artificial intelligence

Predicting Disk Drive Failures with Acronis AI

While cyber protection is most frequently discussed in relation to managing and securing operating software, it can also involve managing the hardware that stores your valuable data – namely your disk drives. Because if your drive fails, any data stored on it can be lost forever.

All hard drives will fail at some point. While this is particularly true of traditional, magnetic disk hard drives (a.k.a. hard disk drives or HDD), newer solid state drives (SSD) that use flash memory also face issues once their memory cells start to fail. Several factors can lead to errors in these data storage devices.

For complete cyber protection, ensuring the stability and reliability of your drive is critical to safeguarding your data.

 

Takeaways from #SpiceWorldATX

If you weren’t able to make it to SpiceWorld this year, don’t worry. Acronis Community Evangelist Bagaudin Satuev was in the front row for all of the most exciting events. Read through his experience from the conference floor and get caught up with the three most important insights and takeaways from Austin’s annual gathering of IT professionals.  

NIO Formula E's race car relies on AI and MLThe NIO Formula E team employs artificial intelligence (AI) and machine learning (ML) developed by Acronis to recognize the signs of failing sensors and notifies their engineers before they can cause performance degradation on the track. This keeps the team at the front of the pack in motorsports fastest, and fastest-growing, competition.

 

Acronis Now Offers Backup for G Suite and Cryptomining Protection for Businesses

With two newly released updates, Acronis takes its cyber protection capabilities for businesses to an exciting new level, allowing IT pros and business managers to focus on other priorities and rest even easier knowing their data is safe. The latest updates add integrated G Suite protection to Acronis’ existing backup and recovery services for more than 20+ platforms, plus built-in protection against cryptojacking, one of the fastest-growing malware threats.

Let’s take a closer look at how Acronis strengthened its cyber protection capabilities for businesses that take advantage of Acronis’ cloud offerings, Acronis Backup Service and Acronis Backup Cloud.

In case you missed it, Microsoft issued a warning last Friday to alert users that they might experience issues with the upcoming May 2019 Update for Windows 10 (version 1903) – and the issues are difficult to avoid. The good news is that Microsoft’s proactive communications means you can take precautions to protect your data before you initiate the update.

Use these seven tips to manage any changes ahead, whether it’s a standard Win 10 update, if your one of the 35% of companies upgrading from Win 7, or you’re coping with any future system update.
 

Protect infrastructure by blocking obvious vulnerabilities

In 1966, Robert F. Kennedy delivered a speech that cited an ancient Chinese curse: “May [you] live in interesting times.” He continued, “Like it or not, we live in interesting times. They are times of danger and uncertainty, but they are also the most creative of any time in the history of mankind.”

That measured perspective, simultaneously seeing the glass as half-empty and half-full, is a useful one to adopt when considering infrastructure vulnerabilities in 2019.

CRN Partner Program Guide 5-Star Award Winner

The Acronis Partner Program is a 2019 CRN Partner Program Guide 5-Star winner – a tremendous endorsement of the key ways we work to put our partners first.

Celebrating Advanced Tech and the Differentiation Paradox at CloudFest 2019

There’s no doubt businesses increasingly view the cloud as an agile, efficient way to manage their IT needs: 58 percent are moving toward a hybrid IT environment and another 18 percent are looking to move completely to the cloud (per 451 Research). This means that managed service providers (MSPs) need the right tools to stay in the game – and ahead of the competition – to facilitate this process for customers and capture some of the projected $186.4 billion cloud computing market.

Next week at CloudFest 2019, Acronis will join 7,000 global cloud, hosting, and service provider industry pros to share IT solutions that enable MSPs to solve pressing, complex customer problems. Here’s a preview of what will be top-of-mind at Acronis’ CloudFest booth #F04.

Generating Mountains of Data - Thoughts from #IDCDirections

These are exciting times of change in almost every industry, vertical, use case, and inside almost every team. From accounting and HR, to sales and marketing, to the manufacturing line and warehouse inventory systems, everything is being instrumented and data is being captured and analyzed. The popular saying “If you can’t measure it, you can’t improve it” is on the verge of being abused.

Several Acronis team members and I just spent the day at IDC Directions 2019. It’s a yearly event where the IDC community of analysts meets with clients, presenting high-level summaries of their research and sharing their thoughts about where technology is heading and what we and our organizations can do prepare for the future rushing towards us.

And that is a good thing.

Cryptojacking - The Petty Cyber Crime Hiding a Deadly Threat

One of the fastest-growing malware threats of the past 18 months affects half of the businesses in the world, and most of them don’t know it. It’s called cryptojacking, an unintended consequence of the booming popularity of cryptocurrencies like Bitcoin. Most victims don’t notice that they’ve been hit by cryptojacking because its adverse effects are relatively inconsequential: it just steals CPU cycles from your computer, as well as the electricity required to power it.

Getting hit by ransomware -- a similarly-pervasive and fast-growing but much more destructive malware threat -- is like a roundhouse punch to the face: your files get locked up with encryption until you pay some distant criminal hundreds or thousands of dollars for the key. Compared to ransomware, cryptojacking seems more like a mosquito bite: an annoyance, not a grave threat.

But the harsh reality is that like disease-carrying insects, some cryptojackers bring lethal friends along with them.