Tag Archive for: complex

Synacor Fast Tracks Complex Streaming Integrations With Cloud ID™ Media Connect


Synacor, Inc.

Synacor, Inc.

Consumer identity access management pre-integrations with 500+ networks, services, MVPDs and platforms slashes rollout times for new content deals and launches

Synacor Fast Tracks Complex Streaming Integrations With Cloud ID™ Media Connect

Consumer identity access management pre-integrations with 500+ networks, services, MVPDs and platforms slashes rollout times for new content deals and launchesConsumer identity access management pre-integrations with 500+ networks, services, MVPDs and platforms slashes rollout times for new content deals and launches

Consumer identity access management pre-integrations with 500+ networks, services, MVPDs and platforms slashes rollout times for new content deals and launches

BUFFALO, N.Y., Dec. 20, 2023 (GLOBE NEWSWIRE) — Synacor today announced the Cloud ID™ Media Connect managed consumer identity access management (“CIAM”) service to fast track streaming ecosystem deployments amid a heavily fragmented viewing market. Cloud ID Media Connect can save streaming media companies months or even years of authentication integration work required to connect streaming services to various platforms. The new offering, which is pre-integrated with more than 500 networks, services, MVPDs and platforms, comes as changing business models, more complex deals and a continued wave of new content providers upend streaming market dynamics.

As the streaming market matures, more content is being distributed to more platforms. Deals are often made on the fly with urgent rollout requirements. More content providers are entering the market with no prior experience navigating an increasingly splintered ecosystem. At the same time, security requirements are more pressing than ever, demanding SAML or OAuth integrations that can each take weeks or months to complete and require ongoing support and maintenance. This is further complicated by many providers not offering standard authentication endpoints, requiring custom API integrations. It is not uncommon for content providers to support a dozen or more platform integrations at a time, and some MVPDs or streaming TV providers must accommodate literally thousands of combinations of content provider apps and streaming platforms.

Based on more than a decade of experience managing comprehensive authentication integrations for premium entertainment services, Cloud ID Media Connect delivers a reliable, managed CIAM solution that is now pre-integrated with more than 500 content distributors, platforms and MVPDs, including…

Source…

Data resilience in the age of ransomware: Elastio tackles complex cyber threats


Cyber threats have become extremely prevalent today and are growing increasingly complex. Ransomware is now a household word and is no longer something that organizations can ignore.

Enter startup Elastio Software Inc., which was founded by the team behind AppAssure, a backup and recovery software application that was acquired by Dell Software Group in 2012. What AppAssure did very well was figure out how to recover from corrupted data, according to Najaf Husain (pictured), founder and chief executive officer of Elastio.

“In those days, it was Exchange, Microsoft SQL. You remember those days, when Exchange went down, I mean, the company was done. You couldn’t communicate,” he said. “That was a big problem. So, we did so well there, as we were able to understand the data and if it was clean or not. And we could do that early and often so the customer can understand if they were vulnerable or not.”

Husain spoke with theCUBE industry analyst Lisa Martin, during a CUBE Conversation ahead of the “Cybersecurity” AWS Startup Showcase event on September 14, an exclusive broadcast on theCUBE, SiliconANGLE Media’s livestreaming studio. They discussed the Elastio platform and the importance of a data resilience strategy. (* Disclosure below.)

Running after the issue

Circa 2020, when Elastio was founded, the company shifted its focus to cyber, given the fact that cyber threats are so prevalent now. The company spent a lot of time focused on the cloud, and everything it does is cloud-native, according to Husain.

“We really drilled inside of these cyber threats to understand how they can corrupt the data. We spent three years kind of reverse engineering all the known ransomware out there, 1,800-plus of them, created some very interesting machine learning engines, some data integrity scanning engines to go solve that problem,” Husain said. “We founded in 2020 to go run after that issue.”

Today, there are two components to the Elastio platform: protecting data and making it immutable, plus making sure it is scanned, clean and recoverable. In June, the company announced an oversubscribed $18 million Series A investment led by Venture Guides, with participation…

Source…

Breaking Down the Code: Computer Scientists Untangle Internet’s Complex Protocols to Unveil Underlying Simplicity


Undergraduate students taking computer-networking courses often find themselves confronted with an avalanche of acronymic protocols that dictate how the internet works. But underlying the layers of complexity, there exists surprising simplicity in the design of the internet, as illustrated in the February cover feature for Communications of the ACM (Association for Computing Machinery) — a monthly magazine published by the world’s largest educational and scientific computing society.

Looking to cut through that seemingly tangled mess, UCLA computer science professor George Varghese, joined by his colleagues James McCauley of Mount Holyoke College in Massachusetts and Scott Shenker of UC Berkeley, set out to explain in this article that the internet’s fundamental design has remained unchanged since its adoption in 1983.

Titled “Extracting the Essential Simplicity of the Internet,” the predominantly non-technical article boils down the internet’s architecture to three key mechanisms: routing, reliability and resolution. They formed the foundation of the ubiquitous global system of interconnected computer networks despite evolving technologies built around the internet.

“Most people understand the power of the internet but few appreciate the brilliance of its design that has allowed the system to accommodate decades of growth, with billions of users and connected devices that process mountains of data in a blink of an eye,” said Varghese, who holds UCLA’s Jonathan B. Postel Endowed Chair in Networking. He has made landmark contributions to network algorithmics, which helped make the internet run faster. His current research emphasis is on network design automation, to help manage and debug computer networks.

The article originated from a guest lecture by Shenker on the internet’s basic routing simplicity in a UCLA undergraduate networking class taught by Varghese. The internet’s long-lasting success, the authors noted, can be attributed to its modest all-purpose design; its modularity that allows it to incorporate innovations at the applications end that are completely distinct from the connecting network layers; and its built-in layers of fail-safe…

Source…

Higher Wages of War: A Look at the Private Military-Industrial Complex


For more crisp and insightful business and economic news, subscribe to
The Daily Upside newsletter.
It’s completely free and we guarantee you’ll learn something new every day.

In 400 BC, Artaxerxes II was set to take over the Persian throne, but his younger brother, Cyrus, said “Over my dead body.”

Oh, how right he was.

With the promise of riches, Cyrus created the Ten Thousand, a large band of Greek soldiers-for-hire he would use to try to usurp his brother. While the Ten Thousand were victorious at the Battle of Cunaxa near modern-day Baghdad, Cyrus died that day, leaving the group without a leader, thousands of miles from home, and out of a job.

These days, such royal familial squabbles would more likely play out on the Twittersphere than on the battlefield. But one aspect of warfare from Cyrus’ era that endures is the mercenary – or private military contractor, as we call them today.

Outfits like Constellis, Aegis, and the Wagner Group have breathed new life into one of the oldest professions in the world, putting the value of the global private military market at more than $250 billion.

History Repeats Itself
PMCs and mercenaries have been standard military practice pretty much since the Ten Thousand:

  • When Alexander the Great invaded Asia with his Macedonian army in 334 BC, he also hired mercenaries from what is now modern day Albania, Bulgaria, and Turkey.
  • Though it’s an economic powerhouse these days (bank failures aside), Switzerland used to be one of the poorest countries in the world, forcing natives to look abroad for work. The Swiss Guard – those blue and orange-clad pope protectors – began as a group of mercenaries fighting in the Italian Wars during the 15th and 16th centuries.
  • The British crown hired roughly 30,000 German Hessians to fight in the American Revolution. King George III paid the German state of Hesse-Kassel the equivalent of about 13 years of tax revenue for their services.

Unsurprisingly, hired swords and guns weren’t big on moral values. They’d fight your war as long as you were paying, but when that was all over, they’d go rob merchants on trade routes, ransack a village, or hold a city hostage because their allegiances lay with the highest…

Source…