Big Brother Has Hacked the Constitution – Tenth Amendment Center

Big Brother has hacked the Constitution.

It has been over nine years since Edward Snowden released the first documents exposing the extent of NSA spying to the world. Since then, the surveillance state has only gotten bigger.

I finally got around to reading Snowdens memoir, Permanent Record. I bought the book not long after it was released, but life took over and the book sat on the shelf all but forgotten until we recently moved. As I was unpacking, I thought, I really need to read this.

I was right.

The book was a poignant reminder of just how insidious and omnipotent the national surveillance state has become. And how a complete breakdown of the constitutional system supports it.

SPYING ON EVERYBODY

The Snowden revelations had a profound impact on the trajectory of my own work. In the ensuing years, surveillance became one of my primary policy areas. I was heavily involved in the Tenth Amendment Centers efforts to turn off the water to the NSA facility in Bluffdale, Utah. I spearheaded the TACs OffNow project to address warrantless surveillance more broadly. I contributed to the drafting of a local ordinance creating oversight and transparency for surveillance programs that passed in numerous cities. And I got involved in fighting a surveillance program in Lexington, Ky. That resulted in a multi-year lawsuit.

As you can imagine, in the course of this work, Ive read a great deal about surveillance. I dug deep into Snowdens documents and the reporting as he released them. Ive poured over hundreds of documents describing the ever-growing surveillance state. I even took an online course on surveillance law. So, I have a keen understanding of just how deep and powerful the national spy complex runs. But Snowdens simple description of one NSA program stunned me. It is the program that allows U.S. intelligence agencies to access information about you, me, and pretty much everybody.

The program that enables this access was called XKEYSCORE which is perhaps best understood as a search engine that lets an analyst search through all the records of your life. Imagine a kind of Google that instead of showing pages from the public internet returns results from your private email, your private chats, your private files, everything.

In documents released by Snowden, the NSA calls XKEYSCORE its widest-ranging tool used to search nearly everything a user does on the internet. In his memoir, Snowden called it the closest thing to science fiction Ive ever seen in science fact; an interface that allows you to type in pretty much anyones address, telephone number, or IP address, and then basically go through the recent history of their online activity.

In some cases, you could even play back recordings of their online sessions, so that the screen youd be looking at was their screen, whatever was on their desktop. You could read their emails, their browser history, their social media postings, everything.

Snowden goes on to describe how analysts with access to XKEYSCORE shared pictures of nudes they found on target computers.

I knew this was a thing. But Snowden put it in such stark, simple terms that I was floored by the scope of federal surveillance all over again.

Snowdens revelations shined a light on the NSAs unconstitutional overreach. It produced some outrage, but its almost certain that these surveillance programs continue today. And in all likelihood, surveillance has expanded with the advancement of technology over the ensuing years.

HACKING THE CONSTITUTION

As Snowden put it, the government has hacked the Constitution.

He describes a wholesale breakdown of the constitutional system that shredded the Fourth Amendment.

Had constitutional oversight mechanisms been functioning properly, this extremist interpretation of the Fourth Amendment effectively holding that the very act of using modern technologies is tantamount to a surrender of your privacy rights would have been rejected by Congress and the courts.

Reading Snowdens outline of the constitutional breakdown that supports the surveillance state, its glaringly clear that we cant count on the federal government to limit the power of the federal government. Every branch of the federal government shares culpability.

As Snowden points out, Congress willingly abandoned its supervisory role over the intelligence community. Meanwhile, the failure of the judicial branch was just as egregious. The FISA Court created to oversee foreign surveillance approved 99 percent of the surveillance requests brought before it, a rate more suggestive of a ministerial rubber stamp than a deliberative judicial process. But Snowden described the executive branch as the primary cause of the constitutional breach.

The presidents office, through the Justice Department, had committed the original sin of secretly issuing directives that authorized mass surveillance in the wake of 9/11. Executive overreach has only continued in the decades since, with administrations of both parties seeking to act unilaterally and establish policy directives that circumvent law policy directives that cannot be challenged, since their classification keeps them from being publicly known.

In effect, all three branches of the federal government failed deliberately and with coordination creating what Snowden called a culture of impunity.

It was time to face the fact that the IC (intelligence community) believed themselves above the law, and given how broken the process was, they were right. The IC had come to understand the rules rules of our system better than the people who had created it, and they used the knowledge to their advantage.

Theyd hacked the Constitution.

As I read Snowdens words some nine years later, I had to ask myself, What has changed.

The answer is nothing.

The Constitution remains hacked. The federal government still wont limit its own power. That means its up to us to rein in this surveillance menace. State HERE.

Tags: edward snowden, fourth-amendment, NSA, Privacy, Surveillance

Go here to read the rest:
Big Brother Has Hacked the Constitution - Tenth Amendment Center

A Plan to Let Soldiers Interact with the Army Cloud Using Their Own Devices Got a Bit Clouded – Forbes

After years of proposing Bring Your Own Device strategies, the U.S. Army has embarked on Phase III ... [+] of its BYOD Pilot.

The U.S. Army is testing a mobile device application that would let its Soldiers and DoD civilians access the Army Cloud using their personal cellphones or laptops. But theres some confusion about the app and the extent to which it will be used.

For context, its worth explaining that the Army and other services have enabled service members and DoD civilians to work remotely via Government Furnished Equipment (GFE) for over 15 years. The once ubiquitous BlackBerry phones that Soldiers, Airmen, Sailors and Marines carried for years exemplified remote work.

Uncle Sam paid for and supplied these devices and users were/are expected to conduct only official business on them, with the resulting phone in each hand a common sight among service people and government officials physically segregating their professional and personal communications. But a lot has changed in the last decade.

The Army and other branches followed and began to embrace the commercial technology evolution that has brought us digital cloud storage and software-as-a-service (SaaS). For the Army, and the rest of the world, that embrace became a bear hug when COVID-19 hit in 2020.

At the height of the Pandemic the Pentagon turned to a commercial solution for the vastly expanded telework work it believed was necessary to continue to function, enabling Microsoft MSFT Office 365 mobile capability for the military/civilian workforce. The capability was well received but in the span of less than a year DoD recognized it wasnt particularly secure. In June, 2021 Office 365 mobile capability was turned off.

To work remotely and access the cloud, users reverted to their GFE. As they did so, the folks running the DoD cloud enterprise were already asking the question - Do they have to use government funded devices?

Bring Your Own Device

With Microsoft Office 365 connectivity disabled, the DoD CIO and the respective service CIOs established separate pilot programs to assess the potential for military personnel and civilians to work remotely using their own cellphones and laptops. The Pentagon refers to this strategy and to the separate service pilots as Bring Your Own Device or BYOD.

The Army, Navy and Air Force each have their own BYOD Pilots though the Armys Pilot - now in Phase III - is likely the most mature. The goal of BYOD the Army says is to extend the convenience of teleworking on just one device to Soldiers and Army civilians. Essentially, its another app on your phone. A service member can walk out of the Pentagon or off-base, go to the store and still be connected to official business via his or her personal device.

BYOD may also save the service considerable money Army CIO, Dr. Raj Iyer says.

Army CIO Dr. Raj Iyer says its BYOD Pilot is demonstrating the convenience and potential cost ... [+] savings of having Army personnel use their own devices for official business.

We know that there are savings to be had. If you look at the total cost of ownership of government furnished cellphones and how much we pay for data services from the telecom providers, theres an opportunity to reduce those costs by switching to BYOD.

How much potential savings from dropping GFEs/data could be realized is one of a number of issues relating to BYOD over which there has been some confusion. Chief among these has been what kind of work it will enable users to do.

Lieutenant General John B. Morrison, the Armys Deputy Chief of Staff for Command, Control, Communications, Cyber Operations and Networks (G-6), emphasizes that BYOD is largely for administrative work. Technically, it is cleared to carry up to Impact Level 5 (IL 5) information including unclassified and controlled unclassified information the Army says. It is not for use for classified work, communications or data sharing.

Moreover, the Army BYOD Pilot is limited to the strategic administrative level, typically for in-garrison users within the U.S. However, the G-6 is working through use cases outside the continental U.S. LTG Morrison says so personnel in Europe, Africa or South Korea may theoretically be using their own devices through BYOD one day.

Deputy Chief of Staff, G-6 Lt. Gen. John B. Morrison, Jr. emphasizes that the Army's BYOD Pilot is ... [+] evolving and will go forward based on its productivity, security and a cost-driven business case.

While General Morrison says there has been no discussion of using the Bring Your Own Device approach in tactical scenarios at this time, he does not rule out the possibility. That would surely raise additional security concerns and Morrison adds, Were very mindful of the capability some of our adversaries have to use cellphones to do direction-finding and identification.

But for now, BYOD is a tool that replaces the GFEs mostly carried by those at the Army leadership level Morrison says. That includes a fair number of people. Phase III of the pilot will extend to 20,000 users.

Dr. Iyer says it can fully scale to over 20,000 users including National Guardsmen and Reservists whom the Army has also included in the Pilot. If, as LTG Morrison says, the Army will use Phase III to look at other use cases BYOD may have to expand beyond the above number.

The user population brings the BYOD proposition back to cost. If the Army can eliminate the need to provide 20,000 devices, it could probably save come coin. But this proposition has some wrinkles.

For one, both Gen. Morrison and Dr. Iyer stress that the Pilot (and ultimately a program) are strictly voluntary. However if the user base is smaller than anticipated, the cost of acquiring the commercial license for the BYOD app and maintaining its link to the Army cloud may outweigh the savings from handing out fewer phones.

The participation of Guardsmen (both Army and Air Force) and Reservists introduces another nuance to the cost equation. In addition to LTG Morrison and Dr. Iyer, I spoke with Kenneth C. McNeill, CIO at the National Guard Bureau who affirmed that Phase II BYOD testing with Guard Soldiers and Airmen went quite well.

He points out that only a relative handful of Guardsmen (and Reservists) actually have GFEs. To communicate and conduct official business, they have to go to an Armory or other post. When they respond to hurricanes, floods or [provide] whatever support theyre asked to, McNeill said, this will give them the capability to stay connected, pre and post mobilizing.

But since Guardsmen and Reservists who volunteer to use their own phones currently have no GFEs, their participation effectively represents no saving. The convenience may be welcome but Morrison acknowledges, We will do due diligence on whether it fiscally makes sense to move this forward.

Some in the cybersecurity community have already been asking whether moving forward with BYOD makes sense. While Army BYOD is not a classified system, penetrating it would still yield potential insights for U.S. adversaries like China which has derived real benefit over the last three decades from open-source intel, let-alone controlled information.

The Army is cognizant of this and with security foremost in mind, it has given BYOD a Halo.

A Security Halo

The key to BYOD is the ability to securely connect users personal devices to the Armys enterprise cloud environment. Known as cArmy, the services cloud currently offers shared services in the Amazon AMZN Web Services (AWS) and Microsoft Azure clouds at IL 2, 4 and 5.

To enable BYOD the Army turned to Hypori, a Virginia-based SaaS firm which has developed Halo cloud-access software. Halo renders applications and data that reside inside the cArmy cloud on a users device as pixels.

These virtual images allow users to interact and work within cArmy, without any actual transfer of data. Raj Iyer describes Halo-enabled phones as dumb display units which show representations of email, scheduling, spreadsheets or other applications hosted by cArmy. None of it resides on the users device.

This approach largely shifts security from the device to the cloud itself. It allows the service to focus its efforts on defending a single point - cArmy - rather than a collection of phones or laptops. The Army controls access to the cloud (right down to physical access to its servers) and constantly monitors the environment.

Hypori's Halo cloud software connects mobile devices to applications in the cloud via a pixel ... [+] presentation. No data is actually transferred to or from the edge device.

If an anomaly pops up inside cArmy, the Armys Enterprise Cloud Management Agency tells me that it is confident it can rapidly detect and identify an intrusion and defend the BYOD environment. Halo-enabled BYOD has been repeatedly red-teamed Iyer says, passing these evaluations with flying colors and outperforming the solutions the Navy and Air Force have chosen.

Despite their high level of confidence in Halo, both Iyer and General Morrison acknowledge that one can never-say-never in cybersecurity matters. The same centralization in the cloud allows U.S. adversaries to focus their own resources on a single target - cArmy.

While no data rests on the device, the vulnerabilities that always exist at the intersection between hardware, software and the internet remain as does the threat of what the Army cannot control. That stretches from the industrial architecture underpinning the cloud and cloud vendors (Amazon, Microsoft) to the risk of insider exploits.

One of the most notable cloud breaches was publicly acknowledged last May when news broke that in 2019 a former AWS employee exploited her knowledge of cloud server vulnerabilities at Capital One COF and more than 30 other companies to steal the personal information of over 100 million people, including names, dates-of-birth, and social security numbers. The possibility of such an insider breach of BYOD or other cloud systems rings as real to the Army as the name, Bradley Manning.

Even though the Army BYOD is currently intended for non-classified work, LTG Morrison stresses that, Weve baked cybersecurity in early and often and well do it again if we go live and do continual assessments to ensure that we adequately secure the capability were providing.

What was interesting to us about Halo was that we could implement it on devices that were unmanaged, Dr. Iyer says.

Other BYOD solutions come with a Mobile Device Management (MDM) approach which requires the environment (cloud) owner to take control of the device, typically to ensure security and compliance issues. For users, MDM raises privacy concerns which might prove a significant obstacle to adoption. But there is no MDM with Halo. The Army does not control the users device and cannot see beyond its own cloud boundary.

Before BYOD, one of the things we consistently heard from our users was that they didnt want their cellphones to be monitored or wiped if there was any potential [data] spillage, Iyer acknowledges.

The Army G-6 is confident enough in the privacy and security of Halo that I was told that there would be no obstacle to users having it on their phones - right next to Tinder, Reddit, or even TikTok.

Convenience or Burden?

As noted, adoption will be key to BYOD. General Morrison notes that the cost savings it may help the Army realize are up there in terms of importance with the productivity gains and security expected with BYOD. Its success in delivering on this trio of elements will determine a path beyond the current Pilot.

We will do due diligence on whether it fiscally makes sense to move this forward, Morrison affirms.

Users may ultimately have to weigh the convenience of using their own devices for official business with the cost. Some observers have already questioned whether BYOD simply shifts the burden of ownership of appropriate devices with sufficient data plans, identity security, and personal accountability from the government to the individual.

Having the right phone may or may not be a hurdle. In fact, my discussions with the G-6, General Morrison, Dr. Iyer and Hypori illustrated some cloudiness on the issue.

According to the G-6 there will be a list of approved devices which would not include phones no longer supported by their original equipment manufacturers like older Android and Apple versions. An iPhone 6, for example, wouldnt be acceptable. (Nor presumably, would a Huawei phone.) A signed user agreement for BYOD would also require that device owners maintain the latest security updates to remain eligible to work via the app.

However, Raj Iyer differed with the strict notion of approved devices, telling me that a user could bring just about anything to BYOD. Because it is an unmanaged solution, there are no specific requirements for what cellphone you bring. God forbid if you have a BlackBerry somewhere, that might work too.

I was later told Dr. Iyer was joking about the BlackBerry but the impression is that almost anything goes. To be sure I checked with Hypori CEO, Jared Shepard.

Shepard re-emphasized that Hypori Halo is a zero-trust platform which assumes that all edge devices are compromised. By design, it does not allow interaction of data from the protected environment with the device.

But he added, As a Security best practice we recommend that only devices that are still supported [updated and patched] by the manufacturers be allowed. This allows a tremendous amount of flexibility for devices new and old [many 4-6yrs old or more]. Currently iPhone 6 and 7 are still supported by Apple.

We will learn how this capability reacts to different kinds of phones that are out there, Morrison concludes.

As with other aspects of BYOD, the Army will have to have consistent messaging on its user requirements. These include identity. According to Iyer, BYOD employs multi-factor authentication (MFA, passwords augmented by scanning a fingerprint or entering a code received by phone for example).

However, the user identification system employed may also limit devices that can be used with BYOD. For example, Cisco Systems Duo MFA device requirements include a Secure Startup mode and a Cisco-approved operating system (Android 7 or higher) among other things.

Dr. Iyer points out that the Armys enterprise IT management system not only identifies but tracks BYOD phone locations. If a phone operating in Washington DC pops up three hours later in China, somethings obviously wrong. Devices will generally have to indicate active use inside the U.S. While the Army wont have access to personal data, dropping a GFE device wont allow users to go un-tracked.

Iyer says he has seen tremendous excitement about BYOD on social media, suggesting a population eager to embrace the scheme. But given its rollout largely to a group of more senior Army and civilian users, there may be less enthusiasm for yoking ones personal device (and consumer data plan) to BYOD than for a broader cross-section of the Army.

Indeed, one senior Army National Guard officer with a background in cybersecurity told me that while he thinks BYOD may be a useful convenience in the future, hed likely stick with his GFE. Since BYOD is strictly voluntary, potentially eligible users could elect to stay with their government furnished phones prompting a question as to whether personnel who decline to participate might worry about the career implications of taking a pass on BYOD.

This is not going to be viewed favorably or unfavorably, Dr. Iyer assures. I believe that the majority of our users will want it.

Kenneth McNeill thinks people will eventually get comfortable with the idea and says theres already a sizeable group of Guardsmen and Reservists volunteering. General Morrison characterizes early adopters as BYOD champions, people who are helping craft the tactics, techniques and procedures for its use. As Phase III progresses the Army will evaluate its expanded mix of users, continually reassessing the Pilot and iterating the app. How BYOD will ultimately take shape isnt known yet Morrison acknowledges.

Were being very pragmatic, he stresses. That includes putting BYOD through several legal reviews. Army personnel and DoD civilians will have the last word, ultimately making it clear to the service whether theyre comfortable enough with the privacy, security, cost and convenience of personal devices as a gateway to the Army cloud to bring their own.

Go here to read the rest:
A Plan to Let Soldiers Interact with the Army Cloud Using Their Own Devices Got a Bit Clouded - Forbes

Programming languages: One in four Go developers are already using this ‘most requested’ feature – ZDNet

Getty Images/Nitat Termmee

About a quarter of developers using Google's open source Go programming language have started using "generics" a highly demanded feature that was missing until this year and while developers worry about supply chain security, they're ill equipped to respond to vulnerabilities.

Go gained generics in Go version 1.18 released in March, when it was described as 'Go's most often requested feature' so it's not surprising it has since been quickly adopted. According to the June 2022 Go developer survey, over a quarter of the 5,752 respondents have started using generics in their Go code. Go is the 16th most popular programming language, according to developer analyst, Redmonk's January 2022 rankings.

Todd Kulesza, a UX designer on Go, noted in a blogpost that addition of generics was welcome, but noted that about a third of developers are running into some limitations of its initial implementation.

Generics, or support for type parameters, brings more type safety to Go and improves productivity and performance. Some 86% of respondents were aware generics shipped in Go 1.18 and 26% had used it, with 14% already using generics in production or released code. However, 54% said they didn't need to use generics today, while 12% had used generics but not in production code.

Other obstacles to using generics was that linters didn't support them while 26% reported using a pre-1.8 release or being on a Linux distribution that didn't provide Go 1.18 packages.

But 10% reported that using generics had resulted in less code duplication.

Kulesza says worries over vulnerabilities in Go dependencies are a "top security concern". Only 12% of developers were using tools like fuzz testing on Go code. A sizable 65% of developers were using static analysis tools but only 35% of them use it to find vulnerabilities.

The survey found that 84% use security tooling during CI/CD time, but this was often too late in the development cycle as developers want to be notified about a vulnerability in a dependency before building up on it.

The Go team this week also launched new vulnerability management tools and a vulnerability database for Go based on data from Go package maintainers. Go 1.18 was also the first version to feature fuzzing in its standard toolchain. The Go fuzz tests are supported by Google's open source fuzzing tool OSS-Fuzz.

These are all activities the NSA recently recommended for developers to do to improve software supply chain security and secure coding practices, which came into focus after the 2020 SolarWinds breach.

The Go survey highlights some problems developers face.

Fifty-seven percent of developers reported having difficulties evaluating the security of third-party libraries. Kulesza notes GitHub's dependabot or the Go team's govulncheck can assist here. In fact, Dependabot was by far the most common way respondents learned of a vulnerability in a dependency.

However, only 12% reported conducted an investigation to see whether and how their software was impacted by a vulnerability. It found 70% of those who did investigate a vulnerability's impact found the process of impact analysis the most challenging. They also reported it was often unplanned and unrewarded work.

The most popular code editor for Go developers was Microsoft's cross-platform Visual Studio Code (VS Code), which is used by 45% of respondents, followed by GoLand/IntelliJ (34%), Vim/Neovim (14%), and Emacs (3%).

Some 59% of respondents developed on a Linux machine, followed by 52% on macOS, and 23% on Windows, with 13% using the Windows Subsystem for Linux. By far the most common platform to target was Linux at 93%, followed by Windows at 16%, macOS at 13%, and IoT devices at 5%.

Continue reading here:
Programming languages: One in four Go developers are already using this 'most requested' feature - ZDNet

Changing the horizon through open source cooperation – The Register

Webinar There is nothing quite like cooperation in any walk of life to make us feel better about the human species and foster progress. In our early hunter-gatherer days it was working together that ensured mammoth-hunting success and the very existence of the open source community is another example of an inspiring force for good.

Intel has been a part of this community since the pioneer days of open source activity and has gone on to develop new approaches offering system choice and flexibility to infrastructure developers and engineers, including its work through the Linux Foundation's Open Programmable Infrastructure Project (OPI) involving leading semiconductor and systems makers.

OPI is foundational, flexible, and super-smart. It can aid in building frameworks, support any hardware, create complex open application ecosystems, and integrate existing open source elements, not least building new APIs for IPU and DPU-driven functions.

Join Rob Sherwood, NEX Cloud Networking Group CTO at Intel and Situation Publishing's Nicole Hemsoth on 13th September at 1pm BST, 8am EDT and 5am PDT to hear everything there is to know about the present and the future of open source infrastructure programming. The dynamic duo will take a forensic look at the Infrastructure Programmer Developer Kit (IPDK), and what Intel sees coming down the line for the OPI.

Register for this webinar here and we will send you a reminder.

Sponsored by Intel

View original post here:
Changing the horizon through open source cooperation - The Register

Startup Reveals A Revolutionary Open Source Image-to-Text Generator – Open Source For You

Rabat Although AI picture generators are no longer groundbreaking, a London-based business is making waves online for introducing a text-to-image AI generator that could revolutionise the industry. According to convergent accounts, the Stable Diffusion tool depends on open source image synthesis and machine learning to feed algorithms old data and allow them to generate new input without any programming.

Stable Diffusion, a deep learning technology, would enable users to virtually produce imaginative graphics utilising two-word key phrases or more. Before Stable Diffusion, the technologys fundamental premise was widely accepted. But now that the technology is being made available online as an open-source tool, anyone can use it.

The gadget, which only made its debut two weeks ago, is quickly gaining popularityeven more so than its forerunnerswith some analysts asserting that it brings implications as big as the invention of the camera. The breakthrough in AI image synthesis that preceded Stable Diffusion appeared in 2014.

The first text-to-image tool DALL-E 2 was going to be released this year, according to the artificial intelligence research group OpenAI. The technology turns written text into a variety of visual information, such as realistic pictures and works of art with a sci-fi theme. Google and Facebook now Meta announced the debut of their own text-to-image generators not long after OpenAI revealed their model.

Stable Diffusion raises numerous ethical issues, much like any new technology that is available in open source. The tool is programmed not to produce any harmful content, such as propaganda, violent scenarios, or pornography, according to the original code. Since the source code is open, it would be possible to bypass these limitations.

The rest is here:
Startup Reveals A Revolutionary Open Source Image-to-Text Generator - Open Source For You

Passing the PyTorch – Protocol

Hello. and welcome to Protocol Enterprise! Today: why Meta just transferred stewardship of an important AI framework to the Linux Foundation, how last weeks California heat wave took out a Twitter data center, and the latest funding rounds raised in enterprise tech.

Meta is handing the reins for PyTorch, its popular open-source AI framework, to the nonprofit open-source software consortium Linux Foundation. PyTorch was designed to optimize deep learning, and gets its name from the AI programming language Python and open-source machine-learning library Torch.

The move shifts the commercial and marketing aspects of PyTorch to the Linux Foundations newly-launched PyTorch Foundation. But much of PyTorchs technical governance which has used a typical shared oversight model for years will stay the same, Meta engineer Soumith Chintala told me.

The transition could help chip away at the backlog of requests for PyTorch improvements.

Still, some worry that the Linux Foundation has too much power over enterprise tech.

The Cloud Native Computing Foundations flagship conference gathers adopters and technologists from leading open source and cloud native communities in Detroit, Michigan from October 24 28, 2022. Register now and join thousands of attendees, including maintainers for CNCF's 140 Graduated, Incubating, and Sandbox projects, either virtually or in-person.

Register to attend: In-person | Virtual

The global innovation race is well underway. What is the U.S. administration doing to stay ahead, and where is it falling short? What is the status of funding by Congress and in statehouses, and which areas still need investment? Is the U.S. doing enough to attract and retain top tech talent from around the world?

Join Protocol Policy for a virtual event on Sept. 27 at 10 a.m. PT as we dive into the U.S.s national strategy on innovation, whats working, what isnt and what policy changes we can expect from the year ahead. RSVP here.

The Cloud Native Computing Foundations flagship conference gathers adopters and technologists from leading open source and cloud native communities in Detroit, Michigan from October 24 28, 2022. Register now and join thousands of attendees, including maintainers for CNCF's 140 Graduated, Incubating, and Sandbox projects, either virtually or in-person.

Register to attend: In-person | Virtual

Thanks for reading see you tomorrow!

Visit link:
Passing the PyTorch - Protocol

Java Or Python For Android – Why Not Both! – iProgrammer

Should you choose Java or Python for your next Android project? You don't have to with Chaquopy, the Python SDK that lets you write Android applications in Python. Thanks to support from Anaconda, it is now both free and open-source.

Chaquopy is versatile. It allows you to write Android applications in full in Python or partially, together with Java. You can pick the most suitable tool for the part of the application at hand.

Each approach has its own distinct advantages. If you have server backend that is written in Python you can now use Python for the front end as well without paying the penalty of context switching to another tool or language, or in lacking expertise in another stack.The extra boon is that you can use your favorite Machine Learning Python libraries like SciPy, OpenCV or TensorFlow solely on your client/mobile phone without connecting to the cloud.

While the cloud still monopolizes the space where neural networks and their algorithms breed, things seem to be shifting with those elaborate algorithms looking to move on to and run offline on mobile devices. That includes their training too; the pictures, notes, data and metadata that reside in the device will also serve to train the network and aid its learning activities such as the recognizing, ranking and classifying of objects.

The difference is that now all of that is going to happen locally. As such, common deep learning user experiences that could be realized locally, would be scene detection, text recognition, object tracking and avoidance, gesturing, face recognition and natural language processing.

For instance, apps that help in organizing photos on the user's phone, utilizing an algorithm that combines artistic photography principles with deep learning technology which can sort photos based on topics, locations, and events , and can also recognize the best, based on ranking system it employees.

Working offline and shifting business from the cloud and onto the device, has distinct advantages .Online processing requires the presence of either a WiFi or mobile connection which can be sluggish as well a host of privacy concerns. Then looking at it from an ever practical perspective, multiple concurrent requests from thousands of client devices can easily overload the cloud based service and leave the client machine prone to long delays in getting a response, or even to fully scaled denials of service.

So imagine having Python's ML libraries at your disposal on Android. This is happening thanks to Chaquopy. This goes beyond Python however;Java enthusiasts rejoice since Chaquopy through its APIs allows them to access those libraries from their Java code.

Don't get me wrong, I'm not taking away Chaquopy's other charismas like that of building UIs, accessing native Android APIs or working in sync with Java; it's just that having access to Python's ML ecosystem in a mobile device stands out.

Chaquopy is distributed as a plug-in for Androids Gradle-based build system, and you can access all native APIs and even build your app entirely in Android Studio. Also through simple APIs you can call Python code from Java and Kotlin, and vice versa. It can be used in any app which meets the following requirements:

In your projects top-level build.gradle file, the Android Gradle plugin version should be between 4.1 and 7.2. Older versions as far back as 2.2 are supported by older versions of Chaquopy.

The Android plugin may be listed as com.android.application, com.android.library or com.android.tools.build:gradle.

minSdkVersion must be at least 16. Older versions as far back as 15 are supported by older versions of Chaquopy.

Chaquopy's previous licensed locked down versions would work as advertised but only for five minutes of runtime. Open source projects were given a free license but commercial ones had to get a paid license. Not anymore. Thanks to support from Anaconda, Chaquopy is now free and open-source, with its SDKs full source code available on GitHub under the MIT license.The first open-source version is 12.0.1, released late July which apart from removing the license restrictions, is identical to version 12.0.0.

For examples of how to use Chaquopy, see the following apps:

That being said,Beewareis the closest to rival in that it allows using Python for cross-platform development.This means that you can have a single user interface across Android,IOs,Windows and Mac, thus with Beeware your app will have a standard look across all supported platforms while with Chaquopy you'll have just that native Android app experience.

But Chaquopy's strongest selling points are the deep integration with Android's development tools and its larger support for third party Python libraries. As noted in BeeWare'smanualitself support for third party Python libraries is limited:

On desktop platforms (macOS, Windows, Linux), any pip-installable can be added to your requirements. On mobile platforms, your options are a little more limited - you can only use pure Python packages i.e., packages that do not contain a binary module.

This means that libraries like numpy, scikit-learn, or cryptography can be used in a desktop app, but not a mobile app. This is primarily because mobile apps require binary modules that are compiled for multiple platforms, which is difficult to set up.

Its possible to build a mobile Python app that uses binary modules, but its not easy to set up well outside the scope of an introductory tutorial like this one. This is an area that wed like to address - but its not a simple task. If youd like to see this added to BeeWare, please consider supporting the project by becoming a member.

Chaquopy on the other hand has got that elusive support. Looking at itsnative package repositorywe find that amongst others it has support for matplotlib, numpy, opencv, pandas,scikit-learn,scipy and tensorflow. As well as the packages listed here, Chaquopy also supports most pure-Python packages on PyPI.

Ultimately Chaquopy gives you options. Go full stack Python. Keep the user interface in Java and connect to Python on the server or to Python's libraries on device. Access Java libraries from Python and vice versa. Keep the Java and Kotlin bits focused on the Android part and keep the Python bits focused on what Python does best.

ChaquopyChaquopy on GitHub

Fast.ai's Practical Deep Learning for Coders Has Been Updated

Knock Yourself Out With 91 Python Videos

To be informed about new articles on IProgrammer,sign up for ourweekly newsletter,subscribe to theRSSfeedandfollow us on Twitter,Facebook orLinkedin.

Make a Comment or View Existing Comments Using Disqus

or email your comment to: comments@i-programmer.info

Read the rest here:
Java Or Python For Android - Why Not Both! - iProgrammer

Use These 4 Tips to Attract and Retain Software Developers – Entrepreneur

Opinions expressed by Entrepreneur contributors are their own.

It's no secret that the way business is done has changed dramatically over the past few years. The widespread digital transformation has forced businesses across industries to recognize the value of the people who are building our new digital world: software developers.

While many tech businesses are grappling with layoffs and hiring freezes, data shows that developers have never been more in-demand, with thousands of new developer positions opening up every day. On the heels of the Great Resignation, we are seeing a developer shortage that is incapable of meeting the sky-high demand. And unfortunately, the gap shows no signs of closing.

DigitalOcean recently surveyed over 2,500 developers around the world on their working environments, job satisfaction and the biggest challenges they're facing at work. What we found should be of concern to any business leader trying to keep pace in the digital world. Over 25% of experienced developers those who have been in the workforce for over a year have started a new job within the last year, and 42% of those who didn't, are considering it. In other words, developers are quitting their jobs at a rate that is almost double the general average.

To ensure your organization isn't hit with resignations, it's important for tech leaders to rethink their strategies for recruiting and retaining developers and technical staff. Here are four recommendations below:

Related: The Demand for IT Is Here to Stay

Our most recent Currents survey shows that compensation and a preference for flexible and/or remote work environments are among the main reasons developers are thinking about changing or have already changed employers. It's fair to question whether or not tech giants like Tesla, Meta, Salesforce, Apple, Google and others have shot themselves in the foot with their rigid and sometimes controversial back-to-office plans.

DigitalOcean has had a flexible work policy for a long time, with over half of our employees working remotely prior to the start of the pandemic. We are now fully remote and provide access to co-working space to anyone who wants it. Based on our low attrition rate, this approach has proven to resonate with our team and particularly those with deep technical skills.

Developers are independent, digital-native people. Whether it be fully remote, hybrid or fully in-office, the important thing is to first listen to developers' needs and then offer them the freedom to choose which working environment works best for them.

Related: The Employee Retention Master Tip for Technology Companies

The developer community is as diverse as the companies they support and is made up of some of the smartest technical minds in the world. This community, as varied as they are, finds open-source projects to be a place where they can gather, collaborate and contribute. However, not many companies are providing their developers the time or compensation to contribute to these projects, despite the fact that 64% of companies are using such code for more than half of their software.

It's increasingly important to listen to what it is that is important to your staff's needs and wants. While you may not be able to deliver on every single wishlist, listening will help you build trust with your employees, and as a bonus, you may identify opportunities for your business. Giving time for developers to contribute to projects they care about (like open source) while on the clock, can show you understand what is valuable to them and also help strengthen your tech stack.

Related: Why Low-Code Platforms Are the Developer Shortage Solution People Aren't Talking About

Developers are known to be lifelong learners, and their role has evolved significantly in recent years. They are constantly learning new skills and programming languages, as well as adopting cutting-edge technologies and methodologies, all in the name of keeping up with the pace of innovation. Businesses need to be sure that developers have the educational resources, courses, training, tutorials and mentorship to keep their skills up to date.

This is true not only for career developers but for people who are brand new to the field, too. The hot developer job market has opened up a door for the next generation of developers many of them self-taught, pivoting from a totally different field or coming from non-traditional educational paths like coding boot camps who may face a steep learning curve.

It is smart for business leaders to invest in their staff, particularly those in technical fields. The opportunity for ongoing education and reskilling will be enticing to any developer candidate.

Another common grievance from developers is a lack of time and resources to work on projects. This challenge is likely due to too much time being spent on more menial tasks like cleaning up code and creating documentation.

Arming developers with a simplified toolkit takes the manual work off of their plates. This helps developers build faster and also frees up time for them to spend on creative, strategic work that actually makes an impact on the business.

Software developers are a unique group of people who have long had many stereotypes held against them in the corporate world. Now is the time for businesses to reverse those stigmas to gain a better understanding of this group and what they need to be successful survival in the digital age depends on it.

See more here:
Use These 4 Tips to Attract and Retain Software Developers - Entrepreneur

The Open Source Ztachip Is a RISC-V Accelerator for Edge AI and Computer Vision Applications – Hackster.io

Embedded developer Vuong Nguyen has released an open source RISC-V accelerator designed to boost the performance of edge AI and computer vision tasks up to 50 times and you can try it out yourself by loading it onto a field-programmable gate array (FPGA).

"Ztachip is a RISC-V accelerator for vision and AI edge applications running on low-end FPGA devices or custom ASIC [Application Specific Integrated Circuit]," Nguyen explains. "An innovative tensor processor hardware is implemented to accelerate a wide range of different tasks from many common vision tasks such as edge-detection, optical-flow, motion-detection, color-conversion to executing TensorFlow AI models."

The accelerator is built around the free and open source RISC-V instruction set architecture (ISA), and comes with some impressive performance claims: Compared to a standard RISC-V core, without specific optimizations for machine-learning workloads, the ztachip can accelerate performance between 20-50 times even outperforming RISC-V chips which include the recently-ratified vector processing extensions.

The accelerator comes complete with what Nguyen calls "a new tensor programming paradigm," which is part of the secret behind the acceleration on offer. Despite its performance, though, the ztachip core is built to be resource-light running happily on relatively low-end FPGA devices, which should in turn translate to being realizable in silicon without too much cost or complexity.

The core can be run on the Arty A7 FPGA development platform, using a camera board as input. (: Vuong Nguyen)

Ztachip is available to run in simulation or on Altera or Xilinx FPGAs, using a wrapper layer to ease porting to additional platforms when required. A demonstration of the accelerator running on an Arty A7 FPGA development board showcases the use of a range of networks and tasks, including TensorFlow Mobinet image classification, SSD-Mobinet object detection, Canny edge detection, Harris-Corner point-of-interest detection, motion-sensing, and a neat multi-tasking demo which runs object, edge, point-of-interest, and motion detection simultaneously.

The ztachip source code is available on GitHub under the permissive MIT license, with instructions on getting started with deploying the core to an FPGA.

Read this article:
The Open Source Ztachip Is a RISC-V Accelerator for Edge AI and Computer Vision Applications - Hackster.io

Polkadot (DOT/USD), Cosmos (ATOM/USD) The Open-Source Blockchain Application Platform, Lisk is Develo – Benzinga

Lisk is a blockchain application platform that envisions a world where blockchain technology is accessible to everyone.

To make that happen, it has created a suite of open-source blockchain application development tools that enable developers to build blockchain apps using JavaScript and TypeScript meaning they dont have to learn a new programming language to start building with blockchain.

That, combined with Lisk Grant Program and tireless commitment to improving the Lisk Platform, is what the platform says is helping shape a vibrant and diverse ecosystem. While some of its features and functions are still in development, the ecosystem thats emerging might give users a taste of what the future could look like as blockchain technology becomes more scalable, interoperable and accessible.

The team at Lisk describes the Lisk plastform as an ecosystem where developers and entrepreneurs can connect to create their own projects with the tools built by us. To bring more of those developers and entrepreneurs into this ecosystem, Lisk is offering grants to support developers who want to build apps using Lisks open-source app-building platform.

Thats helped blockchain developers work on innovative projects like virtual reality (VR) games, educational platforms and social media platforms.

Topas City, for example, will be an immersive virtual world where users can explore a dystopian city and earn tokens by playing arcade games and trading in the marketplace. When theyre not earning, they can spend time socializing with other Topas residents at the 99 Bar or hanging out in their virtual apartment or inside gated communities, luxury apartments and a private bar if theyre lucky enough to nab one of the rare Elite cards.

Enevti will become a non fungible token (NFT) social media platform that moves NFTs beyond just art and collectibles, giving influencers new ways to engage with their audience. Specifically, the platform will offer influencers a way to make NFTs into smart utility assets that can be distributed to fans who can redeem them for things like one-on-one video calls, admission to exclusive events and physical gifts.

Meanwhile, Kalipo is a decentralized autonomous organization (DAO) platform that will provide the tools needed for groups to collaborate online in a more democratic and transparent way. Those tools include online voting mechanisms that make shared decision-making easier and online fund management tools that bring transparency to raising and using funds for the organization. These tools can be used by groups of all sizes and all purposes from start-ups and nonprofits to neighborhood organizations or parent-teacher committees.

As the research team continues to develop the platform and network, it reports nearing the finish line on achieving interoperability inside the Lisk ecosystem meaning the apps built on the platform will, in the coming future, be able to communicate and transact with each other.

Having published the core and supporting improvement protocols that would make that interoperability possible, the team is in the final phase of improving the interoperability solution and officially launching the Lisk blockchain application platform.

When that happens, users will be able to easily navigate between the different apps in the ecosystem and transfer NFTs and Lisk LSK/USD tokens between them quickly and efficiently.

Once the Lisk ecosystem is fully interoperable, the team has its sights set on building cross-chain bridges that would make it interoperable with other blockchain networks, like Ethereum ETH/USD or Cosmos ATOM/USD & Polkadot DOT/USD expanding the same kind of connectivity inside the Lisk Ecosystem across any blockchain network.

This post contains sponsored advertising content. This content is for informational purposes only and is not intended to be investing advice.

Featured photo by xresch on Pixabay

Read more:
Polkadot (DOT/USD), Cosmos (ATOM/USD) The Open-Source Blockchain Application Platform, Lisk is Develo - Benzinga