SiFive hones Risc-V cores for more processing power and fewer watts – Electronics Weekly

The release has been dubbed 20G1, as the company has switched from year-month naming to year-release naming: 20G1 being the first general release of 2020 and encapsulates nine months of hard work and progress at SiFive as we move to a new release schedule driven by our road-maps and aligned to customer engineering cycles, it said.

Enhancements to the high-end Linux-capable U7-Series application processor are claimed to have reduced power consumption by more than 25%, while increasing load bandwidth up to 2.8x for streaming data applications such as AI acceleration that is comparing the 20G1 U74 processor with the previous (August 2019) U74 running running Dhrystone. Other SiFive cores also feature reduced power consumption, SiFive is highlighting the power saving in the U74 as a best case, the company told Electronics Weekly.

Another change is that the low-end E3-Series and E7-Series are now available with the RISC-V embedded extension, called RV32E, which can reduce 28nm chip area by up to 11% compared to RV32I implementation.

Based on customer feedback, RV32E will be a popular option for product designers who need area-constrained high-performance embedded CPUs, said SiFive, adding: The SiFive 3-, 5-, and 7-Series cores have been refreshed with new, enhanced real-time capabilities, bringing deterministic performance for high-reliability designs to SiFives product portfolio.

An add-on to 20G1 is support for SiFive Shield Hardware Cryptographic Accelerator intellectual property, offeringa configurable mix of AES, SHA, and TRNG functions to add secure root-of-trust and hardware cryptography acceleration.

In addition, pre-integration of SiFives Insight trace and debug block will speed use of Arms CoreSight tool, said SiFive: By seamlessly integrating with CoreSight, developers can integrate SiFive Risc-V based cores into mixed ISA [instruction set] designs and maintain their existing development environment. Insight is the industrys first pre-integrated debug and trace IP for RISC-V processor cores.

One last announcement is aimed at users of FreeRTOS:SiFives Freedom E SDK now includes FreeRTOS v.10, with source code and build scripts. Alongside the FreeRTOS kernel, the SiFive Freedom E SDK features several FreeRTOS-based examples, including using physical memory protection to enable secure run-time operations, said the company. Associated board support packages have been upgraded to include SVD (System View Description) for debug environment integration.

Link:
SiFive hones Risc-V cores for more processing power and fewer watts - Electronics Weekly

Trust Is A Keystone Of Digital Transformation – Forbes

Reputable and trustworthy authentication is a keystone of any digital transformation project. But ... [+] for businesses to really make progress and successfully move towards remote working, passwords need to be made a thing of the past.

Even in non-Covid times, digital transformation in any organization isnt easy. Weve all seen how the pandemic has drastically accelerated the willingness of, and the need for, organizations to embrace new technology, but it has also added complexity.

All of a sudden huge swathes of the workforce are working remotely, and businesses have had to react quickly to support a new, more remote and more flexible workforce. Aside from the various technical and logistical hurdles, many organizations are finding their biggest challenge is one of trust. With staff no longer physically present, how do you know your employees are who they say they are?

Creating trust in challenging times

I recently spoke to Andrew Shikiar, Executive Director and CMO, at the FIDO Alliance, who believes the answer lies in how organizations authenticate employees and end-users. And by solving this issue of trust, they will not only be able to move to a more remote model, but gain the confidence they need to push ahead with digital transformation projects.

Andrew says: You can't have digital transformation without security. What if you can't trust anyone you don't know? It undermines the whole ability to have digital transformation at scale. And to have security at scale, it needs to be easy. Fundamentally, technology needs to be easy for people to use.

FIDOs approach to addressing this problem revolves around a major shift in the way people authenticate themselves. In practice, this would mean users logging-in to devices, cloud-based platforms or online services using a biometric signature, like a fingerprint or their face, without the need for a password.

Farewell to the trusty password?

Phasing out passwords may sound counter-intuitive, but that is precisely what the FIDO Alliance was created to do. Its members include many of the worlds leading companies like Apple, American Express, Google, Microsoft and Samsung, who all recognize the pitfalls of the formerly trusty password.

Andrew explains: The traditional way of authenticating is password-based, but the odds are that [your password has] been stolen, it's sitting on the dark web already, or if not, someone can phish you through a replay attack over 80% of data breaches are caused by passwords, either because the password is stolen or something has been left open.

FIDO claims to solve this problem by moving away from the current dependency on server-side credentials, to one that authenticates users locally from a device in their possession, such as their PC or smartphone. Public key cryptography then enables the device to mediate the authentication process with the server.

Are biometrics the answer?

There will likely be many who are uncomfortable with the idea of providing biometrics to any private organization, let alone their employer. But due to the way the FIDO standards work, with data stored locally on the device as opposed to a server, it cannot be accessed by anybody other than the user. The bigger barrier to adoption may well be that large enterprises are unable to replace passwords in legacy systems that rely on them. But that does not prevent them from adding an extra layer of authentication, like that provided by FIDO or another form of second factor authentication, which could effectively remove the need to use a password for many employees in most circumstances.

As with any digital transformation project, you ultimately want to make life easier for employees, while increasing efficiency and productivity. Passwords were designed to be simple but, as we have all likely experienced, they have become incredibly cumbersome, leading many to take short-cuts. So any new authentication method, biometric or otherwise, needs to be simple and easy to adopt. When youre in the midst of a major transformation project, the last thing you need is an added complication or a new process for people to learn on top of all of the critical changes the business is making.

Establishing trust

The pandemic has forced organizations to adapt to new ways of working, and there are certainly opportunities for them to improve the way they operate. But the pandemic has also introduced complexity and raised issues around trust. As business leaders adapt to the current circumstances and plan for the future, more effective ways of establishing trust and authenticating employees could become increasingly common. But its vital that they find solutions in keeping with the overall aims of their digital transformation project - make it simple to use, make it more efficient, and make it more effective.

Read the original:
Trust Is A Keystone Of Digital Transformation - Forbes

eSignatures Get The Nod From Land Registry – Today’s Conveyancer

As the world shifts to digital modes of conducting business, with the Covid-19 pandemic speeding up the process, UKs Land Registry has made plain its intentions to accept electronic signatures in conveyancing.

We will soon start accepting witnessed electronic signatures and then take steps to ensure that digital signatures (more specifically Qualified Electronic Signatures) can be used when working with HM Land Registry,

says Land Registry deputy chief executive, Mike Harlow, in the Registrys blog.

Harlow says this will provide conveyancers with immediate help in meeting the difficulties of working with paper in the current crisis.

And, while the move makes short-term sense, as it brings huge and instant relief in a time when social distancing and working from home are new norms, it is not just about the here and now, he emphasises.

It is obvious that the more digitally advanced sectors are those that have thrived in the last few months. Conveyancing is not one of those. It has some digital components, but they need to be joined up. Achieving a long-term, sustainable and secure means of signing property transactions would be a significant component of a wholly digital conveyancing process.

The long-overdue development comes as ever more time-strapped customers, now also bound by lockdown law, are asking questions around the acceptance of electronic signatures as opposed to wet-ink (pen) signatures on things like deeds of transfer.

At a time when most of us are working from home, printing, posting and scanning can be a pain,

says Harlow.

Recent research indicates that the average office worker uses approximately 10000 sheets of paper a year. Studies also estimate that associated paper costs such as storage, postage, copying and printing add up to about 30 times the actual purchasing cost of the paper.

But manual paper-based processes are not only costly in terms of physical money, they also considerably lessen efficiency and productivity. Think about how much time is spent searching through cabinet upon cabinet of paper records to find a paper document. This wasted time becomes literally a thing of the past when documents digitally archived, able to be indexed at the touch of a few buttons or with a few clicks.

These are modern-day realities the business world universally is coming to accept and change using sophisticated, secure solutions such as digital signature software.

In the early stages of lockdown, HM Land Registry gathered a group of representatives, including regulators and trade bodies, conveyancers, lenders and estate agents to discuss and explore how the solutions found amid the pandemic could benefit conveyancing in the future.

We have also conducted extensive research of the market in electronic and digital signatures and believe that, with some safeguards, we can accept both witnessed electronic signatures and Qualified Electronic Signatures.

Often confused with simple electronic signatures, digital signatures are much more than that. Digital signatures are the most advanced and secure type of electronic signature because they guarantee that the contents of a message or document have not been altered or tampered with in any way.

Also referred to as advanced electronic signatures or secure electronic signatures, digital signatures are steeped in cryptography. They are based on Public Key Infrastructure (PKI) technology and use accredited personal X.509 digital certificates to provide the highest levels of security and universal acceptance.

On the other hand, an electronic signature also referred to as an ordinary electronic signature can literally be as simple as a scanned image of a handwritten (wet-ink) signature that is copied onto a signed document, in Word for example. Another case of an electronic signature would be your name, typed at the end of an email.

Electronic signatures do not have the ability to lock documents for editing after the signing process, nor do they carry any active verification capability. This leaves documents signed with electronic signatures open to fraud and repudiation.

An electronic signature can even be verbal, a simple click of a box, or drawn on a hardware device such as a signature pad.

Advanced electronic signatures (AES) and qualified electronic signatures (QES) are both instances of digital signatures. An AES is an electronic signature that has met the requirements set forth under EU Regulation (No 910/2014). A QES is an advanced electronic signature that is created by a qualified signature creation device and is based on a qualified certificate for electronic signatures.

As Harlow points out, a digital signature is legally different to an electronic signature, and comes with its own requirements.

Digital signatures are more secure because there is a process preceding them that positively identifies the signatory and the resultant document is encrypted so that it cannot be altered. This balances the fact that a witness is no longer required.

View original post here:
eSignatures Get The Nod From Land Registry - Today's Conveyancer

The Business Case for Protecting the Keys to the Kingdom – Security Today

The Business Case for Protecting the Keys to the Kingdom

An enterprise key management system can prevent data breaches, produce efficiency savings, simplify compliance, and enable digital transformation.

In the battle for security budget funding, enterprise key management isnt nearly as sexy as technologies such as threat hunting or blockchain cybersecurity. Nevertheless, a key management system (KMS) is a behind-the-scenes workhorse that manages and protects the very keys that can open the kingdom. While a KMS is likely already a line item in the annual security budget, an investment to modernize a KMS to extend data security to the cloud will certainly pay dividends by reducing the risk of a data breach.

What is key management, and why is it necessary? Key management is the practice of administering the lifecycle of cryptographic keys in accordance with best practices such as those defined by the National Institute of Standards and Technology (NIST). In its Recommendation for Key Management, NIST states:

The proper management of cryptographic keys is essential to the effective use of cryptography for security. Ultimately, the security of information protected by cryptography directly depends on the strength of the keys, the effectiveness of mechanisms and protocols associated with the keys, and the protection afforded to the keys.

The fundamental requirements of key management are to generate cryptographically strong keys, protect the keys against disclosure or alteration, and provide effective controls for managing and using keys.

What is a Key Management System?While encryption is built into many products today, the capabilities for generating and storing keys are often rather rudimentary and generally fall short of standards such as NIST SP 800-57. Electronic key management systems are commonly used to consolidate and centralize the management of keys across the enterprise in accordance with industry standards and best practices for data security.

A central capability of any KMS is systematic management of keys over their entire lifecycle, including generation, import/export, distribution, usage, update, backup, revocation, and deletion. A KMS should also provide controls to ensure that keys can be accessed only by authorized individuals and systems and used only for their intended purposes. All key operations should be logged for audit and compliance purposes.

View original post here:
The Business Case for Protecting the Keys to the Kingdom - Security Today

Microsoft will disable insecure TLS in Office 365 on Oct 15 – BleepingComputer

Microsoft has set the official retirement date for the insecure Transport Layer Security (TLS) 1.0 and 1.1 protocols in Office 365 starting with October 15, 2020, after temporarily halting deprecation enforcement for commercial customers due to COVID-19.

"As companies have pivoted their supply chains and countries have started to re-open we have re-established a retirement date for TLS 1.0 and 1.1 in Office 365 to be October 15, 2020," the company said in the MC218794 Microsoft 365 admin center announcement on Friday.

"As previously communicated [..], we are moving all of our online services to Transport Layer Security (TLS) 1.2+ to provide best-in-class encryption, and to ensure our service is more secure by default."

The TLS 1.0/1.1 retirement was first announced in December 2017 and, as explained by Microsoft, the effect of this change for end-users is expected to be minimal.

IT administrators can use the official KB4057306 documentation to prepare for TLS 1.2 in Office 365 and Office 365 GCC.

They can also download this Office 365 TLS deprecation report to quickly identify the users and devices that connect to Exchange servers via TLS 1.0/1.1.

At the moment, users of the following clients are advised to update to the latest versions as they are known to be unable to use TLS 1.2:

Android 4.3 and earlier versions Firefox version 5.0 and earlier versions Internet Explorer 8-10 on Windows 7 and earlier versions Internet Explorer 10 on Windows Phone 8 Safari 6.0.4/OS X10.8.4 and earlier versions

Microsoft also provides a whitepaper with guidance on how to identify and remove TLS 1.0 dependencies in software built on top of Microsoft operating systems as a starting point for a migration plan to a TLS 1.2+ environment.

As part of any TLS 1.0/1.1 deprecation plan, Microsoft recommends including the following:

Application code analysis to find/fix hardcoded instances of TLS 1.0/1.1. Network endpoint scanning and traffic analysis to identify operating systems using TLS 1.0/1.1 or older protocols. Full regression testing through your entire application stack with TLS 1.0/1.1 and all older security protocols disabled. Migration of legacy operating systems and development libraries/frameworks to versions capable of negotiating TLS 1.2. Compatibility testing across operating systems used by your business to identify any TLS 1.2 support issues. Coordination with your own business partners and customers to notify them of your move to deprecate TLS 1.0/1.1. Understanding which clients may be broken by disabling TLS 1.0/1.1.

Microsoft has already begun deprecating insecure TLS for any clients, devices, or services connecting to Office 365 through TLS 1.0 or 1.1 DoD or GCC High instances as of January 2020.

The two protocols will also become unsupported for commercial Office 365 customers, with the company recommending "that all client-server and browser-server combinations use TLS 1.2 (or a later version) in order to maintain connection to Office 365 services."

In September 2019, Microsoft announced that Windows Server 2019 enables admins to block weak TLS versions from being used with individual certificates via a new "Disable Legacy TLS" feature to make it easier to migrate to TLS 1.2+.

The company also said in March that the TLS 1.0/1.1 retirement in Microsoft browsers would be postponed until July for Chromium-based Edge and September 8 for supported versions of Internet Explorer 11 and Microsoft Edge Legacy.

The retirement of these insecure TLS protocols was announced by all major browser makers including Microsoft, Google, Apple, and Mozilla back in October 2018.

Although users will still be able to re-enable TLS 1.0/1.1 in their browsers after being disabled by default, Microsoft advises against it as newer TLS versions come with more modern cryptography and are more broadly supported by modern web browsers.

With over 97,5% of all sites surveyed by Qualys SSL Labs featuring TLS 1.2 or TLS 1.3 support, the browser vendors' decision to disable TLS 1.0/1.1 in favor of newer protocols is a rational move as they can provide a more secure path going forward.

Netcraft also said in March that the insecure TLS 1.0/1.1 protocols are still in use on over 850,000 websites, exposing their visitors to a wide range of cryptographic attacks (1, 2) that could allow threat actors to decrypt their web traffic.

See the original post:
Microsoft will disable insecure TLS in Office 365 on Oct 15 - BleepingComputer

Setting up passwordless login from Amazon EC2 Windows and Linux instances to Amazon RDS Oracle database instances – idk.dev

In todays world, every organization uses a centralized location to store and manage user credentials. The most commonly used service for this is Microsoft Active Directory (AD). Organizations use LDAP protocol to authenticate users to their peripheral devices, but fewer companies use this centralized credential store to allow users to log in to their databases. If you dont use a centralized Active Directory for database authentication, the database administrator has to maintain separate key chain for every database a user needs access to. And implementing security measures such as changing passwords periodically becomes a nightmare.

Kerberos is a network authentication protocol that functions by implementing secret key cryptography. This system is used to verify the identity of a user or a host. System administrators can use AWS Directory Service for Microsoft Active Directory to manage the Active Directory. You can use the same AD credentials to log in to an Amazon Elastic Compute Cloud (Amazon EC2) instance and further authenticate into an Amazon Relational Database Service (Amazon RDS) Oracle database instance. This is all done by using tokens. With Kerberos, after the first authentication, the client holds a ticket so that additional authentication attempts dont overload the AWS Managed Microsoft AD authentication server. In addition, Kerberos facilitates a strong and secure authentication without transmitting passwords. As an additional benefit, you get access to a centralized place to store and manage credentials for multiple database instances.

The purpose of this post is to assist you in setting up Kerberos authentication for Amazon RDS using Oracle database instances from scratch. It delineates specific steps for creating an AWS Managed Microsoft AD, AD users, setting up an Amazon EC2 Linux or Windows instance to connect to an AWS Managed Microsoft AD, and using Kerberos authentication to log in to a database instance from an EC2 instance.

The steps in this walkthrough are structured to complete the setup with minimum configuration changes. For this post, you use Windows Server 2019 AMI for Amazon EC2 Windows, an Amazon Linux 2 AMI for Amazon EC2 Linux, and Oracle Enterprise Edition 12.2.0.1 for Amazon RDS Oracle instance.

After the solution is implemented, users can use the same AD credentials to log in to an EC2 instance and log in to the database with the same credentials. A database administrator still has to create a user account at the database level with the same name as in Active Directory. You also still manage the required grants and privileges of the user at the database level as you would for any other database level user. The only difference is that you dont manage the user credentials. This provides two-layer security protection. When the user no longer needs database access, you can simply revoke access at the database level. If the user is no longer needed and is removed from Active Directory, the database access is removed automatically.

The following diagram illustrates the solution architecture.

The workflow includes the following steps:

This Oracle feature has been tested with Oracle Client (SQL*Plus) and Oracle SQL Developer with a JDBC thin client. For other clients, refer to vendor support or the documentation for Kerberos support.

The following are the high-level steps to configure an Amazon EC2 Linux or Windows machine that connects to an AWS Managed Microsoft AD and uses Kerberos authentication to log in to an Amazon RDS Oracle database instance:

After you complete these steps, you can log in to an Amazon RDS Oracle database instances using passwordless login.

These steps include setting up an AWS Managed Microsoft AD and launching an EC2 instance as part of the AD domain. If your environment already has an EC2 instance set up that is part of the AD domain, you can jump to Step 5: Installing Oracle Client. These steps work using an AWS Managed Microsoft AD.

To set up Kerberos authentication using an on-premises or self-hosted Microsoft AD, create a forest trust or external trust. The trust can be one-way or two-way. For more information about setting up forest trusts using AWS Directory Service, see When to Create a Trust Relationship.

To create a new directory, perform the following steps. Before starting this procedure, make sure that you have completed the prerequisites identified in AWS Managed Microsoft AD Prerequisites.

For more information, see Create Your AWS Managed Microsoft AD directory.

To manage the Active Directory from an EC2 Windows instance, complete the following steps.

Complete the following steps to create additional users as necessary. By default, all users get access to log in to any Amazon EC2 Linux instance. To get RDP access to connect to the Amazon EC2 Windows instance, the users need to be added to the appropriate AWS delegated groups in the AD.

The following steps add an EC2 instance to be part of the AWS Managed Microsoft AD. This post shows how to use an Amazon Linux 2 AMI and Windows Server 2019. After you add the instance, log in using an AD user and verify the connectivity between Amazon EC2 and Amazon RDS instance with a utility like telnet.

To use Linux, complete the following steps:

For instructions on joining an Amazon EC2 Windows instance to an AWS Managed Microsoft AD, see Seamlessly Join an Amazon EC2 Windows instance.

In this step, you install the appropriate Oracle client software on the Amazon EC2 Linux or Windows instance, which is a part of AWS Managed Microsoft AD. For this post, we tested the solution on an Oracle 12.2.0.1 client version.

On Windows, it also works with SQL Developer (without the need to install Oracle client with it).

In this step, you modify the Amazon RDS Oracle instance from the console to enable Kerberos authentication.

Alternatively, enter the following code:

The following steps set up the Kerberos configuration files and configure sqlnet.ora to enable Kerberos authentication service. This post presents the steps for both Linux and Windows.

To use Linux, complete the following steps.

For example, see the modified code:

Oracle doesnt understand the KEYRING cache format. Therefore, we changed it to FILE format.

To use Windows, first download and install MIT Kerberos for Windows 4.1. For more information about Kerberos and downloading links for the installer, see Kerberos: The Network Authentication Protocol.

krb5cache is a file (not a directory) managed by the Kerberos software, and it should not be created by the user. If you receive a permission error when you first use Kerberos, make sure that the krb5cache file doesnt already exist as a file or a directory.The following example code is of the krb5.ini file contents:

Its preferable to set the cache location via configuration file using the %{uid} file name format. This ensures that the file names are unique for every user. Dont set the KRB5CCNAME system variable when the default cache name is defined in the configuration file. Additionally, you cant use %{uid} as a file name format when passed as a system variable.

If Oracle Client is installed, edit sqlnet.ora to add the following parameters:

If youre using SQL Developer, no additional configuration changes are required (you can also skip the step to install MIT Kerberos software).

In the connection string properties, for Authentication Type, choose Kerberos and enter the credentials.

To connect to the database, complete the following steps:

For Windows, enter the following code:

For Windows, no additional environment variables are required.

For Windows, enter the following code:

The following troubleshooting steps are the same for both Linux and Windows (in Windows, Oracle Client must be installed).

This post described how to set up Kerberos authentication for Amazon RDS Oracle database instances. For more information, see Using Kerberos authentication with Amazon RDS for Oracle and Configuring Kerberos Authentication.

If you have any questions, concerns, or comments, please leave your thoughts in the comments section.

Tirthadeep Roy is a Cloud Support Engineer with Amazon Web Services.

See more here:
Setting up passwordless login from Amazon EC2 Windows and Linux instances to Amazon RDS Oracle database instances - idk.dev

Ignition to identification – the ‘car key’ is evolving – Lexology

The function of the car key is changing. The ignition lock was initially invented in the early 20th century although cars still required a driver to crank the engine by hand before the car could be driven. With the introduction of the starter motor the car key also functioned as a means of initiating ignition, as well as a means of securing access to the vehicle. In the mid-1990s central locking systems led to the development of the smart key, the mere presence of which enabled the driver to access and drive the car without placing it into the ignition. The car key was now electronic, and any mechanical engagement with car was no longer needed.

Recent developments have seen car keys evolve further, and the very idea of the car key is now as much about digital identity as it is about access and ignition.

Recent developments

UK-based security innovator Trustonic recently announced that it is providing a secure digital car key system to Volkswagen and Hyundai that is based on the provision of a secure communication path between a drivers mobile device and the cloud. This utilises the concept of a Trusted Execution Environment, which protects the part of the mobile device that executes the relevant program code from the threats from the remainder of the device; and a Trusted User Interface which enables applications to interact with the driver whilst providing complete isolation from the devices main operating system. This provides a secure cryptographic exchange between a drivers mobile device and the vehicle for the purpose of accessing the vehicle.

Less about access and more about the identity of the driver, the recently launched Volvo Care Key enables the owner of the car to set a speed limit on their car depending on who is driving it. This means that in the same way that parents have become used to setting user restrictions on phones and tablets, a car owner can set a reduced speed limit if lending their vehicle to a younger relative or a less experienced driver.

Direction

The development of these technologies have slightly different aims. The former is about authentication of the driver and the latter is about authorisation and the ability to place restrictions on the way a driver is able to control the vehicle.

As cars become more and more connected as part of the internet-of-things, this expanded functionality of the car key becomes more and more about the digital identity of the driver than about accessing the car or switching the engine on. The digital identity of the driver represents the interaction of the driver with the car and the wider network, whether that be the internet-of-things, the connected car infrastructure or even just the internal management systems which control the car whilst it is being driven. It seems likely that each of us will have a user profile linked to our car keys, that will allow the car to adapt automatically to our driving permissions, physical requirements and even our streaming playlists.

Cybersecurity

Digital identity management has been discussed as an improvement to cybersecurity and its application to drivers and their interaction with their vehicles is no different. The increased cybersecurity provided by the latest car key solutions will make cars more difficult to steal and more difficult to misuse as an entry point into a network of connected devices or as a physical tool to nefariously cause physical damage.

However, cybercriminals see opportunities and weaknesses even in the strongest systems and what seems ironclad today could become a weakness tomorrow. It is therefore imperative that innovators in the automotive sector stay ahead of cybercriminals by understanding the vulnerabilities in both their technologies and the wider transport infrastructure, as well as recognising the opportunities these provide for improving driver experience and security.

Moving forward

The management of a drivers digital identity is vitally important as cars become extensions of our connected environment rather than simply tools to move us from the proverbial A to B. Maintaining the cybersecurity is also vital as any vehicle can be a source of enormous problems in the hands of a cybercriminal. As personal data becomes intertwined with vehicle usage, it is also important that user privacy is respected, as indicated in the recently published guidelines from the European Data Protection Board, discussed previously. At the same time, the ability to identify a driver will remain essential for the purpose of law enforcement.

A trusted automotive infrastructure needs to meet all of these challenges if it is going to be fully accepted and adopted by the public. Embedding a car key inside a mobile device using cryptography is a very elegant solution to preventing unauthorised access to a vehicle, but the safety of the user and their data must remain a priority.

More here:
Ignition to identification - the 'car key' is evolving - Lexology

Quantum Cryptography Market 2020: Growing Demand, Business Opportunities, Developments, Trends, Top Regions, Types and Applications, Forecasts 2025 -…

The Quantum Cryptography Market report upholds the future market predictions related to Quantum Cryptography market size, revenue, production, Consumption, gross margin, and other substantial factors. It also examines the role of the prominent Quantum Cryptography market players involved in the industry including their corporate overview. While emphasizing the key driving factors for the Quantum Cryptography market, the report also offers a full study of the future trends and developments of the market.

Get sample copy of Quantum Cryptography Market report @ https://www.adroitmarketresearch.com/contacts/request-sample/958

Quantum Cryptography Market boons an in-depth synopsis of the competitive landscape of the market globally, thus helping establishments understand the primary threats and prospects that vendors in the market are dealt with. It also incorporates thorough business profiles of some of the prime vendors in the market. The report includes vast data relating to the recent discovery and technological expansions perceived in the market, wide-ranging with an examination of the impact of these intrusions on the markets future development.

Top Leading Key Players are:

ID Quantique, MagiQ Technologies, Infineon Technologies, QuintenssenceLabs, Crypta Labs, ISARA, Toshiba, Microsoft, IBM, HP, PQ Solutions, and Qubitekk.

Browse the complete report @ https://www.adroitmarketresearch.com/industry-reports/quantum-cryptography-market

This Quantum Cryptography market report provides description about the complete market analysis with inputs from industry experts. Furthermore, businesses can decide upon the strategies about the product, customer, key player, sales, promotion or marketing by acquiring a detailed analysis of competitive markets. The research and analysis performed in this Quantum Cryptography report assists clients to forecast investment in an emerging market, expansion of market share or success of a new product. A comprehensive analysis of the market structure along with the forecast of the various segments and sub-segments of the market have been delivered through this Quantum Cryptography market report.

Based on application, the market has been segmented into:

NA

This crucial research report on Global Quantum Cryptography Market is an in-depth and crucial extensive market presentation presented meticulously to derive optimum understanding on market developments as well as the growth factors, dynamics, in the form of growth drivers, restraints, threats, challenges and the like that have a thumping catalytic impact on onward growth trail of Quantum Cryptography market.

This research documentation built on the basis of in-depth market analysis is aiming at offering report readers with accurate, market specific synopsis of the industry, evaluating it across dynamics and touchpoint analysis, thus shedding ample light on various classifications, industry chain review, dynamic applications, besides harping largely on overall competitive scenario, including leading market players, their growth objectives, long and short term business goals, a thorough evaluation of their tactical business moves, winning business strategies as well as investment details that cohesively influence onward growth trail of the Quantum Cryptography market besides positioning themselves in an advantageous manner in global Quantum Cryptography market.

Global Quantum Cryptography Market Report Provides Comprehensive Analysis of Following:-Market segments and sub-segments Industry size & shares-Market trends and dynamics Market Drivers and Opportunities Supply and demand of world Quantum Cryptography industry Technological inventions in Quantum Cryptography trade-Marketing Channel Development Trend Global Quantum Cryptography industry Positioning Pricing and Brand Strategy Distributors/Traders List enclosed in Positioning Quantum Cryptography Market

For Any Query on the Quantum Cryptography Market: https://www.adroitmarketresearch.com/contacts/enquiry-before-buying/958

About Us :

Adroit Market Research is an India-based business analytics and consulting company. Our target audience is a wide range of corporations, manufacturing companies, product/technology development institutions and industry associations that require understanding of a markets size, key trends, participants and future outlook of an industry. We intend to become our clients knowledge partner and provide them with valuable market insights to help create opportunities that increase their revenues. We follow a code- Explore, Learn and Transform. At our core, we are curious people who love to identify and understand industry patterns, create an insightful study around our findings and churn out money-making roadmaps.

Contact Us :

Ryan JohnsonAccount Manager Global3131 McKinney Ave Ste 600, Dallas,TX 75204, U.S.APhone No.: USA: +1 972-362 -8199 / +91 9665341414

Link:
Quantum Cryptography Market 2020: Growing Demand, Business Opportunities, Developments, Trends, Top Regions, Types and Applications, Forecasts 2025 -...

Cryptocurrency And Blockchain Technology Market size Reap Excessive Revenues size COVID-19 2022 – Kentucky Journal 24

Overview:

Cryptocurrencyis a digital currency that utilizes cryptography techniques to make the transactions secure and to limit the creation of additional units of currency. Cryptocurrency is decentralized and there is no third-party/central body/governing body involved in producing new currency, verifying transactions, and protecting the currency supply. The blockchain acts as a ledger that shows the transaction activities between the peers. Cryptocurrency opts as a future revenue stream in the digital finance world. Furthermore, cryptocurrency is not bound by any rules or regulations of any specific government or exchange rates, interest rates, and country to country transaction fee, which makes international transactions faster. The prime drivers of the cryptocurrency market include proper security, authentication and ease of transactions. The Cryptocurrency and Blockchain technology allows the users to send exactly what they want without involvement of third party.Globally, more than 70% of the mobile phone users prefer transactions over their phones, which is one of the major drivers for the cryptocurrency market growth.

Request for Report Sample:https://www.trendsmarketresearch.com/report/sample/9796

Market Analysis:

The Worldwide Crypto-currency and Blockchain Technology Market is estimated to witness a CAGR of 35.2% during the forecast period 20162022. The crypto-currency market is analyzed based on two segments verticals and regions. The increasing online transaction, less transaction fees, easy and faster transaction, changing consumer and business landscape have led the demand for the market growth.

Regional Analysis:

The regions covered in the report are Americas, Europe, Asia Pacific and Middle East & Africa; along with the analysis of major countries in each region. The Americas is set to be the leading region for the cryptocurrency market growth followed by Europe. The Asia Pacific and MEA are set to be the emerging regions. India is set to be the most attractive destination and in Africa, the popularity and the usage of various cryptocurrencies are expected to increase in the coming years. The MEA market revenue is expected to reach $3.02 billion by 2022. The major countries covered in this report are the US, Canada, Argentina, the UK, Germany, Italy, France, Poland, China, Japan, Singapore, Vietnam, GCC Countries, Africa and Others.

Vertical Analysis:

Day-to-day, the consumers demands are changing and they are looking for the best and less time-consuming services to make their life easier. With these changes, the industry players have started moving towards the online business services and are adopting mobile based technology in their business units to reach their customer demands. In the current market scenario, the rise of online transactions has led the demand for the cryptocurrency and blockchain technology market. The major verticals covered are BFSI, retail, media & entertainment, gaming industry, healthcare, travel & tourism, transportation & logistics and education. Globally, the industry players are showing interest towards the blockchain and crypto-currency acceptance and making a partnership and discussing with value chain players in order to understand the benefits of blockchain technology. Additionally, few of the verticals have already started the acceptance of crypto-currencies (e.g. Bitcoin) as a payment option. Especially, the retail industry is set to be the leading vertical after BFSI for the crypto-currencies acceptance and the retail market revenue is expected to reach $10,447.2 million by 2022.

Key Players:

Zebpay, Coinsecure, Coinbase, Bitstamp Ltd., Litecoin, Poloniex Inc., Bitfury Group Limited, Unocoin, Ripple, Bitfinex, Global Area Holding Inc., BTL Group Ltd., Digital Limited, IBM Corp., Microsoft Corp. and other predominate and niche players.

Competitive Analysis:

In the current market scenario, the crypto-currency and blockchain technology market is at a nascent stage. But, a lot of new players are entering the market as it holds huge business opportunities. Especially, new start-ups are coming with new products/services in the market and they are expecting to see a double-digit growth in the upcoming years. In this space, venture funding in this market is expected to grow and collaborations, merger & acquisition activities are expected to continue.

Benefits:

The report provides complete details about the usage and adoption rate of crypto-currency and blockchain technology in various industry verticals and regions. With that, key stakeholders can know about the major trends, drivers, investments, vertical players initiatives, government initiatives towards the crypto-currency market adoption in the upcoming years. In other end, the report provides details about the major challenges that are going to impact on the market growth. Furthermore, the report gives the complete details about the key business opportunities to key stakeholders to expand their business and capture the revenue in the specific verticals. In addition, each vertical provides the key reason for the crypto-currency adoption, key opportunities, and government bodies information. This will help the key stakeholders to analyze before investing or expanding the business in this market.

More Info of ImpactCovid19@https://www.trendsmarketresearch.com/report/covid-19-analysis/9796

Read more here:
Cryptocurrency And Blockchain Technology Market size Reap Excessive Revenues size COVID-19 2022 - Kentucky Journal 24

The dual PhD problem of todays startups – TechCrunch

One of the upsides of this job is that you get to see everything going on out there in the startup world. One of the downsides of this job is seeing just how many ideas out there arent all that original.

Every week in my inbox, there is another no-code startup. Another fintech play for payments and credit cards and personal finance. Another remote work or online events startup. Another cannabis startup, another cryptocurrency, another analytics tool for some other function in the workplace (janitor productivity as a service!)

It honestly feels at times like we are stuck: its the same rehashes of old software, but theoretically better (yes it is a note-taking app, but it runs on Kubernetes!). In fact, that feeling of repetitiveness and the glacial pace of true innovation isnt just in my head or maybe yours: its also been identified by scientists and researchers and remains a key area of debate in the economics of innovation field.

Of course, there are a bunch of new horizons out there. Synthetic biology and personalized medicine. Satellites and spacetech. Cryptocurrencies and finance. Autonomous vehicles and urbantech. Open semiconductor platforms and the future of silicon. In fact, there are so many open vistas that it surprises me that every entrepreneur and investor isnt running to claim these new territories ripe for creativity and ultimately, profit.

Its a quandary at least until you begin to understand the entrance requirements for these frontier fields.

Weve gone through the generation of startups you can do as a dropout from high school or college, hacking a social network out of PHP scripts or assembling a computer out of parts at a local homebrew club. Weve also gone through the startups that required a PhD in electrical engineering, or biology, or any of the other science and engineering fields that are the wellspring for innovation.

Now, we are approaching a new barrier ideas that require not just extreme depth in one field, but depth in two or sometimes even more fields simultaneously.

Take synethtic biology and the future of pharmaceuticals. There is a popular and now well-funded thesis on crossing machine learning and biology/medicine together to create the next generation of pharma and clinical treatment. The datasets are there, the patients are ready to buy, and the old ways of discovering new candidates to treat diseases look positively ancient against a more deliberate and automated approach afforded by modern algorithms.

Moving the needle even slightly here though requires enormous knowledge of two very hard and disparate fields. AI and bio are domains that get extremely complex extremely fast, and also where researchers and founders quickly reach the frontiers of knowledge. These arent solved fields by any stretch of the imagination, and it isnt uncommon to quickly reach a No one really knows answer to a question.

Its what you might call the dual PhD problem of todays startups. To be clear, this isnt about credentials its not about the sheepskin at the end of the grad program. Its about the knowledge represented by that diploma and how you need two whole rounds of it in order to synthesize the next generation of solutions.

Now, before you start yelling, lets talk about teams. There is a reasonable argument that teams with the right specializations can come together and solve these problems. You dont need a single founder with experience in bio and AI or cryptography and economics or computer vision and mobility hardware you just need to bring the right talents together in the room to make innovation happen.

There is certainty truth in that, and indeed, thats the impetus for many of the companies we are seeing today in these fields.

But that also feels like precisely the block today for pushing innovation even farther forward. Todays startups have a biologist talking about wet labs on one side and an AI specialist waxing on about GPT-3 on the other, or a cryptography expert negotiating their point of view with a securities attorney. There is constant and serious translation required between these domains, translation that (I would argue mostly) prevents the fusion these fields need in order for new startups to be built.

Perhaps there is no greater and more obvious example of these domain requirements than the response to COVID-19. Epidemiology and public health are quite possibly the two most difficult fields out there in terms of the number of specializations required simultaneously to do them well. You need to know medicine and human physiology to understand the etiology of diseases, have the social science background to understand how humans interact individually and in groups, understand the economic and public policy implications of different prophylactics to comprehend the trade-offs involved, and finally, master the statistical training to read, understand, and build correct data models.

All this, and all at the same time. Is it any wonder that so little consensus emerges when so few people have all the requisite skills in their head?

The reason that teams run into resistance is that each specialist needs to understand the constraints that all the other specialties have, while also having enough nuance to understand what is really a barrier and what is perhaps a rule that can be broken. You cant have a non-technical PM manage an AI product (Cant we just use TensorFlow for that?) anymore than you can have these companies built by incompatible experts, always trying to explain to the other why an idea isnt fathomable.

We arent used to this sort of cognitive challenge. Software is so democratized today, we forget just how blisteringly difficult almost all other facets of human endeavor are to even start. A middle schooler can build and deploy a web service scalable to millions of people with some lines of code (learned from easily and widely accessible resources on the internet) and some basic cloud infrastructure tools that are designed to onboard new users expeditiously.

Try that with rocketry. Or with pharma. Or with autonomous vehicles. Or any of the interesting new frontiers with green fields that are just sitting there waiting for the taking.

So to propel the progress of the world further, we need to fuse more fields together and compress the requisite knowledge faster and earlier for more people. We cant wait until 25 years of school is complete and people graduate haggard at 40 before they can take a shot at some of these fascinating intersections. We need to build slipstreams to these lacuna where innovation hasnt yet reached.

Otherwise, we are going to see the same pattern in the future that we see today: the thirtieth app for X with no barrier to entry whatsoever. Thats not where progress comes.

More here:
The dual PhD problem of todays startups - TechCrunch