The office for Shenzhen Zhenhua Data Information Technology Co. Ltd., a small Chinese technology company that is building tools to process the worlds open-source information about influential people.
Nathan VanderKlippe/The Globe and Mail
On the 14th floor of a tower filled with cramped workspaces in Chinas high-tech city, a small military contractor is building tools to track politicians, aerospace entrepreneurs, scholars and other influential people around the world, including thousands in Canada.
The office of Shenzhen Zhenhua Data Information Technology Co. Ltd. is modest. When a Globe and Mail reporter visited, three people sat at desks in what appeared to be a converted studio apartment, with the bathroom door open. One person was entering code into a computer, while another worked on a PowerPoint presentation. The third person said the company has a work force of more than 30 employees. And although she said Zhenhua is expanding, thats small even by startup standards in China.
Its ambitions, though, extend far beyond its small real estate footprint. It is building tools to process the worlds open-source information about influential people culled from Twitter, criminal records, LinkedIn posts, YouTube videos and more into data that can be analyzed and used by universities, companies, government actors and the Chinese military.
Story continues below advertisement
Our client base is a bit special, the woman said.
The Globe and a consortium of international journalists have accessed an early copy of the companys Overseas Key Information Database (OKIDB), which shows the type of information Zhenhua is collecting for use in China, including records on small-town mayors in Western Canada, where Chinese diplomats have sought to curry favour.
The company claims to have built tools to manipulate content on Twitter, WhatsApp and other platforms, including Facebook which says it has banned Zhenhua from gathering data on its platform.
The company declined an interview request, saying it was not convenient to disclose trade secrets. Its website became inaccessible after The Globe visited its office, which is located in a government-backed business incubator building across the street from an investigative centre for the local Public Security Bureau all a short drive from the headquarters of some of Chinas most important technology companies and civilian military contractors, including Tencent and China Electronics Corp.
The company, led by a former IBM data centre management expert, has also described its work online in job postings, LinkedIn records, blog articles and software patents. One employee described work mining the business needs of military customers for overseas data. Before it became inaccessible, Zhenhuas website listed a series of partners that included important military contractors.
It claims to have collected information on more than 2.4 million people and 650,000 organizations from about two billion social-media articles.
Together the documents reveal a Chinese firm with a keen interest in advanced forms of warfare, the structure of the U.S. intelligence apparatus and the use of social media to achieve military victories.
Story continues below advertisement
The company has secured a software patent for a social media account simulation system, a title that connotes a tool for managing networks of fake social-media usernames in ways that emulate human characteristics, making them more effective at spreading messages.
Zhenhuas name translates to China Revival, a reference to a mantra of President Xi Jinping, who has proclaimed the great rejuvenation of the Chinese nation.
It seems to be collecting information about people who are around things that China would be interested in. The question is whether this is a database of potential targets that could be used by the intelligence services of China to get what they want, said Stephanie Carvin, a former national security analyst who is now an associate professor of international relations at Carleton University.
Prof. Carvin looked at the database on behalf of The Globe and said it wasnt clear whether it was being used by Chinese intelligence or had simply been created by a company hoping to sell it to Chinese intelligence.
But she found it curious that it contained records on people such as Ella-Grace Trudeau, the 11-year-old daughter of Prime Minister Justin Trudeau, and Jeremy Fry, the adult son of long-time MP Hedy Fry. That, Prof. Carvin said, suggested an attempt to learn more not just about the people in power in Canada but about those around them.
Why have these people in some kind of database? That, to me, is the question that national security agencies in the West have to figure out. Thats the thing I worry about, Prof. Carvin said. Is this an attempt to create a database of targetable individuals? And what are they trying to do with that?
Story continues below advertisement
A version of the Zhenhua OKIDB database analyzed by The Globe contained almost 16,000 entries mentioning Canada.
Its files seem to have been cobbled together from various sources. Some catalogue news stories, including hundreds of Globe articles, while others are archived Facebook posts from U.S. President Donald Trump about trade tariffs. A large portion of the data appears to have been extracted from the business information website Crunchbase and serves as a Rolodex of social-media accounts and contact information for people in all sorts of occupations, from tech executives to university professors. Roughly 70 per cent of the people captured in the data are men.
The database appears to have a special focus on mayors of Western Canadian towns, as well as academics and bureaucrats who focus on international relations.
However, the effort is broader than it is deep.
Jeremy Kirk, an information security analyst who said he gained independent access to the database earlier this year, said he didnt see any sign that it was a tool of an intelligence service.
This is data that anyone could find through a Google search. So far, none of the data has been linked to a non-public data source. As it stands, it doesnt represent a threat to any country, said Mr. Kirk, who is the executive editor of the Australia-based Information Security Media Group. But people should be mindful of what they post publicly on the internet, as it could be collected by other countries for commercial gain or intelligence purposes.
Story continues below advertisement
The vast majority of the files contain little more than what can be found about the individuals on social-media websites such as Twitter, Facebook and LinkedIn. If the person of interest has a police record, links are included to newspaper stories about their cases.
The mass scraping of data contravenes Facebooks policies, spokeswoman Liz Bourgeois said. We have banned Shenzhen Zhenhua Data Technology from our platform and sent a cease and desist letter ordering them to stop, she said. LinkedIn does not permit the use of any software that scrapes or copies information from LinkedIn, spokesperson Billy Huang said. If any violation of our user agreement is uncovered or reported, we investigate and take necessary steps to protect our members' information.
The database also contains a shorter list of 3,767 Canadians who have been assigned a grade of 1, 2 or 3. Those assigned a 1 appear to be people of direct influence, such as mayors, MPs or senior civil servants, while those assigned a 2 are often relatives of people in power, such as Mr. Trudeaus daughter and Ms. Frys son. Those assigned a grade of 3 often have criminal convictions, mostly for economic crimes.
Dozens of current and former MPs dot the list, including new Conservative Party Leader Erin OToole, whose file includes a link to the web page of his official parliamentary profile and, like most, a seven-digit ID number.
Others with files assigned a grade of 1 include senior bureaucrats at the Canadian Nuclear Safety Commission, the Canadian Food Inspection Agency, the Treasury Board, the Transportation Safety Board, Export Development Canada even the Office of the Privacy Commissioner.
The justice system appears to be another focus of the database, which contains entries on judges up to and including current and former members of the Supreme Court of Canada.
Story continues below advertisement
Notable individuals assigned a grade of 3 include former theatre impresario Garth Drabinsky, who was convicted of fraud in 2009, former SNC-Lavalin executive Riadh Ben Aissa, who pleaded guilty to corruption charges in Switzerland before testifying against his superiors in Canada, and Nicola Iammarrone, a former Canada Revenue Agency auditor who pleaded guilty to taking bribes.
It is unclear how often the database is updated, as several names on the list appear to correspond with those of prominent Canadians who have died, in some cases many years ago.
Entries about Canadian criminals feature prominently. The database lists 198 people it says are associated with narcotics, 178 with conspiracy, 162 with fraud and 100 with money laundering. A handful of people are mentioned multiple times, including Gilles Vaillancourt, the former Laval, Que., mayor jailed in 2016 on fraud charges; Amin Mohamed Durrani, jailed after being arrested in the 2006 Toronto anti-terrorism sweep; and Michael Witen, an accountant who was found guilty of defrauding the federal government.
Zhenhua appears to be a company hoovering up open-source intelligence, and one of the things where there is a lot of open-source intelligence is around criminal records and court records, said Garrett Graff, co-author of Dawn of the Code War: Americas Battle Against Russia, China, and the Rising Global Cyber Threat.
According to database timestamps, all of the Canadian entries analyzed by The Globe were collected in mid-to-late 2018.
Data collection on this scale is not without precedent. The internet made collecting massive amounts of general-purpose data infinitely easier, giving rise to data brokers. Today these companies sell datasets ranging from credit-card purchasing histories to cellphone geolocation data, and their clients rely on the information for everything from tailoring advertising campaigns to calculating credit scores.
Story continues below advertisement
But other evidence points to Chinese players attempting to take in large amounts of data. A series of data breaches between 2013 and 2018 attributed to Chinese hackers stole personal information from Marriott hotels, the United States Office of Personnel Management and health insurer Anthem. China routinely denies involvement in hacking.
Each individual collection of data may be of limited value. But when you begin to layer these databases on top of one another, it provides an arguably unparallelled window into human targeting backgrounds, personal motivations, personal weaknesses and provides a roadmap for influencing people, Mr. Graff said.
Zhenhuas data is structured in a way similar to that of Factiva, a research tool from Dow Jones that also catalogues influential people around the world. In fact, the woman at the Zhenhua office likened the companys products to those of Dow Jones and Wind Information, a Chinese provider.
Some foreign software companies are able to obtain content such as videos, text and music from social media posts. What we can do is to get them all at once, she said. The company describes OKIDB as tracking people, institutions, connections and relationships. The people include global leaders and core figures in the fields of military, politics, business, science and technology, media, civil organizations and the like.
Zhenhuas clients are in government, the military, universities and academic institutes, the woman at the company said, adding they can use the companys technology to conduct a more detailed analysis of a certain professor. She said the company is not merely a technology provider, as its employees actively work with customers and are based in cities across China, including Nanjing and Wuhan.
Western intelligence services now estimate that China has collected personally identifiable information on 80 per cent of the U.S. population, said Nicholas Eftimiades, a former senior U.S. intelligence officer and China expert who recently published Chinese Espionage: Operations and Tactics. For a company like Zhenhua, applying artificial intelligence tools to a trove of social-media data can help its customers attain their goals locally, regionally, nationally or commercially, he said.
Youre talking about the ability to influence academics, political leaders ranging from mayors up through senior leaders in a government. Its about influencing them to serve the Chinese Communist Partys desires, their goals.
Online, Zhenhua stresses its military connections. On LinkedIn posts, a senior R&D engineer describes working on a social media cultivation system, and military deployment simulation demonstration system, while a product sales manager discusses mining military customers' business needs for overseas data. A job posting seeks a candidate that can manage sales and focus management systems at the direction of the Party, government, and military.
Zhenhua also lists a series of corporate partners with ties to the security establishment. Wenge Group uses big data and artificial intelligence to aid smart law enforcement. LSSEC Tech provides encryption tools and IT equipment to national security and military customers and has trained its employees to keep secrets on weaponry research. GTCOM sifts social media to spot the development of heated public opinion, equipping authorities to minimize the probability of group incidents. TRS lists the police and the Communist Party as customers for software services that include online relationship mining, a public opinion management system and a crystal ball intelligence analysis platform. CHRTC provides urban governance products to the countrys security apparatus.
Zhenhua itself has been granted 10 software patents, Chinese records show, for systems that include searching global think tanks, monitoring personnel appointments and removals around the world, gathering real-time telecommunications content and social-media account simulation. The latter appears to describe a technology to teach a computerized system to better mimic humans on social media.
The ultimate intent of this sort of thing is to get attention, to stimulate phony online traffic, said Wu Fei, director of the AI Research Centre at Zhejiang University. When people see content that has already received thousands of likes or comments, the majority of which may be created and stimulated by the system they would immediately be interested.
Zhenhua said on its website that its system manages multiple social-media accounts belonging to virtual humans bots. When an assigned task is received, the user can select all social media accounts or part of them to execute the assigned instructions.
Such tools can be used by companies to promote products. But Zhenhua has explained how they could also hold military value.
The company has published extensively on Number 99 Institute, a blog account on the WeChat messaging app. Its articles reveal an interest in the structure and hierarchy of U.S. intelligence agencies, as well as in future forms of conflict. One, which was also posted to the Zhenhua website, describes social media as important tools for hybrid warfare, explaining how the manipulation of public opinion through social media can be a cost-effective and powerful way to prevail in battle. Social media can manipulate reality and weaken a countrys administrative, social, military or economic power, the company wrote. It can also lead to internal conflicts, social polarization and radicalization in a country.
Our Morning Update and Evening Update newsletters are written by Globe editors, giving you a concise summary of the days most important headlines.Sign up today.
See the article here:
Chinese firm amasses trove of open-source data on influential Canadians - The Globe and Mail
- Research, Evaluation and Learning at the International Rescue Committee - World - ReliefWeb [Last Updated On: August 10th, 2020] [Originally Added On: August 10th, 2020]
- Conserving Biodiversity with AI - BBN Times [Last Updated On: August 10th, 2020] [Originally Added On: August 10th, 2020]
- DevOps Fundamentals You Ever Wanted To Know - hackernoon.com [Last Updated On: August 10th, 2020] [Originally Added On: August 10th, 2020]
- Another Perspective on Evictions - Bacon's Rebellion [Last Updated On: August 10th, 2020] [Originally Added On: August 10th, 2020]
- Amitabh Bachchan on fans alternate job suggestion: My job is now insured - The Indian Express [Last Updated On: August 10th, 2020] [Originally Added On: August 10th, 2020]
- Will You Soon Download Packaging Machine Controls from the Internet? - Packaging Digest [Last Updated On: August 10th, 2020] [Originally Added On: August 10th, 2020]
- 5 free resources every data scientist should start using today - The Next Web [Last Updated On: August 10th, 2020] [Originally Added On: August 10th, 2020]
- Who's hoping to make an Epic impact on Green Bay area music scene with a new concert venue? | Streetwise - Green Bay Press Gazette [Last Updated On: August 10th, 2020] [Originally Added On: August 10th, 2020]
- Industrial robots are dominating but are they safe from cyber-attacks? - TechHQ [Last Updated On: August 10th, 2020] [Originally Added On: August 10th, 2020]
- Friday Rant - Rise of the Rogue-Bots? - Diginomica [Last Updated On: August 10th, 2020] [Originally Added On: August 10th, 2020]
- Important Reasons Why You Should Pick RoR As Your Web-Based Development Project - Customer Think [Last Updated On: August 10th, 2020] [Originally Added On: August 10th, 2020]
- Portrait of the software developer as an artist - ComputerWeekly.com [Last Updated On: August 10th, 2020] [Originally Added On: August 10th, 2020]
- Python may be your safest bet for a career in coding - Gadgets Now [Last Updated On: August 10th, 2020] [Originally Added On: August 10th, 2020]
- 1Password is coming to Linux - ZDNet [Last Updated On: August 10th, 2020] [Originally Added On: August 10th, 2020]
- IBM creates an open source tool to simplify API documentation - TechRepublic [Last Updated On: August 10th, 2020] [Originally Added On: August 10th, 2020]
- Mastercard : Accelerate Ignites Next Generation of Fintech Disruptors and Partners to Build the Future of Commerce - Marketscreener.com [Last Updated On: August 12th, 2020] [Originally Added On: August 12th, 2020]
- Expanding the Universe of Haptics | by Lofelt | Aug, 2020 - Medium [Last Updated On: August 12th, 2020] [Originally Added On: August 12th, 2020]
- UX Designer Salary: 5 Important Things to Know - Dice Insights [Last Updated On: August 12th, 2020] [Originally Added On: August 12th, 2020]
- Persistent memory reshaping advanced analytics to improve customer experiences - IT World Canada [Last Updated On: August 12th, 2020] [Originally Added On: August 12th, 2020]
- NextCorps and SecondMuse Open Application Period for Programs that Help Climate Technology Startups Accelerate Hardware Manufacturing - GlobeNewswire [Last Updated On: August 12th, 2020] [Originally Added On: August 12th, 2020]
- Buried deep in the ice is the GitHub code vault humanity's safeguard against devastation - ABC News [Last Updated On: August 12th, 2020] [Originally Added On: August 12th, 2020]
- Top 12 Most Used Tools By Developers In 2020 - Analytics India Magazine [Last Updated On: August 12th, 2020] [Originally Added On: August 12th, 2020]
- Facebook's React 17 JavaScript library: Here's why its top feature is 'no new features' - ZDNet [Last Updated On: August 12th, 2020] [Originally Added On: August 12th, 2020]
- CORRECTING and REPLACING Anyscale Hosts Inaugural Ray Summit on Scalable Python and Scalable Machine Learning - Business Wire [Last Updated On: August 12th, 2020] [Originally Added On: August 12th, 2020]
- Google: Here's how much we give to open source through our GitHub activity - ZDNet [Last Updated On: August 12th, 2020] [Originally Added On: August 12th, 2020]
- How Chriselle Lim And Joan Nguyen Created Bmo, The Coworking Space And Virtual Classroom Of The Future (With A Childcare Twist) - Forbes [Last Updated On: August 13th, 2020] [Originally Added On: August 13th, 2020]
- How Will Public Libraries Adapt To New School Year Norms? - Book Riot [Last Updated On: August 13th, 2020] [Originally Added On: August 13th, 2020]
- Google: We'll test hiding the full URL in Chrome 86 to combat phishing - ZDNet [Last Updated On: August 13th, 2020] [Originally Added On: August 13th, 2020]
- How to install Python 3 and PIP 3 on Ubuntu 20.04 LTS - Linux Shout - H2S Media [Last Updated On: August 13th, 2020] [Originally Added On: August 13th, 2020]
- What are Bitcoin Wallets: Everything You Need to Know - Programming Insider [Last Updated On: August 13th, 2020] [Originally Added On: August 13th, 2020]
- JSHint is Now Free Software after Updating License to MIT Expat - WP Tavern [Last Updated On: August 13th, 2020] [Originally Added On: August 13th, 2020]
- How to learn JavaScript: These are the best online courses - Mashable [Last Updated On: August 13th, 2020] [Originally Added On: August 13th, 2020]
- What developers need to know about inter-blockchain communication - ComputerWeekly.com [Last Updated On: August 14th, 2020] [Originally Added On: August 14th, 2020]
- Introducing the CDK construct library for the serverless LAMP stack - idk.dev [Last Updated On: August 14th, 2020] [Originally Added On: August 14th, 2020]
- IBM asked software developers to take on the wrath of Mother Nature - The Drum [Last Updated On: August 14th, 2020] [Originally Added On: August 14th, 2020]
- Aspire Technology Launches First Truly Secure Public Blockchain for Creation of Digital Assets - GlobeNewswire [Last Updated On: August 14th, 2020] [Originally Added On: August 14th, 2020]
- GM Creates And Shares New Workplace Safety Technologies - Pulse 2.0 [Last Updated On: August 14th, 2020] [Originally Added On: August 14th, 2020]
- Key Considerations and Tools for IP Protection of Computer Programs in Europe and Beyond - Lexology [Last Updated On: August 14th, 2020] [Originally Added On: August 14th, 2020]
- The state of application security: What the statistics tell us - CSO Online [Last Updated On: August 14th, 2020] [Originally Added On: August 14th, 2020]
- Open Source: What's the delay on the former high/middle school on North Mulberry? - knoxpages.com [Last Updated On: August 14th, 2020] [Originally Added On: August 14th, 2020]
- The Risks Associated with OSS and How to Mitigate Them - Security Boulevard [Last Updated On: August 14th, 2020] [Originally Added On: August 14th, 2020]
- news digest: Microsoft launches open source website, TensorFlow Recorder released, and Stackery brings serverless to the Jamstack - SD Times -... [Last Updated On: August 14th, 2020] [Originally Added On: August 14th, 2020]
- Build Your Own PaaS with Crossplane: Kubernetes, OAM, and Core Workflows - InfoQ.com [Last Updated On: August 17th, 2020] [Originally Added On: August 17th, 2020]
- ISRO Is Recruiting For Vacancies with Salary Upto Rs 54000: How to Apply - The Better India [Last Updated On: August 17th, 2020] [Originally Added On: August 17th, 2020]
- Does technology increase the problem of racism and discrimination? - TechTarget [Last Updated On: August 17th, 2020] [Originally Added On: August 17th, 2020]
- CORRECTING and REPLACING Anyscale Hosts Inaugural Ray Summit on Scalable Python and Scalable Machine Learning - Yahoo Finance [Last Updated On: August 17th, 2020] [Originally Added On: August 17th, 2020]
- In the City: Take advantage of open recreation, cultural and park amenities - Coloradoan [Last Updated On: August 17th, 2020] [Originally Added On: August 17th, 2020]
- Exploring the future of modern software development - ComputerWeekly.com [Last Updated On: August 21st, 2020] [Originally Added On: August 21st, 2020]
- Hadoop Developer Interview Questions: What to Know to Land the Job - Dice Insights [Last Updated On: August 21st, 2020] [Originally Added On: August 21st, 2020]
- SiFive Opens Business Unit to Build Chips With Arm and RISC-V Inside - Electronic Design [Last Updated On: August 21st, 2020] [Originally Added On: August 21st, 2020]
- Use Pulumi and Azure DevOps to deploy infrastructure as code - TechTarget [Last Updated On: August 21st, 2020] [Originally Added On: August 21st, 2020]
- Why ASP.NET Core Is Regarded As One Of The Best Frameworks For Building Highly Scalable And Modern Web Applications - WhaTech [Last Updated On: August 21st, 2020] [Originally Added On: August 21st, 2020]
- NITK figures 4th in Google Summer of Code ranking - BusinessLine [Last Updated On: August 21st, 2020] [Originally Added On: August 21st, 2020]
- Learn More About Dynamo for Revit: Features, Functions, and News - ArchDaily [Last Updated On: August 21st, 2020] [Originally Added On: August 21st, 2020]
- Linux Foundation showcases the greater good of open source - ComputerWeekly.com [Last Updated On: August 21st, 2020] [Originally Added On: August 21st, 2020]
- Programming language Kotlin 1.4 is out: This is how it's improved quality and performance - ZDNet [Last Updated On: August 21st, 2020] [Originally Added On: August 21st, 2020]
- Top 10 Languages That Paid Highest Salaries Worldwide In 2020 - Analytics India Magazine [Last Updated On: August 21st, 2020] [Originally Added On: August 21st, 2020]
- Programming language Rust: Mozilla job cuts have hit us badly but here's how we'll survive - ZDNet [Last Updated On: August 21st, 2020] [Originally Added On: August 21st, 2020]
- In-App Bidding Gathers Steam, But Adoption Looks Nothing Like Header Bidding On The Web - AdExchanger [Last Updated On: August 21st, 2020] [Originally Added On: August 21st, 2020]
- 13 thoughts on Fitting Snake Into A QR Code - Hackaday [Last Updated On: August 21st, 2020] [Originally Added On: August 21st, 2020]
- Newham test and trace app was designed by man who grew up in the borough - Newham Recorder [Last Updated On: August 21st, 2020] [Originally Added On: August 21st, 2020]
- 'Trapped in a code' the fight over our algorithmic future - Open Democracy [Last Updated On: August 21st, 2020] [Originally Added On: August 21st, 2020]
- Telegram launches one-on-one video calls on iOS and Android - The Verge [Last Updated On: August 21st, 2020] [Originally Added On: August 21st, 2020]
- AWS Controllers for Kubernetes Will Be A 'Boon For Developers' - CRN: Technology news for channel partners and solution providers [Last Updated On: August 21st, 2020] [Originally Added On: August 21st, 2020]
- Coding within company constraints - ComputerWeekly.com [Last Updated On: August 21st, 2020] [Originally Added On: August 21st, 2020]
- Open Source and Open Standards: The Recipe for Success Featured - The Fast Mode [Last Updated On: August 21st, 2020] [Originally Added On: August 21st, 2020]
- How Intel helped give the worlds first cyborg a voice - The Next Web [Last Updated On: August 21st, 2020] [Originally Added On: August 21st, 2020]
- Tiger Woods, Rory McIlroy near bottom of field at The Northern Trust - ESPN [Last Updated On: August 22nd, 2020] [Originally Added On: August 22nd, 2020]
- Intel Owl OSINT tool automates the intel-gathering process using a single API - The Daily Swig [Last Updated On: August 22nd, 2020] [Originally Added On: August 22nd, 2020]
- IOTA Foundation presents the current projects in the mobility industry - Crypto News Flash [Last Updated On: August 22nd, 2020] [Originally Added On: August 22nd, 2020]
- How 'Fortnite' and 'Second Life' Shaped the Future of Indian Market - Santa Fe Reporter [Last Updated On: August 22nd, 2020] [Originally Added On: August 22nd, 2020]
- Apple Enters $ 2 Trillion Club, Github's Chinese Counterpart And More In This Week's Top News - Analytics India Magazine [Last Updated On: August 22nd, 2020] [Originally Added On: August 22nd, 2020]
- As world grapples with pandemic, schools are the epicenter - ABC News [Last Updated On: August 24th, 2020] [Originally Added On: August 24th, 2020]
- Why Businesses Should Embrace Modernizing Their Legacy Applications - TechBullion [Last Updated On: August 24th, 2020] [Originally Added On: August 24th, 2020]
- Is It Time To Rename RPG? - IT Jungle [Last Updated On: August 24th, 2020] [Originally Added On: August 24th, 2020]
- Phantasy Star Online programmers on breaking new ground and their Diablo-style isometric prototype - Polygon [Last Updated On: August 24th, 2020] [Originally Added On: August 24th, 2020]
- How To Learn To Program In Python By Playing Videogames - Analytics India Magazine [Last Updated On: August 24th, 2020] [Originally Added On: August 24th, 2020]
- New Microsoft program to help develop the quantum computing workforce of the future in India - Microsoft [Last Updated On: August 24th, 2020] [Originally Added On: August 24th, 2020]
- How the Docker Revolution Will Change Your Programming, Part 1 - Walter Bradley Center for Natural and Artificial Intelligence [Last Updated On: August 24th, 2020] [Originally Added On: August 24th, 2020]
- The art of developing happy customers - ComputerWeekly.com [Last Updated On: August 24th, 2020] [Originally Added On: August 24th, 2020]