Connect with us

Biz & IT

OpenFin raises $17 million for its OS for finance

Published

on

OpenFin, the company looking to provide the operating system for the financial services industry, has raised $17 million in funding through a Series C round led by Wells Fargo, with participation from Barclays and existing investors including Bain Capital Ventures, J.P. Morgan and Pivot Investment Partners. Previous investors in OpenFin also include DRW Venture Capital, Euclid Opportunities and NYCA Partners.

Likening itself to “the OS of finance,” OpenFin seeks to be the operating layer on which applications used by financial services companies are built and launched, akin to iOS or Android for your smartphone.

OpenFin’s operating system provides three key solutions which, while present on your mobile phone, has previously been absent in the financial services industry: easier deployment of apps to end users, fast security assurances for applications and interoperability.

Traders, analysts and other financial service employees often find themselves using several separate platforms simultaneously, as they try to source information and quickly execute multiple transactions. Yet historically, the desktop applications used by financial services firms — like trading platforms, data solutions or risk analytics — haven’t communicated with one another, with functions performed in one application not recognized or reflected in external applications.

“On my phone, I can be in my calendar app and tap an address, which opens up Google Maps. From Google Maps, maybe I book an Uber . From Uber, I’ll share my real-time location on messages with my friends. That’s four different apps working together on my phone,” OpenFin CEO and co-founder Mazy Dar explained to TechCrunch. That cross-functionality has long been missing in financial services.

As a result, employees can find themselves losing precious time — which in the world of financial services can often mean losing money — as they juggle multiple screens and perform repetitive processes across different applications.

Additionally, major banks, institutional investors and other financial firms have traditionally deployed natively installed applications in lengthy processes that can often take months, going through long vendor packaging and security reviews that ultimately don’t prevent the software from actually accessing the local system.

OpenFin CEO and co-founder Mazy Dar (Image via OpenFin)

As former analysts and traders at major financial institutions, Dar and his co-founder Chuck Doerr (now president & COO of OpenFin) recognized these major pain points and decided to build a common platform that would enable cross-functionality and instant deployment. And since apps on OpenFin are unable to access local file systems, banks can better ensure security and avoid prolonged yet ineffective security review processes.

And the value proposition offered by OpenFin seems to be quite compelling. OpenFin boasts an impressive roster of customers using its platform, including more than 1,500 major financial firms, almost 40 leading vendors and 15 of the world’s 20 largest banks.

More than 1,000 applications have been built on the OS, with OpenFin now deployed on more than 200,000 desktops — a noteworthy milestone given that the ever-popular Bloomberg Terminal, which is ubiquitously used across financial institutions and investment firms, is deployed on roughly 300,000 desktops.

Since raising their Series B in February 2017, OpenFin’s deployments have more than doubled. The company’s headcount has also doubled and its European presence has tripled. Earlier this year, OpenFin also launched it’s OpenFin Cloud Services platform, which allows financial firms to launch their own private local app stores for employees and customers without writing a single line of code.

To date, OpenFin has raised a total of $40 million in venture funding and plans to use the capital from its latest round for additional hiring and to expand its footprint onto more desktops around the world. In the long run, OpenFin hopes to become the vital operating infrastructure upon which all developers of financial applications are innovating.

“Apple and Google’s mobile operating systems and app stores have enabled more than a million apps that have fundamentally changed how we live,” said Dar. “OpenFin OS and our new app store services enable the next generation of desktop apps that are transforming how we work in financial services.”

Source link

Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Biz & IT

UK worries Starlink and OneWeb may interfere with each other, plans new rules

Published

on

Enlarge / Artist’s impression of low-Earth-orbit satellites like those launched by SpaceX and OneWeb.

A UK government agency is worried that OneWeb, SpaceX’s Starlink, and similar low Earth orbit (LEO) satellite-broadband systems could block each others’ signals.

Ofcom, the UK’s communications regulator, proposed new rules today in a report that details its interference concerns. Ofcom also said it intends to amend satellite licenses already issued to SpaceX and OneWeb to require coordination of frequency use. Without new requirements, the risk of interference could prevent competition by shutting new players out of the market, Ofcom said.

Non-geostationary satellite orbit (NGSO) systems are more complex than the traditional geostationary type because they use hundreds or thousands of satellites, Ofcom noted. “Satellite dishes need to track these satellites as they move across the sky, unlike existing satellite networks, where the dishes are fixed pointing at a single satellite which is stationary in the sky,” the Ofcom report said. Because so many low-Earth-orbit satellites are being launched, “there is a risk of satellites from two different operators appearing to be in the same part of the sky,” causing interference known as “in-line events” in which multiple operators’ satellites are lined up in the sky, Ofcom wrote.

This interference can affect uplink and downlink transmissions between satellites and user terminals that serve individual homes, the report said. The interference can also affect links between satellites and the Gateway Earth stations that connect to the Internet backbone.

“Since NGSO satellites are moving relative to each other and relative to the ground, in-line events may individually only be brief, maybe a few seconds,” Ofcom wrote. “However, if an in-line event occurs and causes interference, it may take longer for the terminal to reconnect to the network. The interference could continue to repeat over time, reoccurring in a regular pattern which will depend on the orbits of the respective systems.”

Outages from interference

Users could lose service when there’s interference to either the user terminal or gateway earth stations, but interference to a gateway station would affect many more users. “[T]he impact of interference on gateway links would be much greater than on individual user links as each gateway provides connectivity for many users (perhaps hundreds or thousands of users depending on the design of the system), so a loss of connection due to interference at the gateway will be experienced more widely across the network,” Ofcom wrote.

Gateway Earth stations operated by different companies “are likely to require large minimum separation distances” of tens of kilometers to avoid interference, Ofcom wrote. In contrast, “multiple GSO [geostationary satellite orbit] gateways can be located on a single site” without causing harmful interference to each other.

The Ofcom report listed five NGSO constellations that are planned or already semi-operational. The biggest example is SpaceX, which is offering beta service from 1,500 already-launched satellites and has over 4,400 satellites planned for its initial phase. Amazon’s Kuiper division hasn’t launched a satellite yet, but it has 3,236 satellites planned in its initial phase, the report noted.

OneWeb—which is co-owned by the UK government and Bharti Global—has launched over 200 satellites and has plans for 648 satellites in its initial phase. Telesat and Kepler round out the list, with plans for 298 and 140 satellites, respectively.

Here’s the Ofcom chart listing low-Earth-orbit satellite networks:

Coordination difficult

The US Federal Communications Commission in 2017 adopted rules, including power limits, to minimize the danger of interference in NGSO systems. The FCC adopted different rules for different slices of spectrum. In the 17.8 to 18.3 GHz band, for example, the FCC said, “while terrestrial use of this band is significant, there are areas, particularly rural areas, where terrestrial deployment is less dense and by using mitigating techniques like siting considerations, off-axis rejection, and shielding, we expect FSS [fixed-satellite service] earth stations will be able to operate successfully without receiving harmful interference… If interference does occur, earth stations can switch to other bands not shared with terrestrial users or use alternative mitigation techniques.”

The FCC also imposed specific conditions to prevent interference and space debris on licenses awarded to SpaceX, OneWeb, Amazon, and others.

Ofcom is worried that the global system for coordinating satellites, overseen by the International Telecommunication Union [ITU], isn’t good enough to prevent NGSO problems. “The potential for harmful interference between different satellite systems is usually managed by operators cooperating with each other under the ITU satellite coordination procedures,” Ofcom wrote.

The agency added:

However, coordination between NGSO systems is proving to be more challenging due to the dynamic nature of these systems, combined with operators having differing rates of deployment (some operators holding older filings will not deploy their systems for a few years) and changing their architecture over time. We are therefore concerned that NGSO satellite services could be deployed before an appropriate level of coordination has been possible with other operators.

Ofcom is also worried about the coexistence of user terminals when two or more companies provide LEO satellite service in the same area:

A lack of agreement over how user terminals of different systems can coexist in the same area and band could restrict competition as a result of earlier deployed systems hindering later ones. Once one operator starts deploying user terminals, other operators wishing to launch services using the same band may expect to experience harmful interference from the existing user terminals. In the worst case, this could mean that the quality of their broadband services would not be sufficiently reliable in order to enter the market. Nonetheless, the established player could have an incentive to cooperate given that the interference is likely to be mutual, i.e. their services could be degraded as well.

New rules, license changes

Ofcom said its goal in issuing new rules is to minimize interference while encouraging competition. The agency proposed, among other things, “an additional explicit license condition requiring NGSO licensees to cooperate so they can co-exist and operate within the UK without causing harmful radio interference to each other.” Ofcom said it also intends to “[i]ntroduce checks when we issue new NGSO licenses so that these are only granted if all systems (existing and new) are able to coexist and provide services to end users” and implement new conditions letting Ofcom “take action to resolve degradation to services if this were to occur at a particular location or location(s) in the UK.”

To preserve competition, Ofcom said it will “introduce a competition check” into its licensing process to account for the “technical constraints that the gateway or user terminals could create on future licensees.” Ofcom said:

In particular, in a market that was concentrated, if there was limited prospect of the licensee system and future systems (applicants) being able to technically coexist, then this could form a barrier to future entry to the market. As a result, we are proposing that a key piece of information that applicants should provide when applying for a network license is credible evidence about the technical ability for their system and future systems to coexist. This would include evidence about the flexibility of their system and/or what reasonable steps new licensees could easily undertake to protect them. This information would also be used when assessing whether it is reasonable for new applications and existing services to coexist, to understand the reasonableness of mitigations being undertaken by existing licensees.

Ofcom said it plans to review all NGSO licenses to determine which companies are using the same frequencies. The agency said it will also amend the existing licenses held by SpaceX Starlink, OneWeb, and Kepler. The changes would require “NGSO licensees to cooperate with the other NGSO licensees operating in the same frequencies so they can coexist,” and allow Ofcom “to require operators to take action in cases of interference between NGSO systems which impacts the provision of services to users in particular location(s) in the UK.”

Ofcom said it will take comments on its proposals until September 20, 2021.

We contacted SpaceX about Ofcom’s report and will update this article if the company provides a response.

Continue Reading

Biz & IT

Sean Gallagher and an AI expert break down our crazy machine-learning adventure

Published

on

We’ve spent the past few weeks burning copious amounts of AWS compute time trying to invent an algorithm to parse Ars’ front-page story headlines to predict which ones will win an A/B test—and we learned a lot. One of the lessons is that we—and by “we,” I mainly mean “me,” since this odyssey was more or less my idea—should probably have picked a less, shall we say, ambitious project for our initial outing into the machine-learning wilderness. Now, a little older and a little wiser, it’s time to reflect on the project and discuss what went right, what went somewhat less than right, and how we’d do this differently next time.

Our readers had tons of incredibly useful comments, too, especially as we got into the meaty part of the project—comments that we’d love to get into as we discuss the way things shook out. The vagaries of the edit cycle meant that the stories were being posted quite a bit after they were written, so we didn’t have a chance to incorporate a lot of reader feedback as we went, but it’s pretty clear that Ars has some top-shelf AI/ML experts reading our stories (and probably groaning out loud every time we went down a bit of a blind alley). This is a great opportunity for you to jump into the conversation and help us understand how we can improve for next time—or, even better, to help us pick smarter projects if we do an experiment like this again!

Our chat kicks off on Wednesday, July 28, at 1:00 pm Eastern Time (that’s 10:00 am Pacific Time and 17:00 UTC). Our three-person panel will consist of Ars Infosec Editor Emeritus Sean Gallagher and me, along with Amazon Senior Principal Technical Evangelist (and AWS expert) Julien Simon. If you’d like to register so that you can ask questions, use this link here; if you just want to watch, the discussion will be streamed on the Ars Twitter account and archived as an embedded video on this story’s page. Register and join in or check back here after the event to watch!

Continue Reading

Biz & IT

Kaseya gets master decryptor to help customers still suffering from REvil attack

Published

on

Kaseya—the remote management software seller at the center of a ransomware operation that struck as many as 1,500 downstream networks—said it has obtained a decryptor that should successfully restore data encrypted during the Fourth of July weekend attack.

Affiliates of REvil, one of the Internet’s most cutthroat ransomware groups, exploited a critical zero-day vulnerability in Miami, Florida-based Kaseya’s VSA remote management product. The vulnerability—which Kaseya was days away from patching—allowed the ransomware operators to compromise the networks of about 60 customers. From there, the extortionists infected as many as 1,500 networks that relied on the 60 customers for services.

Finally, a universal decryptor

“We obtained the decryptor yesterday from a trusted third party and have been using it successfully on affected customers,” Dana Liedholm, senior VP of corporate marketing, wrote in an email on Thursday morning. “We are providing tech support to use the decryptor. We have a team reaching out to our customers and I don’t have more detail right now.”

In a private message, threat analyst Brett Callow of security firm Emsisoft said: “We are working with Kaseya to support their customer engagement efforts. We have confirmed the key is effective at unlocking victims and will continue to provide support to Kaseya and its customers.”

REvil had demanded as much as $70 million for a universal decryptor that would restore the data of all organizations compromised in the mass attack. Liedholm declined to say if Kaseya paid any sum in exchange for the decryption tool. Kaseya has since patched the zero-day used in the attack.

That means that, for the time being, it’s not publicly known if Kaseya paid the ransom or received it for free from either REvil, a law enforcement agency, or a private security company.

In the days following the attack, REvil’s site on the dark web, along with other infrastructure the group uses to provide technical support and process payments, suddenly went offline. The unexplained exit left victims and researchers worried that the data would remain locked up forever, since the only people with the ability to decrypt it had vanished.

Where did it come from?

REvil is one of several ransomware groups believed to operate out of Russia or another Eastern European country that was formerly part of Soviet Union. The group’s disappearance came a few days after President Joe Biden warned his Russian counterpart Vladimir Putin that, if Russia didn’t rein in those ransomware groups, the US might take unilateral action against them.

Observers have speculated since then that either Putin pressured the group to go quiet or the group, rattled by all the attention it received from the attack, decided to do so on its own.

Some of the companies victimized by the attack include Swedish grocery store chain COOP, Virginia Tech, two Maryland towns, New Zealand schools, and international textile company Miroglio Group.

REvil is also behind a crippling attack on JBS, the world’s biggest producer of meat. The breach caused JBS to temporarily close some plants.

Continue Reading

Trending