Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud

    Microsoft, Google Make Cloud Offerings More Enticing

    By
    eWEEK Staff
    -
    February 9, 2018
    Share
    Facebook
    Twitter
    Linkedin

      Today’s topics include Microsoft offering free OneDrive to Box, Dropbox and Google Drive customers; a water utility in Europe hit by a cryptocurrency mining attack; Dell EMC launching three Epyc-based servers; and Uber detailing its bug bounty breach payout in court.

      Microsoft announced Feb. 6 that it is giving free OneDrive access to existing business customers of Box, Dropbox or Google Drive for the duration of their contract. The deal requires a minimum commitment of 500 users, and businesses can’t already be customers of OneDrive or Office 365.

      Microsoft is also offering migration and onboarding support through its FastTrack service as part of the deal. One of the selling points that Microsoft stresses in its offer is that Office 365 is the only service that allows real co-authoring collaboration in Office documents on all platforms.

      Google, however, has responded to Microsoft’s deal by announcing a day later the ability to mark up Microsoft Office documents in Google Drive. The Google commenting tool allows task assignment and interactive comments and supports replies. While it’s not as complete as the interactive editing you can do within Office 365, it will meet the needs of many organizations, Google believes.

      Security firm Radiflow discovered cryptocurrency mining malware in the network of an undisclosed water utility provider in Europe. This marks the first public discovery of an unauthorized cryptocurrency miner impacting industrial control systems or SCADA servers. In a cryptojacking attack, cryptocurrency mining code is deployed without authorization on a system or a network.

      While Radiflow is still in the early stages of the investigation, it has determined that the cryptocurrency mining software was on the water utility’s network for approximately three weeks before it was detected.

      The malware was likely downloaded from a malicious advertising site. The primary theory is that an operator at the water utility opened a web browser and clicked on an advertising link that installed the mining code on the system.

      Dell EMC is turning to Advanced Micro Devices and its Epyc processors to power three new servers, giving enterprises another processor option beyond Intel. The new servers, available now, can handle the new workloads emerging in a fast-changing data center environment featuring trends like the cloud, the internet of things and data analytics.

      The PowerEdge R6415 is an ultra-dense system that can scale out and offer flexible storage capabilities through up to 10 PCI NVMe drives. The PowerEdge R7415 is certified as a vSAN Ready Node, offering up to 20 percent better total cost of ownership per four-node cluster for vSAN deployments at the edge than competitive systems.

      The PowerEdge R7425 supports containers, hypervisors, virtual machines and cloud computing and runs such high-performance computing workloads as computational fluid dynamics.

      Uber Chief Information Security Officer John Flynn appeared before a U.S. Senate committee on Feb. 6 to explain how a bug bounty was used to help cover up Uber’s 2016 data breach that exposed personally identifiable information on its drivers and users. Uber paid the attackers $100,000 to keep the data safe, but did not reveal that it paid the attackers via the HackerOne bug bounty program in an effort to cover up the breach.

      Flynn said that through the program, Uber has been able to fix 800 system vulnerabilities and has paid out approximately $1.3 million in awards to security researchers.

      “We recognize that the bug bounty program is not an appropriate vehicle for dealing with intruders who seek to extort funds from the company,” Flynn said. He added that it was wrong not to disclose the 2016 breach earlier as it should have been disclosed in a timely manner.

      MOST POPULAR ARTICLES

      Big Data and Analytics

      Alteryx’s Suresh Vittal on the Democratization of...

      James Maguire - May 31, 2022 0
      I spoke with Suresh Vittal, Chief Product Officer at Alteryx, about the industry mega-shift toward making data analytics tools accessible to a company’s complete...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×