Page 4,427«..1020..4,4264,4274,4284,429..4,4404,450..»

NVIDIA Corporation’s (NVDA) Tesla GPU Accelerators for AI Cloud Computing Adopted by Tencent Cloud – Smarter Analyst

NVIDIA Corporation (NASDAQ:NVDA) announced that Tencent Cloud will adopt NVIDIA Tesla GPU accelerators to help advance artificial intelligence for enterprise customers.

Tencent Cloud will integrate NVIDIAs GPU computing and deep learning platform into its public cloud computing platform. This will provide users with access to a set of new cloud services powered by Tesla GPU accelerators, including the latest Pascal architecture-based Tesla P100 and P40 GPU accelerators with NVIDIA NVLink technology for connecting multiple GPUs and NVIDIA deep learning software.

NVIDIAs AI computing technology is used worldwide by cloud service providers, enterprises, startups and research organizations for a wide range of applications.

Companies around the world are harnessing their data with our AI computing technology to create breakthrough products and services, said Ian Buck, general manager of Accelerated Computing at NVIDIA. Through Tencent Cloud, more companies will have access to NVIDIAs deep learning platform, the worlds most broadly adopted AI platform.

Tencent Cloud GPU offerings with NVIDIAs deep learning platform will help companies in China rapidly integrate AI capabilities into their products and services, said Sam Xie, vice president of Tencent Cloud. Our customers will gain greater computing flexibility and power, giving them a powerful competitive advantage.

GPU-Based Cloud Offerings for AI

Organizations across many industries are seeking greater access to the core AI technologies required to develop advanced applications, such as facial recognition, natural language processing, traffic analysis, intelligent customer service, and machine learning.

The massively efficient parallel processing capabilities of GPUs make the NVIDIA computing platform highly effective at accelerating a host of other data-intensive workloads, including advanced analytics and high performance computing.

As part of the companies collaboration, Tencent Cloud intends to offer customers a wide range of cloud products based on NVIDIAs AI computing platforms. This will include GPU cloud servers incorporating NVIDIA Tesla P100, P40 and M40 GPU accelerators and NVIDIA deep learning software. Tencent Cloud launched GPU servers based on NVIDIA Tesla M40 GPUs and NVIDIA deep learning software in December.

During the first half of this year, these cloud servers will integrate up to eight GPU accelerators, providing users with superior performance while meeting the requirements for deep learning and algorithms that involve ultra-high data volume and ultra-sized equipment.

Shares of NVIDIA closed yesterday at $107.09, down $0.98 or -0.91%. NVDA has a 1-year high of $120.92 and a 1-year low of $34.38. The stocks 50-day moving average is $106.42 and its 200-day moving average is $90.04.

On the ratings front, NVDAhas been the subject of a number of recent research reports. In a report released yesterday, B. Riley analyst Craig Ellis reiterated a Buy rating on NVDA, with a price target of $135, which implies an upside of 26% from current levels. Separately, on March 20, Goldman Sachs Toshiya Hari reiterated a Buy rating on the stock and has a price target of $130.

According to TipRanks.com, which ranks over 7,500 financial analysts and bloggers to gauge the performance of their past recommendations, Craig Ellis and Toshiya Hari have a yearly average return of 27.6% and 15% respectively. Ellis has a success rate of 73% and is ranked #39 out of 4552 analysts, while Hari has a success rate of 74% and is ranked #802.

Sentiment on the street is mostly bullish on NVDA stock. Out of 27 analysts who cover the stock, 14 suggest a Buy rating , 9 suggest a Hold and 4 recommend to Sell the stock. The 12-month average price target assigned to the stock is $116.95, which implies an upside of 9% from current levels.

NVIDIA Corp. designs and manufactures computer graphics processors, chipsets, and related multimedia software. The company operates through two segments: Graphics Processing Unit and Tegra Processor. The Graphics Processing Unit segment includes sales of the companys GeForce discrete and chipset products that supports desktop and notebook PCs plus license fees from Intel and sales of memory products. The Tegra Processors segment provides processors that deliver superior visual and multimedia experience on tablets, smart phones and gaming devices while consuming minimal power.

Go here to see the original:
NVIDIA Corporation's (NVDA) Tesla GPU Accelerators for AI Cloud Computing Adopted by Tencent Cloud - Smarter Analyst

Read More..

Assessing biotechnology in the age of cloud computing – Cloud Tech

In order to ensure that patient outcomes are constantly being improved upon it is important that the speed of change within the biotechnology sector occurs at an exponential rate. However, this continued drive for innovation puts immense pressure on IT departments to develop new technologies at speed, while also making sure that they do this cost effectively.

Add to this the fact that, more so than other industries, biotech firms are extremely tightly regulated. As a result, IT groups within this industry are often reluctant to introduce more complexity into what is already a very complex environment. To them, expanding a data centre can often feel a whole lot easier than navigating the regulations of the cloud. Despite this, growth in the demand for cloud computing in life sciences research and development is escalating due to the benefits it brings to the industry benefits like exceeding regulatory requirements, for example.

At iland, we have worked with many companies in the healthcare, life sciences and biotech industries. Therefore, we know from experience that the implementation of cloud computing in biotechnology empowers organisations with the control and flexibility needed to lead the way in both the research world as well as the businesses world. For example, we recently worked with a US based biotechnology organisation on their backup and disaster recovery (DR) strategy, and were able to drive global data centre consolidation with host-based replication to the iland cloud. As a result, their DR testing and auditing processes were greatly simplified and streamlined which drove significant cost savings as well as compliance assurance.

If you still need convincing here are three key benefits that we believe cloud brings to biotech organisations:

When the Human Genome Project began it was one of the most extensive research projects in the field to date costing billions of pounds and lasting over a decade. These days, thanks largely to cloud technology, it can bedone in just 26 hours. Things such as drug R&D, clinical research as well as a whole host of other areas have benefited just as much from the rapid growth of computational power. The better your technology is at crunching huge sets of data, the quicker you can innovate.

Cloud computing within the biotech sector can take big data analysis to the next level by means of performance, connectivity, on-demand infrastructure and flexible provisioning. Labs can also benefit from immense computing power without the cost and complexity of running big onsite server rooms. They can also scale up at will in order to make use of new research and ideas almost instantly.

Concerns have been voiced that so called scientific computing in the cloud may make results less reproducible. One concern is that cloud computing will be a computing 'black box' that obscures details needed to accurately interpret the results of computational analyses. In actual fact, by leveraging the application program interfaces (APIs) in the iland cloud, biotech customers are able to integrate cloud data back into on-premises IT systems to ensure that data analyses done in the cloud can be easily shared and consumed by other applications. Essentially, cloud computing services bring more players to the table to solve the giant puzzle. Its a win-win situation from an economic and patient standpoint, and several big name companies are jumping on the biotech cloud bandwagon.

Biotech companies need to maintain strong access and authentication controls, while also being able to collaborate easily.For this reason audit trails and other measures are often required to verify that information has not been improperly altered, and that good experimental and manufacturing procedures have been followed. At the same time biotechnologists need to be able to access and share data across multiple departments or even multiple companies.

Cloud computing in biotechnology makes this all possible. Theiland cloud, for instance, centralises data, ensuring security and data sovereignty while facilitating collaboration. It supports extensive user and role based access control, two-factor authentication and integrity monitoring to prevent improper access and changes. In addition to data encryption, vulnerability scanning and intrusion detection, these measures facilitate security and compliance, without disrupting the internal workflow.

Complex regulatory requirements and logistics combined with niche markets make efficiency paramount within biotechnology. Even minor mistakes as a result of sloppy process management can easily result in major issues. Real-time operational reporting dramatically improves efficiency, quality control and decision making, allowing organisations to react instantly to challenges and opportunities, both internal and external.

As well as enhanced billing visibility and resource management functions, the release of our latest Secure Cloud Services means that the iland cloud now includes on-demand security and compliance reports. This advanced cloud management functionality is designed to foster strategic, self-sufficient control of a cloud environment, optimising overall cloud usage and costs to drive business initiatives and growth.

Without a shadow of a doubt, cloud technology can help biotechnology companies build the future.From research and development to marketing, computing affects everything your organisation does. With rich experience in the biotech, healthcare and life sciences sector, you should talk to iland today to find out how our cloud hosting services can give you the power to develop at the speed of thought, not the speed of compliance or processing.

Read more: Why the cloud could hold the cure to diseases

Go here to see the original:
Assessing biotechnology in the age of cloud computing - Cloud Tech

Read More..

HOSTING Acquires Stelligent Systems to Boost AWS Offerings – Talkin’ Cloud

Brought to you by The WHIR

Managed cloud services provider HOSTING has acquired Stelligent Systems to add DevOps automation and continuous delivery capabilities for AWS.The financial terms of the deal were not disclosed.

Stelligent's technology will be integrated with HOSTING's managed and professional services platforms to broaden its support for mid-size and enterprise organizations developing and hosting applications inAWS,according to a Tuesday announcement.As part of the integration, Stelligent co-founders Paul Duvall and Rob Daly will become CTO and executive vice president of public cloud consulting for HOSTING, respectively.

Stelligent is an Advanced Consulting Partner in the AWS Partner Network, helping clients with continuous application deployment on AWS. These capabilities extend HOSTING's services for AWS customers to the entire application lifecycle, the company says.

Stelligent has been a visionary force in the DevOps market since its inception and has cultivated a staff of experts with a rare and specialized skillset wholly focused on continuous delivery in the AWS Cloud, Joel Daly, HOSTING CEO said in a statement. The addition of this depth of talent to the HOSTING suite of services will afford our customers even more opportunities to achieve significant ROI from their public cloud deployments.

Daly succeeded HOSTING co-founder Art Zeile as CEO back in February 2016.

In a letter to customers on its website, Stelligent said,"Simply, we will be able to do more and serve you better. The combination of DevOps Automation with managed services represents an advanced model of solution delivery within the public cloud. Now, the same expert team that develops, migrates and automates your application will also manage, monitor and secure it. As you have come to expect, your end-to-end solution will be architected and implemented by experts in leveraging the full capabilities and business benefits of AWS."

HOSTING was rumored to be looking for a buyer in late 2015, as one of relatively few mid-tier providers in the managed hosting market. The company says that the acquisition of Stelligent is part of a move to focus on full lifecycle solutions in public cloud environments, including Azure in addition to AWS.

"The combination of HOSTING and Stelligent will create even greater value for customers by guiding their success throughout the application lifecycle, Charles Cole, executive director, Digital Media Group, at Sony Pictures Entertainment said.

Original post:
HOSTING Acquires Stelligent Systems to Boost AWS Offerings - Talkin' Cloud

Read More..

Paper Spells Out Tech, Legal Options for Encryption Workarounds – Threatpost

1.5M Unpatched WordPress Sites Hacked Following Vulnerability Disclosure

February 10, 2017 , 11:45 am

February 8, 2017 , 8:21 am

January 30, 2017 , 4:48 pm

February 14, 2017 , 3:44 pm

March 23, 2017 , 11:16 am

March 22, 2017 , 11:08 am

March 20, 2017 , 1:20 pm

March 17, 2017 , 11:00 am

March 14, 2017 , 8:56 am

March 10, 2017 , 10:51 am

March 9, 2017 , 12:25 pm

March 8, 2017 , 11:02 am

March 6, 2017 , 2:27 pm

March 2, 2017 , 11:25 am

March 1, 2017 , 11:47 am

February 28, 2017 , 12:22 pm

February 24, 2017 , 10:48 am

February 23, 2017 , 1:17 pm

February 22, 2017 , 1:41 pm

February 21, 2017 , 1:02 pm

February 15, 2017 , 7:00 am

February 13, 2017 , 11:00 am

February 3, 2017 , 11:20 am

February 2, 2017 , 2:57 pm

January 26, 2017 , 11:16 am

January 23, 2017 , 8:52 am

January 20, 2017 , 11:50 am

January 17, 2017 , 11:00 am

January 13, 2017 , 10:00 am

January 11, 2017 , 4:40 pm

January 10, 2017 , 11:28 am

January 6, 2017 , 12:00 pm

January 4, 2017 , 2:01 pm

January 3, 2017 , 4:28 pm

December 29, 2016 , 11:30 am

December 22, 2016 , 6:00 am

December 19, 2016 , 1:42 pm

December 13, 2016 , 3:27 pm

December 12, 2016 , 1:47 pm

December 9, 2016 , 11:00 am

December 8, 2016 , 9:15 am

December 6, 2016 , 11:24 am

December 5, 2016 , 2:10 pm

December 1, 2016 , 12:00 pm

November 30, 2016 , 12:44 pm

November 28, 2016 , 3:30 pm

November 8, 2016 , 2:57 pm

November 1, 2016 , 5:50 pm

October 29, 2016 , 6:00 am

October 27, 2016 , 4:27 pm

October 25, 2016 , 3:00 pm

October 22, 2016 , 6:00 am

October 21, 2016 , 10:01 am

October 20, 2016 , 7:00 am

October 18, 2016 , 4:58 pm

October 14, 2016 , 9:00 am

October 5, 2016 , 8:51 am

October 3, 2016 , 5:00 am

September 26, 2016 , 10:45 am

September 22, 2016 , 3:47 pm

September 22, 2016 , 12:31 pm

September 20, 2016 , 2:41 pm

September 15, 2016 , 11:15 am

September 13, 2016 , 9:14 am

September 9, 2016 , 2:06 pm

September 8, 2016 , 3:43 pm

September 2, 2016 , 9:00 am

September 1, 2016 , 1:08 pm

August 29, 2016 , 9:58 am

August 24, 2016 , 5:53 pm

August 24, 2016 , 8:00 am

August 17, 2016 , 4:06 pm

August 17, 2016 , 12:58 pm

August 8, 2016 , 1:40 pm

August 4, 2016 , 3:26 pm

August 4, 2016 , 10:00 am

August 3, 2016 , 10:00 am

August 2, 2016 , 9:00 am

July 29, 2016 , 10:45 am

July 26, 2016 , 9:30 am

July 25, 2016 , 3:51 pm

July 21, 2016 , 1:18 pm

July 20, 2016 , 9:21 am

July 15, 2016 , 11:00 am

July 14, 2016 , 1:05 pm

July 12, 2016 , 11:40 am

June 30, 2016 , 11:48 am

June 28, 2016 , 10:00 am

May 31, 2016 , 5:44 pm

May 31, 2016 , 1:37 pm

March 10, 2016 , 10:23 am

March 22, 2017 , 1:45 pm

March 4, 2017 , 8:00 am

February 3, 2017 , 3:03 pm

February 3, 2017 , 8:36 am

The rest is here:
Paper Spells Out Tech, Legal Options for Encryption Workarounds - Threatpost

Read More..

Is encryption one of the required HIPAA implementation specifications? – TechTarget

Is encryption one of the required HIPAA implementation specifications?
TechTarget
To further cloud the issue, the U.S. Department of Health and Human Services (HHS) states on its website that encryption is not mandatory in the HIPAA Security Rule if the implementation of encryption is not "reasonable and appropriate." However, there ...

Read more from the original source:
Is encryption one of the required HIPAA implementation specifications? - TechTarget

Read More..

NeuVector Announces Container Visualization, Encryption, and Security Solution for NGINX Plus – DABCC.com

NeuVectors unique network-layer visibility and run-time protection combines with NGINX Plus security capabilities to safeguard business-critical container applications

NeuVector, which delivers continuous network security for containers, today announced support for NGINX Plus security capabilities into the NeuVector console.

NGINX Plus, the enterprise-grade application delivery platform from NGINX, Inc., extends open source NGINX software with advanced features for container applications such as load balancing, service discovery, and application resiliency. Complementarily, NeuVector adeptly provides the network layer visibility and security needed to oversee east-west container-to-container traffic. This is traffic that routinely crosses hosts and data center boundaries, presenting an ever-increasing concern as microservices deployment growth continues.

Providing support for NGINX Plus alleviates the issues and conflicts commonly faced when security features from different vendors overlap, instead achieving simple and effective visualization of those container connections that utilize NGINX Plus to encrypt container-to-container sessions. With NeuVector and NGINX Plus working in tandem, any attempt to bypass an NGINX Plus encrypted tunnel is instantly detected and addressed by NeuVector. At the same time, NeuVector automatically recognizes and monitors those connections not encrypted by NGINX Plus, protecting against threats or violations to those containers.

The NeuVector solution a container itself can be deployed to protect running (or brownfield) container applications as well, offering a layered security solution with NGINX Plus. Once NeuVector is deployed and the application receives traffic, the NeuVector console displays a visual map of all containers, applications, and network connections involved including indications of which containers are secured by NGINX Plus-encrypted SSL tunnels. This visualization offers quick insights into application behavior and the security of each container.

NGINX Plus provides the enhanced security controls, and monitoring and management capabilities, for delivering microservices at scale, said Paul Oh, Head of Business Development for NGINX, Inc. NeuVectors visualization of NGINX Plus security capabilities helps enterprises manage therisks associated with deploying containers in production.

The NeuVector zero-configuration solution will automatically recognize expected normal behavior in the network connections it oversees. For connections between application containers that are not encrypted by NGINX Plus, NeuVector performs automated segmentation and deep packet inspection, and then makes an informed determination as to whether those connections should be allowed. In this way, NeuVector blocks only suspicious container traffic, while safe traffic continues to the container unaffected. To complete its run-time protection suite, NeuVector also provides real-time threat detection and vulnerability scanning for hosts and containers.

Continuously defending container applications from active threats requires effective security solutions that have their eyes open, said Fei Huang, CEO, NeuVector. Too often, though, implementing security solutions from multiple providers is a reliable recipe for conflicts and IT frustration. Were proud to provide valuable visualization of the security and encryption that NGINX Plus makes available to enterprises, and to seamlessly complement that security with NeuVectors own threat detection and prevention capabilities. The result gives businesses a much more complete ability to view oncoming threats and to protect their critical container applications.

Resources

About NeuVector

NeuVector delivers a Docker container network security solution with a zero-configuration policy that adapts to the changing environment and secures containers during run-time. Founded by industry veterans from Fortinet, VMware, and Trend Micro, NeuVector has developed patent-pending behavioral learning for containers with the vision of simple, scalable network security for containers.

Here is the original post:
NeuVector Announces Container Visualization, Encryption, and Security Solution for NGINX Plus - DABCC.com

Read More..

Arsenal fan plots sensational crowdfunding campaign to BUY the club from owner Stan Kroenke – The Sun

Gooner lookingto raise funds of 904m in order for the club's supporters to take over the running

AN ARSENAL fan is taking matters into his own hands in an attempt to BUY OUT the clubs majority shareholder Stan Kroenke.

Speaking on Reddit, the supporter has proposed a remarkable crowd funding campaign to buy out the Americans shares to hand ownership to followers of the club.

Reuters

Working on a value of 904m, user lifeshard92 explains: We have an estimated number of fans of 27 million worldwide.

Now Im not saying all of them are going to fund this little enterprise.

But thinking of this practically, if one million gave 1,000 less than the cost of a season ticket we would be in the position to buy him out by over 100m, with a bid of 1bn on his valuation.

He added: If we were successful, I think the possibilities of us owning the club are endless.

With 200 then given by these owners, we would be able to fill the kitty up with a 200m transfer budget should we so wish.

Getty Images

PA:Press Association

News Group Newspapers Ltd

Discontent is growing among the Arsenal supporters as pressure grows on the clubs manager Arsene Wenger and the owners.

Many Gooners believe that they are prioritising financial gain over trophies, with only two FA Cup wins being their only successes since 2004.

More here:
Arsenal fan plots sensational crowdfunding campaign to BUY the club from owner Stan Kroenke - The Sun

Read More..

Bitcoin scams: Beware of crooks trying to steal your cryptocurrency with these schemes – ZDNet

Bitcoin is a popular currency for cybercriminals to trade in.

Cybercriminals are taking advantage of the rising price and popularity of Bitcoin to try to steal the currency and distribute malware.

The cryptocurrency has become invaluable to cybercriminals who exploit its anonymous, decentralised nature as a tool for demanding ransomware payments and laundering various other ill-gotten gains.

This month social media Bitcoin scams have reached a new high, with over 125 million malicious links across Twitter, Facebook, and Instagram designed to attack victims and extort Bitcoin.

These Bitcoin scams target social media because it's full of people who might be interested in buying and selling Bitcoin, but don't know much about it -- making them prime targets to be taken advantage of by scammers.

In a report detailing the spike in this cybercriminal activity, researchers at ZeroFOX have identified four main categories for these scams, each using different methods to steal Bitcoin and carry out other cybercrimes.

1. Malware hidden in fake Bitcoin wallets

The nature of social media means that users click on what they perceive to be interesting links -- and the chance of an easy way of getting Bitcoin might be enough to catch some users. Cybercriminals know this and are luring Twitter users into following links which distribute malware.

Not only could users find that their details are potentially compromised by cyberthieves, or their device roped into botnet, but also the cybercriminals will generate revenue from successfully luring victims into clicking these links.

The lesson here is that if an offer on social media sounds too good to be true, it usually is -- especially if it's coming from an anonymous or default account.

2. Bitcoin phishing

Cybercriminals are posing as legitimate Bitcoin services, impersonating brands in order to gain trust from victims. Behind these veneers of credibility are phishing websites which entice users to enter their Bitcoin keys. But once the key is entered, the hacker is able to freely spend from the victim's wallet.

3. Bitcoin 'flipping'

Many people buy Bitcoin in the hope that it'll go up in value and they can make a profit by selling it at a later date. Impatient investors often turn to Bitcoin flipping schemes in attempt to make a quicker profit.

Typically, these schemes offer to rapidly increase a user's investment -- for a fee. Cybercriminals are taking advantage of this by distributing links on social media, which claim they'll flip Bitcoins, but the real intention is stealing from those naive enough to make payments via links they've found on social media.

4. Pyramid schemes

The final Bitcoin scam experiencing a spike in popularity is the classic pyramid scheme.

Cybercriminals encourage people to sign up to a scheme with a low initial investment -- then reap rewards when they sign up new members to the scheme. It doesn't take long for hundreds of people to have handed over a payment, at which point the original scammer walks away -- taking a wedge of ill-gotten Bitcoin gains with them and leaving victims out of pocket.

The total number of social media URLs sharing links to these four types of scams came to 126,276,549, say cybersecurity researchers at ZeroFOX, with 3,618 unique scams identified. The high number of scams suggests that botnets are being deployed in order to spread links.

Scammers, be they peddling Bitcoin or otherwise, love social media for all the same reasons modern brand marketers do. They can reach any target demographic across the globe by choosing the right hashtag, said Phil Tully, senior data scientist at ZeroFOX.

"The ease of use has never been simpler, the cost has never been lower, and the power and scale has never been greater. For a cybercriminal, it's the new superhighway for illicit activity; billions of victims, lacking security controls and uninhibited access," he added.

VIDEO: Social media Bitcoin scams hit new high

Continued here:
Bitcoin scams: Beware of crooks trying to steal your cryptocurrency with these schemes - ZDNet

Read More..

Ctera Networks prepares for rise of multicloud adoption – TechTarget

Ctera Networks' CEO, Liran Eshel, predicts enterprises will broaden their cloud strategies in 2017 to include multiple providers and increase security following recent hacks of major sites and escalating ransomware attacks.

Every cloud storage option has its pros and cons. Depending on your specific needs, the size of your environment, and your budget, its essential to weigh all cloud and on-prem options. Download this comprehensive guide in which experts analyze and evaluate each cloud storage option available today so you can decide which cloud model public, private, or hybrid is right for you.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Eshel, who founded the enterprise file services platform and cloud storage gateway vendor in 2008, has been forging partnerships with larger companies to prepare for the rise of multicloud strategies.

Ctera Networks this month joined Hewlett Packard Enterprise's HPE Complete Program. The program enables HPE and its resellers to sell a validated HPE and Ctera system and support through a single contract. The HPE relationship represents the second significant partnership for Ctera Networks over the last six months. A partnership formed with IBM in late 2016 facilitated the use of Ctera products with IBM Cloud Object Storage and the IBM Cloud.

Ctera Networks' software is infrastructure-agnostic, although most customers use its software packaged on a hardware appliance because it's better integrated and easier to use, according to Eshel. He said Ctera Networks' customer base spans cloud service providers, government agencies, financial service firms and insurance companies, and it includes the U.S. Department of Defense, Santander Bank and Telefonica.

SearchCloudStorage recently caught up with Eshel to discuss customer and industry trends, and to take stock of Ctera Networks' progress and the competitive landscape.

Ctera used to get categorized with the cloud storage gateway products that analysts predicted would go away once major storage vendors picked up the functionality. How have you had to evolve your product and add functionality to stay a step ahead?

Liran Eshel: The space of enterprise file services has evolved for decades around the traditional players, like NetApp, EMC, Microsoft, where you have systems like NAS and SharePoint. The space of cloud-based file services is much newer; maybe we could say 5 years old. And, naturally, you don't close the gap that was built by decades of enterprise software development in two or three years. It takes a bit of time.

The first implementations were point solutions. People [said]: 'Here is a sync-and-share solution. Here is a backup solution. Here is a gateway solution.' But, in order to be a serious player in this market and to provide an alternative to an enterprise and say, 'Hey, we'll be able to transform all your files into this cloud-based file services system,' you cannot just come with point solutions.

They don't need just one use case. They need to have a unified system that can address and replace the traditional enterprise storage systems that they used to use before. That's the approach of Ctera -- being a unified platform addressing the full continuous enterprise needs in that space.

If you look at Ctera just as a gateway company, you're missing the point. Sure, an enterprise needs gateways, but it's not enough. If you look at Ctera just as a sync-and-share solution, it's nice, but it's not enough. What do you do about data protection? What do you do about remote sites? If you look at having all three together -- sync and share, backup and gateways over a common multicloud file system -- then you see Ctera.

Who are your competitors? Who do you see in deals?

Eshel: Most of the time, it's replacing traditional -- so it could be NAS technology, Windows servers, traditional backup software. Most of the market is still based on these technologies. There is huge displacement that's being done from traditional backup and traditional NAS systems to cloud-based systems like ours.

There are also newer, younger cloud-based companies in this space. You have gateway vendors, like Panzura and Nasuni; you have backup vendors, like Druva.

Do your enterprise customers want to move all of their data to the cloud, or only some of it?

Eshel: From what we see, moving everything is not practical. Obviously, they want to move significant parts of the data, but one cloud is not enough. What we see is usually a requirement to have a multicloud environment where they have at least two options with cloud infrastructure, as well as an on- prem. So, you would see two clouds and a private data center.

The split of how much data would be migrated into the cloud depends on the organization. An organization that's more cloud-ready could move something like 60% to 80%. An organization that has much more legacy would maybe be at 20% to 30%.

If you look at Ctera just as a gateway company, you're missing the point. Sure, an enterprise needs gateways, but it's not enough. Liran EshelCEO, Ctera Networks

What type of data are they moving?

Eshel: We focus more on the unstructured data, which makes up about 80% of all enterprise storage and is the fastest-growing area of enterprise storage. With unstructured [data], it's sometimes easier to move to the cloud because the I/O is less intensive. It could be from user files, logs, applications generating unstructured content, data analysis and things like that.

And it's generally file-based data?

Eshel: Yes, files make up a large part of it. We have home folders, project shares, archives, backup -- all these sorts of things. Because the basic component of cloud infrastructure in terms of storage is usually block and object, Ctera basically allows you to store files on top of an object cloud storage system. So, you can use Amazon S3 [Simple Storage Service], [Microsoft] Azure object storage or the [IBM] SoftLayer object storage. And, basically, using Ctera, we can store files while preserving permissions, ACLs [access control lists] and all of that. We provide full preservation of the access control lists while migrating file structures to object in the cloud.

Most major storage vendors have been adding features to work with clouds. What do you offer that vendors such as NetApp don't?

Eshel: First of all, we are in more than file servers, which means that the interface is not just the traditional CIFS/NFS. We have a modern interface with the file system share with mobile, user collaboration -- all the features that you would expect from a modern file service.

The second thing has to do with the native integration with cloud. You run a NetApp system in Amazon. We, on the other hand, can run off the Amazon object storage directly. So, all the data is stored in object storage, which is significantly less expensive and much more scalable than the way that NetApp is doing it. We can also do it in a multicloud environment, where you basically could connect to two different clouds. I'm not just talking about NetApp. I'm talking to any traditional NAS system as an alternative.

Are you concerned that the major storage vendors will start picking up more of the functionality that you offer?

Eshel: We actually partner with the traditional NAS vendors. We partner with [HPE], IBM, NetApp, because we provide them a software platform that allows us to provide the modern file service that they don't have. From what we see right now, there are big investments being done in object storage, where you see IBM acquiring Cleversafe. You see [HPE] partnering with Scality. NetApp is also investing in object storage technology. And that's complementary to Ctera, because we basically can interface with these object storage systems and provide a combined solution.

What are the most significant customer trends we can expect to see this year?

Eshel: First of all is security. People realize the security risks of cloud are very significant. And the recent hacks -- basically thefts from services like Yahoo, Dropbox, where basically millions and hundreds of millions of accounts were compromised -- I think caused enterprises to pause and to rethink their cloud strategies. Are they willing to move their data to a cloud where the cloud provider manages all the keys and the encryption and the user credentials? And what does it mean if the cloud provider gets hacked? That's one thing that we see.

It's also very closely tied to ransomware, where people are paying a penalty with these hacks. If someone gets access to your credentials, they can basically encrypt the lock and the files of the organization, and it's a file hostage situation, which could be very, very expensive and risky. Customers are looking for more secure solutions where they can control the key management and the encryption and be less vulnerable to such attacks.

The second thing we see is multicloud, where customers are looking for a unified solution that doesn't lock them to just one cloud provider. It gives them the option to control where data is stored -- what stays in the data center and what goes to which cloud provider. It also is tied to regulation and compliance and data sovereignty.

How are you addressing the security concerns?

Eshel: What we say is, 'Here is your virtual private platform. It's not shared with other customers. All the metadata and encryption keys remain with you.' And the entire system can be inside your firewall and inside your VPN. So, for someone to penetrate and access your files, they will need to penetrate your filer, which is equivalent to penetrating to your network ... Just doing encryption is not enough. Many of these services that were hacked in the last year, they're encrypting. But the question is not if you encrypt; it's where do you keep the keys, and who can have access to your keys, and who can have access to your data.

Cloud storage trends in 2016

Using enterprise file sync and share

Stand-alone EFSS market remains viable

See the original post:
Ctera Networks prepares for rise of multicloud adoption - TechTarget

Read More..

Cloud Computing: Software patent claims and the risks to service availability – ITProPortal

As the public cloud services market continues to mature and grow up from $178bn in 2015 to $209bn in 2016 according to research company Gartner - the concentration of computing resources into cloud data centres is increasingly attracting the attention of Non-Practising Entities (NPEs) as a target for patent litigation. At a time when data security and privacy risks are front of mind for cloud service providers (CSPs) and their users, the intellectual property (IP) risks to cloud service availability posed by NPE patent claims are rising up the business agenda.

NPEs are businesses that assert patents through litigation to achieve revenues from alleged infringers without practising or commercialising the technology covered by the patents they hold. NPEs are uniquely well placed to monetise their patents at each stage of the litigation cycle. They have access to capital and all necessary forensic and legal resources; and an NPE doesnt practise its patents so is immune to a counterclaim that a defendant might otherwise be able to bring against a competitor, or a cross-licence that the defendant could otherwise offer.

NPEs activities may attract attention as arbitraging the patent system, but that is to miss the point: the defendant in a patent claim brought by an NPE generally has an unattractive real-world choice between the cost and distraction of litigation and the cost of settlement which, whilst low in relation to likely litigation costs, is high relative to the perceived merits of the claim.

According to the PwC 2016 Patent Litigation Study, software ranks in the top 5 US industries for patent claims, with NPE claims accounting for half the total. Whilst recent US cases have made it more difficult to patent and enforce computer-implemented inventions, cloud-based software patent litigation is increasing: NPEs appear to have doubled down over the last five years, acquiring more cloud patents for their armoury as well as filing more patent cases.

From the NPEs standpoint this makes sense. Claiming that software in the CSPs PaaS (Platform as a Service) or IaaS (Infrastructure as a Service) infringes the NPEs patents can be an efficient way to threaten alternative objectives: the CSP risks an injunction stopping it from using the software that embodies the patented technology; and the CSPs customers using that software also face disruption as they may be liable both for their own workloads and for their CSPs infringing code that they use.

In fact, there is anecdotal evidence to suggest that claimants may prefer to claim against a CSPs customers rather than the CSP itself. Australian patent holder Global Equity Management SA (GEMSA) was reported in February and June 2016 to have sued a number of Amazon Web Services (AWS) customers for infringement of GEMSAs patents. The CSP customers in the GEMSA litigation are large, IP sophisticated companies, but most CSP customers usually will have less experience of cloud IP, will be eager to settle to make the claim go away and (unlike the CSP itself) will have little interest in solving the problem for others.

This last point is borne out in the GEMSA litigation where AWS is reported to have claimed against GEMSA in July 2016 seeking invalidity of two of GEMSAs patents, noting in its claim that GEMSA has specifically targeted technology of AWS and that AWS has a direct and substantial interest in defeating any patent infringement claims relating to AWS services identified by GEMSA in its complaints and infringement contentions.

From the CSPs standpoint all this is bad enough, but software patent risks are further exacerbated by increasing use of open source software (OSS) in the cloud. OSS, long in the mainstream, now commonly powers cloud computing systems. OSS developments are created by communities of individual developers. With no single holder of software rights, patent infringement issues are unlikely to be top of mind, and if they are, developers will generally lack the resources to help them navigate the risks. Simply because they are open, OSS developments and communities are easier targets for NPEs than proprietary software as they dont need to go to the same lengths to discover potential infringement. The softness of the target increases risk for CSPs using OSS and their users.

Cloud software patent risk is evident and growing, so it is perhaps surprising that it has figured so little in the register of perceived risks up to now, especially when data protection, privacy and information security figure so high. Yet an unsettled cloud software patent claim runs risks to cloud service availability that are arguably of the same order as information security risks. The reason why cloud computing IP risks have had little public airing so far is probably that, while implicitly acknowledged, they have yet to be thoroughly expressed and articulated. For example, in UK financial services, now one of the most heavily regulated sectors, cloud computing is treated as outsourcing and in its cloud guidance, the FCA (Financial Conduct Authority, the UK regulator) states that regulated firms should, amongst other things: monitor concentration risk and consider what action it would take if the provider failed .

IP risks are not called out expressly but the guidance is clear that firms must identify, assess and plan for all relevant risks including service availability failure, which could of course crystallise due to IP risks. NPEs are arming for offensive patent action in the cloud, stocking up their armouries and probing for weakness and opportunity. Cloud software patent risks are likely to become increasingly prominent for CSPs, cloud users and regulators alike.

Image Credit: TZIDO SUN / Shutterstock

View post:
Cloud Computing: Software patent claims and the risks to service availability - ITProPortal

Read More..