Bitcoin Cash Price Prediction: 100-DMA is the level to beat for the bulls – FXStreet

Bitcoin Cash(BCH/USD) hit fresh seven-week highs in the overnight trades and since then has entered a phase of upside consolidation above the 222 handle. With the retracement, the price has stalled its two straight days of recovery, as the bulls catch a breath before the next leg higher. The worlds fifth-most favorite digital asset, currently, trades close to the 224 level amid the weekend love prevalent across the crypto space. The coin posts small losses so far this Sunday, although it gains 0.50% over the last 24 hours. The market capitalization for BCH/USD stands at $4.10 billion.

An inverse head and shoulders pattern was confirmed on the daily sticks last Friday after the price broke above the neckline placed near 213 levels. The pattern is usually seen as a bullish reversal after the BCH bulls staged a solid comeback from weekly lows of 191.77. Given the pattern validation, the No. 5 coinremains on track to conquer the pattern target of 262.95 over the coming weeks.

However, ahead of the aforementioned target, the bulls need to clear the immediate resistance aligned at the horizontal 100-day Simple Moving Average (DMA), now at 229.61. Only a daily closing above the last would give the much-needed impetus to the buyers, in order to extend the bullish momentum in the near-term.

A failure to take out the 100-DMA hurdle, the sellers could regain control knocking-off the rates back to the now resistance-turned-support of the pattern neckline. The next support awaits at the bearish 50-DMA of 209.35, which could slow the pace of declines. Meanwhile, the horizontal 21-DMA support at 198.50 is the key level to beat for the bears further south.

Link:
Bitcoin Cash Price Prediction: 100-DMA is the level to beat for the bulls - FXStreet

TRON will overtake Ethereum, says Bitcoin influencer Wertheider – Crypto News Flash

Udi Wertheimer, a Bitcoin (BTC) influencer and independent developer, made a prediction about the future of Ethereum (ETH) and Tron (TRX). Through his Twitter account he said that the platform led by Justin Sun will surpass Ethereum in the development of decentralized applications (dApps).

Through his Twitter account, Wertheimer referred to the cooperation between Tron and Poloniex, which began last October when Tron CEO Justin Sun joined the exchange as an investor. Wertheimer commented on this as follows:

Watching Justin Sun discussing Tron+Poloniex. Tron is *so* going to flippen Ethereum in the next year or so, its not even funny. All of the DeFi bois dont realize it yet, but theyre going to work for Just when he acquires ConsenSys.

The CEO of Tron and the exchange platform have announced that they will continue to expand their partnership. At the end of last year, Poloniex took over the decentralised exchange TRXMarket and renamed it Poloni DEX. Poloniex has also listed all Tron-based tokens on the trading platform. As part of the cooperation Poloni DEX has also become one of the 127 super-representatives of Tron.

The developer also made a list of the advantages of Tron over Ethereum, why Tron has the potential to beat the rival this year. However, the developers ironic tone was evident in this and the following statements:

TRON: More blocks, more transactions, fast development, business acumen, more use cases, proven to be censorship resistant so far.

ETHEREUM: Slow, inefficient, inflexible, development hell, complete lack of business skills, tyrants censoring whatever they dislike.

The disadvantages he listed with Ethereum are to a great extent those that Tron critics often cite. Wertheimer even conducted a survey in which he asked his followers what platform would displace Ethereum during 2020. The options were Tron (it got 43.7% of 2,465 votes), EOS (18.1%), Litecoin (17.5%) and Dash (20.6%). Ironically, the developer said that competitors of Tron have approached him so that he does not speak in favor of the platform.

The fact that the developer does not mention major smart contract projects such as Cardano and Tezos, but does include Dash and Litecoin, only reinforces the ironic tone of his statements.

Regardless of this, the crypto community is beginning to react and is looking for alternatives to replace the streaming platform YouTube. This is due to recent events when Youtube blocked by randomly content related to cryptocurrencies. The platform lifted the blockade and eventually the content was restored.

However, this fact surprised the community and many, like Ethereum co-founder Vitalik Buterin, asked for an alternative. At this point, it looks like Tron might have an advantage. A deal between the Tron Foundation, Twitch and the DLive streaming service will allow the latter to switch to the Tron blockchain.

As reported by Sun, DLive will switch to BLive, the streaming platform introduced by BitTorrent, once the migration is complete. DLive is a distributed service that has built a large community. One of DLives key contributors is the content creator and the youtuber with the largest number of followers, PewDiePie.

Although the crypto community has responded positively to Suns announcement, the opposite is true for the DLive community. The latter have expressed skepticism and nervousness about DLives migration to Trons blockchain. The Foundation behind the cryptocurrency does not have the best reputation on issues related to censorship.

A team of developers experienced it first hand. POP Network was censored from the Tron network because their project was a potential threat to BitTorrent and one of the products offered by Trons partner. It remains to be seen whether the doubts of the DLive community are justified or whether Sun will be able to build the alternative that the community needs.

The price of Tron is at $0.0133, at the time of publication, and has been moving sideways (-0.54%) in the last 24 hours.

Follow us on FacebookandTwitterand dont miss any hot news anymore! Do you like ourprice indices?

Last Updated on 4 January, 2020

Go here to see the original:
TRON will overtake Ethereum, says Bitcoin influencer Wertheider - Crypto News Flash

Encryption Software Market Size, Outlook on Key Growth Trends, Factors and Forecast to 2026 – ReportsPioneer

New Jersey, United States, The report is a brilliant presentation of critical dynamics, regional growth, competition, and other important aspects of the Encryption Software Market. The factual, unbiased, and thorough assessment of the global Encryption Software market presented in the report assures players of access to much-needed information and data to plan effective growth strategies. The report has made a brilliant attempt to provide a comprehensive research study on industry value chain, major companies, deployment models, and key opportunities, drivers, and restraints of the global Encryption Software market. It shows how the global Encryption Software market will advance or lack growth during each year of the forecast period. Readers are offered with detailed and near-accurate predictions of CAGR and market size of the global Encryption Software market and its important segments.

Global Encryption Software Market was valued at USD 3.32 billion in 2016 and is projected to reach USD 30.54 billion by 2025, growing at a CAGR of 27.96% from 2017 to 2025.

Besides an exhaustive evaluation of leading trends of the global Encryption Software market, the report offers deep analysis of market development and future market changes. It includes Porters Five Forces analysis, PESTLE analysis, and qualitative as well as quantitative analysis for complete research on the global Encryption Software market. It closely focuses on technological development of the global Encryption Software market and its impact on the business of market players. With the help of the report, players will be able to become familiar with production and consumption trends of the global Encryption Software market.

Request a Sample Copy of this report @https://www.verifiedmarketresearch.com/download-sample/?rid=1826&utm_source=RPN&utm_medium=009

Top 10 Companies in the Global Encryption Software Market Research Report:

Vendor Landscape Analysis

The competitive landscape of the global Encryption Software market is extensively researched in the report. The analysts have largely concentrated on company profiling of major players and also on competitive trends. All of the companies studied in the report are profiled on the basis of production, revenue, growth rate, markets served, areas served, market share, and market growth. The report will help readers to study significant changes in market competition, the level of competition, and factors impacting future market competition. It discusses important target market strategies that leading players are expected to adopt in future. In addition, it throws light on future plans of key players.

Market Segmentation

The report offers deep insights into leading segments of the global Encryption Software market and explains key factors helping them to collect a larger share. It provides accurate growth rate and market size achieved by each segment during the forecast period. This will help players to identify lucrative segments and plan out specific strategies to gain maximum profit from them. The report also includes sales growth, revenue, and price changes observed in important segments. Most importantly, the segmental analysis equips players with useful information and data to make the best of opportunities available in different segments.

Regions Covered in the Global Encryption Software Market:

Ask for Discount @https://www.verifiedmarketresearch.com/ask-for-discount/?rid=1826&utm_source=RPN&utm_medium=009

Table of Content

1 Introduction of Encryption Software Market

1.1 Overview of the Market 1.2 Scope of Report 1.3 Assumptions

2 Executive Summary

3 Research Methodology of Verified Market Research

3.1 Data Mining 3.2 Validation 3.3 Primary Interviews 3.4 List of Data Sources

4 Encryption Software Market Outlook

4.1 Overview 4.2 Market Dynamics 4.2.1 Drivers 4.2.2 Restraints 4.2.3 Opportunities 4.3 Porters Five Force Model 4.4 Value Chain Analysis

5 Encryption Software Market, By Deployment Model

5.1 Overview

6 Encryption Software Market, By Solution

6.1 Overview

7 Encryption Software Market, By Vertical

7.1 Overview

8 Encryption Software Market, By Geography

8.1 Overview 8.2 North America 8.2.1 U.S. 8.2.2 Canada 8.2.3 Mexico 8.3 Europe 8.3.1 Germany 8.3.2 U.K. 8.3.3 France 8.3.4 Rest of Europe 8.4 Asia Pacific 8.4.1 China 8.4.2 Japan 8.4.3 India 8.4.4 Rest of Asia Pacific 8.5 Rest of the World 8.5.1 Latin America 8.5.2 Middle East

9 Encryption Software Market Competitive Landscape

9.1 Overview 9.2 Company Market Ranking 9.3 Key Development Strategies

10 Company Profiles

10.1.1 Overview 10.1.2 Financial Performance 10.1.3 Product Outlook 10.1.4 Key Developments

11 Appendix

11.1 Related Research

Request Customization of Report @ https://www.verifiedmarketresearch.com/product/global-encryption-software-market-size-and-forecast-to-2025/?utm_source=RPN&utm_medium=009

Highlights of Report

About Us:

Verified market research partners with clients to provide insight into strategic and growth analytics; data that help achieve business goals and targets. Our core values include trust, integrity, and authenticity for our clients.

Analysts with high expertise in data gathering and governance utilize industry techniques to collate and examine data at all stages. Our analysts are trained to combine modern data collection techniques, superior research methodology, subject expertise and years of collective experience to produce informative and accurate research reports.

Contact Us:

Mr. Edwyne Fernandes Call: +1 (650) 781 4080 Email: [emailprotected]

Read the original:
Encryption Software Market Size, Outlook on Key Growth Trends, Factors and Forecast to 2026 - ReportsPioneer

The Week in Ransomware – January 3rd 2020 – Busy Holiday Season – BleepingComputer

Normally ransomware activity slows down over the December break, but this year was an exception with a quite a few interesting, and sad, stories such as FBI alerts being issued, companies being shut down, and organizations being encrypted by a variety of ransomware, and stolen data being released.

Maze continues their attack on victim's who have not paid by publishing stolen data, which led to them being sued by one of their victims, Southwire, who was able to get the Maze news site shutdown in Ireland.

In addition we saw attacks on a university in the Netherlands by Clop and a disclosure by the U.S. Coast Guard that Ryuk took down a maritime facility.

Sadly, ransomware also caused a company to temporarily shut down right before Christmas because they could not afford to keep running after a ransomware attack.

On the bizarre side, we also had ransomware attackers offering discounts and season's greetings for the holidays.

Finally, like any other week, we continue to see new variants of existing ransomware being released with new extensions and improvements to their malware executables and infection procedures.

Contributors and those who provided new ransomware information and stories this week include: @struppigel, @BleepinComputer, @PolarToffee, @malwrhunterteam, @Seifreed, @malwareforme, @FourOctets, @demonslay335, @DanielGallagher, @jorntvdw, @fwosar, @LawrenceAbrams, @serghei, @Ionut_Ilascu, @VK_Intel, @coveware. @M_Shahpasandi. @thyrex2002, @Tesorion_NL, @malwareforme, @Amigo_A_, and @siri_urz.

Michael Gillespiefound new variants of the Stop Djvu Ransomwarethat append the .piny or .redlextensions to encrypted files.

The FBI has issued a warning to private industry recipients to provide information and guidance on the LockerGoga and MegaCortex Ransomware.

Wary of alarming investors, companies victimized by ransomware attacks often tell the SEC that malware or a security incident disrupted their operations.

A Sherwood telemarketing agency has unexpectedly closed its doors, leaving over 300 employees without jobs a few days before Christmas.

Michael Gillespie found a new variant of the Matrix Ransomware that appends the.BDDYand drops a ransom note named #BDDY_README#.rtf.

The actors behind the Maze Ransomware have released 2GB of files that were allegedly stolen from the City of Pensacola during their ransomware attack.

A new version of the Ryuk Ransomware was released that will purposely avoidencrypting folders commonly seen in *NIX operating systems.

Alex Sviridfound a new variant of the WannaCash ransomware that appends the ".happy new year" extension to encrypted file names.

The U.S. Coast Guard (USCG) published a marine safety alert to inform of a Ryuk Ransomware attack that took down the entire corporate IT network of a Maritime Transportation Security Act (MTSA) regulated facility.

Maastricht University (UM) announced that almost all of its Windows systems have been encrypted by ransomware following a cyber-attackthat took place on Monday, December 23.

M. Shahpasandifound a new Phobos Ransomware variant that appends the .Dever extension to encrypted files.

Jackfound a new ransomware called c0hen Locker that appends the.c0hen extension to encrypted files. The unlock key is12309482354ab2308597u235fnq30045f.

The anonymous operators behind the Maze Ransomwareare being sued by a victim for illegally accessing their network, stealing data, encrypting computers, and publishing the stolen data after a ransom was not paid.

To celebrate the holidays, ransomware operators are providing discounts or season'sgreetings to entice victims into paying a ransom demand.

The breadth and magnitude of ransomware attacks occurring today suggest that the cyber extortion industry has evolved exponentially over the past 12 months. It is as difficult to keep up with the headlines as the security advice that follows. In the face of this media firehose, it is important to step back and understand how we got to the state. We feel there are three primary elements that have lead to the current state of cyber extortion, and ransomware in particular.

Tesorion has previously releaseddecryptorsfor the Nemty ransomware up to version 1.6. Recently, new versions of Nemty have appeared in the wild. In this blog post we describe how a weird variant of AES-128 counter mode (CTR) encryption is used in Nemty 2.2 and 2.3 for its file encryption. We also announce the availability of afree decryptorfor common office documents encrypted by Nemty 2.2 and 2.3.

Michael Gillespie found a new Dharma Ransomware variant that appends the.RIDIKextension to encrypted files.

Michael Gillespie found a new WannCryFake variant called AWT Ransomware that appends the .AWT extension to encrypted files and drops a ransom note named ReadMe.txt.

S!Rifound a new ransomware called Zeoticus that appends the .zeoticus extension to encrypted files.

Organizations in the private sector received an alert from the F.B.I. about operators of the Maze ransomware focusing on companies in the U.S. to encrypt information on their systems after stealing it first.

The Clop Ransomware continues to evolve with a new and integrated process killer that targets some interesting processes belonging to Windows 10 apps, text editors, programming IDEs and languages, and office applications.

MalwareHunterTeamfound a new in-development ransomware called "SlankCryptor Profit Only" that appends.slank extension to encrypted files.

Go here to see the original:
The Week in Ransomware - January 3rd 2020 - Busy Holiday Season - BleepingComputer

Maastricht University gets almost all of its Windows systems encrypted by ransomware – 2-spyware.com

Netherlands Maastricht University becomes a victim of ransomware just before Christmas

On December 24, Maastricht University, also dubbed as UM, released an official report about a ransomware attack that managed to encrypt almost all of its Windows systems. The attack against the University was performed on December 23 and complicated the use of email-related services:[1]

Maastricht University (UM) has been hit by a serious cyber attack. Almost all Windows systems have been affected and it is particularly difficult to use e-mail services.

There are no particular details on what type of ransomware virus attacked the institution and also no data whether the criminals managed to steal any private data before locking it with the encryption key or not. However, UM is trying to find out if there was any information accessed.

Maastricht University is a successful educational institution located in the Netherlands, having 18,000 students, even a greater number of alumni 70,000 and 4,400 employees. Additionally, during the past two years, this institution has also been included in the top 500 universities.[2]

Sadly, when everybody was celebrating Christmas Eve, Maastricht University had to deal with a ransom attack. The authorities have explained that they worked on the attack by putting all the systems down as a protective measure. It might take some time until they will be put up again. However, even it is still unknown when the systems will be available again due to the ongoing investigation process,[3] the doors of the UM buildings will be open from January 2 to all students again.

University's staff has also been working with law enforcement agencies while trying to investigate this attempt deeper. The institution is expecting to find out methods that would allow it to avoid similar attacks in the upcoming future and identify the current damage.[4]

The attack targeting Maastricht University is not the only one that has been reported during these days. The United States Coast Guard operation was also taken down due to a ransomware attack. This time, the malware that was spread via phishing email messages and included a malicious hyperlink that was the hidden ransomware payload was Ryuk ransomware.[5]

Ransomware viruses are one of the most dangerous threats that are lurking out in the cybersphere. Malicious actors manage to deliver these viruses through infected emails and attachments or hyperlinks, cracked software, malvertising, and other deceptive strategies. Afterward, the ransomware launches its encryption module and locks all data that is placed on the infected computer.

Then, this dangerous threat demands a particular ransom price via a ransom note. Even though the money amount for regular users can be only $50 or $200 in Bitcoin, the cybercriminals are very likely to demand a big sum from worldwide organizations, companies, and institutions that can come up to $1 million in BTC or another type of cryptocurrency.

See more here:
Maastricht University gets almost all of its Windows systems encrypted by ransomware - 2-spyware.com

Codes and Ciphers – OUPblog

My book group recently read a 2017 mystery calledThe Lost Book of the Grailby Charlie Lovett. In the novel, an English bibliophile and an American digitizer track down a mysterious book thought to lead to the Holy Grail. The chief clue: a secret message hidden in the rare books collection of the fictional Barchester Cathedral Library. The message is a complex polyalphabetic substitution cipher that can only be solved by finding key words hidden in the books. Coded messages are common plot devices, used not just by Dan Brown but also by Edgar Allan Poe, Sir Arthur Conan Doyle, Jules Verne, Dorothy Sayers, Agatha Christie, and Neal Stephenson, among many others.

Aficionados distinguish among codes and ciphers. They also talk about steganography, which involves hiding messages, sometimes covertly as in a microdot and sometimes in plain sight as when the first letters of the paragraphs of a text spell out a word. Aficionados also refer to anagrams, which are expression made up by rearranging the letter (or numbers) of another expression. My name, for example, anagrams as BATTLED WAISTLINE.

There is also a distinction between codes and ciphers. A code is a technique for rendering one set of meanings using other, usually shorter, symbols. In early Morse Code telegraphy, for example, a word in the code book could be used to stand for a whole sentence or phrase, enabling efficient messaging. Stenographers and journalists use shorthand and the US Secret Service uses code names for its protecteeslike Lancer (for JFK) and Rawhide (for Ronald Reagan). Ciphers refer to messages which are systematically altered by some algorithm, such as replacing one symbol for another. Cryptography refers to both ciphers and codes.

How do ciphers work? The classic example is one called the Caesar shift. This is an encryption in which each character is replaced by one a certain number of places down the alphabet. Julius Caesars encrypted messages were said to use a shift of three characters to the left. Edwin Battistella would become BATFK YXQQFPQBIIX. Simple ciphers like the Caesar shift are (said to be) easy to decrypt.

In literary works, such as mystery and spy fiction, encrypted messages can be used as plot devices, obstacles for the protagonists to overcome. Or they can be used as part of the plot itself, where the technique of decipherment is a major part of the story. In Arthur Conan Doyles short story The Adventure of the Dancing Men, a woman named Elsie Patrick is harassed by coded messages in which each character looks like a dancing person. Realizing the messages are written in a substitution cipher, Sherlock Holmes deciphers them by analyzing the frequency of the symbols. He explains to Watson that E is the most common letter in the English alphabet, and it predominates to so marked an extent that even in a short sentence one would expect to find it most often. Noting that T, A, O, I, N, S, H, R, D, and L are the next most frequent letters, he quickly deciphers the message, which said. Elsie, prepare to meet thy God.

Sometimes the cipher appears quite complex. Edgar Allan Poe used one as a plot device in his story The Gold Bug. The cipher was supposedly devised by Captain William Kidd, the Scottish pirate, giving directions to his buried treasure. Its a simple letter-to-symbol cipher using numbers and punctuation marks, but without spaces between the word divisions. Poes fictional cryptographer solves the cipher by using frequency analysis. You can give it a try yourself. Heres a clue, the letters E T A O I N S H R D L are represented by 8 ; 5 6 * ) 4 ( 0.

53305))6*;4826)4.)4);806*;488

60))85;;]8*;:*883(88)5*;46(;88*96

*?;8)*(;485);5*2:*(;4956*2(5*4)8

8*;4069285);)68)4;1(9;48081;8:8

1;4885;4)485528806*81(9;48;(88;4

(?34;48)4;161;:188;?;

Figuring out the cipher inThe Lost Book of the Grailwas more complex, and the deciphering takes place over many pages of the novel. Frequency analysis leads the protagonists to the letters U, Q and D, which they associate with the Latin wordsunus, quinqueanddecem:1, 5, and 10.The numbers point to books and chapters in the librarys medieval manuscript collection where the key words are found. That discover allows the cipher be decrypted by using the key to partially scramble the alphabet. So the keywordcorpusgoes before the English alphabet minus the letters in the key. The keyed English is aligned with the slightly shorter Latin alphabet (missing J and W, which were absent in classical Latin).

C O R P U S A B D E F G H I J K L M N Q T V W X Y Z

A B C D E F G H I K L M N O P Q R S T U V X Y Z

Ultimately, the key allows the protagonists to decipher strings like JULMCURQF CMQJLCHIQ UGBCULUFD as PERSAECUL ASUPRANOV EMHAERELI orper saecula supra novem hae reli-. Finding successive keys and applying them to further bits of text, they decipher the full Latin message. Its a complex puzzle spread over nearly sixty pages.

Not all secrets are so complex. In theDa Vinci Code, symbologist Robert Langdon is confronted with, among other clues the lines:

13-3-2-21-1-1-8-5

O, Draconian devil!

Oh, lame saint!

Each line is an anagram. O, Draconian Devil yields Leonardo Da Vinci and Oh, lame saint becomes The Mona Lisa. The line of numbers is an anagram of the beginning of the Fibonacci Sequence, in which numbers after 1 are the sum of the two previous numbers: 1-1-2-3-5-8-13-21. It is the combination of a later lockbox.

Hidden messages, from anagrams to codes and ciphers are part of a long literary tradition. Take some time to enjoy them or create one yourself.

Featured image credit: Enlightening Math by John Moeses Bauan. CC0 via Unsplash.

Read more here:
Codes and Ciphers - OUPblog

How AI And Machine Learning Can Make Forecasting Intelligent – Demand Gen Report

The CRM is no longer a data repository and a basic workflow engine that creates static reports. Thanks to AI and ML, predictive and prescriptive insights can be embedded into CRM. This is known as the intelligent experience. The intelligent experience is a natural fit for sales forecasting.

We all know data is incredibly powerful, but often its potential goes untapped in businesses. In order to utilize data in a meaningful way, a company needs to have the right skills and tools to convert data into learnings, and learnings into actions and outcomes. This is exactly what the intelligent experience does. For example, a company using a standard CRM is able to look at their pipeline and opportunity data and see forecasted sales figures. A company with intelligent forecasting sees all of that same data but goes further. Their ML will analyze their past opportunities, successes, misses, win rates and other criteria to create a recommended forecast and provide insights to help their sales team take action. Intelligent forecasting is more than making predictions on revenue or deals closed. It is transparent and explanatory, which informs workflows, helps improve sales strategies and opens the door to increasing win rates.

An overwhelming majority of data projects fail. Why? Typically, it is due to companies thinking they need to gather the perfect data or create custom models in data silos that end up having limited value to the business. The reality is, they dont need to have the perfect data to gather meaningful insights, nor do they require a massive data pool. A business can start small and keep it simple.

Forecasting is complex, so naturally, many companies struggle to maximize its value. Often, companies will use spreadsheets and do calculations to aggregate historical direct and channel sales results with cyclical growth assumptions. Unfortunately, this is a subjective approach that typically is inaccurate, time-consuming and not actionable in real-time. The best way to develop a trusted and actionable forecast is by combining traditional approaches with AI approaches.

To get started with intelligent forecasting, an organization must define the intelligent experience it wants to create for its users and customers. Next, custom ML models and AI systems are built to generate the necessary insights. Two major approaches to gaining insights are propensity-based predictions and aggregate forecasting. Propensity-based models examine individual opportunities and score them. Aggregate forecasting looks at aggregate sales volumes across segments of the business (i.e. channel, geography, product, etc.). To maximize value, it is best to combine both approaches. Once implemented, the insights are then integrated into user workflows within the CRM and presented as recommend actions. Finally, the data models are tuned and redefined. Creating an intelligent experience is a journey because as a business changes, so does its data. In order for the ML to remain successful over time, it needs to also change and adjust.

Companies can combine the impact of data, analytics and AI to make decisions faster, increase productivity and make customers happier. While most companies know the benefits, they think its out of reach for them. However, the intelligent experience is more accessible than ever. Through the power of AI and ML, companies are able to inform their workflows and sales strategies, leading to more wins.

As a Co-Founder and SVP of Customer Engagement, Geoff Birnes is responsible for Atriums customer outcomes. Birnes brings extensive experience in large-scale business transformation programs across sales, marketing, service and middle office. Prior to Atrium, Geoff led strategic accounts for Appirio-Wipro, and has spent 20 years in the consulting space, focused on CRM and business intelligence sales and delivery. Geoff attended Penn State University where he earned a B.S. in Engineering.

Read the original here:
How AI And Machine Learning Can Make Forecasting Intelligent - Demand Gen Report

US announces AI software export restrictions – The Verge

The US will impose new restrictions on the export of certain AI programs overseas, including to rival China.

The ban, which comes into force on Monday, is the first to be applied under a 2018 law known as the Export Control Reform Act or ECRA. This requires the government to examine how it can restrict the export of emerging technologies essential to the national security of the United States including AI. News of the ban was first reported by Reuters.

When ECRA was announced in 2018, some in the tech industry feared it would harm the field of artificial intelligence, which benefits greatly from the exchange of research and commercial programs across borders. Although the US is generally considered to be the world leader in AI, China is a strong second place and gaining fast.

But the new export ban is extremely narrow. It applies only to software that uses neural networks (a key component in machine learning) to discover points of interest in geospatial imagery; things like houses or vehicles. The ruling, posted by the Bureau of Industry and Security, notes that the restriction only applies to software with a graphical user interface a feature that makes programs easier for non-technical users to operate.

Reuters reports that companies will have to apply for licenses to export such software apart from when it is being sold to Canada.

The US has previously imposed other trade restrictions affecting the AI world, including a ban on American firms from doing business with Chinese companies that produce software and hardware that powers AI surveillance.

Using machine learning to process geospatial imagery is an extremely common practice. Satellites that photograph the Earth from space produce huge amounts of data, which machine learning can quickly sort to flag interesting images for human overseers.

Such programs are useful to many customers. Environmentalists can use the technology to monitor the spread of wildfires, for example, while financial analysts can use it to track the movements of cargo ships out of a port, creating a proxy metric for trading volume.

But such software is of growing importance to military intelligence, too. The US, for example, is developing an AI analysis tool named Sentinel, which is supposed to highlight anomalies in satellite imagery. It might flag troop and missile movements, for example, or suggest areas that human analysts should examine in detail.

Regardless of the importance of this software its unlikely an export ban will have much of an effect on China or other rivals development of these tools. Although certain programs may be restricted, its often the case that the underlying research is freely available online, allowing engineers to recreate any software for themselves.

Reuters notes that although the restriction will only affect US exports, American authorities could try and encourage other countries to follow suit, as they have with restrictions on Huaweis 5G technology. Future export bans could also affect more types of AI software.

See original here:
US announces AI software export restrictions - The Verge

Stare into the mind of God with this algorithmic beetle generator – SB Nation

God has an inordinate fondness for beetles, said, or so it is claimed, the British evolutionary biologist J. B. S. Haldane. On quantity alone, he was absolutely correct. There are about 400,000 species of beetle on the planet a cool 395,000 more than mammals can offer and while this sort of number-gaming is fraught with the risk of glibness, the assertion that beetles make up between a quarter and a third of extant animal species is probably not too far off.

Im on less firm ground if I assert that articles about machine learning make up between a quarter and a third of todays internet, but sometimes thats what it feels like. Normally Id be sorry for adding to the mass fervour for what mostly amounts to snake oil, but I think we have a special case today.

Machine learning is very bad at a lot of things, and frequently bad in surprisingly ways. But its very good at some things. Playing with datasets which combine cleanliness and predictability with mind-boggling diversity is, perhaps, The Thing it is best at. Happily, the long-tradition of scientific beetle-drawing has produced sheet upon sheet of beautiful, anatomically correct and aesthetically similar pictures. Piping those into a generative adversarial network gives you ... well, it gives you this.

BEHOLD! THE ALGORITHMIC BEETLE GENERATOR:

Despite this video being 100 percent shapeshifting beetles its also, somehow, extremely relaxing. I hope you enjoy it as much as I did. If so, you can get an extra kick from the mangled semi-beetles that constituted Cunicodes first attempt at this.

PS: Its funny to think that most of these machine-generated beetles probably already exist. An inordinate fondness, indeed.

More:
Stare into the mind of God with this algorithmic beetle generator - SB Nation

UN Letter: Chelsea Manning’s Imprisonment Is Torture – The Intercept

Former U.S. Army intelligence analyst Chelsea Manning addresses reporters before entering the Albert Bryan U.S. federal courthouse in Alexandria, Va., on May 16, 2019.

Photo: Win McNamee/Getty Images

On New Years Eve, as personal reflections on the last decade flooded in, Chelsea Mannings accounttweeted that she had spent 77.76 percent of her time since 2009 in jail. That same day, the United Nations Special Rapporteur on Torture Nils Melzer publiclyreleased a letter from late last year accusing the United States of submitting Manning to treatment that is tantamount to torture.

Such deprivation of liberty does not constitute a circumscribed sanction for a specific offense, but an open-ended progressively severe measure of coercion.

It does not take a U.N. expert to recognize the current conditions of Mannings incarceration as a form of torture. It is the very definition of torture to submit a person to physical and mental suffering in an effort to force an action from them. Since May, Manning has been held in a Virginia jail for refusing to testify before a federal grand jury investigating WikiLeaks. Manning has not been charged with or convicted of a crime. And her imprisonment on the grounds of civil contempt is explicitly coercive: If she agrees to testify, she can walk free. If she continues to remain silent, she can be held for the 18-month duration of the grand jury or, as the U.N. official noted, indefinitely with the subsequent establishment of successive grand juries.

Each day she is caged, Manning is also fined $1,000. If she is released at the end of the current grand jury, she will owe the state nearly $500,000 an unprecedented punishment for grand jury resistance. And Manning has made clear, she would rather starve to death than comply with the repressive grand jury system, a judicial black box historically deployed against social justice movements.

Such deprivation of liberty does not constitute a circumscribed sanction for a specific offense, but an open-ended progressively severe measure of coercion, Melzer, the U.N. special rapporteur, wrote of Mannings treatment. Melzers November letter, which was made public this week, stated that Mannings coercive imprisonment fulfills all the constitutive elements of torture or other cruel, inhuman or degrading treatment or punishment and should be discontinued or abolished without delay. The letter asks that the U.S. government provide factual and legal grounds for Mannings ongoing imprisonment and fines, especially after her categorical and persistent refusal to give testimony demonstrates the lack of their coercive effect.

Mannings supporters and legal team have long stressed that no such legal grounds exist. Manning has proven again and again that her grand jury resistance is unshakeable; the coercive grounds for imprisonment are thus undermined and her jailing is revealed to be purely punitive. Federal Judge Anthony Trenga, who ordered Mannings torturous incarceration, should be compelled to release her as a point of law, regardless of U.N. censure. This is not to say, however, that coercive incarceration is defensible in cases where it works to compel testimony it is not. Mannings resistance has highlighted the brutality of the practice tout court.

Mannings attorney, civil rights lawyer Moira Meltzer-Cohen, said that she hopes the U.N. officials letter calls greater attention to the use of coercive detention generally, as well as the specific cruel treatment of her client. While the United States has failed to live up to its human rights obligations, I remain hopeful that the government will reconsider its policies in light of the U.N.s admonition, Meltzer-Cohen said in a public statement. She also told me that the U.N. special rapporteurs recognition of Mannings refusal to be coerced can serve as further evidence to the judge.

In a statement from jail, Manning said, I am thrilled to see the practice of coercive confinement called out for what it is: incompatible with international human rights standards. The grand jury resister is, however, under no illusions about the U.S. governments willingness to flout its purported human rights obligations in the face of admonitions from the international community. As she put it, even knowing I am very likely to stay in jail for an even longer time, Im never backing down.

I am thrilled to see the practice of coercive confinement called out for what it is: incompatible with international human rights standards.

Indeed, as the U.N. special rapporteur noted, his predecessor wrote a number of appeals to the U.S. government from 2010 onwards regarding the cruel and torturous treatment to which Manning was subjected prior to and during her confinement in military prison. Yet her 35-year sentence was not commuted until 2017 by President Barack Obama. Manning noted in her New Years Eve tweet that she spent 11.05 percent of the last decade in solitary confinement and over half of her years behind bars fighting for gender affirming care. She attempted to take her own life twice during her time at the military prison in Fort Leavenworth, Kansas.

Suffice it to say, U.N. appeals have never secured Mannings liberty or safety. And as, Meltzer-Cohen noted in her statement on the U.N. officials letter, In the two months since the letter was conveyed to the United States, Ms. Manning has remained confined, and the daily fines imposed upon her have continued to accrue.

If the letter fails to sway the government, it should, at the very least, serve as a public reminder to support a political prisoner. Though the last decade of Mannings life has been marked by torture, she has responded with fierce resistance and struggle for liberatory social justice at every turn. In the tweet tabulating her last 10 years, Manning ended by noting that she devoted 0.00% of her time backing down. The U.N. special rapporteurs recognition of her refusal to be coerced is welcome. Our solidarity is more than deserved.

Link:
UN Letter: Chelsea Manning's Imprisonment Is Torture - The Intercept