Page 4,430«..1020..4,4294,4304,4314,432..4,4404,450..»

Microsoft Probes Cause of Global Web Outage – MSPmentor

Microsoft technicians today continued to search for the cause of a massive outage that disrupted user access to Office 365, Skype, Xbox Live and otheronline services, in some cases for more than 16 hours.

The outage, which affected large swaths of the U.S. and Europe, was the second this month of Microsofts online services, though a disruption on March 7 only lasted about an hour.

This weeks disruption began Tuesday, about 1:15 p.m. U.S. Eastern Time, and was declared resolved at 5:50 a.m. ET.

We've monitored the infrastructure and have confirmed that restarting the affected systems remediated impact, Microsoft said on the Office 365 status page.

The longest-running disruption involved the Office 365 OneDrive file-hosting service.

In some cases, after signing in to OneDrive, users were unable to access their content, that status report said. As the issue was intermittent in nature, users may have been able to reload the page or make another attempt successfully.

An initial attempt to restore OneDrive was unsuccessful.

We've determined that the previously resolved issue had some residual impact to the service configuration for OneDrive, Microsoft said in a status update Tuesday afternoon. We're performing an analysis of the affected systems to determine what further steps are needed for full recovery.

At the height of the outage, those affected were unable to access Outlook email.

Users may be intermittently unable to sign in to the service, that advisory said. As the issue is intermittent in nature, users may be able to reload the page or make another attempt successfully.

Its unclear precisely how or if the outage was connected to a disruption Tuesday of Microsofts Azure cloud, during the same time.

Between 17:30 and 18:55 UTC on 21 Mar 2017, a subset of Azure customers may have experienced intermittent login failures while authenticating with their Microsoft Accounts, reads the advisory on the Azure status page.

This would have impacted the ability for customers to authenticate to their Azure management portal (https://portal.azure.com), PowerShell, or other workflows requiring Microsoft Account authentication, it continued. Customers authenticating with Azure Active Directory or organizational accounts were unaffected.

Microsoft deployed a patch to end the 85-minute outage and work continued today to figure out exactly what happened.

Engineers will continue to investigate to establish the full root cause and prevent future occurrences, Microsoft said.

Send tips and news to MSPmentorNews@Penton.com.

Read the original:
Microsoft Probes Cause of Global Web Outage - MSPmentor

Read More..

Microsoft Wants to Help MSPs Win in Era of Hybrid Cloud and Digital Transformation – Talkin’ Cloud

Microsoft is hosting its 13th annual Cloud and Hosting Summit this week in Bellevue, Wash., bringing together nearly 500 partners across different business models to explore digital transformation at work.

The conference kicked off with a presentation from Aziz Benmalek, Microsoft VP of worldwide hosting & managed service providers on Wednesday, who shared some findings from a survey it conducted recently with 451 Research.

When it comes to end-customer cloud transformation projects, service providers are vital, Benmalek says, and 89 percent of customers said they are willing to pay a hefty premium to have a service provider help them manage and implement their hybrid cloud.

That puts you at the center of the opportunity as we move forward, Benmalek said.

Benmalek told the audience that Microsoft has seen double-digit growth in its Hosting & Managed Services over the past five years.

This ecosystem is one of the fastest growing channels [for Microsoft], Benmalek told Talkin Cloud in an interview. All signs are showing continued growth in that space.

Amy Hood, Microsoft CFO, said that the companys hosting and cloud partners have helped it get to where it is today.

You have lots of people you could partner with and were deeply thankful that you partner with us, Hood told the audience at Microsoft Cloud & Hosting Summit 2017.

Partners with region-specific, vertical-specific, and business process-specific knowledge help Microsoft reach customers they wouldnt be able to on their own, she added.

We will never have that depth of knowledge that you all have, she says. Our job is to empower people and organizations to do more empowering you all to take your IP and your knowledge and be more successful.

Microsoft, 451 Research Report Highlights Demand for Hybrid Cloud, Managed Services

For the third year in a row, Microsoft commissioned 451 Research to conduct a report. This years version, Digital Transformation Opportunity for Service Providers: New Paths to Beyond Infrastructure looked at the opportunities around hybrid cloud and managed services.

We have tens of thousands of partners from around the world that are delivering hybrid solutions, Benmalek said in an interview. Hybrid business is here and growing from a customer demand point of view.

According to the study, for North American respondents, top adoption drivers of hybrid cloud include flexibility and choice, extending IT resource capacity of existing on-premise infrastructure, and maximizing ROI on existing on-prem IT investments while being able to use public cloud for new applications and workloads.

These new hybrid environments are becoming more complex and pushing customers to lean more heavily on service providers to provide managed services.

Managed services are becoming king, Benmalek said. Customers are looking for service providers to run the whole stack for them, including looking for managed services around DevOps, end-to-end application management, proactive capacity planning, and more, he said.

So who are the service providers that are going to win the most from organizations looking for these types of managed services? According to Microsoft and 451 Research, 57 percent of North American respondents said they would rely on an MSP or a managed hosting provider, 54 percent a public cloud IaaS provider, 53 percent a security service provider, and 51 percent would look for a consulting/IT outsourcing/systems integrator to help them in their hybrid/multi-cloud journey.

North American respondents were split on the number of service providers or vendors they would like to work with on hybrid cloud. Thirty-nine percent said that they would like to obtain hybrid cloud by purchasing individual services from multiple providers and vendors, while 36 percent said they would look for an integrated multi-vendor solution built and managed by one service provider.

Last year, the five most popular managed services were backup and recovery, archiving, infrastructure/application monitoring and alerting, disaster recovery, and managed networking and CDN. In 2017, the most popular services will be similar, except for the addition of premium 24/7 support services, suggesting service providers like Rackspace are on to something.

According to the report, organizations will also be increasingly looking for professional services to help them reach their goals around digital transformation, including integrating legacy business processes and systems with SaaS functionality, and modernizing applications.

Here is the original post:
Microsoft Wants to Help MSPs Win in Era of Hybrid Cloud and Digital Transformation - Talkin' Cloud

Read More..

Research project successful: Volkswagen IT experts use quantum … – Automotive World (press release)

The Volkswagen Group is the worlds first automaker to intensively test the use of quantum computers. Volkswagen is cooperating with leading quantum computing company specialist D-Wave Systems. At CeBIT 2017, the two companies today announced their cooperation. In a first research project, IT experts from Volkswagen have already successfully developed and tested a traffic flow optimization algorithm on a D-Wave quantum computer.

Dr. Martin Hofmann, CIO of the Volkswagen Group, said: Quantum computing is the next generation of supercomputing and can bring us tremendous progress in all key areas of IT and digitalization. In strategic cooperation with D-Wave, we are learning to make effective use of the strengths of a quantum computer. We are taking a further major step towards the digital future of the Volkswagen Group.

Robert Bo Ewald, President of D-Wave International, said: In a short period of time the experts at Volkswagen were able to successfully create and test an algorithm on our quantum computer for an important type of optimization problem. We look forward to seeing great progress in the future as they apply their automotive and data science expertise to increasingly difficult real-world problems.

In the first research project, data scientists and big data experts from Volkswagen, working with data from 10,000 public taxis in Beijing, have successfully shown that they can optimize traffic flow in the mega-metropolis using a quantum computer. Further projects are to follow in the course of cooperation with D-Wave. Initially, the main focus is on the further development of specialist expertise and entrepreneurially meaningful applications.

Dr. Florian Neukart, Principal Data Scientist at the Volkswagen Group IT Code Lab in San Francisco, said: Our first traffic flow optimization project in Beijing successfully shows how an algorithm on a quantum computer can guide vehicles in a metropolis in such an intelligent way that congestion is avoided. The results give us confidence for further applications on the quantum computer. We place considerable emphasis on the open source approach. Our work is to be transparent and to allow verification by third parties.

The Volkswagen Group is the first automaker to work intensively with quantum computing technology. Group IT expects a wide range of application possibilities especially in the areas of autonomous driving, the robotic enterprise (AI-supported process control), the smart factory, machine learning and intelligent mobility solutions.

Quantum computers can solve highly complex problems many times faster than conventional supercomputers. The computing principle of a quantum computer is especially well-suited for this project because it natively solves optimization problems. In simplified terms, an optimization problem considers how a specific resource (such as time, money or energy) can be used in the best possible way in a certain scenario. The complexity of the task and therefore the computing capacity required grow exponentially with the number of factors to be considered, taking conventional digital computers to their limits.

More here:
Research project successful: Volkswagen IT experts use quantum ... - Automotive World (press release)

Read More..

In a few years new Quantum computers from IBM, Google and Microsoft will accelerate breakthroughs in chemistry and … – Next Big Future

IBM and Google both aim to commercialize quantum computers within the next few years (Google specified five years.)

Quantum computers will be more powerful than conventional computers for problems like efficient routing for logistics and mapping companies, new forms of machine learning, better product recommendations, and improved diagnostic tests.

The first universal quantum computers will be used for simulating molecules and reactions. Early, small quantum computers are ideally suited for chemical and molecular simulation.

Simulating the quantum effects that shape molecular structures and reactions is a natural problem for quantum computers, because their power comes from encoding data into those same challenging quantum states. The components that make up quantum computers, known as qubits, can use quantum-mechanical processes to take computational shortcuts impossible for a conventional machine.

Microsoft is betting on a less mature form of quantum hardware than IBM and Google but it has one of the most advanced efforts to develop practical quantum algorithms. Chemistry and materials science are among of its primary areas of focus. The groups researchers have recently tried to show how hybrid systems in which a conventional computer and a small quantum computer work together could simulate chemistry.

It has great promise for studying molecules, says Krysta Svore, who leads Microsofts group working on quantum algorithms. Looking for new, practical superconducting materials is one possible application of the hybrid model that shouldnt require very large quantum computers, she says. Conventional computers struggle to replicate the quantum behavior of electrons that underpins superconductivity.

Go here to read the rest:
In a few years new Quantum computers from IBM, Google and Microsoft will accelerate breakthroughs in chemistry and ... - Next Big Future

Read More..

Better than Quantum Computing: The EU Launches a Biocomputer … – Labiotech.eu (blog)

The EU Horizon 2020 has launched Bio4Comp, a five-year 6.1M project to build more powerful and safer biocomputers that could outperform quantum computing.

TheBio4Comp project has the ambitious goal of building a computer with greater processing speed and lower energy consumption than any of the most advanced computers existing today. Ultimately, this could translate into enabling large, error-free security software to be fast enough for practical use, potentially wiping out all current security concerns.

A total of 6.1M have been awarded to an European team of researchers from TU Dresden, Fraunhofer-Gesellschaft, Lund University, Linnaeus University and Bar Ilan University, as well as the British company Molecular Sense.

Practically all really interesting mathematical problems of our time cannot be computed efficiently with our current computer technology, says Dan V. Nicolau from Molecular Sense, who had the original idea ofharnessing the power of biomolecules to build better computers.The team plans to solve this problem by scaling up its first biocomputer prototype, whose mechanisms have been published in the journalPNAS.

Picture of a computation network of the biocomputer, taken with an electron microscope

We are using molecular motors of the cell that have been optimized for a billion years of evolution to be highly energy efficient nanomachines, explainsProf. Stefan Diez from TU Dresden.These molecular motors aremyosin and kinesin, the proteins responsible for muscle contraction and transport of molecules inside the cell, respectively. These molecules,fixed on the biochip, move otherproteins across the computation device, which return a specific number depending on their final location.

With the new funds, researchers from TU Dresden plan to further improve the model by modifying and optimizing these motor proteins for computation and their integration into nanodevices.

The biocomputerhas the potential to immenselyreduce computing time by doing calculations in parallel, since multiple molecules can travel through the device simultaneously. Parallel computation is not a new concept, though;quantum computers are based on the same principle. However, the researchers at Bio4Comp have argued that biocomputing could overcome the scale limits of quantum computing, as well as other experimental models such as DNA and microfluidics-based computation.

Images from Shawn Hempel/Shutterstock, TU Dresden

Visit link:
Better than Quantum Computing: The EU Launches a Biocomputer ... - Labiotech.eu (blog)

Read More..

CUJO is cuter than Wall-E, and it’s the only internet security device you’ll ever need – Yahoo News

Everything in your home that connects to the internet and we mean EVERYTHING is vulnerable to attack. Sure you have antivirus software on your PCs, but what about your smartphones and tablets? What about your TVs? What about your Amazon Echo, your home security cameras and your baby monitors? Most people dont even realize how vulnerable all of these devices can be, and to be honest, you shouldnt have to worry about hackers breaking into your network and using your Nest Cam to spy on you and record you.

Thats where CUJO comes in. This little gadget might look even more adorable than Wall-E, but it means business. CUJO takes just a few minutes to set up and once its configured, it uses machine learning to safeguard every internet-connected gadget in your home, from PCs and tablets to smart lights, Alexa speakers, TVs and web-connected thermostats.

Here are a few key features:

Its every single internet security device you need, all rolled up into one cute little orb. Of note, there are three different ways to buy CUJO. For a limited time you can get the device and a lifetime subscription for $249, or you can pay $179 for the CUJO box and 18 months of service, or $99 for the box and 180 days of service. If you choose one of the latter two options, CUJO service costs $8.99 after the included service period expires.

You can learn more on CUJOs website. Definitely check it out.

Trending right now:

See the original version of this article on BGR.com

See the original post here:
CUJO is cuter than Wall-E, and it's the only internet security device you'll ever need - Yahoo News

Read More..

Internet of Things security: What happens when every device is smart and you don’t even know it? – ZDNet

Will you bother updating your internet-connected toaster?

Billions more everyday items are set to be connected to the internet in the next few years, especially as chips get cheaper and cheaper to produce -- and crucially, small enough to fit into even the smallest product.

Potentially, any standard household item could become connected to the internet, even if there's no reason for the manufacturers to do so.

Eventually that processors needed to power an IoT device will become effectively free, making it possible to turn anything into a internet-enabled device.

"The price of turning a dumb device into a smart device will be 10 cents," says Mikko Hyppnen, chief research officer at F-Secure.

However, it's unlikely that consumer will be the one who gains the biggest benefits from every device their homes collecting data; it's those who build them who will reap the greatest rewards -- alongside government surveillance services.

"It's going to be so cheap that vendors will put the chip in any device, even if the benefits are only very small. But those benefits won't be benefits to you, the consumer, they'll be benefits for the manufacturers because they want to collect analytics," says Hyppnen, speaking at Cloud Expo Europe.

For example, a kitchen appliance manufacturer might collect data and use it for everything from seeing how often the product breaks to working out where customers live and altering their advertising accordingly in an effort to boost sales -- and the user might not even know this is happening, if devices have their own 5G connection and wouldn't even need access to a home Wi-Fi network.

"The IoT devices of the future won't go online to benefit you -- you won't even know that it's an IoT device," says Hyppnen.

"And you won't be able to avoid this, you won't be able to buy devices which aren't IoT devices, you won't be able to restrict access to the internet because they won't be going online through your Wi-Fi. We can't avoid it, it's going to happen."

Indeed, it's already started, with devices you wouldn't expect to need an internet connection -- including children's toys -- being discovered to have gaping cybersecurity vulnerabilities.

These scenarios, says Darren Thomson, CTO & vice president of technology services at Symantec, are occurring because those in the technology industry are thinking about whether they could connect things to the internet, but aren't thinking about whether they should.

"Could I attach my dog to the internet? Could I automate the process of ordering a taxi on my mobile phone? We're obsessed with could we problems. That's how we live our lives and careers, we invent things and we solve problems. We're good at 'Could we'," he said, also speaking at Cloud Expo Europe.

No matter the reason why things are being connected to the internet, Thomson agrees with Hyppnen about what the end goal is: data collection.

"The connectivity of those devices is impressive and important. But what's more important is how that's coming to bare across various markets. Every single sector on the planet is in a race to digitise, to connect things. And very importantly, to collect data from those things," he says.

However, various incidents have demonstrated how the Internet of Things is ripe with security vulnerabilities as vendors put profit and speed to market before anything else, with cybersecurity very low down the list of priorities.

Retrofitting updates via the use of patches might work for a PC, a laptop or even a smartphone, but there are huge swathes of devices -- and even whole internet-connected industrial or urban facilities -- for which being shutdown in order to install and update is impossible.

"The security industry to date is predicated on the benefit of the retrofit. IT has designed insecure systems then we've secured them. That's kind of OK in a world where a device can have some downtime," says Thomson.

"But a car, a building, a city, a pipeline, a nuclear power facility can't tolerate downtime. So if we don't build security and privacy in to our designs from the very first whiteboard, we're going to leave ourselves with a problem."

Not only that, but as IoT devices become more and more common, people will start to ignore them

"The reality of the human mind is as we embed things, we tend to forget about them, we get complacent about them. Many of you are probably wearing a smart device on your wrist to monitor your behaviour and exercise routines. But no doubt two weeks after you started wearing it, you forgot it was there," he says.

"The danger from a psychological perspective is that people forget about that technology and forget about the risks associated with it and our own personal mitigation of that risk."

Even now, consumers are too blas about connected devices, keen to jump on the latest technological trends failing to realise the associated security risks. Then even if they do, they remain unclear on how to secure the IoT devices -- that is, if there is the option of securing it in the first place.

"Nobody reads the manual, especially to page 85 where it says how to change the default credentials, or page 90 where it says how to set up user accounts and restrict access to the admin interface, or page 100 where it says how to segment your network," says Hyppnen.

He likens it to the "exact same problem we had in the 80s" when people wouldn't even bother to set a time on their video recorder as it involved picking up the manual, so it'd end up always flashing 12:00.

It's therefore important for the Internet of Things cybersecurity loopholes to be shut sooner rather than later so as to avoid nightmare scenarios where hackers could exploit vulnerabilities to attack anything from pacemakers and other medical devices, to connected cars to even entire industrial facilities.

But are IoT device manufacturers going to do this anytime soon? Probably not.

"The manufacturers of IoT devices are unlikely to fix this by themselves. They're unlikely to start investing more money in their IoT devices for security because money is the most important thing in home appliances," says Hyppnen

"When you buy a washing machine, price is the most important selling point. Nobody's asking, 'does it have a firewall or intrusion prevention systems?' Cybersecurity isn't a selling point for a washing machine, so why would manufacturers invest money in it?" he adds.

It might eventually be regulation which has to fix this problem; as Hyppnen points out, device safety is already regulated. "When you buy a washing machine, it must not short circuit and catch fire, we regulate that. Maybe we should regulate security," he says.

Read more here:
Internet of Things security: What happens when every device is smart and you don't even know it? - ZDNet

Read More..

Fix crap Internet of Things security, booms Internet daddy Cerf – The Register

Vint Cerf, one of the fathers of the internet, has weighed in on Internet of Things security, warning that a Mirai botnet-style incident could happen again unless vendors start taking responsibility for their goods.

The biggest worry I have is that people building [IoT] devices will grab a piece of open source software or operating system and just jam it into the device and send it out into the wild without giving adequate thought and effort to securing the system and providing convenient user access to those devices, Cerf told the Association for Computing Machinery (ACM) organisation at its 50th Turing Award celebrations.

Such fears have been expressed time and again by both security and IoT advocates. Cerf highlighted the impact of the Mirai botnet, which was used in a DDoS attack that leveraged millions of unsecured IoT devices to attack DNS servers operated by US outfit Dyn.

The result was that large chunks of the internet disappeared from view. Dyns DNS services were used by a number of large and popular sites including Github, Netflix and Reddit.

We saw the Dyn attacks coming as a result of a lot of webcams being hacked, and the hacking was trivial, Cerf, nowadays employed by Google as its chief Internet evangelist, continued. Either they had no access control or they had a well-known and publicized username and password. So, I consider that kind of thing to be irresponsible. And companies looking to make their brands attractive are going to have to pay a lot more attention to security and privacy and access control if their users are going to endorse their products.

Cerf also balked at taking the mickey out of the fad for adding internet connectivity to anything and everything (such as toothbrushes), saying: Ive sort of given up ridiculing Internet enabling of things because Ive discovered that, even if it sounds crazy on the surface, there may actually be something useful arising.

He added: Lets just stick with internet enabling of everything, but on the other side of that, lets make sure that when we do that, we think our way through the security, safety and reliability of the systems.

Read more:
Fix crap Internet of Things security, booms Internet daddy Cerf - The Register

Read More..

Wikileaks Only Told You Half The Story — Why Encryption Matters More Than Ever – Forbes


Forbes
Wikileaks Only Told You Half The Story -- Why Encryption Matters More Than Ever
Forbes
Touted in a press release as the largest release of CIA documentation ever, Wikileaks' release of their Vault 7 trove of CIA programs and documentation raises more than a few important questions for the security community. Most publicized among the ...

and more »

Continue reading here:
Wikileaks Only Told You Half The Story -- Why Encryption Matters More Than Ever - Forbes

Read More..

Quantum Key System Uses Unbreakable Light-Based Encryption to Secure Data – Photonics.com

Photonics.com Mar 2017 OXFORD, England, March 21, 2017 A device that can send unbreakable secret keys from a handheld device to a terminal could keep users' personal financial information more secure and safer in the event of a cyber-attack.

Researchers from Oxford University are using ultrafast LEDs and moveable mirrors to send a secret key from a device at a rate of more than 30 kilobytes per second over a distance of 0.5 meters.

"The idea is that this gadget would be a mobile object that talks to something that is fixed," said Iris Choi of Oxford University. If integrated into a cellphone, for example, the device could allow secure links to near-field communications mobile payment systems and indoor Wi-Fi networks.

The technology is a quantum key distribution system that relies on characteristics of a single photon to provide a bit a 1 or a 0 to build up a cryptographic key that can encrypt and decrypt information. Quantum keys are considered secure; if someone intercepts the quantum bits and then passes them on, the very act of measuring them alters them.

The system contains six resonant-cavity LEDs, which provide overlapping spectra of light. Each of the six is filtered into a different polarization, split into pairs to represent 1s and 0s. The circularly polarized LEDs provide the bits for the key, while the other pairs are used to measure the security of the channel and provide error correction. Every four nanoseconds, one of the channels produces a one-nanosecond pulse in a random pattern. On the other end, six polarized receivers pick up the light from their matching LEDs and convert the photons into the key.

The researchers equipped both the transmitter and the receiver with filters that select only a portion of the light, so they all shine with the exact same color, regardless of which polarization they produce. This feature in and of itself should deter hackers from breaking the code.

A quantum key must be long enough to ensure that an adversary cannot hack it simply by guessing randomly. This requires the system to transmit a large number of bits in less than a second. Achieving that high data transmission rate also requires that most of the photons get to where they're supposed to go. The Oxford prototype addresses this need through its innovative steering system.

Even someone trying to hold perfectly still has some motion in his hand. The research team measured this motion by looking at how the spot of a laser pointer moved as a person tried to hold it steady. They then optimized design elements of the beam-steering system, such as bandwidth and field of view, to compensate for hand movement.

To help the detector properly align with the transmitter and further correct for hand movement, both the receiver and the transmitter contain a bright LED with a different color than the quantum key distribution LED that acts as a beacon. A position-sensing detector on the other side measures the precise location of the beacon and moves a microelectromechanical systems (MEMS) mirror to align the incoming light with the fiber optics of the detector.

The team tested their idea with a handheld prototype made from off-the-shelf equipment. Choi said the design likely could be easily miniaturized in order to turn the system into a practical component for a mobile phone.

The Oxford teams research has been published in the Optical Society (OSA) journal Optics Express (doi.org/10.1364/OE.25.006784).

See the original post here:
Quantum Key System Uses Unbreakable Light-Based Encryption to Secure Data - Photonics.com

Read More..