Categories
Co-location

Waterloo Road 2023: Start time, cast, how many episodes and new location – Liverpool Echo

Waterloo Road returns tonight on BBC One and iPlayer as some familiar faces are set to make an appearance.

As a new school year begins, a peaceful protest turns into a school riot and the events of the day will have huge ramifications for everyone involved.

Across the term, Waterloo Roads teachers and parents are going to have to learn on their feet as they try to navigate the ever-changing social landscape - from teen homelessness to the cost of living, being LGBTQ+, racism, sexism, mental health and everything else facing young teens today.

READ MORE: Coleen Nolan clears up why Loose Women panel didn't congratulate Stacey Solomon

Amongst the chaos, the students, faculty and parents still make time for friendships, fun, and a few romances. The pupils have a lot to contend with this term, but they will learn to lean on one another to survive the year and try to stay out of detention as much as possible.

The first episode of Waterloo Road will air at 8pm for one hour. The following episodes will be weekly on BBC One.

The series will also be available to watch on iPlayer.

The series will consist of seven episodes.

The original show was filmed and set in Rochdale from series one until the end of series seven, and the Scottish town of Greenock from the beginning of series eight to series 10.

The new series returns to Greater Manchester.

Angela Griffin (Kim Campbell)

Adam Thomas (Donte Charles)

Kym Marsh (Nicky Walters)

Katie Griffiths (Chlo Charles)

Vincent Jerome (Lindon King)

James Baxter (Joe Casey)

Rachel Leskovac (Coral Walker)

Jo Coffey (Wendy Whitwell)

Ryan Clayton (Mike Rutherford)

Adam Abbou (Danny Lewis)

Priyasasha Kumari (Samia Choudry)

Noah Valentine (Preston Walters)

Adam Ali (Khalil Kai Sharif)

Alicia Forde (Kelly-Jo Rafferty)

Francesco Piacentini-Smith (Dean Weaver)

Liam Scholes (Noel McManus)

Receive newsletters with the biggest and breaking TV and showbiz news by signing up here

For more celeb news, videos and pictures follow our designated Facebook page HERE

READ NEXT:

Fibromyalgia signs and symptoms as Jonathan Ross' daughter left in wheelchair

Pub hits back at customer's carvery complaint with genius five-word response

Warning to dog owners as pet turns 'bright orange' after beach walk

Diabetes: Symptoms and warning signs on your skin that suggest high blood sugar

Gogglebox fans rush to support Tom Malone after Julie shares update

Continued here:

Waterloo Road 2023: Start time, cast, how many episodes and new location - Liverpool Echo

Categories
Co-location

Weather: Coromandel residents, holidaymakers urged to find ‘safe, secure’ location ahead of massive storm – Newshub

Earlier on Wednesday, the forecaster issued a heavy rain warning that will last from 9am until 11pm on Wednesday for the Northland region. There are more warnings for the Coromandel for 24 hours from 3pm on Wednesday, Bay of Plenty west of Matata from 9pm on Wednesday to 3am on Friday, and Tasman northwest of Motueka from midnight on Wednesday to 6am on Friday.

There is also a strong wind warning for Auckland, including Great Barrier Island, from 9am on Wednesday to 3am on Thursday.

In an update on Wednesday, the Thames-Coromandel District Council said residents and holidaymakers should "err on the side of caution". People in the area are urged to make plans and act before heavy rain and increasing gale-force north-easterly winds arrive. There is also a strong wind watch in place for the area for 24 hours from 6pm on Wednesday.

"While there is still some uncertainty, five more days of north-easterly wind and rain on the Coromandel is likely to have a wide impact. So, we urge you to consider going to a safe, secure location, or even heading home today until the storm passes," said Civil Defence Controller Garry Towler.

"The accumulation of rain by Saturday could see surface flooding, slips, road closures and power issues, so it is worth hatching a plan today to ensure no one is stuck or isolated."

Read more:

Weather: Coromandel residents, holidaymakers urged to find 'safe, secure' location ahead of massive storm - Newshub

Categories
Co-location

As liquid cooling takes off in the datacenter, fortune favors the brave – The Register

Comment Hype around liquid and immersion cooling has reached a fever pitch in recent months, and it appears that the colocation datacenter market is ready to get in on the action.

Recently, Zachary Smith, Equinix's global head of edge infrastructure services, told The Register that the outfit would like to offer customers more liquid and immersion cooling capabilities, but blamed a lack of standards for getting in the way.

"Can we use standard connectors for liquid-cooled loops? Can we put them in the same place? Can we label them the right colors so our techs know what to do with them?" he asked, listing the litany of questions a colocation provider like Equinix has to answer before it can support liquid-cooled systems more broadly.

The fact that colocation providers like Equinix are even talking about liquid cooling shows goes to show it isn't a niche tech suited only for exotic supercomputing applications.

And while the lack of standardization is unquestionably a roadblock, it's not an insurmountable one. Arguably the incentives for adopting liquid cooling tech, in any capacity, far outweigh any potential headaches that may arise in the process.

Equinix is certainly right about one thing: chips are only ongoing to get hotter. And at a certain point, air cooling high-end systems especially those aimed at AI and ML is going to become impractical.

Intel's and AMD's 4th-gen Xeon and Epyc processor families have thermal design profiles (TDPs) of 350W and 400W, respectively. Meanwhile, nearly every current and upcoming datacenter GPU and AI accelerator is pushing upwards of 600W a piece, with anywhere from four to eight of them being packed into a chassis. (For comparison, the CPU in a typical modern laptop has a TDP of under 20W and you know how warm they can get.)

But the situation isn't as dire as Smith would have you believe. Despite his claims to the contrary, 300W per socket isn't some magical point of no return where liquid cooling becomes a must-have. If it were, we expect the market would have taken off a lot sooner.

With that said, just because you can liquid cool something doesn't mean you should or even need to. For example, Iceotope recently demonstrated the use of immersion cooling on helium-filled hard drives. While cool in concept, as our sister site Blocks and Files recently reported, there's not really much point. Years ago, storage and backup services provider BackBlaze investigated the relationship between drive temperature and failure rate and found no correlation as long as the drives were kept within spec usually between 5C-60C.

Instead, the biggest problem for air-cooled datacenter operators is a structural one. It takes a lot of power to feed these systems with cool air fast enough to keep them from overheating. Hotter chips only exacerbate this problem.

According to analysts, upwards of 40 percent of a datacenter's power consumption can be attributed to thermal management. When every watt saved on cooling is cash back in your wallet it's not hard to see why datacenter operators might be interested in tech that lets them claw back even a fraction of that. And spoiler alert that's exactly what liquid and immersion cooling promises to do.

But rather than leaping straight to direct liquid cooling (DLCs) or filling datacenters with immersion cooling tanks, operators may want to start with something that doesn't hinge on customer buy-in.

Dell'Oro Group projects liquid and immersion cooling to grow from just 5 percent of the datacenter thermal management market to 19 percent by 2026. Meanwhile, research from Omdia shows that number to be closer to 26 percent.

Demand for air-cooled systems clearly isn't going away anytime soon.

That's not to say liquid-cooling tech can't be used with air-cooled systems. Take rear-door heat exchangers, for example. These are essentially big radiators that are bolted to the back of a rack. As coolant flows through the radiator, it pulls the heat out of the hot exhaust air exiting the servers.

The advantage of rear-door heat exchangers is they can be used to achieve much higher rack power densities than conventional air-cooled servers. This isn't some unproven technology either. California-based colocation vendor Colovore, for instance, has been using rear-door heat exchangers to cool racks up to 50kW for years.

More importantly, rear-door heat exchangers rely on the same infrastructure as DLC or immersion cooling tanks. Before any of these systems can be powered on, coolant distribution units (CDUs) need to be installed, racks need to be plumbed, and power-hungry air handlers need to be swapped for exterior mounted dry coolers.

Because this infrastructure can be shared, it becomes much easier to add support for direct liquid or immersion-cooled systems as the standards around them mature.

While half-measures or stop-gaps like rear-door heat exchangers may not be as sexy as pumping liquids through a chassis or immersing a motherboard in hydrocarbons, it arguably provides datacenter operators like Equinix a way to achieve higher-rack densities and cool hotter systems while they wait for the OEMs and equipment vendors to align on usable standards.

Read more from the original source:

As liquid cooling takes off in the datacenter, fortune favors the brave - The Register

Categories
Co-location

These are the Connecticut breweries that closed in 2022 – CT Insider

The Veracious Brewing Company brewery at 246 Main Street in Monroe, Conn. on Thursday, September 8, 2016.

Brian A. Pounds / Hearst Connecticut Media file photo

Veracious Brewing Company, the popular brewery known for its dog-friendly atmosphere and its offerings such as 29 Pews, closed its doors in June. Co-owner Mark Szamatulski said he would cherish the memories, but it was time to retire.

Szamatulski said another company was moving in and taking over the space. At first, he said he planned to look for a new location, but soon realized that wouldnt be possible. They wanted the whole building, and we were looking for a place to buy, but we couldnt find a place locally that we could get into, he said. And we made a financial deal with them to leave a little early. So it was fine for both us and them.

Veracious supplies were rehomed locally to small breweries in Connecticut, New Jersey and Massachusetts. - Eddy Martinez

Read more: Last call for Monroes Veracious Brewing Co.

The rest is here:

These are the Connecticut breweries that closed in 2022 - CT Insider

Categories
Co-location

Warming-induced tree growth may help offset increasing … – pnas.org

Warming-induced tree growth may help offset increasing ...  pnas.org

Go here to read the rest:

Warming-induced tree growth may help offset increasing ... - pnas.org

Categories
Co-location

GMAs Robin Roberts reveals location after going missing from show for weeks amid TJ Holmes & Amy Robac… – The US Sun

GOOD Morning America host Robin Roberts has revealed where she has traveled to as she has been missing from the news program for weeks.

Robin revealed she's enjoying a peaceful vacation in Key West amid her co-stars TJ Holmes and Amy Robach's affair.

5

5

Robin's update comes It comes as she was reportedly furious about how the ABC network handled GMA3 stars TJ Holmes and Amy Robachs alleged affair, according toDailyMail.com.

However, the rumors Robin was frustrated were quickly quashed as a spokesperson announced: This is untrue about Roberts, and she is not involved in the situation.

Robin has taken an extended time off from hosting GMA through the holidays and in the wake of the scandal.

She revealed he has been relaxing in her "happy place" with her partner Amber Laign.

The GMA host took to Instagram to share a sunny photo of palm trees and a sparkling ocean.

One eager viewer commented on Robin's post: Cant wait for you and George [Stephanopoulos] to return in 2023.

Another shared: Enjoy your holiday! I miss you, George and Michael [Strahan] but you guys deserve vacation time. See you in 2023.

A third fan told Roberts that her sunset post looked amazing and said: Missing you this week in GMA.

Most read in Entertainment

Robin has shared several looks inside her winter vacation.

In one clip, she was riding a bike illuminated withChristmaslights.

Roberts said: Look what sweet Amber did!"

She added: Theyll see us coming - and pedaled off into the distance.

Although fans were stunned by the journalist wearing flip-flops and shorts.

One viewer said: Thats one thing on my bucket list - to wear shorts and flops for Christmas.

Another commented: I know you are not inNY, its 12 degrees here.

A third fan said: Unfortunately, I cant wear shorts and bike in my hometown."

Meanwhile, Robin isn't the only star taking time off from GMA after the scandal.

George and Michael are additionally missing from their host duties.

Their stand-in hostsJanai Norman,Gio Benitez, and Mary Bruce have a harsh review of their performance from viewers.

Tuesday morning onGMA, Janai, Gio, andMaryreported on various topics including the winter storms, relationships and even fitness.

However, one harsh critic wasn't pleased with the fill-ins' performances.

"These people filling in for the regulars are annoying as f**k!" they tweeted.

Usually, fans go wild overGio's glowing personalityon television, although fans were not impressed with his dance moves today.

In the fitness section, Gio tries to get his hips involved while busting some dance cardio moves.

One fan Tweeted: "Nice try, Gio."

GMAhas utilized fill-in hosts for the past several weeks asRobin,George,Michael, andLaura Spencerhave mysteriously been absent.

Now fans have also taken toTwitterto express their frustration as they urge the network to address the situation regardingAmyandTJ's affair.

"When will we see Amy Robach and TJ Holmes again? Who cares if they hooked up?" one person raged at the time.

"They are cute together. Dont let it ruin their careers. Let us see more of them."

Robin, Laura, and George have been on hiatus from the show surrounding the holiday and amid the shocking scandal involving the two GMA3 hosts.

Sources have revealedtension behind the scenesas the program navigates its direction after the affair was revealed.

Amy and TJ, whose affair was outed last month, are planning to spend New Years Eve together inGeorgiaafter a tumultuous end to 2022.

In photos obtained byDaily Mailon Monday,TJ, 45, andAmy, 49, looked cozy as they navigated Atlanta airport the day after Christmas.

The couple landed in Georgia, where TJ owns a home.

Amy and TJ are rumored to be celebrating New Years Eve there, althoughit hasn't been confirmed where they spent Christmas Day.

They had plans to be at TJs Atlanta home already, but their plans were derailed - possibly by thecyclonethat has grounded thousands of flights.

5

5

5

View post:

GMAs Robin Roberts reveals location after going missing from show for weeks amid TJ Holmes & Amy Robac... - The US Sun

Categories
Cloud Hosting

Simplifying digital sovereignty in a multi-cloud world – The Register

Sponsored Feature Sovereignty has traditionally been defined as the ability for a state to rule itself and its subjects, and it's been on the agenda since civilisation began. But only recently has digital sovereignty - the ability to control and make decisions about your own digital assets emerged to become an issue in its own right.

"Broadly speaking, digital sovereignty means having control of your digital destiny," explains Tim Phipps, director of cloud alliances at French technology group Thales. "One level below that, it means that you're in full control of the software and the hardware and the data that your business relies on."

Having control of your digital destiny might not have seemed important when all IT did was run a batched payroll. Today, when companies live and die based on their use of technology which spans multiple devices, systems, applications, workloads and hosting locations, it's a much bigger deal.

It's a particular problem for companies using cloud service providers that don't tend to keep their data in one place anymore. Over 90 percent of organisations now have a multi-cloud strategy according to a recent Thales Threat Report. It also found companies mixing these multi-cloud environments with on-premises and collocated data centre operations, muddying the waters further.

That presents a number of challenges, including the costs involved in managing multiple encryption key stores and management processes as more data moves into the cloud for example. That means organisations often have to employ different teams to run different key management solutions (a recruitment challenge in itself). They also run the risk of extending the attack surface for hackers by fielding a series of disjointed data security solutions each of which operates differing security policies and processes.

Like the internet itself then, digital sovereignty sounds simple enough but is a deceptively complex concept with many moving parts. To help organisations fully understand and address these challenges, Thales breaks sovereignty down further into three elements: data, operations, and software.

Data sovereignty

Data is what many people think of first when they hear the term digital sovereignty. This is a state's ability to protect its own data, and that of its citizens, from intrusion by other states. This has been a defining issue at the heart of internet governance during the last two decades.

"The thing that nations were concerned about, especially in Europe, was that a lot of that cloud providers (or hyperscalers) are all American," Phipps points out. "There were all sorts of concerns around these US spy laws."

The Patriot Act included language that granted US authorities possible access to cloud service providers' business records, which Microsoft later admitted put the privacy of non-domestic customers' records in jeopardy if the US government asked for them. The CLOUD Act, introduced in 2018, later solidified government investigators' ability to obtain files from companies processing data on foreign soil.

At the same time, there was an ongoing tussle with privacy advocates over data sharing between US and European companies. The Safe Harbour provision allowed US companies transfer to data from EU partners to the US if they promised to abide by several privacy principles. Privacy advocate and lawyer Max Schrems challenged this provision in 2015, which led to it being struck down and eventually replaced with the EU-US Privacy Shield agreement. Schrems challenged that, too, and it was declare invalid in 2020.

Now, the EU and US are taking a third stab at it with the Trans-Atlantic Privacy Framework. A draft adequacy decision, that attempts to replace the "Privacy Shield Decision" that was subsequently invalidated by Schrems II, has very recently been published by EU.

Initial feedback from privacy advocate Max Schrems is that the draft decision is almost wholly based on the known Executive Order that was previously thrown out. The expectation is that Max Schrems' team is likely to challenge this in the European Courts. Consequently, companies on both sides of the Atlantic remain unclear about what happens next and this can cause digital transformation projects to stall.

Phipps recommends that organisations put appropriate controls in place to protect their digital assets, so that they can own their own data sovereignty and speed up their journey to the cloud independently of geopolitical change.

However, this can present a considerable challenge in a multi-cloud and hybrid environment. Almost one in five respondents to the Thales survey said that they did not know where all their data is stored. Around half said that managing their sensitive data in multi-cloud environments is more difficult than looking after it on-prem. It's a situation that can have grave ramifications. The Thales survey also found 35 percent of respondents suffered data breaches or failed audits of cloud-based data and applications in the last year.

Operational and software sovereignty

The second class of digital sovereignty is operational, Phipps continues. "This is where you've got your data in the cloud and you're worried about an insider threat or bad actors," he says. "That could be a cloud engineer, but it could also be your own people." A rogue employee intending to seek personal financial gain, could pilfer your data, as could a disgruntled worker of your own, potentially at the behest of a third party.

The threat to operational sovereignty might also appear in the form of malware, a corrupted application, or ransomware that has harvested the login credentials of a privileged user to gain escalated access to sensitive data or systems.

Finally, Thales lists software sovereignty as an issue for companies. "This is the ability to run your workloads wherever you want," Phipps says.

Companies increasingly want choice when they go to the cloud. They might want to run most of their workloads with a specific cloud provider to get improved commercial terms, he explains. But regulators are concerned that, if there's no possibility to perform a controlled and prompt stressed exit, those companies are effectively putting all their eggs in one basket. Organisations are being encouraged to ensure that their mission critical workloads are secure and portable which helps ensure operational resilience and business continuity should something go wrong.

For example, the Bank of England's Prudential Regulation Authority, which succeeded the Financial Services Authority, has expressed concern over banks' reliance on cloud computing from a single vendor. It recommends that Financial Services Institutions adopt multi-cloud architectures to spread risk and avoid vendor lock in, whilst the Digital Operational Resilience Act (DORA) in the EU advocates a similar approach.

Consequently, banks are under pressure to share their workloads around and have backup cloud providers that they can switch to in the event of an outage or a breakdown in the relationship.

Protecting digital sovereignty in practice

Thales has made a business of supporting these various sovereignty requirements. It uses a four-step process to get its clients onto a positive footing where they feel completely in control of their own data, operations, and software.

The company begins with a process of discovery. You can't control what you don't know about, after all. So it seeks to answer the questions: Where is your data and what is it? How sensitive is it?

Many organisations don't know these basic facts, says Phipps. They're generating new data all the time, and it's no longer simply a case of classifying database records in known fields. "Increasingly, a lot of the sensitive data that's been generated is unstructured and appears in random locations," he posits. Increased cloud adoption and modern remote work policies have contributed to 2.5 quintillion bytes of new data being generated every day in emails, presentations and spreadsheets according to some estimates. Without outside help, it's much harder to track the location of the sensitive information those vast volumes contain.

To that end, Thales developed its Data Discovery and Classification (DDC) solution, which scans for specific data types according to compliance models in which the organisation is interested. DDC uses machine learning algorithms, and a reference library of pre-defined data privacy and regulatory templates such as GDPR, CCPA, LGPD, PCI DSS and HIPAA, to find sensitive data of interest and apply a risk score based on the client's policies and compliance. DDC can then recommend manual remediation or apply it automatically which saves time and helps minimise the attack surface.

Protection through multi-layered encryption

What does this remediation look like? This is where the second step of Thales' methodology - protection - comes in. This focuses mainly on multi-layered encryption, which it splits into three types: data at rest, in transit, and in use.

As Phipps points out, all major cloud providers encrypt data at rest by default. However, there's a caveat: many of them only encrypt it at the disk level. That may stop someone retrieving the data in the unlikely event that they steal a physical disk from the cloud data centre, but what if they hijack someone's account remotely? Few, if any, cloud providers automatically encrypt data above the disk level such as at the file, database, or application level, which can help mitigate this threat.

Thales provides solutions to encrypt data at multiple levels, including structured and unstructured data, to achieve defence in depth. Transparent encryption at the file level protects the entire database for around a two percent performance overhead, Phipps says. Clients can apply higher levels of encryption to specific fields in the database should they wish.

While that imposes an extra performance overhead, it also provides heightened levels of protection where needed. Security, compliance and performance are often subject to trade-offs. The key is to adopt a risk-based approach to ensure that the protection appropriately applied is based on desired business outcomes.

When it comes to in-transit encryption, TLS is the de facto standard. However, Phipps argues that this can often struggle under the huge volumes of data that some companies process in the cloud. Instead, Thales offers high-speed encryption in its Network Encryptor products, which Phipps says are faster than TLS and offer a higher degree of protection.

Thales also focuses on encryption of data in use, which fights tampering or snooping during cloud processing. "We've been speaking to some critical infrastructure providers like energy companies, and they're worried about running sensitive workloads in the cloud for safety critical applications," Phipps says. "If somebody injects some malware into a chip that is processing data, they could effectively perform a denial of access and take the whole system down."

To combat this, cloud providers are working on various confidential computing initiatives. In these services, a portion of the chip becomes a secure enclave under the customer's control rather than the cloud service provider's. Microsoft Azure, Google Cloud and AWS all have offerings here.

Maintaining data sovereignty in the cloud

The third strut of Thales' digital sovereignty service is control. Leaving those encryption keys in the cloud theoretically puts them under the cloud service provider's control, which is a clear threat to the customer's sovereignty. This renders the customer vulnerable to malicious behaviour or mistakes from a third party such as the cloud service provider's own support engineers. It also puts the data at risk in the event of a subpoena from a foreign state.

The solution to this threat lies in the separation of duties. Creating and storing encryption keys outside the cloud, separating them from where the sensitive data is stored, gives the customer ultimate control over the data. Should a threat to the data arise, the customer can withhold the keys. Because the cloud service provider cannot unilaterally access those keys, they cannot be compelled to hand over the data to a third party.

Some cloud providers have introduced services that allow customers to store their own keys for cloud-based workloads, creating a clear segregation of duties between cloud service provider and customer. Google Cloud's External Key Manager (EKM) is a case in point.

Thales has been working with Google Cloud to help customers manage control of their data, operations, and software while still enjoying the benefits of cloud computing. In December 2020, they worked to integrate Thales' CipherTrust Key Broker service with Google Cloud's EKM. This enables customers to generate their encryption keys for Google's cloud service while keeping the keys outside the Google Cloud environment.

Since then, the two companies have expanded the partnership to cover other services. In June 2021, CipherTrust Manager and Thales' SafeNet Trusted Access product were integrated to support client-side encryption for Google's Workspace service for example. This lets organisations encrypt Google Drive data using their own keys.

In the last year, they've also collaborated on a cloud-based platform that complies with the French government's Trusted Cloud label. This requires cloud service providers to host their servers in France and allow only European companies to operate them, while limiting data transfers to other countries. In addition they're developing a Trusted Cloud-compliant service, scheduled for release in 2024. In the meantime, Thales majority owned joint venture with Google Cloud, S3NS, is already enabling Google Cloud customers in France to restrict access to EU locations, with the help of its own key management services.

Unifying cloud operations and key management while keeping keys under customer control solves one of the biggest problems in cloud security: the complexity of key management. The Thales survey found 57 percent of companies using at least five separate key management solutions, increasing the complexity and cost of managing data encryption. Aggregating and simplifying this key management will become steadily more critical as companies manage sensitive data in an increasingly distributed environment.

Monitoring digital sovereignty over time

As companies continue to expand their digital assets across complex multi-cloud and hybrid environments, they need a way to maintain visibility. This is where the final part of Thales' digital sovereignty process comes into play: monitoring. The company's CipherTrust platform, currently available as an on-premise product but soon to be launched as a service, provides a single pane of glass view of digital sovereignty across all of their tools and processes in multi-cloud and hybrid cloud environments. The system provides access to a range of third-party products alongside Thales' DDC.

Digital sovereignty principles and practices will only become even more complex over time, says Phipps. That's why he emphasises the benefits of building in privacy by design into hybrid multi-cloud architectures. Phipps also advocates the need for building human relationships based on trust and empathy that seek to maximize the customer experience.

"Technology on its own without the right partnerships at an advisory and supplier level probably won't make it easier for the customer to understand how to move forward," he concludes. This is a difficult puzzle to unravel, and it takes third-party expertise, and a partnership approach, to do it properly.

Sponsored by Thales.

See original here:

Simplifying digital sovereignty in a multi-cloud world - The Register

Categories
Cloud Hosting

Double Down On Innovation With Edge Computing | – Spiceworks News and Insights

Cloud services do not offer enough power for latency-intensive next-gen applications like AI, machine learning, robotics, smart cities, and automated manufacturing. These applications require faster computational speed than allowed in a centralized public cloud location. Edge offers a much faster computational speed with greater reliability and data processing in distributed locations closer to where data is generated, says Steve Grabow, SVP of Lumen Technologies.

The move to the cloud brought an interesting benefit for savvy business leaders: Freedom and focus, allowing them to get in an innovative state of mind. Rather than only operating an IT infrastructure, business innovators found the cloud freed them up to focus on developing innovative new applications.

The cloud also helped businesses double down on innovation. With the cloud, they could make critical applications available to personnel regardless of their location. It helped with cutting costs and consolidating valuable data.

But innovation wont stay only in the cloud alone. The next direction for these innovators to go is to the edge recognizing its the next frontier for innovation. They will move there for speed but garner a range of other benefits. While the cloud remains a great option for hosting many applications and workloads, it may not be the best place for many of todays latency-sensitive, interaction-intensive applications. Heres why.

Artificial intelligence, machine learning, robotic automation, and video analytics require near real-time data processing. We are talking about tremendous amounts of data that must be acquired, analyzed, and acted upon nearly instantly to produce the desired outcome.

This is where edge computing comes into play. Integrating edge computing with cloud computing offers faster data processing for these next-generation applications. Here is why the edge is where its all about.

With edge computing, companies can shorten the physical distance that data needs to travel to reach a public cloud location or on-premises data center, resulting in reduced latency. A large, centralized data center could be hundreds of miles from where data is produced and collected. Edge computing allows businesses to place computing and storage where digital interactions occur. Edge devices can collect, process, and store data in a more distributed fashion than the cloud alone, leading to quicker response times and reduced latency.

There are other benefits to shortening the distance data needs to travel, and that is improved security. Security remains a top priority for global IT decision-makers. 80% are concerned about data security. By physically isolating data, applications, and other resources at the edge, customers can achieve more privacy and security than the cloud. This reduces risk and allows businesses to support industry-specific regulatory or compliance requirements better.

Many edge devices include built-in security capabilities that protect data that lives or transports through devices and out of centralized data centers. As the data lives at the farthest reaches or edge of a companys network, it becomes easier to isolate and protect key data sources allowing autonomous operations to avoid disruption.

The idea behind edge computing is beautifully simple: When you cant get your data closer to your data center, you move your data center closer to your data. Think about it, applications that would power robotics dont have time to travel to the public cloud to get the needed performance. Applications that require high volumes of interactions, like streaming analytics, are subject to costly fees for moving that data in and out of the cloud.

Enter edge data centers, which can facilitate much faster response times. 77% of global IT decision-makers say that only edge computing can solve their latency challenges, and 56% say that their mission-critical applications will require five milliseconds of latency or less in the coming years. Thats because data flow must be seamless and data processing lightning fast to enable things like cashier-less checkout at retail or robotic automation on the manufacturing floor. If a system or application takes too long to respond or put in place an action, the result will be a poor customer experience.

Edge computing can deliver that ultra-low latency and improved reliability. Processing data locally at the edge also reduces the traffic flowing to and from central servers, which can cut those costly data transfer fees and improve overall network performance.

See More: 4 Reasons Why Enterprise Innovation Will Come From the Cloud

Cloud computing and edge computing are distinct but complementary. However, a central cloud often cant provide the performance, low latency, and scale businesses need for their next-generation applications. A more agile, distributed environment that extends the cloud is now necessary.

Edge computing brings a unique combination of local computing and storage with built-in security and unified orchestration. Businesses can still manage applications with similar ease as the cloud but achieve reduced latency and better performance.

This does not mean that the edge replaces the public cloud or data centers. Rather, the edge is an additional place to run workloads when it makes sense and when end users can benefit from more speed.

According to Gartner, enterprise-generated data processed outside a traditional data center or cloud will jump to 75% by 2025. On their own, more than cloud services are needed to manage this growing amount of data. Businesses are grappling with creating better ways of acquiring data, analyzing it for insights, and acting upon it to drive a specific outcome. With edge computing, businesses can bring millions of smaller cloud environments closer to billions of connected devices to do more with their data.

Driving unique digital experiences is how businesses compete and win. And at the heart of those digital experiences is data. Innovators will lead the way to the edge. Future-ready businesses will be prepared at the edge for the data-intensive applications of the 4th Industrial Revolution.

Why do you think data will require edge and cloud in the future? Let us know on Facebook, Twitter, and LinkedIn.

Original post:

Double Down On Innovation With Edge Computing | - Spiceworks News and Insights

Categories
Cloud Hosting

EDNS inks a partnership deal with Alibaba Cloud to explore the … – PR Newswire

SINGAPORE, Dec. 23, 2022 /PRNewswire/ --Ether Domain Name Services (EDNS) proudly announces that it inked a partnership deal with Alibaba Cloud, the digital technology and intelligence backbone of Alibaba Group, to explore the possibilities of Web3 adoption.

Under the partnership, EDNS, a Web3 pioneer and enthusiast, will work with Alibaba Cloud, Asia Pacific's leading infrastructure as a service (IaaS) provider, to discover the potential of integrating their scalable, high performance and stable infrastructure with blockchain to bring products to Web3 frontiers.

The collaboration between EDNS and Alibaba Cloud was launched at a workshop themed "The Power of Web 3.0" on November 29, 2022, where Joey Lam, EDNS Founder & CEO and Derek Wang, General Manager of Singapore, Alibaba Cloud Intelligence, signed the Memorandum of Understanding (MOU).

Joey Lam, EDNS Founder & CEO and Mike Ng, EDNS Co-founder & Technical Director discussed extensively about Web3, followed by a panel on the future of Web3 projects led by Emil Chan, Chairman of The Association of Cloud and Mobile Computing Professionals, and blockchain Lawyer Henry Yu.

Consequently, EDNS will also participate in "Web3.0 Cloud Day Singapore 2022" co-hosted by Alibaba Cloud and Odaily. "At EDNS, we are actively building the infrastructure for the upcoming Web 3.0 revolution. Right now, is the best time to reach out for strategic partnerships to strengthen our ecosystem. We are honored that what we have achieved so far has been recognized by Alibaba Cloud.

"The motivation behind this partnership is joining hands to deliver disruptive Web3 solutions that are demanded by the market, especially in the storage area," said EDNS CEO Ms Joey Lam.

About EDNS Domains

Ether Domain Name Services (EDNS) is an Ethereum-based lookup service built on the polygon blockchain. It also leverages name and lookup service built on the Polygon blockchain. Since it is compatible with Ethereum, crypto users can translate their machine-readable addresses to human-readable addresses. It provides a Decentralized Domain Naming Service for Web 3.0-related demands, including NFT, digital assets, Web hosting, and DeFi in the Digital world. More info: https://www.edns.domains/.

Photo - https://mma.prnewswire.com/media/1973329/From_Left_Right_Ms_Joey_Lam_Tsz_Yin_Founder_EDNS_Domains.jpg

SOURCE EDNS Domains

Go here to see the original:

EDNS inks a partnership deal with Alibaba Cloud to explore the ... - PR Newswire

Categories
Cloud Hosting

2 Metaverse Stocks That Could Make You Richer in 2023 – The Motley Fool

It wasn't all that long ago that investors were excited about the potential for the metaverse. Some analysts were tossing around projections that the market for the virtual world could eventually be in the trillions of dollars. The stocks of companies with major metaverse initiatives were on fire.

That was then. Today, there isn't nearly as much talk about the metaverse. Most of those once-sizzling stocks have flamed out.

But don't think for a second that the metaverse opportunity isn't significant. There's still a lot of money to be made -- by companies and investors.Here are two metaverse stocks that could make you richer in 2023.

You might not think ofAmazon (AMZN 1.74%) as a metaverse stock. After all, the company's head of devices Dave Limp said earlier this year that Amazon is focused on "the real world" and not the metaverse.

However, there's more to the story. In February, Amazon posted a job opening for a product manager on its Amazon Web Services (AWS) team who "will own the delivery of cloud-based metaverse services." This job posting shows that the company actually is more focused on the metaverse than you might think.

This shouldn't be surprising. AWS reigns as the leading provider of cloud hosting services. The metaverse will present a massive growth opportunity for the cloud hosting market.

Amazon would be crazy to ignore the metaverse. And it isn't crazy.

I predict that Amazon will ultimately be among the big winners if and when the vision of the metaverse becomes a reality. Before that happens, though, the stock could (and will, in my view) make investors money in 2023 for a completely different reason.

Amazon stock is historically cheap after plunging close to 50% this year. Much of this decline is related to macroeconomic factors, rather than anything specific to the company. I'm not in the camp that believes a new bull market is imminent. But I do think it's quite possible that we could see a big stock market rebound in the second half of next year.

Meta Platforms (META 0.79%) provided the main catalyst for investors' initial enthusiasm about the metaverse opportunity. The company even changed its name from Facebook to reflect its big focus on it.

That metaverse pivot appears to have backfired badly. Meta stock has plunged close to 65% this year. CEO Mark Zuckerberg has been raked over the coals by some investors for spending too much money on what they view as a quixotic dream.

It's true that Meta's Reality Labs, the home to its metaverse initiatives, is burning through cash. However, Zuckerberg made a pretty good case for this spending in an interview earlier this month.

He noted that 90% of Reality Labs' research and development investments are going toward virtual-reality headsets and augmented-reality glasses. Those efforts could pay off handsomely, even if Zuckerberg's metaverse vision isn't achieved.

The metaverse won't be a moneymaker for Meta anytime soon. But the company's social networking apps continue to generate enormous revenue. In the third quarter alone, Meta raked in $27.7 billion in sales with profits of nearly $4.4 billion. Although both numbers reflected year-over-year declines, that's still a lot of money.

Like Amazon, Meta is feeling the impact of macroeconomic headwinds. Advertising spending has fallen. However, if a recession is avoided (as Goldman Sachsexpects), the ad market could regain momentum next year. Even if a recession comes, many economists predict that it will be short and mild.

Importantly, Meta's user base continues to grow. In Q3, the numbers of daily and monthly active users across its family of social apps both increased by 4% year over year to 2.93 billion and 3.71 billion, respectively.

The company is also rolling out new products that should retain existing users and attract new ones. It's retooled its feeds to focus more on content curated by artificial intelligence (AI). And Meta is working hard to increase monetization, as well, especially with its WhatsApp messaging app.

Meanwhile, Meta stock is attractively valued. Shares trade at only 14.5 times expected earnings. Aswath Damodaran, the NYU finance professor who literally wrote the book on valuing companies (actually, he's written several of them), believes that the stock has practically all upside potential based on its current valuation.

With all of this in mind, Meta looks like a stock that could very well make investors richer in 2023. If its monetization and metaverse efforts pay off, that increased wealth could be multiplied over the long term.

John Mackey, CEO of Whole Foods Market, an Amazon subsidiary, is a member of The Motley Fool's board of directors. Randi Zuckerberg, a former director of market development and spokeswoman for Facebook and sister to Meta Platforms CEO Mark Zuckerberg, is a member of The Motley Fool's board of directors. Keith Speights has positions in Amazon.com and Meta Platforms. The Motley Fool has positions in and recommends Amazon.com, Goldman Sachs Group, and Meta Platforms. The Motley Fool has a disclosure policy.

More:

2 Metaverse Stocks That Could Make You Richer in 2023 - The Motley Fool