Bitcoin Price $4K by April? One Big Reason to Not Be Bullish Just Yet – Cointelegraph

Bitcoin price (BTC) increased over 10% over the past week, so it didnt take long for the usual crypto Twitter suspects to start screaming that they are all bullish now. Even I saw some bullish momentum as outlined in last week's analysis, but have we seen the bottom yet? Or is there more downside to come before we resume a bull trend?

Daily crypto market performance. Source: Coin360.com

BTC USD monthly chart. Source: TradingView

Working backward through various time frames, a look at the Moving Average Divergence Convergence (MACD) shows it crossed bearishly on Dec. 1 and the first red candle on the histogram was printed.

Bitcoin has never seen a single candle before changing the bias on the MACD in its entire history. As its one of the most widely used indicators for momentum trading, this indicates that there is bound to be a longer downward period than most traders would like to admit.

However, one positive that is worth taking note of is that the last bullish phase was the shortest the MACD has seen on Bitcoin, just 6 months of green before flipping red. As such, speculating on how much longer we could expect a bear market for is difficult.

If these phases are getting smaller and smaller the optimist in me suggests 4 months before we see a true bottom and reversal, which would put the pivot around April 1, 2020.

BTC USD BB monthly chart. Source: TradingView

Using a combination of the Bollinger Bands (BB) indicator and the monthly volume for Bitcoin, its impossible to ignore how much volume has dropped off over the last 2 years. This can be interpreted in many ways. Some may view breakouts in these conditions as very short term pumps, as theres no real interest in the asset, or some may see it as a time to be greedy when others are fearful and start accumulating.

Im off the view, that theres no interest in Bitcoin, therefore the price movements were witnessing are short term pumps as whales continue to offload their bags as they wait for the bottom.

The moving average (MA) of the BB shows $7,100 as critical support for Bitcoin. Should the price fall below $7,100 and this price level flips to resistance, we can then expect the price of Bitcoin to slowly make its way towards the support of the BB which is currently $2,500-$3,200 depending on your BB settings.

I see the bottom BB support at $3,200. However, I dont believe we will get this low. The support on the BB is gradually getting higher by the month. If it continues at this trajectory, the support could be as high as $3,800 by April 1, 2020.

This to me is a plausible target date for the bottom since the upcoming halving is expected in May, and Im not the only person that shares this view. Twitter user @22loops called the 2019 bottom with astonishing accuracy last year, and hes at again with his new year's tweet that puts Bitcoin price at around $3,797.

BTCUSD weekly chart. Source: TradingView

Moving over to the weekly BB, we can see where Bitcoin faltered last week. It was rejected precisely at the MA of $8,462 leaving the digital asset in the lower part of the Bollinger Bands.

Therefore, until Bitcoin flips the MA to support, theres no real reason to be bullish just yet.

The support here shows $6,330 as the last stronghold for Bitcoin before beginning to accept the likelihood of a sub-$4,000 Bitcoin price. However, should Bitcoin find itself on another run, breaking past the $10,000 barrier doesnt seem to be where the issue is, but slightly higher around $10,500 seems to be where wed expect to see BTC struggle.

Currently, both of these scenarios are too early to call, but with that being said, the weekly MACD is definitely giving a reason for the bulls to be excited.

BTCUSD weekly RSI chart. Source: TradingView

Whilst Im a big fan of following the weekly MACD as a very reliable indicator for Bitcoin, there is one element that I cant overlook in its current setup. If the Bitcoin price continues to stay in its current range for another 2-3 weeks, the MACD line is set to cross bullish.

However, the positioning around the zero line doesnt look too hot. If we take a look at the last 2 bullish crosses, they occurred at - 472 and -899 with the latter being the cross that had more momentum.

The cross at -472 resulted in some bullish momentum, but shortly after, the Bitcoin price fell again, and it crossed into a bear trend. What is concerning here, is that should Bitcoin cross bullish on the weekly MACD, its likely to occur somewhere around -200 below the zero line. But what does that mean for the next bullish move?

History tells us, that perhaps its too early to be screaming Bitcoin bull run from the rooftops just yet, and this is further echoed by the rather weak Relative Strength Index (RSI) indicator, which is currently only showing a reading of 46.53 on the weekly timeframe.

The daily charts, however, are starting to tell a story of what to expect when you combine all 4 indicators mentioned in this analysis.

BTCUSD daily chart. Source: TradingView

Above is what I see as a short setup. The Bitcoin price is at the top of the BB. The RSI is overbought, and the volume is declining, however, volume is typically thinner at the weekends.

The last thing Id look at is for the MACD to cross down. At present, the MACD is still strong and is yet to show signs of crossing down.

If theres a decline in the price, the MACD will start to cross down, and from here Id be looking at the BB MA as my target price which is $7,400; and this target I feel is realistic due to the gap left on the CME chart.

BTCUSD daily chart. Source: TradingView

The CME is showing a gap at $7,685. Whilst this is a very tight gap that some may argue nearly closed last week, the fact remains it is there on the charts for all to see.

Closing this gap would most certainly force the daily MACD to cross bearish, and potentially end the bullish momentum for the price of Bitcoin.

If the CME gap fills, and Bitcoin continues to fall from $7,865, then the levels of support to watch would be $7,400. If this level fails to hold, the monthly MA on the Bollinger Bands shows that $7,100 is the price to defend.

If both these levels hold, the last chance saloon for Bitcoin is $6,800 before the hodler doomsday scenarios start playing out, and from here Id be looking for another MACD bear to bull cycle before being bullish again.

Not much has changed since last week. The daily and weekly MACD are both bullish and should Bitcoin continue on this path the key resistance that must be broken remains at $8,500.

Breaking this level would change the path of Bitcoin massively, opening up much larger leaps in price towards $10,500-$11,000 levels. That being said, 2-3 weeks of flat price action is equally bullish for Bitcoin in the medium term.

The views and opinions expressed here are solely those of @officiallykeith and do not necessarily reflect the views of Cointelegraph. Every investment and trading move involves risk. You should conduct your own research when making a decision.

See the article here:
Bitcoin Price $4K by April? One Big Reason to Not Be Bullish Just Yet - Cointelegraph

Bitcoin Price Analysis: This Is The First Major Test Of 2020 In The Road To $10,000 BTC – CryptoPotato

Over the past two days, we saw Bitcoin reaching the $9000 zone, quickly getting rejected, and now Bitcoin is once again a touch away from 2020 high.

Two bullish signs to keep an eye on is the fact that Bitcoin corrected accurately into the 38.2% Fibonacci retracement level which is considered a healthy correction of a rising trend. The second fact is the fact that the coin is forming an ascending channel (marked on the following 4-hour chart).

On the other hand, this channel can easily breakdown, and things can change quickly.

The $9000 resistance area contains the significant 200-days moving average line, currently hovering around $9050 (marked by a green line on the following daily chart). By no doubt, this is the first significant test of the new decade.

By many analysts, a must-have condition for a bull market is the asset being traded above that line. Bitcoin will have to show strength and decide soon how it interacts with the primary resistance line.

If we put aside the false breakout during November, when we saw the substantial daily 42% surge, the last time Bitcoin was trading above the MA-200 took place during late September 2019.

Total Market Cap: $244.0 billion

Bitcoin Market Cap: $161.5 billion

BTC Dominance Index: 66.2%

*Data by CoinGecko

Support/Resistance levels: As of writing these lines, Bitcoin is finding support on the lower line of the ascending channel (marked on the 4-hour chart). This is the first level of support, along with $8800. Further below lies $8570 $8600 (the 38.2% Fib level). Down below is $8400 (61.8% Fib level).

From above, the next major resistance level, as mentioned, is the $9000 price area along with the MA-200. In case of a breakout, then Bitcoin is likely to surge quickly to $9300 $9400. Further above lies $9600 and $9800.

The RSI Indicator: The RSI is building a bullish triangle formation, which can fuel a possible breakout of the $9000 area. This is the highest level of the momentum indicator since June (when Bitcoin spiked to $13,880).

Trading volume: Since Tuesday, the volume had been decreased, however, the trading volume is still high compared to the monthly average.

Enjoy reading? Please share:

Disclaimer: Information found on CryptoPotato is those of writers quoted. It does not represent the opinions of CryptoPotato on whether to buy, sell, or hold any investments. You are advised to conduct your own research before making any investment decisions. Use provided information at your own risk. See Disclaimer for more information.

Cryptocurrency chartsby TradingView.Technical analysis tools byCoinigy.

Go here to see the original:
Bitcoin Price Analysis: This Is The First Major Test Of 2020 In The Road To $10,000 BTC - CryptoPotato

Google gives $1 million to UVM to advance open source research – Vermont Biz

Members of the UVM-Google team, left to right: Juniper Lovato, director of education and outreach for Complex Systems; Nick Cheney, research assistant professor, Computer Science; Jim Bagrow, associate professor, Mathematics and Statistics; Laurent Hbert-Dufresne, assistant professor, Computer Science; Julia Ferraioli, Open Source atGoogle; Peter Dodds, director of the Complex Systems Center andprofessor, Mathematics and Statistics; and Amanda Casari, Open Source at Google. (Photo: Brian Jenkins)

Vermont Business Magazine The Google Open Source Programs Office, a division of Google that manages Googles use and release of open source software and promotes open source programming, has provided the University of Vermont (UVM) Complex Systems Center a $1 million unrestricted gift to support open source research.

Open source is about more than the softwareits a framework that defines how software is created, released, shared, and distributed, as well as the community that is formed around it.

The goal of the UVM project is to deepen understanding of how people, teams and organizations thrive in technology-rich settings, especially in open-source projects and communities. The Google award will establish a collaboration between the Google Open Source team and UVM to begin building a community-oriented body of research focused on understanding how open source platforms are used and what makes technology-rich environments thrive.

UVM is deeply committed to building its thought-leadership in the area of open source science. This gift will enable our internationally-recognized Complex Systems Center faculty and students to create new knowledge on how open source communities can be most successful and transformative, said Suresh Garimella, University of Vermont president. The collaboration will also serve as a research hub, bringing together a variety of researchers in open source science, both at UVM and Google, to form a powerful network of collaborators.

"UVM has a long track record of conducting interesting and dynamic research in the space of complex systems problems of all kinds, said Chris DiBona, director of Open Source at Google. We're excited to begin this collaboration with the team at UVM, through which we hope to develop a roadmap for better understanding of open source communities, behavior and creativity.

The University of Vermont Complex Systems team has identified the initial research projects that will be conducted with the award. They include:

How people, teams, and organizations thrive in technology-rich settings.Trade-offs between organizational structure and the spread of ideas and information.Investigating how scientists and software developers use computational and collaborative tools and platforms.Understanding what conditions allow individuals and communities to succeed in open source software and open science.

Researching how people and teams interact in organizations is a powerful way to understand and advance the open source movement, said Laurent Hbert-Dufresne, assistant professor of Computer Science, and one of the principal investigators on the project. We're very excited to integrate the multidisciplinary team in the Complex Systems Center in an effort to understand how information flows in social networks and how creativity emerges.

James Bagrow, associate professor of Mathematics and Statistics, and the projects other principal investigator, underscored its collaborative nature. This is an amazing opportunity to work with fascinating new data and thought leaders. We look forward to a strongand ongoingcollaboration.

In addition to the core team, two postdoctoral positions are currently open in associated research areas. Other UVM faculty involved with the research include Josh Bongard, professor of Computer Science; Peter Dodds, professor of Mathematics and Statistics; Nick Cheney, research assistant professor of Computer Science; and Chris Danforth, professor of Mathematics and Statistics. The UVM program director is Juniper Lovato, director of outreach for the Complex Systems Center.

The Google collaboration reflects UVMs commitment to its land-grant mission to enhance the intellectual, human, economic and social capital of its community, the state, and the nation.

Continued here:
Google gives $1 million to UVM to advance open source research - Vermont Biz

Kitware Offers Latest Innovations in Healthcare Simulation with Updates to Interactive Medical Simulation Toolkit and Pulse Physiology Engine – Yahoo…

iMSTK 2.0 and Pulse 2.3 released in advance of International Meeting on Simulation in Healthcare (IMSH)

Clifton Park, NY, Jan. 17, 2020 (GLOBE NEWSWIRE) -- Kitware, a leader in open source software research and development, has released the latest versions of two of its popular medical training and simulation toolkits the Interactive Medical Simulation Toolkit (iMSTK) 2.0 and the Pulse Physiology Engine (Pulse) 2.3. Updates to these toolkits include improved models and functionality based on feedback from user and developer communities. Kitware will showcase these latest features and improvements at the International Meeting on Simulation in Healthcare (IMSH) in San Diego, January 18-22 at booth 912.

Both iMSTK and Pulse provide the technology to build virtual simulators that can help practicing surgeons, medical students, residents, and nurses to rehearse or plan medical procedures. For example, iMSTK has been used to help medical professionals prepare for biopsies, resectioning, radiosurgery, and laparoscopy without compromising patient safety in the operating room. It can also help accredit potential surgeons in basic skills for laparoscopy, endoscopy or robotic surgery. Pulse provides necessary physiologic feedback for clinicians training to provide life-saving medical treatment, such as for hemorrhage, tension pneumothorax, airway trauma, ventilator use and settings, and anaphylaxis.

Kitwares medical computing team is dedicated to advancing research solutions in the medical community, said Andinet Enquobahrie, the director of medical computing at Kitware. Whether we are collaborating with a university on research, working with our communities to improve our software platforms, or partnering with another company to integrate our software into their products and projects, our goal is to provide application developers the tools they need to develop powerful applications for medical skill training.

Story continues

iMSTK 2.0 Improves Features, Efficiency of Physics, Collision and Rendering Modules

iMSTK is a free, open source toolkit that offers product developers and researchers all the software components they need to build and test virtual simulators for medical training and planning. Release 2.0 offers improved functionality with many new features as well as refactored modules that address the ease-of-use, and extendability of the API. Specifically, it has greatly improved the features as well as the efficiency of the physics, collision modules, and rendering modules.

Here are some release highlights:

New octree collision detection adds efficient loose octree data structure for broad phase collision detection

New rigid body dynamics support for simpler geometrical shapes and surface meshes, and collision between them

Multithreading support added using Intel Thread Building Blocks (TBB)

Smoothed Particle Hydrodynamics (SPH) for simulating fluids with varied viscosity and surface tension

Extended simulation modes that allow iMSTK to work as a physics backend allowing easier integration into external software

Improved Vulkan backend, on-screen text rendering, CMake build and installation, and more.

Pulse 2.3 Improves Models and Functionality to Advance the Engine for Customer Needs

Pulse is a free, open source physiology engine that is used to rapidly prototype virtual simulation applications. These applications simulate whole-body human physiology through adult computational physiology models. Release 2.3 includes updates that were the result of Kitwares work with users to improve models and functionality of the engine.

Here are some release highlights:

C# API updates used in our Unity Asset, such as support for more actions, custom data requests to retrieve any data calculated by pulse, patient creation including chronic conditions

Magic Leap is now a supported platform by our the Pulse Unity Asset version 2.0

Significant respiratory model updates, such as changing the standard respiration rate from 16 bpm to 12 bpm; use of ideal body weight for determining lung volumes; refactored respiratory muscle driver with a new waveform, and more.

For more information about iMSTK, visit the iMSTK website. For more information about Pulse, visit the newly redesigned Pulse website or sign up for the Pulse newsletter. To receive the latest updates on all of Kitwares software platforms, subscribe to our blog.

About Kitware

Since 1998, Kitware has been providing software research and development services to customers ranging from startups to Fortune 500 companies, including government and academic laboratories worldwide. Kitwares core areas of expertise are computer vision, data and analytics, high-performance computing and visualization, medical computing, and software process. The company has grown to more than 150 employees, with offices in Clifton Park, NY; Arlington, VA; Carrboro, NC; Santa Fe, NM; and Lyon, France. For more information visit kitware.com.

Jillian CutroneKitware, Inc.jillian.cutrone@kitware.com

The rest is here:
Kitware Offers Latest Innovations in Healthcare Simulation with Updates to Interactive Medical Simulation Toolkit and Pulse Physiology Engine - Yahoo...

OC Library District to join Missouri Evergreen Library Consortium – Areawide News

Felicia Baudry with Equinox Open Library Initiative visited Alton Library to train Oregon County Library District librarians how to use the new software system that will be implemented soon.

Renee Janes

Oregon County Libraries were recently closed to introduce employees to a new software system that will enable librarians and patrons to expand their resources.

The new system they are going to use is called Evergreen, which is software being used, but they are also joining the Missouri Evergreen Library Consortium. It is a consortium of over 50 libraries that have come together to work together and collaborate to make sure they have the best quality system they can provide to their patrons, said Felicia Baudry with Equinox Open Library Consortium.

She explained Evergreen is an open source software used to manage inventory and patrons. This is what will be used to check materials in and out and add patrons. They will also be able to share their materials with other libraries within the Missouri Evergreen and other Missouri Evergreen libraries will be able to share their materials with them. It is an easy way to move materials back and forth between libraries, said Baudry.

The integrated library system will enable patrons to search what is available from other Missouri Evergreen libraries and place holds on them.

It expands their collection, said Baudry.

There are a lot of advantages to joining a library consortium. I think it maximizes the investment that all the funders give to their libraries at state and local levels. So, it expands what they can do and their reach. It helps libraries do, what I think libraries were always intended to do, which is to share information with everyone. It is a nice way to give as much as you can to the community, said Baudry.

Our patrons will be able to log on at home and place holds on books and things like that

The system will enable patrons to log on from wherever they have internet access and search the catalog and place holds on books and have them sent to an Oregon County Library.

Oregon County Library Coordinator Janice Richardson explained patrons accounts will be created when the system goes live, and they will manage their own accounts.

If an individual already has an Oregon County Library card, they will have one when the new system begins. Those without a card will need to visit an Oregon County Library to register. Logging in will not be required to search the system but will be needed to see what they have checked out and place holds on items.

We, as staff, we are doing this training now. We are excited to offer this to the community and would like for everyone to come in and see what its about and use the libraries here, said Richardson

The system will be accessible to patrons at the beginning of February.

Baudry is a trainer with Equinox Open Library Initiative. We are the organization that provides support and training and development for Missouri Evergreen. We also work closely with the Evergreen community to help support the system itself. Because of its open source, it is freely available to anybody who uses it. There is a large community around it that creates documentation, develop features, but we are just one of the organizations that participates in doing that and we are providing the support for Missouri EvergreenWe are two separate entities, but work very closely with the Evergreen community, said Baudry.

See the rest here:
OC Library District to join Missouri Evergreen Library Consortium - Areawide News

Break into the field of AI and Machine Learning with the help of this training – Boing Boing

It seems like AI is everywhere these days, from the voice recognition software in our personal assistants to the ads that pop up seemingly at just the right time. But believe it or not, the field is still in its infancy.

That means there's no better time to get in on the ground floor. The Essential AI & Machine Learning Certification Training Bundle is a one-course package that can give you a broad overview of AI's many uses in the modern marketplace and how to implement them.

The best place to dive into this four-course master class is with the Artificial Intelligence (AI) & Machine Learning (ML) Foundation Course. This walkthrough gives you all the terms and concepts that underpin the entire science of AI.

Later courses let you get your hands dirty with some coding, as in the data visualization class that focuses on the role of Python in the interpretive side of data analytics. There are also separate courses on computer vision (the programming that lets machines "see" their surroundings) and natural language processing (the science of getting computers to understand speech).

The entire package is now available for Boing Boing readers at 93% off the MSRP.

Former Vice President and current 2020 Democratic presidential hopeful Joe Biden says U.S. Section 230 should be immediately revoked for Facebook and other social media platforms, and that Mark Zuckerberg should be submitted to civil liability.

FBI needs to be able to hack into your iphone, Trumps sham AG William Barr says

Gee, thanks.

Anyone who loves biking, skiing, or snowboarding in the great outdoors knows just how difficult it can be to safely transport your gearespecially during extended trips. These three accessories make it easier than ever to securely attach your gear to your car. So if youre planning to embark on a outdoor adventure soon, youd be []

If youre looking to build a career in web development, it starts with Javascript. This programming language was there at the golden age of the internet, and its still the basis for millions of web pages and apps worldwide. Suffice to say, if youre a coder who doesnt know JS yet, youre not a coder. []

Weve all got a perfect website in our minds. In the past, the problem has been the barrier of language specifically, the computer languages used to create those glittering, animation-filled pages you flock to. Now, Mac users have an alternative. Blocs 3 is a website builder that can provide an easy visual interface for []

Excerpt from:
Break into the field of AI and Machine Learning with the help of this training - Boing Boing

Goldwater Scholar wants to use AI to help ensure justice where children are involved > News > USC Dornsife – USC Dornsife College of Letters,…

Math major Zane Durantes research seeks to revitalize endangered languages, predict whether skin lesions are cancerous and enable truthful child eyewitness testimony to be taken seriously by courts. [5 min read]

In cases of abuse or neglect by a caretaker, children are often the only witnesses. Currently, however, our legal system doesnt view their testimony as reliable. Zane Durante, a mathematics major at the USC Dornsife College of Letters, Arts and Sciences, wants to change that.

Durante has been awarded a prestigious Goldwater Scholarship for his research into how to predict whether or not children are being truthful when they provide witness testimony. Durante, who is also majoring in computer science at USC Viterbi School of Engineering, conducts his research at the schools Signal Analysis and Interpretation Laboratory (SAIL). There he analyzes written transcripts of childrens testimony using various machine learning methods and natural language processing. Machine Learning, in simple terms, is the science of getting computers to learn and make rational predictions all on their own.

Eye witness accounts are already unreliable and childrens testimony is considered to be even more unreliable, Durante says. Courts dont always use child testimony, even if it may be the only information they have on determining whether or not abuse has taken place.

Durantes research looks at the vocabulary children use in their testimony.

Basically, were trying to put a score on how certain we are that the child is telling the truth or not, given the testimony, by looking at their language, he explains.

Research may help a child witness tell the truth

The next step, Durante says, is to look at how incorporating audio and video recordings into the researchers machine learning models might improve their estimates on whether or not the child is being truthful or deceptive.

Often, when humans are trying to determine whether or not someones lying, we look at many different things, including voice pitch and micro expressions that may only last for a fraction of a second but indicate a discontinuity between what the persons saying and what theyre thinking and feeling, Durante says. Right now, were just looking at language, but ultimately we think that by incorporating these other features and data into our machine learning models, well get more accurate predictions.

While lie detectors are seen as the standard method of detecting deception, Durante notes that they actually dont work very well, with meta-analysis giving them only about a 65% accuracy rate in determining whether or not a person is lying.

Thats not usually admissible in court, and so we were really looking for something better, he said.

Rather than being used after an interview to evaluate the probability a child witness was lying, the data could ultimately be used to give feedback during the interview to improve questioning so the child is more likely to answer truthfully.

The researchers also look at the emotional content of the words and the agreeability of the language used by the child. Durante and his team have found that the more agreeable child witnesses are, the less likely they are to be telling the truth. Another conclusion is that advanced vocabulary can be a sign of truthfulness because the child is being more descriptive.

Machine learning for social good

Durantes interest in machine learning was sparked in the fall of his freshman year when he joined the Center for AI in Societys student branch, CAIS++. The undergraduate group has student members from a wide range of majors, including engineering, computer science, computational linguistics, neuroscience and mathematics, all of whom are interested in machine learning and its applications for social good.

I liked math and I liked computer science, and machine learning is this really interesting intersection of both, Durante says.

After studying machine learning in the fall, CAIS++ members apply what theyve learned to a project for social good in the spring. Durante led the curriculum last semester, teaching undergraduates machine learning skills, and he will be leading a group through a project this semester

USC Dornsife math major Zane Durante believes his future lies in innovating new methods and applications of machine learning. (Photo: Sajeev Saluja.)

His first project in CAIS++ looked at a type of neural network that could be used to predict whether an image of a skin lesion is malignant or benign. This would have applications for people who couldnt see a dermatologist.

His second project, led by USC Dornsifes Khalil Iskarous, associate professor of linguistics, focused on Ladin, an endangered language in Northern Italy.

Durante felt a personal connection to the project because his father spoke a Northern Italian dialect as his first language.

A major part of any language revitalization process involves linguists transcribing audio data of the spoken language by writing down the phonemes the basic units of sound in a language, like the d sound in dog. This enables them to understand how its spoken and to reconstruct it. Its a slow and laborious process.

It can take four hours to annotate one hour of English audio data, and the process is much slower for endangered languages, Durante says.

To speed it up, Durante and his fellow students are developing an auto-complete process using machine learning to predict phonemes.

At the core of all of the machine learning algorithms that Durante uses in his research is a lot of linear algebra and probability both of which he learned in his USC Dornsife math classes.

Both of those math classes build fundamentals that are necessary if you want to understand at a deep level what the algorithms are doing so you can make modifications to improve them or be more innovative, he said.

Born in Houston to a professor of pharmacology and a medical researcher, Durante moved to Columbia, Missouri, with his family at age 6. He originally aimed to study pre-med courses at university but switched to math and computer science toward the end of high school.

Now he believes his future lies in innovating new methods and applications of machine learning.

Whether thats just new machine learning methods, new methods in natural language processing or computer vision, or some combination of the two, I want to be working on the frontier and pushing the field forward, he says.

Over the summer, he completed an internship at Google where he developed artificial intelligence tools for Google Cloud.

Durante believes AI will speed up many things that society or humanity in general has traditionally been slow at doing, bringing many benefits.

While noting the ethical concerns around the use of AI and acknowledging that he has reservations of his own about some of its potential uses, he says he remains optimistic that the benefits to humanity will outweigh any negative use.

Historically, we can see that as technologies improve, the quality of life has improved tremendously as a result. So, I think anything like machine learning that will make things easier for humans will just make life better for everyone.

More here:
Goldwater Scholar wants to use AI to help ensure justice where children are involved > News > USC Dornsife - USC Dornsife College of Letters,...

Edward Snowden Says The Most Powerful Institutions In Society Have Become The Least Accountable – Moguldom

Written by Ann Brown

Jan 15, 2020

Edward Snowden, the former National Security Agency (NSA) contractor turned whistleblower, recently declared: The most powerful institutions in society have become the least accountable to society.

In 2013, Snowden copied and leaked highly classified information from the NSA when he was a CIA employee and subcontractor. He handed over documents to journalists that detailed surveillance programs run by the NSA. The documents revealed that the NSA has tapped cell phone and Internet communications of people in the general public.

Listen to GHOGH with Jamarlin Martin | Episode 68: Jamarlin Martin Jamarlin talks about the recent backlash against Lebron James for not speaking up for Joshua Wong and the violent Hong Kong protestors.

At a recent Web Summit technology conference in Lisbon, Portugal, Snodwn asked the audience via video link: What do you do when the most powerful institutions in society have become the least accountable to society?

He added: Thats the question our generation exists to answer.

Snowden, who was charged with espionage and theft of government property and had his passport revoked, is living in asylum in Russia. He recently released a memoir, Permanent Record, for which the U.S sued him, alleging he violated non-disclosure agreements he signed when he worked with the NSA and CIA.

They dont like books like this being written, Snowden said. We have legalized the abuse of the person through the personal, he said, adding that the widespread collection of data by governments and corporations entrenches a system that makes the population vulnerable for the benefit of the privileged.

According to Snowden, there is too much attention being placed on data protection when it should be focused on data collection, which he says is the true problem. The problem isnt data protection, the problem is data collection, he noted. Regulation and protection of data presumes that the collection of data in the first place was proper, that it is appropriate, that it doesnt represent a threat or a danger.

The General Data Protection Regulation (GDPR) is a regulation in EU law on data protection and privacy in the European Union and the European Economic Area. Introduced last year, GDPR threatens to impose fines of up to 4 percent of a companys global annual revenues or 20 million euros ($22.3 million) whichever is the higher amount, CNBC reported.

Today those fines dont exist, Snowden argued, and until we see those fines every single year to the Internet giants until they reform their behavior and begin complying not just with the letter but the spirit of the law, it is a paper tiger.

See the original post:
Edward Snowden Says The Most Powerful Institutions In Society Have Become The Least Accountable - Moguldom

AP Explains: The Justice Department’s New Quarrel With Apple – The New York Times

WASHINGTON The deadly shooting of three U.S. sailors at a Navy installation in December could reignite a long-simmering fight between the federal government and tech companies over data privacy and encryption.

As part of its probe into the violent incident, deemed a terrorist act by the government, the Justice Department insists that investigators need access to data from two locked and encrypted iPhones that belonged to the alleged gunman, a Saudi aviation student. The problem: Apple designed those iPhones with encryption technology so secure that the company itself can't read private messages.

The squabble raises two big questions. First, is Apple required to help the government hack its own security technology when requested? Second, is government pressure on this issue the prelude for a broader effort to outlaw encryption technology the feds can't break?

THE QUARREL SO FAR

The Justice Department and Apple have been in talks recently over the Saudi students iPhone. Justice officials contend that they still havent received an answer about whether Apple has the capability to unlock the devices.

During a news conference Monday announcing the findings of the Pensacola station investigation, U.S. Attorney William Barr said its critical for law enforcement to know with whom the shooter communicated and about what, before he died.

So far, Apple has not given any substantive assistance, Barr said. We call on Apple and other technology companies to help us find a solution so that we can better protect the lives of the American people and prevent future attacks.

Apple rejected that characterization. "Our responses to their many requests since the attack have been timely, thorough and are ongoing, the company said.

TRYING THE BACKDOOR

Our phones hold countless messages, files and photos tracings of our everyday life and work. But in 2013, the whistleblower Edward Snowden revealed the extent to which the government was spying on U.S. citizens. Tech companies like Apple and Google began taking steps to shield those digital tracings from prying eyes though often not their own by mathematically scrambling them with encryption.

Apple was one of the first major companies to embrace stronger end-to-end encryption, in which messages are scrambled so that only their senders and recipients can read them. Law enforcement, however, wants access to that information in order to investigate crimes such as terrorism or child sexual exploitation.

Barr and other top cops call the problem going dark, as data they used to be able to scoop up with wiretaps has become harder and harder to read.

Although most law enforcement officials are vague about how to solve the problem, security experts say the authorities are basically asking for an engineered backdoor a secret key that would let them decipher encrypted information with a court order.

But the same experts warn that such backdoors into encryption systems make them inherently insecure. Just knowing that a backdoor exists is enough to focus the world's spies and criminals on discovering the mathematical keys that could unlock it. And when they do, everyone's information is essentially vulnerable to anyone with the secret key.

WHAT LAW ENFORCEMENT CAN DO

Forcing tech companies to engineer backdoors into their security systems would almost certainly require an act of Congress. Legislators, however, have never come close to agreeing on what such a law should look like.

But there are alternatives. Four years ago, the Justice Department took the extraordinary step of asking a federal judge to force Apple to break its own encryption system. The legal move involved an iPhone used by the perpetrator of a December 2015 mass shooting in San Bernardino, California.

Apple acknowledged that it could create the software the feds wanted, but warned that it would be a bad idea. The software could be stolen by hackers and used against other iPhones, the company warned, and might also lead to similar demands from repressive governments around the world.

The FBI ultimately dropped the case shortly before it was to go to trial, saying a third party had found another way of getting into the phone. It never disclosed who that party was; there is an entire industry of shadowy companies such as the Israeli firm Cellebrite that discover or pay for information on flaws in encryption systems. These firms then develop tools to essentially create their own backdoors.

Such companies do significant business with governments and law enforcement. Companies like Apple, meanwhile, do their best to close such loopholes as soon as they learn about them.

WHERE THINGS STAND NOW

Apple is reportedly bracing for another possible legal fight over encryption with the Justice Department. So far, though, there's no clear sign that the government is headed that way .

Theyre just public shaming and asking nicely, said Bruce Schneier, an encryption expert at the Berkman Klein Center for Internet and Society at Harvard University. Hurting everybodys security for some forensic evidence is a dumb tradeoff.

Barr said the growth of consumer apps with end-to-end encryption, from Apple's iMessage to Facebook's WhatsApp and Signal, have aided terrorist organizations, drug cartels, child molesting rings and kiddie porn-type rings. But the government's legal options could be limited.

For one thing, DOJ's own inspector general slammed the department in the aftermath of the San Bernardino case, noting that it had made few attempts to break into the iPhone itself before filing suit. The FBI unit tasked with cracking phones had only sought outside help the day before the department asked a judge to compel Apple's assistance, the inspector general's report found.

The same report found that an FBI section chief knew an outside vendor had almost 90% completed a technique that would have allowed it to break into the phone, even as the Justice Department insisted that forcing Apples help was the only option.

Civil liberties advocates have also protested. The American Civil Liberties Union called Barrs demands dangerous and unconstitutional.

Here we are again, Schneier said. It's stupid every time.

___

Associated Press writer Michael Balsamo contributed to this report.

See more here:
AP Explains: The Justice Department's New Quarrel With Apple - The New York Times

Trump and Comey Are United Against Encrypted Communications – Reason

For all the public sparring between the two inflated egos known as Donald Trump and James Comey, the president and the former FBI director have some important commonalities. For starters, they both hate it when the common people keep secrets from the ruling class of which they represent competing factions.

The point of agreement between the two political antagonists became clear on January 14, when President Trump complained that Apple executives "refuse to unlock phones used by killers, drug dealers and other violent criminal elements." Some of us poked at our ears, wondering if we were hearing echoes. After all, not so long ago, as head of the FBI, Comey tried to force Apple to unlock encrypted cell phones and raged that Apple, Google, and other companies "market something expressly to allow people to place themselves beyond the law."

Trump agreed with Comey back then, too, by the way; in 2016, he called for a boycott of Apple until such time as the company helped the FBI break iPhone security.

Apparently, not as much divides these two men as they like to let on.

In public, Trump calls Comey a "disgrace" and Comey fires back at a man he calls a "strange and slightly sad old guy." Butaside from the fact that they're both correct about each other's flawsthat's intramural combat between power addicts over who should wield the power. That the public should be poked, prodded, and intruded upon is a given for Comey and Trump. And it's a sentiment that binds so many of our would-be lords and masters in public office.

The shared nature of official nosiness becomes clear when you remember last November's bipartisan vote to extend the Patriot Act, a measure that the Electronic Frontier Foundation says "broadly expands law enforcement's surveillance and investigative powers and represents one of the most significant threats to civil liberties, privacy, and democratic traditions in US history." Even as Democrats debated impeaching Donald Trumpa move they later approvedthey overwhelmingly joined with the Trump administration to support the surveillance bill's extension.

Trans-partisan hand-holding on surveillance state measures is certainly nothing new among the political class. The Patriot Act originally passed during the presidency of Republican President George W. Bush, but with plenty of cross-aisle support.

"I drafted a terrorism bill after the Oklahoma City bombing," senator and current leading Democratic presidential wannabe Joe Biden boasted to The New Republic after the Patriot Act's passage. "And the bill John Ashcroft sent up was my bill."

Biden's anti-privacy efforts extend back so far that he inspired Phil Zimmermann to complete the development of PGP encryption software.

Later, as vice president, Biden threatened countries that considered offering asylum to surveillance whistleblower Edward Snowden.

Sen. Elizabeth Warren (D-Mass.), another leading contender for the Democratic presidential nomination, frets that the data encrypted communications will "allow companies to hide from 'government spying'such as text messages and chatroom transcriptshave proven to be 'key evidence' in previous regulatory and compliance cases."

It seems Trump and Comey are in good company on the issue. Well, good-ishfor a certain D.C.-centric value of the word.

"Lawmakers are giving big tech firms an ultimatum: Give police access to encrypted communications or we'll force you," The Washington Post reported last month.

"It ain't complicated for me," Senate Judiciary Committee Chairman Lindsey Graham (R-S.C.) told representatives from Facebook and Apple at a Capitol Hill hearing in December. "You're going to find a way to do this or we're going to do it for you."

"You all have got to get your act together or we will gladly get your act together for you," said Sen. Marsha Blackburn (R-Tenn.), who also sits on the judiciary committee.

Ranking Democratic member Dianne Feinstein (Calif.), meanwhile, said she is "determined to see that there is a way that phones can be unlocked when major crimes are committed," whether tech companies like it or not.

And so on. Trump and Comey's frenemy act opposing communications privacy for people who don't draw government paychecks is the rule, not the exception.

Sure, there are some surveillance skeptics and privacy advocates among the political class. But they're rare, and except for a very few civil liberties-oriented and government-skeptic types who are usually on the outs with the real powerbrokers, they're awfully unreliable on the issue.

The problem is that the Trumps, Comeys, Grahams, Bidens, Feinsteins, Blackburns, and Warrens of the world largely agree that the government that defines their lives and gives them importance should be vastly powerful. The rationales they come up with depend on the specific priorities of the politician in question, the cultural moment, and the audience, but they're forever arguing in favor of an intrusive state from which we can keep no secrets.

"It had become clear, to me at least, that the repeated evocations of terror by the political class were not a response to any specific threat or concern but a cynical attempt to turn terror into a permanent danger that required permanent vigilance enforced by unquestionable authority," whistleblower Edward Snowden wrote of his growing awareness of what lay behind the surveillance state in Permanent Record, his 2019 memoir.

Substitute "violent criminal elements" or "criminal action by Wall Street" or "child abusers" or any other justification politicians might come up with if you wish, but it all leads in the same direction. Ultimately, the members of the political class may fight tooth and nail, but it's not over whether Leviathan should paw through our communications. They just disagree over who should be in charge of the pawing.

Read more:
Trump and Comey Are United Against Encrypted Communications - Reason