Virtual Desktop Tools

Repairify and Autel Announce Exclusive North American Agreement

Repairify | March 03, 2023 | Read time : 01:30 min

repairify-and-autel-announce

Repairify, LLC portfolio company of Kinderhook Industries, and Autel U.S., a wholly-owned subsidiary of Autel Intelligent Technology, have announced an exclusive long-term collaboration agreement to bring Repairify's patented global OEM remote solutions for diagnostics, calibrations, and programming through Autel's remote-capable products across North America.

Repairify's industry-leading patented remote diagnostic, calibration, and programming solutions will be added as a new service option to an upgraded version of Autel's Remote Expert platform as per agreement. Customers can choose between Repairify's OEM-certified and warrantied remote solutions and those of the independent, experience-verified Remote Experts already serving the platform, thanks to the platform's shared management by Repairify and Autel.

Launched in 2022, Autel's Remote Expert offers on-site aftermarket scanning and remote access to OEM tools backed by trained experts. Autel MaxiSYS Ultra, Ultra EV, MS919, MS909, and MS909 EV diagnostic tablets support Autel's Remote Expert service. In addition, there will be an extension of Remote Expert to Autel's ADAS calibration systems.

"We are excited to enter into this collaboration with Repairify. Autel developed the Remote Expert platform to provide our users remote access to specialized and experienced module programmers and diagnosticians. We are very proud that its success drew the attention of a company of such quality and industry success as Repairify. We are confident that this partnership will benefit both companies and, most importantly, be of immense value to our users," said Chloe Hung, CEO, Autel U.S.

(Source –CISION PR Newswire)

Cris Hollingsworth, President of Repairify Global Holdings said, "Since its launch into the North American market in 2005, Autel has been known for their consistent delivery of leading innovative solutions across the mechanical and collision markets.". He added, "Repairify is honored to embark on this partnership and to broaden the reach of our solutions through the new and existing Autel network of customers."

(Source –CISION PR Newswire)

About REPAIRIFY

Repairify, founded in 2015 and headquartered in Plano, Texas, along with its family of brands, empower the automotive repair sector to master the data-intensive, modern vehicles. Repairify aids automotive experts in diagnostics, calibration, programming, and workflow by providing new OE tools and certified OEM-compatible technology, services, and information.

Spotlight

VMware SD-WAN™, a fundamental component of VMware SASE™ (Secure Access Service Edge), offers converged cloud networking and security services to achieve flexibility, agility, and scale for enterprises of all sizes. VMware SD-WAN is built on software-defined networking principles to address end-to-end automation, application continuity, branch transformation, and security from the edge to the data center and the cloud

Spotlight

VMware SD-WAN™, a fundamental component of VMware SASE™ (Secure Access Service Edge), offers converged cloud networking and security services to achieve flexibility, agility, and scale for enterprises of all sizes. VMware SD-WAN is built on software-defined networking principles to address end-to-end automation, application continuity, branch transformation, and security from the edge to the data center and the cloud

Related News

Virtual Desktop Strategies, Virtual Server Management

LogicMonitor Expands Observability Intelligence to New Environments

businesswire | August 18, 2023

LogicMonitor, a leading SaaS-based unified observability platform for hybrid IT infrastructure, today announced expanded integrations, insights and workflows to the LM Envision Platform. LogicMonitor is also introducing Dexda, an event management solution that filters through the noise of thousands of daily alerts by using advanced machine learning (ML) techniques, contextual enrichment capabilities and deduplication efforts. Together, these additions allow customers to reach a significantly lower mean time to resolution and lower risks to the business. “Every business is under tremendous pressure to seamlessly deliver exceptional digital performance,” states Christina Kosmowski, CEO, LogicMonitor. “To efficiently do that, our customers look to us to contextualize the overwhelming amount of data within their complex IT environments.“ The core of LogicMonitor’s platform has been built with advanced machine learning, intelligence and automation, combined to abstract complexity and deliver business impact through IT data collaboration. The company has focused its product roadmap in the areas of intelligence, experience and extensibility. Intelligence and Automation Dexda is the next evolution of AI Ops. It is built on top of LogicMonitor’s extensive data set and integrated into its platform, so users can effortlessly move from alerting to automating actions. Key attributes of Dexda include: Adaptive Correlation- Alerts are automatically re-clustered when a more optimal option is detected. ServiceNow Ready- Automatically enriches Dexda alerts with ServiceNow CMDB data to drive additional context for ML correlations. User-defined Correlation- Dexda admins can now fine-tune the ML models to meet their unique needs or build new ML models. In addition to Dexda, LogicMonitor has also delivered: Event-Driven Ansible Integration- This jointly developed solution with Red Hat assists with auto-remediation and auto-troubleshooting. This integration lets customers trigger remediation workflows in Ansible and act in accordance with predefined rules. Datapoint Analysis- Leverages machine learning techniques to find related metrics and patterns across different resources, which in turn reduces MTTR and increases productivity. Unified Platform Experience A unified platform experience is critical for consistency, adaptability and scalability while reducing tool sprawl and data complexity. Troubleshooting in hybrid modern environments requires a contextual and intuitive UX across devices, services and networks. This modernization and unification effort is the key to continually delivering new capabilities to users and keeping time to value short for new customers. UI Modernization- Optimized to present information in complex hybrid environments. Components for all parts of the LM Envision platform now include bulk actions, better search and filtering and new editors for LogicModules. Expanded Cloud Support- 20 new out-of-the-box dashboards for AWS and Azure, accelerating time to value while providing service-specific views for more insight into health, performance and availability. Log Ingest and Filter Simplification- Introduced declarative UI to simplify log collection and configuration. Users can also add custom LM Properties to the logs which allows for more flexible searching and potentially faster MTTR. Digital Experience Monitoring- Synthetic tests now support multi-factor authentication (MFA) and automated alerts for latency and error conditions. Extensibility As a trusted partner in the advancement of monitoring across on-prem, hybrid and cloud environments, LogicMonitor continues to invest in new ways to manage and monitor network equipment through integrations woven tightly into its overall platform experience. Improved VMware vSphere Support- Support for vSphere 8 and automation for the discovery and monitoring of new ESXi Hosts and mission-critical Virtual Machines, eliminating manual processes – reducing the time, resources and risk involved in repeatable remediation processes. Cisco Meraki and Catalyst SD-WAN- These new integrations make it easier than ever to monitor Cisco environments in the broader context of one's heterogenous hybrid infrastructure. Customers can now get alerted about anomalous events, visualize network traffic usage and see how Cisco vEdge/cEdge (formerly Viptela), SD-WAN Controllers, Meraki Security Appliances, Switches, Wireless Access Points and Smart Cameras connect to their network and where alert conditions exist. Improved Kubernetes Monitoring- Greater coverage and deeper visibility into frequently changing cloud environments with new support and coverage for Amazon Elastic Kubernetes Service (Amazon EKS) Anywhere and enhanced Kubernetes helm and scheduler monitoring. SaaS Monitoring-M365 and Okta logs allow users to clearly understand why problems happen, pinpoint the root cause and quickly troubleshoot alongside alerts. By advancing many key features of its platform, LogicMonitor customers can harness the full potential of their data to make informed decisions with confidence and efficiency. This approach not only streamlines operations, but also provides clarity and precision to the complexities of their IT landscape. About LogicMonitor LogicMonitor’s SaaS-based observability intelligence platform, LM Envision, helps ITOps, CloudOps, DevOps, CIOs, and business leaders gain operational visibility into and predictability across the technologies that modern organizations depend on to deliver extraordinary employee and customer experiences. LogicMonitor seamlessly enables unified observability across infrastructure, networks, clouds, containers and applications, empowering companies to focus less on troubleshooting and more on innovation.

Read More

Virtual Desktop Tools, Server Hypervisors

RISC Zero raises $40m in Series A to bring its leading Zero-Knowledge technology to Web3 & Enterprise

prnewswire | July 20, 2023

RISC Zero, developer of leading general purpose zero-knowledge (ZK) virtual machine technology, has raised a $40 million Series A. The round was led by Blockchain Capital and joined by seed round lead Bain Capital Crypto, with participation from other notable investors including Galaxy Digital, IOSG, RockawayX, Maven 11, Fenbushi Capital, Delphi Digital, Aglaé Ventures, IOBC, Tribute Labs' Zero Dao, Figment Capital, and Alchemy Ventures. RISC Zero's mission is to equip developers and infrastructure providers with novel cryptographic tools to power the next generation of trustless, scalable, and decentralized computation; both on and off-chain — allowing them to build solutions that defy common assumptions about the capabilities of blockchains and other federated and cooperative computing systems. Our innovative system enables users to confidently take control of their digital world by ensuring computational integrity and producing indisputable receipts of accurate program execution. "Imagine a world where data privacy, security, and trust are no longer concerns, where software supply chains are transparent and verifiable, and where a new generation of applications can harness the power of zero-knowledge computing to solve some of the most pressing challenges of the digital age. This is the promise of zero-knowledge computing and the reason we are investing in RISC Zero" - Bart Stephens, Founder and Managing Partner at Blockchain Capital RISC Zero's ZK Virtual Machine (zkVM) enables developers to build ZK-powered applications with the convenience of conventional programming languages such as Rust and C++. Utilizing advanced features such as continuations, RISC Zero's zkVM can run programs of arbitrary complexity and scope while utilizing off-the-shelf computing platforms — a first in the blockchain industry. "We're honored to be supported by all of our incredible capital partners and the visionary leaders and teams that have signed on to help us build this revolution in computing capability. We're excited to play our part in building a more open and trusted foundation for the future of the internet." - Brian Retford, CEO & Co-founder This funding round will enable RISC Zero to bring its Bonsai computing platform to market, supporting rapid application development and deployment in both cloud and decentralized environments. With Bonsai, developers can focus on writing their application instead of worrying about the complexities of proof orchestration and server infrastructure. AboutRISC Zero The RISC Zero platform will drive the coming decentralized computing revolution. We are bringing general purpose computing to the zero-knowledge ecosystem – enabling users to trust programs run anywhere, while allowing developers to use the tools they already know and love. Public key cryptography ushered in the modern internet era by fundamentally altering digital trust dynamics. Similarly, zero-knowledge computing will radically alter the way we interact digitally and enable entirely new classes of applications.

Read More

VPN

Internet Engineering Task Force standardises quantum-safe VPN protocol created by Post-Quantum

Businesswire | July 18, 2023

The world’s efforts to secure digital communications from the threat posed by quantum computers took a significant leap forward today as a new standard for quantum-safe Virtual Private Networks (VPN) was ratified by the Internet Engineering Task Force (IETF). The new protocol has already been used by Banque de France and Deutsche Bundesbank to secure payments messages, paving the way for full adoption by the Bank for International Settlements to secure communications between the world’s central banks. ‘Harvest Now Decrypt Later’ (HNDL) attacks currently represent the greatest quantum cybersecurity threat. These attacks see hostile actors steal encrypted data now which can be decrypted once a sufficiently mature quantum computer comes online. The new US Quantum Computing Cybersecurity Preparedness Act states that the HNDL risk presents the highest threat to humankind and stipulates that quantum migration must start now. Deploying a VPN based on new post quantum cryptography is the easiest way to protect data-in-transit from such attacks. The new IETF standard specifies how VPNs can exchange communications securely in the quantum age. The novel approach prioritises interoperability by making it possible for multiple post-quantum and classical encryption algorithms to be incorporated into VPNs. Combining both old and new encryption is essential to ensure no disruption to the functioning of existing IT systems, and to protect data from attack by both classical and quantum computers. This is a particularly important milestone for internet connectivity and security as we are transitioning from an era where the world relied upon just one or two algorithms (RSA and Elliptic Curve), to a situation where different nation states are deploying a wide variety of different post-quantum algorithms. This new IETF standard is the glue that allows parties using different public key encryption algorithms to talk with one another. The new IETF standard was proposed and designed by Post-Quantum, a British cyber security company that’s built a portfolio of market-ready quantum-safe cyber security products. Post-Quantum’s own Hybrid PQ VPN uses the new IETF standard and is already in use by NATO to secure its communications from quantum attack, supporting interoperable communications between NATO members. CJ Tjhai, CTO, Post-Quantum and original author of the new IETF standard said: “I’d like to thank all the technologists that collaborated with us on this IETF standard. Much of the focus has been on NIST’s new post quantum encryption algorithms themselves, but this is insufficient unless you have a protocol that defines how the connectivity is done. The easiest way to prevent Harvest Now Decrypt Later attacks is to deploy a PQ VPN based on the new IETF standard. NIST’s new algorithms are only useful if we have agreed standards for their use and mature products that can accommodate them.” Andersen Cheng, Executive Chairman, Post-Quantum added: “CJ and his collaborators have completed important work that makes it possible for tech companies to build quantum-safe VPNs that communicate to one another. We are entering a period where different countries are now recommending different encryption algorithms, so engineering our communications infrastructure to be interoperable and backward compatible is absolutely crucial. That’s the value our own VPN is bringing to organisations like NATO, a diverse member organisation with a variety of post-quantum algorithms in use. “In the commercial sector, we are pleased that Banque de France and Deutsche Bundesbank have also recently completed their project in transmitting payment messages using our protocol, which will pave the way for the Bank for International Settlements to build a complete chain of trust for central bank applications to counter any HNDL risks they already face today.” José María Lucía Moreno, Lead Partner, EY Wavespace and a Post-Quantum partner added: “Our agreement with Post-Quantum is an important step in helping EY and its clients to become quantum-safe. We’re increasingly consulting with our clients to identify where they use traditional encryption that will need to be upgraded, and to help them prepare for the quantum era. Post-Quantum’s approach is particularly interesting because they have modular software-based products like the VPN, which can be implemented together, or as standalones within existing environments, to offer protection today.” The IETF is the non-profit organisation with responsibility for developing the standards that define how the internet is built and used. Now that the IETF has ratified this work, VPN providers will adapt their protocols to match it, making this a defining standard for the future of cybersecurity as the world transitions from classical to new post-quantum encryption. Ratification represents the culmination of work dating back to 2017 when Post-Quantum took the lead in creating the original proposal for this standard. About Post-Quantum Post-Quantum is upgrading the world to next-generation encryption. Our quantum-safe platform includes modular software for Identity, Transmission and Encryption that protect organisations across their entire digital footprint. Products are interoperable, backward compatible and crypto-agile - ensuring a smooth transition to the next generation of encryption. Post-Quantum works with organisations in defence, critical national infrastructure and financial services, including a multi-year relationship with NATO to ensure its communications are secure against quantum attack.

Read More