Critical data – Disaster Recovery Playbook http://disasterrecoveryplaybook.org/ Thu, 26 May 2022 07:00:00 +0000 en-US hourly 1 https://wordpress.org/?v=5.9.3 https://disasterrecoveryplaybook.org/wp-content/uploads/2021/06/icon-92.png Critical data – Disaster Recovery Playbook http://disasterrecoveryplaybook.org/ 32 32 Will the tape play a “critical role” in the zettabyte era, as its supporters hope? – Blocks and Files https://disasterrecoveryplaybook.org/will-the-tape-play-a-critical-role-in-the-zettabyte-era-as-its-supporters-hope-blocks-and-files/ Thu, 26 May 2022 07:00:00 +0000 https://disasterrecoveryplaybook.org/will-the-tape-play-a-critical-role-in-the-zettabyte-era-as-its-supporters-hope-blocks-and-files/ The Tape Storage Council released a report indicating that tape will play an even greater role in the computing ecosystem as the growth of data storage continues. We do not agree. The report, titled Band to Play Critical Roles as Zettabyte Era Takes Offstates, “The era of the zettabyte is in full swing, driving unprecedented […]]]>

The Tape Storage Council released a report indicating that tape will play an even greater role in the computing ecosystem as the growth of data storage continues.

We do not agree.

The report, titled Band to Play Critical Roles as Zettabyte Era Takes Offstates, “The era of the zettabyte is in full swing, driving unprecedented demand for capacity as many enterprises move closer to Exascale storage requirements.”

He identifies five trends that he believes favor the band:

  • Favorable economics: Data-intensive applications and workflows are fueling new tape growth due to its significant TCO benefits
  • Security – the band’s inherent air space provides additional layers of defense against cybercrime
  • Data accessibility – tape performance improves access times and throughput
  • Sustainability – tape plays an important role in green data center strategies
  • Optimization – tape active archives enhance storage optimization, providing dynamic optimization and fast data access for archival storage systems

Let’s unbox this. The favorable economics basically means that tape storage is cheaper than disk storage on a $/TB basis, and both are cheaper than flash storage. However, tape is slow, with a longer first-byte access time than disk or NAND, making it the choice for infrequently accessed data where latency is less of a concern than storage cost.

The physical air gap inherent in tape is a good point, but the virtual air gaps marketed by backup storage, unstructured data storage, cloud storage and cybersecurity companies are generally known to be effective and its superiority is therefore diminished here.

The point of data accessibility is more difficult to understand. Of course, tape is better than disk in terms of bandwidth. As the report states, “HDDs and SSDs have faster access times to the first data byte. For large files, tape systems have faster access times to the last byte of data… The LTO-9 and TS1160 company [tape] the drives each have a data transfer rate of 400MB/sec. This compares to 7200 RPM hard drives ranging from 160 to 260 MB/sec.

But typically a large file would be striped across multiple disk drives in an external storage array and read back from multiple drives in parallel, negating the advantage of the single tape drive. Also, nowadays many primary and secondary data storage devices use SSDs and not HDDs. In terms of bandwidth, it’s pretty much over, especially with NVMe SSDs. In our view, this claimed benefit evaporates before our eyes when we look at it.

Yes, tape is getting faster generation after generation, but it’s still slower than hard drives and all-flash arrays. The evangelists accept this implicitly as we will see when we come to the fifth tendency.

The fourth point of advice about sustainability is good. Obviously, offline, flowless tape cartridges stored on a shelf don’t need power or cooling. But this trend only supports its use if the need for fast data access has already been ruled out. No one will use it for primary data storage if it means your servers can only support tens of transactions per second instead of thousands, not even to save a few thousand tons of carbon emissions per year.

And so we come to the fifth point, the active archive. The diagram in the report shows a cache buffer placed in front of a tape library:

A diagram of the Tape Storage Council report

It is operated by a server running data management software, which presents a file or object interface upstream and a tape interface downstream of the library. The report states, “An active archive integrates two or more storage technologies (SSD, HDD, tape, and cloud storage) behind a file system providing a transparent way to manage archive data in a single virtualized storage pool.

Cloud archive storage uses tape, so here we are talking about disk/SSD front ends and a tape backend. And why have this cache buffer? It “provides dynamic optimization and rapid data access for archival storage systems”. “SSDs or HDDs serve as a cache buffer for archival data stored on tape, providing faster access to the first byte of data, higher IOPs, and random access.”

In other words, you need a disk or SSD buffer because data access to tape is slow. Ideally people wouldn’t use tape at all because it’s way too slow, but it’s cheap and reliable, so we accept it and improve its slowness with a cache buffer in archive setups active.

The report states that the need for data archives will increase due to the increase in cold data storage needed for cloud, HPC, IoT, life sciences, media and entertainment, video surveillance and sports video. That’s probably true, but it’s still standard data archiving to tape. He will not play a larger role. He will play the same role he always had.

The tape is not dead yet and its track record of increasing capacity is impressive. It’s actually flourishing. But that’s not because of its wonderful technology, good as it is, but because there’s nothing better. It’s cheap, it contains a lot of data, it’s reliable, it’s slow and it works. Enough said.

]]>
How technology and collaboration can accelerate decarbonization https://disasterrecoveryplaybook.org/how-technology-and-collaboration-can-accelerate-decarbonization/ Tue, 24 May 2022 07:05:10 +0000 https://disasterrecoveryplaybook.org/how-technology-and-collaboration-can-accelerate-decarbonization/ Accelerating the application of innovative decarbonization technologies can help tackle the climate change crisis. Public-private collaboration can harness these innovations across the entire value chain to help reduce carbon emissions. But we need a set of frameworks and policies supported by governments, businesses and civil society to enable a sustainable recovery. With the notion of […]]]>
  • Accelerating the application of innovative decarbonization technologies can help tackle the climate change crisis.
  • Public-private collaboration can harness these innovations across the entire value chain to help reduce carbon emissions.
  • But we need a set of frameworks and policies supported by governments, businesses and civil society to enable a sustainable recovery.

With the notion of “now or never” hanging over us, should we be fearful or optimistic? I remain optimistic. First, we already have the technology, and second, we all recognize that none of us can do it alone. If we accelerate the application of critical technology, we have a unique opportunity to help solve the world’s most pressing challenges together. Challenges like meeting the Paris Agreement target of limiting global warming to 1.5°C.

We want to create a more sustainable and equitable future for all through technology with purpose. We are already delivering the decarbonization technologies within critical industries to make a difference in the world – and we believe in the power of innovation and its impact when scaled. With the latest IPCC report stressing that it is “now or never” to limit global warming, the impetus that companies can provide is essential.

Beyond technology, companies like Siemens have the reach and reputation to act as a ‘bringer’ and facilitator of relevant industry players. Progress can be dramatically accelerated if we let go of silos and work together in powerful ecosystems. These “networks of networks” allow companies to join forces and co-create. As more partners join, ecosystems bring new products and services to market faster; they accelerate change, create new revenue streams and facilitate public-private collaboration. They are powerful tools for solving complex problems.

The full value of the “value chain”

By bringing actors together in ecosystems, the overall result is greater than the sum of the parts. Take the example of the manufacturing industry. Between 70 and 90% of a product’s carbon emissions occur throughout the value chain. For this reason, it is essential to achieve transparency and to track emissions along this chain in order to reduce the carbon footprint.

estainium is an answer to that. Initiated by Siemens at the end of 2021, it is an open network that allows manufacturers, suppliers, customers and partners to exchange reliable data on the carbon footprint of products. This brings us closer to carbon neutrality and accelerates the climate transition.

One industry at the forefront of this transition is the automotive sector. Here too, the open exchange of data between companies is sought within a European ecosystem in which car manufacturers and suppliers, dealer associations and suppliers can all participate equally.

This network of partners, of which Siemens is a founding member, is Catena-X. Clearly, an ecosystem that brings together all players, including large corporations and more established SMEs, is much more likely to improve efficiency and drive decarbonization.

A matter of trust

Such ecosystems thrive on a diversity of partners, but they need real commitment from everyone. And that can be earned by creating a foundation of trust and data security. The willingness of companies to share data must be protected against the unintentional (misuse) use of this data which would jeopardize their own competitiveness. This requires an ecosystem with full data sovereignty.

For Estainium, distributed ledger technology is used to ensure both a high level of data protection and reliability. And since no centralized storage takes place, each party retains full data sovereignty. For Catena-X, the companies involved have agreed on the International Data Spaces (IDS) standard for data sovereignty.

The power of private and public

For collaboration to be successful, it must be underpinned by frameworks provided by strong institutions like the EU. These include clear pathways to create level playing fields and taxonomies for policy, regulation and disclosure in all markets. The EU Taxonomy, a key part of the EU Green Deal legislative package, is a prime example.

Climate change is an urgent threat requiring decisive action. Communities around the world are already experiencing heightened climate impacts, from droughts to floods to rising seas. The World Economic Forum’s Global Risks Report continues to rank these environmental threats high on the list.

To limit the global temperature increase to well below 2°C and as close as possible to 1.5°C above pre-industrial levels, it is essential that businesses, policymakers and civil society advance short-term and long-term global climate actions in line with the goals of the Paris Agreement on climate change.


The World Economic Forum Climate Initiative supports scaling and accelerating global climate action through public and private sector collaboration. The Initiative is working on several work streams to develop and implement inclusive and ambitious solutions.

This includes the Alliance of CEO Climate Leaders, a global network of business leaders from various industries developing cost-effective solutions for the transition to a low-carbon, climate-resilient economy. CEOs use their position and influence with policymakers and corporate partners to accelerate the transition and realize the economic benefits of a more secure climate.

Contact us to get involved.


The decision to enable decarbonization through the electrification of the energy needs of our economy – whether in the industrial, infrastructure or mobility sectors – is a clear example where technology companies and regulatory institutions should working hand in hand to accelerate a sustainable recovery.

A successful outcome requires the involvement of multiple stakeholders

An example that many people can currently identify with is the adoption of electric heaters (also known as power-to-heat) and e-charging technology, coupled with the integration of renewable energy sources. . In terms of technological solutions, the heat pump and electric vehicle charging hardware exist, as do network software and control tools to balance production, consumption and demand.

So what do we need to take it to the next level? To name a few areas: policies to encourage the large-scale adoption of heat-generating systems and a regulatory framework, including regulations to support smart grid management and coordination with utility operators. network – for example via peripheral devices installed on all electric heaters and electronic chargers. A successful outcome would therefore depend on collaboration between multiple stakeholders: governments, businesses and the general public.

Governments and businesses also have a role to play in encouraging investment in the climate transition. Investments in renewable energy reached $322 billion in 2018 and continues to rise, according to IRENA. However, it remains well below the level required to meet global climate goals. In fact, the IPCC report found that financial flows are a factor of three to six times lower than the levels needed by 2030 to limit warming below 2°C; however, there is sufficient capital and liquidity globally to fill investment gaps. Once again, collaboration – between governments, companies, private investors and financial institutions – is needed to advance the deployment of this capital to the right projects in the right places.

Create value for all stakeholders

Business is a powerful force in driving sustainability – and vice versa. Companies that provide useful technology can help solve the world’s greatest challenges. It works in ecosystems – with customers, suppliers, institutions, investors and society at large – that will further accelerate progress. This underscores our belief at Siemens that what’s good for business and what’s good for people and our planet go hand in hand.


]]>
Cyber ​​alert after an upsurge in attacks https://disasterrecoveryplaybook.org/cyber-alert-after-an-upsurge-in-attacks/ Sun, 22 May 2022 11:06:00 +0000 https://disasterrecoveryplaybook.org/cyber-alert-after-an-upsurge-in-attacks/ Local BUSINESSES urged to ensure their cybersecurity is up to date after it emerged that 39% of businesses reported breaches or attacks in the last 12 months. Government figures show that cyberattacks continue to pose a serious threat to all types of UK businesses, with one in five people reporting a denial of service, malware […]]]>

Local BUSINESSES urged to ensure their cybersecurity is up to date after it emerged that 39% of businesses reported breaches or attacks in the last 12 months.

Government figures show that cyberattacks continue to pose a serious threat to all types of UK businesses, with one in five people reporting a denial of service, malware or ransomware attack.

Commenting on the situation, Stephen Whelan, of Integrity IT Solutions in Annan, said: “Every business, regardless of size, should have measures in place to prevent online criminals from accessing their information and harming potentially to their business.

“Cybercriminals often see the human factor as the weakest link in any security measure. It is therefore essential that each member of your team who has access to the Internet or an email account receives cybersecurity training and understands the serious damage these types of attacks can cause. cause.”

The Cyber ​​Security Breaches Survey 2022 found that the estimated average cost of cyberattacks to businesses was £4,200, with phishing attempts being the most common form of breach, accounting for 83%.

Stephen said: “Online criminals create phishing emails that look realistic, such as fake invoices or fake receipts, to increase the likelihood that someone will click on them.

“It’s important for your team to understand how to identify a phishing email and report anything suspicious to their line manager. It is the responsibility of everyone in the organization to be vigilant.

Additionally, businesses can also be targeted by ransomware attacks where files are encrypted to prevent access.

Using strong passwords made up of three random words and regularly checking access to systems can improve a company’s security, he said, adding: “Weak passwords can be cracked in a few seconds, so choose longer and more unusual passwords and use different passwords for different accounts. It is recommended to use a password manager to store and create strong and unique passwords.

“Two-factor authentication reduces the risk of being hacked by asking you to provide a second factor of information, such as getting a text or code when you log in. It’s a common practice used by credit card companies and can be easily activated on software such as Microsoft 365.”

Additionally, organizations should regularly remove access that is no longer needed, ensure that users’ desktops, laptops, and mobile devices are all patched, and that defenses such as firewalls and antivirus software is up to date, as well as having a plan to identify critical data and key systems in the event of a cybersecurity breach.

]]>
CFIUS: three trends to know | stone tower https://disasterrecoveryplaybook.org/cfius-three-trends-to-know-stone-tower/ Fri, 20 May 2022 15:45:13 +0000 https://disasterrecoveryplaybook.org/cfius-three-trends-to-know-stone-tower/ The Committee on Foreign Investment in the United States (CFIUS) is a multi-agency branch of the United States government responsible for reviewing foreign investment in the United States and assessing the potential risk or threat that a given investment may pose. for national security. Given the inherent complexity of this charter, it should come as […]]]>

The Committee on Foreign Investment in the United States (CFIUS) is a multi-agency branch of the United States government responsible for reviewing foreign investment in the United States and assessing the potential risk or threat that a given investment may pose. for national security. Given the inherent complexity of this charter, it should come as no surprise to learn that the powers and authorities of CFIUS have been redefined several times over the years – most recently in 2018 with the passing of the law on Foreign Investment Risk Review Modernization (FIRRMA), which further expanded the reach of CFIUS authorities to more industries and transaction types.

CFIUS representatives and industry experts recently gathered for ACI’s 8th Annual CFIUS Conference to discuss recent trends and future predictions. From these discussions, three critical points emerged that must be understood by anyone facing a transaction with foreign partners or an investment (and therefore potentially subject to CFIUS review).

1. Is national security…. ?
National Security is deliberately indefinite to give CFIUS the flexibility to deal with threats. When the CFIUS was first formed in the mid-1970s, there were concerns about Arab investments in the United States using their huge profits in the oil trade. Concerns then shifted to emerging economic powerhouse Japan, which began investing heavily in the United States. In the early years of CFIUS existence, China and Russia did not even participate in the global economic system, but today they represent the largest and most important focus of CFIUS.

The first president-killed deal under CFIUS authority was a Japanese attempt to buy a silicon chip maker. Foreign acquisition of chipmakers has been a constant concern of CFIUS throughout its existence. Today, CFIUS has identified new technologies, assets, and nationalities as threats to US national security, and the limits of its scope are not explicitly defined. According to FIRRMA, CFIUS’ authority has expanded to include reviews of non-monitored investments, as well as certain real estate transactions. In addition, FIRRMA has placed particular emphasis on reviewing transactions involving US critical technology companies – that is, by CFIUS standards, a US company involved in: critical technology; critical infrastructure; or Sensitive Personal Data (collectively referred to as US Business “TIDs”). Some of these technologies are more easily identified as sensitive because they may already be tied to existing US export controls. But CFIUS is also concerned with “emerging technologies,” and it’s a list that keeps growing as new products and capabilities are evaluated. Even if a transaction does not directly include a critical technology element, the target company’s connection to such technology, infrastructure or even supply chain may subject it to CFIUS restrictions.

Similarly, transactions can also be judged based on friends of your friends. That is, the foreign party to your transaction may not represent an opposing foreign nation – but if it has its own close economic relationship with it, that connection with a third party could jeopardize your transaction.

2. Personal data
Of all the assets a transaction can involve, CFIUS is increasingly concerned about access to personal data – especially that of US citizens and government employees. Regardless of the transaction company’s industry, products, or operations, if the proposed transaction has the potential to give a foreign entity direct access to sensitive information of U.S. persons, CFIUS will likely conduct a review of the proposed transaction and may impose mitigation requirements or reject the transaction altogether. Although CFIUS has not published a definition of sensitive personal data, CFIUS has determined in certain transaction reviews that sensitive personal data includes names, addresses, email addresses, telephone numbers, dates of birth and more obvious identifiers, such as social security numbers, financial records and registers. US companies involved in the collection, storage or sharing of personal data may be designated by CFIUS as a US company TID depending on the nature of the personal data and the volume with which they deal.

In many cases, transactions involving sensitive personal data have been successfully negotiated and approved with CFIUS agreeing to certain mitigating controls. These controls may include segregated US computer systems, enhanced data security, and limiting access to only US citizens based in the United States.

Global Map

3. Non-notified transactions
FIRRMA not only increased the powers and reach of the CFIUS, but also increased its resources. Many of these resources are increasingly devoted to identifying unnotified transactions in which investors have not filed an application with CFIUS, but CFIUS believes that a national security risk is indeed presented by the transaction and therefore requires the parties to deposit. Most often this happens after the transaction is closed. The CFIUS has always had this power, but until now it lacked the resources to launch these large-scale investigations. According to the latest available report, in 2020 CFIUS identified 117 unnotified transactions for mandatory filing.

CIFIUS Card

CFIUS officials present at the conference acknowledged that they were deliberately expanding this effort and allocating additional resources to obtain business intelligence and review an increased number of transactions. In fact, the Treasury Department’s Strategic Plan for 2022 – 2026 establishes a measure of success as “accelerated timelines for the identification and processing of covered transactions that have not been voluntarily filed with CFIUS (transactions “not notified”)”.

It is never advantageous for a foreign investor to be solicited by the CFIUS. First, the SUISC believes you were likely trying to circumvent the national security review process and their suspicions of malicious intent are greatly increased. It is highly likely that investors will be required to unwind the transaction and, if approved, will likely result in a mitigation agreement with much more restrictive terms than if investors had filed prior to closing the transaction.

It is far better to assess the potential need to file with CFIUS in the early stages of the transaction process, primarily through a thorough due diligence effort in the spirit of CFIUS. There are many expert resources in this industry that can effectively help you navigate this process and ensure you have a solid understanding of the following:

1. What constitutes a national security concern today? This is constantly changing and can be influenced by daily events around the world.

2. What elements of your agreement (assets, parties, technologies) may give CFIUS reason to further consider your proposal?

3. Mitigating conditions are likely in many transactions. Anticipate the specific mitigations CFIUS may impose on your transaction and assess the transaction in that context.

Download this preview.

]]>
NASA selects companies for study of NOAA’s Atmospheric Composition Instrument https://disasterrecoveryplaybook.org/nasa-selects-companies-for-study-of-noaas-atmospheric-composition-instrument/ Wed, 18 May 2022 01:14:11 +0000 https://disasterrecoveryplaybook.org/nasa-selects-companies-for-study-of-noaas-atmospheric-composition-instrument/ NASA selects companies for study of NOAA’s Atmospheric Composition Instrument Press release from: NASA HQ Posted: Tuesday May 17th 2022 On behalf of the National Oceanic and Atmospheric Administration (NOAA), NASA has selected two companies for the Geostationary Extended Observation (GeoXO) Phase A study of Atmospheric Composition (ACX). These companies will provide services to help […]]]>

NASA selects companies for study of NOAA’s Atmospheric Composition Instrument

Press release from: NASA HQ
Posted: Tuesday May 17th 2022

On behalf of the National Oceanic and Atmospheric Administration (NOAA), NASA has selected two companies for the Geostationary Extended Observation (GeoXO) Phase A study of Atmospheric Composition (ACX). These companies will provide services to help achieve the goals of the National Oceanic and Atmospheric Administration (NOAA) GeoXO program.

Ball Aerospace & Technologies Corp. of Boulder, Colorado, and Raytheon Intelligence & Space of El Segundo, Calif., will both receive fixed-price, twenty-month contracts for approximately $5 million. The work will be performed at the contractors’ facilities.

The main objective of this effort is to provide a study in the definition phase of a GeoXO ACX instrument. The ACX instrument will be a hyperspectral, ultraviolet-to-visible imaging spectrometer, slated to fly on the NOAA GeoXO series of geostationary satellites. The selected companies will develop the instrument concept and mature the necessary technologies. The study will define the potential performance, risks, costs and development schedule of the instrument. The results of the study will be used to define the performance requirements for the ACX instrument implementation contract, which is expected to be awarded in 2024.

Atmospheric composition measurements from geostationary orbit will provide essential data to the air quality forecasting and public health communities. The instrument will monitor air pollutants emitted by transportation, power generation, volcanoes and wildfires on an hourly basis, as well as pollutants generated by these emissions once they are in the atmosphere. This operational geostationary instrument will represent a significant advance over the daily observations provided by current instruments in polar orbit. These measures will improve air quality forecasts and help mitigate health risks from air pollution, such as asthma, cardiovascular disease and neurological disorders.

NOAA’s GeoXO satellite system is the breakthrough mission that will advance Earth observations from geostationary orbit. The mission will provide vital information to address the grand environmental challenges of the future in support of weather, ocean, and climate operations in the United States. The GeoXO mission will continue and expand the observations provided by the GOES-R series of satellites. GeoXO will bring new capabilities to address emerging environmental issues and challenges that threaten the safety and well-being of every American. NOAA is working to ensure these critical observations are in place in the early 2030s, when the GOES-R series nears the end of its operational life.

The GeoXO mission is a collaborative partnership between NOAA and NASA. NOAA funds, operates and manages the mission and NASA’s Goddard Space Flight Center in Greenbelt, Maryland manages the acquisition of Phase A formulation contracts.

For more information on the GeoXO mission, please visit:

https://www.nesdis.noaa.gov/next-generation-satellites/geostationary-extended-observations-geoxo

For more information on NASA and agency programs, please visit:

https://www.nasa.gov

// to finish //

No more press releases and status reports or featured stories.

Please follow SpaceRef on Twitter and Like us on Facebook.

]]>
Audidia releases a strong initial – GuruFocus.com https://disasterrecoveryplaybook.org/audidia-releases-a-strong-initial-gurufocus-com/ Mon, 16 May 2022 12:02:19 +0000 https://disasterrecoveryplaybook.org/audidia-releases-a-strong-initial-gurufocus-com/ Consumer response exceeds initial expectations BOULDER, CO /ACCESSWIRE/May 16, 2022 / Auddia Inc. (NASDAQ:AUUD) (NASDAQ:AUUDW) (“Auddia” or the “Company”), a developer of a proprietary AI platform for audio and innovative podcasting technologies that reinvents the how consumers interact with audio, today released the first consumer insights in response to the launch of faidr, a mobile […]]]>

Consumer response exceeds initial expectations

BOULDER, CO /ACCESSWIRE/May 16, 2022 / Auddia Inc. (NASDAQ:AUUD) (NASDAQ:AUUDW) (“Auddia” or the “Company”), a developer of a proprietary AI platform for audio and innovative podcasting technologies that reinvents the how consumers interact with audio, today released the first consumer insights in response to the launch of faidr, a mobile streaming app that puts consumers in control of the listening experience on any AM/FM radio station, including commercial-free listening. This initial data meets or exceeds the company’s internal targets for the launch of faidr.

Auddia launched faidr with 4,500 radio stations on February 15, 2022 and set a target of 50,000 installs and 10,000 monthly active users (MAUs) by the end of the second quarter. The company believes that achieving these measures, while bringing the cost per install (CPI) to $5 or less, is indicative of the significant consumer interest in faidr, especially considering that only music were active on faidr during the initial 90-day launch period. . At the time of faidr’s launch, the company announced that it planned to release initial data after 90 days.

faidr download rates, costs to generate downloads (cost per install or CPI), and initial MAU rates are all in line with internal company goals and, in some cases, above target goals. At an average of $3.75, the current CPI after 60 days is below the internal target of $5 that the company had hoped to achieve by the end of the second quarter. . With 24,800 MAUs to date, the company has well exceeded its goal of having 10,000 MAUs by the end of the second quarter and expects to continue to see strong growth in MAUs based on current trends. At the end of the second quarter, Auddia will release updated metrics on the launch of faidr in addition to a timeline for communicating subscription conversion rates.

“We are extremely pleased that faidr has exceeded our expectations, demonstrated consumer interest and provided us with a solid starting point for the launch and future growth of our flagship product,” said Michael Lawless, CEO of Audidia. “We are excited about the strong initial results we are seeing and look forward to continued progress as we scale up our marketing initiatives.”

Audidia Founder and Executive Chairman Jeff Thramann added, “As a major investor in Auddia, I believe these launch results are the most important data points the company has released to date on its progress and its potential. in faidr, and our number one goal has been to answer the question of whether consumers are interested enough in faidr to download and use the app. Before today, the only indications we had to validate our thesis were intuition, survey results, and limited pilot data. Today, we’re moving from that hypothetical data to real-world data that clearly shows consumers are hearing our message and finding it compelling enough to download and use faidr. I think this is critical data that greatly reduces the risks of this part of the and enhances the potential of the faidr opportunity. There is every reason to believe that we will continue to grow our audience in parallel with the marketing pass. Our next major step is to quantify conversion rates from free trial to paid subscriptions. This is the last piece of data we need to provide guidance on revenue expectations.”

Asking more about the data, Theo Romeo, Vice President of Marketing at Audidia, said, “What’s incredibly encouraging about this early data is that our Q3 product roadmap includes improvements product milestones that we believe will further drive consumer engagement, such as enabling news, sports and talk stations and introducing compelling new content choices such as Discovr, our recently announced music discovery program Additionally, podcasts and seamless streaming between multiple stations are on the horizon in our vision of a more modern and redefined radio listening experience.”

faidr is the first streaming radio aggregator to replicate the complete radio dial, giving listeners access and control over what has now grown to over 5,200 live radio stations in all major US markets. Listeners will be able to replace interruptions such as commercials with audio content they choose to hear, including music, comedy, news, and more.

“Like any digital content company providing a mobile app to consumers, we have the advantage of being able to measure the critical elements that drive the business forward,” said Audidia Chief Financial Officer Brian Hoff. “This first look at our ‘top of funnel’ metrics is very encouraging, and we’re pleased with what we’re seeing. Above all, we look forward to sharing early results from our subscription pricing rollout before the end. of the third trimester.”

The app is available on iOS and Android stores – visit faidr.com for more information. New users get at least 90 days free trial of the premium subscription plan before having to upgrade to subscription or continue on the free tier with reduced functionality.

Become a faidr radio partner Click here.

About Audidia Inc.

Auddia is reinventing the way consumers interact with audio through the development of a proprietary AI platform for audio and innovative technologies for podcasts. Auddia offers two industry firsts: the ability to listen to any AM/FM radio station with custom content added and ad-free, plus podcasts with an interactive digital feed that supports deeper stories and provides digital revenue to podcasters. Both offerings are aimed at a large and rapidly growing audience with high purchase intent. For more information visit: www.auddiainc.com

Forward-looking statements

This press release contains forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995, Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934 regarding the Company’s current expectations regarding future results, performance, prospects and opportunities. Statements that are not historical facts, such as “anticipates”, “believes”, and “expects” or similar expressions, are forward-looking statements. These forward-looking statements are based on management’s current plans and expectations and are subject to a number of uncertainties and risks that could materially affect the Company’s current plans and expectations, as well as the results of operations and the future financial situation. These and other risks and uncertainties are discussed in more detail in our filings with the Securities and Exchange Commission. Readers are encouraged to review the section titled “Risk Factors” in the Company’s Annual Report on Form 10-K for the fiscal year ended December 31, 2021, as well as other information contained in the Annual Report and filings. subsequently with the Securities and Exchange Commission. The forward-looking statements contained in this announcement are made as of this date, and the Company undertakes no obligation to publicly update or revise any forward-looking statements, whether as a result of new information, future events or otherwise.

Investor Relations:

Kirin Smith, President
PCG Advisory, Inc.
[email protected]
(646) 823-8656
www.pcgadvisory.com

THE SOURCE: Audia Inc.

See the source version on accesswire.com:
https://www.accesswire.com/701476/Auddia-Releases-Strong-Initial-Data-from-Launch-of-Flagship-faidr-Mobile-App

]]>
The new weather satellite returns the first images; Will move to the Pacific over time https://disasterrecoveryplaybook.org/the-new-weather-satellite-returns-the-first-images-will-move-to-the-pacific-over-time/ Fri, 13 May 2022 20:37:20 +0000 https://disasterrecoveryplaybook.org/the-new-weather-satellite-returns-the-first-images-will-move-to-the-pacific-over-time/ This GOES-18 image shows the contiguous United States observed by each of the ABI’s 16 channels on May 5, 2022. This 16-panel image shows the two visible channels, four near-infrared and 10 infrared of the ABI. ‘ABI. The visible and near infrared bands are gray in color, while the infrared bands have warmer brightness temperatures […]]]>
This GOES-18 image shows the contiguous United States observed by each of the ABI’s 16 channels on May 5, 2022. This 16-panel image shows the two visible channels, four near-infrared and 10 infrared of the ABI. ‘ABI. The visible and near infrared bands are gray in color, while the infrared bands have warmer brightness temperatures mapped to warmer colors. The different appearance of each band is due to the way each band reflects or absorbs radiation. Each spectral band was swept around the same time, starting at 18 UTC. Image: NOAA

The new GOES Advanced Weather Satellite has sent its first stunning images of the planet back to Earth; after further testing, the satellite will move over the Pacific and collect imagery and data across Hawaii, the central and eastern Pacific hurricane basins, and the west coast of the United States. Originally known as the GOES-T weather satellite, the rocket launched from Florida’s Space Coast on March 1. Once it reached geostationary orbit above Earth 22,236 miles above it, the satellite was renamed GOES-18. Once testing is complete and the satellite is moving over the Pacific, it will be renamed GOES-West. The existing GOES-West will go into “storage”, floating above the Earth as a backup in case one of the other GOES satellites fails.

A United Launch Alliance (ULA) Atlas V rocket launches NOAA's newest weather satellite into space on March 1.  Image: ULA
3…2…1…LAUNCH!
A United Launch Alliance (ULA) Atlas V rocket launches NOAA’s newest weather satellite into space on March 1. Image: ULA

“We at NASA are proud to support our partner agency, NOAA, and its mission to provide critical data and imagery to forecasters and researchers who monitor hazardous weather,” said Pam Melroy, Deputy Administrator of NASA, after launch. “While the main job of the GOES-R series satellites is to help with weather forecasting, these satellites produce observations that also help NASA science. The collaboration of our agencies brings great benefits to the understanding of This GOES-T satellite is the third in the GOES-R series to send images back to Earth, the others being GOES-S which currently acts as GOES-West.

The GOES-T satellite is pictured here in a clean room on Earth long before it heads into space on March 1.  Image: Lockheed Martin
The GOES-T satellite is pictured here in a clean room on Earth long before it heads into space on March 1. Image: Lockheed Martin

With the satellite fully powered, the satellite was sent to its initial checkout position of 89.5 degrees west longitude, between the operational GOES-East and GOES-West satellites. Once there, the magnetometer boom was deployed, kicking off an in-orbit checkout and validation of its instruments and systems.

This week, the first images from the satellite’s Advanced Baseline Imager (ABI) were sent back to Earth. The ABI provides high resolution imagery and atmospheric measurements for short term forecasts and severe weather warnings. ABI data is also used to detect and monitor environmental hazards such as forest fires, dust storms, volcanic eruptions, turbulence and fog.

Data from multiple ABI channels can be combined to create images that approximate what the human eye would see from space, an outcome known as GeoColor. Combining data from different channels in different ways also allows meteorologists to highlight features of interest.

GeoColor image of the GOES-18 full disk from May 5, 2022. This type of imagery combines data from multiple ABI channels to approximate what the human eye would see from space.  Image: NOAA
GeoColor image of the GOES-18 full disk from May 5, 2022. This type of imagery combines data from multiple ABI channels to approximate what the human eye would see from space. Image: NOAA

After a successful test routine, GOES-18 will take over as the operational GOES-West satellite in early 2023, replacing GOES-17. NOAA plans to continue to maintain GOES-17 as a backup should anything happen to this new GOES-West or the older GOES-East weather satellite, both of which provide continuous weather satellite coverage over of the United States and adjacent ocean waters.

]]>
A Key to Cyber ​​Risk Insurance Coverage https://disasterrecoveryplaybook.org/a-key-to-cyber-risk-insurance-coverage/ Thu, 12 May 2022 03:08:37 +0000 https://disasterrecoveryplaybook.org/a-key-to-cyber-risk-insurance-coverage/ Cyberattacks are becoming increasingly sophisticated and devastating, especially for small and medium-sized enterprises (SMEs). With ransom demands on the rise and the cost of data breaches skyrocketing, companies are investing heavily in building their cyber defenses. However, cybersecurity is not bulletproof. Purchasing a cyber risk insurance program can help outsource residual risk and deploy multi-factor […]]]>

Cyberattacks are becoming increasingly sophisticated and devastating, especially for small and medium-sized enterprises (SMEs). With ransom demands on the rise and the cost of data breaches skyrocketing, companies are investing heavily in building their cyber defenses. However, cybersecurity is not bulletproof. Purchasing a cyber risk insurance program can help outsource residual risk and deploy multi-factor authentication is a prerequisite not only for obtaining coverage, but also for reducing premiums.

Cyberattacks are becoming an existential problem

Throughout 2021, public and private organizations have felt the significant impacts of the ever-changing cyber threat landscape. Ransomware dominated the threat landscape in 2021. The targeted nature of attacks coupled with the growing sophistication of cybercriminals has resulted in massive losses for organizations around the world. The threat will increase with ransomware as a service expanding its scope and reach.

In the first six months of 2021, the US Treasury Department’s Financial Crimes Enforcement Network reported that value of suspicious ransomware activity was $590 million compared to $421 million for the whole of 2020. Meanwhile, the UK’s National Cyber ​​Security Center (NCSC) reported that in the first four months of 2021 alone, it handled the same number of ransomware incidents as in all of 2020 – which was triple the number the NCSC faced in 2019.

According to the IBM 2021 Cost of Data Breaches Report, the average cost of a ransomware breach has risen to $4.62 million, while the total cost of a data breach has increased by 10% between 2020 and 2021. The costs are linked to four groups of activities. associated with data breaches: detection and escalation, notification, loss of business and post-breach response. Lost cases account for the largest share of breach costs (38%).

As cybercriminals mature and perfect their tactics, small and medium businesses become the most vulnerable because they lack the capacity (staff, technology, budget) to put strong cyber defenses in place. SMBs can quickly become the low-hanging fruit of criminals who want to target larger companies through complex supply chains. If you add the expanding regulatory landscape with extensive security and privacy requirements, you can see why cyber insurance coverage is an existential issue for small and medium businesses.

Why buy cyber insurance?

As businesses become increasingly digitized, they are exposed to greater cyber risks. Cyber ​​insurance could mitigate the resulting business impact if the technology becomes unavailable due to a cyber incident. While investing in building cybersecurity controls is essential, those controls are not impenetrable. Cyber ​​attacks are a matter of when, not if, so cyber insurance becomes crucial to ensure business continuity.

Compliance is another key reason to get cyber insurance. Highly regulated industries such as healthcare and finance are no longer the only industries at risk of penalties for cybersecurity and privacy breaches. All companies are subject to state-specific data breach laws for the collection, processing, and storage of personal data. Cyber ​​insurance can help cover the costs of complying with state, federal, and international laws, as well as cover regulatory fines and penalties.

All in all, having cyber insurance coverage is a show of due diligence. With cybersecurity being a top priority for many executives, cyber risk insurance is a priority for a diligent board.

What are the critical security requirements for securing cyber insurance?

When you contact a cyber insurer to discuss the possibility of obtaining insurance coverage, they will first assess your current cybersecurity posture. If your posture is considered too risky, you will probably be refused insurance. Insurers want to help you mitigate residual risk, but they also want to secure their investment.

During their assessments, they look for four critical security requirements, the absence of which precludes further discussion, says Nikos Georgopoulos, Cyber ​​& Information Privacy Risks Insurance Advisor at Cromar. These four essential prerequisites are:

  1. Back up critical data regularly to an “offline” location that would not be affected by a security incident in your business environment. Test to ensure that these backups are recoverable.
  2. Use multi-factor authentication (MFA) for all your services and applications – cloud-based and on-premises – and for all your employees, not just privileged accounts.
  3. Do not allow remote access has a corporate network without virtual private network (VPN).
  4. Provide regular and at least once a year cybersecurity awareness trainingincluding anti-phishing, to anyone who has access to your organization’s network or confidential/personal data.

The Importance of Multi-Factor Authentication

“MFA is one of the most important cybersecurity practices for reducing the risk of intrusions. According to industry research, users who enable MFA are up to 99% less likely to have a compromised account,” reads a joint CISA-FBI advisory.

In fact, multi-factor authentication is recommended or required by several regulations, including:

  • President Biden Executive Decree on improving the nation’s cybersecurity
  • Office of Management and Budget (OMB) Memorandum on the U.S. government’s move toward Zero Trust cybersecurity principles
  • ENISA guidelines on building your organization’s cyber resilience

It is therefore not surprising that MFA is a prerequisite for obtaining cyber insurance. Even if a company has met all other requirements, it will have difficulty obtaining insurance if it has not deployed MFA. “No AMF, no cyber-insurance”, notes Nikos Georgopoulos.

Cyber ​​insurance is the tool that can help small and medium-sized businesses become cyber-resilient. However, before even entering into discussions with an insurer, it is important that companies do their part and invest in basic cyber hygiene controls, including multi-factor authentication.

]]>
Data Creates Both Revenue Opportunities and Technical Challenges for Industrial Manufacturers | Your money https://disasterrecoveryplaybook.org/data-creates-both-revenue-opportunities-and-technical-challenges-for-industrial-manufacturers-your-money/ Tue, 10 May 2022 12:00:59 +0000 https://disasterrecoveryplaybook.org/data-creates-both-revenue-opportunities-and-technical-challenges-for-industrial-manufacturers-your-money/ HELSINKI, May 10, 2022 (GLOBE NEWSWIRE) — The exponential growth of data generated in today’s modern smart manufacturing operations presents great opportunities for these companies, but also enormous challenges in how to capture, store and save this data. This market analysis is featured in a new white paper from Tuxera, the leading provider of quality […]]]>

HELSINKI, May 10, 2022 (GLOBE NEWSWIRE) — The exponential growth of data generated in today’s modern smart manufacturing operations presents great opportunities for these companies, but also enormous challenges in how to capture, store and save this data. This market analysis is featured in a new white paper from Tuxera, the leading provider of quality assured products data storage management software and networking technologies.

In the newspaper, ” Data Trends in the Smart Manufacturing Industry and IIoT Markets: Implications for the Storage Stack“, Tuxera examines the problems of modern real-time data workloads, the reliability of storage systems – including the reasons why they fail and the costs of failure – and the selection of operating systems and optimal hardware platforms in the modern industrial and automation markets.

The deployment of Industrial Internet of Things (IIoT) devices, coupled with the use of traditional devices such as sensors, motion controllers and programmable logic controllers, means that manufacturing companies are inundated with data .

“This data has great financial value, both for improving operational efficiency and for developing new business areas,” said the author of the article, Eva Rio, chief product officer at Tuxera. “However, data is worthless if it is unreliable – partial or corrupt data can be worse than no data at all – and can be safely stored and accessed when needed.”

Companies can use smart manufacturing data for cost-effective internal improvements, such as operational intelligence and predictive maintenance, or to create new external revenue streams. However, data comes from a wide range of sources and needs to be stored and processed.

“This leads to several significant challenges within the storage stack,” writes Rio, including:

Continuous and write-heavy workloadsFlash lifetime and wear-out issuesResource-constrained environmentsReal-time operationsFast recovery from shutdownInteroperabilityFault tolerance

This means that reliability is crucial for embedded devices in the smart manufacturing industry. Field failures and recalls cause downtime, with an estimated cost across industries of $260,000 per hour, the Tuxera newspaper reports. These failures can also lead to the loss of critical data and damage the reputation of the company – immeasurable costs.

For these reasons, smart manufacturing companies need to think carefully about their choices of storage media and flash and file system management software. Hardware and software must work together to provide optimal environments for data, emphasizing system integrity to maximize device life, minimizing memory wear and tear issues, and writing amplification and reducing the need for leveling wear.

“Storage systems must be able to balance the need for fault tolerance and recovery with performance, write-heavy workloads, and interoperability needs,” Rio wrote.

To learn more, download the Tuxera whitepaper, ” Data Trends in the Smart Manufacturing Industry and IIoT Markets: Implications for the Storage Stack.”

Learn more about:

Data workloads in smart manufacturing, including industry use cases for operational intelligence, predictive maintenance, and new services. Implications and challenges for data storage. Key aspects of reliability in industrial environments. .

About Tuxera

tuxedo is the leading provider of quality-assured data storage management software and networking technologies to help individuals and businesses reliably store and move data while making file transfers fast and content easily accessible.

Tuxera’s software is at the heart of billions of phones, tablets, cars, TVs, cameras, drones, external storage, routers, spacecraft, IoT devices and public cloud storage platforms.

Tuxera’s customers include automakers, device manufacturers, industrial equipment manufacturers, data-driven companies and more. They rely on Tuxera’s software to protect data integrity, improve storage performance, transfer data quickly and securely, and extend the life of flash memory in their products and for their projects.

Tuxera is also a member of JEDEC, AGL, SD Association, The Linux Foundation and other industry associations. Founded in 2008, Tuxera’s headquarters are located in Finland, with regional offices in China, Germany, Hungary, South Korea, Japan, Taiwan and the United States.

Media Contact

Maria Penaloza maria.penaloza@newswire.com

Related images

Picture 1

This content was published via the newswire.com press release distribution service.

Attachment

Featured image for Tuxera

]]>
Colonial Pipeline Anniversary: ​​How have organizations improved their IT infrastructure? https://disasterrecoveryplaybook.org/colonial-pipeline-anniversary-how-have-organizations-improved-their-it-infrastructure/ Sun, 08 May 2022 19:23:48 +0000 https://disasterrecoveryplaybook.org/colonial-pipeline-anniversary-how-have-organizations-improved-their-it-infrastructure/ A cyberattack in mid-May crippled Colonial Pipeline, one of the largest US oil pipeline operators – Copyright AFP/File Logan Cyrus On May 8, 2021, U.S. Colonial Pipeline ceased operations due to a ransomware cyberattack, resulting in a rarely issued emergency declaration by the US federal government. A year later, what have companies learned from the […]]]>

A cyberattack in mid-May crippled Colonial Pipeline, one of the largest US oil pipeline operators – Copyright AFP/File Logan Cyrus

On May 8, 2021, U.S. Colonial Pipeline ceased operations due to a ransomware cyberattack, resulting in a rarely issued emergency declaration by the US federal government. A year later, what have companies learned from the incident?

Following the attack, cyber experts have urged businesses and organizations strengthen their cybersecurity policies, procedures, staffing and resources. What progress has been made?

To learn more about the legacy of the year-long cyberattack, Digital diary contacted Benny Czarny, founder and CEO of OPSWATthe leader in critical infrastructure protection, as an expert resource.

Czarny has over 25 years of experience in cybersecurity and privacy, which has given him unique insight into attacking the Colonial Pipeline, particularly with increasingly frequent cyberattacks on critical infrastructure. .

According to Czarny, the key lessons are: “One of the key lessons organizations have learned is the need for a managed Security Operations Center (SOC): that is, operationalizing the response to ransomware and professional response teams and services”.

These lessons are:

Operational Technology

An example in the critical infrastructure space is the managed operational technology (OT) SOC. This means better performance monitoring of all systems, applying standard change management processes, checking and deploying updates, and reacting immediately to any potential threats.

OT-specific malware

Organizations have also learned the need to protect their critical environments, especially with recent news of OT-specific malware (Pipedream/Industroyer2) and the Shields Ups warning. Protection includes adapting a defense-in-depth approach, with end-to-end security measures from the cloud to the protection of critical operational assets. The revised TSA Pipeline Security Directive establishes a clear separation between IT and OT, with enhanced security measures, contingency plans, and recovery plans for the OT environment. Essentially, an IT environment incident is virtually unavoidable, but unlike Colonial Pipeline incidents, OT operations should not be affected or shut down.

Livelihood risks

Organizations have also learned the need to assess both livelihood and financial risks. From a livelihoods perspective, critical organizations now understand both cyber and physical risks, including prioritization of risk areas, asset management and attack containment through more aggressive segmentation critical data.

Financial risks

From a financial risk perspective, the Colonial Pipeline and other critical infrastructure attacks have taught organizations NOT to pay. There is no guarantee that they will regain access or that the data has not already been leaked or stolen. The payment also bolsters future, more sophisticated attacks, and it could be a violation of US sanctions.

Internal move

Some believe ransomware as a service has diminished and mature attack groups are bringing their expertise in-house. This means that higher quality and more targeted ransomware will potentially be harder to detect and fix. Maybe there will be fewer attacks, but they might be more damaging and harder to recover from.

In summary, Czarny finds: “Finally, some security researchers believe that the ransomware group REvil (or another closely related to REvil) is working on a new ransomware operation, asking the question: is there a risk of ‘copying’ attacks with the one-year deadline? upcoming anniversary? The main concern is the growing aggressiveness of hacking groups because of increased law enforcement, especially with the high ‘ROI’ for attacks on critical infrastructure.”

]]>