IDG Contributor Network: The AI-First Cloud: Can artificial intelligence power the next generation of cloud computing?

Is there a next phase for cloud computing? During the past few years, cloud computing has become a mainstream element of modern software solutions just as common as websites or databases. The cloud computing market is a race vastly dominated by four companies: Amazon, Microsoft, Google and IBM with a few other platforms with traction in specific regional markets such as AliCloud in China. In such a consolidated market, it’s hard to imagine a technology being disruptive enough to alter the existing dynamics.

Artificial intelligence (AI) is the type of technology with the potential to not only improve the existing cloud platform incumbents but also power a new generation of cloud computing technologies.

To read this article in full or to leave a comment, please click here


What I Am Looking For At Next Week’s ISC Supercomputing Event

Next week I will attend the annual international supercomputing event (now renamed the ISC High Performance Conference) in Frankfurt, Germany. It affords attendees a close-up look into the vendors’ plans and the amazing science being conducted at global supercomputing centers and institutions. This will be the first ISC event to my knowledge where the keynote address is not about traditional High Performance supercomputing topics like simulation and modeling. Here are some topics I hope to learn more about at the show.


Next wave of ransomware could demand $millions



In February, Hollywood Presbyterian Medical Center (HPMC) was the victim of a ransomware attack that disabled access to its network, email, and patient data. The hospital was crippled. The Radiation Oncology department was shut down, CT scans and lab work were unavailable. What communication there was relied on fax machines, handwritten forms, and notes. Impacted patients were transferred to other facilities or simply turned away. After 10 days of this, the hospital surrendered and paid the required ransom to get its systems back up and running.

This kind of acquiescence is the norm in ransomware attacks where recovery is difficult or impossible. What makes the HPMC incident interesting is the head-turning size of the ransom demand as originally misreported — $ 3.6 million — and the very reasonable discussions that followed about why it actually was not a crazy amount to pay. The price of poker is going up.

Ransomware demands have usually been nuisance costs. While the aggregate payments are reportedly in the tens or even hundreds of millions, the formula for attackers has been high-volume, low-dollar crimes. The Economist reported in early 2015 that the demand prices were actually going down, since attackers had “found the sweet spot where their victims simply pay up” was in the hundreds of US dollars.

The attackers at HPMC must have a different GPS, because their sweet spot was about 30 times as large, with the hospital paying about $ 17,000 to get its systems back online. But then again, they’re charting new territory. There may be an average price to recover some files or a system, but what does it cost when an entire hospital is incapacitated?

To figure this out, I looked around for public information that would help me get a handle on the losses that HPMC was incurring while the ransomware attack was active. Published reports indicated that, among other hospital services, CT scanning was impacted. According to a 2014 California Department of Health Care Services report, the HPMC CT scanning charges had been in excess of $ 41 million a year. If we divide that by the maximum 365 days of use, the disruption of CT scans alone would account for losses of over $ 100,000 per day. If I’ve done this right, the loss of revenue from a 10-day hiatus of that one service alone was at least $ 1 million. That doesn’t account for the other ongoing losses for a hospital that (according to the same report) brings in over $ 2 million per day.

Considering the losses incurred by having the hospital’s services disrupted, $ 17,000 starts to look like a bargain.

Prices could rise

When HPMC was attacked, it joined a diverse group of ransomware victims, from police departments to businesses, schools, law firms, and other hospitals. The prevalence of these attacks underscores how big of a business ransomware has become, yet until recently the business model focused on keeping price points low. Low costs have made it easy for businesses to decide to simply pay the ransom, advice that even the FBI has offered.

This is very likely to change because the criminals will realize that the same ransomware that brings them many small-dollar bitcoin paydays can also be used against larger firms that can afford much larger payoffs. Ransoms in the five, six, and seven figures represent a significant departure from standard operating procedure, and they will make the decision about whether to pay up much more difficult.

If this happens, it is likely that attackers will make painful examples of organizations that cannot or will not pay to demonstrate the seriousness of their demands. Had the ransom at HPMC been the reported $ 3.6 million, and had the hospital been unable or unwilling to pay it, the recovery would likely have been painful, public, and costly.

Smarter defense and recovering

The rise of ransomware is the result of two factors: 1) More criminals are finding it a lucrative new way to monetize attacks; and 2) There is a growing set of ransomware tools, kits, and services that make attacks simpler and more devastating. Stopping the evolution in tools is unlikely. That means we need to reduce the attractiveness of this crime by blunting ransomware success rates and decreasing their profitability. There are three ways to so this:

1. More intelligent recovery. When a ransomware attack happens, organizations first look to their backups to see if they can simply reload the machines and recover using their own sources. From the frequency and volume of ransoms paid, this is a primary area where organizations should apply some effort. Backup and recovery design should focus on the type of data that is stored on the various systems and should consider that these attacks can do more than scramble content. Ransomware can also be used to paralyze applications and functionality, so the recovery strategy needs to include reconstitution of any critical services.

2. Evaluating connections and sharing. Ransomware arrives through user interactions on their own systems. It is an uncommon user system that can bring a large organization to its knees, but advanced ransomware knows how to spread. Ransomware that can install itself on network drives or that looks for shared objects spreads quickly. It is more likely to infect multiple systems and meaningfully impact the operation of the business. Compartmentalization and access control are foundational concepts in security, but they need to be revitalized to mitigate the spread of these infections. Organizations should revisit the amount of sharing that they do, the permissions that users have to shared assets, and the monitoring that is done of those shared drives and objects.

3. Improved user and system protections

The best way to defend against the impact of ransomware is to keep it out of the organization entirely. Given the prevalence of users as the channel through which ransomware enters organizations, these users and their systems need to be strengthened. Attackers have become skilled in making their emails appear legitimate, and there has been real innovation in the techniques they’re using to get the ransomware past existing system defenses. Users need to be re-energized and reeducated to avoid activating the ransomware, and their systems need new protections that can stop infection when they make mistakes.

Avoiding Ransomworld

Given the ease of attack, the availability of tools, and the anonymous nature of the payoffs, it could be natural to view ransomware as an ongoing and rapidly multiplying tax on our interconnected lives. Unlike other threats, though, the opportunity to slow or stop its progression is not dependent on closing all the holes or arresting all the criminals.

Instead, we need to focus on doing three things:

  • making it less likely that the attacks will succeed by increasing our defenses and precautions
  • making it much more expensive for criminals to develop the tools that will break through our defenses
  • making it less expensive to repair the damage than to pay the ransom when infection does happen.

With the profit motive weakened or eliminated, the criminals will move on, and we can get back to worrying about the usual challenges of insider threats, external attackers, and nation-state sponsored attacks. The good old days.

Jack Danahy is cofounder and CTO of endpoint security company Barkly. A 25-year-veteran in the security industry, he was the founder and CEO of two successful security companies: Qiave Technologies, acquired by Watchguard Technologies in 2000, and Ounce Labs, acquired by IBM in 2009.

Get more stories like this:  twitter  facebook


Nerd chic is what’s next in fashion



Gucci creative director Alessandro Michele sent a troop of nerdy models down his spring 2016 runway on Wednesday, during Milan Fashion Week

Button-up blouses and delightfully tacky neck ties stole the show. In minimal makeup, the model’s faces were instead accessorized with oversized wire glasses and sparkly plastic frames.


Image: Fashion GPS

The look was a mashup of snazzy, power-women from the ’70s and the cast of Freaks and Geeks

When she wasn’t kicking ass and saving the world, actress Lynda Carter’s Wonder Woman character killed it in the style game as alias Diana Prince. Read more…

More about Fashion, Tech, Geek, Lifestyle, and Milan Fashion Week


Michael Dell expects PC makers to consolidate in the next few years


BENGALURU, INDIA (Supantha Mukherjee and Abhirup Roy, Reuters) – The top three global PC makers would be able to raise market share in the next few years through consolidation amid shrinking sales of personal computers, Dell Inc Chief Executive Michael Dell said on Monday.

Lenovo Group Ltd tops global PC shipment ranking with a 20.3 percent market share, followed by Hewlett-Packard Co at 18.5 percent and Dell at 14.5 percent, according to research firm International Data Corp.

The top three companies could corner about 80 percent of the market in the next 5 to 7 years, Dell said at a roundtable conference with journalists in Bengaluru, India.

“In the first half of this year, we outgrew the two in notebooks and we have grown now 10 quarters in a row,” Dell said.

IDC last month forecast PC shipments to fall 8.7 percent this year, steeper than its earlier estimate of a 6.2 percent decline, and said they are expected to return to growth in 2017.

Once the leader in personal computers sales, Dell, like its peers, has been hit by a rapidly declining PC market as consumers move to smartphones and tablets.

The PC maker was taken private in a $ 24.9 billion buyout in 2013 by its CEO and his private equity partner, Silver Lake, after months of battling with investors who claimed the offer undervalued the company.

“Being a private company has certainly allowed us to focus our future more on 3 years, 5 years, 10 years out and get away from the short-term orientation that public companies often find themselves in,” he said.

Michael Dell has been trying to transform the company he founded in 1984 into a complete provider of enterprise computing services such as HP or IBM.

“We have been able to grow even though the (PC) market is shrinking and of course our business goes well beyond the device into data center, software, services and security,” Dell said.

Dell, however, said that the company does not plan to enter the smartphone business, unlike rival Microsoft Corp, which bought Nokia’s phone business in 2014.

“I think there are maybe only one or two companies who make a profit in the smartphone business today and there are quite a few companies that lose substantial sums of money in the smartphone business,” Dell said.

“So, no thank you! I do not want to be in the smartphone business.”

(Reporting by Supantha Mukherjee and Abhirup Roy in Bengaluru Editing by W Simon)

More information:

Powered by VBProfiles

VB’s research team is studying web-personalization… Chime in here, and we’ll share the results.