Can Intels XPU vision guide the industry into an era of heterogeneous computing? – VentureBeat

This article is part of the Technology Insight series, made possible with funding from Intel.

As data sprawls out from the network core to the intelligent edge, increasingly diverse compute resources follow, balancing power, performance, and response time. Historically, graphics processors (GPUs) were the offload target of choice for data processing. Today field programmable gate arrays (FPGAs), vision processing units (VPUs), and application specific integrated circuits (ASICs) also bring unique strengths to the table. Intel refers to those accelerators (and anything else to which a CPU can send processing tasks) as XPUs.

The challenge software developers face is determining which XPU is best for their workload; arriving at an answer often involves lots of trial and error. Faced with a growing list of architecture-specific programming tools to support, Intel spearheaded a standards-based programming model called oneAPI to unify code across XPU types. Simplifying software development for XPUs cant happen soon enough. After all, the move to heterogeneous computingprocessing on the best XPU for a given applicationseems inevitable, given evolving use cases and the many devices vying to address them.

KEY POINTS

Intels strategy faces headwind from NVIDIAs incumbent CUDA platform, which assumes youre using NVIDIA graphics processors exclusively. That walled garden may not be as impenetrable as it once was. Intel already has a design win with its upcoming Xe-HPC GPU, code-named Ponte Vecchio. The Argonne National Laboratorys Aurora supercomputer, for example, will feature more than 9,000 nodes, each with six Xe-HPCs totaling more than 1 exa/FLOP/s of sustained DP performance.

Time will tell if Intel can deliver on its promise to streamline heterogenous programming with oneAPI, lowering the barrier to entry for hardware vendors and software developers alike. A compelling XPU roadmap certainly gives the industry a reason to look more closely.

The total volume of data spread between internal data centers, cloud repositories, third-party data centers, and remote locations is expected to increase by more than 42% from 2020 to 2022, according to The Seagate Rethink Data Survey. The value of that information depends on what you do with it, where, and when. Some data can be captured, classified, and stored to drive machine learning breakthroughs. Other applications require a real-time response.

The compute resources needed to satisfy those use cases look nothing alike. GPUs optimized for server platforms consume hundreds of watts each, while VPUs in the single-watt range might power smart cameras or computer vision-based AI appliances. In either example, a developer must decide on the best XPU for processing data as efficiently as possible. This isnt a new phenomenon. Rather, its an evolution of a decades-long trend toward heterogeneity, where applications can run control, data, and compute tasks on the hardware architecture best suited to each specific workload.

Transitioning to heterogeneity is inevitable for the same reasons we went from single core to multicore CPUs, says James Reinders, an engineer at Intel specializing in parallel computing. Its making our computers more capable, and able to solve more problems and do things they couldnt do in the past but within the constraints of hardware we can design and build.

As with the adoption of multicore processing, which forced developers to start thinking about their algorithms in terms of parallelism, the biggest obstacle to making computers more heterogenous today is the complexity of programming them.

It used to be that developers programmed close to the hardware using low-level languages, providing very little abstraction. The code was often fast and efficient, but not portable. These days, higher-level languages extend compatibility across a broader swathe of hardware while hiding a lot of unnecessary details. Compilers, runtimes, and libraries underneath the code make the hardware do what you want. It makes sense that were seeing more specialized architectures enabling new functionality through abstracted languages.

Even now, new accelerators require their own software stacks, gobbling up the hardware vendors time and money. From there, developers make their own investment into learning new tools so they can determine the best architecture for their application.

Instead of spending time rewriting and recompiling code using different libraries and SDKs, imagine an open, cross-architecture model that can be used to migrate between architectures without leaving performance on the table. Thats what Intel is proposing with its oneAPI initiative.

oneAPI supports high-level languages (Data Parallel C++, or DPC++), a set of APIs and libraries, and a hardware abstraction layer for low-level XPU access. On top of the open specification, Intel has its own suite of toolkits for various development tasks. The Base Toolkit, for example, includes the DPC++ compiler, a handful of libraries, a compatibility tool for migrating NVIDIA CUDA code to DPC++, the optimization oriented VTune profiler, and the Advisor analysis tool, which helps identify the best kernels to offload. Other toolkits home in on more specific segments, such as HPC, AI and machine learning acceleration, IoT, rendering, and deep learning inference.

When we talk about oneAPI at Intel, its a pretty simple concept, says Intels Reinders. I want as much as possible to be the same. Its not that theres one API for everything. Rather, if I want to do fast Fourier transforms, I want to learn the interface for an FFT library, then I want to use that same interface for all my XPUs.

Intel isnt putting its clout behind oneAPI for purely selfless reasons. The company already has a rich portfolio of XPUs that stand to benefit from a unified programming model (in addition to the host processors tasked with commanding them). If each XPU was treated as an island, the industry would end up stuck where it was before oneAPI: with independent software ecosystems, marketing resources, and training for each architecture. By making as much common as possible, developers can spend more time innovating and less time reinventing the wheel.

An enormous number of FLOP/s, or floating-point operations per second, come from GPUs. NVIDIAs CUDA is the dominant platform for general purpose GPU computing, and it assumes youre using NVIDIA hardware. Because CUDA is the incumbent technology, developers are reluctant to change software that already works, even if theyd prefer more hardware choice.

If Intel wants the community to look beyond proprietary lock-in, it needs to build a better mousetrap than its competition, and that starts with compelling GPU hardware. At its recent Architecture Day 2021, Intel disclosed that a pre-production implementation of its Xe-HPC architecture is already producing more than 45 TFLOPS of FP32 throughput, more than 5 TB/s of fabric bandwidth, and more than 2 TB/s of memory bandwidth. At least on paper, thats higher single-precision performance than NVIDIAs fastest data center processor.

The world of XPUs is more than just GPUs though, which is exhilarating and terrifying, depending on who you ask. Supported by an open, standards-based programming model, a panoply of architectures might enable time-to-market advantages, dramatically lower power consumption, or workload-specific optimizations. But without oneAPI (or something like it), developers are stuck learning new tools for every accelerator, stymying innovation and overwhelming programmers.

Fortunately, were seeing signs of life beyond NVIDIAs closed platform. As an example, the team responsible for RIKENs Fugaku supercomputer recently used Intels oneAPI Deep Neural Network Library (oneDNN) as a reference to develop its own deep learning process library. Fugaku employs Fujitsu A64FX CPUs, based on Armv8-A with the Scalable Vector Extension (SVE) instruction set, which didnt have a DL library yet. Optimizing Intels code for Armv8-A processors enabled an up to 400x speed-up compared to simply recompiling oneDNN without modification. Incorporating those changes into the librarys main branch makes the teams gains available to other developers.

Intels Reinders acknowledges the whole thing sounds a lot like open source. However, the XPU philosophy goes a step further, affecting the way code is written so that its ready for different types of accelerators running underneath it. Im not worried that this is some type of fad, he says. Its one of the next major steps in computing. It is not a question of whether an idea like oneAPI will happen, but rather when it will happen.

Continue reading here:
Can Intels XPU vision guide the industry into an era of heterogeneous computing? - VentureBeat

Top 10 Recent Chatbots to Make Note of in 2021 – Analytics Insight

Chatbots are utilized by 1.4 billion individuals today. Organizations are dispatching their best AI chatbots to carry on 1:1 discussions with clients and workers. Artificial intelligence-fuelled chatbots are likewise equipped for automating different assignments, including sales and marketing, client assistance, and operational tasks.

As the interest for chatbot software has soared to peaks, the commercial center of organizations that give chatbot innovation has become more earnestly to explore around with many organizations promising to do exactly the same thing. Nonetheless, not all AI chatbots are similar.

To help organizations of all sizes and sectors track down the best of the best, weve gathered together the best 10 most recent chatbots for explicit business use cases in various sectors:

Netomis AI platform assists companies with consequently settling client support tickets on email, talk, informing, and voice. It has the most elevated precision of any client care chatbot because of its high-level natural language understanding (NLU) motor. It can consequently resolve more than 70% of client questions without human intercession and spotlights comprehensively on AI client experience. Netomi is inconceivably simple to take on and has out-of-the-case reconciliations with all of the main specialist work area stages. The organization works with organizations giving different items and administrations across an assortment of businesses, including WestJet, Brex, Zinus, Singtel, Circles Life, WB Games, and HP.

atSpoke makes it simple for workers to get the knowledge they need. Its an interior tagging framework that has inherent AI. It permits interior groups (IT help work area, HR, and other business tasks groups) to appreciate 5x quicker goals by promptly noting 40% of solicitations naturally. The AI reacts to a scope of worker inquiries by surfacing information base substances. Workers can get refreshes straightforwardly inside the channels they are utilizing each day, including Slack, Google Drive, Confluence, and Microsoft Teams.

WP-Chatbot is the most well-known chatbot in the WordPress environment, giving a huge number of sites live talk and web visit abilities. WP-Chatbot incorporates a Facebook Business page and powers live and automated connections on a WordPress site through a local Messenger talk gadget. Theres a simple single tick establishment measure. It is probably the quickest method to add a live visit to a WordPress site. Clients have a solitary inbox for all messages regardless of whether occurring on Messenger or on webchat which gives a truly proficient approach to oversee cross-platform client collaborations.

The Microsoft Bot Framework is a thorough structure for building conversational AI encounters. The Bot framework composer is an open-source, visual authoring material for engineers and multi-disciplinary groups to plan and fabricate conversational encounters with language understanding, QnA maker, and bot answers. The Microsoft bot framework permits clients to utilize a far-reaching open-source SDK and apparatuses to effortlessly interface a bot to well-known channels and gadgets.

Do you want to interact with the 83.1 million peoplewho own a smart speaker? Amazon, which has captured 70% of this market, has the best AI chatbot software for voice assistants. With Alexa for Business, IT teams can create custom skills that can answer customer questions. The creation of custom skills is a trend that has exploded: Amazon grew from 130 skills to over100,000 skillsas of September 2019 in just over three years. Creating custom skills on Alexa allows your customers to ask questions, order or re-order products or services, or engage with other content spontaneously by simply speaking out loud. With Alexa for Business, teams can integrate with Salesforce, ServiceNow, or any other custom apps and services.

Zendesk works close by your help group inside Zendesk to answer approaching client questions immediately. The Answer Bot pulls pertinent articles from your Zendesk knowledge base to furnish clients with the data they need immediately. You can convey extra innovation on top of your Zendesk chatbot or you can allow the Zendesk To answer bot fly solo on your site talk, inside portable applications, or for inner groups on Slack.

CSML is the principal open-source programming language and chatbot engine committed to growing incredible and interoperable chatbots. CSML assists designers with building and conveys chatbots effectively with its expressive punctuation and its ability to interface with any outsider API. Utilized by a large number of chatbot designers, CSML studio is the least difficult approach, to begin with, CSML, with all that included beginning building chatbots straightforwardly inside your program. A free playground is additionally accessible to allow engineers to explore different avenues regarding the language without joining.

Dasha is a conversational AI as a service platform. It furnishes developers with devices to make human-like, profoundly conversational AI applications. The applications can be utilized for call center specialist substitution, text talk or to add conversational voice interfaces to versatile applications or IoT gadgets. Dasha was named a Gartner Cool Vendor in Conversational AI 2020.

No knowledge of AI or ML is needed to work with Dasha, any engineer with fundamental JavaScript knowledge will feel totally at ease.

SurveySparrow is a software product stage for conversational studies and structures. The stage groups consumer loyalty reviews (i.e., Net Promoter Score (NPS), Customer Satisfaction Score (CSAT) or Customer Effort Score (CES), and Employee Experience overviews (i.e., Recruitment and Pre-enlist, Employee 360 Assessment, Employee Check-in, and Employee Exit Interviews) devices. The conversational UI sends overviews in a talk-like encounter. This methodology expands overview culmination rates by 40%. SurveySparrow accompanies a scope of out-of-the-case question types and layouts. Reviews are inserted on sites or other programming instruments through incorporations with Zapier, Slack, Intercom, and Mailchimp.

One year from now, 2.4B individuals will utilize Facebook Messenger. ManyChat is an incredible alternative in case youre searching for a speedy method to dispatch a basic chatbot to sell items, book arrangements, send request updates, or share coupons on Facebook Messenger. It has industry-explicit formats, or you can fabricate your own with a simplified interface, which permits you to dispatch a bot inside the space of minutes without coding. You can without much of a stretch interface with eCommerce tools, including Shopify, PayPal, Stripe, ActiveCampaign, Google Sheets, and 1,500+ extra applications through Zapier and Integromat.

Link:
Top 10 Recent Chatbots to Make Note of in 2021 - Analytics Insight

Twitter gave researchers for Defense Department access to info for use in government programs – Washington Times

Twitter granted researchers working for the Defense Department access to information shared by its users for study on combating online influence operations, a defense research program manager says.

Brian Kettler, a program manager at the Defense Advanced Research Projects Agency (DARPA), said unintentional collection of Americans data is possible.

However, there are processes in place to protect Americans personally identifiable information (PII) and prevent their data from being used by government-funded researchers, he added.

DARPA-funded researchers are following Twitters terms and conditions, Mr. Kettler said.

We have an, the performer thats in charge of data provisioning has an agreement with Twitter, Mr. Kettler said. Twitter has sort of, they scrutinized how were using the information, what information were accessing, so its all going through the platform Ts and Cs with a specific agreement.

Two programs run by Mr. Kettler involve Twitter, namely the Social Simulation for Evaluating Online Messaging Campaigns (SocialSim) program and the Influence Campaign Awareness and Sensemaking (INCAS) program.

Mr. Kettler said that researchers on the SocialSim program have worked with Twitter and that those on the INCAS program intend to collect data from Twitter and plan to build algorithms to analyze data for foreign influence.

You may inadvertently collect information on U.S. persons, Mr. Kettler said. When we do that, we have procedures in place and policies to deal with that so that we are not intentionally collecting information on U.S. persons and if we unintentionally collect it thats sequestered and not used. And we have a stringent policy in place in general to protect PII information that were collecting as well so were not looking at personal details of individuals.

Mr. Kettler said the government is following Twitters rules to ensure it complies with the data it accesses on Twitter.

For example, on Twitter, when somebody deletes a tweet, you have to delete the tweet in your database so its all going through the standard public ways you can procure data from these platforms, he said. Were not scraping stuff, were working through the platforms.

Scraping on social media websites refers to the use of automated software tools to access and extract or copy data from public profiles. The practice often runs afoul of tech platforms rules, but that does not stop hackers or foes from countries like China from scraping anyway.

Last year, American researcher Christopher Balding and Australian cybersecurity firm Internet 2.0 discovered that Chinese technology company Shenzhen Zhenua Data had surveilled the social media profiles of tens of thousands of Americans and collected information on peoples whereabouts and their personal and professional relationships.

Lawmakers have since debated several proposals on how to better protect the Americans data, including its export to foreign adversaries.

Twitter declined to comment for this report, including about what information the government-funded researchers are accessing.

Twitters privacy policy encourages users to think about what they decide to make public.

You are responsible for your Tweets and other information you provide through our services, and you should think carefully about what you make public, especially if it is sensitive information, reads Twitters website. If you update your public information on Twitter, such as by deleting a Tweet or deactivating your account, we will reflect your updated content on Twitter.com, Twitter for iOS, and Twitter for Android. By publicly posting content, you are directing us to disclose that information as broadly as possible, including through our [application programming interfaces], and directing those accessing the information through our APIs to do the same.

Asked whether Twitter users were made aware that DARPA researchers looked at their tweets, Mr. Kettler said Twitter treats DARPA researchers the same as anyone else it gives access.

Before the governments selection of researchers for the INCAS program, DARPA required them to detail how they would control the collection of Americans data and apply Human Subjects Research Controls if they needed to do so, according to an October 2020 DARPA presentation.

The information accessed by the government-funded researchers looks to be tweets made available to the public.

A broad agency announcement about the INCAS program from October 2020 said INCAS will primarily use publicly available data sources including multilingual, multi-platform social media, online news sources, and online reference data sources.

We hope that ultimately the tools that we develop to better understand the online information environment we can make open source and platforms can take advantage of but were not working with any platforms other than procuring their data through standard channels, Mr. Kettler said.

Read the original:
Twitter gave researchers for Defense Department access to info for use in government programs - Washington Times

How to Lead Through Burnout and Emerge More Resilient – WITN

eMindful Unveils New Programming and Resources to Address Burnout Head On

Published: Oct. 5, 2021 at 12:52 PM EDT|Updated: 2 hours ago

ORLANDO, Fla., Oct. 5, 2021 /PRNewswire/ -- Employees are leaving the workforce en masse and burnout is to blame. The devastation of the pandemic has taken a toll on employees with 77% reporting that they have experienced workplace burnout and more than 42% reporting symptoms of anxiety and depression up from 11% the previous year.

eMindful, the leading provider of evidence-based mindfulness programs for everyday moments and chronic conditions, regularly takes the pulse of our participants and provides programming and resources to address their needs in real-time. More than one-third of participants surveyed recently indicated that they are experiencing different types of burnout, including difficulty balancing time spent working versus not working or that their workload exceeds their capacity.

eMindful is addressing the crisis head on with the introduction of new programming and resources. This includes a Mindfulness-Based Cognitive Training program, which uses a cognitive-behavioral therapy approach with mindfulness to address burnout and prevent depression and relapse.

The program includes 16 expert-led, live, virtual mindfulness sessions and a four-hour group workshop and retreat to build community and support. Using an evidence-based approach, the teacher helps participants build self-compassion, foster positive feelings, thoughts, and behaviors, and manage feelings of overwhelm. The program also includes a click-to-call feature for participants who need immediate access to a mental health professional.

eMindful also is introducing a Leading Through Burnout collection with a live webinar and an on-demand series for leaders to recognize signs of burnout in themselves and their employees, learn strategies to relate to difficult emotions in new and positive ways, and create a pathway for an open dialogue with their staff around workload and mental health.

"Our burned-out workforce is the latest mental health casualty of the pandemic and leaders in particular are suffering," said Mary Pigatti, President, eMindful. "These resources will allow managers to build skills and learn strategies to lead through burnout and emerge more resilient."

The next MBCT program begins on Monday, Oct. 18. Organizations that are interested in bringing this program to their population or their clients' populations, can contact sales@emindful.com.

Media Contact:Zev SuissaeMindful772-569-4540zev@emindful.com

About eMindfuleMindful, a Wondr Health company, provides evidence-based, mindfulness programs for everyday life and chronic conditions by helping individuals make every moment matter.

View original content to download multimedia:

SOURCE eMindful

The above press release was provided courtesy of PRNewswire. The views, opinions and statements in the press release are not endorsed by Gray Media Group nor do they necessarily state or reflect those of Gray Media Group, Inc.

Here is the original post:
How to Lead Through Burnout and Emerge More Resilient - WITN

Mac or Windows: 6 Steps to Converting WebP to JPG Bulk – Programming Insider

To sign up for our daily email newsletter, CLICK HERE

When analyzing image formats, you probably realized that most of them use either lossy or lossless compression, resulting in differences in file size and color integrity. However, Webp is a bit different.

In WebP, both lossy and lossless compression are used to reduce the size of the image while maintaining a relatively high quality. As opposed to JPEG, WebP files require Google Chrome or another WebP viewer to be opened, it is not as web-friendly as JPEG. Thus, we may need to convert WebPs to JPEG at some point.

It is possible to solve this issue both online and offline using WebP to JPG converters, but we often require something more! This page lists six methods for bulk converting WebPs to JPGs on both Mac and Windows systems.

Top Bulk WebP to JPG Converter 2021 (Windows & Mac)

We tested NCH Softwares Pixelillion Image Converter on macOS and Windows, and it converted WebP images flawlessly on both platforms. Its ability to read/write and convert an array of formats, along with the quality of its output, make it a favorite of many users.

Pixillion Image Converter possesses the following features:

Here is How to Batch Convert WebP to JPG

Software to convert WebP to JPG in bulk (Mac, Windows)

1. Mac Preview

Preview is the best option for converting WebP to JPG on Mac and for free. It reads WebP files and converts them to JPGs without requiring additional software installation. Although it does convert WebP images, the workflow is not as efficient as one created by a professional WebP converter.

For Mac users, here is how to bulk convert WebP to JPG.

It is XnConvert, an open-source program for opening, editing, and converting WebP and other 500+ images on Mac, Windows, even Linux.

You can edit images using the basic and advanced editing tools in this free image converter software. You have complete control over the output preferences, even if its not visually stylish. During the converting process, there may also be a loss of resolution.

XnConvert provides a free way to bulk convert WebP to JPG.

Online batch conversion from WebP to JPEG

In my experience, I would never use web-based tools cluttered with advertisements, as this could invite malware, ransom programs, or lead you directly to some harmful websites. So, when selecting a WebP to JPG converter online for free, I prioritize security, and pay attention to conversion quality. Check out the following list now.

My personal use of Google Drive led me to find one day that cloudconvert is a recommend document reader for Google Docs, which is also why cloudconvert made this list.

You can be sure that its totally ad-free.

Its Features

Free online batch conversion service:

Without doubt, Zamzar is one of the best online free choices to convert WebP images, 510 million files since 2016 well explains why so many users finally pick this tool.

One of Zamzars biggest improvements spanning these years is that there is no need to submit email address to download the target files anymore, just saves us from spams in the mailbox.

The Features

Here is How to Batch Convert WebP to JPG Online Free

3. Anywebp

Using AnyWebP, all image details are preserved without affecting image quality, resolution, or clarity. You can also convert files in batches. AnyWebP is the only method that supports batch conversion and is also featured onAnd whats more cool?You dont even need to upload your images to the server which makes this tool to be the best among others that uploads your pictures to server first posing a privacy concern among many people.

And these are the reasons why Anywebp is on the top list.

The Features

Follow these steps to batch convert WebP to JPG online.

See detailed review at Trendstorys.

Conclusions

Whether you choose a professional WebP to JPG converter, an online image converter or a free download image converter, all three of these types will convert your WebP image. A professional WebP to JPG converter will save you a lot of time, preserve the original quality, and help you save money as well.

Read the original here:
Mac or Windows: 6 Steps to Converting WebP to JPG Bulk - Programming Insider

Trading apps work to get living people to hear your problem – Floridanewstimes.com

This is one of the drawbacks of apps that make it easy to order food, buy stocks and cryptocurrencies, and more. What if something goes wrong?

Tapping a menu after a menu in the hope of contacting someone to solve the problem is often a frustrating chase. It is also increasingly acknowledged by start-ups that ruin the investment and trading industry.

Robin Hood, an app that helps more than 22 million people trade stocks and cryptocurrencies, announced on Tuesday that it will provide customers with 24/7 phone support to cover almost any issue. ..Follow-up of announcements Coinbase A cryptocurrency trading platform that announced last month that it will launch a 24/7 telephone service for many customers by the end of the year.

Robin Hood cites limited customer support concerns as one of the challenges before the stock first opened on the open market. Earlier this year, Robin Hood also settled a tort proceeding in a 20-year-old family. He claims to have committed suicide after receiving only an automatically generated reply to an email about the negative balance of about $ 730,000 in his account.

Reaching Robin Hoods early customer support meant communicating primarily via email, but more live phone support has been added in recent months.

Gretchen Howard, Chief Operating Officer of Robinhood Market Inc., said: From March 2020 to June 2021, the number of customer support workers is close to 2,700.

With so many first-time investors forming its foundation, many of Robin Hoods customer questions are about setting up a bank account or filing a first tax return. However, demand can fluctuate significantly from day to day.

If someone makes a famous tweet about cryptography, our cryptographic volume can grow tenfold instantly, Howard said.

Customers logged into the Robin Hood app can now request a callback from their contacts. Through this process, the app will also try to help customers solve the problem themselves, if possible.Based in Menlo Park California Were still working on how to provide live phone services to customers who cant log in to their account.

William Van Horn II, 30 years old Pensacola Florida Robin Hoods customer service has already been experienced several times. He is not always happy.

He once said he had mistakenly deposited $ 1,000 instead of $ 100 in his account. Shortly thereafter, he sent an email to customer service hoping to cancel the deposit. He finally greeted a representative over the phone who tried to guide him through some steps. But Van Horn said he couldnt cancel the $ 1,000 deposit, or at least get back an additional $ 900.

Van Horn has other complaints about Robinhoods customer service, but it wasnt enough to stop using the app.

There is a lack of customer service, he said. But the interface is still pretty good when it comes to mobile use.

The rest is here:
Trading apps work to get living people to hear your problem - Floridanewstimes.com

What is encryption? – PC World New Zealand

If you've read anything about technology in the last few years, you may have seen the term encryption floating around. It's a simple concept, but the realities of its use are enormously complicated. If you need a quick 101 on what encryption is and how it's used on modern devices, you've come to the right place. But first, we have to start at the beginning.

At the most simple, basic level, encryption is a way to mask information so that it can't be immediately accessed. Encryption has been used for thousands of years, long before the rise of the information age, to protect sensitive or valuable knowledge. The use and study of encryption, codes, and other means of protecting or hiding information is called cryptography.

The most simple version of encryption is a basic replacement cipher. If you use numbers to indicate letters in the Latin alphabet, A=1, B=2, et cetera, you can send a message as that code. It isn't immediately recognizable, but anyone who knows the code can quickly decipher the message. So, a seemingly random string of numbers:

20 8 5 16 1 19 19 23 15 18 4 9 19 19 23 15 18 4 6 9 19 8

can become vital information, to someone who knows how to read it.

t he p a s s w o r d i s s w o r d f i s h

That's an incredibly basic example, the kind of thing you might find in the classic decoder ring toy. Archaeologists have found examples of people encrypting written information that are thousands of years old: Mesopotamian potters sent each other coded messages in clay, telling their friends how to make a new glaze without letting their competitors know. A set of Greek substitutions called the Polybus square is another example, requiring a key to unlock the message. It was still being used in the Middle Ages.

Cryptography is used to protect information, and there's no more vital application than warfare. Militaries have encrypted their messages to make sure that enemies won't know their plans if communication is intercepted. Likewise, militaries also try to break encryption, discover the pattern to a code without having the original key. Both have greatly advanced the field of cryptography.

Take a look at World War II for two illustrative examples of practical encryption. The German military used a physical electronic device called an Enigma machine which could encode and decode messages with incredible complexity, allowing for fast and secret communication. But through a combination of finding rotating daily codes and advanced analysis, the Allies were able to break the encryption of the Enigma machines. They gained a decisive military advantage, listening to encrypted German radio messages and accessing their true contents.

But an encryption code doesn't necessarily have to be based on complex mathematics. For their own secret radio communications, the American military would use Native American code talkers, soldiers who used their native languages like Comanche and Navajo. Speaking to each other in these languages, both in plain speech and in basic word-to-letter cipher codes, the code talkers could communicate orders and other information via radio. The German, Italian, and Japanese militaries could easily intercept these transmissions, but having no access to any Native American speakers, this relatively simple method of encryption was unbreakable.

In the modern world, encryption is done almost exclusively via computers. Instead of encrypting each word or letter with another, or even following a pattern to do so, electronic encryption scrambles individual bits of data in a randomized fashion and scrambles the key as well. Decrypting just a tiny bit of this information by hand, even if you had the correct key, would take more than a lifetime.

With the rapid computation available in the electronic world, data encrypted digitally is more or less impossible to crack by conventional means. For example, the ones and zeros (bits) that make up the digital contents of a file encoded on the common 128-bit Advanced Encryption Standard are scrambled around ten different times in a semi-random pattern. For another computer to rearrange them back in the correct order, without the key, it would take so long that the sun would burn out before it was cracked. And that's the weakest version of AES: it also comes in 192- and 256-bit key sizes!

Every major modern operating system includes at least some tools for encrypting your data: Windows, MacOS, iOS, Android, and Linux. The Bitlocker system in Windows is one example. To a greater or lesser degree, you can encrypt all of your data so it requires a key to unlock. The same is true for online file storage, and your personal information stored in other secure locations, like your bank.

To access encrypted information, you can use one of three different types of keys. In computer security, these are referred to as something you know, (a password or PIN), something you have, (a physical encryption key like Yubico), and something you are (biometric authentication, like a fingerprint or face scan).

Encrypting the storage of your devices protects them in purely electronic terms: without one of those unlock methods, it's incredibly difficult bordering on impossible for anyone to access your data. The extra processing it takes to encrypt and decrypt data can make computer storage perform more slowly, but modern software can help minimize this speed reduction.

Of course if your password, or your physical key, or your fingerprint can be accessed by someone else, they can get to that data. That's why it's a good idea to use extra security methods. A common two-factor authentication system (2FA) uses both a password (something you know) and a text message sent to your phone (something you have) to log in. That gives an extra layer of security to any information stored in that system. Using a password manager to create unique passwords for each site or service you use adds even more protection, preventing hackers from reusing your login information if they do manage to pilfer your credentials for a given service.

Encrypting data doesn't mean it's absolutely impossible to access improperly. There are always weaknesses and ways around security. But using even basic encryption tools can help protect your data far beyond what's available by default.

More here:
What is encryption? - PC World New Zealand

Mathematics, Technology, and Economics – EurekAlert

image:Cover for "Blockchain and Distributed Ledgers: Mathematics, Technology, and Economics" view more

Credit: World Scientific

The Global Financial Crisis (GFC) has demonstrated that the existing banking and payment system, while still working, is outdated and struggling to support the continually changing requirements of the modern world. It would be an understatement to say that the GFC turned into a wasted opportunity to reorganize the world financial ecosystem. In their new book, Blockchain and Distributed Ledgers: Mathematics, Technology, and Economics, Alexander Lipton (co-founder and CIO of Sila) and Adrien Trecanni (founder and CEO of Metaco) argue that the seemingly squandered opportunities to reshape the financial system are not all lost. More specifically, they show that, if used deliberately, new technologies, including blockchains and distributed ledgers, can create new business models. New technologies will put pressure on the incumbents. More importantly, they will allow newly formed fintech companies to enter the market in earnest, thus providing considerable benefits to the general public.

This book concentrates on distributed ledger technology (DLT) and its potential impact on society. This technology, which became extremely popular over the last decade, allows us to solve many complicated problems arising in economics, banking, and finance, industry, trade, and many other fields. DLT develops new mechanisms for distributed consensus, using advanced tools from cryptography, game theory, economics, finance, scientific computing, etc. It offers an optimal and elegant solution in many situations, provided that it can overcome some of its inherent limitations and is used appropriately.

While strong mathematical skills are not required, readers should learn the necessary background materials from the book itself. The book clearly and accessibly explains and articulates rather sophisticated ideas underpinning DLT, so that it is accessible to anyone with a modicum of understanding of computer science, mathematics, and economics.

Throughout the book, the authors use their considerable practical experience to skilfully guide the reader through complexities, nuances, achievements, and promises of blockchains and distributed ledgers. The book is self-contained and provides all the necessary theoretical background for the reader to understand how DLT operates in both theory and practice and, if the need occurs, build a simple distributed ledger from scratch. It can serve as a primary textbook for a course on DLT and crypto-economics and a supplementary text for courses on economics, finance, cryptography, and others.

Blockchain and Distributed Ledgers: Mathematics, Technology, and Economics retails for US$68 / 60 (paperback) and US$138 / 120 (hardcover) and is also available in electronic formats. To order or know more about the book, visit http://www.worldscientific.com/worldscibooks/10.1142/11857. ###

About the Authors

Alexander Lipton is Co-Founder and Chief Information Officer of Sila, Partner at Numeraire, Visiting Professor and Deans Fellow at the Hebrew University of Jerusalem, and Connection Science Fellow at MIT. Alex is a board member of Sila and an advisory board member of several fintech companies worldwide. In 20062016, Alex was Co- Head of the Global Quantitative Group and Quantitative Solutions Executive at Bank of America. Earlier, he was a senior manager at Citadel, Credit Suisse, Deutsche Bank, and Bankers Trust. At the same time, Alex held visiting professorships at EPFL, NYU, Oxford University, Imperial College, and the University of Illinois. Before becoming a banker, Alex was a Full Professor of Mathematics at the University of Illinois and a Consultant at Los Alamos National Laboratory. In 2000 Alex was awarded the Inaugural Quant of the Year Award and in 2021 the Buy-side Quant of the Year Award by Risk Magazine. Alex authored/edited 10 other books and more than a hundred scientific papers. Alex is an Associate Editor of several journals, including Finance and Stochastics, Journal of FinTech, International Journal of Theoretical and Applied Finance, and Quantitative Finance. He is a frequent keynote speaker at Quantitative Finance and FinTech conferences and forums worldwide.

Adrian Treccani is founder and CEO of METACO, a leading provider of security infrastructure for digital assets, and a software engineer specialized in high performance computing and financial engineering. He has been an active member of the fintech community since 2012 and advised numerous banks and financial institutions globally on distributed ledger technology, cryptocurrencies and decentralized finance. Adrien lectures at University of Lausanne and Ecole Polytechnique Fdrale de Lausanne and has published in top peer-reviewed journals including Management Science and the Journal of Financial Econometrics. Adrian holds a Bachelor degree in computer science and a Master degree in financial engineering at the Ecole Polytechnique Fdrale de Lausanne. He obtained a PhD in mathematical finance at the Swiss Finance Institute and completed a post doctorate in high performance computing at University of Zrich. He worked in the hedge fund industry as a quantitative analyst before founding METACO in 2015.

About World Scientific Publishing Co.

World Scientific Publishing is a leading international independent publisher of books and journals for the scholarly, research and professional communities. World Scientific collaborates with prestigious organisations like the Nobel Foundation and US National Academies Press to bring high quality academic and professional content to researchers and academics worldwide. The company publishes about 600 books and over 140 journals in various fields annually. To find out more about World Scientific, please visit http://www.worldscientific.com.

For more information, contact WSPC Communications at communications@wspc.com.

Disclaimer: AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert system.

Go here to see the original:
Mathematics, Technology, and Economics - EurekAlert

The US Considered Kidnapping and Even Assassinating Julian Assange – Jacobin magazine

Next month, British prosecutors, on behalf of the US government, will argue before a British High Court that a judges move to block the extradition of Australian journalist Julian Assange should be overturned. It will mark the latest in the United States legal attack against the WikiLeaks founder. Yet even as the High Court gets ready to hear arguments that will help decide whether Assange will stand trial in the United States, a fuller and darker picture has emerged of the US governments extralegal campaign against Assange.

A bombshell investigation by Yahoo News, based on interviews with over thirty former US officials, gives the most in-depth picture to date of the CIAs war on WikiLeaks. And its truly disturbing. The tactics weighed by the CIA under Mike Pompeo including kidnapping and assassinating were so extreme they even alarmed members of the National Security Council and White House lawyers, hardly Assange supporters.

Some became so concerned about the legality of what the CIA was proposing, they alerted congressional oversight committees. According to Michael Isikoff, one of the three reporters who worked on the Yahoo News story, the arguments over whether to kidnap Assange were one of the more contentious intelligence debates of the Trump presidency, and it was all done in secret. The public had no idea this was going on. Pompeo has publicly responded to the allegations by asserting that those who spoke to Yahoo should be prosecuted for exposingCIAactivities. But he conceded that pieces of it are true.

Assange has been in the US governments crosshairs ever since he published cables from the US wars in Iraq and Afghanistan (provided to WikiLeaks by Chelsea Manning). In 2011, the Justice Department convened a grand jury to contemplate indicting Assange.

But while the Obama administration waged an unprecedented war on journalists sources and whistleblowers, it decided against going directly after journalists like Assange, worried it could set a precedent for prosecuting major newspapers like the New York Times. In spite of the administrations enormous crackdown on press freedoms, here they drew a line. In addition to putting a stop on any prosecution of Assange, the Obama White House also limited what actions intelligence agencies like the CIA could take against WikiLeaks, arguing they were deserving of the protections afforded to news organizations.

Meanwhile, the intelligence community stewed. After the Guardian and Washington Post broke stories about illegal NSA surveillance the fruits of revelations by whistleblower Edward Snowden the intelligence community was again out for blood. The CIA lobbied the Obama administration to redefine certain figures previously considered journalists as information brokers, thus allowing greater investigatory actions against them and opening the door for potential criminal prosecutions.

The CIA wanted to label not just Assange and WikiLeaks information brokers, but also Glenn Greenwald and Laura Poitras, the journalists who broke the Snowden revelations. The Obama administration rebuffed these chilling requests, but okayed greater intelligence collection against WikiLeaks. No longer were warrants, subpoenas, or national security letters required to gain information about WikiLeaks. The CIA now had a WikiLeaks team.

The WikiLeaks revelations about Hillary Clinton provoked fanatical ire among many partisan Democrats. It also earned the organization praise on the campaign trail from Trump. Yet, it would be the Trump administration that would dramatically escalate both the legal and extralegal war on WikiLeaks.

Trump set the tone early. He appointed as his attorney general Jeff Sessions, a longtime surveillance hawk and First Amendment foe who made targeting leaks a top prosecutorial priority. For his CIA chief, Trump tapped Mike Pompeo. Pompeo had repeatedly attacked whistleblower Edward Snowden, at one point calling for him to be executed.

Sessions revived the criminal investigation into Assange and pressured prosecutors to bring charges against Assange in the Eastern District for the 2010 to 2011 disclosures. In April 2017, Sessions publicly announced that prosecuting the journalist was a top priority. When asked about the implications of such a move for outlets like the New York Times, Sessions appeared unfazed.

Just a week before Sessionss chilling announcement, Pompeo declared during a public address that WikiLeaks was a hostile non-state intelligence agency. Given the public setting, many dismissed the statement as hot air. But it turned out to be part of a much more disturbing legal theory.

About a month earlier, in the largest loss of data in CIA history, WikiLeaks published Vault 7, which detailed CIA hacking tools. The release infuriated Pompeo and the CIA. As the Yahoo News story makes painfully clear, Pompeo became obsessed with Assange and WikiLeaks. No plot, it seems, was too wild.

When the CIA takes covert action, they must receive authorization from the president in what is known as finding. Select members of Congress are notified. Yet, when the CIA deals with rival spy agencies, its measures are deemed offensive counterintelligence; and no such findings are required.

The CIA tried, but failed to tie WikiLeaks to Russian intelligence. Eager to evade any oversight, the CIA declared Wikileaks a non-state intelligence agency, thus allowing them to act without presidential approval or congressional notice. (The 2018 Intelligence Authorization Act, passed by Congress, declared that WikiLeaks and the senior leadership of WikiLeaks resemble a non-state hostile intelligence service often abetted by state actors and should be treated as such a service by the United States. This raises serious questions about what Congress knew. No subsequent legislation contained similar language).

At this point the CIA obsession took a dark turn. Executives within the agency requested sketches on how to assassinate Assange and other WikiLeaks figures involved with Vault 7. These plans were scuttled and dont appear to ever have made it beyond internal CIA discussions. Nonetheless, the fact that CIA leaders were requesting that assassination plans be drawn up is alarming, to say the least.

While the assassination plans did not go far, the scheme to kidnap Assange made it to the White House it perplexed National Security Council lawyers who noted that Assange hadnt even been charged with a crime and that it was unclear under what authority the CIA could seize Assange or even where they would hold him. As one unnamed official who attended the National Security Council meetings told Yahoo News, Were we going to go back to black sites?

In 2017, the plans reached new levels of derangement. The CIA became convinced that the Russians would try to exfiltrate Assange from the Ecuadorian embassy in London and bring him to Russia.

Their imaginations running wild, the CIA thought that the Ecuadorians would release Assange onto the street. The Russians would be waiting most likely in a diplomatic car to spirit Assange to the airport and out of the country. One suggestion was to have CIA agents crash a car into another vehicle, thus creating a traffic jam and delaying the Russian diplomatic vehicle containing Assange. It was decided, however, while such an action was appropriate for Afghanistan, it was not appropriate for the streets of London.

While car crashes were too much, the CIA was fully preparing for a gun battle. Concerned about the optics of Americans engaging in a shootout with Russians on the streets of London, they requested their British counterparts handle all firing. The British obliged. (Firing on a Russian diplomatic vehicle would be an act of war.)

Had the Russians escaped from the hail of gunfire, made it to the airport and onto the tarmac, and gotten Assange into a plane, the CIA were preparing to shoot out the tires of the plane to prevent it from taking off. If the plane still managed to get into the air, the CIA was prepared to have EU countries deny the plane entry into their airspace a dirty trick the United States had previously used when they thought Bolivian president Evo Morales was secretly carrying Snowden onboard his presidential plane.

Stella Morris, Assanges partner, denies that the Russians were going to exfiltrate Assange. Nevertheless, as Isikoff stressed in an interview, the CIA believed it was real and their plans were deadly serious. So serious, in fact, that Trump himself was briefed on the plan by those who worried it would create an ugly, international incident.

The CIAs fear that Assange would flee was partly because WikiLeaks had only released some of the Vault 7 documents in their possession. The agency was concerned that Assange could escape to Russia with secrets. But the officials who spoke to Yahoo made clear that an equal or even greater concern was the geopolitical or propagandistic victory Vladmir Putin would purportedly score if Russia was sheltering not only Snowden, but also Assange. This appears to be the motivation behind the deeply irrational plan.

Assassination plans out of the Cold War, kidnappings and renditions out of the war on terror, an act of war against another government, all with one end in sight: to make sure Assange never escaped the clutches of the US empire.

The latest revelations are particularly shocking, but they join a growing list of outrages. In addition to National Security Council lawyers, the CIA also angered Sessions and the Justice Department. Their motives were not pure: the Justice Department viewed Assange as being on their turf and the CIAs actions as jeopardizing a potential criminal prosecution (the CIAs kidnapping scheme may have pressured the Justice Department to speed up seeking an indictment). Even before Sessions, the FBI and the CIA competed over jurisdiction for Assange. The FBI had been pushing for Assange to be charged since the Obama years.

However, the FBIs hands are far from clean. In June, Icelandic newspaper Stundin revealed that an FBI informant (who had himself been convicted of sex crimes) admitted that allegations in the US indictment against Assange were fabricated.

And earlier this year, Declassified UK exposed the existence of Operation Pelican, a UK Foreign Office plot to get Assange out of the Ecuadorian Embassy.

All of this comes as Spains High Court is investigating Spanish security firm UC Global. UC Global was hired to provide security at the Ecuadorian Embassy in London, but it allegedly cooperated with US intelligence in its spying on Assange, his lawyers, and journalists who visited him. In fact, it was a former UC Global employee who first stated that the CIA discussed killing Assange.

The CIAs crimes must be understood within this wider war against Assange. But there is another important context. After revelations of the CIAs use of rendition and torture during the war on terror, there were calls for prosecutions. Instead, Obama opted to look forward, not backward.

For those who took on CIA war crimes, the calculation was quite different. The Obama administration, at the urging of the CIA, allowed the American Civil Liberties Union to be criminally probed after its lawyers representing clients at Guantanamo were able to successfully identify CIA torturers in court briefs. While the venerable civil liberties organization was cleared of wrongdoing, John Kiriakou, who blew the whistle on torture, was prosecuted, something the CIA requested of the Bush administration but was denied.

The decision to let CIA war criminals off the hook while treating whistleblowers, journalists, and others who expose US war crimes as enemies on par with spies or terrorists has consequences.

One of those consequences: a completely lawless CIA plotting to assassinate or kidnap a journalist.

Continued here:
The US Considered Kidnapping and Even Assassinating Julian Assange - Jacobin magazine

US appeal on Assange extradition to be heard on 27 and 28 Oct – iTWire

Image by Caitlin Johnstone from Pixabay

A hearing on an US appeal to strike down a court decision and allow the extradition of WikiLeaks founder Julian Assange will be held on 27 and 28 October at the High Court in London, according to a message from the Don't Extradite Assange campaign.

In a statement, the group said if the appeal court decided to uphold a British decision not to allow the extradition, then it would be difficult for the US to continue seeking to get him sent there for trial.

On 4 January, British District Judge Vanessa Baraister ruled that Assange should not be extradited, saying the risk he would commit suicide in a US jail were too high.

Assange faces criminal charges for publishing classified information that was leaked to WikiLeaks by an American soldier, then known as Bradley Manning, but now, after gender reassignment surgery, known as Chelsea Manning.

His asylum was withdrawn by Ecuador shortly before he was arrested and he appeared in court shortly thereafter. The US made a formal request for his extradition on 6 June 2019.

The DEA campaign requested people to assemble on 23 October at the BBC Broadcasting House in London and march to the High Court.

Supporters of the Australian hacker were also asked to gather outside the High Court at 9am on 27 October.

In September, a Yahoo! News report claimed that the CIA had discussed plans in 2017 to either kill or abduct Assange.

The detailed story said the American spy outfit was angry that WikiLeaks had leaked some of its hacking tools that year, which the whistleblower organisation called Vault 7.

Assange is one of Australia's best known hackers, having gained access to a number of organisations in the 1980s and 1990s, including NASA and the Melbourne master terminal of Canadian telco Nortel.

Visit the iTWire Shop, a leading destination for stylish accessories, gear & gadgets, lifestyle products and everyday portable office essentials, drones, zoom lenses for smartphones, software and online training.

PLUS Big Brands include: Apple, Lenovo, LG, Samsung, Sennheiser and many more.

Products available for any country.

We hope you enjoy and find value in the much anticipated iTWire Shop.

ENTER THE SHOP NOW!

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the iTWire.com site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.

SEE WHAT'S ON ITWIRE TV NOW!

Read more here:
US appeal on Assange extradition to be heard on 27 and 28 Oct - iTWire