A Second Act in Cybersecurity | UDaily – UDaily

Article by Julie Stewart Photo by Kathy F. Atkinson February 07, 2020

Patricia Lehman, a resident of Wilmington, Delaware, spent decades as a freelance writer. She wrote award-winning books and magazine articles about Boston terriers, miniature pinschers and other tiny domestic dogs.

Today, she spends a little less time thinking about humans best friend instead focusing on how to protect our infrastructure from malicious enemies. Lehman earned a masters degree in cybersecurity from the University of Delaware in 2019 and continues to hone her skills.

In the 2019 U.S. Cyber FastTrack competition, which tests the skills of high-aptitude students nationwide, Lehman was selected for a full scholarship ($22,000 value) to the Undergraduate Certificate program in Applied CyberSecurity accredited by the Middle States Commission on Higher Education and operated by the SANS Technology Institute (SANS.edu). Lehman was one of 100 students representing 63 different schools across 28 states to be selected out of more than 13,000 candidates. The courses began in December 2019.

It takes a lot of guts to switch careers, but if youre looking for an upgrade, cybersecurity is a smart choice. The cybersecurity workforce needs to grow by 62 percent to meet the demands of businesses in the United States, according to a report by one of the worlds leading cybersecurity professional organizations.

As a longtime writer, Lehman closely follows the news, and she started to grow concerned about data breaches and other news related to hacking and security. She decided to study cybersecurity because she wanted to make a difference.

While the transition from author to cybersecurity expert might seem like a 180-degree turn, Lehman has found that the combination of creativity and logic needed for success in writing also helps her outsmart adversaries.

Theres been a lot of writing in the coursework, and I think being able to write well has helped a lot, said Lehman. I got interested in computers because I was using them in my writing, and I wanted to find out more about how they worked.

Lehman started years ago with a few computing courses through UDs Professional and Continuing Studies program. Later, she enrolled in the computer network engineering technology program at Delaware Technical Community College, where she earned an associates degree in 2007. In 2015, she received a bachelors degree in computer and network security from Wilmington University. Then in 2017, she enrolled in UDs masters degree in cybersecurity program, which can be completed on campus or online. She took courses in networking, cryptography, programming and more. Lehman earned a 4.0 GPA in all three degrees, and at UD, she was accepted into the prestigious Phi Kappa Phi Honor Society.

Each course built on the previous ones and made me more and more interested in the field, she said. And the more I learned, the more I realized how much I didnt know. Its a field where you never stop learning.

Andy Novocin, associate professor of electrical and computer engineering, met Lehman when she took his crash course in coding. Novocin was impressed by her potential and her persistence. No matter how challenging the project, Lehman kept at it. Then, Lehman took Novocins crypto class.

Again, she was very dedicated and her persistence would get her better results than some of the younger students who had less self-mastery, said Novocin. That experience got her into our Capture-the-Flag cybersecurity competition team where she was the teams secret weapon working quietly in the background every competition. I suspect that she logged 2400-plus hours in that calendar year, and that's when she won the cyber scholarship.

Lehman also took some electrical engineering courses on smart grids, microgrids, and vehicle-to-grid technology, all of which piqued her interest enough that she plans to pursue a second masters degree in electrical and computer engineering at UD.

I think protecting the infrastructure of the power companies is going to be critical, so Im trying to merge those together cybersecurity and the power supply, she said.

Lehman plans to pursue a career in cybersecurity in government or the private sector.

Excerpt from:
A Second Act in Cybersecurity | UDaily - UDaily

An algorithm that can spot cause and effect could supercharge medical AI – MIT Technology Review

Understanding how the world works means understanding cause and effect. Why are things like this? What will happen if I do that? Correlations tell you that certain phenomena go together. Only causal links tell you why a system is as it is or how it might evolve. Correlation is not causation, as the slogan goes.

This is a big problem for medicine, where a vast number of variables can be interlinked. Diagnosing diseases depends on knowing which conditions cause what symptoms; treating diseases depends on knowing the effects of different drugs or lifestyle changes. Untangling such knotty questions is typically done via rigorous observational studies or randomized controlled trials.

These create a wealth of medical data, but it is spread across different data sets, which leaves many questions unanswered. If one data set shows a correlation between obesity and heart disease and another shows a correlation between low vitamin D and obesity, whats the link between low vitamin D and heart disease? Finding out typically requires another clinical trial.

Sign up for The Algorithm artificial intelligence, demystified

How do we make better use of this piecemeal information? Computers are great at spotting patternsbut thats just correlation. In the last few years, computer scientists have invented a handful of algorithms that can identify causal relations within single data sets. But focusing on single data sets is like looking through keyholes. Whats needed is a way to take in the whole view.

Researchers Anish Dhir and Ciarn Lee at Babylon Health, a UK-based digital health-care provider, have come up with a technique for finding causal relations across different data sets. This could allow large databases of untapped medical data to be mined for causes and effectsand possibly the discovery of new causal links.

Babylon Health offers a chatbot-based app that asks you to list your symptoms before responding with a tentative diagnosis and advice on treatment. The aim is to filter out people who do not actually need to see a doctor. In principle, the service saves both patients' and doctors' time, allowing overworked health professionals to help those most in need.

But the app has come under scrutiny. Doctors have warned that it sometimes misses signs of serious illness, for example. Several other companiesincluding Ada and Your.MDalso offer diagnosis-by-chatbot, but Babylon Health has singled itself out for criticism in part because of its overblown claims. For example, in 2018 the company announced that its AI could diagnose medical conditions better than a human doctor. A study in The Lancet a few months later concluded not only that was this untrue but that it might perform significantly worse.

Still, Dhir and Lees new work on causal links deserves to be taken seriously. It has been peer-reviewed and will appear at the respected Association for Advancement of Artificial Intelligence conference in New York this week. In principle, the technique could supercharge the service Babylon Health offers.

The ability to identify causal relations in medical data would improve the diagnostic AI behind its chatbot. Justifying responses by pointing to underlying cause and effectrather than hidden correlationsshould also give people more confidence in the app, says Lee, who also works on machine learning and quantum computing at University College London. Health-care is a high risk domain. We don't want to deploy a black box, he says.

The pair soon realized theyd have to start from scratch. When we looked it turned out that no one had really solved this problem, says Lee. The challenge is to fuse together multiple data sets that share common variables and extract as much information about cause and effect from the combined data as possible.

The method doesnt use machine learning but is instead inspired by quantum cryptography, in which a mathematical formula can be used to prove that nobody is eavesdropping on your conversation. Dhir and Lee treat data sets as conversations and variables that influence those data sets in a causal way as eavesdroppers. Using the math of quantum cryptography, their algorithm can identify whether or not these effects exist.

They tested the system on datasets in which the causal relations were already known, such as two sets measuring the size and texture of breast tumors. The AI correctly found that size and texture did not have a causal link with each other but that both were determined by whether the tumor was malignant or benign.

If the raw data is available, the pair claim, their algorithm can identify causal relations between variables as well as a clinical study could. Instead of looking for causes by running a fresh randomized controlled trial, the software may be able do this using existing data. Lee admits that people will need convincing and hopes that the algorithm will at least be used initially to complement trials, perhaps by highlighting potential causal links for study. Yet he notes that official bodies such as the US Food and Drug Administration already approve new drugs on the basis of trials that show correlation only. The way in which drugs go through randomized controlled trials is less convincing than using these algorithms, he says.

View original post here:
An algorithm that can spot cause and effect could supercharge medical AI - MIT Technology Review

Quantum Cryptography Market 2020 | Research, Opportunities, Emerging Trends, Competitive Strategies and Forecasts 2020-2026 – Instant Tech News

New Jersey, United States The report is a comprehensive research study of the global Quantum Cryptography market, taking into account growth factors, recent trends, developments, opportunities and the competitive landscape. Market analysts and researchers performed an in-depth analysis of the Quantum Cryptography global market using research methodologies such as PESTLE and Porters Five Forces analysis. They provided precise and reliable data on the market and useful recommendations in order to help the actors to better understand the global scenario of the present and future market. The report includes an in-depth study of potential segments, including product type, application and end user, as well as their contribution to the overall size of the market.

Global Quantum Cryptography Market was valued at USD 89.75 Million in 2018 and is expected to witness a growth of 35.78% from 2019-2026 and reach USD 1,035.33 Million by 2026.

This report covers a comprehensive study of the data affecting the Quantum Cryptography market with regard to manufacturers, suppliers, market players and customers. The report also includes an overview of technology applications and strategies used by market leaders. In addition to data compiled by type, application and region, the study includes personalized research to examine the intricacies of the global Quantum Cryptography market.

Key players in global Quantum Cryptography market include:

Quintessencelabs, Crypta Labs, Qasky, Qubitekk, Isara and Post-Quantum

Get Complete SWOT Analysis Download Sample Copy @ https://www.verifiedmarketresearch.com/download-sample/?rid=6854&utm_source=ITN&utm_medium=001

Global Quantum Cryptography Market: Research Methodology

The research methodology used by analysts play an integral role in how the publication has been prepared. Analysts have used primary and secondary research methodologies to make a comprehensive analysis. For accurate and precise analysis of the global Quantum Cryptography s market, analysts have a bottom-up and top-down approaches.The main sources include interviews, surveys and observations of seasoned analysts, and secondary sources cover reputable paid sources, trade journals and databases of industry organizations. Other research methods include SWOT analysis with In-Depth Market Analysis.

Drivers & Constraints of Quantum Cryptography Market :

Quantum Cryptography market competitiveness is the result of the expansion technique employed by market leaders. market dynamics and trends play an important role in this growth market. This report focuses on the value chain, the trend of volume and price factors that influence the market. The growth of world population and the constant evolution of consumer demand is the main cause of the market dynamics. In addition, market restrictions and limits and strategies used by companies to overcome these limits are included in market research.

Global Quantum Cryptography Market : Regional Analysis

This part of the report includes detailed information on the market in various regions. Each region offers different scope for markets because every region has a different government policies and other factors. The regions included in this report are North America, Europe, Asia Pacific, and the Middle East and Africa. Information about the different areas helps the reader to understand better the global market.

Table of Content

1 Introduction of Quantum Cryptography Market

1.1 Overview of the Market 1.2 Scope of Report 1.3 Assumptions

2 Executive Summary

3 Research Methodology of Verified Market Research

3.1 Data Mining 3.2 Validation 3.3 Primary Interviews 3.4 List of Data Sources

4 Quantum Cryptography Market Outlook

4.1 Overview 4.2 Market Dynamics 4.2.1 Drivers 4.2.2 Restraints 4.2.3 Opportunities 4.3 Porters Five Force Model 4.4 Value Chain Analysis

5 Quantum Cryptography Market , By Deployment Model

5.1 Overview

6 Quantum Cryptography Market , By Solution

6.1 Overview

7 Quantum Cryptography Market , By Vertical

7.1 Overview

8 Quantum Cryptography Market , By Geography

8.1 Overview 8.2 North America 8.2.1 U.S. 8.2.2 Canada 8.2.3 Mexico 8.3 Europe 8.3.1 Germany 8.3.2 U.K. 8.3.3 France 8.3.4 Rest of Europe 8.4 Asia Pacific 8.4.1 China 8.4.2 Japan 8.4.3 India 8.4.4 Rest of Asia Pacific 8.5 Rest of the World 8.5.1 Latin America 8.5.2 Middle East

9 Quantum Cryptography Market Competitive Landscape

9.1 Overview 9.2 Company Market Ranking 9.3 Key Development Strategies

10 Company Profiles

10.1.1 Overview 10.1.2 Financial Performance 10.1.3 Product Outlook 10.1.4 Key Developments

11 Appendix

11.1 Related Research

Check Complete Report For Deep SWOT Analysis Updates @ https://www.verifiedmarketresearch.com/product/global-quantum-cryptography-market-size-and-forecast-to-2026/?utm_source=ITN&utm_medium=001

Our Report offers:

About Us

Verified market research partners with clients to provide insight into strategic and growth analytics; data that help achieve business goals and targets. Our core values include trust, integrity, and authenticity for our clients.

Analysts with high expertise in data gathering and governance utilize industry techniques to collate and examine data at all stages. Our analysts are trained to combine modern data collection techniques, superior research methodology, subject expertise and years of collective experience to produce informative and accurate research reports.

Contact Us:

Mr. Edwyne Fernandes Call: +1 (650) 781 4080 Email: [emailprotected]

Quantum Cryptography Market Size, Quantum Cryptography Market Analysis, Quantum Cryptography Market Growth, Verified Market Research

Visit link:
Quantum Cryptography Market 2020 | Research, Opportunities, Emerging Trends, Competitive Strategies and Forecasts 2020-2026 - Instant Tech News

China’s new law on Cryptography, much more than the law? – BTC Wires

Jan 30, 2020 20:38 UTC

| Updated:

Jan 30, 2020 at 20:38 UTC

By Rajat Gaur

The crypto space in China is on a very fast trail to make things regular with the countrys economy. The countrys plan to strategize and monetize e-yuan on the primary hitlist, the laws that govern the same were also strategized and released.

The laws that came into effect at the start of this new year will be the cornerstone on which the crypto space of china will be built upon.

The Chinese released these laws to mainly implement the cryptography process at a much larger scale in their economy. This will regularise the blockchain space much more effectively.

What do the Chinese have in mind?

The Chinese really want to get the grasp over the crypto-space for which they will have to definitely have to improve their hold over cryptography.

There are many aspects on which the law stands for and of that, the key parameters include regulation of the crypto-currency, increase the security featurettes that will enable safe transactions and withdrawals and also promote the research into the field of cryptography.

One of the biggest points that are strict to be followed according to the law is that when one transfers confidential documents or information, they must do the same using the cryptography methodology to ensure safety and security.

The Chinese have also other impending laws that will soon be added to the cause leading to more definite and accurate decisions while it comes to governing digital assets with cryptography. The Chinese are also planning to enable the implementation of the law in private and commercial trade as well. But there are few bottlenecks which they will have to clear. One of the biggest concerns that worry the government is that they will have to provide security as well as safeguard the privacy of all those who are trading using cryptocurrency but in the meantime also identify the users to distinguish terrorists from the common people.

The Road map;

The Chinese laws on cryptography is not a one-night wonder show, but a meticulous effort of many fin-tech experts to put the ideal practice of law in the crypto space in place.

The Chinese president Xi Jinping is eagerly promoting the growth of the technology and is wanting to implement more of the technology usage into the financial stream of the company.

However, if China succeed in keeping the laws intact and implementing them accurately, it could slowly pave the way for them to bag the number one spot in the crypto space in the world.

See more here:
China's new law on Cryptography, much more than the law? - BTC Wires

Are Crypto Payments Useful as a Form of Payment in Casinos? – CryptoNewsZ

Most online casinos accept a number of different payment methods. Pretty much every casino accepts Visa and Mastercard, while some other options that are widely accepted include e-wallets PayPal, Neteller and Skrill, along with prepaid cards such as Paysafecard. Generally speaking, the more payment methods a casino accepts, the more players it can attract. After all, theres no point signing up to a casino if it doesnt accept the payment method youre currently using.

All of the payment methods mentioned above are used to transfer fiat currencies from one account to another. Fiat currencies are traditional currencies, such as Dollar, Euro, and Pound, that are regulated by governments or banks.

Many online casinos have started accepting a new type of currency: cryptocurrency. This is an entirely digital currency thats not regulated by any government or bank and uses cryptography to ensure that transactions are fully protected at all times. The first cryptocurrency was Bitcoin, which was launched in 2009; since then, many others have come into use, including Ethereum, Litecoin, Ripple, and EOS.IO.

Lots of online casinos accept cryptocurrencies. Some only let you use Bitcoin, while others accept Bitcoin and a small number of other cryptocurrencies. There are even a growing number of casinos that dont accept any fiat currencies at all and only allow gambling with cryptocurrencies. These so-called crypto casinos typically offer Bitcoin and quite a few other major cryptocurrencies, as well as some minor ones. Of course, you will still find no wager free spins promotions on sites like 777 Casino offers page.

Cryptocurrencies offer online gamblers numerous benefits. Theyre very safe and secure, plus they can be used without you having to provide the casino with any personal or banking details. Payments are fast (especially withdrawals) and anonymous. For many players, cryptocurrencies are seen as the most convenient option for making online payments.

As previously mentioned, the more payment methods a casino offers, the more players it can attract. Ideally, all casinos should offer at least some cryptocurrencies as payment methods. The reason for this is that more and more people prefer to use cryptocurrencies over fiat currencies for online gambling. If cryptocurrencies are what people would rather use, it makes sense for casino operators to accept these currencies and let players use them at the casino to gamble online.

If a casino continues not to accept cryptocurrencies, its missing out. Players who only use cryptocurrencies wont bother with this casino and will instead look for one where they can gamble using their preferred payment method. If a casino decides to start accepting cryptocurrencies, even if its just Bitcoin, its not going to miss out as much. There will always be those who prefer fiat currencies, but by not accepting cryptocurrencies, casinos are missing out on a growing market that could become quite large someday. Theres every chance that cryptocurrencies could become just as widely used as fiat currencies for online payments, especially since there are so many of them in fact, there are well over a thousand of them.

To conclude, cryptocurrencies are a popular way of carrying out online transactions because of the safety and anonymity they offer. Many people prefer using them for online gambling. As many online casinos as possible should offer cryptocurrencies as payment options for two reasons: one, so that they can attract players and dont miss out on their customer; two, so that those who use cryptocurrencies exclusively have just as many places to gamble online as those who use fiat currencies do. Cryptocurrencies arent going anywhere, so it really is in casinos best interests to offer this new type of currency as a payment method.

View original post here:
Are Crypto Payments Useful as a Form of Payment in Casinos? - CryptoNewsZ

How I Got the Latest Clue to a 30-Year-Old Puzzle at the C.I.A. – The New York Times

Over time, Mr. Sanborn has tried to provide clues that could move people along, since he has been hounded by people who believe, mistakenly, that they have cracked the last passage, known as K4. He was getting 200 inquiries a week, he told me, which became overwhelming and some became threatening and even, believe it or not, racist. For $50, people could submit a proposed solution and get an answer, which made things much more manageable, he said.

He provided a clue to me in 2010 that we published in The New York Times. And again in 2014. And now.

He called me in late 2019 to suggest he might be about to release another clue, to move things along. At a recent gathering of Kryptos fans, he had said he wanted me to take it on. I said yes, of course.

I love Mr. Sanborns work. When I stumbled upon one of his unmistakable pieces on the campus of the University of Iowa, a metal cylinder with punched-through letters in many languages that is lit from within at night, casting text on the courtyard and walls around it, it seemed so instantly familiar that I felt as if I were encountering an old friend in a strange town.

But Kryptos, his decades-old piece, has become something of a millstone for him, he said. My cryptography interest left me 25 years ago, he told me as I was finishing the latest article. My art went in different directions. Thats an understatement. While he has produced other cryptographic pieces, he has also produced astonishing installations that straddle art and science, and, most recently, Without Provenance: The Making of Contemporary Antiquity, a collection of objects that explores the nature of looted antiquities and forgery in unsettling ways.

Perhaps the most interesting part of my call from Mr. Sanborn is his decision to arrange an auction to sell the solution to the mystery, whether after his death or before. If the amount of money raised is substantial and this, he admits, is unknown it will go to support climate science. He lives on an island in the Chesapeake Bay, so as he told me, it was a no-brainer. Coincidentally, this put the Kryptos news within my current beat.

As I worked on the story about the final clue, my editor, Hannah Fairfield, liked the graphics possibilities of portraying the coded and decoded passages; Jonathan Corum, the amazing science graphics editor, agreed to do his magic. And you can see the result.

Much of the time, journalism is jack rabbit quick, with the need to leap when news breaks.

Sometimes its slow, and things can percolate. And sometimes it even helps us solve a puzzle.

Follow the @ReaderCenter on Twitter for more coverage highlighting your perspectives and experiences and for insight into how we work.

Link:
How I Got the Latest Clue to a 30-Year-Old Puzzle at the C.I.A. - The New York Times

Rules and Regulations of Crypto Trading in China – Bitcoin & Crypto Guide – Altcoin Buzz

While people are slowly recognizing cryptocurrencys value, China is still hesitating.Accordingly, the country has taken some strong steps against cryptocurrencies in the past few years. Though the intent is not always wrong, the implementation remains questionable. We take a deeper look.

So whats crypto trading in China really like? Lets begin the examination by recalling the circumstances of the ICO ban.

On the 4th of September 2017, seven Chinese governmental agencies jointly issued a notice regarding the Prevention of Risks of Token Offering and Financing. These agencies include the Peoples Bank of China, the Central Cybersecurity and Information Technology Lead Group of the Communist Party of China, the Ministry of Industry and Information Technology. As well as the State Administration for Industry and Commerce, China Banking Regulatory Commission, China Security Regulatory Commission, and China Insurance Regulatory Commission.

To remind, the notice banned all ICOs in China. It ordered the organizations and individuals who had previously completed an ICO to return token assets to investors and thus protect investor rights.

On September 15, 2017, the Beijing Internet Finance Risk Working Group summoned senior executives of cryptocurrency trading platforms in Beijing. Discussions revolved around two major topics:

As a result, the platforms shut down their trading business in China. And such behemoth exchanges like Binance moved to Malta.

In February 2018, the South China Morning Post reported that China was planning to block websites related to cryptocurrency trading and ICOs, including foreign platforms. This way the countryaimed at completely removing cryptocurrency trading. However, this move was not implemented.

The country also imposed restrictions on cryptocurrency trading platforms. According to the Government rule,

Recently, the National Development Reform Commission, Chinas top economic planning body, proposed banning all cryptocurrency miners within its borders.

According to the Leading Group of Internet Financial Risks Remediation the countrys internet finance regulator which initiated the clampdown on bitcoin said:

Yet, in November it seemed like the country took a U-Turn. After all, the group itself doesnt control national energy usage but it is an influential political vehicle thats led by the deputy governor of the Peoples Bank of China (PBC), Pan Gongsheng.

Thus, the community should prepare for the worse.

Recently in the 14th Session of the 13th National Peoples Congress Standing Committee voted to pass the crypto law, which will be implemented from January 1, 2020.

The Cryptography Law aims to

According to the law, passwords will now be classified into the following categories:

Citizens, legal persons, and other organizations will use these passwords to protect networks and other related information.

A total of 5 chapters and 44 articles were published stating details related to usage requirements, security management system, and different safeguard systems and measures to strengthen the passwords which fall in these categories.

The Cryptography Law also states that it will strengthen cryptographic talents. An individual with outstanding contributions will receive rewards and appreciations.

China has not yet passed any legislation regulating cryptocurrencies. At the same time, the regulators are not recognizing them asa means of payment. Also, the Chinese banking system is not accepting any existing cryptocurrencies or providing relevant services.

That said, it is not illegal to hold Bitcoin and other cryptocurrencies, or even to buy or sell them in China. The Chinese government also encourages the development and application of blockchain technology. However, the government has made it clear that blockchain technology must serve the real economy.

Besides, the Peoples Bank of China is about to launch its own digital currency.

On a different note, it is quite surprising that in spite of Chinas tough stance, many promising crypto projects are from this country. Perhaps, in the long run, China will be able to balance regulation with innovation. While only time will tell what will happen to Bitcoin, its vital that we get the foundations right.

Here are some interesting reads from our database

Whats Going on in China? Changpeng Zhao Knows

China Will Have a Public Blockchain Says Qtum Growth Head

China: Yes to Blockchain, Still No to Crypto

Chinas Cryptography Law is About to Take Effect

China is Even Closer to Launching its Own Cryptocurrency

China Bans Crypto. Again

Source

Xinhuanet, Dffyw,loc.gov

Go here to see the original:
Rules and Regulations of Crypto Trading in China - Bitcoin & Crypto Guide - Altcoin Buzz

Hopkins professor wins big on poker class bet – The Hub at Johns Hopkins

ByDoug Donovan

"All in" is not just a phrase Avi Rubin throws around during poker games. It's a way of life.

Whether it's photography, boating, or his specialty field of applied cryptography, the Johns Hopkins computer science professor "never does anything halfway," says his wife, Ann.

Rubin's poker prowess outside the classroom has been well documented over the past 15 years since his younger brother, Yaacov, a senior finance official at Hopkins, introduced him to it.

But during January's Intersession, the 52-year-old professor had the opportunity to bring his passion into the classroom by teaching "Introduction to the Theory and Practice of Poker." His commitment to the course was evident: he had trophies made for various competitions he organized, he bought a domain name for the classhopkinspokercourse.com, which houses all of his filmed lectures and course materialshe set up a students-only PokerStars.com page, and he hosted a tournament at his house.

"It was like a dream come true for him," his wife says.

Image caption: Avi Rubin (right) hosted a final tournament for 52 students at his Baltimore County home.

Image credit: Will Kirk / Johns Hopkins University

Rubin wasn't the only one excited about the course, which did not involve gambling real money. Nearly 250 students registered for the class, including his daughter Elana, a junior Writing Seminars major. That made it the most popular Intersession course by far, representing 10% of the nearly 2,500 students who signed up for January classes.

"It's been amazing," Rubin says.

The poker professor was not so optimistic last year when he first started the process of getting the class approved. When two departments declined to sponsor the course, Rubin did it himself as technical director of the JHU Information Security Institute.

"I've been thinking about it and planning it in the back of my mind for years," says Rubin, who is also director of the Health and Medical Security Lab at Hopkins and a computer security consultant.

He spent months devising 783 PowerPoint slides, but could only fit 491 into the two-week course. Over the holiday break in December, with about a week left before the course began, Rubin tweaked the lectures on his laptop while on a cruise to Mexico with his wife and three children.

Image credit: Will Kirk / Johns Hopkins University

"I wanted the students to get an appreciation for the depth of the rigor that goes into poker," he said. "There is a lot of math and science to it. It's not just luck. It's a game of skill."

He hosted a final tournament for 52 students, most of whom earned their seats for performing well in the class' PokerStars.com tournaments. Hosting that many students on a Thursday night for pizza was no problem for Rubin: his Baltimore County house was built with a 950-square-foot poker room that he uses for monthly games with friends. It features three flat screen televisions mounted on the walls and five burgundy poker tables positioned across a gleaming mahogany floor.

Rubin paid for gift cards and glass trophies for the winners of various competitions, including a "professor bounty chip" for the student who could knock him out of his own tournament.

That's where Amber Hamelin, a 20-year-old sophomore from Pickerington, Ohio, comes in. Hamelin got the rare opportunity most students would covetor dread: a chance to best her professor at his expertise.

Image caption: Sophomore Amber Hamelin knocked Rubin out of his own tournament, winning his "bounty" chip for her win.

Image credit: Will Kirk / Johns Hopkins University

While Hamelin had played poker before in high school, Rubin's course made it clear to her that she had no idea what she was doing.

But that didn't stop her from earning her way into the live tournament by solving a poker riddle before anyone elsea riddle that even Rubin wasn't able to solve when he first heard it.

That should have been a warning when he came face to face with Hamelin as a dozen students and Rubin's wife and three children crammed around the table to watch if she could beat the professor. With a dominant handa pair of queensRubin went all in. If he lost, he was out and Hamelin would win the professor bounty chip.

"I told myself that if I have a chance to go head to head with Professor Rubin to knock him out that I was going to take it no matter how bad my hand," said Hamelin, who studies applied math and statistics.

True to her word, Hamelin called with terrible cards: an eight of hearts and a nine of clubs.

But then she hit a winning five-card flush, giving Rubin what's called a "bad beat."

His goal was to offer an exhaustive curriculum that aimed "to take students from novices who may know nothing about poker to above average players, in two weeks," according to the course description. The class delivered on that promise for senior Andrew King, a physics and applied math major who won the live tournament.

"I never played a hand of Texas Hold 'Em poker before," said King, 21, of Towson, Maryland. "It's so random that at a certain point you can't really think about winning until you're the top three."

Shehryar Haris, 22, of Dubai, learned a similar lesson about luck's big swings. The senior international studies major earned a trophy by winning one of the class's two online poker tournaments. But he was the first player knocked out of the live tournament.

He was amazed at how much math and statistics went into winning poker. "It taught me how to do math on the fly," Haris said.

In addition to a guest lecture from Maryland poker great Steve Dannenmann, students learned just as much math as Machiavellian maneuvers. Lectures focused on calculating odds, how to "exploit passive players," and "deception."

Even before his class, however, Rubin was instructing students interested in poker when a group started the Johns Hopkins Poker Club last spring. The group meets on Wednesday nights at Levering Hall and, like Rubin's class, uses only fake money.

Siddharth Arun, president of the Hopkins Chess Club, said he took Rubin's course to learn about poker's psychological elements and to learn how to make the best decisions with limited information.

"A lot of the game revolves around psychological advantage and how well you can control your mental acumen during the game," said the senior biomedical engineering major. "Understanding strategy is helpful for decision making and having a logical train of thought. As an engineer that's how you break down problems."

Excerpt from:
Hopkins professor wins big on poker class bet - The Hub at Johns Hopkins

PNBs Verify App integrates Unikens award winning REL-ID technology for indefectible online transactions – Yahoo India News

New Delhi, February 03, 2020: Punjab National Bank recently partnered with Uniken to integrate its award-winning REL ID platform for their PNB Verify app. This integration will help PNB ensure a flawless and error-free environment for all transactions made on the app by the users, thereby eliminating the risk of all possible cyber threats. Uniken has created a niche for itself and has been a preferred choice when it comes to cyber security, especially in the finance sector owing to its zero fraud record till date. Uniken has been working with other major national banks by offering its unique REL-ID technology. Unikens long-term successful association with partners is a testimony to their ability to implement, sustain and support large deployments with best outcomes.

PNB Verify application by Punjab National Bank provides additional security to authenticate financial and certain non-financial transactions initiated through Internet Banking channel or through Debit Card (e-commerce). Customer shall be able to verify (Accept or Reject) Internet Banking or Card transactions through the PNB Verify app rather than entering One Time Password received on mobile.

Speaking on the partnership, Bimal Gandhi, CEO, Uniken said Every new partnership is a testimony to our unique and state-of-the-art solution we provide through our REL-ID platform. But partnering with giants like Punjab National Bank means a lot more than just business proliferation. It keeps us on our foot and motivates us in putting relentless efforts in improving our product and keeping up with the expectations that we have set, and even outdoing ourselves. He further added REL-ID hosts various unique features that will help PNB Verify app be foolproof. We have enabled cryptographic signing that ensures that each transaction is digitally signed and is non-repudiable. The integration of REL-ID in the PNB Verify app will result in stronger prevention against Man In The Middle (MITM) attacks owing to its latest ciphers and elliptic curve cryptography. It creates an invisible multifactor authentication mechanism ensuring device trustworthiness and identity verification during app enrollment. In addition, the REL-ID storage provides stronger prevention against credential harvesting and phishing attacks.

Mr. Divyang Rastogi, AGM, IT, Punjab National Bank said Customers satisfaction and their data security is our priority, and we are always willing to go the extra mile to ensure the same. Through the implementation of Unikens REL-ID in the PNB Verify app, we have got access to a lot of security features that will help our customers in making their transactions through the app convenient and quick. Key customer centric features includes: a) Replace SMS OTP based transaction authorization by pull based out of band notifications b) Notifications are received and visible only after strong multifactor authentication c) Eliminate SIM frauds by using customers device fingerprinted app to be used for authentication and transaction authorization over a strongly authenticated secure communication channel d) Show complete transaction details encrypted using secure channel to provide customer full transaction context at the time of transaction authorization e) Use of strong Biometric, FaceID, TouchID authentication on trusted device allows one tap login to authorize transaction f) Detailed Notification history displayed on the App ensures the details available for review g) Protect data and transactions over public internet/wireless by virtue of MITM proof secure channel REL-ID from Uniken offers the most comprehensive suite of protection, detection and correction technologies in the mobile app security/shielding space. No other solution in the industry organically combines device fingerprinting, app fingerprinting, user identity management, malware detection, multi factor authentication, secure channel and cryptographic digital signing in one single small footprint SDK while maintaining maniacal focus on UX/CX.

PWR PWR

Read the rest here:
PNBs Verify App integrates Unikens award winning REL-ID technology for indefectible online transactions - Yahoo India News

Quantum Cryptography Market is expected to reach US$ 1996.1 Mn in 2027 – WhaTech Technology and Markets News

Quantum Cryptography Market to 2027 - Global Analysis and Forecasts By Offering (Solutions and Services); Application (Network Security, Application Security, and Database Security), by End-user (IT & Telecommunication, BFSI, Government & Defense, Healthcare, and Others)

According To a New Report Published by the Insight Partners Titled Global Quantum Cryptography Market to 2027" is a specialized and in-depth study of the Quantum Cryptography industry with a special focus on the global market trend analysis. The report aims to provide an overview of Quantum Cryptography Market with detailed market segmentation by product, type, consumption distribution channel and geography.

The Global Quantum Cryptography Market is expected to witness high growth during the forecast period. The report provides key statistics on the market status of the leading Quantum Cryptography Industry players and offers key trends and opportunities in the market.

Quantum Cryptography Market on a global scenario was valued at US$ 105.3 Mn in 2018 and is expected to reach US$ 1,996.1 Mn by 2027 with a CAGR growth rate of 39.2% in the forecast period from 2019 to 2027.

Get Research Sample copy on Quantum Cryptography Market" bit.ly/36wpKKA

Leading key market players mentioned in the report:-

Currently, technologys advanced solutions are helping technology companies across the globe to accelerate their digital transformation adoption. From the last few years, the technology industry observed high growth and a dramatic increase worldwide.

Factors such as IT spending, economic growth, and technological innovations influence the technology industry significantly.

The global economy is expected to stabilize and grow at a steady speed during the forecast period, mostly driven by developing economies such as China, India, and Brazil. New developing markets and enterprises are anticipated to spend in the technology market to build IT infrastructure that would help lessen costs and optimize business productivity.

New developing markets and economic growth and increasing demand from small and medium enterprises are anticipated to boost the technology industry. The Asia Pacific developed as the fastest-growing region during the last few years in the technology industry, led by economic growth and expanded IT spending.

Various industries such as BFSI, IT & telecom, government and defense, healthcare, and others are adopting software technology to enhance their business productivity and to ease their business process. Quantum cryptography technology has become significant for various industries to work in a secure environment.

This technology is gaining significance important in every region owing to growing cyber-attacks. Hence, such substantial growth is expected to offer ample growth opportunities for the quantum cryptography market players during the forecast period of 2019 to 2027.

The spending on quantum cryptography is quite high in both developed and developing regions such as North America, Europe, and the Asia Pacific. The demand for quantum cryptography is expected to grow further during the forecast period of 2019 to 2027.

Rising digitization and positive economic outlook are some of the major macroeconomic factors driving the growth of the quantum cryptography market. Quantum cryptography technology is turning more into the global business, and various large players can offer quantum cryptography solutions and services worldwide.

Presently on a global scale, industry verticals such as BFSI, IT & telecom, government and defense, and healthcare are the major contributors in Quantum Cryptography spending.

The governments of different countries across the globe as well as various private organizations are significantly investing in cybersecurity. This is majorly attributed to secure critical data from unauthorized individuals while transferring.

The enhanced security solutions offered by the market players including Quantum Key Distribution (QKD), virtual encryptor, quantum cryptography communication device and Quantum Random Number Generator (QRNG) among others facilitate in strongly encrypting critical data. This factor is attracting several governments and industries to invest in such advanced technology.

Thus, the rising investment towards cybersecurity solutions is a key catalyzer for quantum cryptography market.

The quantum cryptography market players are also investing substantial amounts and man-hours in research & development activities to develop robust solutions and services. The companies operating in the quantum cryptography are partnering with different other companies, research laboratories, and governments to develop and implement their solutions to safeguard data from leakage.

The report also analyzes the factors affecting Wastewater Treatment market from both demand and supply side and further evaluates market dynamics effecting the market during the forecast period i.e., drivers, restraints, opportunities, and future trend.

Reasons to Access the Report:

Access This Report at: bit.ly/37z3hOq

This email address is being protected from spambots. You need JavaScript enabled to view it.

More:
Quantum Cryptography Market is expected to reach US$ 1996.1 Mn in 2027 - WhaTech Technology and Markets News