PBoC States Bitcoin Isn’t Money, Cryptocurrency ICOs Need More Transparency – The Merkle

China always plays a critical role in the future of Bitcoin. Whenlocal exchanges suspend withdrawals, itsprice plummets. Now that the PBoC has rendered its latest verdict, the impact on the Bitcoin price remains to be determined. As was to be expected, the institution claimsBitcoin is not money. Theyalsofeel there is a growing need for cryptocurrency ICO transparency.

Contrary to what some people expected, the PBoC will not follow Japans plans when it comes to regulating cryptocurrency. Chinas national bank has no intention to categorizeBitcoin as money, and that situation will not change anytime soon. The PBoC feels Bitcoin is a string of code fundamentally different from gold and lacksany natural value. Virtual currency has acceptedvalue, which is a factor the bank will not dispute right now.

No one trulyexpected the Chinese government to officially recognize Bitcoin as money. That would have gone against everything the PBoC stands for and has planned for the future. China is one of multiple countries looking to issue itsown national digital currency in the future. Making Bitcoin legal, if only to a certain degree, would have countered those future plans before they wereeven set in motion. It is certainly possible that this situation will change in the future, but for now Bitcoin is not money in China.

That does not have to be bad news, since the value of Bitcoin will not be affected all that much as a result. China has always been a country known for doing its own thing, and Bitcoin is a significant threat to itsown financial ecosystem. Having a tool that provides real-time financial transparency would not be in the best interest of the Chinese government. However, the PBoCscomments were not all negative asit acknowledged the deflationary nature of Bitcoin wouldprovide economic development.

The PBoC also touched upon the concept of ICOs. As most users are well aware, cryptocurrency ICOs have become the new norm these days. Every project, whizzkid and herdog are raising money to build something new using powerful technology. Very few suchprojects have anythingto show for it, despite receiving millions of dollars in funding to date. Time is of the essence in this regard, as initial investors will not remain overly patient for much longer.

The ICO phenomenon has attracted the attention of the PBoC, which is both good and bad. On the positive side, it seems regulation of these fundraising efforts may be a lot more imminentthan we think. The bad side is thatthis will make it a lot more difficult to raise money in a decentralized manner moving forward. No specific regulatory measures have been proposed, but the central bank may implement appropriate regulation if the need arises.

The PBoC feels there is a lack of transparency when it comes to cryptocurrency ICOs, and that the disclosure of associated risks to potential investors needs to be improved upon. Without proper information disclosure standards, there are loopholes waiting to be exploited by people using this method of fundraising in a nefarious manner. The lack of continuous information after the money has been collected is another grave concern. All in all,the PBoC seems to have mixed feelings about cryptocurrencies as a whole.

Read the rest here:
PBoC States Bitcoin Isn't Money, Cryptocurrency ICOs Need More Transparency - The Merkle

WikiLeaks wants to ‘take down America any way they can,’ says CIA chief – Washington Times


Washington Times
WikiLeaks wants to 'take down America any way they can,' says CIA chief
Washington Times
WikiLeaks will take down America any way they can and find any willing partner to achieve that end, Mr. Pompeosaid Thursday at a security summit in Aspen, Colorado, where questions concerning the website's publications and the Trump administration's ...
CIA Director Pompeo's views on Wikileaks have apparently evolvedMSNBC
CIA director: 'I don't love' WikileaksThe Hill
Putin & Trump could have met many times at G20, gone to toilet together LavrovRT
The Guardian
all 286 news articles »

See original here:
WikiLeaks wants to 'take down America any way they can,' says CIA chief - Washington Times

Newsweek settles with Sputnik writer – The Hill

Newsweek has settled a libel complaint with a former Sputnik writer that included allegations of Newsweek's Kurt Eichenwald using bribery and threats to buy the editor's silence over a false story regarding Russia, President Trump and WikiLeaks that was later deleted.

Sputnik writer Bill Moran had written a piece that included a misattributed quote that Trump, then a presidential candidate, used in a speech that same day.

Upon realizing a mistake had been made, Moran took the story down, but not before Trump had read it and mentioned it at a rally in Pennsylvania.

But Eichenwald, a senior writer at Newsweek, had concluded the only way Trump could have learned about the "misattributed quote was purposeful collusion with the Russians, and that the Wikileaks documents themselves had been altered," according to Paste.

The 56-year-old Eichenwald, also an MSNBC contributor, offered "to either help [Moran] get a job at New Republic, in seeming exchange for silence, or update the piece with a paragraph naming him. This latter option came with a warning that aligning himself with Sputnik made him unhirable," according to Paste.

Eichenwald has since erased his employment at Newsweek from his Twitter bio. WikiLeaks founder Julian Assange noted the deletion in a tweet on Sunday.

Has Newsweek fired its "senior writer" @KurtEichenwald after libel complaint? Bio changed to remove 'Newsweek' https://t.co/jP6ZEcRe1r pic.twitter.com/H2QF26JoIb

The Hill has reached out to Newsweek for comment.

The lawsuit was settled amicably and to my satisfaction, Moran said. After the settlement, the stories were removed, the parties agreed not to speak about the terms of the settlement, so I cant talk to you about what the settlement entails.

Continue reading here:
Newsweek settles with Sputnik writer - The Hill

The Conservative Case for Universal Healthcare – The American Conservative

Dont tell anyone, but American conservatives will soon be embracing single-payer healthcare, or some other form of socialized healthcare.

Yes, thats a bold claim given that a GOP-controlled Congress and Presidentare poised to un-socialize a great deal of healthcare, and may even pull it off. But within five years, plenty of Republicans will be loudly supporting or quietly assenting to universal Medicare.

And thats a good thing, because socializing healthcare is the only demonstrably effective way to control costs and cover everyone. It results in a healthier country and it saves a ton of money.

That may seem offensively counterintuitive. Its generally assumed that universal healthcare will by definition cost more.

In fact, in every first-world nation that has socialized medicinewhether it be a heavily regulated multi-insurer system like Germany, single-payer like Canada, or a purely socialized system like the United Kingdom-it costs less. A lot, lot less, in fact: While healthcare eats up nearly 18 percent of U.S. GDP, for other nations, from Australia and Canada to Germany and Japan, the figure hovers around 11 percent. (Its no wonder that smarter capitalists like Charlie Munger of Berkshire Hathaway are bemoaning the drag on U.S. firm competitiveness from high healthcare costs.) Nor are healthcare results in America anything to brag about: lower life expectancy, higher infant mortality and poor scores on a wide range of important public health indicators.

Why does socialized healthcare cost less? Getting rid of private insurers, which suck up a lot money without adding any value, would result in a huge savings, as much as 15percent by one academic estimate published in the American Journal of Public Health. When the government flexing its monopsony muscle as the overwhelmingly largest buyer of medical services, drugs and technology, it would also lower prices-thats what happens in nearly every other country.

So while its a commonly progressive meme to contrast the national expenditure of one F-35 with our inability to afford single-payer healthcareand I hesitate to say this lest word get out to our neocon friendsthere is no need for a tradeoff. If we switched to single payer or another form of socialized medicine, we would actuallyhave more money to spend on even more useless military hardware.

The barrier to universal healthcare is not economic but political. Is profligate spending on health care really a conservative value? And what kind of market incentives are working anywayits an odd kind of market transaction in which the buyer is stopped from negotiating the price, but that is exactly what Medicare Part D statutorily requires: The government is not allowed to haggle the prices of prescription drugs with major pharmaceutical companies, unlike in nearly every other rich country. (Both Hillary Clinton and Donald Trump pledged to end this masochism, but the 45th president has so far done nothing, and U.S. prescription drug prices remain the highest in the world.) Does anyone seriously think medical savings accounts with their obnoxious complexity and added paperwork are the right answer, and not some neoliberal joke?

The objections to socialized healthcare crumble upon impact with the reality. One beloved piece of folklore is that once people are given free healthcare theyll abuse it by going on weird medical joyrides, just because they can, or simply let themselves go because theyll have free doctor visits. I hate to ruin this gloating fantasy of lumpenproletariat irresponsibility,but people need take an honest look at the various health crises in the United States compared to other OECD(Organisation for Economic Cooperation and Development) countries. If readily available healthcare turns people hedonistic yahoos, why does Germany have less lethal drug overdoses than the U.S. Why does Canada have less obesity and type II diabetes? Why does the Netherlands have less teen pregnancy and less HIV? The evidence is appallingly clear: Among first-world countries, the U.S. is a public health disaster zone. We have reached the point where the rationalist santera of economistic incentives in our healthcare policies have nothing to do with people as they actually are.

If socialized medicine couldbe in conformity with conservative principles, what about Republican principles? This may seem a nonstarter given the pious market Calvinism of Paul Ryan and Congressmen like Reps. Scott Perry (R-Pa.) and Mo Brooks (R-Ala.), who seem opposed to the very idea of health insurance of any kind at all. But their fanaticism is surprisingly unpopular in the U.S. According to recent polling, less than 25 percent of Americans approve of the recent GOP healthcare bills. Other polls show even lower numbers. These Republicans arealso profoundly out of step with conservative parties in the rest of the world.

Strange as it may seem to American Right, $600 EpiPens are not the sought-after goal of conservatives in other countries. In Canada, the single-payer healthcare system is such a part of national identity that even hard-right insurgents like Stockwell Day have enthusiastically pledged to maintain it. None of these systems are perfect, and all are subject to constant adjustment, but they do offer a better set of problemsthe most any mature nation can ask forthan what we have in the U.S.

Andvirtually no one looks at our expensive American mess as a model.

I recently spoke with one German policy intellectual, Nico Lange, who runs the New York outpost of the German Christian Democrats main think tank, the Konrad Adenauer Stiftung, to get his thoughts on both American and German healthcare. Is socialized medicine the entering wedge of fascism and/or Stalinism? Are Germans less free than Americans because they all have healthcare (through a heavily regulated multi-payer system), and pay a hell of a lot less (11.3 percent of GDP) for it?

Mr. Lange paused, and took an audible breath; I felt like I had put him in the awkward spot of inviting him over and asking for his honest opinion of the drapes and upholstery. Yes, he said, we are less free but security versus freedom is a classic balance! National healthcare makes for a more stable society, its a basic service that needs to be provided to secure an equal chance for living standards all over the country. Even as Mr. Lange delineated the conservative pedigree of socialized medicine in GermanyYou can certainly argue that Bismarck was a conservative in founding this systemI had a hard time imagining many Democrats, let alone any Republican, making such arguments.

Indeed, the official GOP stance is perhaps best described as Shkrelism than conservatism, after the weasel-faced pharma entrepreneur Martin Shkreli, who infamously jacked up the price of one lifesaving drug and is now being prosecuted for fraud. (Though in fairness, this type of bloodsucking awfulness is quite bipartisan: Heather Bresch, CEO of Mylan corporation, which jacked up the price of EpiPens from $100 to $600, is the daughter of Senator Joe Manchin (D-WV), who defended his daughters choice.)

But GOP healthcare politics are at the moment spectacularly incoherent. Many GOP voters have told opinion polls that they hate Obamacare, but like the Affordable Care Act. And as the GOP healthcare bill continues to be massively unpopular, Donald Trump has lavished praise on Australias healthcare system (socialized, and eating up only 9.4 percent of the GDP there). Even in the GOP, this is where the votes are: Trumps move to the center on questions of social insuranceMedicare, Medicaid, Social Securitywas a big part of his appeal in the primaries. The rising alt-Right, not to hold them up as any moral authority, dont seem to have any problem with universal Medicare either.

It will fall on reform conservatives to convince themselves and others that single-payer or some kind of universal care is perfectly keeping with conservative principles, and, for the reasons outlined above, its really not much of a stretch. Lest this sound outlandish, consider how fully liberals have convinced themselves that the Affordable Care Acta plan hatched at the Heritage Foundation for heavens sake, and first implemented by a Republican governoris the every essence of liberal progressivism.

Trumps candidly favorable view of Australian-style socialized healthcare is less likely a blip than the future of the GOP. Republican governors who actually have to govern, like Brian Sandoval and John Kasich, and media personalities like Joe Scarborough, and the Rock, will be soon talking up single-payer out of both fiscal probity, communitarian decency, and the in-your-face evidence that, ideology aside, this is what works. Even the Harvard Business Review is now giving single-payer favorable coverage. Sean Hannity and his angry brigade may be foaming at the mouth this week about the GOP failure to disembowel Obamacare, but Seans a sufficiently prehensile fellow to grasp at single-payer if it seems opportunejust look at his about-face on WikiLeaks. And though that opportunity has not arisen yet, check again in two years.

The real obstacle may be the Democrats. As Max Fine, last surviving member of John F. Kennedys Medicare task force, recently toldthe Intercept, Single payer is the only real answer and some day I believe the Republicans will leap ahead of the Democrats and lead in its enactment, he speculated, just as did Bismarck in Germany and David Lloyd George and Churchill in the UK. For now, an invigorating civil war is raging within the Democrats with the National Nurses Union, the savvy practitioner-wonks of the Physicians for a National Health Program, and thousands of everyday Americans shouting at their congressional reps at town hall meetings are clamoring for single-payer against the partys donor base of horrified Big Pharma executives and affluent doctors. In a few years there might even be a left-right pincers movement against the neolib/neocon middle, whose unlovable professional-class technocrats are the main source of resistance to single payer.

I dont want to oversell the friction-free smoothness of the GOPs conversion to socialized healthcare. Our funny country will always have a cohort of InfoWars ooga-boogas, embittered anesthesiologists and Hayekian fundies for whom universal healthcare is a totalitarian jackboot. (But, and not to be a jerk, its worth remembering that Hayek himself supported the socialized healthcare of Western Europe in one of his most reasonable passages from the Road to Serfdom.)

So even if there is some banshee GOP resistance at first, universal Medicare will swiftly become about as controversial as our government-run fire departments. Such, after all, was the trajectory of Medicare half a century ago. You read it here first, people: Within five years, the American Right will happily embrace socialized medicine.

Chase Madar is an attorney in New York and the author of The Passion of Bradley Manning: The Story Behind the Wikileaks Whistleblower.

Read more:
The Conservative Case for Universal Healthcare - The American Conservative

Soon-to-launch communications network said to be ‘unhackable’ – Newser


Newser
Soon-to-launch communications network said to be 'unhackable'
Newser
These aren't real people, but rather the names commonly used in scenarios describing quantum cryptography, a type of technology surpassing traditional encryption in terms of keeping communications networks safe from hackers. It's a technology that ...
China's New Quantum Communication Network Will Be UnhackableFuturism
Unhackable Chinese Communication Network Launches SoonEdgy Labs (blog)
China To Launch 'Unhackable' Quantum Computer NetworkLADbible (blog)
Livemint -International Business Times UK -News4C
all 11 news articles »

Excerpt from:
Soon-to-launch communications network said to be 'unhackable' - Newser

iCloud Keychain encryption bug exposes iOS passwords, credit card numbers – TechRepublic

A largely unreported iOS security flaw undermined iCloud's end-to-end encryption capability, and could have allowed attackers to steal passwords, credit cards, and any other information on file, according to security firm Longterm Security.

iCloud Keychain enables users to store passwords and credit card numbers across all of their devices, while iCloud Keychain Sync allows users to share this information securely between devices. The security flaw was found in iCloud Keychain Sync's custom Off-The-Record (OTR) implementation, Longterm Security co-founder Alex Radocea wrote in a blog post.

"The bug we found is exactly the kind of bug law enforcement or intelligence would look for in an end-to-end encryption system," Radocea told ZDNet.

The flaw was addressed in the iOS 10.3 updatedemonstrating again why it's important to stay on top of updating your device.

SEE: Learn Website Hacking and Penetration Testing From Scratch (TechRepublic Academy)

iCloud Keychain's OTR encryption protocol uses key verification to protect a user's devices by ensuring information can pass securely between multiple devices. Radocea was able to bypass the signature verification process via a man-in-the-middle attack. He was also able to intercept traffic from devices, and modify OTR packets in transit to deliberately get an invalid signature, ZDNet reported. After this, he was able to get a device approved.

"We could see everything [in the Keychain] in plain-text," Radocea told ZDNet. Making matters more dangerous, "it's completely silent to users," he said. "They wouldn't have seen a device being added."

Weak, reused, and leaked passwords are a primary method of entry for cybercriminals, Radocea wrote in the blog post, making password hygiene critical for enterprise users. In 2016 alone, more than 500 million credentials surfaced publicly from mass-hack password dumps, combined with poor password storage practices, he added.

"Due to the risk of future mass dumps, passwords alone are just no longer a strong defense mechanism for sensitive data," Radocea wrote. "It is a very good idea for organizations to further harden access to any important personal information."

Current best practices include multi-factor authentication and end-to-end encryption, such as OTR, Radocea wrote.

Longterm Security will present more information on the issue in a session at Black Hat on Wednesday.

Image: iStockphoto/Wachiwit

1. A security flaw undermined iCloud's end-to-end encryption capability, and could have allowed criminals to steal passwords and credit cards, according to Longterm Security.

2. The flaw was addressed in the iOS 10.3 update, so users should update if they haven't done so.

3. Enterprises shouldn't rely on passwords alone to protect sensitive data, and should use multi-factor authentication and end-to-end encryption.

Continued here:
iCloud Keychain encryption bug exposes iOS passwords, credit card numbers - TechRepublic

Encrypted electronic communications: How will Australia regulate access? – Lexology (registration)

The Australian Government is proposing to introduce legislation this year to impose an obligation on communications and technology companies to assist law enforcement agencies to access encrypted messages, in the event that voluntary cooperation is not provided by those companies.

Background

The Australian Government has taken a strong stand in relation to the need for law enforcement agencies to access encrypted messages, sent over systems such as WhatsApp, Viber and Telegram. This has been evidenced by the positions taken by the Government on the international stage, including the recent Five Eyes and G20 meetings.

Five Eyes: A voluntary solution?

At the 26 June 2017 Five-Eyes intelligence talks in Ottawa a hot topic was how to seek cooperation from internet service providers (ISPs) and device makers to access encrypted messages sent using the systems of those ISPs. The governments of all of the Five-Eyes members (the United States, the United Kingdom, Canada, Australia and New Zealand) argued that the inability of law enforcement agencies to access encrypted messages significantly impedes the investigation of serious crimes, particularly terror related offences, and therefore undermines public safety.

The joint communique issued by the five governments following the Ottawa meeting stated that:

encryption can severely undermine public safety efforts by impeding lawful access to the content of communications during investigations into serious crimes, including terrorism. To address these issues, we committed to develop our engagement with communications and technology companies to explore shared solutions while upholding cybersecurity and individual rights and freedoms.

Australias positon at the G20

The Australian Prime Minister continued to push this theme, including the need for international cooperation, at the G20 meeting held in Hamburg in early July 2017. The G20 leaders statement on countering terrorism, issued in Hamburg, supported the need for access to be obtained to encrypted messages. That statement provided in part that the G20 leaders encourage collaboration with industry to provide lawful and non-arbitrary access to available information where access is necessary for the protection of national security against terrorist threats.

The way forward: Following the UK

The Attorney-General has acknowledged that Australia already has regulation, included in the Telecommunications Act 1997 (Cth) and the Crimes Act 1914 (Cth), requiring telecommunications companies to provide assistance to law enforcement agencies to access communications. However, the view of the Government is that this legislation has not kept up with technological advancements and needs to be updated.

Legislation dealing with access to encrypted messages is already in place in the United Kingdom and New Zealand. The Attorney-General has stated that Australias new laws will be guided by the UK legislation, specifically the Investigatory Powers Act 2016. Under that UK Act, there is an obligation on regulated entities to do whatever they reasonably can be expected to do to enable law enforcement agencies to inspect messages that are the subject of encryption or to inspect devices, where a technical capability notice is issued with the approval of a judicial commissioner.

Encrypted messages are difficult to access because the providers of the services do not hold the keys necessary to decrypt messages, these are held by users. This has caused entities potentially subject to the UK legislation, such as Facebook, Google and the like, to raise a concern that the UK legislation and potentially the legislation proposed in Australia will require backdoors to be installed in encryption systems software.

A backdoor refers to a flaw in a software system for encrypted messaging that would allow access to encrypted messages notwithstanding that the encryption keys are not held. Concern has been expressed that if a backdoor is included in encrypted messaging software that is able to be used by law enforcement agencies then that backdoor may also be used by hackers or others to access legitimate encrypted messages for criminal purposes. The Australian Government has insisted it will not require the use of backdoors. Instead, the Government has said it is the responsibility of technology companies that provide end-to-end encryption services to work out a way that encrypted messages may be accessed, where required by law enforcement.

Next steps in Australia

A draft of the proposed Australian legislation is not yet available, but it is intended to be introduced to Parliament during the Spring 2017 Parliamentary sittings, which commence on 8 August 2017. It remains to be seen how closely that draft legislation will follow the UK Investigatory Powers Act and whether it will address concerns regarding the security of encrypted messages sent for legitimate purposes.

Read more here:
Encrypted electronic communications: How will Australia regulate access? - Lexology (registration)

Open-source software rapidly processes spectral data, accurately identifies and quantifies lipid species – Phys.Org

July 25, 2017 The LIQUID interface. Credit: Pacific Northwest National Laboratory

Lipids play a key role in many metabolic diseases, including hypertension, diabetes, and stroke. So having a complete profile of the body's lipidsits "lipidome"is important.

Lipidomics studies are often based on liquid chromatography coupled with tandem mass spectrometry (LC-MS/MS). But researchers have a hard time processing data fast enough, and they are unable to confidently identify and accurately quantify the lipid species detected.

Incorrect identifications can result in misleading biological interpretations. Yet existing tools are not designed for high-volume verification of identifications and have to be manually verified to ensure accuracy.Since scientists increasingly want larger scale lipidomics studies, analysts need improved software for identifying lipids.

A recent paper by lead author Jennifer E. Kyle and eight co-authors at Pacific Northwest National Laboratory (PNNL) introduces an open-source lipid identification software, Lipid Quantification and Identification (LIQUID). The scoring is trainable, the search database is customizable, and multiple lines of evidence are displayed, allowing for confident identifications. LIQUID also makes single- and global-target searches available, as well as fragment-pattern searches. All this makes it possible for researchers to track similar and repeating patterns of MS/MS spectra.

Compared to other freely available software commonly used to identify lipids and other small molecules, LIQUID has a rapid processing time that can generate a higher number of validated lipid identifications faster. Its reference database includes more than 21,200 unique lipid targets across six lipid categories, 24 classes, and 63 subclasses.

LIQUID is able to confidently identify more lipid species with a faster combined processing and validation time than any other software in its field.

What's Next?

Developers of LIQUID will increase the reference library to include lipids that may be unique to particular disease states or to organisms from select environmental niches. This means researchers will be able to characterize a more diverse range of samples and therefore enhance the understanding of biological and environmental systems of interest.

Explore further: Link found between types of lipid metabolism and species lifespan

More information: Jennifer E. Kyle et al. LIQUID: an-open source software for identifying lipids in LC-MS/MS-based lipidomics data, Bioinformatics (2017). DOI: 10.1093/bioinformatics/btx046

An international team of researchers has found a link between types of lipid metabolism in different species and differing lifespans. In their paper published in the journal Scientific Reports, the team describes their study ...

(PhysOrg.com) -- A journal article showcasing results of lipidomics analyses for identifying novel biomarkers of diabetes conducted at Pacific Northwest National Laboratory was selected as "Editor's Choice" by two clinical ...

Could controlling cell-membrane fat play a key role in turning off disease?

Almost everyone knows that fats are the culprits in expanding waistlines and killer diseases, but scientific understanding of the roles of "lipids" -- fats and oils -- inside cells in the body got short shrift until launch ...

If you want to create sustainable biofuels from less and for less, you've got a range of options. And one of those options is to go microbial, enlisting the help of tiny but powerful bacteria in creating a range of renewable ...

Studying how our bodies metabolize lipids such as fatty acids, triglycerides, and cholesterol can teach us about cardiovascular disease, diabetes, and other health problems, as well as reveal basic cellular functions. But ...

From the smallest cell to humans, most organisms can sense their local population density and change behavior in crowded environments. For bacteria and social insects, this behavior is referred to as "quorum sensing." Researchers ...

A team of researchers has developed a faster and easier way to make sulfur-containing polymers that will lower the cost of large-scale production.

The structure of the critical quality control checkpoint enzyme that oversees the production of thousands of secreted glycoproteins has been solved by a fruitful collaborative effort at Diamond Light Source. The study, recently ...

Around half of all medications for chronic diseases are not taken as prescribed, costing the U.S. health care system more than $100 billion in avoidable hospital stays each year.

One of the hardest parts in drug discovery is pinning down how a medicine actually works in the body. It took nearly 100 years to uncover the molecular target of aspirin, but even with cutting-edge technology, it can take ...

Copper has long been known for its ability to kill bacteria and other microbes.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Excerpt from:
Open-source software rapidly processes spectral data, accurately identifies and quantifies lipid species - Phys.Org

Federal Cloud Computing – TechTarget

The following is an excerpt from Federal Cloud Computing by author Matthew Metheny and published by Syngress. This section from chapter three explores open source software in the federal government.

Open source software (OSS) and cloud computing are distinctly different concepts that have independently grown in use, both in the public and private sectors, but have each faced adoption challenges by federal agencies. Both OSS and cloud computing individually offer potential benefits for federal agencies to improve their efficiency, agility, and innovation, by enabling them to be more responsive to new or changing requirements in their missions and business operations. OSS improves the way the federal government develops and also distributes software and provides an opportunity to reduce costs through the reuse of existing source code, whereas cloud computing improves the utilization of resources and enables a faster service delivery.

In this chapter, issues faced by OSS in the federal government will be discussed, in addition to the relationship of the federal government's adoption of cloud computing technologies. However, this chapter does not present a differentiation of OSS from proprietary software, rather focuses on highlighting the importance of the federal government's experience with OSS in the adoption of cloud computing.

Over the years, the private sector has encouraged the federal government to consider OSS by making a case that it offers an acceptable alternative to proprietary commercial off-the-shelf (COTS) software. Regardless of the potential cost-saving benefits of OSS, federal agencies have historically approached it with cautious interest. Although, there are other potential issues in transitioning from an existing proprietary software, beyond cost. These issues include, a limited in-house skillset for OSS developers within the federal workforce, a lack of knowledge regarding procurement or licensing, and the misinterpretation of acquisition and security policies and guidance. Although some of the challenges and concerns have limited or slowed a broader-scale adoption of OSS, federal agencies have become more familiar with OSS and the marketplace expansion of available products and services, having made considerations for OSS as a viable alternative to enterprise-wide COTS software. This renewed shift to move toward OSS is also being driven by initiatives such as the 18F and the US Digital Service, and the publication of the guidance such as the Digital Services Playbook, which urges federal agencies to "consider using open source, cloud based, and commodity solutions across the technology stack".

Interoperability, portability, and security standards have already been identified as critical barriers for cloud adoption within the federal government. OSS facilitates overcoming standards obstacles through the development and implementation of open standards. OSS communities support standards development through the "shared" development and industry implementation of open standards. In some instances, the federal government's experience with standards development has enabled the acceptance and use of open standards-based, open source technologies and platforms.

The federal government's use of OSS has its beginning in the 1990s. During this period, OSS was used primarily within the research and scientific community where collaboration and information sharing was a cultural norm. However, it was not until 2000 that federal agencies began to seriously consider the use of OSS as a model for accelerating innovation within the federal government. As illustrated in Fig. 3.1, the federal government has developed a list of OSS-related studies, policies, and guidelines that have formed the basis for the policy framework that has guided the adoption of OSS. This framework tackles critical issues that have inhibited the federal government from attaining the full benefits offered by OSS. Although gaps still exist in specific guidelines relating to the evaluation, contribution, and sharing of OSS, the policy framework serves as a foundation for guiding federal agencies in the use of OSS. In this section, we will explore the policy framework with the objective of describing how the current policy framework has led to the broader use of OSS across the federal government, and more importantly how this framework has enabled the federal government's adoption of cloud computing by overcoming the challenges with acquisition and security that will be discussed in detail in the next section.

The President's Information Technology Advisory Committee (PITAC), which examined OSS, was given the goal of:

The PITAC published a report concluding that the use of the open source development model (also known as the Bazaar model) was a viable strategy for producing high-quality software through a mixture of public, private, and academic partnerships. In addition, as presented in Table 3.1, the report also highlighted several advantages and challenges. Some of these key issues have been at the forefront of the federal government's adoption of OSS.

Over the years since the PITAC report, the federal government has gained significant experience in both sponsoring and contributing to OSS projects. For example, one of the most widely recognized contributions by the federal government specifically related to security is the Security Enhanced Linux (SELinux) project. The SELinux project focused on improving the Linux kernel through the development of a reference implementation of the Flask security architecture for flexible mandatory access control (MAC). In 2000, the National Security Agency (NSA) made the SELinux available to the Linux community under the terms of the GNU's Not Unix (GNU) General Public License (GPL).

Starting in 2001, the MITRE Corporation, for the US Department of Defense (DoD), published a report42 that built a business case for the DoD's use of OSS. The business case discussed both the benefits and risks for considering OSS. In MITRE's conclusion, OSS offered significant benefits to the federal government, such as improved interoperability, increased support for open standards and quality, lower costs, and agility through reduced development time. In addition, MITRE highlighted issues and risks, recommending any consideration of OSS should be carefully reviewed.

Shortly after the MITRE report, the federal government began to establish specific policies and guidance to help clarify issues around OSS. The DoD Chief Information Officer (CIO) published the Department's first official DoD-wide memorandum to reiterate existing policy and to provide clarifying guidance on the acquisition, development, and the use of OSS within the DoD community. Soon after the DoD policy, the Office of Management and Budget (OMB) established a memorandum to provide government-wide policy regarding acquisition and licensing issues.

Since 2003, there were multiple misconceptions, specifically within the DoD, regarding the use of OSS. Therefore, in 2007, the US Department of the Navy (DON) CIO released a memorandum that clarified the classification of OSS and directed the Department to identify areas where OSS can be used within the DON's IT portfolio. This was followed by another DoD-wide memorandum in 2009, which provided DoD-wide guidance and clarified the use and development of OSS, including explaining the potential advantages of the DoD reducing the development time for new software, anticipating threats, and response to continual changes in requirements.

In 2009, OMB released the Open Government Directive, which required federal agencies to develop and publish an Open Government Plan on their websites. The Open Government Plan provided a description on how federal agencies would improve transparency and integrate public participation and collaboration. As an example response to the directive support for openness, the National Aeronautics and Space Administration (NASA), in furtherance of its Open Government Plan, released the "open. NASA" site that was built completely using OSS, such as the LAMP stack and the WordPress content management system (CMS).

On May 23, 2012, the White House released the Digital Government Strategy that complements other initiatives and established principles for transforming the federal government. More specifically, the strategy outlined the need for a "Shared Platform" approach. In this approach, the federal government would need to leverage "sharing" of resources such as the "use of open source technologies that enable more sharing of data and make content more accessible".

The Second Open Government Action Plan established an action to develop an OSS policy to improve access by federal agencies to custom software to "fuel innovation, lower costs, and benefit the public". In August 2016, the White House published the Federal Source Code Policy, which is consistent with the "Shared Platform" approach in the Digital Government's Strategy, by requiring federal agencies make available custom code as OSS. Further, the policy also made "custom-developed code available for Government-wide reuse and make their code inventories discoverable at https://www.code.gov ('Code.gov')".

In this section, we discussed key milestones that have impacted the federal government's cultural acceptance of OSS. It also discussed the current policy framework that has been developed through a series of policies and guidelines to support federal agencies in the adoption of OSS and the establishment of processes and policies to encourage and support the development of OSS. The remainder of this chapter will examine the key issues that have impacted OSS adoption and briefly examine the role of OSS in the adoption of cloud computing within the federal government.

About the author:

Matthew Metheny, PMP, CISSP, CAP, CISA, CSSLP, CRISC, CCSK, is an information security executive and professional with twenty years of experience in the areas of finance management, information technology, information security, risk management, compliance programs, security operations and capabilities, secure software development, security assessment and auditing, security architectures, information security policies/processes, incident response and forensics, and application security and penetration testing. He currently is the Chief Information Security Officer and Director of Cyber Security Operations at the Court Services and Offender Supervision Agency (CSOSA), and is responsible for managing CSOSA's enterprise-wide information security and risk management program, and cyber security operations.

Read the original post:
Federal Cloud Computing - TechTarget

Teradata Acquires San Diego-based Start-up StackIQ – MarTech Series (press release)

Acquisition Bolsters Teradatas Build and Delivery Capability of On-Premises and Hybrid Cloud Solutions for Its Enterprise Customers Teradata, the leading data and analytics company, announced the acquisition of StackIQ, developers of one of the industrys fastest bare metal software provisioning platforms which has managed the deployment of cloud and analytics software at millions of servers in data centers around the globe. The deal will leverage StackIQs expertise in open source software and large cluster provisioning to simplify and automate the deployment of Teradata Everywhere. Offering customers the speed and flexibility to deploy Teradata solutions across hybrid cloud environments, allows them to innovate quickly and build new analytical applications for their business.

In addition to technology assets, the acquisition also includes StackIQs talented team of engineers, who will join Teradatas R&D organization to help accelerate the companys ability to automate software deployment in operations, engineering and end-user customer ecosystems.

Teradata prides itself on building and investing in solutions that make life easier for our customers, saidOliver Ratzesberger, Executive Vice President and Chief Product Officer for Teradata.Only the best, most innovative and applicable technology is added to our ecosystem, and StackIQ delivers with products that excel in their field. Adding StackIQ technology to IntelliFlex, IntelliBase and IntelliCloud will strengthen our capabilities and enable Teradata to redefine how systems are deployed and managed globally.

Our incredibly high standards also apply to the people we hire, continued Ratzesberger. As Teradata continues to expand its engineering (R&D) skills to drive ongoing technology innovation, we are seeking qualified, talented individuals to join our team. Once again, StackIQ has set the bar with stellar engineers who we are honored to now call Teradata employees.

Under terms of the deal, Teradata will now own StackIQs unique IP that automates and accelerates software deployment across large clusters of servers (both physical and virtual/in the cloud). This increase in automation will occur across all Teradata Everywhere deployments, dramatically reducing build and delivery times for complex business analytics solutions and adding the capability to manage software-only appliances across hybrid cloud infrastructure. The speed of Teradatas new integrated solution also allows for rapid re-provisioning of internal test or benchmarking hardware, as well as swift redeployment between technologies to match a customers changing workload requirements.

Joining Teradata, the market leader in analytic data solutions, truly validates the importance of StackIQs engineering and the talent we have cultivated over the years, saidTim McIntire, Co-Founder at StackIQ. We are looking forward to bringing a bit ofSan Diegosstart-up culture to Teradata, and working together to simplify Teradatas customer experience for system software deployment and upgrades.

Read this article:
Teradata Acquires San Diego-based Start-up StackIQ - MarTech Series (press release)