Comprehensive Analysis on Email Encryption Software Market based on types and application – NewsOrigins

Added A New Report On Email Encryption Software Market That Provides A Comprehensive Review Of This Industry With Respect To The Driving Forces Influencing The Market Size. Comprising The Current And Future Trends Defining The Dynamics Of This Industry Vertical, This Report Also Incorporates The Regional Landscape Of Email Encryption Software Market In Tandem With Its Competitive Terrain.

Theresearch reporton the Email Encryption Software market includes crucial information on recent events that will havean impact on the industry dynamics between 2022 and 2026, thereby assisting stakeholders and investors in making informed decisions. Additionally, it offers a thorough examination of the major market divisions, looks at the problems that rival firms confront, and place particular emphasis on the regional context.

In essence, the study presents a thorough analysis of the regional and competitive environments, along with relevant driving forces. Lastly, the impact of COVID-19 outbreak on this marketplaceisextensively documented.

Request Sample Copy of this Report @ https://www.newsorigins.com/request-sample/61564

Important pointers from COVID-19 impact analysis:

Regional analysis overview

Other crucial aspects in the Email Encryption Software market report:

FAQs

Key insights this study will provide:

Request Customization for This Report @ https://www.newsorigins.com/request-for-customization/61564

View post:
Comprehensive Analysis on Email Encryption Software Market based on types and application - NewsOrigins

What Is RCS Messaging and Why Is Google Pushing Apple To Use It? – Popular Mechanics

Constantine JohnnyGetty Images

To say we all text or at least know about texting is an understatement. Most of us use apps such as Apples iMessage for iPhone users or WhatsApp to send our messages. However, that doesnt mean the 1992-born classic SMS (short message service) is dead, even if Google wants it to be.

Dont miss our latest tech news. Learn more with usjoin Pop Mech Pro.

Cue up the RCS vs. SMS debate and Googles shaming of Apple, trying to persuade the digital giant to drop SMS altogether and join Android users in the RCS world. So whats the difference, you may ask. While we may all just see green and blue bubbles, theres more behind the scenes.

That 160-character limit, thats SMS. Debuting in 1992, SMS enabled mobile devices to do more than just talk. It introduced an entirely new world of communication with the text message. The limits of SMS are byproducts of its age, even with the early 2000s introduction of MMS (multimedia messaging service) that introduced the ability to send small files of multimedia (think low-resolution photos or video snippets). After all this time, you can point to many age-induced drawbacks of SMS: a limit on media types supported; no messaging with Wi-Fi since it relies on a cellular connection; and a frustrating mess of additional problems, such as difficulties with group chats, a lack of read receipts, and none of those fancy bouncing dots letting us know somebodys cooking up a new message.

Add the fact that SMS texts arent secure, and the billions of SMS messages sent every day in the U.S. alone causes concern about privacy more than features.

Because of the lack of encryption, hackers can search for weak points anywhere along the virtual path between the sender and receiver, which includes a ton of different network devices and computing systems at many different providersonly one of which needs to be exploited via technical vulnerability, misconfiguration, social engineering or insider attack, says Christopher Howell, CTO of Wickr.

Still, many of us send most of our messages in over the top applications such as WhatsApp, iMessage, WeChat and others, that use internet protocols rather than the cellular networks used by SMS to transmit messages. This adds a stiffer layer of encryption and security, but it also ups the ability to bring in feature-rich add-ons that make the messaging more modern, even if it requires the person youre messaging to be using the same service as you.

Call it a rich communication system. Or, RCS, for short. The GSM Association, a trade group representing mobile networks, spent more than a decade fine-tuning RCS before it made its official debut in 2016. Its an attempt to provide an app-like service for what was the SMS market. And Google has embraced it, saying that Android phones now running RCS can easily text as if they were in these feature-welcoming apps, sending high-resolution photos and videos, emoji reactions, end-to-end encryption (for individual, not group, conversations), read receipts, and more.

Google believes RCS solves the problems associated with SMS.

With its reliance on iMessage, Apple still offers SMS for texting features when you message outside of this app (i.e. when Apple users must resort to a green-bubble conversation with an Android user).

Google wants that to change, saying that Apple refusing to adopt the modern RCS standards is holding back the world of texting. In fact, Google has created an entire public relations campaignGet The Messagesurrounding that effort.

Everyone should be able to pick up their phone and have a secure, modern messaging experience, writes Elmar Weber, a Google engineer, as part of the campaign. Anyone who has a phone number should get that, and thats been lost a little bit because were still finding ourselves using outdated messaging systems.

Of course, Googles big push to persuade everyone else to adopt RCS is self-serving, since it has adopted RCS for its own Messages app. Apple has been either silent or non-committal on dropping SMS for RCS. Detractors of RCS say it may fix some issues, but doesnt solve them all. In fact, RCS comes with its own drawbacks, they say, such as the fact that end-to-end encryption only works in one-on-one conversations, and that RCS has a propensity for opening the doors to spam messages.

Add in Apples blue-bubble domination, and the company has no real incentive to play nicely outside of its own sphereand certainly not if it creates a more seamless transition away from an iPhone and into an Android device.

Of course, Apple isnt the only non-RCS giant out there. WhatsApp, basically the global leader in messaging apps outside of the United States, is non-RCS compliant. Google isnt going after them.

Benedict Evans, an independent technology analyst, wrote on Twitter that when a company that lost (and Google has lost messaging, but mostly to FB [Facebooks parent company Meta owns WhatsApp], not Apple) asks a company that won to adopt a standard that it doesnt look like anyone uses, one should probably be a little cynical.

See the article here:
What Is RCS Messaging and Why Is Google Pushing Apple To Use It? - Popular Mechanics

GUEST BLOG: Five steps to take when securing your data with multi-factor authentication – Military Embedded Systems

Blog

September 06, 2022

Computer data exists in different states at different times: data in transit (information flowing through a network); data in use (active data that is being accessed and manipulated by a computer program); and data-at-rest, known as DAR, or data that is physically housed in a storage device like a solid-state drive. Many cybersecurity solutions focus on securing data in transit and data in use, but neglect securing DAR.

President Bidens Executive Order on Improving the Nations Cybersecurity, enacted on May 12, 2021, directs all branches of the federal government to improve their resilience to cybersecurity threats. This order directly calls out the need to secure data-at-rest (DAR) with encryption and multi-factor authentication (MFA).

MFA requires a user to provide multiple pieces of evidence that combine to verify a users identity. Depending on the application, MFA may be required at login or perhaps when trying to access an application or even a particular folder or file. MFA combines two or more independent credentials: what the user knows (password, for example), what the user has (an authentication app, for example), and what the user is (biometric palm vein scan, for example). Since most MFA implementations use two factors, its often called two-factor authentication, or 2FA.

There are five important considerations when protecting your data with MFA.

1. Understand the sensitivity of your data:First, note that not all data is subject to the same levels of protection. In the U.S., since all federal departments are part of the executive branch, the data-classification system is governed by executive order rather than by law. As of 2009, information may currently be classified at one of three levels: confidential, secret, and top secret. Subsequent executive orders may change these classifications and the levels of protection associated with each classification.

2. Use self-encrypting drives:Sensitive data needs to be encrypted, executive orders notwithstanding. Self-encrypting drives (SEDs) encrypt data as its written to the drive, which has a self-contained drive encryption key (DEK). The key and encryption process are transparent to users.

SEDs encrypt everything on the drive, which is called full-disk encryption (FDE), including operating system (OS), applications, and data. On-drive encryption is called hardware FDE (HWFDE) and uses an embedded encryption engine (EE), which should provide 256-bit AES encryption.

An SED should adhere to the TCG Opal standard, a secure standard for managing encryption and decryption in the SED. SEDs are often certified to Federal Information Processing Standards (FIPS), developed by the National Institute of Standards and Technology (NIST). For example, a FIPS 140-2 L2 certification assures that the SEDs EE has been properly designed and secured; the L2 ensures that there is visible evidence of any attempt to physically tamper with the drive.

The National Information Assurance Partnership (NIAP) is responsible for the U.S. implementation of the Common Criteria (CC), an international standard (ISO/IEC 15408) for IT product security certification. CC is a framework that forms the basis for a government-driven certification scheme required by federal agencies and critical infrastructure.

3. Employ pre-boot authentication:A designated security officer or administrator will define the user roles and identity management used to authenticate access to the SED. The password security that forms part of an OS is notoriously weak and subject to hacking, so the first level of authorization acquisition (AA) should occur prior to the booting of the OS, in which case it is known as pre-boot authentication (PBA).

Each user should have an individually assigned password, which authorizes the SED to use its cryptographic key to unlock the data. The security officer should have the ability to add new users and revoke access to existing users. When a users access is revoked, that user wont even be able to boot the OS.

A more robust PBA implementation will include MFA.

4. Multi-factor authentication methods:In addition to a username/password, MFA requires another form of authentication. One approach is to use a security dongle, such as a YubiKey, containing a license key or some other cryptographic protection mechanism that the user plugs into a device USB port. The U.S. Department of Defense (DoD), including civilian employees and contractor personnel, uses a smartcard called the common access card (CAC), in which case the computer must be equipped with a physical card reader.

Other MFA methods include applications, often on smartphones, that provide a one-time code synced to the device or system asking for authentication. Also taking advantage of the ubiquity of smartphones is an SMS-based system that will include a one-time code in a text message.

5. Provide the ability to destroy the data:There are various scenarios in which it may be necessary to destroy any data stored on the SED. A benign case is when an organization decides to upgrade its computers and/or drives, transfer computers and/or drives within the organization, or dispose of or recycle the computers and/or drives outside the organization. A worst-case scenario is when an unauthorized entity gains control of the drive with the intent of accessing the data.

Using standard operating system-based delete functions to remove files and folders is not sufficient because experienced hackers can still retrieve some or all the data. SEDs that are used to store confidential data should support special hardware functions to perform secure erase (write zeroes into every area where data is stored on the drive) and crypto erase (wipe any cryptographic keys stored on the drive, thereby rendering any encrypted data stored on the drive unreadable and useless to a bad actor).

To address the worst-case scenario, the organizations designated security officer should have the ability to define erase procedures to be automatically initiated by the drive itself; for example, failing AA a specified number of times should cause the drive to self-erase.

In the case of a SED equipped with appropriate PBA, any data stored on the disk will essentially be invisible until AA has taken place, thereby preventing bad actors from cloning the drive to circumvent the restricted number of permitted attempts at AA.

To sum up

Some organizations mistakenly assume that employing MFA such as fingerprint scans or facial recognition after the OS has booted offers a high level of confidence. However, once the OS has booted, any data on its drives is exposed to sophisticated hackers or potentially nation-state bad actors.

The highest levels of confidence and security are achieved by using MFA as part of a PBA environment implemented using HWFDE realized on a FIPS + CC certified and validated SED. (Figure 1.)

[Figure 1|An example of a secure solid-state drive, part of the Citadel family of secure data storage. Photo courtesy CDSG.]

CDSG directorof marketing Chris Kruell leads the sphere of marketing activities, including corporate branding, corporate and marketing communications, product marketing, marketing programs, and marketing strategy. Chris previously was VPofmarketing at ERP-Link and hardware startup Lightfleet. He was a marketing director at Sun Microsystems andheldseveral marketing positions in the high-tech industry. Chris holds a BSdegree from Cornell University and an MA degree from Hamline University.

CDSG (CRU Data Security Group) https://cdsg.com/

Read more here:
GUEST BLOG: Five steps to take when securing your data with multi-factor authentication - Military Embedded Systems

Libs of TikTok vs. The Washington Post – Idaho State Journal

Country

United States of AmericaUS Virgin IslandsUnited States Minor Outlying IslandsCanadaMexico, United Mexican StatesBahamas, Commonwealth of theCuba, Republic ofDominican RepublicHaiti, Republic ofJamaicaAfghanistanAlbania, People's Socialist Republic ofAlgeria, People's Democratic Republic ofAmerican SamoaAndorra, Principality ofAngola, Republic ofAnguillaAntarctica (the territory South of 60 deg S)Antigua and BarbudaArgentina, Argentine RepublicArmeniaArubaAustralia, Commonwealth ofAustria, Republic ofAzerbaijan, Republic ofBahrain, Kingdom ofBangladesh, People's Republic ofBarbadosBelarusBelgium, Kingdom ofBelizeBenin, People's Republic ofBermudaBhutan, Kingdom ofBolivia, Republic ofBosnia and HerzegovinaBotswana, Republic ofBouvet Island (Bouvetoya)Brazil, Federative Republic ofBritish Indian Ocean Territory (Chagos Archipelago)British Virgin IslandsBrunei DarussalamBulgaria, People's Republic ofBurkina FasoBurundi, Republic ofCambodia, Kingdom ofCameroon, United Republic ofCape Verde, Republic ofCayman IslandsCentral African RepublicChad, Republic ofChile, Republic ofChina, People's Republic ofChristmas IslandCocos (Keeling) IslandsColombia, Republic ofComoros, Union of theCongo, Democratic Republic ofCongo, People's Republic ofCook IslandsCosta Rica, Republic ofCote D'Ivoire, Ivory Coast, Republic of theCyprus, Republic ofCzech RepublicDenmark, Kingdom ofDjibouti, Republic ofDominica, Commonwealth ofEcuador, Republic ofEgypt, Arab Republic ofEl Salvador, Republic ofEquatorial Guinea, Republic ofEritreaEstoniaEthiopiaFaeroe IslandsFalkland Islands (Malvinas)Fiji, Republic of the Fiji IslandsFinland, Republic ofFrance, French RepublicFrench GuianaFrench PolynesiaFrench Southern TerritoriesGabon, Gabonese RepublicGambia, Republic of theGeorgiaGermanyGhana, Republic ofGibraltarGreece, Hellenic RepublicGreenlandGrenadaGuadaloupeGuamGuatemala, Republic ofGuinea, RevolutionaryPeople's Rep'c ofGuinea-Bissau, Republic ofGuyana, Republic ofHeard and McDonald IslandsHoly See (Vatican City State)Honduras, Republic ofHong Kong, Special Administrative Region of ChinaHrvatska (Croatia)Hungary, Hungarian People's RepublicIceland, Republic ofIndia, Republic ofIndonesia, Republic ofIran, Islamic Republic ofIraq, Republic ofIrelandIsrael, State ofItaly, Italian RepublicJapanJordan, Hashemite Kingdom ofKazakhstan, Republic ofKenya, Republic ofKiribati, Republic ofKorea, Democratic People's Republic ofKorea, Republic ofKuwait, State ofKyrgyz RepublicLao People's Democratic RepublicLatviaLebanon, Lebanese RepublicLesotho, Kingdom ofLiberia, Republic ofLibyan Arab JamahiriyaLiechtenstein, Principality ofLithuaniaLuxembourg, Grand Duchy ofMacao, Special Administrative Region of ChinaMacedonia, the former Yugoslav Republic ofMadagascar, Republic ofMalawi, Republic ofMalaysiaMaldives, Republic ofMali, Republic ofMalta, Republic ofMarshall IslandsMartiniqueMauritania, Islamic Republic ofMauritiusMayotteMicronesia, Federated States ofMoldova, Republic ofMonaco, Principality ofMongolia, Mongolian People's RepublicMontserratMorocco, Kingdom ofMozambique, People's Republic ofMyanmarNamibiaNauru, Republic ofNepal, Kingdom ofNetherlands AntillesNetherlands, Kingdom of theNew CaledoniaNew ZealandNicaragua, Republic ofNiger, Republic of theNigeria, Federal Republic ofNiue, Republic ofNorfolk IslandNorthern Mariana IslandsNorway, Kingdom ofOman, Sultanate ofPakistan, Islamic Republic ofPalauPalestinian Territory, OccupiedPanama, Republic ofPapua New GuineaParaguay, Republic ofPeru, Republic ofPhilippines, Republic of thePitcairn IslandPoland, Polish People's RepublicPortugal, Portuguese RepublicPuerto RicoQatar, State ofReunionRomania, Socialist Republic ofRussian FederationRwanda, Rwandese RepublicSamoa, Independent State ofSan Marino, Republic ofSao Tome and Principe, Democratic Republic ofSaudi Arabia, Kingdom ofSenegal, Republic ofSerbia and MontenegroSeychelles, Republic ofSierra Leone, Republic ofSingapore, Republic ofSlovakia (Slovak Republic)SloveniaSolomon IslandsSomalia, Somali RepublicSouth Africa, Republic ofSouth Georgia and the South Sandwich IslandsSpain, Spanish StateSri Lanka, Democratic Socialist Republic ofSt. HelenaSt. Kitts and NevisSt. LuciaSt. Pierre and MiquelonSt. Vincent and the GrenadinesSudan, Democratic Republic of theSuriname, Republic ofSvalbard & Jan Mayen IslandsSwaziland, Kingdom ofSweden, Kingdom ofSwitzerland, Swiss ConfederationSyrian Arab RepublicTaiwan, Province of ChinaTajikistanTanzania, United Republic ofThailand, Kingdom ofTimor-Leste, Democratic Republic ofTogo, Togolese RepublicTokelau (Tokelau Islands)Tonga, Kingdom ofTrinidad and Tobago, Republic ofTunisia, Republic ofTurkey, Republic ofTurkmenistanTurks and Caicos IslandsTuvaluUganda, Republic ofUkraineUnited Arab EmiratesUnited Kingdom of Great Britain & N. IrelandUruguay, Eastern Republic ofUzbekistanVanuatuVenezuela, Bolivarian Republic ofViet Nam, Socialist Republic ofWallis and Futuna IslandsWestern SaharaYemenZambia, Republic ofZimbabwe

Read this article:

Libs of TikTok vs. The Washington Post - Idaho State Journal

Journalist Glenn Greenwald scorches unholy alliance of government Democrats, corporate media and Big Tech – Fox News

NEWYou can now listen to Fox News articles!

Journalist Glenn Greenwald condemned the government, media and Big Tech for coordinating to censor dissent in a long Twitter thread on Tuesday.

Greenwald explained that the game has changed entirely when it comes to Big Tech censorship, because now the government can launder its censorship through institutions, working around the First Amendment, with some in journalism providing an assist.

"The regime of censorship being imposed on the internet by a consortium of DC Dems, billionaire-funded disinformation experts, the US Security State, and liberal employees of media corporations is dangerously intensifying in ways I believe are not adequately understood," he began.

"A series of crises have been cynically and aggressively exploited to inexorably restrict the range of permitted views, and expand pretexts for online silencing and deplatforming. Trump's election, Russiagate, 1/6, COVID and war in Ukraine all fostered new methods of repression," he continued.

Substack journalist and the Intercept co-founder Glenn Greenwald. (AP)

BIDEN SAYS 'MAGA REPUBLICANS' THREATEN DEMOCRACY AS HE AND DEMS CRANK UP ANTI-TRUMP RHETORIC AHEAD OF MIDTERMS

"Dems routinely abuse their majoritarian power in DC to explicitly coerce Big Tech silencing of their opponents and dissent. This is *Govt censorship* disguised as corporate autonomy," he warned.

Greenwald had a special condemnation for journalists and other experts funded by powerful billionaires who have made careers out of targeting dissenters.

"There's now an entire new industry, aligned with Dems, to pressure Big Tech to censor. Think tanks and self-proclaimed disinformation experts funded by Omidyar, Soros and the US/UK Security State use benign-sounding names to glorify ideological censorship as neutral expertise," he explained.

"The worst, most vile arm of this regime are the censorship-mad liberal employees of big media corporations ([Ben Collins], @BrandyZadrozny, @TaylorLorenz, NYT tech unit). Masquerading as journalists, they align with the scummiest Dem groups (@mmfa) to silence and deplatform," he continued.

As "fascism" has become a popular insult thrown around by Democrats and their compatriots in the media to discredit political opposition, Greenwald used its actual technical definition to call them out for trying "to *unite state and corporate power* to censor their critics and degrade the internet into an increasingly repressive weapon of information control."

He warned that rather than Big Tech being the unique source of censorship, they are often complying under threat of political punishment, saying, "A major myth that must be quickly dismantled: political censorship is not the by-product of autonomous choices of Big Tech companies. This is happening because DC Dems and the US Security State are threatening reprisals if they refuse. They're explicit."

He again criticized journalists for acting more like activists, "But the worst is watching people whose job title in corporate HR Departments is 'journalist' take the lead in agitating for censorship. They exploit the platforms of corporate giants to pioneer increasingly dangerous means of banning dissenters. *These* are the authoritarians."

Big Tech censorship has become one of the major household issues that has emerged in American politics, especially when it comes to suppression of stories that could swing elections. (Muhammed Selim Korkutata/Anadolu Agency/Getty Images)

Greenwald called out the numerous forms of "censorship repression" that have taken place in the Western world across a wide spectrum of political issues, such as "Trudeau freezing bank accounts of [trucker]-protesters; Paypal partnering with ADL to ban dissidents from the financial system; Big Tech platforms openly colluding in unison to de-person people from the internet."

He explained this is the mindset of "would-be tyrants" who claim that their "enemies are so dangerous, their views so threatening, that everything we do lying, repression, censorship is noble."

The journalist recalled the scandal over the Hunter Biden laptop as a "uniquely alarming" example of multiple institutions allying to crush a story that would have hurt Democrats' chances in the ballot box.

"The media didn't just bury the archive. CIA concocted a lie about it (it's Russian disinformation); media outlets spread that lie; Big Tech censured it -- because lying and repression to them is justified!" he wrote.

"The authoritarian mentality that led CIA, corporate media and Big Tech to lie about the Biden archive before the election is the same driving this new censorship craze. It's the hallmark of all tyranny: 'our enemies are so evil and dangerous, anything is justified to stop them,'" he tweeted.

The New York Times and The Washington Post both verified Hunter Biden's laptop after Big Tech dismissed the New York Post's bombshell reporting during the 2020 presidential election. (Getty images | New York Post)

FBI OFFICIALS SLOW-WALKED HUNTER BIDEN LAPTOP INVESTIGATION UNTIL AFTER 2020 ELECTION: WHISTLEBLOWERS

Greenwald warned, "It's not melodrama or hyperbole to say: what we have is a war in the West, a war over whether the internet will be free, over whether dissent will be allowed, over whether we will live in the closed propaganda system our elites claim The Bad Countries impose. It's no different.

He said the media that are "screaming most loudly" against "disinformation" and "fascism" are the ones that "spread it most frequently, casually and destructively," and are the most repressive.

"The worst of all - the most repugnant and despicable - are those calling themselves journalists while doing the opposite of what that term implies: they serve rather than challenge power, they deceive rather than inform, they demand censorship rather than free and open inquiry," he wrote.

He concluded, "Heap scorn on the corporate outlets and their deceitful, pro-censorship employees abusing the journalist label. Read them with full skepticism, or just ignore them. Support outlets and platforms that want to protect free inquiry and the right of dissent, not rob you of it."

NBC News' Ben Collins on The ReidOut (Screenshot/MSNBC)

NBC News reporter Ben Collins, who had been called out directly by Greenwald, appeared to mock the thread and suggested he would "lean in" to the idea of being part of the "globalist censorship" cabal.

CLICK HERE TO GET THE FOX NEWS APP

"Crazy Substack Man is saying I somehow run the globalist censorship cabal again and you know what? Its time to lean into it. Im all powerful," Collins tweeted. "Let me know if you guys want a money tree, theyre shockingly apartment-friendly, can FedEx it to you in like 48 hours."

Alexander Hall is an associate editor for Fox News Digital. Story tips can be sent to Alexander.hall@fox.com.

Read the original post:

Journalist Glenn Greenwald scorches unholy alliance of government Democrats, corporate media and Big Tech - Fox News

Wikileaks Asks Donald Trump Jr. to Have Australia Make Julian Assange …

Wikileaks asked Donald Trump Jr. to get his father, then-President-elect Donald Trump, to suggest that Australia nominate Julian Assange as its US ambassador, The Atlantic reported Monday as a part of an expose on the Twitter direct messages sent between Wikileaks and Trump Jr.

On December 16, Wikileaks wrote to Trump Jr. that encouraging his father to do so would "be real easy and helpful." Assange, the Wikileaks founder, has spent years inside the Ecuadorian embassy in London to avoid extradition on various charges. Those charges included sexual assault until earlier this year, when a Swedish investigation was dropped.

"Hi Don. Hope you're doing well!" Wikileaks wrote to Trump Jr. "In relation to Mr. Assange: Obama/Clinton placed pressure on Sweden, UK and Australia (his home country) to illicitly go after Mr. Assange. It would be real easy and helpful for your dad to suggest that Australia appoint Assange ambassador to [Washington,] DC."

Wikileaks even crafted a Trump-esque message for the soon-to-be president to read.

"'Thats a real smart tough guy and the most famous australian [sic] you have!' or something similar," Wikileaks wrote. "They wont do it but it will send the right signals to Australia, UK + Sweden to start following the law and stop bending it to ingratiate themselves with the Clintons."

Trump Jr. did not answer the messages, according to the report.

That request from Wikileaks was one of a few that the organization sent Trump Jr.'s way. While he did not respond to the above request, Trump Jr. did respond to a couple of messages and appeared to act on others that he did not respond to.

Wikileaks released thousands of hacked emails from the Democratic National Committee and 2016 Democratic presidential nominee Hillary Clinton's campaign chairman John Podesta. US intelligence agencies concluded that Russian hackers were responsible for the theft of both the DNC's and Podesta's emails.

Read the original post:
Wikileaks Asks Donald Trump Jr. to Have Australia Make Julian Assange ...

Be On The Cutting-Edge Of Tech With This Top-Rated Learning Bundle – IFLScience

If youve heard the term machine learning, but arent quite sure what it means, then youve come to the right place. Machine learning is a type of artificial intelligence that allows software applications to become more accurate at predicting outcomes without being specifically programmed to do so. Basically, machine learning (MI) and artificial intelligence (AI) are helping businesses by improving customer service, reducing errors, managing automation and much more. Why do you need to know all of this? Well, for all of you out there looking to boost your income and career opportunities, you should consider this handy bundle that will give you the basics in machine learning.

The Premium Machine Learning Artificial Intelligence Super Bundle offers you 79 hours, 12 courses and 438 training on Python, data science, analysis and tons more. Start by learning the fundamentals of Python, and dont worry its not all theory. Youll be getting some serious hands-on training. Learn the powerful tools used in data science and machine learning and get certified. Create deep learning algorithms in Python, master the importance of deep learning for Python, harness the power of the H2O framework for machine learning with R, create your very own image detection app and so much more.

With each course rating 4+ stars or higher, you know you are in good hands to learn the fundamentals of machine learning and artificial intelligence. Need further convincing? In the words of one 5-star reviewer, The Premium Machine Learning Artificial Intelligence Super Bundle is amazing, lot of information on Machine Learning and Artificial Intelligence. Great quality on videos. Must have this bundle!!!

If youve been looking for a way out of your 9-5 nightmare, but just havent had the opportunity, now is your chance. This learning bundle comes with lifetime access, which means you can learn whenever or wherever you need. And, you can feel free to revisit material any time.

Join the 531 people enrolled today, and begin your journey towards a more lucrative career.

Get The Premium Machine Learning Artificial Intelligence Super Bundle for $36.99 (reg. $2,388), a discount of 98 per cent.

Prices subject to change.

This article includes sponsored material. Read our transparency policy for more information.

More here:
Be On The Cutting-Edge Of Tech With This Top-Rated Learning Bundle - IFLScience

How Machine Learning And AI Is Transforming The Logistic Sector? – Daijiworld.com

Sep 12: Digitization has changed many sectors across the globe and that also include the logistic sector. With digitization, machine learning and artificial intelligence have become the norm. Logistic sectors have been implementing machine learning and artificial intelligence to innovate the sector and improve it further. The usage of artificial intelligence and machine learning has improved the productivity of the logistic sector. According to a report by Katrine Spina and Anastasiya Zharovskikh, the productivity of the logistic sector will increase by 40% by 2035 with the help of artificial intelligence and machine learning.

With the help of big data, logistic companies have been helpful in making clear predictions that were useful to improve their performance. Visibility and prediction have become possible due to the implementation of artificial intelligence and machine learning in the logistic sector. Here is how machine learning and artificial intelligence has been helpful in the logistic sector.

1. Robotics can be used to help the workforce

Including robotics in the logistic sector has been helpful in logistic companies likeDelhivery primarily with autonomous navigation. It has also further reduced the burden from the workforce and has been helpful in providing cost-effective solutions. Automated robots in the logistic sectors have been helpful in material selection and handling, long-haul distribution along last-mile delivery.

2. Warehouse management and optimization of supply chain planning

Warehouse management in the logistic sector can only be optimized when it is accurately predicted when things need to be moved and what equipment is needed to handle it. This can improve the overall productivity of the warehouse. Accuracy of such predictions is possible with the help of big data. Also, with the help of contextual intelligence, effective planning can be made in logistic companies like Ekart. AI-based solutions are helpful in forecasting demand and machine learning can also be applied in order to improve the efficiency of the supply chain too.

3. Autonomous vehicles

Autonomous vehicles have become popular all across the world and it would not have been possible if artificial intelligence did not exist. Artificial intelligence allows autonomous vehicles to perceive and then further, predict the changes in the environment with the help of sensing technologies. With autonomous vehicles, last-mile delivery can be fastened. Many logistic companies have been experimenting with autonomous vehicles as a part of their development strategy and Google and Tesla have been working hard towards this sector.

4. Improved customer experience

Gone are the days when the general queries of the customers used to be handled by real people. Thankfully, customer experiences are now handled with the help of chatbots and this has made things so much easier in ensuring a satisfactory customer experience. Many companies have accepted that the customer experience played a vital role in the growth of the company. The use of artificial intelligence in customer experience has been helpful in improving customer loyalty and retention with personalization.

5. Efficient planning and resource management

For the growth of any business and not just the logistic sector, efficient planning and resource management are important. Artificial intelligence plays a key role in efficient planning and resource management by helping companies to reduce the cost and optimize the movement of commodities, which also improves the supply chain of the logistic sector in real-time.

6. Time Route Optimization

Artificial intelligence also makes it possible for real-time route optimization which increases the efficiency of the delivery and thereby, helps in reducing the waste of resources. Many logistics companies have already been using an autonomous delivery system which has made it possible to deliver items at a much quicker pace and that too without the requirement of human labor. Artificial intelligence has always been helpful in freight management by helping in efficient logistic management by lowering the shipping costs and improving the delivery process.

In addition to the factors mentioned above, machine learning and artificial intelligence also help in demand prediction, sales and marketing optimization, product inspection and back-office automation. Competitive advantage will be in the hands of logistic sectors that use artificial intelligence and machine learning for the growth of the company. The current demands of the customers include real-time visibility, super-fast deliveries and it is possible to meet such expectations of the customers only by accepting technology in the logistics sector.

View post:
How Machine Learning And AI Is Transforming The Logistic Sector? - Daijiworld.com

Apple machine learning speech focuses on benefits for accessibility and health – 9to5Mac

Apple machine learning projects span almost every aspect of the companys activities, but in a new speech at an AI conference, a senior exec spoke specifically about the benefits for accessibility and health.

Ge Yue, Apple VP and managing director of Apple Greater China, gave her speech at the 2022 World Artificial Intelligence Conference in Shanghai

NPR reports:

Apple has given a rare speech at a global AI gathering, with vice president Ge Yue choosing to concentrate on Machine Learning in accessibility features []

The company has chosen to illustrate the technology through accessibility features in Apple Watch, and AirPods Pro []

She said that Machine Learning plays a crucial role in Apples hope that its products can help people innovate and create, and provide the support they need in their daily lives.

We believe that the best products in the world should meet everyones needs, she continued. Accessibility is one of our core values and an important part of all products. We are committed to manufacturing products that are truly suitable for everyone.

We know that machine learning can help disabled users provide independence and convenience, she said, including people with the visually impaired, the hearing impaired, people with physical and motor disabilities, and people with cognitive impairment.

Ge Yue gave the example of the Assistive Touch feature on Apple Watch, which the company introduced last year, alongside eye-tracking on iPad.

To support users with limited mobility, Apple is introducing a revolutionary new accessibility feature for Apple Watch. AssistiveTouch for watchOS allows users with upper body limb differences to enjoy the benefits of Apple Watch without ever having to touch the display or controls.

Using built-in motion sensors like the gyroscope and accelerometer, along with the optical heart rate sensor and on-device machine learning, Apple Watch can detect subtle differences in muscle movement and tendon activity, which lets users navigate a cursor on the display through a series of hand gestures, like a pinch or a clench. AssistiveTouch on Apple Watch enables customers who have limb differences to more easily answer incoming calls, control an onscreen motion pointer, and access Notification Center, Control Center, and more.

She said that this utilized on-device machine learning.

This function combines machine learning on the device with data from the built-in sensors of Apple Watch to help detect subtle differences in muscle movement and tendon activity, thus replacing the display tapping.

Apple views accessibility as one of the companys core values, and its tech can make a huge difference to the lives of people with disabilities. One reader spoke earlier this year about small things making a big difference.

I always thought it bonkers when using Siri on iPhones, for years users can place a call by saying Hey Siri, call, but until now theres been no Hey Siri, end call command. It lead to a lot of daily frustration as I cant press the red button on the iPhone screen to hang up a phone call, so this prompted me to campaign for it. Im really glad Apple has listened and resolved the contradiction in iOS 16! Hopefully, it will also be of use to anyone who has their hands full.

That point is one others have echoed: Accessibility features may be aimed primarily at those with disabilities, but can often prove beneficial to a much wider audience.

Apple also sees machine learning having huge potential for future health features, says Ge Yue.

Saying, too, that our exploration in the field of health has just begun, she says that Apple believes that machine learning and sensor technology have unlimited potential in providing health insights and encouraging healthy lifestyles.

Photo: Xu Haiwei/Unsplash

FTC: We use income earning auto affiliate links. More.

Check out 9to5Mac on YouTube for more Apple news:

Originally posted here:
Apple machine learning speech focuses on benefits for accessibility and health - 9to5Mac

Floating-Point Formats in the World of Machine Learning – Electronic Design

What youll learn:

Over the last two decades, compute-intensive artificial-intelligence (AI) tasks have promoted the use of custom hardware to efficiently drive these robust new systems. Machine-learning (ML) models, one of the most used forms of AI, are trained to handle those intensive tasks using floating-point arithmetic.

However, because floating-point formats have been extremely resource-intensive, AI deployment systems often rely on one of a handful of now-standard integer quantization techniques using floating-point formats, such as Google's bfloat16 and IEEE's FP16.

Since computer memory is limited, it's not efficient to store numbers with infinite precision, whether theyre binary fractions or decimal ones. This is due to the inaccuracy of the numbers when it comes to certain applications, such as training AI.

While software engineers can design machine-learning algorithms, they often can't rely on the ever-changing hardware to be able to efficiently execute those algorithms. The same can be said for hardware manufacturers, who often produce next-gen CPUs without being task-oriented, meaning the CPU is designed to be a well-rounded platform to process most tasks instead of target-specific applications.

When it comes to computing, floating-points are formulaic arithmetic representative of real numbers that are an approximation to support a tradeoff between range and precision, or rather tremendous amounts of data and accurate outcomes. Because of this, floating-point computation is often used in systems with minimal and large numbers that require fast processing times.

It's widely known that deep neural networks can tolerate lower numerical precision because high-precision calculations are less efficient when training or inferencing neural networks. Additional precision offers no benefit while being slower and less memory-efficient.

In fact, some models can even reach higher accuracy with lower precision. A paper released by Cornell University attributes to the regularization effects of the lower precision.

While there are a ton of floating-point formats, only a few have gained traction for machine-learning applications as those formats require the appropriate hardware and firmware support to run efficiently. In this section, we will look at several examples of floating-point formats designed to handle machine-learning development.

IEEE 754

The IEEE standard 754 (Fig. 1) is one of the widely known formats for AI apps. Its a set of representations of numerical values and symbols, including FP16, FP32, and FP64 (AKA Half, Single and Double-precision formats). FP32, for example, is broken down as a sequence of 32 bits, such as b31, b30, and b29, all the way down to zero.

A floating-point format is specified by a base (b), which is either 2 (binary) or 10 (decimal), a precision (p) range, and an exponent range from emin to emax, with emin = 1 emax for all IEEE 754 formats. The format comprises finite numbers that can be described by three integers.

These integers include s = a sign (zero or one), c = a significand (or coefficient) having no more than p digits when written in base b (i.e., an integer in the range through 0 to bp 1), and q = an exponent such that emin q + p 1 emax. The format also comprises two infinites (+ and ) and two kinds of NaN (Not a Number), including a quiet NaN (qNaN) and a signaling NaN (sNaN).

The details here are extensive, but this is the overall format of how the IEEE 754 floating-point functions; more detailed information can be found at the link above. FP32 and FP64 are on the larger floating-point spectrum, and theyre supported by x86 CPUs and most of today's GPUs, along with the C/C++, PyTorch, and TensorFlow programming languages. FP16, on the other hand, isn't widely used with modern processors, but its widely supported by current GPUs in conjunction with machine learning frameworks.

Bfloat16

Google's bfloat16 (Fig. 2) is another widely utilized floating-point format aimed at machine-learning workloads. The Brain Floating Point Format is basically a truncated version of IEEE's FP16, allowing for fast, single-precision conversion of the 754 to and from that format. When applied to machine learning, there are generally three flavors of values, including weights, activations, and gradients.

Google recommends storing weights and gradients in the FP32 format and storing activations in bfloat16. Of course, the weights also can be stored in BFloat16 without a significant performance degradation depending on the circumstances.

At its core, bfloat16 consists of one sign bit, eight exponent bits, and seven mantissa bits. This differs from the IEEE 16-bit floating-point, which was not designed with deep-learning applications in mind during its development. The format is utilized in Intel AI processors, including Nervana NNP-L1000, Xeon processors, Intel FPGAs, and Google Cloud TPUs.

Unlike the IEEE format, bfloat16 isnt used with C/C++ programming languages. However, it does take advantage of TensorFlow, AMD's ROCm, NVIDIA's CUDA, and the ARMv8.6-A software stack for AI applications.

TensorFloat

NVIDIA's TensorFloat (Fig. 3) is another excellent floating-point format. However, it was only designed to take advantage of TensorFlow TPUs built explicitly for AI applications. According to NVIDIA, "TensorFloat-32 is the new math mode in NVIDIA A100 GPUs for handling the matrix math also called tensor operations used at the heart of AI and certain HPC applications. TF32 running on Tensor Cores in A100 GPUs can provide up to 10X speedups compared to single-precision floating-point math (FP32) on Volta GPUs."

The format is just a 32-bit float that drops 13 precision bits to run on Tensor Cores. Thus, it has the precision of the FP16 (10 bits), but has the range of the FP32 (8 bits) IEEE 754 format.

NVIDIA states that TF32 uses the same 10-bit mantissa as the half-precision FP16 math, which is shown to have more than enough margin for the precision requirements of AI workloads. TF32 also adopts the same 8-bit exponent as FP32, so it can support the same numeric range. That means content can be converted from FP32 to TF32, making it easy to switch platforms.

Currently, TF32 doesnt support C/C++ programming languages, but NVIDIA says that the TensorFlow framework and a version of the PyTorch framework with support for TF32 on NGC are available for developers. While it limits the hardware and software that can be used with the format, its exceptional in performance on the companys GPUs.

This is just a basic overview of floating-point formats, an introduction to a larger, more extensive world designed to lessen hardware and software demands to drive innovation within the AI industry. It will be interesting to see how these platforms evolve over the coming years as AI becomes more advanced and ingrained within our lives. The technology is constantly evolving, so too must the formats that make developing machine-learning applications increasingly efficient in software execution.

See more here:
Floating-Point Formats in the World of Machine Learning - Electronic Design