After accessing SNAP-R, fill-in a commodity classification determination request and upload the supporting documents into SNAP-R.

12. Is Supplement No. 6 to part 742 required for paragraph 740.17(b)(1) authorization?

If you are requesting a classification of an item is described in paragraph 740.17(b)(1) (in other words, the item is not described in either Section 740.17(b)(2) or (b)(3)), a Supplement No. 6questionnaire is not required as a supporting document. Provide sufficient information about the item (e.g., technical data sheet and/or other explanation in a separate letter of explanation) for BIS to determine that the item is described in paragraph 740.17(b)(1). If you are not sure that your product is authorized as 740.17(b)(1) and you want BIS to confirm that it is authorized under 740.17(b)(1), providing answers to the questions set forth in Supplement No. 6 to part 742 with your request should provide BIS with sufficient information to make this determination.

13. How do I submit a Supplement No. 8 Self Classification Report for Encryption Items?

The annual self-classification report must be submitted as an attachment to an e-mail to BIS and the ENC Encryption Request Coordinator. Reports to BIS must be submitted to a newly created e-mail address for these reports (This email address is being protected from spambots. You need JavaScript enabled to view it.). Reports to the ENC Encryption Request Coordinator must be submitted to its existing e-mail address (This email address is being protected from spambots. You need JavaScript enabled to view it.). The information in the report must be provided in tabular or spreadsheet form, as an electronic file in comma separated values format (CSV), only. In lieu of email, submissions of disks and CDs may be mailed to BIS and the ENC Encryption Request Coordinator.

14. When do I file Supplement No. 8 Self-Classification Report for Encryption Items?

An annual self-classification report for applicable encryption commodities, software and components exported or reexported during a calendar year (January 1 through December 31) must be received by BIS and the ENC Encryption Request Coordinator no later than February 1 the following year. If no information has changed since the previous report, an email must be sent stating that nothing has changed since the previous report or a copy of the previously submitted report must be submitted.

15. What is Note 4?

Note 4 to Category 5, Part 2 in the Commerce Control List (Supplement No. 1 to part 774) excludes an item that incorporates or uses cryptography from Category 5, Part 2 controls if the items primary function or set of functions is not information security, computing, communications, storing information, or networking, andif the cryptographic functionality is limited to supporting such primary function or set of functions. The primary function is the obvious, or main, purpose of the item. It is the function which is not there to support other functions. The communications and information storage primary function does not include items that support entertainment, mass commercial broadcasts, digital rights management or medical records management.

Examples of items that are excluded from Category 5, Part 2 by Note 4 include, but are not limited to, the following:

16. I have an item that was reviewed and classified by BIS and made eligible for export under paragraph (b)(3) of License Exception ENC in 2009. The encryption functionality of the item has not changed. This item is now eligible for self-classification under paragraph (b)(1) of License Exception ENC. What are my responsibilities under the new rule?

Your item meets the grandfathering provisions set forth in section 740.17(f)(1) of the EAR. You do not need to submit an encryption registration (Supplement No. 5), an annual self-classification report (Supplement No. 8), or semi-annual sales reports for the item.

17. When do I need a deemed export license for encryption technology and source code?

A license may be required in certain circumstances for both deemed exports and deemed reexports. For encryption items, the deemed export rules apply only to deemed exports of technology and to deemed reexports of technology and source code. There are no deemed export rules for transfers of encryption source code to foreign nationals in the United States. This is because of the way that section 734.2 defines exports and reexports for encryption items.

For transfers of encryption technology within the United States, section 740.17(a)(2) of license exception ENC authorizes the export and reexport of encryption technology by a U.S. company and its subsidiaries to foreign nationals who are employees, contractors, or interns of a U.S. company . . . There is no definition of U.S. company in the EAR, however, BIS has interpreted this to apply to any company operating in the United States. This means that deemed export licenses are generally not required for the transfer of encryption technology by a company in the U.S. to its foreign national employees. A deemed export license may be required if, for example, a company operating in the U.S. were to transfer encryption technology to a foreign national who is not an employee, contractor, or intern of a company in the United States. License exception ENC does not authorize deemed exports or reexports to any national of a country listed in Country Group E:1.

For deemed reexports, the end-user would have to be an employee, contractor, or intern of a U.S. Subsidiary for 740.17(a)(2) to apply, or a private sector end-user headquartered in a Supplement 3 country for 740.17(a)(1) to apply. The term contractor in this context means a contract employee (i.e., a human person). License exception ENC does not authorize deemed exports or reexports to any national of a country listed in Country Group E:1.

Also note that as of June 25, 2010, encryption technology (except technology for cryptanalytic items, Open Cryptographic Interface items, and non-standard cryptography) that has been reviewed is eligible for license exception ENC to any non-government end user located outside of Country Group D:1. Also, encryption source code that has been reviewed by BIS and made eligible for license exception ENC under 740.17(b)(2) is eligible for export and reexport to any non-government end-user. Thus encryption technology and source code that have been reviewed are eligible for export and reexport to a broader range of end-users than 740.17(a) allows. Again, section 740.17 does not authorize deemed exports or reexports to any national of a country listed in Country Group E:1.

18. Does the EAR definition of "OAM" include using encryption in performing network security monitoring functions?

No. The definition of "OAM" includes "monitoring or managing the operating condition or performance of an item." BIS does not consider network security monitoring or network forensics functions to be part of monitoring or managing operating condition or performance.

The phrase "monitoring or managing the operating condition or performance of an item" is meant to include all the activities associated with keeping a computer or network-capable device in proper operating condition, including: configuring the item; checking or updating its software; monitoring device error or fault indicators; testing, diagnosing or troubleshooting the item; measuring bandwidth, speed, available storage (e.g. free disk space) and processor / memory / power utilization; logging uptime / downtime; and capturing or measuring quality of service (QoS) indicators and Service Level Agreement-related data.

However, the "OAM" definition does not apply to cryptographic functions performed on the forwarding or data plane, such as: decrypting network traffic to reveal or analyze content (e.g., packet inspection and IP proxy services); encrypting cybersecurity-relevant data (e.g., activity signatures, indicators or event data extracted from monitored network traffic) over the forwarding plane; or securing the re-transmission of captured network activity.

Thus, products that use encryption for such network security monitoring or forensics operations, or to provision these cryptographic services, would not be released by the OAM decontrol notes (l) or (m), or the Note to 5D002.c.

Similarly, the "OAM" decontrol does not apply to security operations directed against data traversing the network, such as capturing, profiling, tracking or mapping potentially malicious network activity, or "hacking back" against such activity.

Back to top

Go here to read the rest:
Encryption FAQs

Read More..