Traduttore automatico - Read this site in another language

sabato 13 aprile 2019

Apple to host annual Worldwide Developers Conference June 3-7 in San Jose

Press release

Cupertino, California — Apple today announced it will host its annual Worldwide Developers Conference in San Jose from June 3 through June 7 at the McEnery Convention Center. Now in its 30th year, Apple’s biggest event will bring together the world’s most innovative and creative developers. With more than 1.4 billion devices now running iOS, macOS, watchOS or tvOS, WWDC 2019 will give attendees insight into the future of these platforms and work alongside the Apple engineers behind the technologies and frameworks developers rely on. 

WWDC 2019 will deliver the latest Apple news from the keynote stage and celebrate the breakthrough work of developers who are creating new experiences in areas including machine learning, augmented reality, health and fitness, and more. This year’s program will feature technical sessions, hands-on labs and guest speakers to provide Apple’s existing developer community and the next generation of app developers with the knowledge and tools to help turn their next great idea into reality.   

“WWDC is Apple’s biggest event of the year. It brings thousands of the most creative and dedicated developers from around the world together with over a thousand Apple engineers to learn about our latest platform innovations and to connect as a community,” said Phil Schiller, Apple’s senior vice president of Worldwide Marketing. “Our developers are incredibly passionate about creating the next generation of mind-blowing experiences for the world through apps. We can’t wait to get together whith them and share what’s next.” 
Developers can apply for tickets today through March 20 at 5 p.m. PDT through the WWDC website. Tickets are issued through a random selection process, and developers will be notified of their application status by March 21 at 5 p.m. PDT. Developers and Apple enthusiasts everywhere can live-stream the conference on the WWDC app for iPhone, iPad and Apple TV as well as through the Apple Developer website. 

Students are an integral part of the Apple developer community, and last year WWDC saw attendance from student developers spanning 41 different countries. Up to 350 WWDC scholarships are available this year, providing students and members of all STEM organizations an opportunity to earn a free ticket and lodging for WWDC. Details on how to apply are now available on the WWDC website. 


https://www.apple.com/newsroom/2019/03/apple-to-host-annual-worldwide-developers-conference-june-3-7-in-san-jose/

martedì 9 aprile 2019

“From Cloud to Cloud Intelligence” – Alibaba Cloud Outlines Strategic Upgrade after a Decade of Success

Press release

Product launches in China to broaden Internet and digital technology adoption and empower ecosystem.

Beijing, March 21, 2019 – Alibaba Cloud, the cloud computing and data intelligence arm of Alibaba Group, unveiled at its Beijing Summit the new strategy to develop the company into a more technologically inclusive platform. Jeff Zhang, President of Alibaba Cloud and Chief Technology Officer of Alibaba Group, for the first time elaborated publicly on the strategic upgrade of the business – evolving to serve as a key component of the Alibaba Business Operating System, and empowering customers and ecosystem partners to win in the digital era. Over 3,000 ecosystem partners and industry practitioners attending the Summit have shared the development journey of the company over the past 10 years.

Cloud computing is becoming the main business focus of Alibaba Group and over the past decade Alibaba Cloud has been the technology and public cloud platform underpinning the entire Alibaba economy from e-commerce and payment, to logistics and supply chain management. The scalability, reliability, and security of Alibaba Cloud are paramount to the business and the platform has successfully sustained real-world tests on a daily basis, most notably during the Alibaba 11.11 Global Shopping Festival, the scale of which provides one of the biggest stress tests possible. Businesses of all sizes have leveraged these proven successes to grow and innovate in China and overseas.

Becoming an enabler of SaaS
“Alibaba has championed cloud computing in China over the past 10 years and has been at the forefront of rapid technology development. Today, Alibaba Cloud not only provides infrastructural support to the entire Alibaba economy but has also developed proven technologies to empower millions of customers in China and worldwide, significantly lowering cloud adoption barriers, ensuring inclusive access, and enabling collaboration throughout the ecosystem,” said Jeff Zhang.
“In the future, our highly compatible and standards-based platform will allow SaaS partners to onboard easily and thrive. The offerings will also be enriched by our continued investment in research through the Damo Academy, that will align data science with the development of our products. To empower all participants in our ecosystem, we will boost the integrated development of technology, products and services on our open platform,” he added.
Alibaba Cloud is the IaaS market leader in China with a larger share than the sum of the second to eighth players. The development of the IaaS market meant that in 2018, the cost of technology adoption for businesses in China has reduced significantly compared to 10 years ago.

New product launches to facilitate cloud adoption in China
Adoption of the cloud is expected to continue and become more immersive in the traditional sectors across China. The importance of digital intelligence will become more apparent as enterprises need to derive deeper business insights, make data-driven decisions, and take real-time actions. Alibaba Cloud will continue to invest in technological research and development, ensuring that the company has the capability to offer powerful computing and Internet-based technology products for the further adoption of cloud and data intelligence.

Over the past decade, Alibaba Cloud has developed 162 products and activated 4,610 product features and functions, an average of more than one a day. At the summit, the company announced a full suite of new products in China, with 3 highlights – a super-computing product, a cloud-native database as well as the accelerator to boost the SaaS ecosystem:

  • X-dragon Super-Computing Cluster instance SCC-GN6: The most powerful super-computing bare-metal server instance launched by the company to date, with the capability to enhance the cluster performance by more than 100%. This new instance provides 50 Gbps of RDMA networking throughput, 96 custom Intel Skylake vCPUs, 8 NVIDIA V100 Tensor Core GPUs, providing a total of 1000 TFlops to computational throughput, and high-performance parallel file system CPFS with 1TB/s R/W throughput. SCC-GN6 supports supercomputing scenarios such as autonomous driving, machine interpretation, natural language processing and recommendation systems.
  • PolarDB: A cloud-native relational database service that is designed for enterprise-grade database applications. PolarDB is compatible with Oracle, MySQL and PostgreSQL and offers excellent scalability with the architecture of hardware-software co-design. It can scale up to 88vCPUs and 710GB of memory and allows customers to pay for usage by the minute, enabling customers to handle a business peak traffic while minimizing cost. It can also scale up to 100TB in storage which helps customers cope with big data development.
  • SaaS Accelerator: A highly efficient and agile platform where ecosystem partners can easily build and launch SaaS applications and leverage Alibaba’s proven business and technology know-how. The accelerator helps SaaS customers quickly deploy and test their applications on the cloud, shorten the implementation lifecycle, and accelerate time-to-market. It features an intuitive, drag-and-drop interface and launch kit while remaining highly compatible with other application programming interfaces (APIs). With the accelerator, a smart SaaS application can go live in as little as five days.

For more information about 2019 Beijing Alibaba Cloud Summit and to view Jeff Zhang’s keynote speech from the event, go to: https://yunqi.youku.com/2019/beijing/meeting

About Alibaba Cloud
Established in 2009, Alibaba Cloud (www.alibabacloud.com), the cloud computing and data intelligence arm of Alibaba Group, is among the world’s top three IaaS providers, according to Gartner, and the largest provider of public cloud services in China, according to IDC. Alibaba Cloud provides a comprehensive suite of cloud computing services to businesses worldwide, including merchants doing business on Alibaba Group marketplaces, start-ups, corporations and government organizations. Alibaba Cloud is the official Cloud Services Partner of the International Olympic Committee.
https://www.alibabagroup.com/en/news/article?news=p190321

sabato 6 aprile 2019

How It Works Why Quantum XC News & Resources About Us Contact Quantum Xchange Gains Industry Momentum; Addresses the Shortcomings of Modern Day Encryption

Press release

Company is Positioned for Continued Expansion in 2019 Following Notable Recognition 
Bethesda, MD – Feb. 26, 2019 – Quantum Xchange, provider of the first quantum key distribution (QKD) network in the U.S., today announced their continued upward momentum, marked by numerous industry awards and earned speaking engagements scheduled for the first half of the year. Quantum Xchange is recognized as a provider of the most secure, hardened encryption available to address the shortcomings of today’s encryption standards, and the imminent threat of quantum computers. Today, Quantum Xchange offers commercial enterprises and government entities quantum communications  over unlimited distances.

“Since our formal company launch in June 2018, Quantum Xchange has accomplished some incredible things, not the least of which was to initiate, for the first time in the United States, quantum key travel from Wall Street, under and across the Hudson River and past the Statue of Liberty to northern New Jersey,” said John Prisco, President and CEO, Quantum Xchange. “Our developments will ensure the future of encryption regardless of quantum computing power, and we are grateful to offer a solution that is effective today while nefarious actors harvest and stockpile data that they will read when a suitable quantum computer is available.”

In January, Prisco was named a 2019 Cyber Star by DCA Live, a list that honors the entrepreneurs, investors, and community leaders who are solving big problems, and creating jobs and $ billions of new wealth in the greater Washington region. Taking the company’s vision further across the U.S., Prisco will speak at events in both San Diego and Boston next month. Starting with the Optical Society’s (OSA) OIDA Executive Forum, Prisco will serve as a panelist for the Commercial QKD and Encryption session on March 4. He will then present the QKD Hardware Markets session on March 20 at the Inside Quantum Technology event, The Future of Quantum Computing, Quantum Cryptography and Quantum Sensors.
In between these events, Quantum Xchange will spend a week at the RSA Conference in San Francisco, where newly appointed advisor Whitfield Diffie will present on the Cryptographer’s Panel on March 5. Shortly after, Prisco will make a special appearance at South by Southwest (SXSW) in Austin, Texas where the company’s quantum fiber network, Phio, will exhibit as a finalist for the SXSW Interactive Innovation Awards.  Attendees of the events that Prisco is set to speak at, and attend, in the coming weeks will gain comprehensive insights into the commercial future of all areas of quantum technology, including the latest opportunities in areas such as financial services, pharma and specialty chemical, healthcare, automotive and transportation, defense, government and R&D.
As a provider of quantum key distribution and secure communications, Quantum Xchange gives commercial enterprises and government agencies the ultimate defense to keep high-value data safe – today, tomorrow and in the future. For more information about Quantum Xchange, please visit https://quantumxc.com/.
https://quantumxc.com/quantum-xchange-gains-industry-momentum-addresses-the-shortcomings-of-modern-day-encryption/

HOSTKEY Deploys AMD EPYC™ Processors for Customers Needing Powerful Performance on Virtualized, HPC and Parallel Workloads

Press release

AMD EPYC 7281 and EPYC 7401P processors’ reliable and powerful hardware supports internet solutions and services for HOSTKEY customers
SANTA CLARA, Calif. 02 april
 
Today, AMD (NASDAQ: AMD) and HOSTKEY, a leading cloud solutions company representing clients across Europe, Russia and North America, has announced the release of AMD EPYCTM processor-based servers across HOSTKEY’s infrastructure. This new deployment of AMD EPYC CPUs offers differentiated features, core-count, connectivity and memory bandwidth to HOSTKEY customers running virtualized environments and high-performance computing workloads.
The new HOSTKEY platform uses the 16-core AMD EPYC™ 7281 and 24-core EPYC™ 7401P processors delivered on Gigabyte platforms, which have support for up to 8-channels of RDIMM/LRDIMM DDR4 memory and 128 lanes of ultra-fast PCIe® Gen3 x4 connections to support increased user demand.
“AMD EPYC processors in single or dual-socket configurations enable HOSTKEY to provide a greater variety of services to our customers, expanding upon the available options for their processing needs,” said Anton Malina, Head of the Netherlands Datacenter Infrastructure. “As a leading provider of services in the regions we support, we are excited to work with a leader in the datacenter industry, AMD, to make the performance of AMD EPYC available.”
“We are excited to work with HOSTKEY and provide their customers with access to the AMD EPYC 7281 and EPYC 7401P processors. These AMD EPYC powered servers give HOSTKEY customers a new choice for running their virtualized, HPC or parallel processing workloads, while still experiencing the great service and support expected from HOSTKEY,” said Daniel Bounds, senior director, Datacenter Solutions, AMD

How to Access AMD Servers on HOSTKEY

AMD EPYC based servers are now available in the Netherlands. Customers can order their server with a configuration of choice on the HOSTKEY company site. The basic AMD EPYC 7281 processor-powered Servers, with 32GB RAM and 2x240GB SSDs, are available from €119/month. All HOSTKEY servers come with protection from DDoS-attack.

Additional Resources

  • Learn more about AMD EPYC at AMD.com
  • Follow AMD datacenter developments on Twitter @AMDServer

About AMD

For more than 45 years AMD has driven innovation in high-performance computing, graphics and visualization technologies ― the building blocks for gaming, immersive platforms and the datacenter. Hundreds of millions of consumers, leading Fortune 500 businesses and cutting-edge scientific research facilities around the world rely on AMD technology daily to improve how they live, work and play. AMD employees around the world are focused on building great products that push the boundaries of what is possible. For more information about how AMD is enabling today and inspiring tomorrow, visit the AMD (NASDAQ: AMD) website, blog, Facebook and Twitter pages.

About HOSTKEY

HOSTKEY provides dedicated and cloud infrastructure hosting services based in ultra-modern data centers to corporate as well as private clients. Our infrastructure is applicable to dedicated and hybrid solutions. HOSTKEY is available in Amsterdam, Moscow and New York. Our partners include such companies as Microsoft, NGINX, cPanel, RETN, Huawei, AMS-IX, Serverius, DataPro and many others. The experience and professionalism of our employees ensure high quality and prompt rendering of services requested, from installation to administering and full support of a client`s IT system.

Bitdefender Given 5-star Rating in CRN's 2019 Partner Program Guide for the 4th Year in a Row

1 april 2019 Press Release 

Annual Guide Recognizes the IT Channel’s Top Partner Programs

Bitdefender, a leading global cybersecurity company protecting over 500 million systems worldwide, announced today that CRN®, a brand of The Channel Company, has given Bitdefender a 5-Star rating in its 2019 Partner Program Guide. This annual guide identifies the strongest and most successful partner programs in the channel today, offered by the top technology suppliers for IT products and services. The 5-Star rating recognizes an elite subset of companies that offer solution providers the best partnering elements in their channel programs.
To determine the 2019 5-Star ratings, The Channel Company’s research team assessed each supplier’s partner program based on investments in program offerings, partner profitability, partner training, education and support, marketing programs and resources, sales support, and communication.
The Bitdefender global Partner Advantage Network is tailored to support each partner type in the most effective way. Constant innovation with a sharp focus on benefits for partners is the number one priority. As such, partners are entitled to many benefits including, sales and marketing tools, financial protected incentives, new opportunity registration, leads program, competitive training and certifications, and hands-on training. 
“With new technologies emerging every year, evaluating which IT vendors to partner with grows increasingly more complex for solution providers,” said Bob Skelley, CEO, The Channel Company. “We are proud the CRN Partner Program Guide has become the trusted resource to identify the most rewarding partner programs and provides crucial insight into their strengths and benefits for the channel.”
“As always, the Bitdefender team remains committed to our promise of ease of doing business and ly responding to our partners’ business needs,” said Joe Sykora, VP Global Sales and Channels at Bitdefender. “With integrated tools and comprehensive support, Bitdefender delivers high-quality service and technology.”
The 2019 Partner Program Guide will be featured in the April issue of CRN and online at www.CRN.com/ppg 
https://www.bitdefender.com/news/bitdefender-given-5-star-rating-in-crn&039;s-2019-partner-program-guide-for-the-4th-year-in-a-row-3657.html


venerdì 22 marzo 2019

Hydro, il colosso norvegese dell'alluminio sotto attacco cyber

E' di qualche giorno fa (19 marzo) la notizia che una delle più grandi società di produzione di alluminio, la norvegese Hydro, abbia subito un attacco cyber.
L'attacco condotto attraverso l'uso di un ransomware, apparentemente mira ad ottenere un riscatto. 
Nel corso di una conferenza stampa il responsabile finanziario della società, Eivind Kallevik, ha annunciato che l'attacco è abbastanza grave.
Sembra che il virus non abbia avuto grosse conseguenze sulla produzione  (cosa alquanto difficile da credere!) infatti alcuni impianti sono stati disconnessi e altri sono stati attivati in modalità manuale.
La Norway's National Security Authority (NSM) incaricata di dare assistenza alla Hydro oltre che fornire aiuto ha in corso gli accertamenti del caso per individuare i responsabili dell'attacco. Il ransomware utilizzato è conosciuto col nome di LockerGoga ed è stato impiegato in combinazione con un attacco diretto contro il servizio di Active Directory. Ma è ancora troppo presto per essere sicuri, al momento si tratta infatti solo di ipotesi.

Supponendo che le prime ipotesi sul ransomware siano esatte, vediamo cosa ci dice TrendMicro su LockerGoga. Secondo la società di sicurezza informatica il ransomware LockerGoga ha fatto la sua apparizione di recente (gennaio), contro una società di consulenza ingegneristica francese, la Altran Technologies. La prima cosa che il malware fa una volta infettato un sistema, è cambiare le password degli utenti, rendendolo inaccessibile, quindi inizia a cifrare i file presenti nel sistema e invia sullo schermo un messaggio di richiesta di riscatto. L'impiego di sistemi diversi (dal pagamento del riscatto!) porteranno alla compromissione dei dati. Sembra che LockerGoga non abbia la capacità di diffondersi in rete a differenza dei suoi parenti WannaCry e Petya/NotPetya, invece ha la capacità di superare le difese messe in campo da molti sistemi di protezione (sandbox e machine learning). 

Alcune considerazioni:
Ancora una volta una grossa società è stata colpita, cosa che dimostra che il possedere (almeno teoricamente) grandi risorse non mette al riparo dal rischio. Ciò che occorre è una strategia di sicurezza e un impiego oculato delle risorse, umane e non.
La società produttrice di parti in alluminio occupa una grossa fetta del mercato europeo e americano (circa il 20 %), l'attacco ha avuto delle ripercussioni sul valore delle azioni ma i danni maggiori saranno presumibilmente dovuti alla necessità di rallentare o bloccare la produzione.  
Sembra che il ransomware non faccia uso di una catena di Comando e Controllo, e la cosa dunque farebbe pensare che il malware possa essere controllato dall'interno della rete stessa della Hydro.

Ancora una volta occorre evidenziare alcune problematiche che affliggono il nostro mondo, altamente informatizzato, ma ancora lontano dall'essere esente da problemi di tutti  i tipi.
La prima considerazione da fare, non legata al fatto in se, riguarda la velocità con cui si produce il software e si rilasciano nuove funzionalità, velocità che è andata sempre aumentando nel corso degli anni e che non depone certo a favore della buona esecuzione. 
La seconda riguarda la complessità: spesso, voler ricercare la semplicità di utilizzo da parte degli utenti (di tutti  i livelli, per esempio introducendo interfacce grafiche ecc.), ha portato ad un incremento esponenziale della complessità dei software (e dei sistemi in generale), complessità che, ancora una volta, è nemica del buon funzionamento.
La terza considerazione riguarda la generale mancanza di expertise nel campo della sicurezza informatica, evidenziata spesso in ambito Unione Europea ma che ancora non trova soluzione, se è vero infatti che sono aumentati i corsi universitari in sicurezza informatica è altrettanto vero che rimane una certa distanza tra queste ultime e il mondo industriale.
Infine, in molti paesi, la mancanza di finanziamenti pubblici del settore condiziona fortemente lo sviluppo di un tessuto di imprese capaci e pronte ad offrire i propri servizi di sicurezza a organizzazioni e società di piccole e medie dimensioni, limitando fortemente la capacità di crescita delle competenze a causa della mancanza di concorrenza.  
Occorrerebbe anche riflettere sulla crescita enorme delle società informatiche e cominciare ad interrogarsi sulla necessità di esigere da queste ultime una maggiore serietà professionale nel rilascio del software e dei sistemi.
Infine, ma non meno importante, è necessario iniziare a riflettere seriamente sulla invasività della informatica nel mondo attuale, non certo per cercare di limitarla, cosa ormai impossibile, ma per capire come limitare i danni in caso di attacco cyber e come poter garantire un sufficiente, alternativo, livello di comando e controllo non basato su tecnologie digitali.
Immagino già che qualcuno starà pensando: "Ecco, il ritorno di carta, penna o macchina da scrivere e servizio di fattorini... ma dove vive questo?", ebbene si, in alcuni casi la cosa potrebbe essere necessaria e per funzionare dovrebbe essere esercitata regolarmente per preservare un sapere che sta scomparendo. 

Alessandro Rugolo

Per approfondire:
- https://www.bbc.com/news/technology-47624207;
- https://www.bloomberg.com/news/articles/2019-03-19/hydro-says-victim-of-extensive-cyber-attack-impacting-operations-jtfgz6td;
- https://www.reuters.com/article/us-norsk-hydro-cyber-security/norway-say-hydro-cyber-attack-began-monday-evening-and-escalated-during-the-night-idUSKCN1R00TO?il=0;
- https://www.thelocal.no/20190322/norways-norsk-hydro-hit-by-ransom-cyber-attack.
- https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/what-you-need-to-know-about-the-lockergoga-ransomware

First Canadian Threat Report from Cybersecurity Firm Carbon Black Finds That 83% of Surveyed Canadian Businesses Have Been Breached During the Last 12 Months

PRESS RELEASE Mar 12, 2019
Surveyed businesses report phishing and ransomware are the most likely to spawn breaches
WALTHAM, Mass., March 12, 2019 —Carbon Black(NASDAQ: CBLK), a leader in cloud-delivered, next generation endpoint security, today released the results of its first Canadian Threat Report. The research demonstrates the apparent intensity of cyber threats facing Canadian businesses.
According to the research, attacks are increasing in volume and sophistication, causing regular security breaches affecting 83% of organizations surveyed. The report analyzes survey results from different industries, organization sizes and IT team sizes to build a picture of the modern attack and cyber defense landscape in Canada.
Key survey research findings:
  • 83% of surveyed Canadian organizations have been breached in the last 12 months
  • The average number of breaches per surveyed organization is 3.42
  • 76% of surveyed organizations have seen an increase in attack volumes
  • 81% of surveyed organizations say attacks have become more sophisticated
  • 85% of surveyed organizations plan to increase spending on cyber defense
Escalating cyber attacks
Of the 76% of Canadian businesses reporting an increase in cyberattacks, 25% said the volume has grown by 51% or more in the past year. In addition, 81% of surveyed businesses said they’ve witnessed an increase in attack sophistication.
Of note, 85% of Canadian organizations surveyed said they are planning to increase spending on cyber defense in response to the escalating threat landscape.
“Our first Canadian threat report indicates that organizations in Canada are under intense pressure from escalating cyberattacks,” said Tom Kellermann, Carbon Black’s Chief Cybersecurity Officer. “The research indicates increases across the board in attack volume and sophistication, causing frequent breaches. In response, an encouraging number of Canadian organizations are adopting threat hunting and seeing positive results. As threat hunting strategies start to mature, we hope to see fewer attacks making it to full breach status.”
The human factor plays a part in the attacks that lead to breaches, the survey found. Phishing attacks are at the root of one in five successful breaches, the survey noted.
Additionally, 59% of surveyed Canadian organizations said they are actively threat hunting, with one in five (20%) saying they have threat hunted for more than a year. A very encouraging 86% of those organizations report that threat hunting has strengthened their defenses. 
-ends-
Survey Methodology
Carbon Black commissioned a survey, undertaken by an independent research organization, Opinion Matters in January 2019.  250 Canadian CIOs, CTOs and CISOs were surveyed from companiesin a range of industries including: financial, healthcare, government, retail, manufacturing, food and beverage, oil and gas, professional services, and media and entertainment. This forms part of a global research project with other countries being surveyed including: Australia, Canada, France, Germany, Italy, Japan, Singapore and the UK.