Effects of Integrating Machine Learning in Cloud Computing

Sayantani Bhattacharya | September 29, 2021 | 137 views

Machine Learning in Cloud Computing
Nowadays, most businesses across the globe are leveraging cloud technology and its advanced natives, such as machine learning and artificial intelligence (AI), to pave their path towards success. As per Analytics Insight, Machine Learning would record revenue of US$80.3 billion by the year 2023, with a CAGR of 33.6% from 2020. This article, explains the effects of integrating machine learning in cloud computing and how it helps make future-proof decisions, create innovative solutions, and drive organizational success.

Machine Learning (ML) is one of the subgroups of artificial intelligence. It helps infer effective business decisions to attain digital presence in the market by providing valuable insights from disparate organizational data.

“AI works effectively because extremely high volumes of high-quality data drive it. So, identifying and collecting data, and making that data meaningful, is an integral step in the machine learning process.”

Jaime Punishill, CMO at Lionbridge said during an interview with Media 7.


Importance of Merging Machine Learning in the Cloud and Some of the Enterprise Case Studies

Machine Learning utilizes the resources of the cloud to optimize the industrial sectors. On the other hand, cloud computing provides scalable and cost-effective resources to leverage a considerable amount of data for processing to run ML-enabled systems efficiently. As a result, combining machine learning with cloud helps to optimize the capacity of both.

Let us quickly run through some of the stimulating effects of merging machine learning in cloud computing.

Detect and Protect Business Ecosystem

According to the IDG Survey, almost 80% of IT security leaders believe their organizations are susceptible to cyberattacks despite augmented investments made on IT security to accommodate the advanced distributed IT framework. Today, most business leaders are aware of security threats because of various cloud-native and web-based modern applications. In addition, by merging machine learning in cloud computing, companies are developing intelligent security applications to protect organizational data from vulnerable malpractices.


How an Advanced Approach by McAfee Endpoint Security 10.5 Helped a Leading Insurance Company Safeguard its Sensitive Data?
 

For an insurance company, securing their customers’ sensitive personal data without compromising customers’ experience is imperative. And there lies the primary challenge of any IT security measure, where the traditional silos approach doesn’t work anymore. In this case, you need robust and automated solutions powered by advanced technologies, such as machine learning. Eventually, to solve this, McAfee deployed McAfee Endpoint Security version 10.5, and as a result, the company’s IT help desk started receiving 80% lesser tickets. In addition, the insurance company is now enabled with cloud-based Real Protect machine learning behavioral analysis technology that helps enhance overall security capabilities and stand against the rising risk of security breaches.

Cloud-Based Cognitive Technology

Integration of machine learning in cloud computing makes cloud data the source of ML algorithms for cloud-enabled businesses. ML algorithms utilize the cloud data and modify the cloud archetype to cognitive computing. Cognitive computing technology is one of the emerging trends. Businesses are inclined to deploy cloud-based cognitive technology because it helps to grow their revenue, enhance operational efficiencies, and cater to real-time use cases in a cost-efficient manner.


How Does IBM’s Watson Help Banking and Financial Sectors?
 

IBM’s Watson is one of the ideal examples of cognitive computing. Assisting the banking and financial sector, IBM’s Watson is a question-answering system, which receives unstructured data in the form of questions and provides humanized answers. Furthermore, Watson can differentiate its limits and route it to respective resources whenever human intervention is required. For example, IBM Watson has helped the Royal Bank of Scotland develop an intelligent assistant proficient in handling 5000 queries in a single day.

Predictive Analytics

Predictive analytics uses predictive models that are typically machine learning algorithms helping to make accurate predictions of your business outcomes. Playing a crucial role in cloud computing helps to optimize cloud infrastructure, take proactive measures to envisage downtime or infrastructure performance issues. Further, predictive analytics play an intrinsic role in merging the structured and unstructured data from diverse and distributed networks in multifaceted cloud environments.


How WNS Helped a Globally Acclaimed Hotel Chain to Retain its Timeshare Members by Leveraging Predictive Analytics?
 

For hotels, it is crucial to retain their timeshare members. However, experiencing a high attrition rate among its timeshare members, followed by nonrenewal or membership cancellation, started denting the hotel chain's reputation.

WNS recommended an approach based on the principles of the predictive analytics approach for a better understanding of the behavior of the members. They created complete member profiles based on demographics, duration of membership, and transactional patterns. Implementing statistical analysis to generate probable attrition scores for every member helped to divide members into high, medium, and low attrition groups. Further, identifying the attrition drivers by deploying a logistic regression model was also a part of this exercise. All these drivers helped to predict the members' behaviors in the future.

As a result, the insights empowered the hotel chain to employ marketing campaigns targeted towards the specific audience with special promotional offers to arrest the attrition of their timeshare members.

Internet of Things (IoT)

Internet of Things is described as a network through which multiple devices (read 'Things') are interconnected via the internet. IoT is adapted by technology experts worldwide. Various industrial sectors embrace the utilities of IoT devices. Further, when hosted on a cloud platform and leveraging machine learning in the cloud, IoT provides impactful real-time insights.


How Did Medium One Leverage Machine Learning to Enable Cloud-Connected Industrial Pressure Sensors?
 

The legacy industrial sensors couldn't generate automated real-time alerts to monitor, detect irregularity, or forecast key events. Medium One’s environment helped the customer in making data sensible to unlock its hidden insights. Medium one helped develop a machine learning algorithm for real-time predictions and alerts with historic cloud data. It enabled the cloud-connected industrial pressure sensors to correlate events smartly and monitor remotely.

Chatbots and Virtual Assistants

Chatbots and personal assistants are innovative examples of machine learning in cloud computing collaborations that dominate personal and corporate ecosystems. Intelligent cloud-based virtual assistants like Siri, Alexa, Cortana interact with you just like any other human being and perform several operations, as per your command. These chatbots are AI-enabled, operate on machine learning algorithms in the cloud computing framework. Further, they use natural language processing technology, predictive analytics, and sentiment analysis to learn from the inputs and engage in real-time conversations.


How Oracle Intelligent Bots Reduced Call Center Wait Times?
 

During the release of senior school exam results in the summer, the inquiry center of the University of Adelaide received massive traffic from the existing and prospective students. A significant part of that traffic was to enquire about their grades and admission facilities, respectively. The university appointed Rubicon Red, an Oracle cloud consultancy, to build a chatbot based on artificial intelligence (AI), machine learning, and natural language processing to meet this surged demand. The bot is supposed to handle the first line of inquiry when calls come in, relieving human agents' load. Rubycon Red leveraged Oracle Intelligent Bots to create an intelligent chatbot. The deployment was a success that resulted in 40% reduced traffic and 97% less wait time on the university's inquiry service (call center). 

Final Thoughts

The merger of machine learning in cloud computing enables organizations to leverage their massive organizational data in deriving valuable data-driven insights and accurate predictions by analyzing the trends and patterns of the data. Machine Learning helps businesses to understand their target audience, automate their business processes and develop advanced products per market demand. As a result, it drives the success of a company and helps them to stay competitive.

Frequently Asked Questions

How is Machine Learning Used in Cloud Computing?

Cloud-enabled businesses can leverage the vast data and utilize advanced machine learning technology to determine, compute and predict valuable futuristic insights about their business. As a result, it helps to scale the efficiency of the cloud within a cost-effective reach.

Is Machine Learning Important for Cloud Computing?

Machine Learning leverages cloud data and derives insightful information out of it. It computes the data to provide future forecasts and helps the businesses to take necessary actions on it. As a result, adopting machine learning applications are crucial for cloud businesses.

What are the benefits of Machine Learning on the Cloud?

Businesses can experiment with their processes using machine learning on the cloud and then scale up as demand increases. Further, the pay-per-use model makes a cost-effective solution to the company without unplanned expenses.

Spotlight

EarthLink Telecommunication

"EarthLink Telecommunications is the largest Internet Service Provider in Iraq. The company was founded in 2005 to provide communication services to home users, enterprises, and government backed by 400-plus points of presence distributed over every city and town in Iraq. EarthLink is approaching its vision to be one-stop shop for connectivity and IT services, including network/Internet connectivity, cloud computing, datacenter co-location, enterprise IT solutions, and software development. "

OTHER ARTICLES
CLOUD APP DEVELOPMENT

Cloud Cryptography: Using Encryption to Protect Data

Article | July 18, 2022

Even privacy specialists agree that encryption is a fundamental technology and the cornerstone of security, but cloud encryption can be daunting. In addition, small and medium-sized enterprises can become confused by the sheer quantity of encryption techniques. Cloud cryptography encrypts cloud-based data. It allows users to securely use shared cloud services while cloud provider data is encrypted. Cloud cryptography safeguards sensitive data without slowing exchange. Cloud encryption makes it possible to secure sensitive data outside your organization's corporate IT infrastructure when that data is no longer under your control. Companies utilize a variety of cryptographic key types for cloud security. Three algorithms are used for cloud data encryption: Symmetric Algorithm One key encrypts and decrypts data. It requires little computing resources and excels at encryption. Two-way keys ensure verification and approval in symmetrical algorithms. Encrypted information in the cloud can't be deciphered unless the client possesses the key. Asymmetric Algorithm Encryption and decoding need distinct keys. Every recipient needs a decoder—the recipient's private key. The encryption key belongs to someone. The most secure approach requires both keys to access explicit data. Hashing It's key to blockchain security. In a blockchain, data is stored in blocks and linked by cryptographic protocols. A code or hash is assigned to each information block added to the chain. Hashing helps arrange and recover data. Businesses need to adopt a data-centric approach in this complex and evolving world of virtualization, cloud services, and mobility to protect their sensitive information from contemporary threats. Companies should deploy data security solutions that secure sensitive data consistently, including cloud data encryption and key management. Comprehensive cloud security and encryption platform should include robust access controls and key management to help enterprises use encryption successfully and cost-efficiently.

Read More
CLOUD SECURITY

Is It Time For Your Organization To Adopt Cloud Computing?

Article | July 18, 2022

The potential of cloud computing is becoming increasingly apparent to various businesses, and it is also growing. AWS, Microsoft Azure, and Google GCP are just a few of the numerous cloud service providers that are accessible globally. In addition, you can choose from a variety of migration strategies to go from local servers to cloud servers. Many businesses are considering shifting to the cloud. What are the indications that you are prepared, and why should you relocate? There's a chance your company is already utilizing an on-premise solution. Since it's been in use for a while, organizations are accustomed to it. But the need for greater flexibility has grown exponentially now that the shift to digital has accelerated in recent years. Threats to On-premise There are various drawbacks to on-premise software. Updates aren't usually frequent, and they’re not always supported. This implies that firms won't always have access to the most recent features and abilities. A custom build is much more time-consuming if you require a feature right away than getting it added to quarterly updates. There's a chance that the program an organization is using will someday be completely phased out. Then the organization is stuck using a solution that won't receive any more updates. In addition, with the hardware getting older, current operating systems might be unable to execute older programs. In the meantime, rivals would have switched to cutting-edge, affordable cloud-based technologies, which allow them to run their businesses and provide a much smoother client experience. Why Choose the Cloud? Moving to the cloud applies to every aspect of your business. Real-time data is provided, allowing for far more precise decision-making. Automating routine manual chores streamlines operations and frees up team members' time for activities they enjoy. It is also perfect for emerging forms of working, like remote and hybrid work, because it can be accessed from anywhere, on any device, at any time.

Read More
CLOUD SECURITY

Managing Multi-Cloud Complexities for a Seamless Experience

Article | July 6, 2022

Introduction The early 2000s were milestone moments for the cloud. Amazon Web Services (AWS) entered the market in 2006, while Google revealed its first cloud service in 2007. Fast forward to 2020, when the pandemic boosted digital transformation efforts by around seven years (according to McKinsey), and the cloud has become a commercial necessity today. It not only facilitated the swift transition to remote work, but it also remains critical in maintaining company sustainability and creativity. Many can argue that the large-scale transition to the cloud in the 2010s was necessary to enable the digital-first experiences that remote workers and decentralized businesses need today. Multi-cloud and hybrid cloud setups are now the norm. According to Gartner, most businesses today use a multi-cloud approach to reduce vendor lock-in or to take advantage of more flexible, best-of-breed solutions. However, managing multi-cloud systems increases cloud complexity, and IT concerns, frequently slowing rather than accelerating innovation. According to 2022 research done by IntelligentCIO, the average multi-cloud system includes five platforms, including AWS, Microsoft Azure, Google Cloud, and IBM Red Hat, among others. Managing Multi-Cloud Complexities Like a Pro Your multi-cloud strategy should satisfy your company's requirements while also laying the groundwork for managing various cloud deployments. Creating a proactive plan for managing multi-cloud setups is one of the finest features that can distinguish your company. The five strategies for handling multi-cloud complexity are outlined below. Managing Data with AI and ML AI and machine learning can help manage enormous quantities of data in multi-cloud environments. AI simulates human decision-making and performs tasks as well as humans or even better at times. Machine learning is a type of artificial intelligence that learns from data, recognizes patterns, and makes decisions with minimum human interaction. AI and ML to help discover the most important data, reducing big data and multi-cloud complexity. AI and machine learning enable more simplicity and better data control. Integrated Management Structure Keeping up with the growing number of cloud services from several providers requires a unified management structure. Multiple cloud management requires IT time, resources, and technology to juggle and correlate infrastructure alternatives. Routinely monitor your cloud resources and service settings. It's important to manage apps, clouds, and people globally. Ensure you have the technology and infrastructure to handle several clouds. Developing Security Strategy Operating multiple clouds requires a security strategy and seamless integration of security capabilities. There's no single right answer since vendors have varied policies and cybersecurity methods. Storing data on many cloud deployments prevents data loss. Handling backups and safety copies of your data are crucial. Regularly examine your multi-cloud network's security. The cyber threat environment will vary as infrastructure and software do. Multi-cloud strategies must safeguard data and applications. Skillset Management Multi-cloud complexity requires skilled operators. Do you have the appropriate IT personnel to handle multi-cloud? If not, can you use managed or cloud services? These individuals or people are in charge of teaching the organization about how each cloud deployment helps the company accomplish its goals. This specialist ensures all cloud entities work properly by utilizing cloud technologies. Closing Lines Traditional cloud monitoring solutions are incapable of dealing with dynamic multi-cloud setups, but automated intelligence is the best at getting to the heart of cloud performance and security concerns. To begin with, businesses require end-to-end observability in order to see the overall picture. Add automation and causal AI to this capacity, and teams can obtain the accurate answers they require to better optimize their environments, freeing them up to concentrate on increasing innovation and generating better business results.

Read More
CLOUD SECURITY

Evaluating the Importance of Cloud Native Security

Article | June 29, 2022

As time goes on, an increasing number of businesses worldwide are taking their approach to digital transformation a step farther than their competitors, who are yet to explore the digital front as effectively. As a result, from corporate regulations and financial limits to compliance penalties and new attack vectors, security teams face increasing difficulties when businesses move and scale their apps and services across multiple clouds. The creation of cloud-native applications has also increased as more businesses ramp up their digital transformation initiatives. Despite not having a clearly defined boundary to secure, contemporary distributed networks based in the cloud require network security. In addition, more sophisticated observability and security capabilities are also necessary due to the rising development and deployment of cloud-native apps. Organizations must understand what security entails for each new layer of the application stack in order to better secure cloud-native applications. They must also understand that the entire development pipeline requires a security management toolkit. In a perfect world, all cloud-native applications would secure every one of their endpoints and restrict access to only services or users with valid credentials. Every request for resources from an application should specify who is making it, their access role, and any privileges they may have. The difficulty of keeping track of these assets, as well as the constantly changing nature of cloud resources, adds to the complexity. As they scale up, cloud-native solutions like serverless present new difficulties. In particular, serverless apps frequently have hundreds of functions, making it challenging to manage all this data and the services that utilize it as the program grows. Due to this, resources must be immediately recognized as soon as they are produced and tracked through all modifications until they are no longer available. Despite the complexity of cloud-native applications, the fundamentals of cybersecurity remain the same. Beyond the necessity of end-user training, it appears that the five pillars of zero trust are strikingly similar to the essentials of cybersecurity: Network Application workload Identities Data Devices (physical security) Although using the cloud benefits businesses, security flaws, mistakes, and incorrect configurations are common. Moreover, different approaches leave security weaknesses. Lack of insight and end-to-end context about risk further hinders your capacity to safeguard the cloud. Additionally, as cloud expansion and the rate of agile software deployment rise, the task is getting steadily more complicated. And nobody wants to give up growth or speed in the name of security.

Read More

Spotlight

EarthLink Telecommunication

"EarthLink Telecommunications is the largest Internet Service Provider in Iraq. The company was founded in 2005 to provide communication services to home users, enterprises, and government backed by 400-plus points of presence distributed over every city and town in Iraq. EarthLink is approaching its vision to be one-stop shop for connectivity and IT services, including network/Internet connectivity, cloud computing, datacenter co-location, enterprise IT solutions, and software development. "

Related News

CLOUD SECURITY

Prisma Cloud Delivers Context-Aware Software Composition Analysis to Secure Deployment of Open Source Software

Palo Alto Network | September 23, 2022

Open source software is a critical component of cloud-native applications, allowing developers greater speed and modularity without having to reinvent the wheel each time they code. However, as the Unit 42 Cloud Threat Report, 2H 2021 found, open source software can often contain known vulnerabilities, which can open organizations up to significant risk. Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, today introduced the industry's first context-aware software composition analysis (SCA) solution to help developers safely use open source software components. The integration of SCA into Prisma® Cloud further demonstrates why Palo Alto Networks is the leading provider of cloud-native security. Traditional SCA solutions are standalone products that can produce a large number of alerts but lack the runtime context to help fix vulnerabilities. With the addition of SCA to the Prisma Cloud platform, developers and security teams can proactively surface and prioritize known vulnerabilities that impact the application lifecycle (i.e., code, build, deploy and run). Prisma Cloud SCA delivers deep dependency detection and remediation of vulnerabilities in open source software before applications reach production. It can also help developers prioritize remediation based on software components that are already in use. These capabilities are not possible when SCA solutions are deployed as single point products. "Developers leveraging open source software should be able to build applications with the confidence they aren't opening the organization up to risk, With the average application consisting of 75% open source components, SCA on Prisma Cloud is key to protecting the organization from code to cloud and empowering developers to build with speed." Ankur Shah, senior vice president, Prisma Cloud, Palo Alto Networks As a complete cloud-native application protection platform (CNAPP), Prisma Cloud is context-aware at every stage of the application lifecycle to provide a unified view of risk across organizations' cloud environments. Where current approaches to cloud security rely on siloed products that provide intermittent visibility without remediation, Prisma Cloud approaches cloud security with a comprehensive, prevention-first framework. With 188% increase in cloud incident response cases over the past three years, this shift in approach has become mandatory. A complete code-to cloud CNAPP needs to incorporate the following five key principles in order to keep organizations safe: Security from code to cloud — protects applications at every stage of the development lifecycle — from code, build, deploy and run. Continuous, real time visibility — uses real-time and contextual security analysis of cloud environments to help prevent misconfigurations, vulnerabilities and threats. Prevention-first protection — stopping attacks and defending against zero-day vulnerabilities to drive down mean time to remediation. Choice for every cloud journey — aligning security needs with current and future cloud priorities by supporting a breadth of cloud service providers, workload architectures, continuous integration and continuous delivery (CI/CD) pipelines, integrated development environments (IDEs), and repositories with a unified platform Cloud scale security — consistently secures applications as cloud environments scale. In addition to SCA and to further increase the safety of cloud-native applications, Prisma Cloud introduced a software bill of materials (SBOM) among other capabilities for developers to easily maintain and reference a complete codebase inventory of every application component used across cloud environments. Implementing SCA and SBOM ensures Prisma Cloud aligns with these principles. "Buyers looking for cloud-native security solutions need to keep the requirements of microservices security protection in mind. The 'bolted-on' and 'whack-a-mole' approaches are a thing of the past," said Frank Dickson, program vice president, Security and Trust at IDC. "Security should be embedded throughout the application development life cycle. This means that buyers need to fundamentally change their approach to security, although they need to continue to protect their run-time environments, they must also embrace solutions that embed security in the application development process, an approach referred to as 'shift left.' Shift left requires one to think less about security products and more about continuous security processes." About Palo Alto Networks Palo Alto Networks is the world's cybersecurity leader. We innovate to outpace cyberthreats, so organizations can embrace technology with confidence. We provide next-gen cybersecurity to thousands of customers globally, across all sectors. Our best-in-class cybersecurity platforms and services are backed by industry-leading threat intelligence and strengthened by state-of-the-art automation. Whether deploying our products to enable the Zero Trust Enterprise, responding to a security incident, or partnering to deliver better security outcomes through a world-class partner ecosystem, we're committed to helping ensure each day is safer than the one before. It's what makes us the cybersecurity partner of choice.

Read More

CLOUD STORAGE

Alibaba Cloud Unveils Strategic Roadmap for International Business

Alibaba Cloud | September 23, 2022

Alibaba Cloud, the digital technology and intelligence backbone of Alibaba Group, has announced its latest international strategic roadmap at the 2022 Alibaba Cloud Summit. During the three-day summit, the trusted cloud provider has revealed new products to support technology innovation among enterprises, an investment of USD1 billion for a global partner ecosystem upgrade, and enhanced customer services to provide comprehensive support throughout a customer's digitalization journey. Technology innovation to power rapidly increasing cloud consumption With more enterprises moving to the cloud and an increase in demand for cloud services in a hybrid environment, Alibaba Cloud has made available globally a series of its proven infrastructure products, a multi-model cloud-native database and distributed cloud services. This range of new products aims to provide enterprise customers with a wider scope of cloud services covering network, storage and compute. Cloud Enterprise Network (CEN) 2.0, the newly available network services, provides global intelligent networking to support enterprises' global expansion. CEN 2.0 supports ultra-large-scale networking capabilities with higher availability, lower latency, enhanced security capability and greater flexibility in pricing options for enterprises, compared to the previous version. Alibaba Cloud has also unveiled a storage product called ESSD Auto PL, which provides block storage services and supports automatic scaling within seconds to allow businesses to handle sudden traffic surges. As the world's leading elastic block storage product with auto-scaling function, it offers up to one million IOPS (input/output operations per second), significantly higher than the industry average. Lindorm, the cloud-native multi-model database developed by Alibaba Cloud, successfully supported Alibaba Group's 11.11, the world's largest shopping festival, last year. Designed for fusion-processing requirements for wide tables, time series, space-time and various unstructured data, Lindorm has also been supporting customers in various industries in China – including automotive, finance and manufacturing – thanks to its high availability and low storage cost. Alibaba Cloud also introduced ACK One (Alibaba Cloud Distributed Cloud Container Platform), a multi-region and multi-cluster container management platform to provide a consistent management, delivery and operation experience for enterprises. It allows users to implement container cluster management, resource scheduling, data disaster recovery and application delivery through a unified platform, whether in a public cloud, private cloud or on-premise environment. ACK One is the latest addition to ACK Anywhere, Alibaba Cloud Container Service for Kubernetes. Earlier this year, among the eight significant industry players evaluated, Alibaba Cloud was named a "Leader" in The Forrester Wave™ Public Cloud Container Platforms Q1 2022 for the first time. Lastly, to support enterprises' need for hybrid cloud, CloudBox integrates Alibaba Cloud's public cloud infrastructure technologies such as compute, storage and network to provide enterprises with fully managed cloud services for deployment close to customers' business premises. CloudBox delivers a consistent experience as Alibaba Cloud's public cloud, while meeting enterprises' demand for on-premise data processing and low latency compute. CloudBox is designed for multinational companies with business operations in China. Alibaba Cloud has been strengthening its capabilities in computing, storage, network and security. For example, its recently unveiled Cloud Infrastructure Processing Unit (CIPU), a dedicated processing unit designed for its Apsara Cloud operating system, can reduce network latency to as low as five microseconds and improve computing power performance in data-intensive AI and data analytics scenarios by as much as 30%. Prioritizing partner benefits to build inclusive technology ecosystem With its revamped ecosystem strategy, Alibaba Cloud has announced that it is committed to investing USD1 billion to support partners' technology innovation and their market expansion with Alibaba Cloud in the coming three fiscal years. This investment consists of both financial and non-financial incentives, such as funding, rebates and go-to-market initiatives. To accelerate partners' growth, Alibaba Cloud also launched a "Regional Accelerator" program to provide partners operating in different markets with a localized business collaboration model. The model is designed around factors such as a market's level of technical maturity, vertical focus, digitalization needs and business demands, with an aim to boost partners' income and strengthen their technical expertise. Alibaba Cloud ecosystem partners including resellers, technology partners (ISV, SaaS and SI), service and consulting partners can benefit from the program. "Partners have always been a key focus for Alibaba Cloud, and we are committed to providing them with strong support for our ongoing co-creation and value-add – both technologically and commercially to further empower our joined customers, Our revamped partner strategy prioritizes our partners' growth. By continuing to support our partners' business expansion, we can build an inclusive ecosystem benefiting partners and customers." Selina Yuan, Alibaba Cloud Intelligence International President To address complications with partners' international business operations, Alibaba Cloud has also upgraded its collaboration model with its ISV partners, with a focus on enhancing industry collaboration, standardizing go-to-market process, and accelerating technical solution integration to increase efficiency. Looking ahead, Alibaba Cloud hopes to recruit more financial services, retail, internet and manufacturing ISVs to co-develop products and support customer innovation. Alibaba Cloud currently works with about 11,000 partners worldwide, including Salesforce, VMware, Fortinet, IBM and Neo4j. Empowering customers with comprehensive support In order to provide all-round cloud-based solutions and services to all customers, Alibaba Cloud also launched a "Global Delivery and Service Program" to enhance the cloud adoption process for customers. Under the program, it has unveiled three Customer Service Centers in Kuala Lumpur (Malaysia), Porto (Portugal), and Mexico City (Mexico), to support customers in their cloud adoption journey, providing timely and regionalized cloud migration and consulting services. In addition to the Customer Service Centers, Alibaba Cloud has set up three Service Delivery Centers in Kuala Lumpur (Malaysia), Dubai (United Arab Emirates) and Hong Kong (Greater China), to provide extra technology support to its regional offices and customer project delivery in Asia Pacific and the Middle East, Europe and Africa. Fueling new innovations with reliable infrastructure During the summit, Alibaba Cloud has inked nearly 30 agreements to help customers and partners accelerate their digital innovation capabilities with leading cloud computing technologies. In collaboration with JP Games, Japan's leading game development studio, Alibaba Cloud has unveiled a set of new services to create virtual spaces and realistic avatars for global customers venturing into the metaverse. Together with MetaverseXR, Thailand's leading metaverse company, Alibaba Cloud rolled out a comprehensive suite of metaverse solutions for the Thai market in order to fulfill growing local demand for embarking on a Web 3.0 journey. Alibaba Cloud also teamed up with UMG Group in Myanmar, to power the country's digital transformation – especially in traditional industries. With BeLive and VisionTech from Singapore, Alibaba Cloud is expanding its regional outreach in the media and Fintech verticals. Alibaba Cloud is collaborating with OnFinality, a leading New Zealand-based blockchain infrastructure provider, to offer robust cloud-computing capability and a strong global network for Web 3.0 developers looking to scale globally. More than 300 Alibaba Cloud customers and partners around the globe are attending the summit, including Accenture, Tiger Brokers, DANA, Thai Data, and Lala station. About Alibaba Cloud Established in 2009, Alibaba Cloud (www.alibabacloud.com) is the digital technology and intelligence backbone of Alibaba Group. It offers a complete suite of cloud services to customers worldwide, including elastic computing, database, storage, network virtualization services, large-scale computing, security, management and application services, big data analytics, a machine learning platform and IoT services. Alibaba maintained its position as the third leading public cloud IaaS service provider globally since 2018, according to IDC. Alibaba is the world's third leading and Asia Pacific's leading IaaS provider by revenue in U.S. dollars since 2018, according to Gartner.

Read More

CLOUD SECURITY

Yottaa Announces Conversion Zone, a New Integration with Salesforce Commerce Cloud

Yottaa | September 22, 2022

Yottaa announced that it has launched Conversion Zone, a new integration with Salesforce Commerce Cloud, the fastest path to unified commerce. Commerce Cloud enables brands to provide personalized experiences for shoppers that span web, mobile, social, and in-store. And now, as part of the world’s #1 CRM platform – Salesforce – brands can deliver completely unified experiences for customers that extend beyond commerce to include marketing, customer service, and more. Conversion Zone is a new product in Yottaa’s RAPID CTRL eCommerce acceleration solution. As part of Yottaa’s integration with Salesforce Commerce Cloud, Conversion Zone empowers Commerce Cloud customers to determine the site speed where shoppers convert most. This enables these brands to optimize their sites to ensure pages are loading in the “Conversion Zone” resulting in higher online revenue, as well as better shopper experiences. Yottaa’s integration with Commerce Cloud is through RAPID CTRL, Yottaa’s patented application sequencing solution that optimizes and sequences the way 3rd party technologies and images load in the browser. Through RAPID CTRL, online brands can increase eCommerce site speed and improve conversion rates across all devices. Conversion Zone, a new product in RAPID CTRL, enables brands using Salesforce Commerce Cloud to determine the target site performance range needed to maximize online conversion rates. Comments on the News “Yottaa’s integration with Salesforce Commerce Cloud enables online brands to deliver faster and more engaging experiences for their shoppers, As part of this integration, Yottaa’s new Conversion Zone solution provides these brands a customized, powerful tool to determine the exact page load time periods that result in the highest conversions so they can get more value from all of their eCommerce investments.” Rich Stendardo, CEO of Yottaa “Creating personalized, omnichannel experiences is now more important than ever for brands,” said Mike Wolff, SVP, ISV Sales, Salesforce. “By leveraging the power of Commerce Cloud and the new integration from Yottaa, customers will now be able to not only speed up the loading of their sites, but also identify optimal site speed ranges that produce the most online conversions.” About Salesforce Commerce Cloud The Salesforce Commerce Cloud empowers retailers to unify customer experiences across all points of commerce, including web, social, mobile and store. From shopping to fulfillment to customer service, the Commerce Cloud delivers 1-to-1 shopping experiences that consistently delight customers, driving increased engagement, loyalty and conversion. With embedded predictive intelligence and a robust partner ecosystem, the Commerce Cloud helps retailers deliver superior customer experiences for retailers, from planning to launch and beyond. About Yottaa Leading brands such as 1 800 Contacts, Carter’s, J. Crew, Lands’ End, Ralph Lauren, and Samsonite rely on Yottaa to accelerate, optimize, and secure their eCommerce sites. By optimizing the loading of third-party eCommerce technologies, high resolution images, and other website elements, Yottaa enables online brands to deliver superior customer experiences, improve site performance up to 60%, and increase online conversion up to 20%. By controlling the execution of all 3rd parties and other services on their sites, Yottaa also enables brands to enhance their overall security posture, provide more secure shopper experiences, and ensure compliance with internal and external policies. To learn more about how Yottaa can optimize every page load on your eCommerce site and increase conversions

Read More

CLOUD SECURITY

Prisma Cloud Delivers Context-Aware Software Composition Analysis to Secure Deployment of Open Source Software

Palo Alto Network | September 23, 2022

Open source software is a critical component of cloud-native applications, allowing developers greater speed and modularity without having to reinvent the wheel each time they code. However, as the Unit 42 Cloud Threat Report, 2H 2021 found, open source software can often contain known vulnerabilities, which can open organizations up to significant risk. Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, today introduced the industry's first context-aware software composition analysis (SCA) solution to help developers safely use open source software components. The integration of SCA into Prisma® Cloud further demonstrates why Palo Alto Networks is the leading provider of cloud-native security. Traditional SCA solutions are standalone products that can produce a large number of alerts but lack the runtime context to help fix vulnerabilities. With the addition of SCA to the Prisma Cloud platform, developers and security teams can proactively surface and prioritize known vulnerabilities that impact the application lifecycle (i.e., code, build, deploy and run). Prisma Cloud SCA delivers deep dependency detection and remediation of vulnerabilities in open source software before applications reach production. It can also help developers prioritize remediation based on software components that are already in use. These capabilities are not possible when SCA solutions are deployed as single point products. "Developers leveraging open source software should be able to build applications with the confidence they aren't opening the organization up to risk, With the average application consisting of 75% open source components, SCA on Prisma Cloud is key to protecting the organization from code to cloud and empowering developers to build with speed." Ankur Shah, senior vice president, Prisma Cloud, Palo Alto Networks As a complete cloud-native application protection platform (CNAPP), Prisma Cloud is context-aware at every stage of the application lifecycle to provide a unified view of risk across organizations' cloud environments. Where current approaches to cloud security rely on siloed products that provide intermittent visibility without remediation, Prisma Cloud approaches cloud security with a comprehensive, prevention-first framework. With 188% increase in cloud incident response cases over the past three years, this shift in approach has become mandatory. A complete code-to cloud CNAPP needs to incorporate the following five key principles in order to keep organizations safe: Security from code to cloud — protects applications at every stage of the development lifecycle — from code, build, deploy and run. Continuous, real time visibility — uses real-time and contextual security analysis of cloud environments to help prevent misconfigurations, vulnerabilities and threats. Prevention-first protection — stopping attacks and defending against zero-day vulnerabilities to drive down mean time to remediation. Choice for every cloud journey — aligning security needs with current and future cloud priorities by supporting a breadth of cloud service providers, workload architectures, continuous integration and continuous delivery (CI/CD) pipelines, integrated development environments (IDEs), and repositories with a unified platform Cloud scale security — consistently secures applications as cloud environments scale. In addition to SCA and to further increase the safety of cloud-native applications, Prisma Cloud introduced a software bill of materials (SBOM) among other capabilities for developers to easily maintain and reference a complete codebase inventory of every application component used across cloud environments. Implementing SCA and SBOM ensures Prisma Cloud aligns with these principles. "Buyers looking for cloud-native security solutions need to keep the requirements of microservices security protection in mind. The 'bolted-on' and 'whack-a-mole' approaches are a thing of the past," said Frank Dickson, program vice president, Security and Trust at IDC. "Security should be embedded throughout the application development life cycle. This means that buyers need to fundamentally change their approach to security, although they need to continue to protect their run-time environments, they must also embrace solutions that embed security in the application development process, an approach referred to as 'shift left.' Shift left requires one to think less about security products and more about continuous security processes." About Palo Alto Networks Palo Alto Networks is the world's cybersecurity leader. We innovate to outpace cyberthreats, so organizations can embrace technology with confidence. We provide next-gen cybersecurity to thousands of customers globally, across all sectors. Our best-in-class cybersecurity platforms and services are backed by industry-leading threat intelligence and strengthened by state-of-the-art automation. Whether deploying our products to enable the Zero Trust Enterprise, responding to a security incident, or partnering to deliver better security outcomes through a world-class partner ecosystem, we're committed to helping ensure each day is safer than the one before. It's what makes us the cybersecurity partner of choice.

Read More

CLOUD STORAGE

Alibaba Cloud Unveils Strategic Roadmap for International Business

Alibaba Cloud | September 23, 2022

Alibaba Cloud, the digital technology and intelligence backbone of Alibaba Group, has announced its latest international strategic roadmap at the 2022 Alibaba Cloud Summit. During the three-day summit, the trusted cloud provider has revealed new products to support technology innovation among enterprises, an investment of USD1 billion for a global partner ecosystem upgrade, and enhanced customer services to provide comprehensive support throughout a customer's digitalization journey. Technology innovation to power rapidly increasing cloud consumption With more enterprises moving to the cloud and an increase in demand for cloud services in a hybrid environment, Alibaba Cloud has made available globally a series of its proven infrastructure products, a multi-model cloud-native database and distributed cloud services. This range of new products aims to provide enterprise customers with a wider scope of cloud services covering network, storage and compute. Cloud Enterprise Network (CEN) 2.0, the newly available network services, provides global intelligent networking to support enterprises' global expansion. CEN 2.0 supports ultra-large-scale networking capabilities with higher availability, lower latency, enhanced security capability and greater flexibility in pricing options for enterprises, compared to the previous version. Alibaba Cloud has also unveiled a storage product called ESSD Auto PL, which provides block storage services and supports automatic scaling within seconds to allow businesses to handle sudden traffic surges. As the world's leading elastic block storage product with auto-scaling function, it offers up to one million IOPS (input/output operations per second), significantly higher than the industry average. Lindorm, the cloud-native multi-model database developed by Alibaba Cloud, successfully supported Alibaba Group's 11.11, the world's largest shopping festival, last year. Designed for fusion-processing requirements for wide tables, time series, space-time and various unstructured data, Lindorm has also been supporting customers in various industries in China – including automotive, finance and manufacturing – thanks to its high availability and low storage cost. Alibaba Cloud also introduced ACK One (Alibaba Cloud Distributed Cloud Container Platform), a multi-region and multi-cluster container management platform to provide a consistent management, delivery and operation experience for enterprises. It allows users to implement container cluster management, resource scheduling, data disaster recovery and application delivery through a unified platform, whether in a public cloud, private cloud or on-premise environment. ACK One is the latest addition to ACK Anywhere, Alibaba Cloud Container Service for Kubernetes. Earlier this year, among the eight significant industry players evaluated, Alibaba Cloud was named a "Leader" in The Forrester Wave™ Public Cloud Container Platforms Q1 2022 for the first time. Lastly, to support enterprises' need for hybrid cloud, CloudBox integrates Alibaba Cloud's public cloud infrastructure technologies such as compute, storage and network to provide enterprises with fully managed cloud services for deployment close to customers' business premises. CloudBox delivers a consistent experience as Alibaba Cloud's public cloud, while meeting enterprises' demand for on-premise data processing and low latency compute. CloudBox is designed for multinational companies with business operations in China. Alibaba Cloud has been strengthening its capabilities in computing, storage, network and security. For example, its recently unveiled Cloud Infrastructure Processing Unit (CIPU), a dedicated processing unit designed for its Apsara Cloud operating system, can reduce network latency to as low as five microseconds and improve computing power performance in data-intensive AI and data analytics scenarios by as much as 30%. Prioritizing partner benefits to build inclusive technology ecosystem With its revamped ecosystem strategy, Alibaba Cloud has announced that it is committed to investing USD1 billion to support partners' technology innovation and their market expansion with Alibaba Cloud in the coming three fiscal years. This investment consists of both financial and non-financial incentives, such as funding, rebates and go-to-market initiatives. To accelerate partners' growth, Alibaba Cloud also launched a "Regional Accelerator" program to provide partners operating in different markets with a localized business collaboration model. The model is designed around factors such as a market's level of technical maturity, vertical focus, digitalization needs and business demands, with an aim to boost partners' income and strengthen their technical expertise. Alibaba Cloud ecosystem partners including resellers, technology partners (ISV, SaaS and SI), service and consulting partners can benefit from the program. "Partners have always been a key focus for Alibaba Cloud, and we are committed to providing them with strong support for our ongoing co-creation and value-add – both technologically and commercially to further empower our joined customers, Our revamped partner strategy prioritizes our partners' growth. By continuing to support our partners' business expansion, we can build an inclusive ecosystem benefiting partners and customers." Selina Yuan, Alibaba Cloud Intelligence International President To address complications with partners' international business operations, Alibaba Cloud has also upgraded its collaboration model with its ISV partners, with a focus on enhancing industry collaboration, standardizing go-to-market process, and accelerating technical solution integration to increase efficiency. Looking ahead, Alibaba Cloud hopes to recruit more financial services, retail, internet and manufacturing ISVs to co-develop products and support customer innovation. Alibaba Cloud currently works with about 11,000 partners worldwide, including Salesforce, VMware, Fortinet, IBM and Neo4j. Empowering customers with comprehensive support In order to provide all-round cloud-based solutions and services to all customers, Alibaba Cloud also launched a "Global Delivery and Service Program" to enhance the cloud adoption process for customers. Under the program, it has unveiled three Customer Service Centers in Kuala Lumpur (Malaysia), Porto (Portugal), and Mexico City (Mexico), to support customers in their cloud adoption journey, providing timely and regionalized cloud migration and consulting services. In addition to the Customer Service Centers, Alibaba Cloud has set up three Service Delivery Centers in Kuala Lumpur (Malaysia), Dubai (United Arab Emirates) and Hong Kong (Greater China), to provide extra technology support to its regional offices and customer project delivery in Asia Pacific and the Middle East, Europe and Africa. Fueling new innovations with reliable infrastructure During the summit, Alibaba Cloud has inked nearly 30 agreements to help customers and partners accelerate their digital innovation capabilities with leading cloud computing technologies. In collaboration with JP Games, Japan's leading game development studio, Alibaba Cloud has unveiled a set of new services to create virtual spaces and realistic avatars for global customers venturing into the metaverse. Together with MetaverseXR, Thailand's leading metaverse company, Alibaba Cloud rolled out a comprehensive suite of metaverse solutions for the Thai market in order to fulfill growing local demand for embarking on a Web 3.0 journey. Alibaba Cloud also teamed up with UMG Group in Myanmar, to power the country's digital transformation – especially in traditional industries. With BeLive and VisionTech from Singapore, Alibaba Cloud is expanding its regional outreach in the media and Fintech verticals. Alibaba Cloud is collaborating with OnFinality, a leading New Zealand-based blockchain infrastructure provider, to offer robust cloud-computing capability and a strong global network for Web 3.0 developers looking to scale globally. More than 300 Alibaba Cloud customers and partners around the globe are attending the summit, including Accenture, Tiger Brokers, DANA, Thai Data, and Lala station. About Alibaba Cloud Established in 2009, Alibaba Cloud (www.alibabacloud.com) is the digital technology and intelligence backbone of Alibaba Group. It offers a complete suite of cloud services to customers worldwide, including elastic computing, database, storage, network virtualization services, large-scale computing, security, management and application services, big data analytics, a machine learning platform and IoT services. Alibaba maintained its position as the third leading public cloud IaaS service provider globally since 2018, according to IDC. Alibaba is the world's third leading and Asia Pacific's leading IaaS provider by revenue in U.S. dollars since 2018, according to Gartner.

Read More

CLOUD SECURITY

Yottaa Announces Conversion Zone, a New Integration with Salesforce Commerce Cloud

Yottaa | September 22, 2022

Yottaa announced that it has launched Conversion Zone, a new integration with Salesforce Commerce Cloud, the fastest path to unified commerce. Commerce Cloud enables brands to provide personalized experiences for shoppers that span web, mobile, social, and in-store. And now, as part of the world’s #1 CRM platform – Salesforce – brands can deliver completely unified experiences for customers that extend beyond commerce to include marketing, customer service, and more. Conversion Zone is a new product in Yottaa’s RAPID CTRL eCommerce acceleration solution. As part of Yottaa’s integration with Salesforce Commerce Cloud, Conversion Zone empowers Commerce Cloud customers to determine the site speed where shoppers convert most. This enables these brands to optimize their sites to ensure pages are loading in the “Conversion Zone” resulting in higher online revenue, as well as better shopper experiences. Yottaa’s integration with Commerce Cloud is through RAPID CTRL, Yottaa’s patented application sequencing solution that optimizes and sequences the way 3rd party technologies and images load in the browser. Through RAPID CTRL, online brands can increase eCommerce site speed and improve conversion rates across all devices. Conversion Zone, a new product in RAPID CTRL, enables brands using Salesforce Commerce Cloud to determine the target site performance range needed to maximize online conversion rates. Comments on the News “Yottaa’s integration with Salesforce Commerce Cloud enables online brands to deliver faster and more engaging experiences for their shoppers, As part of this integration, Yottaa’s new Conversion Zone solution provides these brands a customized, powerful tool to determine the exact page load time periods that result in the highest conversions so they can get more value from all of their eCommerce investments.” Rich Stendardo, CEO of Yottaa “Creating personalized, omnichannel experiences is now more important than ever for brands,” said Mike Wolff, SVP, ISV Sales, Salesforce. “By leveraging the power of Commerce Cloud and the new integration from Yottaa, customers will now be able to not only speed up the loading of their sites, but also identify optimal site speed ranges that produce the most online conversions.” About Salesforce Commerce Cloud The Salesforce Commerce Cloud empowers retailers to unify customer experiences across all points of commerce, including web, social, mobile and store. From shopping to fulfillment to customer service, the Commerce Cloud delivers 1-to-1 shopping experiences that consistently delight customers, driving increased engagement, loyalty and conversion. With embedded predictive intelligence and a robust partner ecosystem, the Commerce Cloud helps retailers deliver superior customer experiences for retailers, from planning to launch and beyond. About Yottaa Leading brands such as 1 800 Contacts, Carter’s, J. Crew, Lands’ End, Ralph Lauren, and Samsonite rely on Yottaa to accelerate, optimize, and secure their eCommerce sites. By optimizing the loading of third-party eCommerce technologies, high resolution images, and other website elements, Yottaa enables online brands to deliver superior customer experiences, improve site performance up to 60%, and increase online conversion up to 20%. By controlling the execution of all 3rd parties and other services on their sites, Yottaa also enables brands to enhance their overall security posture, provide more secure shopper experiences, and ensure compliance with internal and external policies. To learn more about how Yottaa can optimize every page load on your eCommerce site and increase conversions

Read More

Events