Categories
Dedicated Server

Navy Pier to host party to celebrate New Year’s – The Beverly Review

Navy Pier will host the party of the year on the biggest night of the year in the opulent and historic Aon Grand Ballroom.

New Year on the Pier features premium catering and bar, dancing and live band and DJ entertainment, ending with a festive midnight countdown followed by a fireworks show at midnight. Doors open at 8 p.m., and the party concludes at 1 a.m.

Matt Kysia from Kysia Live returns as the master of ceremonies. Entertainment includes The Lakeshore Encores, performing a variety of pop, Motown and funk; Supersonic trio Treble Squad, consisting of a violinist, saxophonist and drummer performing electronic music; and Kice, a DJ and producer based out of Chicago.

The general admission Celebration Package includes premium spirits, craft and domestic beers, house wines, champagne, gourmet appetizers, party favors for the duration of the event, and photo opportunities galore.

VIP admission also includes access to the VIP-only balcony, exclusive rooftop access to view the fireworks, private food stations, ultra-premium bar, party favors and express entry.

A limited number of VIP Lounge Table Packages will be made available. The VIP Lounge Table Package includes 12 VIP tickets with lounge seating, skybox view of the stage and dance floor, dedicated server with table-side appetizer trays, beer and cocktail table service, and premium champagne.

For more information or tickets, visit the website at navypier.org.

Follow this link:

Navy Pier to host party to celebrate New Year's - The Beverly Review

Categories
Dedicated Server

Follow the ping : Frisco Gaming – Red Bull

Follow the ping : Frisco Gaming  Red Bull

Read more here:

Follow the ping : Frisco Gaming - Red Bull

Categories
Dedicated Server

Edgecore Networks Introduces the CSP-7550 Server-switch Solution for Network Visibility Monitoring, Virtualized Security, and Mobile LTE/5G Gateway…

Driving new open networking solutions and enhanced service experiences across high-performance compute and multi-cloud landscapes

HSINCHU, Taiwan, December 13, 2022--(BUSINESS WIRE)--Edgecore Networks, the leader in open networking solutions, today announces the hyper-cloud appliance solution for high-performance network visibility monitoring, hardware-enhanced virtualized security, and mobile LTE/5G gateway applications. Fueled by the Intel Tofino Expandable Architecture, the CSP-7550 is a server-switch based on Intel Xeon Scalable processors with built-in AI accelerators. The switch system includes 32 x 100 GbE network ports based on a P4 programmable Intel Tofino Intelligent Fabric Processor (IFP) and optimized for the Intel Xeon Scalable platform increasing CPU capacity and performance for virtual machine consolidation and density, as well as boosting memory bandwidth.

As a network solution provider, Edgecore understands the requirements of modern network deployments and is dedicated to delivering new levels of service and breakthrough performance for operators, unlocking the potential of open networking and releasing a new service experience across mobile and multi-cloud landscapes. The CSP-7550 is a powerful platform optimized for the Intel Tofino Expandable Architecture to deliver large and fast table lookups, high-performance computing, and predictable forwarding times. The CSP-7550 gives cloud service providers the scalability to handle increasing traffic loads and demanding computing requirements.

The CSP-7550 includes eight DDR4 DIMM slots per CPU, with local storage options including two SATA III or PCIe. It supports four open PCIe slots for customers to choose whatever kind of standard FPGA, Smart NIC, or AI/ML PCIe cards etc. for different applications. In addition, the CSP-7550 supports an optional FPGA card, which has a high-speed connection to the Tofino chipset. With the FPGA card, the CSP-7550 is able to support extra-large tables for hundreds of millions of session entries or provide tens of GBs of high-speed buffering for Hierarchical Quality of Service (HQoS).

The CSP-7550 is a truly open platform, operators have the flexibility to install an operating system and application software that precisely suits their needs or build their own customized device that represents a solid future-proof investment. The CSP-7550 also supports Enterprise SONiC Distribution by Edgecore, with various applications and features that can be easily added and integrated based on a customers needs.

With its server-grade computing and hardware-enhanced security capabilities, the CSP-7550 is an ideal solution as a Server Load balancer (SLB), Network Packet Broker (NPB), Broadband Network Gateway (BNG), or 5G User Plane Function (UPF). The new server-switch solution delivers high-performance and flexibility in cloud data centers and at the edge, enhancing computing, switching, and storage applications to meet the demands of modern network deployments.

Nanda Ravindran, Vice President of Product Management of Edgecore, said, "Edgecore's new hyper cloud appliance delivers the industrys leading turnkey solution for the most demanding of network environments. Network operators are starting to embrace open network solutions and requiring more powerful platforms for high-performance computing. CSP-7550 Server-switch with enhanced CPU capacity and performance enables value-added application development to address continuously expanding network requirements. Edgecore offers greater choice and flexibility for network operators to build modern networking infrastructures for the multi-cloud and mobile-centric world."

"As the industry is gearing towards programmable infrastructure, we are pleased to offer multi-terabit performance with Intel Tofino Expandable Architecture optimized for customers evolving edge-to-cloud requirements, such as load balancing, security, telco user plane functions and broadband gateways," said Barry Davis, General Manager of Marketing and Software Planning at Intel. "Based on P4 Tofino Expandable Architecture, which combines fully programmable Intel Tofino Intelligent Fabric Processors (IFPs) with Intel Xeon Scalable CPUs and accelerators such as Intel Stratix 10 MX FPGA cards, our integrated solution will fulfill many different deployment requirements ranging from medium businesses to carrier-level service providers."

About Edgecore Networks

Edgecore Networks Corporation is a wholly owned subsidiary of Accton Technology Corporation, the leading network ODM. Edgecore Networks delivers wired and wireless networking products and solutions through channel partners and system integrators worldwide for data center, service provider, enterprise, and SMB customers. Edgecore Networks is the leader in open networking, providing a full line of open 1G-400G Ethernet switches, core routers, cell site gateways, virtual PON OLTs, packet transponders, and Wi-Fi access points that offer a choice of commercial and open source NOS and SDN software. For more information, visit http://www.edge-core.com.

All trademarks, service marks, registered marks, or registered service marks are the property of their respective owners.

2022 Edgecore Networks. The information contained herein is subject to change without notice. Edgecore Networks shall not be liable for technical or editorial errors or omissions contained herein.

Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries.

View source version on businesswire.com: https://www.businesswire.com/news/home/20221213005098/en/

Contacts

Lucille Lulucille_lu@edge-core.com +886-3-505-3674

More:

Edgecore Networks Introduces the CSP-7550 Server-switch Solution for Network Visibility Monitoring, Virtualized Security, and Mobile LTE/5G Gateway...

Categories
Dedicated Server

Xnspy stalkerware spied on thousands of iPhones and Android devices – TechCrunch

A little-known phone monitoring app called Xnspy has stolen data from tens of thousands of iPhones and Android devices, the majority whose owners are unaware that their data has been compromised.

Xnspy is one of many so-called stalkerware apps sold under the guise of allowing a parent to monitor their childs activities, but are explicitly marketed for spying on a spouse or domestic partners devices without their permission. Its website boasts, to catch a cheating spouse, you need Xnspy on your side, and, Xnspy makes reporting and data extraction simple for you.

Stalkerware apps, also known as spouseware, are surreptitiously planted by someone with physical access to a persons phone, bypassing the on-device security protections, and are designed to stay hidden from home screens, which makes them difficult to detect. Once installed, these apps will silently and continually upload the contents of a persons phone, including their call records, text messages, photos, browsing history and precise location data, allowing the person who planted the app near-complete access to their victims data.

But new findings show many stalkerware apps are riddled with security flaws and are exposing the data stolen from victims phones. Xnspy is no different.

Security researchers Vangelis Stykas and Felipe Solferini spent months decompiling several known stalkerware apps and analyzing the edges of the networks that the apps send data to. Their research, presented at BSides London this month, identified common and easy to find security flaws in several stalkerware families, including Xnspy, such as credentials and private keys left behind in the code by the developers and broken or nonexistent encryption. In some cases the flaws are exposing the victims stolen data, now sitting on someone elses insecure servers.

During their research, Stykas and Solferini discovered clues and artifacts that identified the individuals behind each operation, but they declined to share details of the vulnerabilities with the stalkerware operators or publicly disclose details about the flaws for fear that doing so would benefit malicious hackers and further harm victims. Stykas and Solferini said that all of the flaws they found are easy to exploit and have likely existed for years.

Others have waded into murkier legal waters by exploiting those easy-to-find vulnerabilities with the apparent aim of exposing stalkerware operations as a form of vigilantism. A huge cache of internal data taken from the servers of TheTruthSpy stalkerware and its affiliate apps and given to TechCrunch earlier this year allowed us to notify thousands of victims whose devices were compromised.

Since our investigation into TheTruthSpy, TechCrunch has obtained further caches of stalkerware data, including from Xnspy, exposing their operations and the individuals who profit from the surveillance.

Xnspy advertises its phone monitoring app for spying on a persons spouse or domestic partner. Image Credits: TechCrunch (screenshot)

Data seen by TechCrunch shows Xnspy has at least 60,000 victims dating back to 2014, including thousands of newer compromises recorded as recently as 2022. The majority of victims are Android owners, but Xnspy also has data taken from thousands of iPhones.

Many stalkerware apps are built for Android since it is easier to plant a malicious app than on an iPhone, which have tighter restrictions on which apps can be installed and what data can be accessed. Instead of planting a malicious app, stalkerware for iPhones tap into a devices backup stored in Apples cloud storage service iCloud.

With a victims iCloud credentials, the stalkerware continually downloads the devices most recent iCloud backup directly from Apples servers without the owners knowledge. ICloud backups contain the majority of a persons device data, allowing the stalkerware to steal their messages, photos and other information. Enabling two-factor authentication makes it far more difficult for malicious individuals to compromise a persons online account.

The data we have seen contains more than 10,000 unique iCloud email addresses and passwords used for accessing a victims cloud-stored data, though many of the iCloud accounts are connected to more than one device. Of that number, the data contains more than 6,600 authentication tokens, which had been actively used to exfiltrate victims device data from Apples cloud, though many had expired. Given the possibility of ongoing risk to victims, TechCrunch provided the list of compromised iCloud credentials to Apple before publication.

The Xnspy data we obtained was unencrypted. It also included information that further unmasked Xnspys developers.

Konext is a small development startup in Lahore, Pakistan, manned by a dozen employees, according to its LinkedIn page. The startups website says the startup specializes in bespoke software for businesses that seek all-in-one solutions, and claims to have built dozens of mobile apps and games.

What Konext doesnt advertise is that it develops and maintains the Xnspy stalkerware.

The data seen by TechCrunch included a list of names, email addresses and scrambled passwords registered exclusively to Konext developers and employees for accessing internal Xnspy systems.

The cache also includes Xnspy credentials for a third-party payments provider that are tied to the email address of Konexts lead systems architect, according to his LinkedIn, and who is believed to be the principal developer behind the spyware operation. Other Konext developers used credit cards registered to their own home addresses in Lahore for testing the payment systems used for Xnspy and TrackMyFone, an Xnspy clone also developed by Konext.

Some of Konexts employees are located in Cyprus, the data shows.

Konext, like other stalkerware developers, makes a concerted effort to conceal its activities and keep the identities of its developers from public view, likely to shield from the legal and reputational risks that come with facilitating covert surveillance on a massive scale. But coding mistakes left behind by Konexts own developers further link its involvement in developing stalkerware.

TechCrunch found that Konexts website is hosted on the same dedicated server as the website for TrackMyFone, as well as Serfolet, a Cyprus-based entity with a conspicuously barebones website, which Xnspy says processes refunds on behalf of its customers. No other websites are hosted on the server.

TechCrunch contacted Konexts lead systems architect by email for comment, both to his Konext and Xnspy email addresses. Instead, a person named Sal, whose Konext email address was also in the data but declined to provide their full name, responded to our email. Sal did not dispute or deny the companys links to Xnspy in a series of emails with TechCrunch, but declined to comment. When asked about the number of compromised devices, Sal appeared to confirm his companys involvement, saying in one email that the figures you quoted dont match with what we have. When asked for clarity, Sal did not elaborate.

Xnspy is the latest in a long list of flawed stalkerware apps: mSpy, Mobistealth, Flexispy, Family Orbit, KidsGuard and TheTruthSpy have all exposed or compromised their victims data in recent years.

If you or someone you know needs help, the National Domestic Violence Hotline (1-800-799-7233) provides 24/7 free, confidential support to victims of domestic abuse and violence. If you are in an emergency situation, call 911. The Coalition Against Stalkerware also has resources if you think your phone has been compromised by spyware. You can contact this reporter on Signal and WhatsApp at +1 646-755-8849 or zack.whittaker@techcrunch.com by email.

Read more:

Read more:

Xnspy stalkerware spied on thousands of iPhones and Android devices - TechCrunch

Categories
Dedicated Server

What AIIMS server hijack tells us about cyber security: Every database is vulnerable, and our defences a – Times of India

Mishi Choudhary and Faisal Farooqui

For days, hundreds of dedicated healthcare professionals at Delhis prestigious AIIMS had to work with pen and paper to register a sea of patients waiting in long queues after a ransomware attack. What should have been a seamless task of admitting patients in the hospital or rendering check-ups and diagnostic services in the outpatient department had to be done as it was in the 1970s and 80s.

This is because on November 23 the core or main servers of AIIMS were hijacked (or held hostage) by an unknown, faceless enemy who could have been operating as a single individual or a group or organisation. The servers were partially restored on December 6 and online appointments were restored earlier this week.

Read full opinion on TOI+

Views expressed above are the author's own.

END OF ARTICLE

Continue reading here:

What AIIMS server hijack tells us about cyber security: Every database is vulnerable, and our defences a - Times of India

Categories
Dedicated Server

UTXO Technologies, Inc., Wholly Owned Subsidiary of IDGlobal … – StreetInsider.com

Get inside Wall Street with StreetInsider Premium. Claim your 1-week free trial here.

DOWNERS GROVE, IL / ACCESSWIRE / December 15, 2022 / IDGlobal Corp. (OTC PINK:IDGC) - is pleased to announce acquiring a 4000 sq. ft. specialized facility, thus extending the Company's service range with ultimate Cybersecurity as a Service (CaaS) and Virtual Power Plant platform solutions, through the Utmost Tech Research & Development Center, Ltd., based in Poland. Utmost Tech through UTXO is on a mission to scale up its' existing data center infrastructure and upgrade the computing power with the latest technology from Nvidia - the Grace Hopper H100 GPU architecture.

High Performance Computing - to answer rapidly growing demand for big data processing and artificial intelligence apps the IT world is migrating from CPU-based data center architecture into the GPU architecture with distributed microservices that provides computing power outperforming by 20x the old CPU-based datacenters.

UTXO is specialized in manufacturing and servicing of multiple electronics devices, including industrial computers and High-Performance Computing servers, dedicated for data centers and AI factories. The Company has established procurement process of electronics components from partners that include Nvidia and Intel as well as many distributors world-wide. The basic building block of the UTXO's AI Factory Data Center is the AI Wall which consists of 20 UT-8xGPU (or 20x UT-4xGPU) servers installed in 5 racks, 4 servers per rack. Additional rack for switches is installed in the middle to assure proper, same length cable distribution. This size optimizes both performance and cost while still minimizing system bottlenecks so that complex workloads are well supported. "A single AI Wall is capable of 48 AI PFLOPS. The UTXO AI Factory consists of 4 AI Walls connected via two layer switching system, providing 192 Peta FLOPS across 80 servers, states Marcin Michel, CEO of UTXO Technologies, Inc."

"The Company is elated on the progress we have made over the last quarter of the year, and we will be providing a lot more details on the various products, forecasts and projections, as well as lending more insight as to the future of IDGC, states interim CEO, Sebastien Dufort."

ABOUT UTXO TECHNOLOGIES, INC. (WWW.UTMOSTTECH.COM)

UTXO is a multi-disciplinary hi-tech organization consisting of several teams experienced in advanced IT solutions, electronics, software and hardware development, as well as nano material science. The teams are dedicated disruptive innovators in the energy sector, highly focused within the world of distributed renewable energy solutions. The teams work together under DevOps principles providing to UTXO Clients advanced IT services & Machine Learning Operations that run on modern High Power Computing distributed GPU server infrastructure, owned and operated by UTXO.

IDGC's Plan of Operations.

IDGC is an emerging growth company under the JOBS Act of 2012 and, as a diversified holding company, will focus on emerging and middle-market international investment opportunities through its subsidiaries. IDGlobal Corp. is an organization engaged in the business of fostering early-stage companies through the different developmental phases until the companies have sufficient financial, human, and physical resources to function on their own.

Safe Harbor Statement under the Private Securities Litigation Reform Act of 1995: The statements contained herein are forward-looking statements that are subject to risks and uncertainties that could cause actual results to differ materially from those expressed in the forward-looking statements, including, but not limited to, certain delays beyond the Company's control with respect to market acceptance of new technologies or products, delays in testing and evaluation of products, and other risks detailed from time to time in the Company's filings with the Securities and Exchange Commission. Please read the full disclaimer at http://www.idglobalcorp.io.

Contact: [emailprotected] for more information

SOURCE: ID Global Corporation

View source version on accesswire.com: https://www.accesswire.com/731965/UTXO-Technologies-Inc-Wholly-Owned-Subsidiary-of-IDGlobal-Corp-Is-Pleased-to-Announce-a-Real-Estate-Investment-Transaction-to-Open-the-Companys-First-AI-Factory

See original here:

UTXO Technologies, Inc., Wholly Owned Subsidiary of IDGlobal ... - StreetInsider.com

Categories
Dedicated Server

Bar Talk: PARC Aspen off to tasty start – The Aspen Times

Just over a year after beloved local gathering spot LHosteria closed in Aspen, another restaurant that wants to be the hub of the local dining scene has opened in its place.

PARC Aspen officially opened Dec. 16 but enjoyed a soft opening on Dec. 13.

The below-street level eatery has been fully-renovated in a farmhouse style, the walls whitewashed, and the space heavily brightened. Gone are the days of dark corners and the dim lighting of PARCs predecessor.

According to the PARC Aspen website, the new restaurant is focused on revitalizing the local dining scene in Aspen with a menu of locally-sourced, seasonally-curated dishes.

The idea of locally-sourced and seasonal or as our server put it, Aspen seasonal also extends to the cocktail menu, which highlights a few Roaring Fork Valley and Colorado-based distilleries, plus a section dedicated to winter flavors.

The selection of cocktails is broken down into five sections, starting with PARC Aspen specialties. Just about every mainstream spirit option is represented in the specialties section, and the liquor is paired with some more unique ingredients, such as a tequila drink called the Spiral Incline that has tomatillo in it, and the Newbury Park, which is the drink that caught my eye first because of its flavors.

The Newbury Park is made with Roaring Fork Vodka, raspberry, beet, Domaine De Canton Ginger Liqueur and topped with Fever Tree. The result is a beautiful and bright raspberry-colored drink that you might be able to trick your mind into thinking is just a healthy juice, thanks to the beets. The taste is slightly beet-forward on the first sip, but the finish is all tart raspberry. The warming and spicy presence of the ginger is there but not overwhelming, and I believe the presence of the bubbles from the Fever Tree helps dilute the ginger flavor a contribution to keeping the drink light. Vodka, although not my preferred liquor by any means, was definitely the correct spirit choice for the cocktail because its easily hidden and doesnt take away from the fresh, fun flavor of the drink. I would honestly rate this a 10 out of 10 and can see this being an easy go-to drink.

Next up on the PARC Aspen cocktail list is a short section of zero-proof cocktails, two options to be exact, followed by two hot alcoholic drinks (620 Toddy and Mulled Wine), and then a nice selection of classic cocktails, including an Old Fashioned, Jimmys style, and the spirit-forward Vesper.

My next, and final, cocktail of the evening came from the seasonal Winter Specialties section.

Two of the drinks in this section sound like good, creamy, dessert cocktails, while the other two seem more appropriate for sipping with your meal.

I chose the A White Winter cocktail, made again with Roaring Fork Vodka, St-Germain Elderflower Liqueur, white cranberry and egg white.

This drink appeared and was totally different than my expectations but not in a bad way.

Its served in a martini glass and is indeed the color of a white winter with a nice amount of foam from the egg whites and garnished with a dash of bright-blue sugar crystals. It tastes like youre drinking a cloud, both in texture and flavor. Somehow all the ingredients, when mixed together, seem to cancel each other out. There are floral notes of the St-Germain on the nose, but the first flavor on the tongue is somehow cotton candy-esque. Although the drink starts off white, like a wintery day in Aspen, by the end, it turns an icy blue, thanks to the sugar crystals on top.

I wont go into discussing the food because this is a drink column, after all, but, safe to say, it did not disappoint, and it was full of flavor.

I already have my eyes on some other cocktails I want to try from the menu such as the Blueberry Glacier found on the Winter Specialties section and look forward to seeing how the restaurant changes with the seasons, as it finds its foothold in Aspen.

Cheers, PARC Aspen, youre off to a great start!

Follow this link:

Bar Talk: PARC Aspen off to tasty start - The Aspen Times

Categories
Dedicated Server

How Musk may reinvent the internet without even trying – The Hill

Billionaire entrepreneur and innovator Elon Musk might have just opened a new chapter in the history of the internet albeit unintentionally. Hisnew Twitter policiesand thedigital refugees he created, most fleeing to the heretofore obscureTwitter-like platform Mastodon, could give birth to a very new type of social media experience.

Upon buying Twitter, Musk,a self-described free speech absolutist, reinstated accounts belonging to formerPresident Donald Trump, the right-wing satire siteBabylon Beeand the occasionally crude left-wing comedianKathy Griffin.This was coupled with removing verification requirements (that have since been updated) while adding a monthly fee, as well as mass layoff at the company.

More recently,Twitter has suspended several journalistswho reported on information about Musks jet.

Disgruntled with the changes and controversy, some users stampeded to other services, such as the far smaller European Twitter alternative Mastodon, the brainchild of free-speech advocate and German software engineerEugen Rochko. But can Mastodon compete with Twitters reach? AlthoughMastodons 1 million userspale in comparison toTwitters 238 million users, Mastodons secret weapon is that its more than a mere site. It is a federation of sites that can maintain their autonomy while exchanging information with each other. Mastodon uses an open and freesocial media protocol, ActivityPub,which allows any social medium to connect to any other, as long as they are open and transparent with each other. Several platforms, such as the YouTube-likePeerTube, Instagram alternativePixelfed, social networkingFriendicaalready do it.The shift from Twitter to Mastodon and ActivityPub could be an epoch-making digital revolution, comparable with the invention of the web itself. ActivityPub may restore the web and its most sophisticated layer, social media, to the open and universally connectable vision of the internet itself. Our most popular social media platforms Facebook, Twitter and TikTok remain walled gardens, only allowing the users to exchange information within apps under the same ownership or create apps within each platform. This drawback does not apply to ActivityPub-empowered sites. Far from walled gardens, they are fields connected by open roads.

What is ActivityPub and how does it work? At the simplest level, it is a method (protocol) for social media servers to talk to each other even if they are owned by different entities and dedicated to different purposes. Imagine that CBS News, BBC, National Review and Fox News create their own social media servers using the Mastodon user interface and ActivityPub as a server-to-server protocol. All that the owners of these sites must do to connect to each other is to list the server addresses of each other on a list of federated sites.

Immediately, the users of the sites that talk to each other will be able to follow other users reposts or comments across server boundaries. This has several advantages. The first and most important is that social media owners have a direct and immediate relationship with their users. The owners do not need to be corporate, by the way. Independent media organizations, nonprofits or user co-ops can create their own media servers. They can develop their content policies, privacy protection methods and financial support methods, from advertising (which they control) to subscription or donation-based support. Social media owners can also decide when and how to open access to other federation members. This may includetrial periods or suspension of communication.

Finally, any company or nonprofit organization can use a social media interface of their own, not Mastodon, and still be able to talk to other sites using ActivityPub. The interface can include new tools, such as a Trust button to replace the like or favorite buttons. My colleagues and I created the TrustFirst social media server powered by ActivityPub and Mastodon. On it, machine learning analyzes the content you are about to reshare or like and advises you whether the content is trustworthy. A new button invites you to trust or not and the trust value is used in disseminating the content more or less.

More intriguingly, Musk could also implement ActivityPub on Twitter, asTumblr did. He would ensure the sites long-term reach while Twitter users will have the cake (be on Twitter) and eat it too (not be beholden to its rules).

The genius of the internet is that it allowed and should allow independently owned and managed sites to talk to each other. This is reflected in the very name of the internet, which is a network of networks (inter-net), not one integrated network. The closed social media detour in the history of communication might just come to a very interesting swerve. Watch out for tight turns!

Sorin Matei, Ph.D., is the College of Liberal Arts associate dean of research and graduate education and a professor of communication at Purdue University, where he studies the relationship between information technology, group behavior and social structures in a variety of contexts. He is a senior research fellow at the Krach Institute for Tech Diplomacy at Purdue.

View original post here:

How Musk may reinvent the internet without even trying - The Hill

Categories
Cloud Hosting

Managing Ediscovery In The Cloud: Practical, Ethical and Technical … – JD Supra

In this excerpt from our white paper on managing ediscovery in the cloud, we explain the basics of the cloud and its biggest benefits in ediscovery. Click here to download the full white paper.

As early pioneers of cloud computing in legal tech, the cloud has always been an integral part of Nextpoints business model. Now, many providers are making the switch to the cloud, and more and more law firms are embracing ediscovery in the cloud. Even if youve used cloud services for a long time, you may have never stopped to consider why is the cloud the best solution? And if youre looking to adopt cloud technology or switch to a new provider, its important to understand the fundamentals of the cloud and why its the only ediscovery solution for modern litigators.

The greatest upside is that cloud providers like Amazon, Microsoft, and Rackspace can invest billions of dollars each year in research and development of cloud platforms, providing more robust services and security than any company or law firm can hope to provide. Thanks to those investments, SaaS ediscovery systems cost about 35 percent less than solutions that are hosted in-house.

Nearly 60% of businesses transitioned to the cloud in 2022, and this trend is expected to continue. The benefits that are enticing businesses to adopt cloud computing include:

Thats the power of cloud computing, but it is also part of the challenge cloud computing poses for law firms. So much data is being created in todays networked and super-massive computing environments that it will quickly overwhelm litigation. Law firms struggle to process and review gigabytes of data, while many types of litigation routinely involve multiple terabytes of information. The cloud is creating a tsunami of digital evidence, but it is also the only cost-effective solution to meet the challenge it has created.

Why Cloud Ediscovery?

Ediscovery is ideally suited to maximize the benefits of cloud computing. The volume of electronic data is such that when a legal matter arises, a law firm or corporate counsel can suddenly be faced with a mountain of electronic data, which can cost hundreds of thousands of dollars to process in-house or with the service of outside consultants. Then theres licensing fees, software installation, hardware costs, and consulting fees all of which make ediscovery costs spiral out of control. As law firms and their clients become increasingly distressed by these kinds of bills, the Software-as-a-Service model promises to cut many of these needless costs by providing an all-in-one processing, stamping, reviewing, and production platform.

The bottom line is that litigation software built for local networks simply cannot cope with exploding volumes of digital data. The right ediscovery cloud platform offers low-cost data hosting, built-in processing functionality, and levels of security no on-premise solution can match.

Security: The Real Danger is Doing it Yourself

In considering on-premise versus cloud solutions, firms that host sensitive client data on-premise are likely to find that they themselves are the greatest security risk. A network hosted on-premise can afford very little in the way of network security beyond what can be found in an off-the-shelf network appliance. Even more problematic, on-premise systems (and private cloud systems in a single facility) offer nothing in the way of physical security or environmental controls beyond what is found in a typical office building. The fact is, many local networks are managed from a supply closet or backroom that anyone with access to an office can enter.

Organizations that rely on local, on-premise solutions often have to fall back on unsecured and archaic mechanisms to move and share data, including mailing it on disks. And depending on the size of an organization, on-premise networks lack redundant storage and backup; if a disaster strikes, data is likely lost forever. The largest and most reputable cloud providers have redundant data centers with robust physical security dispersed across the country, or even the planet.

For example, Amazon Web Services data centers have extensive setback and military grade perimeter control berms as well as other natural boundary protection. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff using video surveillance, state of the art intrusion detection systems, and other electronic means.

Now compare that to the security of on-premise servers, your typical hosting providers server room (private cloud), or to that of any other company whose primary business is not data security. The safest bet for your clients data would be to utilize one of the leading cloud infrastructure providers when moving ediscovery data to the cloud. But whichever ediscovery provider you choose, be sure to do some hard comparative research.

Cloud platforms give users control over large data sets, including permission-based access and security roles that are supported by the highest levels of security. Thats because large cloud providers have built-in encryption and security protocols backed up by large teams of security experts with real-time monitoring tools. When considering a cloud ediscovery service, find out the levels of security your provider has in place. Make sure they are taking advantage of the cloud platform in all phases of transmission and data storage, including:

Scalability: Big Data is Here

In the 1970s Bill Gates was telling people, No one will need more than 637 kilobytes of memory for a personal computer. Today, personal computers ship with 2 terabyte hard drives.

Organizations today love data. Modern businesses are finding new and interesting ways to generate and use it. The growth of data is clobbering business IT environments, our federal government, federal court system, and pretty much any data-driven business. For example, it took Nextpoint 13 years to reach our first petabyte of data. (Thats 1,000 terabytes.) After that, it only took two years to add a second petabyte, and the exponential growth has only continued.

In special circumstances, like a data-intensive ediscovery matter, the computational requirements grow exponentially with the amount of data. This is particularly true in heavy processing, indexing, and analytics-based tasks like native file processing, near-dupe identification, and search functionality. Because cloud computing platforms have virtually unlimited ability to scale up for big jobs, reviewers can use advanced analytic tools to analyze data that would break most computer systems.

Law firms may be tempted to throw more hardware at large data challenges, but when clients that used to provide several gigabytes of data for discovery are now delivering terabytes of structured and unstructured data for review, a few new computers cannot address the problem. Thanks to cloud computing, computing power is now a commodity that can be accessed as needed.

Accessibility: Multi-Party Case Management

Hosting documents in the cloud makes it possible to effectively review huge data collections with reviewers working simultaneously in locations around the world. Data is easily kept organized and there is more control over the review process.

Many matters today involve similar documents and data sets. The cloud gives companies the ability to store a document set, along with the appropriate privilege codes, redactions, and stamping so that it can be accessed in future matters that may arise. They can allow data sets to be reused and accessed by new parties as appropriate.

Cloud platforms offer the ability to reduce duplicative efforts by multiple parties on cases with similar issues, facts, discovery, and relevant case law. There are so many actors involved in multidistrict litigation in different jurisdictions, with differing internal technology environments, it is critical that the solution selected encourages collaboration among co-counsel.

Mobility: Working on the Road

There was a time when a lot of companies pretended BYOD (Bring Your Own Device) was just a fad, and that employees should remain tied to applications and data stored on their desktop in a cubicle. The pandemic upended this mentality, and the cloud allowed applications and data to be device independent, freeing the workforce to work wherever and however they needed.

With SaaS services, users can securely access the data from anywhere an internet connection is available. When selecting a cloud platform, make sure it is natively accessible via all devices and OSs including including Macs, PCs, iPads, iPhones, and

Android mobile devices.

The Cloud is the Only Answer for Ediscovery

These are the considerations to take into account when assessing the cloud for ediscovery. According to a 2022 report from ACEDS, 38% of firms still use on-premises technology for ediscovery, while 14% use a hybrid cloud solution, and 43% are fully in the cloud. A huge percentage of firms are moving to the cloud each year, but there is still a sizable number of attorneys working with technology not equipped for todays information-rich litigation environment.

There are obvious ethical obligations and technical issues to take into account when moving client data to a cloud repository or transitioning to a new cloud provider. Check back for our next post on cloud-based ediscovery to see all the questions you need to ask when interviewing potential vendors. If a vendor can satisfy these demands, your firm will be able to deliver data processing power, data security, and a cost savings that old-school review software cannot hope to match.

Read more:

Managing Ediscovery In The Cloud: Practical, Ethical and Technical ... - JD Supra

Categories
Cloud Hosting

ACE Recognized as the 2022 Most Innovative Cloud Solutions … – openPR

Pompano Beach, FL, December 13, 2022 --(PR.com)--Ace Cloud Hosting, a leading cloud computing solutions provider, announced that it has been recognized as the Most Innovative Cloud Solutions Provider for 2022 by Global Business Awards. ACE received the award in the technology category for delivering continuous innovation and consistent quality in the cloud solutions realm.

Global Business Awards are the most coveted awards that celebrate enterprises that demonstrate authentic and best work in specific categories. Every year the esteemed panel of Global Business Awards carefully scrutinizes several applications and portfolios to decisively shortlist a finalist. This year the pinnacle award programs were sharply focused on recognizing organizations that brought a cohesive mix of innovation, technology, and humanization to the forefront along with their digital transformation solutions.

ACH will share the stage with many top Indian players like OLA Cars, GoDaddy, Zomato, EdgeVerve Systems Limited - An Infosys Company, Quick Heal, Infosys, Leeway Hertz, Bureau, etc., in the technology category. Its gratifying to see our cloud computing expertise, knowledge, inventiveness, and adaptability recognized. This award is a testament to our ability of delivering the highest level of service and create value for partner clients. In addition, it also personifies the dedication and rigor that our teams put into delivering highly successful results for our customers, said Managing Director, Vinay Chhabra.

ACH has a strong commitment to building and implementing intelligent cloud solutions to address the most pressing needs of high-growth enterprises. Commenting on the win, Dr. Bindu Rathore, Director (VP-Sales & Marketing) said, This award is a hallmark of our excellence. ACH is leveraging its investments in innovation, deep technologies, and a talented workforce, to help clients accelerate their growth and transformation journey. This momentous award is a reaffirmation of our commitment to consistently deliver differentiated and transformational results.

Dr. Sangeeta Chhabra, Executive Director, RTDS said, We are extremely proud to receive this award. ACH has earned the award through its steadfast commitment to process innovation, quality, and industry expertise. We are unique in the cloud computing space our deep industry knowledge, capabilities, and rich portfolio of services set us apart.

ACH has nearly 15 years of experience in solving complex cloud challenges through unconventional business solutions and commitment to benchmark best practices. The organization is a firm believer in creating out-of-the-box strategies to address the strategic requirements of companies across diverse industries, with minimal impact on their present IT ecosystem. Recently, the organization also received two CPA Practice Advisor Readers Choice Awards for the Best Hosted Solution Provider and Best Outsourced Technology Services categories. The winners will be announced on 10th December 2022 at the Waldorf Astoria Dubai Palm Jumeirah.

About ACEACH offers business-critical cloud computing solutions that provide vibrant pathways to transcend operations, foster innovation, and create value for partner organizations. The organization enables a conducive IT ecosystem that empowers businesses to smoothly work from anywhere and at any time in a secure manner. ACH has over 15+ years in creating, deploying, and scaling dynamic cloud infrastructure of high-growth enterprises and enabling real-world foundations to support their business growth. Leading organizations are harnessing ACHs Cloud Computing, QuickBooks Hosting, Virtual Desktop Infrastructure, and Managed Security Solutions to challenge the status quo, breaking their previous molds and clearing the groundwork for business success.

Read more here:

ACE Recognized as the 2022 Most Innovative Cloud Solutions ... - openPR