All posts by Rae Lim

Nutanix & ST Engineering Form Partnership to Transform Singapore’s Cloud Computing Landscape

Nutanix ST Engineering MoU Photo 2a

In efforts to advance hybrid cloud capabilities and empower Singapore’s workforce with essential tech skills, Nutanix and ST Engineering have joined forces through a two-year Memorandum of Understanding (MoU).

Hybrid cloud technology is a way of using both public and private cloud services together. It allows organisations to store some data in a public cloud while keeping other sensitive data in a private cloud.

Nutanix, a multi-cloud computing company, and ST Engineering, a technology and engineering group, have outlined their commitment to several key areas. Among these areas are:

Develop cutting-edge hybrid cloud technologies

Firstly, the partnership aims to develop cutting-edge hybrid cloud technologies tailored to the specific operational needs of organisations.

This collaborative effort combines public and private clouds to store data and manage multiple cloud services. It does this while prioritising strong security measures for data protection.

Additionally, the partnership aims to create a user-friendly cloud management portal. This portal will simplify multi-cloud management for businesses and enhance their control over cloud resources.

Cultivate a future-ready workforce through a curated training curriculum 

Secondly, ST Engineering and Nutanix plan to cultivate a future-ready workforce through a curated training curriculum focused on hybrid cloud technology. This educational initiative will target higher learning institutions, equipping students with the skills necessary to excel in cloud-centric environments.

The training curriculum will include various cloud-related domains, aligning with government-wide efforts to build deep tech skills, particularly in cloud computing.

In conclusion, this collaboration between Nutanix and ST Engineering represents an important step towards enhancing Singapore’s hybrid cloud capabilities. It should also ensure that the workforce is well-prepared to navigate the evolving technology landscape.

Atomicwork Launches with $11M Funding to Enhance Employee Support with AI

Atomicwork, a startup focused on improving the employee experience at work, has emerged from stealth mode with an $11 million seed funding round. Blume Ventures and Matrix Partners spearheaded the funding round, backed by Storm Ventures, Neon Fund, and notable angel investors.

Atomicwork Logo 1200px

For those who are not familiar with the startup scene, ‘stealth mode’ means that a startup company is launched with a certain level of confidentiality. Certain information about the business or products are usually kept confidential from competitors. 

Leverages AI to enhance employee experience

In a world where remote and office work coexist, Atomicwork deploys artificial intelligence (AI) to streamline employee interactions with various daily tools. The platform seamlessly integrates with platforms like Slack and Microsoft Teams. It also utilise conversational intelligence to automate support, service delivery, and operations on a large scale.

Atomicwork’s AI assistant, Atom, uses company processes and shared knowledge to help employees without human intervention. It aims to make things smoother for both employees and companies.

During their stealth phase, the Atomicwork team conducted a survey of leaders from mid-market businesses and large corporations. They found that 80% of the bosses were dissatisfied with their company’s worker experience. This has negatively impacting employee morale and productivity.

According to Atomicwork, this aligns with the 2022 industry studies from Willis Towers Watson (also known as WTW). The WTW study reveals that 92% of employers across sectors expressed intentions to invest in their employee experience over the next 3 years.

Aims to improve efficiency and productivity

Vijay Rayapati, CEO and Co-Founder of Atomicwork, highlighted that the company wants to help businesses provide a better employee experience with efficiency. Businesses can shift from just supporting employees to making them successful, aligning their productivity with business goals.

Atomicwork Founders

Founded in September 2022 by Vijay Rayapati, Kiran Darisi, and Parsuram Vijayasankar, Atomicwork boasts a team with a strong track record in the tech industry. Vijay, a SaaS veteran, previously led Minjar before its acquisition by Nutanix. On the other hand, Kiran and Parsuram played pivotal roles in taking Freshworks from startup to a publicly traded company in just over a decade.

Sophos Report Reveals Dwell Time Shrinks to Just 8 Days in 2023

Active Adversary Report for Tech Leaders 2023

Cybersecurity company Sophos has recently released its Active Adversary Report for Tech Leaders 2023. The report highlights a few important findings about cyberattacks in the first half of 2023 as follows:

1) Decrease on Dwell Time

Dwell time is basically the attack detection speed of a computer security network. It is calculated based on the time from the start of a cyberattack to when it’s detected. Sophos found that the time it takes to detect a cyberattack has decreased. In 2022, it took an average of 15 days to detect an attack, but in 2023, this time has been reduced to just 8 days. For ransomware attacks, it’s even shorter, at 5 days.

2) Attacks on Active Directory

Active Directory (AD) is a crucial part of a company’s computer network. According to Sophos, attackers now take less than a day (approximately 16 hours) to breach and gain control of AD. This is a concerning trend because having control of AD gives attackers significant power over the company’s systems and data.

3) Ransomware Attacks

Ransomware attacks were the most common type investigated in the report, making up 69% of cases. Most ransomware attacks occurred outside of regular working hours, with 81% of them launching their final damaging actions outside of business hours.

4) Detection Timing

Interestingly, the report shows that the number of attacks detected increases as the week progresses, with a notable spike in ransomware attacks on Fridays and Saturdays.

Sophos X Ops Active Adversary Clock

5) Security Tools

The report mentions that while there have been improvements in security tools and technologies, attackers are still finding ways to infiltrate networks. The key to better security is not just having the right tools but also actively monitoring for threats.

In conclusion, this report serves as a reminder that cyberattacks are evolving, and businesses need to stay vigilant and invest in both advanced security tools and continuous monitoring to protect their data and systems.

You can find more detailed information in the full article on the Sophos’ website.

Alibaba Cloud Unveils Open-Source AI Models for Understanding Images and Text

Alibaba Cloud has recently introduced two open-source large vision language models: the Qwen-VL and the Qwen-VL-Chat. These models are designed to understand both images and text, making them versatile tools for various tasks in both English and Chinese.

Qwen-VL understands images and texts

The Qwen-VL is an extension of Alibaba Cloud’s own AI Chatbot, Tongyi Qianwen and is capable of comprehending image inputs and text prompts. It works like a smart assistant that can look at pictures and answer open-ended questions about them.

Alibaba Cloud stated Qwen-VL is capable of handling higher-resolution image inputs compared to other open-source models. It can also engage in various visual language tasks, including captioning, question answering, and object detection in pictures.

Qwen-VL-Chat can perform creative tasks

On the other hand, Qwen-VL-Chat takes things a step further by enabling complex interactions. It can perform creative tasks like writing poetry and stories based on input images, summarising the content of multiple pictures, and solving math problems displayed in images.

According to benchmark tests conducted by Alibaba Cloud, Qwen-VL-Chat excels in text-image dialogue and able to answer questions in both Chinese and English

media

Both open-source models are accessible globally

This is exciting news to the world because Alibaba Cloud is sharing these models with researchers and academic institutions worldwide. Alibaba Cloud made the code, weights, and documentation available for free.

This means more people can use these models for various tasks. Companies with over 100 million monthly active users can also request a licence for commercial use.

These models have the potential to change how we interact with images online. For example, they could assist visually impaired individuals with online shopping by describing products in images.

For more detailed information, you can read the full story on Alizila and find additional details about Qwen-VL and Qwen-VL-Chat on ModelScope, HuggingFace, and GitHub pages. The research paper detailing the model is also available here.

Nutanix Announces Generative AI Solution ‘GPT-in-a-Box’

In a bid to simplify the integration of generative AI, Nutanix, a multi-cloud computing company, has unveiled its latest offering, the Nutanix GPT-in-a-Box solution. The company said that the solution is designed to make it easy for businesses to get started with generative AI, even if they do not have a lot of technical expertise.

What is Nutanix GPT-in-a-Box?

The Nutanix GPT-in-a-Box is a generative AI platform. It provides services that assist organisations in configuring hardware and software infrastructure suitable for deploying large language models (LLMs). These models, like generative pre-trained transformers (GPT), are vital for various AI applications.

image001

If you are not very familiar with Generative AI, it is a type of artificial intelligence that can create new content, such as text, images, or music. Generative AI is used in different industries such as customer service, healthcare, marketing and more.

How does it work?

Many organisations and businesses are eager to harness the power of AI but face challenges around data privacy, governance, and the cost of AI infrastructure. Nutanix aims to simplify this process with their GPT-in-a-Box™ solution. It offers a pre-configured environment where businesses can develop and fine-tune AI models while keeping their data secure. Data scientists and administrators can easily work with these models, and the platform can be used for other GPT models.

For businesses looking to adopt generative AI, the Nutanix GPT-in-a-Box solution can be a good option to consider. To learn more about the Nutanix GPT-in-a-Box solution, please visit the Nutanix website.

KONAMI Unveils eFootball™ 2024 Gaming Update

Celebrity Supermatch eFootball

KONAMI recently kicked off the excitement for their latest football gaming update, eFootball™ 2024 at an exclusive media event in Kuala Lumpur. For those unfamiliar with this game, it is a football simulation video game that allows players to control virtual football teams and compete in various game modes. Another game that is highly popular in this category is FIFA.

KONAMI stated that the eFootball™ will begin its transition to eFootball™ 2024 (v3.0.0) update. This update, scheduled for 4 September 2023 till 7 September 2023, aims to refresh emblems, strips, and player data for Authentic Teams in accordance with licensing agreements.

Alongside these updates, they will be conducting an in-game asset and data carryover process.

Certain In-game Assets Eligible For Carryover

KONAMI Presenters eFootball

The assets eligible for carryover encompass eFootball™ Coins, eFootball™ Points, GP, Base Team, Nominating Contracts, Chance Deals, Contract Renewals (60 Days), Contract Renewals (10 Days), Players, Managers, Training Programs, Skill Training Programs, Objectives, and various in-game settings. eFootball™ Coins and eFootball™ Points will carry over, but be mindful of expiration, especially if your account is linked to Japan.

GP and Base Team may see changes, and players can select new Base Teams if needed. Nominating Contracts, Chance Deals, and Contracts will be carried over, but remember potential expiration. Training and Skill Training Programs, Special Strips, and Standard Player Tickets will also carry over.

Regarding your Avatar and settings, they will carry over if available in v3.0.0; otherwise, they will be reset to default. Your username, country/region, date of birth, and login bonuses will carry over. Records in your Balance Sheet will be partially reset, with only the past year’s records available. Match History will be reset entirely.

Team Playstyle Level Will Be Removed

However, there will be changes in the gameplay mechanics. Team Playstyle Level will no longer be a factor, and Abilities will not be influenced by it. Players who invested Progression Points in Team Playstyle Proficiency will see these points returned. The status of Players and Managers depends on Live Updates, with Standard Players experiencing updates to affiliations and data changes.

So, gamers, if you would like to learn more about KONAMI’s large-scale maintenance to facilitate these updates, check out more details on eFootball™ official website.

Gentle Monster Eyewear’s Overwatch 2 Collaboration Is Here

In the world of gaming, whenever there is a new and exciting crossover happening, it is sure to catch everyone’s attention. Even if you are not a hardcore gamer, you will want to know about the Gentle Monster x Overwatch 2 collaboration.

So, what’s the scoop?

In celebration of the release of OVERWATCH 2: INVASION, Gentle Monster has partnered with Overwatch 2 to release the ‘GENTLE TOKKI Package’! This package combines stylish tinted sunglasses called ‘TOKKI’ with exclusive in-game skins, all inspired by the popular Overwatch 2 hero, D.Va.

Gentle Monster x Overwatch 2

The ‘TOKKI’ eyewear is inspired by D.Va’s iconic headgear in the game and is available in two different colours. The packaging is a nod to D.Va’s mech, TOKKI. It even includes a soft case designed to resemble the mechanical structure of TOKKI. To top it off, you will also get an attachable D.Va figure!

Each package also comes with a redemption code. This code lets you unlock exclusive GENTLE TOKKI D.Va skins and other in-game items. If you are itching to get your hands on this package, you can now do that!

Tokki

Starting on 17 August 2023, the GENTLE TOKKI skin will be available for purchase on Overwatch 2. The GENTLE TOKKI Package itself will be gifted exclusively to lucky winners chosen through an online draw.

To enter the draw, you can take part in the Instagram “D.Va Challenge” until 31 August 2023. It’s easy – just snap a photo or video using the D.Va filter on Instagram, add the event hashtags, and you are in the running.

To find out more information, be sure to head over to Gentle Monster’s official website!

Email-based Phishing Attacks Up 464% in H1 2023

Acronis Mid-Year Cyberthreats Report

Acronis has published its Mid-Year Cyberthreats Report, revealing concerning trends in the cybersecurity landscape. The report highlights a 464% increase in email-based phishing attacks in the first half of 2023 compared to the previous year.

Cybercriminals are increasingly using generative artificial intelligence (AI) systems like ChatGPT to craft malicious content and conduct cyberattacks. Acronis states that ransomware remains a dominant threat to small and medium-sized businesses. This is mainly due to attackers leveraging AI-created malware to avoid detection by traditional antiviruses.

The cyberattack landscape is evolving

Acronis Mid Year Cyberthreats Report Top 5 Trends

In the report, Acronis also emphasizes the increasing sophistication of cyberattacks. These attacks utilize AI and existing ransomware code to penetrate victims’ systems and extract valuable data, making detection more challenging. Cybercriminals use public AI models to find source code vulnerabilities and develop attacks (including deep fakes).

Additionally, the study shows that phishing is the primary method cybercriminals use to steal login credentials. The use of large language model-based AI platforms has enabled cybercriminals to create, automate, and scale new attacks more efficiently. The report reveals a growing number of data stealers who exploit stolen credentials to gain unauthorized access to sensitive information.

Breaches demonstrate major security concerns

Artboard 8 copy 3@3x

Acronis points out some major security concerns that contribute to successful breaches, including a lack of strong security solutions to detect zero-day vulnerabilities, delayed updates of vulnerable software, and inadequate protection for Linux servers. Moreover, some organizations fail to follow proper data backup protocols, which can lead to severe consequences during attacks.

Acronis encourages companies to take a proactive stance in cyber protection. A comprehensive cybersecurity posture requires a multi-layered solution that combines various security measures. This includes anti-malware, email security, vulnerability assessments, backup capabilities and more. The report also includes steps that companies can take to increase their cyber protection:

Artboard 8 copy 9@3x

If you are interested to read the full Acronis Mid-Year Cyberthreats Report 2023, click here.

Downfall Vulnerability in Intel Chips Raises Security Concerns

A recently discovered vulnerability in Intel chips, named “Downfall,” has the potential to expose millions of users to cybersecurity threats. Cybersecurity researcher Daniel Moghimi, who is associated with the University of California and Google, discovered the major vulnerability. The vulnerability affects a large number of Intel chips produced over the last decade.

Intel Core

The vulnerability centres around the ability of malicious programmes to access data belonging to other applications. Therefore, it poses significant risks to user privacy and security. At the core of “Downfall” is the exploitation of the “register buffer” feature present in modern processors. With it, processors are able to optimise certain operations for faster execution. 

What Is a Register Buffer?

Imagine a computer processor as a super-fast brain that helps your computer think and do tasks quickly. This brain needs to remember things temporarily while it is working, just like you might jot down a few things on a sticky note while solving a puzzle. The “register buffer” is like that sticky note – it is a temporary data storage place in the processor where it keeps important information for a short time to help with tasks. Sometimes, the processor may also keep sensitive information like passwords in the register buffer. 

So here is the catch: if a hacker finds a way to look inside this register buffer, they might see your password or other sensitive information they’re not supposed to have access to. So, the “Downfall” vulnerability is like discovering a hidden crack in the wall next to the shelf where the processor keeps its sticky note. If someone figures out how to use that crack to take a peek at the content of the sticky note, they could get their hands on sensitive information such as your online bank password and more. 

The Potential Impact of Downfall

As you can see, the impact of this vulnerability is far-reaching, particularly for the cloud computing industry. Many servers are using similar setups built on Intel and AMD processors to run workloads, it stands to reason that since the vulnerability affects a swatch of processors, these cloud setups and the businesses that use them could be at risk of a major breach. If these servers are susceptible to Downfall, hackers could have a field day, stealing sensitive information from high-profile organisations worldwide.

According to Intel exploiting this flaw is not exactly a walk in the park. While Intel acknowledged the issue, they mentioned the discovery of “Downfall” happened under very specific conditions – not exactly what hackers encounter in the real world. Newer Intel chips, including Alder Lake, Raptor Lake, and Sapphire Rapids, are reportedly not susceptible to this vulnerability. You may check for the full list of affected devices here.

Preventing Vulnerability and Mitigation Strategy

Intel has released a microcode fix to patch up this vulnerability. While Intel claims that most workloads will not slow down, some specific activities such as heavy data processing might be affected. So, the trade-off here is between keeping your data safe and not compromising device performance.

The discovery of the Downfall vulnerability in Intel chips is a significant concern for cybersecurity. It showcases the delicate balance between performance optimisation and security, highlighting the need for continuous vigilance and adaptation in the rapidly evolving tech landscape.

NVIDIA & Snowflake Storms the AI Scene With Custom Generative AI

NVIDIA & Snowflake partner up to allow companies to deploy custom Generative AI applications.

NVIDIA and Snowflake have joined forces to enable businesses of all sizes to build custom generative AI applications by using proprietary data. This collaboration allows companies to maximize NVIDIA’s AI technology and Snowflake’s Data Cloud platform to make better decisions and develop their own generative AI models.

NVIDIA offers the NeMo platform that enables companies to create, customize, and deploy large language models (LLMs) for AI applications like chatbots and intelligent search. With NeMo Guardrails software, developers can ensure that their applications align with business-specific requirements.

On the other hand, Snowflake provides a secure and efficient Data Cloud platform for businesses to store, manage, and analyze large amounts of data both internally and externally. This service also caters to various verticals like advertising, media and entertainment, financial services, retail, and more.

The collaboration between NVIDIA and Snowflake will allow companies to gather their proprietary data and customize the generative AI applications for business-specific applications. It also enables companies to maintain data governance without moving the data from a different platform.

Industries such as healthcare, retail, and financial services can benefit from this collaboration. For example, healthcare insurance models can provide detailed information about covered procedures. Financial services models can offer personalized loan options based on individual situations and needs.