Page 4,456«..1020..4,4554,4564,4574,458..4,4704,480..»

‘Cloud computing is coming to end,’ claims Andreesen Horowitz VC – www.computing.co.uk

Cloud computing is set to come to an end, eclipsed by the shift in computational power to "the edge".

That is the claim of Peter Levine, a venture capital investor with Andreesen Horowitz, the venture capital company co-founded by Netscape founder Marc Andreesen. "I think it's actually happening right under our nose," he added, suggesting that the process had already started.

It won't be led by mobile devices, as much as it will be by connected devices, such as self-driving cars, drones and other increasingly powerful devices operating on 'the edge' of the network, he said.

"It's not just mobile devices, it's all of the other things that are going to be out at the edge that will truly transform cloud computing and put an end to what we know as cloud," Levine told the Wall Street Journal's CIO Network event last week.

"The change is that the edge is going to become a lot more sophisticated. Not with mobile devices but, broadly speaking with the internet of things (IoT). Examples are self-driving cars, drones, robots and all the IoT 'objects' that will be created over the next ten years," he said.

A self-driving car, he added, "is effectively a data centre on wheels, a drone is a data centre with wings, and a robot is a data centre with arms and legs

"These devices are collecting vast amounts of information, and that information needs to be processed in real time. That is, with the latency of the network and the amount of information there isn't the time for that information to go back to the central cloud to get processed This shift is going to obviate cloud computing as we know it," argued Levine.

A typical luxury car today has around 100 CPUs in it, while self-driving cars will have even more, alongside arrays of maths co-processors to do complex, real-world 3D computations in real-time. This, suggested Levine, will become a "massive distributed computing system at the edge of the network".

He added: "We are entering the next world of distributed computing it's literally back to the future on where processing gets done because of these very sophisticated end-point devices."

It comes at a time when computers are, for the first time, able to take information directly from the environment.

"Up until now, computing has fundamentally been us humans typing things in via keyboard or a computer generating information from a database or generating log files. But this is the first time that computers are starting to [directly] collect the world's information and that data is massive.

"So it's real-world information coupled with the idea that real-time data processing will need to occur at the edge where the information is collected."

Levine cites the example of self-driving cars needing to be aware of their surroundings, such as stop signs at junctions or pedestrian crossings.

"If I had to take that data and send it off to the cloud to decide that there's a stop sign, or a human being crossing the road, that car will have blown through the stop sign and run over ten people" before the cloud would have told the self-driving car to stop.

Levine's comments echo David Isenberg's May 1997 paper, 'Rise of the Stupid Network', which argued that a combination of cheap and plentiful bandwidth, combined with ever-more power devices, would lead to power migrating to the edge of the network, while bandwidth would become a commodity.

The paper didn't go down well with Levine's employers, telecoms giant AT&T, and he left the company shortly after the paper was published.

Still migrating to the cloud anyway? On Wednesday at 3pm, Computing will present 'Cloud mix and match - getting the balance right'. Click here to register for the Computing Web Seminar

View post:
'Cloud computing is coming to end,' claims Andreesen Horowitz VC - http://www.computing.co.uk

Read More..

IBM Q will launch this year bringing PAYG Quantum cloud computing – The INQUIRER

IBM HAS become the world's first vendor of open Quantum cloud computing.

IBM Q begins rollout today and will be accessible on a pay-as-you-use basis in common with a number of IBM products.

But, while that sounds great, it's not going to be outperforming a regular computer, but rather a catalyst to future development in the sector.

The paid version is an upgraded version of the IBM Quantum Experience, which has been given a faceliftand is open to all as a "curiosity".

Nature reports that the IBM QE has been used to help those without direct access to Quantum machines (which let's face it, is almost everyone) to get used to designing Quantum algorithms and thus build what IBM says is a community and ecosystem'.

Details so far are scant. We don't have a launch date (apart from 2017) and we don't have pricingdetails. We also don't know the pre-selected first clients which have already been chosen.

It's easy to get distracted from what the point of all this is. At one level, because IBM Q won't be any faster than a conventional cloud array, it all seems a bit daft. But with more and more stock being put in the idea of quantum as the future of supercomputing, and further advances being announced almost weekly, this is the time for companies to get in on the ground floor and grow with the new tech.

With a huge skills shortage in the IT sector, getting ready for the next big thing in computing will mean that companies aren't bitten a second time. But it's not just like switching to another dialect or language. Programmers will need to understand the limitations of Qubits.

Because Quantum demands such specific environmental factors and still requires constant tweaking, it's an ideal candidate for the Cloud, as it lets the vendor deal with the baggage, leaving the end user free to develop.

The news comes after last week, UK scientists announced the first computer to be made using DNA, which is said to be the main potential rival to Quantum.

Continue reading here:
IBM Q will launch this year bringing PAYG Quantum cloud computing - The INQUIRER

Read More..

Cloud becoming ‘dominant vehicle’ for business analytics, says new report – Cloud Tech

A new study from Informatica and Deloitte has found that cloud is well on the way to being the dominant vehicle for business analytics.

The report, which was conducted at the end of last year alongside Enterprise Management Associates (EMA) and consulted more than 400 global business and technology leaders, found that cloud was either a key or important part of the analytics strategy for 91% of respondents.

In addition, self-service was considered a key component with cloud-ready organisations more likely to go down that route for data management and governance; 94% of those polled said governed self-service was important for their organisations analytics implementations.

The benefits of using cloud-based analytics are stark, according to the report; 84% of respondents said business user agility went up through governed self-service for data integration, while similar numbers agreed for data mapping (83%), data modelling (82%) and data governance (77%).

Cost reduction was naturally the primary financial aspect driving cloud analytics, but the study also showed it was the key technical driver. Interestingly, while security and compliance remained the key barrier to adoption cited by 40% of those polled security fears lessened according to companies who were further down the road of cloud implementation.

The key takeaways from our research is that cloud adoption is expanding quickly as companies find success with their first cloud analytics implementations and move to create more mature environments and drive broader adoption, said Lyndsay Wise, EMA research director in a statement.

As these environments become more mature and robust, analytics users are demanding access to their data in ways that make it fast and easy to interact with, Wise added. In this regard, governed self-service access is the great enabler of the upswell of analytic insight that companies need to stay competitive.

You can find out more about the report here (registration required).

Read more:
Cloud becoming 'dominant vehicle' for business analytics, says new report - Cloud Tech

Read More..

Nextcloud releases security scanner to test deployments – iTWire

A survey of private cloud deployments has led the open source cloud provider Nextcloud to issue a security scanner in order that users can find out the state of their security and update as needed.

The company developed the scanner after examining the state of cloud deployments using the shodan.io search engine. This uses a very basic scan that provides the version number of the cloud software in use so that its security state can be ascertained.

After realising that many were lacking updates that rendered them vulnerable, Nextcloud decided to warn administrators of these instances.

The company said it did not feel comfortable noting that political parties, hospitals, universities, large corporations and governments were figuring in a list of insecure servers.

"They decided to reach out to users with a personal warning, including the results of the scan. We made sure the security scan would not expose any private data, using unique IDs instead of URLs to present them the results and we kept as quiet as possible on our communication channels about this matter," Nextcloud communications manager Jos Poortvliet said.

The results were good, with 5% upgrading within the first 10 days of being notified.

But even so, Poortvliet said, the company;s estimates were that there were at least 100,000 private cloud servers whose owners were unaware that they were sitting ducks for attacks.

As a result, the Nextcloud update tool was rewritten to make it easier to use from the command line in version 11. From version 12, apps would not be disabled during a security update making the process less intrusive.

"Our ultimate goal is to make updates so seamless they can be done fully automatic without any administrator involvement or downtime. At this moment, we have achieved this on the Nextcloud Box, using Canonicals Snap technology which automates updates entirely," Poortvliet said.

Read the original:
Nextcloud releases security scanner to test deployments - iTWire

Read More..

St. Cloud Hosting Clean Water Conference – WJON News

Thinkstock

ST. CLOUD Nearly 1,500 operation specialists and industry officials are in St. Cloud this week for the 33rd Annual Water & Wastewater Conference at the Rivers Edge Convention Center.

It comes on the heels of Governor Mark Daytons push to address aging water treatment systems, impaired lakes and polluted drinking wells.

Minnesota Rural Water Association Executive Director Ruth Hubbard says there are often no warning signs for these failing systems

A lot of what is involved with the water and wastewater systems is under the earth. You just cant see it. And, those pipes and that infrastructure is failing. When that fails, it is a public health issue.

And, Hubbard says the improvements to these treatment systems are costly

You know you have a water utility, you have a wastewater utility and in most cases you have a storm water utility. So, youre looking at three different entities that have to be upgraded.

Governor Dayton is calling 2017 a Year of Water Action. He says Minnesota is $11-billion behind in just maintaining our aging water treatment and delivery systems over the next 20 years. Dayton says many of the states water treatment systems are in serious disrepair and initial testing indicates 60% of private wells in central Minnesota may not provide safe drinking water.

Hubbard says the Safe Drinking Water Act and Clean Water Act require oversight on treatment systems and ensure safe drinking water for Minnesotans.

View original post here:
St. Cloud Hosting Clean Water Conference - WJON News

Read More..

Checklist for choosing a small cloud host or ISP – Network World

Tom Henderson is an enterprise cloud/virtualization/containerizing/workload systems researcher at ExtremeLabs, Inc., author, lecturer, ham radio experimenter, and a very skeptical geek.

Ive gone through a number of hosting companies. My NOC is at Expedient in Indianapolis (Carmel). They do a great job for my testing needs. They have a large, well-designed facility, lots of power and, most important, they know what theyre doing and do it 24/7.

In my role as someone who knows the difference between UDP and TCP, I get asked a lot to recommend an ISP or cloud host for purposes of web and mail hosting for small businesses, organizations and even generic civilians. Over the years, Ive found some common difficulties that can mean the difference between enjoyable experiences and long, drawn-out support problems with incumbent frustration.

To make sure you have a good experience with your cloud host, use this checklist.

1. Can you reach a human 24/7? You must check to see if you can get a human who knows about the products offered by calling the cloud host company yourselves. Im sorrytoo many of them lie. From their website, look on their support pages, get the number, call it and wait until you can get a human at midnight EDT. No human? Pass. Sometimes you need a human. And if the company advertises it, they should make sure one is available.

2. When youre looking for web hosting, make sure that your hosting permits privileged user shell access via ssh. Imagine hosing a setting inside your WordPress site and needing to change a MySQL value. Some ISPs/cloud hosts allow access to the database that contains WordPress settings, and maybe you can fix things using this methodoften through the PhPMyAdmin app. Or not.

If you need ssh, some organizations require that you accept full responsibility for having offered that access. You can do yourself a favor if ssh privilege is granted by immediately configuring ssh so that root cant log in (see settings for ssh.conf or its equivalent in your hosted version), making a username thats nonsensical and creating a killer ugly password to connect. Then change the password randomly for your own protection.

3. Can you access the customer site control panel? Every ISP/cloud host uses a customer site control panel of some kind. Some use cpanel, while others have any number of variations that allow you to control your assets. These need to be accessible to you, and you need to use nonsensical log-ons to get to thembecause these control panel apps have the keys to your online kingdom. Access should be different than the account log-on in all ways, username and password, if thats possible. Here, too, passwords should be changed randomly.

4. Make sure you have a security tool. No one likes to look at the logs, so the logs get filled with info that civilians cant understand at all. In the logs, youll find that your site is getting picked on by hacker bots 24/7. They use common names and entrance points to try to steal your stuff. Apps like WordFence, a plugin for WordPress, are expensive, but they do a good job helping admins identify whos trying to knock their walls down and allowing them to block.

Another reason why I like WordFence specifically is that it can block by country. If you dont want international visitors using battering rams on your log-on, fence them out. Other popular web hosting apps, such as Joomla, have their own equivalents. Yes, they increase your costs, but they also reduce big cracks.

5. If you dont like what you find, or if controls are difficult and/or the ISP/cloud host makes life difficult for you, move. Switch hosts. Work with them to get a partial or full refund. This also means you need to use apps salient to the hosted infrastructure to back it up and move it somewhere else. This can be very easy, or very difficult, depending on what youve deployed. So, this rule is important: Dont deploy what you cannot backup and move within a reasonable amount of time. If you cant do this, youre dependent on someone who can.

6. Read the terms and conditions and other parts of your agreement carefullythe entire set of documentsthen read it again until you understand it. Theyre not easy to comprehend, but you need to know whats going on inside each and every agreement you sign, digitally or otherwise. There are gotchas, show stoppers, no ways, not-on-my-watches. Read them before you agree to them, not afterwards. If you cant understand them, welcome to the club. Do your best.

7. Immediately test the theory of backing up your data and restoring it. Get familiar with how to do it. Take screenshots so that you can remember what you did. Keep these screenshots in a place where youll remember them, like a folder named Site Logon Instructions. Dont just throw them into the Download folder. Please.

8. Make sure you can transfer your domain at low to no cost first before attempting to move your online assets. This sometimes can take minutes, OR DAYS. ISPs/cloud hosts dont want to give up your business and can make it difficult for you to transfer your DNS to another provider. Make sure that when you do, you cancel the remaining part of the contract with the old, no-longer-used-host and then track the refundif you even get one. Be diligent. Send emails. Be kind.

This is only a partial list. There are lots of ways to get hurt, and Ive seen too many of them. Right now, Im battling getting 1and1.com to respond to a customer support request24/7, my left ear lobe.

More:
Checklist for choosing a small cloud host or ISP - Network World

Read More..

How MSPs Can Monetize Desktop Management with VDI – The VAR Guy

While Virtual Desktop Infrastructure (VDI) is not a new concept, very few managed service providers (MSPs) have figured out how to harness VDI to their advantage. But when implemented the right way, VDI offers numerous advantages to both the MSP and end-customers, from reduced costs to enhanced user experience. In addition, MSPs can turn the desktop management experience into a profitable product line.

How is this possible? The first thing to understand is that VDI streamlines desktop management for MSPs. Since the early days of managed services, desktops have typically been a difficult component to manage, and effectiveness, profitability, and efficiency varied greatly from one provider to another. This is because, unlike locked down components like servers, desktops necessarily require a number of interferences by the user such as modifications to settings, applications, local user access permissions, desktop environment changes, security updates, and more. This makes management far more complex, and therefore time- and resource-intensive, for the MSP.

Since we cant very well ask users to give up their ability to control and customize their desktops, we need a better alternative to traditional desktop management that will enable the MSP to drive greater profitability and efficiency. This is where VDI comes in.

Thin Client Computing & RDS

Before we cover the benefits of VDI, its important to understand contextualize our understanding of desktop management. Before VDI became popular, MSPs would provide desktop experiences to their customers via thin client computing. This was done by hosting a version of the desktop on a centralized server, and allowing users to login to that desktop via a remote session.

One of the primary reasons thin client computing never grew in adoption was due to limited bandwidth. While users could access the desktop OS and applications with the security and redundancy of a thin client architecture, the user experience was frequently poor due to bandwidth limitations Now that Internet availability and speeds have dramatically improved, the viability of VDI has transformed. Just look at the overwhelming popularity of public cloud computing solutions like Office 365 and Googles G Suite.

Another early model of desktop access was terminal services (or RDS), which allowed for access and control of a remote computer via an Internet connection. Unfortunately, this proved to be slow and unreliable. All devices are forced to share the same resources, which can create major bottlenecks and thus reduced performance especially if the service provider has an erratic network. In addition, the RDS administrator must be very knowledgeable on the ins and outs of the system, otherwise a system outage could be mean serious problems for the organization.

VDI: Benefits to both the MSP and end-customer

VDI has thus risen to become the ultimate solution for desktop management. In essence, VDI empowers MSPs to manage desktops similarly to how they manage servers. By centralizing desktop software and computing power, VDI enables MSPs to deliver a superior desktop experience without the problems and inefficiencies of traditional desktop management. So not only can MSPs deliver a more powerful, available, and diverse desktop experience to customers, but they can streamline their management of the service tremendously.

The benefits of VDI for the customer also include fully customizable desktop profiles, profile-based application access, data backup and protection, as well as up-to-date security. These kinds of improvements maximize the utility and satisfaction of the user experience, which leads to greater customer satisfaction. For the MSP, the advantages are also numerous: lower administrative, startup, and maintenance costs, decreased impact on the service, higher client capture rates, and a more comprehensive service delivery model (like ITaaS).

How to implement a hosted VDI program

One thing to keep in mind is that some people may have a negative impression of VDI as it usually is complex or difficult to implement. Indeed, many first-time implementations tend to fail due to user experience challenges, performance issues, and cost. However, the key to successful VDI implementation is a proven track record: you can partner with an organization who has already completed and integration the necessary components of a VDI program.

So instead of trying to develop an internal VDI platform which can take up a ton of resources and time you may not have you can deliver hosted VDI through a ready-made platform from a technology partner. This way, you dont need to waste time or resources building VDI from scratch, but you can still retain maximum control over the service delivered to your customers. This kind of hosted option eliminates the technical challenges, added costs, and risks of a custom VDI implementation, while still delivering all of the VDI benefits

Summary

VDI takes all the key lessons learned from server management and applies them to desktop management, turning the desktop into both a lucrative and positive customer experience. Its also a dramatic enhancement to traditional remote monitoring of desktop devices, allowing MSPs to offer significantly improved security, availability, and end-user experiences.

MSPs can leverage and monetize VDI as a service product improvement, as well as a method of lowering desktop management costs. Why not leverage VDI technology to increase your own profitability?

About the author:

A creative technologist with a mind for business, Vadim Vladimirskiy is the head honcho at Adar. Vadims the brains behind the evolution of Nerdio, bringing Streaming IT to the masses that is, small and medium sized organizations.

Charles Weaver is the CEO of MSPAlliance, an international standards and accrediting association for managed IT service providers. He is responsible for growth of membership, expansion of membership services, and strategic targeting of consumer markets for MSPAlliance. members.

See more here:
How MSPs Can Monetize Desktop Management with VDI - The VAR Guy

Read More..

Amazon’s AWS buys Thinkbox Software, maker of tools for creative professionals – TechCrunch


Foster's Daily Democrat
Amazon's AWS buys Thinkbox Software, maker of tools for creative professionals
TechCrunch
It looks like AWS, Amazon's cloud computing arm, has made another acquisition to add more productivity tools for its customers beyond basic cloud-computing services. It has picked up Thinkbox Software, which develops and sells solutions for media ...
The Internet's 'Too Big Too Fail'The Epoch Times
Amazon Web Services outage highlights Cloud risksFoster's Daily Democrat
AWS outage shows vulnerability of cloud disaster recoveryComputerWeekly.com
University Herald -Citifmonline -Amazon Web Services -Thinkbox Software
all 88 news articles »

Read more from the original source:
Amazon's AWS buys Thinkbox Software, maker of tools for creative professionals - TechCrunch

Read More..

Bitcoin Scam Site Warning Coinomia – The Merkle

It has been a while since we last looked at bitcoin scam sites, even though they are even more common than ever before. Coinomia is another cloud mining Ponzi Scheme that aims to defraud users. The company makes some very bold claims which are not backed by any solid or credible evidence by any means. Avoid this company at all times and invest wisely.

A lot of companies who claim to be active in the world of bitcoin and cryptocurrency require a lot of budget to set up mining operations. That being said, it would appear there are so many companies active in the world of cloud mining bitcoin, even though there are very few legitimate offerings available. Coinomia is definitely not a legitimate mining company, as they provide no evidence whatsoever.

When one opens the Coinomia website, it becomes evident the company is trying to trick as many users into investing as possible. The company also claims to be mining since 2014, yet there is no proof of this claim being true by any means. It is possible this may have taken place under a different name, although it is unclear which company that would have been. Rest assured this is the first sign of Coinomia being a scam.

Users who sign up with Coinomia will get 3TH/s for signing up. Users who prefer to mine Ethereum will receive 0.58 MH/s of hashing power. It is rather unusual to see companies give away such large amounts of hashing power in exchange for US$100, as it requires a fair amount of hardware to provide these speeds. Then again, Coinomia has no mining hardware in the first place, and all of this free mining power only represents an update in the database.

To top it all off, the mining plan comes with 8% referral commission. The goal of Coinomia is to get users to invite as many people as possible to make sure the people running this cloud mining scheme can fill their pockets. More expensive plans are also available, ranging from US$1,000 to US$10,000. It is rather odd to see these prices not listed in BTC or ETH value, but then again, this is a scam site after all. More expensive plans result in higher referral commissions, which is absolutely bogus.

What is even more troublesome is how Coinomia positions itself as being a mining application, rather than a cloud mining company. They also claim any device or gadget can be used to mine cryptocurrency and earn these returns. That is a very strange business model, considering the company claims to have ASIC chips and mining equipment located in data centers around the world. If that is the case, why do users need to download this software? Very strange indeed.

Not much information can be found about the company itself either. Although Coinomia Technologies LTD has an office address listed on the website, it is doubtful that location houses any office related to this business. Moreover, there is no company registration number, although the team would probably be able to present a company number when requested. All it takes is a bit of cash and the paper is issued automatically. All things considered, it is best to steer away from Coinomia and not lose your money.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

Read this article:
Bitcoin Scam Site Warning Coinomia - The Merkle

Read More..

Cyber criminals go digital, lay bitcoin trap for investors – India Today

1

Cases of fraud related to bitcoins are becoming more frequent, officer said.

2

Bitcoin is a digital crypto-currency that is computer generated and not printed

3

Experts also claim that people in India are mostly interested in buying bitcoins

As more and more investors take to digital currencies like bitcoin, leading to a sharp rise in their prices postdemonetisation, cyber criminals are also exploring innovative ways to pick virtual wallets.

Last week, a Delhi-based businessman lost Rs8.5 lakh to an alleged 'bitcoin miner', the term used for an agent who generates digital currency, who promised him 10 bitcoins with an assurance that the investment will rise twofold within next six months. The businessman chose not to file a complaint with police as digital currencies are not recognised by the RBI, even though there are varied views on its transactional legality.

"Cases of fraud related to bitcoins are becoming more frequent," a senior crime branch officer told Mail Today. This is partly because many global companies have started accepting digital currency. "This has attracted many new investors. However, cashing on its rising popularity, some scamsters are also running fraud set-ups," said the officer, requesting anonymity.

"After demonetisation in November 2016, demands of bitcoins have gone up in the country and what gold was to the previous generation, bitcoin is to today's tech-savvy investor," he said, adding that it will be a big nuisance to crack such case as these currencies are not tangible.

WHAT IS BITCOIN

Bitcoin is a digital crypto-currency that is computer generated and not printed or minted physically like a country's currency. The denomination is created and held electronically in a decentralised system which means no single person, bank or authority has any regulatory control over it. It works as conventional forms of currency and is traded worldwide.

According to leading Bitcoin trading exchanges in India, there has been an increase in its user base by 250 per cent in last one year. Scamsters are also reaching out to new investors for dealing into other crypto-currency than bitcoin which includes TimeKoin, OneCoin, LitecoinNuBits, Tether etc.

"It is a popular currency on the internet where anything can be bought using bitcoins such as drugs, arms, pornography.

Even hackers demand digital currency in ransomware attacks carried in India. But, tracking crypto-currency is difficult on the web and beyond a country's boundaries is impossible," said Triveni Singh additional Superintendent of Police (Uttar Pradesh STF).

"Apart from Bitcoin, there are other 2,000 plus lesser-known virtual currencies and there are several cases of fraud related to virtual currencies these days," said Hitesh Malviya, a bitcoin expert.

Experts also claim that people in India are mostly interested in buying bitcoins and not selling them in the market in order to increase its valuation. Cops also claim that after the demonetisation announcement, many traders exchanged 'black money' for bitcoins.

Also Read

EXPOSED: The unrestricted bitcoins bazaar that helps dispose illicit wealth during demonetisation

Bitcoin hits highest level post demonetisation

See original here:
Cyber criminals go digital, lay bitcoin trap for investors - India Today

Read More..