<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cloud service Archives - Artificial Intelligence</title>
	<atom:link href="https://www.aiuniverse.xyz/tag/cloud-service/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.aiuniverse.xyz/tag/cloud-service/</link>
	<description>Exploring the universe of Intelligence</description>
	<lastBuildDate>Thu, 23 Jul 2020 06:03:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>InfluxData becomes the embedded IoT database for PTC, adds Azure support</title>
		<link>https://www.aiuniverse.xyz/influxdata-becomes-the-embedded-iot-database-for-ptc-adds-azure-support/</link>
					<comments>https://www.aiuniverse.xyz/influxdata-becomes-the-embedded-iot-database-for-ptc-adds-azure-support/#respond</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Thu, 23 Jul 2020 06:03:38 +0000</pubDate>
				<category><![CDATA[Microservices]]></category>
		<category><![CDATA[cloud service]]></category>
		<category><![CDATA[Database]]></category>
		<category><![CDATA[InfluxData]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Microsoft Azure]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=10397</guid>

					<description><![CDATA[<p>Source: zdnet.com As time-series database provider InfluxData adds the last major piece in its multi-cloud strategy, adding Microsoft Azure, it has entered an OEM agreement to embed its data platform <a class="read-more-link" href="https://www.aiuniverse.xyz/influxdata-becomes-the-embedded-iot-database-for-ptc-adds-azure-support/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/influxdata-becomes-the-embedded-iot-database-for-ptc-adds-azure-support/">InfluxData becomes the embedded IoT database for PTC, adds Azure support</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Source: zdnet.com</p>



<p>As time-series database provider InfluxData adds the last major piece in its multi-cloud strategy, adding Microsoft Azure, it has entered an OEM agreement to embed its data platform into PTC&#8217;s ThingWorx IoT platform. PTC has not announced when the embedded database will be formally available, but we expect it will be sometime during the remainder of this year.</p>



<p>Under the agreement with PTC, InfluxDB Cloud will be sold, delivered, and supported by PTC as part of its ThingWorx service. In turn, PTC has had a long relationship with Microsoft dating back to its origins as a product lifecycle management (PLM)/CADCAM firm provider (a business that it&#8217;s stll very much in). And, while Microsoft Azure was already on InfluxData&#8217;s roadmap for its new cloud service (the service was already available on AWS and GCP), the PTC agreement hastened events.</p>



<p>Both companies are products of transition. InfluxData&#8217;s original sweet spot was with IT log data, a market that has been dominated by search-based analytics engines such as Splunk and Elasticsearch. But with the growth of IoT, most of its newer customers were looking to time series databases for use cases, especially in manufacturing operations. If the company had to embrace a second-generation serverless cloud-native architecture, the shift to IoT use cases provided a useful breakpoint as, arguably, most IoT data tends to live in the cloud anyway.</p>



<p>For its part, PTC pivoted about five years ago from the PLM market to add Industrial IoT (IIoT) &#8212; in essence, broadening its audience from design to add manufacturing engineers. ThingWorx is a framework for IoT services, including a modeling environment for defining digital &#8220;things;&#8221; a development studio for creating augmented reality experiences that can be used for interacting with IoT devices in the real world; a connectivity tier for linking, monitoring, and managing devices; and analytics for performing real-time pattern detection and automated predictive analytics. While also available on AWS, PTC designed Azure as the preferred cloud for ThingWorx. For ThingWorx, InfluxData provides the missing piece &#8212; a time-series database for persisting device data.</p>



<p>As noted, InfluxDB Cloud was originally designed as a cloud-neutral service based on a cloud-native architecture using microservices and running as a stateful application on Kubernetes. Initially released on AWS, the service went live on Google Cloud about three months ago as part of GCP&#8217;s open-source database program, which involves joint marketing and support of open source databases running on its platform.  There was little question that InfluxDB Cloud would eventually come to Azure, but with the OEM deal with PTC, Azure support was going to come sooner rather than later.</p>
<p>The post <a href="https://www.aiuniverse.xyz/influxdata-becomes-the-embedded-iot-database-for-ptc-adds-azure-support/">InfluxData becomes the embedded IoT database for PTC, adds Azure support</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/influxdata-becomes-the-embedded-iot-database-for-ptc-adds-azure-support/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>2nd Watch Allies With GitLab for Managed DevOps Service</title>
		<link>https://www.aiuniverse.xyz/2nd-watch-allies-with-gitlab-for-managed-devops-service/</link>
					<comments>https://www.aiuniverse.xyz/2nd-watch-allies-with-gitlab-for-managed-devops-service/#respond</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Fri, 20 Mar 2020 05:29:02 +0000</pubDate>
				<category><![CDATA[Microservices]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[CI/CD]]></category>
		<category><![CDATA[cloud service]]></category>
		<category><![CDATA[deployment]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[GitLab]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=7572</guid>

					<description><![CDATA[<p>Source: devops.com 2nd Watch today launched a managed DevOps service based on the continuous integration/continuous deployment (CI/CD) platform from GitLab that it will operate on behalf of customers in <a class="read-more-link" href="https://www.aiuniverse.xyz/2nd-watch-allies-with-gitlab-for-managed-devops-service/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/2nd-watch-allies-with-gitlab-for-managed-devops-service/">2nd Watch Allies With GitLab for Managed DevOps Service</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Source: devops.com</p>



<p> 2nd Watch today launched a managed DevOps service based on the continuous integration/continuous deployment (CI/CD) platform from GitLab that it will operate on behalf of customers in addition to coaching them on how to adopt best DevOps practices.</p>



<p>Stefana Muller, a senior product manager, said the 2nd Watch Managed DevOps service combines the managed and professional services capabilities of 2nd Watch into a single offering. That approach is required because when it comes to DevOps most organizations need as much help transitioning their culture as they will operating their CI/CD environment, she said.</p>



<p>One of the major challenges organizations face when trying to embrace DevOps is they typically spend a lot of money upfront only to see those efforts flounder when changing the internal culture of the organization becomes too difficult, Muller said. As part of an effort to smooth that transition, 2nd Watch DevOps experts will assess an organization’s readiness to adopt DevOps tools and processes and then train internal teams on DevOps fundamentals such as managing infrastructure as code and Git principles. The assessment is based on a Culture, Automation, Lean Practices, Measurement and Sharing (CALMS) methodology.</p>



<p>The 2nd Watch service is built around an on-premises edition of the GitLab CI/CD platform that it will host and upgrade on behalf of a customer on either an Amazon Web Services (AWS) or Microsoft public cloud platform. The DevOps service will focus on enabling organizations to build both monolithic and microservices-based applications faster because no organization today has fully transitioned to microservices. The company already provides a managed Kubernetes service for building and deploying applications based on a microservices architecture.</p>



<p>2nd Watch chose to partner with GitLab because of the completeness of that CI/CD platform, which among other things includes integrated security modules that can be employed to advance DevSecOps practices as well, Muller said, noting that longer-term, 2nd Watch is planning to layer a more robust set of managed DevSecOps services on top of the GitLab platform.</p>



<p>Managed DevOps offerings are starting to proliferate as the number of services providers that have attained certifications from multiple IT vendors has increased. It’s not clear to what degree organizations will prefer to rely on these services just yet. However, it’s is apparent many organizations are trying to shift as much of their limited resources to building application code versus managing IT infrastructure. It’s also possible that as the COVID-19 coronavirus pandemic becomes more widespread many organizations will need to rely on external service providers to manage their DevOps environments.</p>



<p>Regardless of the motivation, organizations that are at the beginning of their DevOps journey clearly will need more help than those that are further along the DevOps maturity curve. The decision most organizations will need to make is to what degree will they rely on a managed DevOps service to accelerate their transition versus opting to rely permanently on an external IT service provider to manage one of their most critical IT environments.</p>
<p>The post <a href="https://www.aiuniverse.xyz/2nd-watch-allies-with-gitlab-for-managed-devops-service/">2nd Watch Allies With GitLab for Managed DevOps Service</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/2nd-watch-allies-with-gitlab-for-managed-devops-service/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Securing your connected home is great, protecting your identity is essential</title>
		<link>https://www.aiuniverse.xyz/securing-your-connected-home-is-great-protecting-your-identity-is-essential/</link>
					<comments>https://www.aiuniverse.xyz/securing-your-connected-home-is-great-protecting-your-identity-is-essential/#respond</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Mon, 02 Mar 2020 07:18:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cloud service]]></category>
		<category><![CDATA[connected home]]></category>
		<category><![CDATA[F-Secure; Cyber Theft]]></category>
		<category><![CDATA[Human Intelligence]]></category>
		<category><![CDATA[smart security]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=7160</guid>

					<description><![CDATA[<p>Source: telecoms.com An operator customer&#160;buys&#160;a smart security camera&#160;to monitor&#160;her home.&#160;Savvy about&#160;the dangers of IoT devices, she&#160;connects&#160;the camera to&#160;her&#160;home&#160;WiFi&#160;network, which is protected with&#160;her broadband provider’s smart home security&#160;value <a class="read-more-link" href="https://www.aiuniverse.xyz/securing-your-connected-home-is-great-protecting-your-identity-is-essential/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/securing-your-connected-home-is-great-protecting-your-identity-is-essential/">Securing your connected home is great, protecting your identity is essential</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Source: telecoms.com</p>



<p>An operator customer&nbsp;buys&nbsp;a smart security camera&nbsp;to monitor&nbsp;her home.&nbsp;Savvy about&nbsp;the dangers of IoT devices, she&nbsp;connects&nbsp;the camera to&nbsp;her&nbsp;home&nbsp;WiFi&nbsp;network, which is protected with&nbsp;her broadband provider’s smart home security&nbsp;value added solution.&nbsp;So far, so good.</p>



<p>Her&nbsp;camera is now protected from malicious traffic. But that’s not necessarily the end of the story.</p>



<p>It’s well known that smart devices are vulnerable to hacking, due to a manufacturing cycle that prizes speed to market over getting the details of security right.&nbsp;Hence the need for smart home security solutions&nbsp;like F-Secure&nbsp;SENSE,&nbsp;conveniently&nbsp;available&nbsp;via&nbsp;broadband providers.</p>



<p>But the cloud services used to manage&nbsp;IoT devices&nbsp;are not necessarily secure either, putting consumers’ private photos, video feeds, personal information&nbsp;and other data&nbsp;potentially at risk in the event of a hack.</p>



<p><strong>IoT cloud service breached</strong></p>



<p>In late December, smart camera maker&nbsp;Wyze&nbsp;announced it had been hit by a data breach. The company confirmed&nbsp;that&nbsp;databases storing the information of millions of customers&nbsp;had been&nbsp;left&nbsp;exposed&nbsp;on the internet for weeks.&nbsp;The compromised data included email addresses, camera nicknames,&nbsp;Wi<s>–</s>Fi&nbsp;names,&nbsp;gender,&nbsp;health data&nbsp;such as&nbsp;weight,&nbsp;and information on the users’&nbsp;Wyze&nbsp;devices.</p>



<p>Wyze&nbsp;attributed the breach to&nbsp;an&nbsp;employee error.&nbsp;The company&nbsp;warned customers&nbsp;to watch out for phishing attempts and spam, as&nbsp;their email addresses may have leaked to third parties.</p>



<p>It’s the bitter truth about cyber security today:&nbsp;Even if you take all the proper precautions to protect your devices and accounts from compromise,&nbsp;you still&nbsp;have no control over how&nbsp;well&nbsp;the cloud services&nbsp;behind those devices&nbsp;protect&nbsp;your data.&nbsp;As we have seen over and over in the news headlines, too often, when it comes to security, these cloud services fail&nbsp;us.</p>



<p><strong>The&nbsp;ID theft&nbsp;risk is real</strong></p>



<p>When consumer data is publicly exposed, the threat of identity theft looms larger.&nbsp;Often,&nbsp;victims are&nbsp;unaware for months, or even years, before the results of a compromised identity become apparent.&nbsp;Nearly 32% of breach victims&nbsp;back&nbsp;in 2016 later experienced identity fraud, compared to just 2.8% of individuals not notified of a data breach in 2016, according to Javelin Research.</p>



<p>An attacker can exploit any bit of personal information to try to monetize&nbsp;in some way. If encrypted password hashes&nbsp;are&nbsp;exposed, attackers will set about using automated tools to convert them to plain text&nbsp;so they can&nbsp;try them out on various services&nbsp;along with associated usernames. In the case of the&nbsp;Wyze&nbsp;breach, emails were exposed, giving attackers an opportunity to target live email accounts with phishing messages that would trick&nbsp;users&nbsp;into giving up their passwords.&nbsp;The goal: Account takeover, and attackers will try&nbsp;to get into as many accounts as possible.</p>



<p>With one compromised password, attackers can use automation to credential stuff their way into other accounts.&nbsp;Once an attacker obtains access to an account, he or she can assume the role of account holder. That means taking advantage of the account’s privileges&nbsp;by performing&nbsp;bank transfers, making credit card purchases online, transferring loyalty points,&nbsp;and so on. The attacker can also&nbsp;gather as much personal info&nbsp;on the&nbsp;victim&nbsp;as possible, to lead to other forms of ID theft. And he or she can&nbsp;change the account password, locking out the rightful account owner and ensuring the attacker’s ability to access it.</p>



<p>Victims of identity theft report damage in various areas of their lives: Stress and anxiety while trying to get the problem under control; financial impact; and loss of credibility when credit is tarnished.</p>



<p>Consumers are largely aware of the problem: In an F-Secure survey, 7 out of 10 consumers agreed they could likely become a victim of&nbsp;cyber crime&nbsp;or identity theft, while&nbsp;56% are worried about losing their personal information as part of a data breach.</p>



<p><strong>Protect your customers’ identities&nbsp;</strong></p>



<p>That’s why, when it comes to operator value-added services,&nbsp;a smart home security solution like F-Secure&nbsp;SENSE&nbsp;is perfectly&nbsp;accompanied&nbsp;by an&nbsp;identity protection solution.</p>



<p>While&nbsp;SENSE&nbsp;protects all the devices connecting to the home network&nbsp;from malware&nbsp;and&nbsp;viruses and offers parental controls,&nbsp;F-Secure ID&nbsp;PROTECTION&nbsp;adds a layer of security for cloud services. A&nbsp;password manager&nbsp;helps users create&nbsp;and store a&nbsp;strong, unique password&nbsp;for each online service,&nbsp;significantly reducing the risk of&nbsp;account takeovers.&nbsp;<s>&nbsp;</s>ID&nbsp;PROTECTION&nbsp;also monitors&nbsp;for&nbsp;and&nbsp;detects leaked personal information&nbsp;in all corners of the web&nbsp;and dark web,&nbsp;and&nbsp;responds quickly to identity theft threats&nbsp;by alerting the user&nbsp;if their leaked data is found.&nbsp;Consumers are guided through step-by-step instructions if&nbsp;their info is found in a breach.</p>



<p>With ID&nbsp;PROTECTION, operator customers get best-in-class monitoring and alerting. Due to a combination of expert human intelligence and cutting-edge automated scanning technologies, F-Secure has the shortest lead times finding exposed data after a breach, and one of the highest hit rates for email addresses.</p>



<p><strong>An ideal pairing</strong></p>



<p>“F-Secure ID Protection&nbsp;is the perfect complement to our&nbsp;Connected Home Security&nbsp;solution,” says&nbsp;Kristian Järnefelt, Executive Vice President, Consumer Security at F-Secure. “It’s the opposite side of the same coin.&nbsp;Securing your devices and detecting if there are anomalies in your home network is essential, yet it doesn’t protect your data when it ends up in the cloud.&nbsp; By combining human intelligence with dark web scanning, data breaches can be detected everywhere, much faster than it is by services that use dark web scanning alone.”</p>



<p>With both services working together, consumers get full protection for their IoT devices, the cloud services that work&nbsp;to manage these devices, and&nbsp;for&nbsp;their connected home.</p>
<p>The post <a href="https://www.aiuniverse.xyz/securing-your-connected-home-is-great-protecting-your-identity-is-essential/">Securing your connected home is great, protecting your identity is essential</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/securing-your-connected-home-is-great-protecting-your-identity-is-essential/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
