This hardware-encrypted USB-C drive is rugged, inexpensive, and can run Windows – TechRadar UK

Apricorn has released its new Aegis Secure Key 3NXC drive that features robust security, a rugged chassis, and a USB Type-C connector.

The ApricornAegis Secure Key 3NXCdrive, which is fast enough to run an operating system, features its own AES-XTS 256-bit encryption chip as well as a keypad to enter numerical PINs. At present, the storage device isFIPS 140-2 level 3 validation pending and the company expects to get it in Q3 2020.

The USB-C Aegis Secure Key 3NXC drive supports read-only mode for those who need to carry sensitive data and do not need to alter it anyhow as well as a read-write mode for those who may need to change the data on the drive or boot an operating system from it. Since encryption is hardware-based, it is seamless for OS and therefore the Aegis Secure Key 3NXC devices are compatible with virtually all operating systems available today, including Apples MacOS, Googles Android, Microsofts Windows, and even Symbian.

The firmware of the drive is locked down and cannot be altered by malware or exploits (e.g., BadUSB), which means that thedriveitself is secure. Furthermore, the drive has its own battery that charges when it is plugged to a host, so an unlock pin can be entered while the drive is not plugged.

The Aegis Secure Key 3NXC drive comes in an aluminum chassis and is IP68-rated against water and dust. It also comes in an enclosure for extra protection. Measuring 81mm x 18.4mm x 9.5mm, the device weighs 22 grams.

Apricorn, which specializes in hardware-encrypted storage devices, offers multiple versions of its Aegis Secure Key 3NXC drives featuring capacities ranging from 4GB to 128GB. The company does not disclose performance of the storage device and only mentions a 5Gbps theoretical throughput of a USB 3.2 Gen 1 interface, but higher-end Aegis Secure Key 3NXC are probably fast enough to boot an operating system in a reasonable amount of time.

There is one caveat with using Apricorns Aegis Secure Key 3NXC drive as a boot drive. Microsoft recentlycanned Windows To Goin Windows 10 Enterprise and Windows 10 Education (version 2004 and later) that enabled the creation of a Windows To Go workspace that could be booted from a USB drive. To that end, those who would like to use an Aegis Secure Key 3NXC to boot an OS will have to use an outdated version of Windows, or go with a Linux OS.

Apricorns Aegis Secure Key 3NXC drive are available directly from the company. A 4GB model costs $59 or 52.45, whereas a 128GB is priced at $179 or 159.13 depending where are you at. Considering the fact that the devices are aimed at various government and corporate personnel who have access to sensitive data as well as hardware encryption, metallic chassis, and other sophisticated features, prices of these drives look justified.

Source:Apricorn

Go here to see the original:
This hardware-encrypted USB-C drive is rugged, inexpensive, and can run Windows - TechRadar UK

Windows Administration Tools and VMs Open Windows to Ransomware – ITPro Today

Virtual machines have long been heralded as a tool for avoiding malware and ransomware infections. Many security-conscious IT pros, for example, do all of their casual Web browsing from within a virtual machine. The idea is that if a malware infection were to occur, then the virtual machine could easily be reset to a pristine state while the parent operating system remained completely isolated from the infection. Recently, however, ransomware authors have begun using virtual machines as an attack mechanism and Windows administration tools as a way to evade detection.

Perhaps the best example of this is an attack conducted by the Ragnar Locker Group, which has been involved in some high-profile extortion schemes in the past. One of the widely publicized examples was when the group attacked Energias de Portugal. In that particular attack, the group claimed to have stolen 10 TB of data and threatened to release the data to the public unless the company paid a ransom of 1,580 bitcoin (which was about 11 million U.S. dollars). More recently, business travel management company CWT Global B.V. paid a ransom demand following a ransomware attack that reportedly involved Ragnar Locker.

The Ragnar Locker Group is now using virtual machines as a tool for helping its ransomware to evade detection. The attack begins by compromising a Windows machine in an effort to gain administrative access. This is commonly done by exploiting an insecure (and externally accessible) RDP connector. Once the group has gained administrative access, the next step in the attack is to modify a Group Policy Object.

Windows administrators commonly use Group Policy settings as a tool for pushing legitimate software applications to network endpoints. If you look at the figure below, for example, you can see that the Group Policy Management Editor provides a Software Installation option beneath the User Configuration Policies Software Installation node. Ragnar Locker exploits this particular Group Policy setting as a tool for distributing its ransomware. However, this process isnt quite as simple as merely packaging malware and using Group Policy settings as a distribution tool. If that was all that was required, then the malicious software would almost certainly be detected by antivirus software.

One of the ways Ragnar Locker avoids detection is through the use of native Windows administrative tools. Because these tools are a part of the Windows operating system, their use is somewhat unlikely to be immediately determined to be malicious. While victims will no doubt eventually figure out that their networks have been compromised, the use of a native administrative tool typically isnt going to raise an immediate alarm like the detection of malware would.

The Group Policy setting instructs Windows to run Microsoft Installer (MSIExec.exe). It passes parameters to the installer that cause it to silently download a malicious MSI package from the internet. This package includes, among other things, a copy of Oracles VirtualBox hypervisor and a lightweight virtual machine image. Some support scripts that are included in the MSI package disable various Windows security features and install VirtualBox along with the malicious virtual machine. They also delete volume shadow copies, thereby preventing the user from restoring previous (unencrypted) versions of the files without the aid of a dedicated backup application.

Once everything is in place, the virtual machine goes to work encrypting everything that it can. It attacks both local storage and network storage. It even goes so far as to terminate any applications that the user is currently working in so that the files become unlocked and can therefore be encrypted.

Because the ransomware is running within a virtual machine, its presence is likely to evade detection. The Windows operating system sees all of the encryption activity as being related to a virtual machine, rather than being able to see the malicious process that is running inside of the virtual machine. Sophos provides a detailed analysis of how the Ragnar Locker exploit works.

The good news is that the Ragnar Locker attacks are highly targeted. You arent going to fall victim to this attack by accidentally opening a malicious email attachment. After all, the attack can only succeed if the attacker is able to first establish administrative access to the target system.

Even so, I expect to see copycats perform similar, more random attacks in the future. Since so many people log into their PCs with administrative credentials, there is nothing stopping ransomware from exploiting a users existing credentials and performing a similar attack. As such, organizations should consider using AppLocker or a third-party tool to prevent the installation of unauthorized software.

See the article here:
Windows Administration Tools and VMs Open Windows to Ransomware - ITPro Today

Last Month in DiEM25: July 2020 – DiEM25

External Actions

This month:

Several DiEM25 National Collectives, including in France, Belgium, Germany, and Luxembourg, have worked towards a European Rent Action, preparing a set of EU-wide demands Free low-income Europeans from rent burden during COVID-19. The EU campaign includes a letter to the EU Parliament as well as national actions and demands. Coordinated demonstrations on the rent issue and its relevance during the COVID-19 crisis are expected to take place in September. Join the first wave of demonstrations!

Happening:

We celebrated the election of Moemo to the Croatian Parliament, the Left party that DiEM25 supported in the elections. They are committed to radical change in the political and economic system!

DiEM25 NC Greece, DiEM25 PNC Turkey and DiEM25 NC Germany released a joint statement on the Greek-Turkey tensions in the Aegean Sea.

DiEM25 condemned Aleksandar Vuis violent takedown of Serbian protesters.

Celebrated Julian Assanges birthday, and held the opening of the We Are Millions exhibition in Leipzig, which sheds light on the Julian Assange Case.

Highlighted the #GreekFiles that expose the weaponisation of the ECB against European democracy.

DiEM25s newly formed Turkish PNC launched the first issue of their monthly review on Turkeys social, economic, and cultural state of affairs.

The Progressive International (PI) emitted an urgent call to respond to the escalating assault on the democratic institutions of Ecuador. Read more about the unfolding situation in their statement.

This month we:

Received applications for the Coordinating Collective of DiEM25! We will be conducting interviews of candidates this month. If you would like to endorse candidates that you know and appreciate, you can do so in our members area!

Launched our citizen engagement campaign that sets out to build national programmes in collaboration with Europeans for DiEM25! Throughout July and August, DiEMers are asked to submit the questions they believe anyone should be able to answer in order to be politically relevant in their city, region and country. They will be the foundation for the questionnaire we will use to go out as of September and inspire citizens to engage with our project.

MeRA25s new statutes (which will act as the blueprint for all EW statutes) were voted through by DiEM25 members. The party is now taking the first steps to establish the governance structure outlined in the new statutes, starting with the creation of its first Central Committee!

Continued to hold transparent live-recorded CC meetings open to the public on YouTube.

Our movement will engage in the implementation of the results of the Prague Assembly (member proposals for actions and campaign, and the CC vision) based on the results of AMVs.

We will continue developing our citizen engagement campaign in line with our working plan. Get involved by submitting a response to this questionnaire!

Our National Collectives continue to work on a Rent Action campaign! If you wish to get involved, you can reach out to our volunteer coordinator johannes.fehr@diem25.org.

If you wish to send a point to be included in the next newsletter, or want to help to draft it, please contact us at axelle.van.wynsberghe@diem25.org.

Do you want to be informed of DiEM25's actions? Sign up here

Original post:

Last Month in DiEM25: July 2020 - DiEM25

Cryptocurrency Mining Software Market Incredible Possibilities, Growth Analysis and Forecast To 2025 – The Daily Chronicle

The Cryptocurrency Mining Software market study added by Market Study Report, LLC, enumerates an in-depth analysis of the powerful trends prevailing in the industry. This study also encompasses valuable information relating to the profitability prospects, growth dynamics, market size, market share forecast, and revenue estimation of this business vertical. The study descriptively charts out the competitive backdrop of eminent players partaking in the industry share, in consort with their offering portfolio & business strategies.

The recent report on Cryptocurrency Mining Software market is an in-depth documentation of various dynamics at play in the industry space. As per the report, Cryptocurrency Mining Software market is poised to amass substantial revenues while growing with a y-o-y growth rate of XX% over the forecast period.

Request a sample Report of Cryptocurrency Mining Software Market at:https://www.marketstudyreport.com/request-a-sample/2829622?utm_source=thedailychronicle.in&utm_medium=Ram

Insights pertaining to growth drivers, challenges, restraints, and opportunities prevailing in the industry sphere are detailed in the report, alongside their impact on the overall market size. The report further analyzes the market based on different segmentations and highlights the aftermath of COVID-19 pandemic on the industry sphere.

Unveiling the topographical frame of Cryptocurrency Mining Software market:

Report Objectives:

Ask for Discount on Cryptocurrency Mining Software Market Report at:https://www.marketstudyreport.com/check-for-discount/2829622?utm_source=thedailychronicle.in&utm_medium=Ram

Other takeaways from Cryptocurrency Mining Software market report:

.

.

.

TOC of Cryptocurrency Mining Software Market Report Includes:

For More Details On this Report: https://www.marketstudyreport.com/reports/global-cryptocurrency-mining-software-market-2020-by-company-regions-type-and-application-forecast-to-2025

Read More Reports On: https://www.marketwatch.com/press-release/moringa-products-market-2020-analysis-by-industry-trends-size-share-company-overview-growth-development-and-forecast-by-2026-2020-08-05?tesla=y

Read More Reports On: https://www.marketwatch.com/press-release/dielectric-elastomer-market-global-industry-research-size-share-growth-trends-and-forecast-by-2026-2020-08-04?tesla=y

Read More Reports On: https://www.marketwatch.com/press-release/robot-sensor-market-overview-with-detailed-analysis-competitive-landscape-forecast-to-2024-2020-08-03?tesla=y

Read More Reports On: https://www.marketwatch.com/press-release/medical-lifting-sling-market-analysis-with-key-players-applications-trends-and-forecast-to-2027-2020-07-30

Contact Us:Corporate Sales,Market Study Report LLCPhone: 1-302-273-0910Toll Free: 1-866-764-2150 Email: [emailprotected]

More:
Cryptocurrency Mining Software Market Incredible Possibilities, Growth Analysis and Forecast To 2025 - The Daily Chronicle

What Paxful has learned over five years in the cryptocurrency space – htxt.africa

This year marks Paxfuls fifth year in operation and its taking some time to reflect on its journey thus far.

Thats not to say the firm has anything to regret, quite the opposite.

Paxful now boasts 4.5 million registered wallets and recently reached a trading volume of $4.6 billion. On top of that, each year has seen one million new users signing up to the platform with an additional two million expected to join Paxful by years end.

On its journey, the firm has learned a few lessons and one of those lessons is that while there might be a few big players in the cryptocurrency sector, there is still room for newcomers.

We welcome seeing more players enter the space, as it raises awareness and educates the public on the crypto-economy and P2P finance. It contributes to the growth of economic opportunity and financial inclusivity for people around the world as more individuals are using bitcoin in their everyday lives, says co-founder and chief executive officer at Paxful, Ray Youssef.

So with opportunity seemingly available, what can Paxful share with others looking to get into the space.

It should be obvious that the safety of users should be paramount but above and beyond implementing safety measures, its about constantly investing in new safety measures, keeping up with compliance and managing risk.

Over and above that, many users are still very confused by cryptocurrency and incidents such as Silk Road and Dread Pirate Roberts, and robberies of cryptocurrency exchanges dont help the cause.

Its for this reason we see firms like Paxful and Luno embarking on education campaigns to inform users about what cryptocurrency is and why its rather safe.

Cryptocurrency is popular all over the world, but Paxful says that in emerging markets there is a growing appetite for financial tools.

Bitcoin continues to change the way people manage their finances. Our customers in Latin America, Africa and Southeast Asia are getting around the limitations of their financial systems by realizing the full potential of the Bitcoin-economy, using it for both personal finance needs and entrepreneurial ventures including paying bills, purchasing goods and services, and building businesses, says Youssef.

But beyond just appetite from users, there is growing demand for professionals versed in blockchain.

Mindful of this, Paxful highlights how important investing in the next generation of talent is. We saw this last week with the announcement of several free webinars that the public can attend to learn about cryptocurrency, and blockchain.

In addition to nurturing talent, Youssef also says that partnerships in this industry are vital.

We are witnessing more industry collaborations that successfully play to each others strengths, adding value, increasing functionality and unlocking more trading options for customers. We are always excited to partner with businesses who share our passion and vision of economic freedom, a world where everyone has equal access to finance, no matter who they are, or where they are from, the co-founder says.

Partnerships of note include Paxful and OKEx, one of the largest cryptocurrency exchanges in the world.

Locally, weve also seen partnerships between Luno and several firms which have made the platform more accessible or even earn interest on cryptocurrency holdings.

Its clear that rather than going at it alone, sometimes, especially when it comes to managing digital currency, a trusted partner may be a better avenue to pursue.

The rest is here:
What Paxful has learned over five years in the cryptocurrency space - htxt.africa

First Amendment Protections in K-12 Schools Not "Restricted to Only Core Political Speech" – Reason

So holds the First Circuit in yesterday's decision in Norris v. Cape Elizabeth School Dist., and I think that's exactly the right reading of the Supreme Court precedents (and consistent with other circuits' decisions).

The particular speech in that case was an anonymous "sticky note on a mirror in a Cape Elizabeth High School girls' bathroom that stated 'THERE'S A RAPIST IN OUR SCHOOL AND YOU KNOW WHO IT IS.'" One might argue that this is core political speech, because it's an implicit accusation that the school isn't doing anything about this, but the court's decision makes it unnecessary to draw the political/nonpolitical line. "Because we conclude that Tinker is not limited to political speech, we need not decide if A.M.'s sticky note, understood in the context of her prior activities related to sexual assault activism including her statements to the Cape Elizabeth H.S. school board, was objectively viewed as political."

Read more here:

First Amendment Protections in K-12 Schools Not "Restricted to Only Core Political Speech" - Reason

US Department of Education Reaffirms Commitment to Protecting the Religious Liberty of Students and Religious Organizations – U.S. Department of…

WASHINGTON U.S. Secretary of Education Betsy DeVos announced today guidance to protect the religious liberty of individuals and institutions participating in Department of Education programs. This action is part of ongoing efforts by the Department to advance religious liberty protections and delivers on President Donald J. Trumps Executive Order 13798, Promoting Free Speech and Religious Liberty.

This Administration will continue to protect the religious liberty and First Amendment rights of every student, teacher and educational institution across the country, said Secretary DeVos. Too many misinterpret the separation of church and state as an invitation for government to separate people from their faith. In reality, the First Amendment doesnt exist to protect us from religion. It exists to protect religion from government. Todays guidance reaffirms our commitment to protecting our first liberty and ensuring that discriminatory restrictions on access to federal grant funding are no longer tolerated.

This guidance follows recent Supreme Court victories for religious liberty, as Espinozav. Montana Department of Revenueand Trinity Lutheran v. Comercurtailed religious discrimination and thus strengthened protections for religious organizations.

The guidance was drafted pursuant to a directive from the Office of Management and Budget requiring each agency to publish policies detailing how they will administer federal grants in compliance with Executive Order 13798, as well as the Attorney Generals Oct. 6, 2017, Memorandum on Religious Liberty, and the Office of Management and Budgets Jan. 16, 2020, Memorandum.

Notably, the guidance announces a new process by which individuals and organizations can inform the Department of a burden or potential burden on their religious exercise under the Religious Freedom Restoration Act (RFRA) to adequately protect their religious liberties while participating in Department programs.

The new guidance also, consistent with First Amendment principles and Department regulations, does the following:

Full text of the guidance can be found here.

Read the original:

US Department of Education Reaffirms Commitment to Protecting the Religious Liberty of Students and Religious Organizations - U.S. Department of...

Weighting the scales – Idaho State Journal

Appellate court decisions result in winners and losers in any specific case, but the issues involved often are worked through murky gray areas. Consider for example the July 30 U.S. Supreme Court decision in Little v. Reclaim Idaho.

The background is fairly well known in Idaho. The group Reclaim Idaho has been trying to promote an Invest in Idaho tax and schools initiative for the November election ballot. When the pandemic hit and Gov. Brad Littles stay-home order was issued, its petition-gathering which in the normal process has to be done face to face was blocked, which meant a part of Idahos election process also was blocked.

That point, essentially an argument over voting civil rights, went to federal court. Idaho U.S. District Judge B. Lynn Winmill ordered that the state either simply place the proposed initiative on the ballot or allow the group to collect the signatures electronically. The state appealed, and the case with startling speed went to the U.S. Supreme Court. On a 4-2 decision, the court sided with the state, ordering a stay of the Winmill decision.

Story continues below video

The Supreme Court, as often happens, didnt go to the center of the issue the voters-rights matter and it did not specifically reverse the Winmill decision, though it may have felt that way. But whats there is worth considering.

First, the majority decision (written by Chief Justice John Roberts) pointed out that, oddly enough, different federal courts have established different guidelines for what states can and cant do in initiative procedures (one reason the high court might have granted certiorari permission to bring this case to it). It said, the States depend on clear and administrable guidelines from the courts. Yet the Circuits diverge in fundamental respects when presented with challenges to the sort of state laws at issue here. According to the Sixth and Ninth Circuits, the First Amendment requires scrutiny of the interests of the State whenever a neutral, procedural regulation inhibits a persons ability to place an initiative on the ballot. ... Other Circuits, by contrast, have held that regulations that may make the initiative process more challenging do not implicate the First Amendment so long as the State does not restrict political discussion or petition circulation.

The Supreme Court didnt really land on this turf in its Idaho decision, but the majority did focus on the right of the state more than the right of the initiative proponent: The District Court did not accord sufficient weight to the States discretionary judgments about how to prioritize limited state resources across the election system as a whole.

Thats not an unreasonable point, but it leaves a massive gap in how to review something like this. In her dissent, Justice Sonia Sotomayor zeroed in on balancing harms to stay applicant against harms to respondent in other words, balancing the interests of the state and the initiative backers, rather than simply disregarding the interests of the backers. She acknowledged that allowing the electronic signature would be a burden on the state and counties and it would be but she argued it should be considered in context.

Putting a still finer point on it, The stay granted today puts a halt to their signature-collection efforts, meaning that even if respondents ultimately prevail on appeal, it will be extremely difficult, if not impossible, for them to collect enough qualifying signatures by any reasonable deadline for the November ballot. In other words, the delay occasioned by this Courts stay likely dooms to mootness respondents First Amendment claims before any appellate court has had the chance to consider their merits (and, indeed, before this Court has had the chance to consider any potential petition for certiorari).

So in balancing the rights of a state government against those of its voters, the Supreme Courts majority seems to be putting its thumb on the state side of the scale. That may be worth giving some careful thought when you look, as historically we long have, to the nations highest court as a protector of the rights of the American people.

Read the original:

Weighting the scales - Idaho State Journal

Police Violence in Portland Protests – The New York Times

To the Editor:

Violence Is Not an Answer, by Chuck Lovell (Op-Ed, Aug. 4), is an insult to the thousands of Portlanders who have been indiscriminately gassed, beaten and shot with crowd-control weapons by the Portland, Ore., police night after night, simply for protesting racist police violence.

Mr. Lovell, the chief of the Police Bureau in Portland, claims that as police officers, our duty is to uphold the rights of anyone to assemble peacefully and engage in free speech. But the police in Portland are making a mockery of the First Amendment by using excessive force, violence and intimidation to suppress free speech in the Black Lives Matter movement.

The A.C.L.U. of Oregon had to sue federal agents and police in Portland for violently attacking journalists and legal observers, as well as medics tending to the very community members whom the police harmed.

Chief Lovell is right that violence is not the answer. That includes police violence. If the police dont want us to take their resources (defund the police), then the Portland police and Mayor Ted Wheeler need to use our communitys resources to heed their own advice, take accountability for their abuses, respect the Constitution and ensure that Black Lives Matter in Portland.

Kelly SimonPortland, Ore.The writer is interim legal director of the A.C.L.U. of Oregon.

To the Editor:

Re The Ghost of Margaret Sanger (column, July 26):

Planned Parenthood has long denounced Margaret Sangers eugenicist beliefs, recognizing the need to engage in anti-racist work as a 104-year-old institution. Covid-19 leaves no confusion about the effects of systemic racism. Yet Ross Douthat conflates the disparate impact of public policy on Black communities with the fundamental right of Black women to control our own bodies. Birthrates do not equal power, unless youre a white supremacist.

Black women know reproductive control began at the auction block, when our ancestors forced reproduction was the engine that drove the American economy. Whether were attacked for having children and needing support, or for having an abortion, were damned if we do and damned if we dont.

Mr. Douthat insinuates that his argument may produce intersectional dilemmas no doctrine can resolve. Our experiences are intersectional, but theres no dilemma: Our bodies are our own, and we wont apologize for it.

Alexis McGill JohnsonNew YorkThe writer is president and chief executive of the Planned Parenthood Federation of America.

Betraying U.S. Forces: A Republican Habit

To the Editor:

Re Trump Says He and Putin Didnt Talk About Bounties (news article, July 30):

President Trump has betrayed American forces by giving Vladimir Putin a free pass on his reported bounty payments to Taliban-linked militants for American lives. Mr. Trumps acquiescence, if motivated by his personal goals, such as Russian electoral interference on his behalf, is treasonous, but not unique. Leaders of the modern Republican Party have repeatedly sought electoral advantage by disregarding the lives of American soldiers and government officials.

In 1968 Richard Nixons team sabotaged talks that might have ended the Vietnam War, because the Democrats would have gotten credit and might have cost Nixon a close election. Similarly, Ronald Reagans campaign and leading Republicans worked to thwart a deal for the release of American hostages in Iran in order to avoid an October surprise that would have helped President Jimmy Carters re-election bid.

Why have G.O.P. leaders shown themselves willing to betray American troops and public servants for partisan gain? The answer seems to lie in a worldview that rejects the principle of a loyal opposition and, quite conceivably, democracy itself. Can they be held to account?

Daniel LieberfeldPittsburghThe writer is a retired professor of history and politics at Duquesne University.

To the Editor:

Re The Limits of Broadband (editorial, July 19), about how many Americans sheltering from Covid-19 are discovering the limitations of the countrys cobbled-together broadband service:

Your editorial correctly declared that high-speed internet connections are a civil rights issue and that service is often unavailable or too expensive in rural communities and low-income neighborhoods.

As the president of Midtel, an upstate New York telecommunications company that serves underserved rural areas, I can say from experience that smart government policies are a key to bridging the digital divide.

New Yorks current policies send mixed messages, discouraging the infrastructure investments necessary to make full connectivity a reality today and into the future.

My company has received more than $15.5 million in state grants to replace our copper network with fiber, enabling us to bring customers fast, reliable and affordable high-speed service. But the state is taxing fiber in the Department of Transportation right-of-way, a space traditional utilities get to use free. This added tax, which we legally cannot pass on to our customers, makes already expensive projects cost-prohibitive.

If New York is indeed serious about closing the digital divide and enabling all New Yorkers to prosper in the new normal, it must enable the industry to make the goal of broadband for all a reality while paving the way for next-generation connectivity.

Jim BeckerMiddleburgh, N.Y.

To the Editor:

I appreciate your Aug. 7 Weekend Arts article 6 Things to Do This Weekend.

I do have a question, though: Remind me what a weekend is?

Marc ChafetzWashington

The rest is here:

Police Violence in Portland Protests - The New York Times

BMW, Red Hat, and Malong Share Insights on AI and Machine Learning During Transform 2020 – ENGINEERING.com

BMW, Red Hat, and Malong Share Insights on AI and Machine Learning During Transform 2020Denrie Caila Perez posted on August 07, 2020 | Executives from BMW, Red Hat and Malong discuss how AI is transforming manufacturing and retail.

(From left to right) Maribel Lopez of Lopez Research, Jered Floyd of Red Hat, Jimmy Nassif of BMW Group, and Matt Scott of Malong Technologies.

The VentureBeat 2020 conference welcomed the likes of BMW Groups Jimmy Nassif, Red Hats Jered Floyd, and Malong CEO Matt Scott, who shared their insights on challenges with AI in their respective industries. Nassif, who deals primarily with robotics, and Floyd, who works in retail, both agreed that edge computing and the Internet of Things (IoT) has become powerful in accelerating production while introducing new capabilities in operations. According to Nassif, BMWs car sales have already doubled over the past decade, with 2.5 million in 2019. With over 4,500 suppliers dealing 203,000 unique parts, logistics problems are bound to occur. In addition to that, approximately 99 percent of orders are unique, which means there are over 100 end-customer options.

Thanks to platforms such as NVIDIAs Isaac, Jetson AXG Xavier, and DGX, BMW was able to come up with five navigation and manipulation robots that transport and manage parts around its warehouses. Two of the robots have already been deployed to four facilities in Germany. Using computer vision techniques, the robots are able to successfully identify parts, as well as people and potential obstacles. According to BMW, the algorithms are also constantly being optimized using NVIDIAs Omniverse simulator, which BMW engineers can access anytime from any of their global facilities.

In contrast, Malong uses machine learning in a totally different playing fieldself-checkout stations in retail locations. Overhead cameras are able to feed images of products as they pass the scanning bed to algorithms capable of detecting mis-scans. This includes mishaps such as occluded barcodes, products left in shopping carts, dissimilar products, and even ticket switching, which is when a products barcode is literally switched with that of a cheaper product.

These algorithms also run on NVIDIA hardware and are trained with minimal supervision, allowing them to learn and identify products using various video feeds on their own. According to Scott, edge computing is particularly significant in this area due to the necessity of storing closed-circuit footage via the cloud. Not only that, but it enables easier scalability to thousands of stores in the long term.

Making an AI system scalable is very different from making it run, he explained. Thats sometimes a mirage that happens when people are starting to play with these technologies.

Floyd also stressed how significant open platforms are when playing with AI and edge computing technology. With open source, everyone can bring their best technologies forward. Everyone can come with the technologies they want to integrate and be able to immediately plug them into this enormous ecosystem of AI components and rapidly connect them to applications, he said.

Malong has been working with Open Data Hub, a platform that allows for end-to-end AI and is designed for engineers to conceptualize AI solutions without needing complicated and costly machine learning workflows. In fact, its the very foundation of Red Hats data science software development stack.

All three companies are looking forward to more innovation in applications and new technologies.

Visit VentureBeats website for more information on Transform 2020. You can also watch the Transform 2020 sessions on demand here.

For more news and stories, check out how a machine learning system detects manufacturing defects using photos here.

Go here to read the rest:
BMW, Red Hat, and Malong Share Insights on AI and Machine Learning During Transform 2020 - ENGINEERING.com