Murder of 39 Afghans by Australian soldiers only ‘tip of the iceberg’: professor – Tehran Times

TEHRAN An Australian academic says that killing unlawfully 39 Afghan civilians and prisoners by Australian Special Forces is just the tip of the iceberg.

Noting that Brereton Report did not touch on any of the earlier reported crimes, Professor Tim Anderson tells the Tehran Times that the 39 murders identified by the Australian Brereton Report are certainly only the tip of the iceberg.The Brereton inquiry is a long-running investigation into alleged war crimes committed by Australian Special Forces in Afghanistan. The investigation was led by Paul Brereton, who is both a New South Wales Supreme Court judge and a major general in the army reserve.Anderson, the distinguished author and senior lecturer of political economy at the University of Sydney, predicts the Australian government will try to maintain the war crime scandal under secrecy.The government will further hide any trial process on national security, he adds.The following is the text of the interview:

Q: How do you assess the repercussions of the Brereton Report revealing that Australian military forces in Afghanistan murdered and tortured prisoners, farmers, or civilians between 2009 to 2013?

A: When it comes to the U.S., British and Australian crimes in Afghanistan we should look at the full 19 years from 2001 to 2020. Remember, a war of aggression is the mother of all war crimes. The imperial soldier is necessarily programmed to commit atrocities, against people he does not understand, as he is not defending his country. He requires a fundamentally different mentality to the patriot who defends his country. Imperial commanders understand this, and train their troops accordingly, in notorious desensitization techniques.

The 39 murders identified by the Australian Brereton Report are certainly only the tip of the iceberg, so far as Australian crimes in Afghanistan are concerned, and before we get to the crimes in Iraq and Syria. Details of what are said to be the worst crimes in the Brereton Report have not yet been made public and, so far as I can see, the report did not touch on any of the earlier reported crimes, such as Australian complicity in the murder of ten Sabri tribespeople (mostly teenagers) on 16 May 2002, and the massacre of between one thousand and three thousand prisoners, people who were suffocated in shipping containers, after U.S. operation Anaconda operation at Shah-i-Kot, in March 2002.I mention just these two incidents from the early part of the war and occupation. They were not addressed by the Brereton report.

Q: Australian Federal Police (AFP) raided the offices of the Australian Broadcasting Corporation (ABC) over a 2017 investigative report based on leaked military documents. How do you measure the Australian Judiciary and polices treatment of possible war crimes committed by Australian forces in Afghanistan?

A: Initially the AFP moved to prosecute journalists, including Daniel Oakes, who had published material provided to them by Australian army whistleblower Major David McBride. (In this sense McBride was our Bradley Manning and Oakes was our Julian Assange) However, the AFP has since decided to not proceed against Oakes but to maintain criminal charges against McBride. Charges against the soldiers have yet to be laid and are already subject to secrecy, with the suspicion that the government will further hide any trial process on national security grounds. The Australian government has already undermined the recommendation to withdraw an honorable citation from one army group and has become obsessed with defending itself from criticism that has come from China. As with the Australian Air Force slaughter of 126 Syrian soldiers in September 2016 (in support of an ISIS operation), this government seems to think it can dispose of its responsibility for shocking war crimes by simply saying sorry, mistake, and forgetting the whole thing.

Q: Afghanistan Independent Human Rights Commission called for the UK "to open an independent public inquiry to review and investigate the allegations of unlawful killings by UK Special Forces". It seems that there are more possible instances of a war crime. What do you think?

A: It is very important that Afghan institutions assume responsibility for such things, however much we might doubt the capacity of the current regime in Kabul, dependent as it is on the U.S. and other occupation forces. Local authorities will certainly be aware of other crimes reported by Afghan citizens, who can only seek accountability through Afghan institutions. They will never find accountability through U.S., British, Australian, or any other sort of occupation force.

Q: Do you think Australian authorities will urgently investigate war crime allegations? The Australian prime minister has stated that the issue is complicated, which means there are efforts to prolong the investigation process.

A: Public and private obstruction of the Australian processes is already underway. The government has shown it is keen to keep control of the process and not allow it to be internationalized. No charges have yet been laid and we have reason to fear a cover-up.

They will prolong and obfuscate but it is hard for them to totally bury some of the hideous and now public details. For example, the Brereton report (p.120) says Australian soldiers slit Afghan children's throats: "members from the SASR ... saw two 14-year-old boys whom they decided might be Taliban sympathizers. They stopped, searched the boys, and slit their throats. The rest of the Troop then had to clean up the mess, which involved bagging the bodies and throwing them into a nearby river". (https://afghanistaninquiry.defence.gov.au/sites/default/files/2020-11/IGADF-Afghanistan-Inquiry-Public-Release-Version.pdf)

Q: How was the Afghans reaction to the possible war crimes by Australian Special Forces in their territory?

A: I cannot really say, I have just heard that there is the outrage, I imagine not so much at the fact that horrific crimes have been committed they know that - but that there has been yet another exposure of these crimes and they fear that, once again, they will be denied justice and accountability.

Q: What is the Australian motive in participating in the wars that the United States start once in a while? Does it serve Australian security or the economy?

A: Canberra turned to Washington in 1942, when Britain abandoned its colony in Singapore in face of a Japanese advance. Australia swapped one big brother for another and we have paid a heavy process for this protection by participating in every war since, from Korea through Vietnam to the multiple New Middle East wars. Our ferocious pro-war media (run by a few giant investment cartels) has normalized war to the point where Australian people are either numbed or intimidated and fearful to speak out. This has seriously undermined our democracy. Former Prime Minister Kevin Rudd (with support from another former PM, Malcolm Turnbull) recently created a petition which calls for an inquiry into the impact of the Murdoch media on Australian democracy. The Murdoch media has backed every U.S. war in living memory. Engagement with U.S. driven wars now has Australia at odds with its major trade partner China. U.S. dependence is a truly toxic relationship.

Go here to see the original:

Murder of 39 Afghans by Australian soldiers only 'tip of the iceberg': professor - Tehran Times

The Collapse of Cryptography? Considering the quantum threat to blockchain – Lexology

In our 2019 paper March of the Blocks we commented on the substantial compliance hurdles that the General Data Protection Regulation (GDPR) presents to the ongoing development of blockchain solutions that involve storing (and transacting with) data. There, we concluded that blockchain solutions that respect the fundamental principles of data protection and privacy are achievable. But does our conclusion hold firm in light of the threat posed by quantum technology to the integrity of data recorded on a blockchain?

In this article, with help from the team at our Quantum Computing Hub, we revisit our thinking and interrogate whether quantum computers herald the end of data security in the context of blockchain solutions, or whether the reality is in fact more nuanced.

Simply put, quantum computers are computers that make use of two laws of quantum mechanics: superposition and entanglement. They do so via quantum bits or qubits. This is easiest to explain by reference to classical computers (the computers we currently use) which make use of bits, units of information which can only exist in one of two states: off or on, 0 or 1.

Because of superpositionwhich refers to the ability of individual units to exist in several possible states at the same timea qubit in a quantum computer can be on, off, or on and off in a variety of combined states at a single point in time.

Entanglementwhich describes the phenomenon whereby particles interact with each other and share their states even if separatedmeans that the state of a series of qubits can become linked.

These properties enable quantum computers to perform certain tasks with greater efficiency than even the most powerful classical computers. These tasks include searching through an unordered list for a specific item, identifying causal relationships, and finding the prime factors of large numbers.

Identifying the quantum threat to blockchain

A blockchain is a series of blocks of data, linked together by a cryptographic hash to form a chain. A cryptographic hash is a function that turns a block of data of any length into a fixed length output. The hash stored in each block of the chain operates like a fingerprint of the previous block, and it is possible to run a hash-checking process over the previous block to confirm that it generates the correct hash. If the previous block is changed in any way, it will not generate the correct hash and the chain will be broken. Therefore, the data of any block in the chain cannot be modified without changing the hash of every block that comes after it in the chain.

Many blockchain solutions also deploy public-key cryptography, where both public and private keys are made up of a string of alphanumeric characters. If a user wants to send encrypted data to a recipient, it must utilise that recipients public key (which is broadcast to the network). The sender can encrypt their data with this public key, and send the data to the recipient. Only the recipients private key (which the recipient keeps secret) can then be used to decrypt the data. Where blockchain solutions facilitate transactions, private keys are often used to sign and authenticate transactions.

The fly in the ointment (and a chink in the blockchains armour) is that many popular public-key cryptographic algorithms, including RSA encryption, are vulnerable to attack from quantum computers. This is because those cryptographic algorithms rely on mathematical calculations which break down large numbers into their prime factors (the prime numbers that, when multiplied, equal the original large number), something which is hugely time consuming for conventional computing circuits to compute. As we have already observed, this is a task that quantum computers are poised to perform with relative ease as compared to classical computers.

It has also been suggested that quantum computers increase the risk of a 51% or majority attack, whereby a bad actor seeks to take control of a majority of the nodes in a blockchain network and thereby acquires the ability to interrupt the recording of new blocks, as well as reversing records of blocks that had been completed while they were in control of the network.

What does this mean from a legal perspective?

A number of legal risks arise in a UK context, and similar obligations may well apply in other jurisdictions. In particular, the GDPR requires controllers and processors to ensure that personal data is processed in a manner that protects against unauthorised or unlawful processing and, accordingly, to implement appropriate technical and organisational security measures. Data protection should, moreover, be baked in to processing activities and business practices from the design state right through the lifecycle. Should quantum computers be able to compromise data stored on a blockchain, compliance with these requirements will similarly be compromised.

Legal liability does not stop at the GDPR, however, and may vary depending on the type of entity that is storing data on a blockchain solution. For example, organisations that fall within scope of the Network and Information Security (NIS) Directivewhich include operators of essential servicesare subject to further requirements to manage the risks posed to the security of networks and information systems which they use in their operations.

UK financial services firms should also be mindful of proposed PRA and FCA rules to improve the operational resilience of firms, expected to be published in Q1 2021, in addition to requirements relating to appropriate systems and controls and adequate risk management systems. Senior managers within regulated firms who are responsible for data security could, moreover, come under regulatory scrutiny in the event that any data was compromised.

In addition, interference with the integrity of data recorded on a blockchain could constitute an infringement of directors duties under the Companies Act 2006, as well as a breach of the UK Corporate Governance Code.

As this survey of the legal position demonstrates, the implications of quantum computers rendering vulnerable data stored on a blockchain are significant. But, in practice, how real is this threat?

Commentators appear confident that cryptography will be able to keep pace with developments in quantum computers, which are expected to be in use by governments and companies in the 2030s. As such, current cryptographic techniques can be transitioned to cryptography that is resistant to quantum attacks (sometimes referred to as post-quantum cryptography). There is, however, no proof that any of the currently recognised post-quantum methods are secure against a quantum computer.

The degree of vulnerability of incumbent blockchain systems is, moreover, subject to debate. To take one example, the blockchain solution underlying Bitcoin (which utilises a number of cryptographic techniques in addition to public-key cryptography) is considered by some to be quantum-resistant in its current incarnation, although this appears to be a minority view.

Where incumbent systems are vulnerable to quantum computers, it is certainly the case that a bad actor could steal data now and wait until advances in quantum computing enable access, irrespective of subsequent precautions put in place.

While the degree of the threat remains subject to debate, it is clear that quantum computing has the potential to undermine the integrity of data stored on blockchain solutions. As we have explored, this could give rise to a number of negative legal consequences, in particular under the GDPR.

Various measures can, however, be taken in order to mitigate such consequences. We have already highlighted the need to bring current cryptographic techniques up to date with post-quantum cryptography. In addition, as flagged in our March of the Blocks paper, the storing of personal data on a blockchain should be avoided as far as it is possible to do so.

This could potentially be achieved via middleware applications (software that sits on top of one or more underlying blockchain networks, enabling the application of those blockchain networks to particular use cases) by avoiding, for example, any free form data fields for names and contact details. These applications could also employ more advanced techniques to recognise and remove personal data from information submitted to the blockchain network.

To conclude, we remain optimistic that the GPDR and other legislation relating to data security need not stymy the development of blockchain solutions. The limitations presented by blockchain must, however, be recognised and a pragmatic approach adopted, particularly in light of the threat to data integrity posed by quantum computers.

The rest is here:
The Collapse of Cryptography? Considering the quantum threat to blockchain - Lexology

New IBM encryption tools head off quantum computing threats – TechTarget

The messages surrounding quantum computers have almost exclusively focused on the sunny side of how these machines will solve infinitely complex problems today's supercomputers can't begin to address. But rarely, if ever, have the masters of hype focused on the dark side of what these powerful machines might be capable of.

For all the good they promise, quantum systems, specifically fault-tolerant quantum systems, are able to crumble the security that guards sensitive information on government servers and those of the largest Fortune 500 companies.

Quantum computers are capable of processing a vast number of numerical calculations simultaneously. Classical computers deal in ones and zeros, while a quantum computer can use ones and zeros as well as achieve a "superposition" of both ones and zeros.

Earlier this year, Google achieved quantum supremacy with its quantum system by solving a problem thought to be impossible to solve with classical computing. The system was able to complete a computation in 200 seconds that would take a supercomputer about 10,000 years to finish -- literally 1 billion times faster than any available supercomputer, company officials boasted.

Quantum computers' refrigeration requirements and the cost of the system itself, which has not been revealed publicly, make it unlikely to be a system IBM or other quantum makers could sell as they would supercomputing systems. But quantum power is available through cloud services.

Faced with this upcoming superior compute power, IBM has introduced a collection of improved cloud services to strengthen users' cryptographic key protection as well as defend against threats expected to come from quantum computers.

Building on current standards used to transmit data between an enterprise and the IBM cloud, the new services secure data using a "quantum-safe" algorithm. Though quantum computers are years away from broad use, it's important to identify the potential risk that fault-tolerant quantum computers pose, including the ability to quickly break encryption algorithms to get sensitive data, IBM said.

Part of IBM's new strategic agenda includes the research, development and standardization of core quantum-safe cryptography algorithms as open source tools such as Crystals and Open Quantum Safe grow in popularity.

With emerging technologies like quantum computing, users can't accurately predict how long it will be before they need services like this. Judith HurwitzPresident, Hurwitz & Associates

The agenda also includes the standardization of governance tools and accompanying technologies to support corporate users as they begin integrating quantum systems alongside existing classical systems.

Some analysts applaud IBM for extending support for the new cloud services beyond the security needs of existing hybrid cloud users to quantum computers as a way of future-proofing the new offerings.

"With emerging technologies like quantum computing, users can't accurately predict how long it will be before they need services like this," said Judith Hurwitz, president of Hurwitz & Associates. "But prices [of quantum systems] could come down and the technology mature quicker than you anticipate, so you may need services like this to work across platforms. It could also be IBM just wanting to show how far ahead of everyone else they are."

While fault-tolerant quantum computers are a long way from reality for the vast majority of hackers, some analysts point out that adversarial governments could access such systems sooner rather than later to break the security schemes of the U.S. military and other federal government agencies.

"There could be legitimate concern about some well-organized and funded nation-states using quantum computers to crack algorithms to get at sensitive information, but there is little chance cybercriminals can get access to a quantum system anytime soon," said Doug Cahill, vice president and group director of cybersecurity with Enterprise Strategy Group. "But the short-term benefit here is future-proofing for mission critical workloads."

The need for data privacy is more critical as users become increasingly dependent on data, said Hillery Hunter, vice president and CTO of IBM Cloud, in a prepared statement. Security and compliance remain central to IBM's Confidential Computing initiative, Hunter said, as it is for corporate users in highly regulated industries where it's critical to keep proprietary data secure.

IBM also delivered an improved version of its Key Protect offering, designed for lifecycle management for encryption keys used in IBM Cloud services or in applications built by users. The new version has the ability to use quantum-safe cryptography-enabled Transport Layer Security (TLS) connections, which helps protect data during key lifecycle management.

The company also unveiled quantum-safe cryptography support features that enable application transactions. For instance, when cloud-native containerized applications run on Red Hat's OpenShift or IBM Cloud Kubernetes Services, secured TLS connections contribute to application transactions with quantum-safe cryptography support during data-in-transit protecting against breaches.

IBM's Cloud Hyper Protect Crypto Service provides users with Keep Your Own Key features. The offering is built on FIPS-140-2 Level 4-certified hardware, which gives users exclusive key control and authority over data and workloads that are protected by the keys.

"What I like about this is you get to keep your own [encryption] keys for cloud data encryption, which is unique," said Frank Dzubeck, president of Communications Network Architects. "No one but you -- not even cloud administrators -- can access your data."

The product is primarily meant for application transactions where there is a more essential need for advanced cryptography. Users are allowed to keep their private keys secured within the cloud hardware security module and, at the same time, offload TLS to the IBM Cloud Hyper Protect Crypto Services, thereby creating a more secure connection to the web server. Users can also gain application-level encryption of sensitive data, including credit card numbers, before it gets stored in a database system.

Continued here:
New IBM encryption tools head off quantum computing threats - TechTarget

Stealth Solution helps Korean firms improve their cryptographic security standards – SecurityBrief Asia

Now, more than ever, security is at the forefront of our increasingly digitized world one that is quickly moving toward everything encrypted, signed, and authenticated. Financial institutions and enterprise customers are being presented with a host of new considerations that must be vetted when managing cryptographic keys across HSMs and clouds.

Stealth Solution, in partnership with Unbound Tech, the leader in cryptographic security infrastructure, isprimed to deliver their key management platform to financialand technology companies throughout Korea.

Stealth, a Seoul Korea based fintech service provider and value-add reseller,is known for shifting the way financial institutions secure and privatize their digital assets. It will exclusively implement and service Unbounds proven security platform. The MPC based security solutions combine both the operational efficiency aspect of a software-only platform and the complete elimination of the single point of failure in cryptographic key management and infrastructures protection.

Financial organizations and enterprises alike will benefit from enlisting the highly specialized security services expertise that Stealth is known for, along with the many benefits that Unbounds platform delivers. With this combined offering customers can complement existing HSMs, as well as support their shift to virtualization and cloud, while reducing their overall costs and long-term hardware dependencies, therefore, increasing security, visibility, and control seamlessly for the end-user.

The fully embedded key management platform can be used to secure digital assets, information and identity - and is a 100% software-based solution that supports all types of infrastructure no matter the OS, on-premise, any cloud, across any device, anywhere. This results in the most innovative yet cost-effective, cloud-agnostic software solution for organizations requiring a rapid transformation they can trust with minimal IT interference and maximum scalability.

Unbound's solutions are built to cater to enterprises and banks worldwide who need the assurance of a secure and agile cryptography platform that includesquantum encryption, centralized key management with BYOK (bring your own key) or CYOK (control your own key) support, as well as HSM/virtual HSM coexistence.

Unbound solutions offer a security guarantee on par with FIPS 140-2 Level 3 certified modules, with added security benefits that were designed for the modern digital IT environment.

Additionally, Unbound is also the first software-only solution that allows high-trust operations from insecure devices. Secure any key for any mobile application, anywhere even when the underlying device is compromised. Unbound greatly reduces the possibility of brute force attacks, side-channel attacks, social engineering threats, and other common pitfalls of hardware and software token authentication methods for mobile devices.

With Unbound's growing digital footprintand the ongoing threats by hackers targeting mission-critical assets companies cannot afford to be complacent or allow themselves to risk their market-wide reputation under a false pretence of being secure. They must act now, understand the landscape, and implement the standards that will enable them to support their customers of yesterday, today, and tomorrow.Register today to learn more about Stealth and Unbound here.

Unbound Tech CEO and co-founder Prof. Yehuda Lindell, and Stealth Solutionpresident Hyo Keun Wang confirm their exclusive partnership agreement.

See the original post here:
Stealth Solution helps Korean firms improve their cryptographic security standards - SecurityBrief Asia

PayPal and NTU to Boost Cryptography Research in Singapore – finews.asia

The research project is valued at more than S$340,000 ($255,330), inclusive of a PayPal financial grant of S$140,000.

PayPal will work with Nanyang Technological University'sStrategic Centre for Research in Privacy-Preserving Technologies & Systems (SCRIPTS) to further cryptography research in secure multiparty computation (MPC) in Singapore, the global payments giant announced in a statement on Thursday.

The 15-month-long collaboration aims tofuture-proof PayPals security infrastructure and processes as online transactions continue to rise, the announcement said.

SCRIPTS will deliver a highly secured, resilient, and efficient cryptographic protocol that aims to strengthen the cryptographic operation used in PayPals data protection and security. By the end of the project, PayPal will have laboratory-based and large-scale prototypes developed based on its own use cases and requirements, as well as research that can be shared with the industry.

Game-Changing

According to PayPal, secured MPC could have a game-changing impact on the way data security is implemented for data-in-use when shared data is processed to derive insights and drive actionable steps in an untrusted external environment.

MPC can also support the data risk management strategy for businesses handling sensitive personal information of customers, employees and organizations through strengthening its data encryption platform.

The benefits of this research go beyond the financial sector, opening doors to a wide range of possibilities for cross-sector data sharing and thereby enhancing industry collaboration,Phoram Mehta, PayPal APAC chief infosec officer, said.

Link:
PayPal and NTU to Boost Cryptography Research in Singapore - finews.asia

KU teacher figures in top 2% scientists of world – Brighter Kashmir

Bringing laurels to Kashmir, senior Assistant Professor at the Department of Electronics, University of Kashmir has earned a very rare distinction by figuring in top 2 per cent scientists of the world.

Dr. Shabir Ahmad Parah, a resident of Zazna in the Lar belt of Central Kashmir's Ganderbal district has been listed among two per cent scientists by Stanford Dr Shabir said there is no substitute to hard work to achieve any goal in life."Through hard work, focus and dedication, any dream can be achieved," he said.Dr. Shabir has authored more than 120 research papers so far in SCI journals and conferences. His work has been published by very reputed publishers like IEEE, Elsevier, Springer, Wiley etc. He has bagged four IEEE awards which include three best technical paper awards and one best Algorithmica award.Dr. Shabir has also edited one book on Multimedia Security and has contributed around 15 chapters in various edited books, besides he has been successful in obtaining a research grant of more than Rs1.2 crore from Department of Science and Technology, Ministry of Science and Technology, New Delhi and University Grants Commission.Dr. Shabir is the first student of Kashmir division who qualified JRF/NET in Electronic Sciences subject in 2008.In addition, he has topped in entrance examinations of M. Sc. Electronics, and M. Phil. Electronics, which he pursued from the University of Kashmir.He received Ph.D. degree in Electronics from the department of Electronics and Instrumentation Technology, Kashmir University, in the year 2013, and is presently serving the same department incapacity of senior Assistant Professor.Dr. Shabir is jointly leading Signal Processing and Communication Engineering Research Group (SPACE- Research Group) at the department of Electronics, Kashmir University.His research interests include Multimedia Security, Cryptography, Image Processing, Artificial Intelligence, IoT, bio-medical imaging and smart health.He has been listed in the top two per cent scientists in the field of Networking and Telecommunications and sub-field of Artificial intelligence and image processing(KNO)

Visit link:
KU teacher figures in top 2% scientists of world - Brighter Kashmir

Quantum Computing Market : Overview Report by 2020, Covid-19 Analysis, Future Plans and Industry Growth with High CAGR by Forecast 2026 – The Courier

Latest added Quantum Computing Market research study by MarketDigits offers detailed product outlook and elaborates market review till 2026. The market Study is segmented by key regions that is accelerating the marketization. At present, the market is sharping its presence and some of the key players in the study are Honeywell International, Accenture, Google, Microsoft, Xanadu, Anyon System, QC Ware Corp, Intel Corporation. The study is a perfect mix of qualitative and quantitative Market data collected and validated majorly through primary data and secondary sources.

This report studies the Quantum Computing Market size, industry status and forecast, competition landscape and growth opportunity. This research report categorizes the Quantum Computing Market by companies, region, type and end-use industry.

Request for Free Sample Copy of This Report @ https://marketdigits.com/quantum-computing-market/sample

Scroll down 100s of data Tables, charts and graphs spread through Pages and in-depth Table of Content on Global Quantum Computing Market By System (Single Qubit Quantum System and Multiple Qubit System), Qubits (Trapped Ion Qubits, Semiconductor Qubits and Super Conducting), Deployment Model (On-Premises and Cloud), Component (Hardware, Software and Services), Application (Cryptography, Simulation, Parallelism, Machine Learning, Algorithms, Others), Logic Gates (Toffoli Gate, Hadamard Gate, Pauli Logic Gates and Others), Verticals (Banking And Finance, Healthcare & Pharmaceuticals, Defence, Automotive, Chemical, Utilities, Others) and Geography (North America, South America, Europe, Asia- Pacific, Middle East and Africa) Industry Trends and Forecast to 2026. Early buyers will get 10% customization on study.

To Avail deep insights of Quantum Computing Market Size, competition landscape is provided i.e. Revenue Analysis (M $US) by Company (2018-2020), Segment Revenue Market Share (%) by Players (2018-2020) and further a qualitative analysis is made towards market concentration rate, product/service differences, new entrants and the technological trends in future.

Unlock new opportunities in Quantum Computing Market; the latest release from MarketDigits highlights the key market trends significant to the growth prospects, Let us know if any specific players or list of players needs to consider to gain better insights.

Grab Complete Details with TOC For Free @ https://marketdigits.com/quantum-computing-market/toc

Global quantum computing market is projected to register a healthy CAGR of 29.5% in the forecast period of 2019 to 2026.

Quantum computing is an advanced developing computer technology which is based on the quantum mechanics and quantum theory. The quantum computer has been used for the quantum computing which follows the concepts of quantum physics. The quantum computing is different from the classical computing in terms of speed, bits and the data. The classical computing uses two bits only named as 0 and 1, whereas the quantum computing uses all the states in between the 0 and 1, which helps in better results and high speed. Quantum computing has been used mostly in the research for comparing the numerous solutions and to find an optimum solution for a complex problem and it has been used in the sectors like chemicals, utilities, defence, healthcare & pharmaceuticals and various other sectors.

Quantum computing is used for the applications like cryptography, machine learning, algorithms, quantum simulation, quantum parallelism and others on the basis of the technologies of qubits like super conducting qubits, trapped ion qubits and semiconductor qubits. Since the technology is still in its growing phase, there are many research operations conducted by various organizations and universities including study on quantum computing for providing advanced and modified solutions for different applications.

For instance, Mercedes Benz has been conducting research over the quantum computing and how it can be used for discovering the new battery materials for advanced batteries which can be used in electric cars. Mercedes Benz has been working in collaboration with the IBM on IBM Q network program, which allows the companies in accessing the IBMs Q network and early stage computing systems over the cloud.

Some of the major players operating in this Quantum Computing Market are Honeywell International, Inc., Accenture, Fujitsu, Rigetti & Co, Inc., 1QB Information Technologies, Inc., IonQ, Atom Computing, ID Quantique, QuintessenceLabs, Toshiba Research Europe Ltd, Google,Inc., Microsoft Corporation, Xanadu, Magiq Technologies, Inc., QX branch, NEC Corporation, Anyon System,Inc. Cambridge Quantum Computing Limited, QC Ware Corp, Intel Corporation and others.

Product Launch

Research Methodology: Global Quantum Computing Market

Primary Respondents: OEMs, Manufacturers, Engineers, Industrial Professionals.

Industry Participants: CEOs, V.P.s, Marketing/Product Managers, Market Intelligence Managers and, National Sales Managers.

The Quantum Computing market research report makes an organization armed with data and information generated by sound research methods. This market analysis helps to get up to date about various segments that are relied upon to observe the rapid business development amid the estimate forecast frame. This market research report offers an in-depth overview of product specification, technology, product type and production analysis considering major factors such as revenue, cost & gross margin. Quantum Computing market report plays very essential role when it is about achieving an incredible growth in the business.

Quantum Computing Market Reports Table of Contents

1.1. Market Definition and Scope

1.2. Market Segmentation

1.3. Key Research Objectives

1.4. Research Highlights

4.1. Introduction

4.2. Overview

4.3. Market Dynamics

4.4. Porters Five Force Analysis

5.1. Technological Advancements

5.2. Pricing Analysis

5.3. Recent Developments

Any Questions? Inquire Here Before Buying @ https://marketdigits.com/quantum-computing-market/analyst

About Market Digits :

MarketDigits is one of the leading business research and consulting companies that helps clients to tap new and emerging opportunities and revenue areas, thereby assisting them in operational and strategic decision-making. We at MarketDigits believe that market is a small place and an interface between the supplier and the consumer, thus our focus remains mainly on business research that includes the entire value chain and not only the markets.

We offer services that are most relevant and beneficial to the users, which help businesses to sustain in this competitive market. Our detailed and in-depth analysis of the markets catering to strategic, tactical, and operational data analysis & reporting needs of various industries utilize advanced technology so that our clients get better insights into the markets and identify lucrative opportunities and areas of incremental revenues.

Contact Us :

Market Digits

Phone : +91-9822485644

Email : sales@marketdigits.com

Visit link:
Quantum Computing Market : Overview Report by 2020, Covid-19 Analysis, Future Plans and Industry Growth with High CAGR by Forecast 2026 - The Courier

Something Trump and Biden agree on – POLITICO – Politico

BEHIND THE VETO THREAT President Donald Trumps war against Big Tech turned into a game of chicken today: Congress is forging ahead with a must-pass defense policy bill while ignoring Trumps threat to veto it unless it repeals a 24-year old law that protects websites from lawsuits. The law Section 230 of the Communications Decency Act of 1996 means that tech giants like Twitter and Facebook (and tech small fry, too) cant be sued for the user content on their platforms. Many credit it with giving rise to the internet we know and love to hate today.

Repealing it has become an obsession for Trump, one that has escalated in the twilight of his presidency, as Cristiano Lima details today. He mentions it frequently in his rallies without really explaining what it does. Yet President-elect Joe Biden also has said he supports repealing the law, telling The New York Times in January, Section 230 should be revoked, immediately. So theres at least the potential for bipartisan agreement for change when Congress is off deadline.

Nightly asked a group of experts and insiders whether they think Section 230 should be repealed or amended or whether it should be left alone. Heres what they said:

Section 230 is Big Techs sweetheart deal. No other companies get the kind of protections that internet giants enjoy. And over and over, weve seen them abuse those privileges by censoring and deplatforming anyone who contradicts whatever progressive agenda theyre trying to push on any given day. If Congress cant get its act together and revise Section 230 to allow Americans to fight back, the whole thing needs to go. Maybe a clean slate is exactly what we need at this point to ensure that real change happens. Sen. Josh Hawley (R-Mo.)

It is long overdue to amend Section 230. The whole point of Section 230 was to enlist online service providers as Good Samaritans so that they would help reduce the amount of abusive online activity. Congress knew then, in 1996, that federal agencies needed help in curtailing and combating toxic and dangerous online activity and that online service providers were in the best position to help.

Yet Congress did not condition the legal shield for under-filtering on any behavior at all. This has led to sites enjoying the legal shield even though they encourage, solicit or make money from clear illegality. So revenge porn operators enjoy that immunity their business model is the destruction of peoples lives. They should not enjoy that immunity. Section 230(c)(1) should be amended to condition the immunity on reasonable content moderation practices in the face of clear illegality that causes serious harm. That would reset the statute to its original purpose rewarding online service providers that act as Good Samaritans. Danielle Keats Citron, a law professor at Boston University and a 2019 MacArthur fellow

Many recent proposals to change Section 230 would make it more difficult for platforms to curb misinformation and abuse, purportedly in the name of free speech. Of course, although Section 230 provides procedural protections, the First Amendment also allows private platforms to decide whether to carry user content. More generally, the interests of free expression are best served by competition policy that ensures there are multiple platforms including those with varying content policies, and by allowing platforms to take steps to ensure they are safe for all users. We support reforms that address platform business practices for example, to ensure that platforms are responsible for ads they carry, and oppose efforts to use Section 230 to avoid normal business regulation. Any reforms we may consider are part of ensuring that Section 230 continues to be a law that promotes speech online. John Bergmayer, legal director for Public Knowledge, a D.C.-based public interest group that promotes freedom of expression and open internet

We rely on Section 230-protected internet services literally multiple times an hour. Amending or repealing Section 230 likely solves none of the problems that would motivate such changes, while the changes would jeopardize the things we love the most about the internet while entrenching incumbents at the expense of new startups.

I wish our members of Congress would understand just how much Americans love the internet services that Section 230 enables; and it shows greatly disrespect towards their constituents when Congressmembers threaten to repeal or amend Section 230 as a bargaining chip, as a way of trying to punish Big Tech, or to send messages to their base. Eric Goldman, a law professor at Santa Clara University who has co-edited a new book about a key Section 230 case

Welcome to POLITICO Nightly. Austins mayor is the latest example of a political leader not necessarily following his own pandemic guidelines. Reach out at [emailprotected], or on Twitter at @renurayasam.

A message from AARP:

More than 94,000 residents and staff of nursing homes and long-term care facilities have died from COVID-19. With cases spiking across the country once again, desperate families demand that Congress take immediate action to save lives. aarp.org/nursinghomes

A man wearing full protective clothing and a gasmask walks through the decorated piazza of Covent Garden in London. | Getty Images

STILL MIGUK? In Korea, the U.S. is called miguk, which directly translates to beautiful country. It has always seemed like a fitting name, considering Koreas longstanding admiration of the U.S. But these days in Korea, TV broadcasters talk about the U.S. with grim faces, flashing to b-roll of lines of Americans wrapped around buildings waiting for Covid-19 testing or graphs depicting an exponential growth of pandemic deaths, writes Catherine Kim from Seoul.

Newspaper headlines question the strength of U.S. democracy above pictures of demonstrators protesting mythical claims of voter fraud. One recent column in the Hankyoreh, a major center-left daily newspaper, was titled, Covid-19 and the downfall of the U.S. Another headline, in sisajournal, a popular weekly current events magazine, read: The surprising election system that make you wonder Is the U.S. actually a democratic country? And its not just in the news. In boardrooms, in classrooms and in casual dinner table conversations, youll hear the same sense of bewilderment: How did the U.S. lose its way?

Its a shocking development for a country that has, for decades, largely viewed the United States almost like an older sibling a model of success and progress that Koreans were proud to emulate. Now many Koreans see the U.S. as a failing country, deeply divided and unable to meet basic challenges.

The shift began after Trumps 2016 win, when many Koreans were shocked to see him claim the presidency after a string of scandals. But the clincher has been Americas bungled response to Covid-19, followed by Trumps and the GOPs recent efforts to contest the legitimate results of the 2020 U.S. election. For Koreans, the last year has exposed the deep problems within the American system, from hyper-partisanship and deep distrust in government to a poor healthcare system issues that have long been familiar to Americans, but not to Koreans, many of whom have maintained the idea of American exceptionalism far longer and livelier than many Americans.

YES, 2024S STARTING Even in defeat, Trumps hold on the Republican party remains strong. The president has teased running again in 2024 and while Trump was slow to win party support four years ago, plenty of Republican lawmakers are ready to support his next bid, write Burgess Everett and Melanie Zanona. In a series of interviews today, House and Senate Republicans made clear that the party has no intention of turning its back on Trumpism or Trump himself. Thats in part because Trump remains an exceedingly popular figure in his party, far more than most congressional Republicans.

The political calculus is also clear. While he will soon lose the Oval Office, hell still have his Twitter handle and is expected to still be in firm control of his base. Trump could play a central role in Senate and House primaries in 2022 and create trouble for incumbents who break with him. Future Republican presidential candidates will presumably be eager to court his supporters if he ultimately passes on another campaign.

RNC Chair Ronna McDaniel is inviting roughly a dozen potential 2024 candidates to the committees January meeting in Amelia Island, Fla. the most explicit move shes made yet to show that the committee will be impartial going forward.

TEARS ON THE FLOOR Prior to Sen. Lamar Alexanders farewell address in the upper chamber, Majority Leader Mitch McConnell gave a tearful goodbye to the Tennessee Republican. I myself have leaned on Lamars wisdom for many years, but I think I leaned just as much on his optimism, his can-do spirit, his ability to look on the bright side and then discern how some more hard work could make it brighter still, McConnell said.

HART ATTACK A Democratic candidate who fell six votes short of holding an open battleground congressional district in Iowa is planning to challenge those results directly with the House, placing the chamber in the highly unusual position of potentially determining the outcome of the race, Sarah Ferris and Ally Mutnick write.

After what appears to be the tightest congressional election in decades, Rita Hart, a state senator, has decided to forgo a legal battle in her home state and will instead contest the election directly with the House Administration Committee. Iowa election officials certified Republican Mariannette Miller-Meeks as the winner on Monday after a recount diminished her initial victory margin from 47 votes to only 6 votes.

LITTLE STATE IN THE GREAT MENTIONING Rhode Island Gov. Gina Raimondo is now a top contender to be Bidens HHS secretary pick, according to two people close to the transition, Alice Miranda Ollstein, Adam Cancryn and Tyler Pager write. Raimondos rise comes as New Mexico Gov. Michelle Lujan Grisham is no longer favored for the role, according to one of those sources and another familiar with the discussions.

FROM TRANSITION PLAYBOOK A former colleague of Heather Boushey, a top economic adviser to Biden, is publicly airing prior accusations that Boushey mismanaged the think tank she runs and verbally abused her and other subordinates, saying she wants to prevent future White House employees from enduring a similar experience, write Alex Thompson and Theodoric Meyer.

Former subordinates and employees have alleged that Boushey was phenomenally incompetent as a manager and had frequent episodes of yelling and swearing. The complaints were serious enough that the think tank where she worked hired a management coach to work with her to improve her management style around 2015.

But Dinetta Parrott, who reported directly to Boushey as Washington Center for Equitable Growths director of development from 2017 to 2020 before leaving for the Brookings Institution, said the criticisms of Boushey dont match her experience. I just dont think its an accurate depiction, she told POLITICO.

BIDENS CARPENTRY You cant please everyone, especially when youre putting together a team to run the federal government. In the latest POLITICO Dispatch, Megan Cassella looks at why Bidens promise to build a Cabinet that looks like America hasnt turned out the way advocates had hoped and what sort of turbulence his nominees could face in the Senate.

Welcome to Bidenology, Nightlys look at the president-elect and what to expect in his administration. Tonight, Andy Blatchford writes from Ottawa about Bidens relationship with Canada:

The arrival of a Biden presidency is expected to warm up the chill between Ottawa and Washington under the Trump administration.

Trump drove a turbulent NAFTA renegotiation, an undertaking marked by U.S. tariffs on Canadian steel and aluminum, and counter-measures from the Trudeau government on American goods. There were even choice words at the executive level. (Trudeaus hot mic moment at a NATO conference led Trump to call him two-faced.)

While the Biden White House is destined to be more neighborly, some Canadians worry the president-elects agenda could hurt cross-border business. Prime Minister Justin Trudeau and Biden are aligned on a lot of things, like climate policies. But there are trouble spots such as Bidens pledge to kill the Keystone XL project and his Buy American vows.

Biden and Trudeau have shared very few public moments together. But back in December 2016, a few weeks after Trumps election win, Trudeau hosted then-Vice President Biden for a state dinner on a snowy night in Ottawa. The guest list included former Canadian prime ministers. Biden gave a speech that touched on his own ties to Canada and his personal connection in the 1970s with Trudeaus father, who was prime minister at the time.

The day after the dinner, Biden stuck around to attend a round table with Indigenous leaders and provincial premiers where they talked at length about climate change and clean energy the two places where Canada and the U.S. are expected to start rekindling their relationship. At the round table, Biden called climate change the most consequential issue of our generation and argued the countries could grow their economies while bringing down emissions. He also made the case that Canada and the U.S. could determine their own energy futures and help shape energy trends around the world.

Nightly asks you: Every December, the news media reflects on the lives we lost this year, and 2020 has been especially deadly. Tell us who youll miss the most a family member, a civic leader, a celebrity and how youll remember them. Send us your answers in our form, and well publish select responses next week.

PADILLA RISING? Sen. Dianne Feinstein publicly threw her weight behind California Secretary of State Alex Padilla to fill Sen. Kamala Harris soon-to-be-vacant seat, signaling that Padilla remains a favorite of the Democratic establishment, Andrew Desiderio and Jeremy B. White write. Gov. Gavin Newsom will appoint a replacement for Harris when she resigns to take on her vice presidential duties.

I have given him my support. I did that quite a while ago. He worked for me at one point, so I know him, Feinstein said in an interview. And my sense is that hes going to represent California very well.

BRITAIN GOES FIRST For once, the U.K. really was world-beating. Boris Johnson will be delighted that British regulators were first over the line in approving a Covid-19 vaccine, delivering global headlines and a welcome bit of good news after a bruising parliamentary rebellion against domestic coronavirus restrictions, Charlie Cooper and Emilio Casalicchio write.

Nearly 1 million doses of the Pfizer/BioNTech vaccine will be delivered to the U.K. for use from next week. By the end of the year, several hundred thousands more will have been sent to Britain, which has ordered 40 million doses of this vaccine, plus more than 300 million doses of other candidates that have not yet received regulatory approval, including 100 million of the Oxford-produced AstraZeneca vaccine.

For a country whose record on Covid-19 has been among the worst in the Western world, being at the forefront of the global rollout of vaccines has a welcome feel of redemption for Johnsons government. The prime minister himself was uncharacteristically muted in his celebrations, calling the regulatory approval unquestionably good news but by no means the end of the story and cautioning citizens, during his weekly question session in the House of Commons, not get their hopes up too soon over how quickly the two-dose vaccine could be rolled out.

A SETBACK FOR BABES FREQUENT FLYER MILES Your pet peacock may soon not be allowed to fly the friendly skies with you anymore, now that the Transportation Department is tightening rules on emotional support animals after a series of high-profile incidents on board airplanes, Stephanie Beasley and Evan Semones write.

Today, DOT said it will no longer consider animal companions used by travelers on commercial flights for emotional support as service animals, opening the door for airlines to ban them outright. Passengers who wish to bring their emotional support animals with them when they travel will likely now have to check them as baggage or leave them at home entirely.

The new rule, which updates the definition of a service animal to a dog that is individually trained to do work or perform tasks for the benefit of a person with a disability, was issued following a litany of complaints from airlines and flight attendants alike about people bringing unusual animals including pigs, gerbils, turtles and birds, among others on board that they said were for emotional support.

A message from AARP:

SENIORS DEMAND ACTION

It is an outrage that more than 94,000 residents and staff of nursing homes and other long-term care facilities have died from COVID-19, representing 40% of all COVID-19 deaths nationwide, even though nursing home residents make up less than one percent of the U.S. population. Cases are spiking across the country once again and Congress must act now to help save lives in these facilities.

Congress must ensure residents and staff have regular and prioritized testing and personal protective equipment (PPE), that facilities are adequately staffed and that residents have access to virtual visits with their loved ones. Additionally, Congress must make sure taxpayer dollars going to nursing homes are spent only on items directly related to resident care, COVID-19 prevention and treatment.

Tell Congress to act now to protect the residents and staff of nursing homes and other long-term care facilities. aarp.org/nursinghomes

Did someone forward this email to you? Sign up here.

Here is the original post:

Something Trump and Biden agree on - POLITICO - Politico

Slog AM: Giuliani Turns Election Hearing into a Circus, US Sets COVID Death Record, Another Freaking Monolith Appears – TheStranger.com

Dear Stranger readers,

We've never experienced a year like 2020. What a doozy. As the year draws to a close, we'd like to THANK YOU for your ongoing support and readership. We literally couldn't have made it without your generosity.

2021 will be another epic ride for Seattle, and we want to navigate it with you. This year, we're asking you to give yourself and Seattle the gift of The Stranger by supporting us with a year-end gift. You can even gift it to a friend! Make a contribution in their name, and we'll send them a personalized thank you note.

Your one-time or recurring contribution will help ensure that we will be here to navigate it together, come what may! We are truly grateful for your support.

Read the original:

Slog AM: Giuliani Turns Election Hearing into a Circus, US Sets COVID Death Record, Another Freaking Monolith Appears - TheStranger.com

Open Source The Path To Software Riches For IBM i – IT Jungle

December 2, 2020Alex Woodie

For what is supposed to be a proprietary platform, the IBM i server sure has a lot of open source software running on it. In recent months, it appears that the majority of new programs introduced to IBM i are open source in nature. That pattern shows no signs of changing any time soon, according to a recent report by OpenLogic.

Open software has existed on the IBM i platform for many years. The first highly publicized dip into the open source well occurred in 2005, when IBM partnered with a company called Zend to bring its PHP runtime to the iSeries and the i5/OS. That Zend open source lineage now lives on at Perforce thanks to its 2019 acquisition of Rogue Wave, which acquired an open source software company called OpenLogic back in 2013.

OpenLogic provides professional technical support for hundreds of open source packages, from CentOS and Docker to MariaDB and Kubernetes. Among the open source support packages it offers are the ones to support enterprise versions of the Zend runtime for IBM i and associated tooling, such as Z-Ray code inspector, which are only available from Perforce.

But OpenLogic is a supporter of open source in general, including specifically on IBM i. In its November white paper Advantages of Open Source on IBM i, OpenLogic makes a strong case for the adoption of open source software on the platform.

In May of 2018, IBM released its support for the open source package management (rpm/yum) ecosystem on IBM i, OpenLogic wrote. Since then, the availability and adoption of open source on the platform has been growing at a healthy clip.

In fact, IBM has done the work to bring more than 400 open source packages to IBM i via the RPM and Yum methods, according to OpenLogic. [T]he availability of open source on IBM i continues to grow at a break-neck pace, it writes.

In addition to adopting the same RPM and Yum software delivery methods that are widely used in the open source community, another reason for the open source surge is the availability of the PASE environment.

PASE, of course, is the AIX runtime that enables AIX applications to run with little to no changes on the IBM i server. Its essentially an operating system within an operating system, and it opens up another path for getting software onto IBM i.

As OpenLogic explains, the PASE environment is quite complete:

PASE runs on top of the same hardware as IBM i and programs running within PASE have access to IBM i items such as Db2 resident data, programs (RPG, Cobol, CL), commands, data areas, and data queues (to name a few) via the syscall interface between PASE and the TIMI layer of IBM i, OpenLogic writes. This enables the implementation of *NIX-like applications within PASE that have native access to IBM i resources while being able to leverage the benefits of POWER Systems including processor allocation strategies, such as shared processors, memory sharing, and I/O performance.

While PASE provides the runtime mechanism and RPM/Yum the distribution mechanism for bringing existing apps to the platform, open source also provides fertile soil upon which developers can create brand spanking new applications for IBM i.

The path to open source riches is widened with the availability of the iAMP stack. (Image courtesy OpenLogic)

Specifically, OpenLogic mentions the popular LAMP stack, which the broader open source community is quite familiar with. LAMP, of course, refers to the combination of the Linux OS, Apache Web Server, MariaDB, and PHP. Most of these can run on IBM i, including Linux, but that OS isnt necessarily necessary.

A simple install of PHP and MariaDB and you have your own variant of the LAMP stack referred to as iAMP the same Apache Web Server, the same MariaDB open source database, the same PHP scripting language as other platforms, OpenLogic writes, just a better operating system than any other platform offers and the solutions on top of the stack again that run unchanged.

A key element of the IBM i is its integrated nature, and that advantage continues with open source software. While new open source apps may expect MySQL or its newer follow-on, MariaDB, most IBM i shops will have a lot of data housed in a Db2 for i database. So for that reason, access to the Db2 for i database is a big benefit when running open source applications on the IBM i.

There are a couple of ways to tap into that Db2 for i database. OpenLogic touts the ibm_db2 database driver that has traditionally been a way for PHP applications to get data out of Db2 for i. But a better solution is to use the ODBC driver, which IBM is positioning as the standard way to access all flavors of Db2, including the one for IBM i.

IBMs XMLService utility plus a toolkit can alleviate program-level integration with open source software on IBM i. (Image courtesy OpenLogic)

But the database is just part of the story, and sometimes users need to access programs. For that, OpenLogic presents IBMs open source XMLService utility as the best way to tapping into ILE RPG and Cobol, as well as CL programs (as well as data areas and data queues). The company says that by using a language-specific toolkit (such as the one that Perforce provides for PHP on IBM i), developers can reduce the simplify the process of calling ILE items and processing the results.

With an abundance of pre-built open source applications and tooling for developing more, the barriers to using open source on IBM i are melting away, according to OpenLogic.

The advantages of open source on IBM i are significant and they include choice of solution, innovation to the platform, and integration with IBM i data, programs, and artifacts to extend their reach and usefulness, the company concludes in its white paper. Getting started on open source on IBM i is easy it just takes a willingness to embrace new methods and new solutions to strengthen an already powerful platform to take it to even higher capabilities.

To get a copy of the white paper, go to http://www.openlogic.com/resources/advantages-open-source-ibm-i.

IBM Brings More Open Source to IBM i

Apache Kafka And Zookeeper Now Supported On IBM i

More Open Source Databases Coming To IBM i

Man-DB Brings Documentation to IBM i

Open Source Is the Future, So Where Does IBM i Fit In?

Go here to see the original:
Open Source The Path To Software Riches For IBM i - IT Jungle