Frictionless Enterprise – the Tierless Architecture of composable IT – Diginomica

(Source: diginomica.com)

Although Frictionless Enterprise is about much more than technology, it is fundamentally shaped by technology. Therefore the Information Technology (IT) infrastructure an organization adopts is crucial to its ability to thrive in this new digitally connected era. This is no skin-deep change. Digital technology has evolved enormously since the advent of the Internet and the emergence of cloud computing, and is continuing to evolve rapidly. So too has the way that the IT function operates and engages with others across an organization. In this chapter, we map these changes and their implications for enterprise IT.

Putting computing on the open network of the Internet moving it from islands of disconnected isolation into a global fabric of near-ubiquitous connectivity has forced it to adopt a more networked, atomic architecture, which we'll explore in detail below. Just as important, this has also enabled new ways of working for those who design and operate IT.

The early days of Internet connectivity made it possible for techologists to co-operate globally on software design, leading to the growth of open source software. Much of our most important infrastructure is now built on open source software, leveraging the pooled knowledge and experience of the community to continue to evolve and enhance it. Better connectivity allowed software engineers to work in agile DevOps teams, where the people who write the software work side-by-side often virtually with those who put it into operation. Meanwhile, the emergence of public hyperscale cloud computing prompted the development of more automated ways of deploying software. This in turn enabled the evolution of Continuous Integration and Continuous Delivery (CI/CD) to allow the rapid delivery of changes and new capabilities in small increments.

All of these changes in how IT works have been enabled by growing connectivity and have reinforced the consequent atomization of software to allow more rapid change. For example, the reorganization of software development into smaller DevOps teams was accompanied by the emergence of widely accepted standards for easily connecting software components using Application Programming Interfaces (APIs). In an inverse validation of Conway's Law, changing the communication structure of IT made these new patterns of software design inevitable.

A flatter, more modular IT architecture is emerging in response to this more digitally connected environment. In the old world of disconnected systems, each system was built as a vertical stack with several discrete tiers. The end user interacted with an application interface in the upper tier. Behind this User Interface (UI) sat the next tier of application servers, where functions were processed. In turn, these application servers stored and fetched data in the final database tier. The entire stack was optimized for a specific application, and accessing the underlying data or executing functions for any other purpose required complex integration technology or cumbersome workarounds.

The new enterprise IT architecture decomposes all of these tiers and makes their components readily available via APIs. Instead of a 3-tier or N-tier stack of UI, application server(s) and database, there is a Tierless Architecture of engagement, functions and resources:

The new model is tierless an open network ecosystem in which any function or resource becomes available through APIs to any qualified participant. Whether those functions and resources are data stores, microservices, system resources, serverless functions or SaaS applications and processes, the API layer makes them equally available as autonomous, multi-purpose, composable services. They connect up to produce results and then present the outcomes to the end user through an engagement layer. This combination of headless engagement with serverless functions and resources defines the new architecture.

Here's what we mean by headless engagment and serverless functions and resources:

The latest developments are unfolding both at the presentation layer (the 'head') and at the underlying services layer (the 'servers'). Like many disruptive technologies in their early phases (think 'horseless carriage' and 'wireless receiver'), these two trends are named for what they replace rather than for what they bring ...

Today's emergent systems are headless because the presentation layer isn't fixed and therefore the user experience can take many different forms. A commerce system can be experienced on the web, on mobile, or through in-store gadgetry, while an enterprise application might be delivered as a web app, a mobile app, or within a messaging platform such as Slack or Microsoft Teams. Rather than headless, they are many-headed, with unlimited choice as to how to present the user experience.

The underlying systems are serverless because the servers on which all of the computing runs are hidden away behind a layer of application programming interfaces (APIs). An infinite variety of interchangeable resources is available through this API services layer, ranging from custom microservices built by an organization's in-house IT team, to serverless functions delivered from cloud providers, to complete SaaS applications, and much more besides. Instead of being limited to what you are able to build and provision from your own servers, there is a global network of on-demand services at your disposal.

This new architecture cuts across the old functional silos that defined traditional enterprise applications, replacing complex Enterprise Application Integration (EAI) between monolithic application stacks with a more flexible ecosystem of autonomous components that connect through standardized APIs and contracts. The implications are far-reaching:

... [T]he traditional bundle of functionality that makes up an enterprise application has been broken down into separate components that are then recombined in new ways to provide a different, more streamlined outcome that wasnt possible without the new technology. This is a phenomenon known to economists as unbundling and rebundling and its invariably a harbinger of disruptive innovation in a given field as new patterns of consumption become possible.

One of the first sectors to embrace this new composable architecture were digital experience (DX) developers those who build websites and mobile apps that deliver dynamic content and e-commerce. In the mid-2010s, a new breed of vendors started offering 'headless' content and commerce platforms, mostly built on open-source technologies. Shortly afterwards, the term Jamstack was coined by Netlify founder Matt Biilmann to describe the architecture, where JAM stands for client-side JavaScript, server-side APIs and static front-end Markup. More recently, leading vendors and consultancies in this space formed the MACH Alliance as an industry advocacy group for a more expansive definition called MACH, which stands for Microservices based, API-first, Cloud-native SaaS and Headless.

The recent inaugural MACH One conference demonstrated the growing enterprise adoption of this new architecture in composable commerce and DX, with speakers from retailers and consumer brands including Asda, Kraft Heinz, LEGO, Mars and River Island. All of them bear witness to the rapid implementation, smooth scalability and ongoing flexibility of the architecture, as well as its impact on IT's relationship with the business. As Rainer Knapp, Global Director of IT & Digital at Wolford puts it:

Using this freedom now to implement whatever comes in mind and makes sense for the business is something that will change the behavior I think a lot in the future ... I consider myself more being a business manager, honestly, with the advantage of having the lever of IT in his hand, than as a pure IT techie.

Another vector in the shift to Tierless Architecture and composable IT can be seen in the rise of messaging platforms as another way to interact with enterprise applications and resources. Known as conversational computing, this began with the emergence of voice assistants, chatbots and messaging apps, in which the user could ask an intelligent software agent to query data or perform actions without having to go into the underlying enterprise application. This makes those applications 'headless', with the messaging platform acting as the engagement layer and accessing their functions or data via APIs.

Digital teamwork platforms such as Slack and Microsoft Teams quickly recognized the benefits of connecting into external functions and resources to bring them into the user's flow of work right there in the messaging app. Microsoft has brought its Power Apps custom app builder into Teams and added powerful data capabilities with Dataverse for Teams. Slack also has an app builder and an ecosystem of partner app connections along with workflow automation and data connectivity. Its founding CEO Stewart Butterfield sees huge potential in connecting best-of-breed apps:

Slack when it's really working for individual organizations on the inside becomes this lightweight fabric for systems integration. And that's just as valuable across boundaries as inside.

We've already discussed in an earlier chapter the core role of digital teamwork in Frictionless Enterprise, and the Collaborative Canvas that underpins it. This teamwork platform is a critical element of the IT infrastructure because, once it has all the necessary connections into other systems, it forms the primary engagement layer for everyone's work. Just as we've seen with headless content and commerce, separating that engagement layer from underlying monolithic applications paves the way towards replacing them with a more composable set of functions and resources.

The impact of these new approaches on the IT function, as Wolford's Knapp says, is that it becomes a more engaged participant in achieving business goals, rather than simply a provider of technology at the behest of the business. In enterprises that operate large portfolios of SaaS applications, this has given rise to a new tribe of IT professionals who call themselves business systems specialists. Rather than operating in a discrete functional silo, they see themselves as embedded in the business and focused on its goals, and look to deliver tangible business value in short, agile projects. Their philosophy echoes what we've heard from MACH adopters.

Among teams like these, DevOps has been extended by concepts such as such author Marty Cagan's notion of product management, in which small, empowered product teams bring together software developers, product managers and designers to focus on specific goals. This is in line with the trend towards forming what Gartner calls fusion teams, which the analyst firm says "blend technology and business domain expertise to work on a digital product." Such teams are likely to proliferate with the spread of low-code and no-code development tools, where the involvement and support of pro coders from the IT function can help avoid common pitfalls. My preferred term for this combination of tech and business talent is 'co-code', as I recently explained:

There's no need to set up schisms between business people and IT when they can achieve far more by working in harmony ... Enterprise IT can put governance in place and manage the creation of the building-block components, while supporting business users as they make prototypes, test new functionality, or assemble their own automations.

In each of these examples, IT becomes engaged as a partner with business colleagues in achieving results. This pattern of delivery has much in common with the XaaS Effect that we discussed in an earlier chapter on customer engagement, but in this case applied to an internal function.

Releasing data from legacy application silos is becoming a priority as organizations seek to catch up with the on-demand, real-time cadence of Frictionless Enterprise. Every sphere of activity aspires to be data-driven, using connected digital technologies to achieve pervasive access to data that's as fresh as possible, and delivered in the context of everyday operational decision-making. In Tierless Architecture, data is set free from application silos and becomes just another resource that's accessible through the relevant API.

But despite the growth of platforms such as Snowflake and Confluent that help organizations marshall and analyze data at speed, there is still work to be done to turn data more readily into transferable information. Traditional applications have optimized their datasets for their own internal operations, which means that initiatives to build common ontologies for datasets such as a Customer Data Platform are still at a very early stage. In other fields, such as the work graphs built by digital teamwork vendors, no one has yet started to think about creating standards to allow the interchange of graph data. This is one area where the tooling for Tierless Architecture is still relatively immature.

As with any new technology paradigm, Tierless Architecture will face resistance, especially while the relevant skills are not mainstream and the toolsets and techniques are still evolving:

These new technology patterns require IT professionals and developers to abandon familiar, trusted ways of working. Their novel approaches are less well documented and therefore often appear less effective at first glance. Established vendors whose products cannot adapt to the new paradigm will stoke skepticism about its claimed advantages. There are many arguments and debates ahead.

The landscape becomes further confused when established vendors latch onto up-and-coming buzzwords such as 'headless' and apply them to existing products while retaining many of the characteristics of a tiered stack. This became so prevalent during the rise of cloud computing that the phenomenon became widely known as cloudwashing. To guard against attempted 'MACH-washing', the MACH Alliance has a rigorous certification program. Enterprises must be on their guard against fake composability.

While some vendors will drag their feet, many others are already adapting. There's a growing trend amongst established vendors to move towards composable platforms. Meanwhile, a new generation is coming through to take the place of the laggards. This new wave of vendors have grown up with a connection-first outlook:

They build on whatever technology comes to hand open source and cloud infrastructure, connected services. For them, competitive advantage doesn't come from owning the stack, it comes from being free to select the best available resources for the moment ...

The conventional wisdom is to maximize what you own, but in today's hyperconnected cloud world, there's a new maxim focus on whatever it is you can scale first, and faster, than anyone else. For everything else, use what's already out there.

Earlier this year, I asked Massimo Pezzini, former Gartner analyst and an expert on enterprise integration and automation, for his views on the composable future of enterprise IT. Here's what he told me:

The application portfolio of a company in five years from now is going to look much more different than it is today in terms of the architecture more building blocks composed together and less and less of these gigantic application suites, which are super-rich in functionality, but also very inflexible, very hard to deal with ...

At some point, I believe that the application landscape of an organization will look like a broad set of elementary business components accounting, payables, receivables, tax calculation, what have you possibly coming from different vendors. The end-to-end process, the end-to-end application, will be built by these fusion teams, using orchestration tools. Teams will use these tools to aggregate and compose together these component building blocks at the backend, and rearranging them and shaping them in the way which fits with the company's business needs.

To be ready for this future, enterprises need to begin their journey to Tierless Architecture now, and IT teams must engage with business colleagues to ensure it delivers maximum value.

This is the fourth chapter in a series of seven exploring the journey to Frictionless Enterprise:

You can find all of these articles as they're published at our Frictionless Enterprise archive index. To get notifications as new content appears, you can either follow the RSS feed for that page, keep in touch with us on Twitter and LinkedIn, or sign up for our fortnightly Frictionless Enterprise email newsletter, with the option of a free download of The XaaS Effect dbook.

More here:
Frictionless Enterprise - the Tierless Architecture of composable IT - Diginomica

UWMadison moves up U.S. News list, ranked 38th overall and 10th best public – University of Wisconsin-Madison

Bascom Hall is pictured in an aerial view of the University of WisconsinMadison campus. Photo: Jeff Miller

The University of WisconsinMadison has been ranked 38th overall and 10th among public institutions (both in three-way ties) inU.S. News & World Reports 2022-23 rankingsof best colleges.

Last year, UWMadison was ranked 42nd in a five-way tie and 14th among public institutions.

The rankings, released today, include 440 national doctoral universities and are in the 2022-2023 edition of Americas Best Colleges.

As one of the worlds top universities, UWMadison delivers a high-quality education that provides life-long value to our students, said Chancellor Jennifer L. Mnookin. While rankings are only one measure of excellence, Im pleased to see so many areas of our success reflected.

U.S. News gathers data from and about each school regarding undergraduate academic reputation, student excellence, faculty resources, expert opinion, financial resources, alumni giving, graduation and retention rates, graduate rate performances and social mobility. Each indicator is assigned a weight based on U.S. News judgments about which measures of quality matter most.

UWMadison continues to perform especially well in peer reputation and was ranked 28th overall and seventh among public institutions for the second year in a row.

The university also moved up in several categories including 51st in Financial Resources, up from 52nd last year, and 57th in Student Excellence, up from 59th last year.

UWMadison continues to improve in Faculty Resources and was ranked 84th overall, up from 107th last year. The university has risen 63 places in this ranking category in the past four years. Institutions ranking highly in this category are those with high faculty compensation and small class size along with highly qualified faculty and instructional staff.

We know how valuable our faculty members are, and thats why we have prioritized recruiting and retaining outstanding people to enhance our educational programs, says John Karl Scholz, Provost and Vice Chancellor for Academic Affairs. That commitment, along with our extraordinary University and Academic Staff, continues to bolster the universitys standings in these rankings.

The six factors used to calculate the Faculty Resources portion of the ranking are: index score for class size, advantaging institutions with smaller class sizes; the proportion of instructional staff with the highest degree in their field; the student:faculty ratio; the proportion of faculty who are full time; and faculty salary, which is defined as the average faculty pay (salary only) for assistant, associate and full professors in the 2020-21 and 2021-22 academic years, adjusted for regional differences in the cost of living based on open source data from the Bureau of Economic Analysis regional price parities December 2021 dataset.

UWMadison maintained its ranking of 39th in Graduation and Retention Rates for the second year in a row with an 89 percent six-year graduation rate and a 95 percent first-year retention rate.

U.S. News also evaluated undergraduate engineering, business, computer science programs and nursing.

UWMadisons undergraduate engineering program ranked 13th overall (three-way tie), up from 15th overall last year (four-way tie), and 7th (two-way tie) among public doctoral-granting institutions for the third year in a row.

Ranked programs include 21st (two-way tie) in biomedical engineering, ninth (two-way tie) in chemical engineering, 14th in civil engineering, 16th in computer engineering, 15th (three-way tie) in electrical engineering, 25th (two-way tie) in environmental engineering, 12th (two-way tie) in industrial/manufacturing/systems engineering, 14th in materials engineering and 20th (three way-tie) in mechanical engineering.

UWMadisons undergraduate business program ranked 19th overall (four-way tie) and ninth (four-way tie) public, both for the second year in a row.It was ranked first in both real estate and insurance/risk management (two-way tie).

Other ranked specialties include eighth in marketing, 17th in accounting, 24th (four-way tie) in finance and 30th (six-way tie) in management.

UWMadisons undergraduate computer science program ranked 16th overall (seven-way tie), up from 18th last year, and eighth (four-way tie) among public universities, up from ninth last year. UWMadison was ranked 23rd (three-way tie) in artificial intelligence, sixth in computer systems, 17th (four-way tie) in data analytics and 11th (two-way tie) in programming.

UWMadisons undergraduate nursing program ranked 22nd (seven-way tie) overall and 17th (five-way tie) among public universities.

Other categoriesinclude:

Best colleges for veterans:18th overall and 10th among publics (both in three-way ties), up from 20th overall and 14th among publics last year. Institutions included on this list must be certified for the GI Bill, participate in the Yellow Ribbon Program or be a public institution that charges in-state tuition to all out-of-state veterans, must have enrolled a minimum of 20 veterans and active service members in the 2021-22 academic year and must be ranked in the top half of the institutions overall U.S. News ranking category.

Best value schools: 23rd among publics, based on a ratio of quality to price (overall rank divided by net cost), the percentage of undergraduates receiving need-based scholarships or grants and the percent of a schools total cost of attendance that was covered by the average need-based scholarship or grant aid.

Academic programs to look for: Institutions are nominated by presidents/chancellors/provosts and enrollment management/admissions leaders in several student experience areas, including Study Abroad, ranked 25th overall (five-way tie) and fifth among publics (four-way tie), and First Year Experience, ranked 42nd (seven-way tie) overall and sixth among publics.

Schools with the most international students: UWMadison is listed as a school with the most international students, with international students making up 10 percent of the student body. U.S. news does not rank this metric in its publication, but UWMadison had the 53rd highest percentage of international students among national universities.

To see the full rankings, click here.

Original post:
UWMadison moves up U.S. News list, ranked 38th overall and 10th best public - University of Wisconsin-Madison

Is Trump the Rosenbergs? – Jewish Journal

Many Americans would just love to throw the book at Donald Trump, perhaps the most polarizing person in American history. Any book would do. Preferably, a heavy one but what most have in mind is a law book that comes with prison time and a lifetime ban from public life.

His presidency started with a Justice Department inquiry into his possible involvement with Russian meddling in the 2016 election that catapulted him into the White House. Another investigation has commenced regarding the January 6th Insurrection and an alleged plot to overturn the 2020 election, keeping him in the Oval Office.

After two Senate Impeachment Trials, a criminal prosecution against the Trump Organization still ongoing in Manhattan, a civil case brought by the New York Attorney General into Trumps business practices, and a criminal probe in Georgia that involves alleged election tampering, one wonders how Trump has managed to accomplish anything while being so relentlessly preoccupied with legal matters.

So far, not a single one of those legal actions have yielded a criminal conviction or civil penalty against the former president.

Yet, Trump might end up being better known as an American defendant than president. His post-presidency continues to be mired in legal entanglements. Theres never a dull moment on the Trump docket sheet.

We now have an FBI search of his very own Shangri-La, called Mar-a-Lago, to retrieve classified, top secret, special-access-only documents that should have been left with the National Archives and Records Administration and might pose a national security risk while in his possession. No former president has ever had his personal residence raided, or searched, and possibly subject to criminal charges of any kind.

Naturally, the presidents many supporters at least half the country are wondering about the double standard. Hillary Clintons private server, used to send and receive thousands of classified emails while she ran the State Department, apparently presented no threat to the nation and warranted no prosecution. The Hunter Biden laptop, and what it might reveal about influence peddling with foreign entities and associated benefits to his father, has sparked little interest by the Justice Department.

Entering the presidents home without his permission. Rifling through his personal effects. Removing documents that may be personal or subject to Executive or Attorney-Client Privileges. Trump and his lawyers maintain that they were in continuous contact with the National Archives and had already returned 15 boxes, containing 100 classified documents, back in January.

A heavily redacted affidavit in support of the search, which was publicly disclosed last week, answered no real questions about this unprecedented action.

The Attorney General has intimated that the mishandling of these sensitive materials didnt just overstep the Presidential Records Act, which is not a crime, but possibly violated the Espionage Act of 1917. This would be the most severe crime of all a singular act of disloyalty possibly causing irreversible damage to Americas national security.

Criminal charges of this nature would reduce all other legal challenges to mere misdemeanors. After all, if the Espionage Act had been passed by the Continental Congress, Benedict Arnold would have been convicted and received the death penalty, had he not absconded to England during the Revolutionary War.

In more recent times, the leaking of state secrets is the reason why Chelsea Manning, Edward Snowden and Julian Assange were charged with violating the Espionage Act.

The Act was created shortly after the start of World War I to prosecute those who interfered with military operations and recruitment. The law has since been applied to punish insubordination, disloyalty and, most crucially, providing material support to Americas enemies.

Along the way, the Espionage Act clashed with the First Amendment. The freedom to express an opinion might be judged to interfere with the national defense. Supreme Court Justice Oliver Wendell Holmes clear and present danger test arises from just such a case, one in which the Espionage Act prevailed over the First Amendment.

Avowed socialists such as Eugene V. Debs and the Soviet-sympathizing magazine, The Masses, ran afoul of the Espionage Act. The Red Scare put a good many allegedly subversive Americans either in jail, or had them deported, under the law.

Discussions about subversives have been an especially delicate subject for American Jews. From the earliest days of the Espionage Act, Jews found themselves implicated. In addition to Emma Goldman, who was deported to the Soviet Union, Julius and Ethel Rosenberg were executed for passing atomic secrets to the Soviets (it appears that Ethel was completely innocent of the crime); Morton Sobell and David Greenglass (Ethels brother) were imprisoned on similar charges; two lobbyists from AIPAC and Jonathan Pollard, in separate incidents, were indicted and imprisoned for disclosing national defense information to Israel; and, most recently, an FBI translator, Shamai Leibowitz, faced legal jeopardy under the Espionage Act.

Some possessed special military information and wished to provide Israel with a qualificative edge in its own national defense. That, of course, raises the specter of dual loyalty. The earlier cases evoke the Jewish flirtation with socialism. For those who wonder what possible appeal the Squad and Bernie Sanders could have to American Jews, its worth recalling the long history of radical politics among Jews on the hard left.

Sometimes the cause was worthy of democratic ideals. For instance, many Jews tested the limits of the First Amendment six of the 10 blacklisted McCarthy-era scriptwriters known as the Hollywood 10, and scores of TV and film actors, writers and directors suffered the consequences of their beliefs and were professionally ruined, with some landing in jail.

In an early and pivotal Espionage Act case that went before the Supreme Court, Abrams v. United States, all six defendants were Jews who distributed leaflets in Yiddish supporting the Russian Revolution and opposing Americas entry into WWI.

Theres a big difference between lawful political association and assembly activities protected under the Constitutionand clandestinely serving as an agent of a foreign government.

Throughout his sordid life, Trump has shown himself to be impulsive, reckless, irresponsible and implacably defiant of rules and protocols. Thats not the same as being a spy or spilling secrets.

No charges have yet been filed against Trump. Is he simply in possession of top-secret documents without evidence that he either attempted to destroy or disseminate them? All throughout his sordid life, Trump has shown himself to be impulsive, reckless, irresponsible and implacably defiant of rules and protocols. Thats not the same as being a spy or spilling secrets, which is usually how the Espionage Act has been deployed.

American Jews surely should know the difference.

Thane Rosenbaum is a novelist, essayist, law professor and Distinguished University Professor at Touro University, where he directs the Forum on Life, Culture & Society. He is the legal analyst for CBS News Radio. His most recent book is titled Saving Free Speech From Itself.

More:
Is Trump the Rosenbergs? - Jewish Journal

Mar-a-Lago and why intelligence agents matter to America – Washington Examiner

Why worry about former President Donald Trump's potential mishandling and possible exposing of "Human Intelligence Control System" information at Mar-a-Lago?

Well, because HCS information is considered extremely sensitive and highly restricted within the U.S. government. That's namely because it involves reporting from our agents in the field people from countries such as Russia, Iran, China, and North Korea whom the CIA has recruited to spy in service of the United States. These are the crown jewels of the CIA, our equivalent of the military's nuclear codes. We don't know that any HCS material was exposed, but we should absolutely want to find out.

I was a CIA case officer for many decades. There was nothing more sacrosanct to me than protecting my agent. Its the fundamental promise we make to another human being, who often is working for us at extraordinary personal risk to themselves and often to their families. Put simply, we absolutely need to figure out if Trump's document handling endangered any of our agents. No ifs, no buts. This is personal to me, as it is to any of us who "ran" agents overseas. Agents are the true heroes of the intelligence business, the absolute tip of the spear in defending America from our adversaries.

In my book Clarity in Crisis: Leadership Lessons from the CIA, I tell the remarkable true story of an agent of ours from the Middle East, who, during a training session on tradecraft before he went into the belly of the beast in a Middle Eastern nation, stopped me and looked me straight in the eye. He, in essence, said, Marc, my life is in your hands. These words stayed with me for the rest of my career. Thats the true bond we have with our agents. The responsibility is immense, and the price of failure can be awful. Tradecraft errors by a CIA case officer, moles within the U.S. government, and even the mishandling of classified information can all lead to the imprisonment or death of our agents. So I take this issue of the potential compromise of HCS information exceptionally seriously.

For very good reason, so does the U.S. intelligence community. We can expect Director of National Intelligence Avril Haines, a well-respected national security official who enjoys broad support on Capitol Hill, to undertake a thorough and apolitical assessment of the risk to any human sources who may have been compromised in the documents found at Mar-a-Lago. Its also noteworthy that both Sens. Mark Warner (D-VA) and Marco Rubio (R-FL), the chairman and vice chairman of the Senate Select Committee on Intelligence, have asked for a review of the specific documents. This is a bipartisan concern.

That said, there is far too much speculation in the media on the damage that may have been done. Some are calling this a cataclysmic breach. This "end of days" talk reached a crescendo this past weekend, with some on Twitter correlating the breach with the CIA's reported loss of Iranian and Chinese assets in recent years.

It is incredibly irresponsible at this point to make this link with no evidence to support such a charge. Is the Mar-a-Lago concern on par with the worst intelligence disasters in U.S. history? Is it on a par with hostile spies and leakers such as Edward Snowden, Chelsea Manning, the Rosenbergs, Harold Nicholson, Aldrich Ames, and Robert Hansen? These are people who caused irreparable harm to America, to include the loss of life of our agents. At this point, it is impossible to say. But the intelligence community's damage assessment must, in sober and systematic fashion, determine the degree of compromise (if any) to our agents and collection methods.

Still, those on the Right who say it's "only documents" show a juvenile understanding of the national security world. "Only documents?" Well, the Soviet Union ran spies in our midst and obtained "only" documents that allowed them to build an atomic bomb. The "only documents" crowd should probably take a knee now; theirs is a ridiculous retort. In the intelligence business, obtaining documents from an adversary is actually the apex of a collection operation. Documents can be studied and restudied, providing value that is both immediate and durable. Those who attempt to downplay the potential breach without even knowing what the documents contain are doing America a disservice.

Am I personally concerned over the possible risk to our intelligence operations? Absolutely. But the key point stands: We need to know what was in the documents. Then we can proceed from that established, fact-based understanding.

One final point: Veterans of the intelligence world should leave the issue of Trumps possible criminality to the Department of Justice. What matters most in the intelligence lane is the need to uphold that promise that every CIA case officer makes to their agent to keep them safe as far as it is possible to do so. The same promise I made to that agent decades ago in the Middle East applies today. Our current agents and prospective ones as well, those who must constantly decide on whether they should accept literally existence-defining risks to spy for us, are all watching.

Marc Polymeropoulos is a nonresident senior fellow at the Atlantic Council. A former CIA senior operations officer, he retired in 2019 after a 26-year career serving in the Near East and South Asia. His bookClarity in Crisis: Leadership Lessons from the CIAwas published in June 2021 by HarperCollins.

Link:
Mar-a-Lago and why intelligence agents matter to America - Washington Examiner

What is Cryptography in security? What are the different types of …

Table of Contents

Cryptography is the study of securing communications from outside observers.Encryption algorithmstake the original message, orplaintext, and converts it into ciphertext, which is not understandable. The key allows the user todecryptthe message, thus ensuring on they can read the message. The strength of the randomness of anencryptionis also studied, which makes it harder for anyone to guess the key or input of the algorithm. Cryptography is how we can achieve more secure and robust connections to elevate our privacy. Advancements in cryptography makes it harder to break encryptions so that encrypted files, folders, or network connections are only accessible to authorized users.

Cryptography focuses on four different objectives:

These objectives help ensure a secure and authentic transfer of information.

Cryptography began with ciphers, the first of which was the Caesar Cipher. Ciphers were a lot easier to unravel compared to modern cryptographic algorithms, but they both used keys and plaintext. Though simple, ciphers from the past were the earliest forms of encryption. Todays algorithms and cryptosystems are much more advanced. They use multiple rounds of ciphers and encrypting the ciphertext of messages to ensure the most secure transit and storage of data. There are also methods of cryptography used now that are irreversible, maintaining the security of the message forever.

The reason for more advanced cryptography methods is due to the need for data to be protected more and more securely. Most of the ciphers and algorithms used in the early days of cryptography have been deciphered, making them useless for data protection. Todays algorithms can be deciphered, but it would require years and sometimes decades to decipher the meaning of just one message. Thus, the race to create newer and more advanced cryptography techniques continues.

Cryptography can be broken down into three different types:

Secret Key Cryptography, or symmetric cryptography, uses a single key to encrypt data. Both encryption and decryption in symmetric cryptography use the same key, making this the easiest form of cryptography. The cryptographic algorithm utilizes the key in a cipher to encrypt the data, and when the data must be accessed again, a person entrusted with the secret key can decrypt the data. Secret Key Cryptography can be used on bothin-transit and at-rest data, but is commonly only used on at-rest data, as sending the secret to the recipient of the message can lead to compromise.

Examples:

Public Key Cryptography, or asymmetric cryptography, uses two keys to encrypt data. One is used for encryption, while the other key can decrypts the message. Unlike symmetric cryptography, if one key is used to encrypt, that same key cannot decrypt the message, rather the other key shall be used.

One key is kept private, and is called the private key, while the other is shared publicly and can be used by anyone, hence it is known as the public key. The mathematical relation of the keys is such that the private key cannot be derived from the public key, but the public key can be derived from the private. The private key should not be distributed and should remain with the owner only. The public key can be given to any other entity.

Examples:

Hash functions are irreversible, one-way functions which protect the data, at the cost of not being able to recover the original message. Hashing is a way to transform a given string into a fixed length string. A good hashing algorithm will produce unique outputs for each input given. The only way to crack a hash is by trying every input possible, until you get the exact same hash. A hash can be used for hashing data (such as passwords) and in certificates.

Some of the most famous hashing algorithms are:

Continue reading here:
What is Cryptography in security? What are the different types of ...

Jack Dorseys Web5 is a solution to a problem thats already been solved – VentureBeat

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.

Web3 thrives on its ability to provide both transparency and anonymity, but merging the two has been a seemingly arduous task particularly when it comes to securing personal data.

Jack Dorsey the cofounder and former CEO of Twitter believes hes found a solution to the problem in the form of Web5, his newly announced decentralized data and identity platform leveraging Bitcoin. But while Dorsey unveils designs for a new decentralized web using the Bitcoin network, other blockchain technologies have moved far beyond the conceptual stage.

While somewhat confusing, the name of Dorseys proposal actually implies a literal combination of Web2 and Web3 features as in two plus three equals five thus Web5 was coined. Seeking to act as the extra decentralized web equivalent, Web5 proposes to put control back in users hands and grant them autonomy over their digital data and identity.

In essence, the three main pillars of Web5 are decentralized identifiers, verifiable credentials and decentralized web nodes which, frankly, sounds similar to existing modern blockchain technologies. Dorseys rationale for Web5 is that while the current internet democratized the exchange of information, it is still missing an essential component the reclamation of personal identity.

MetaBeat 2022

MetaBeat will bring together thought leaders to give guidance on how metaverse technology will transform the way all industries communicate and do business on October 4 in San Francisco, CA.

Currently, personal data is generally secured via accounts and passwords, and its been this way for quite a while. In this model, identity and personal data are essentially the property of third parties, such as big tech companies. Historically, this system has been fraught with issues, whether that be huge data leaks, illicit exchanges of consumer data, or the general lack of control for the end user.

What Web5 attempts to bring about is decentralized identity and data storage for internet applications. It promises developers can focus on creating meaningful user experiences while returning the ownership of personal information to individuals. While self-sovereign identity and data ownership are essential facets of the decentralized web this already exists.

The Internet Computer (ICP) blockchain launched its genesis block on May 10, 2021, and has been designed to make a fully functioning decentralized internet a reality. By onboarding websites, DeFi, social media, games, and metaverse projects entirely on-chain, running at modern web speeds, ICP strives to blur the lines between blockchain and the internet and create an interoperable future. Yet, amongst this system lies what is otherwise known as Internet Identity, abbreviated simply to II.

II allows users to anonymously authenticate their credentials to decentralized applications (dApps) running on ICP using their personal devices. To achieve this, the anonymous authentication framework combines Web Authentication (WebAuthn), a two-factor authentication standard of the World Wide Web Consortium (W3C) that is supported by the majority of modern devices, and Chain Key cryptography a breakthrough in modern cryptography that will allow ICP to run millions of nodes at scale.

One of the most notable aspects of the chain is that it enables any device to verify the authenticity of artifacts generated by ICP, including smartwatches and mobile phones. Compatible authentication methods include traditional Hardware Security Modules (HSM) USB devices that plug into a personal computer and manage keys and any mobile device with a Trusted Platform Module (TPM) chip common in modern laptops and phones.

This means that, for example, anyone can authenticate themselves when accessing dApps by simply using the fingerprint sensor on their laptop or the camera on their phone. The system provides a frictionless login experience that still maintains privacy. Thanks to the Chain Key cryptography working behind the scenes, users cannot be linked across dApps and are not at risk of having any of their data collected, scraped or hacked at any point.

The possibilities here are endless, but one of the first obvious benefits is that users will be free to anonymously interact with the web without fear of being tracked. Secondly, you also wont need to keep track of dozens of accounts and passwords or cryptographic key material.

Even better, users can have a single key that confirms who they are to the blockchain while creating an unlimited amount of pseudonym IIs that can each be unique to a specific service. So, from the user side, it will seem like just one identity, but services will each see a different name attached to it. This eliminates the ability for account information to be correlated across multiple platforms, further preserving privacy.

Users can have a different II for social media, financial activity, shopping, gaming or anything else. Users can also create multiple forms of backup for such an identity, ensuring they can retain access even if a device they were logged in on should get lost, damaged or stolen. This opens up a world where anyone can gain access to their bank account or workplace with a simple facial scan, but it will be done in a way where the user controls all data, meaning they cant be arbitrarily tracked.

So while Dorseys Web5 looks to put the control back in users hands, it may take a while for its products to take form. Fortunately, Internet Identity already has Web3 covered.

Josh Drake is the chief operating officer at DFINITY Foundation.

Welcome to the VentureBeat community!

DataDecisionMakers is where experts, including the technical people doing data work, can share data-related insights and innovation.

If you want to read about cutting-edge ideas and up-to-date information, best practices, and the future of data and data tech, join us at DataDecisionMakers.

You might even considercontributing an articleof your own!

Read More From DataDecisionMakers

Continue reading here:
Jack Dorseys Web5 is a solution to a problem thats already been solved - VentureBeat

The United States Is Behind the Curve on Blockchain – War on the Rocks

The price implosion of digital images of cartoon gorillas and the collapse of the cryptocurrency market led to head-scratching and finger-wagging. The headlines generated by these crashes belie the significance of their technological infrastructure blockchain. (Blockchain is distinct from the popular Bitcoin cryptocurrency: Blockchain is the broad, foundational technology while Bitcoin is a single application of the technology.) Blockchain is an enhancer and accelerator of technologies like additive manufacturing, artificial intelligence, loyal wingman autonomous aircraft, or space architecture. Those who misunderstand blockchain risk putting themselves behind the competition in todays internet and tomorrows information environment.

The U.S. government views blockchain as a technology of tomorrow while competitors aggressively pursue efforts today to integrate blockchain, data, and the information environment. China is well ahead of the United States in blockchain policy, innovation, and implementation across society. To compete across all elements of national power, the United States requires a coherent, coordinated blockchain strategy and supporting policy. The Department of Defense should explore blockchain technology with the same earnestness as other emerging technology research to jumpstart that discussion. Blockchain is not a weapon system by itself it is a critical enabling technology of the information environment. The challenge is not only educating more people inside the U.S. government about blockchain technology but also mastering blockchain and its applications as a nation first. Miscomprehending blockchain undermines U.S. competitive efforts across all instruments of national power and allows China the ability to shape tomorrows information environment.

Blockchain Basics

Blockchain is, at its most basic level, a unique way to store data. It is a subset of proven distributed ledger technology and utilizes cryptography to maintain a chronologically ordered record of transactions. This data record, or ledger, is a digital database shared and synchronized (i.e., distributed) among multiple nodes in a computer network without a central arbitration authority. A traditional database typically structures data into tables. Data tables, even if shared across multiple nodes in the network, require a central software arbiter to validate changes and promulgate the updated data set across the network. In this way, traditional databases can be visualized as hub and spoke.

In contrast, blockchain data is stored in blocks on an ever-growing chain. When new data is added to the existing data set, a new block forms. This new data block connects cryptographically to the previous chain of data blocks via a digital signature or hash value. This cryptographic hash value depends on both the new data and the previous chain of data blocks. New data blocks are then broadcast to all nodes in the network for validation and addition to existing, distributed copies of the blockchain. From an overall network perspective, nodes, not a central arbitration authority, can validate and trust all new and previous blocks of data simply because of the cryptographic hash values.

Notably, blockchain technology is not a new technology but rather an innovative combination of existing technologies: asymmetric key encryption (e.g., HTTPS) for identity creation, cryptographic hash values for data integrity, the Merkle tree cryptographic concept for chaining blocks of data together, and peer-to-peer networking (as used on file-sharing sites, like LimeWire) for distributed operations. Together, these allow blockchain to provide efficient, secure, trustless transactions without intermediary authorities.

Generally, blockchain networks are categorized as public or private networks. In public blockchain networks, anyone can join or participate. This type of network is more transparent and tamper-resistant due to its size, but it is harder to scale or change its governance. The popular Bitcoin or Ethereum networks, which enable the eponymous cryptocurrencies, are both examples of public blockchains.

Conversely, a private blockchain network is constructed so that one organization controls users access and level of participation. Although this type of network is smaller and less redundant, it generates efficiencies in transacting data. At the intersection of public and private networks is a hybrid network known as a consortium blockchain, a semi-private network governed by several organizations. Consortium blockchain networks are likely the best structures for emerging government or military applications. In fact, Deloitte estimates that 74 percent of new organizational blockchains are consortium blockchains. As the United States and its allies and partners rethink information advantage in a global environment, blockchain technology, supported by solid strategy and policy, should play a key role.

Chinas Blockchain Efforts

China views blockchain technology as significant as other emerging technologies for industrial and economic development. In October 2021, Xi Jinping spoke to a Politburo study session on the digital economy: Innovation in the Internet, big data, cloud computing, artificial intelligence, blockchain, and other such technologies has quickened [ and] is becoming a critical force in reorganizing global factor resources, reshaping global economic structures, and changing global competition structures. Chinas volume of blockchain-related patents highlights its efforts to dominate that technology: From 2015 to 2021, China filed nearly 33,000 patents while the United States filed just over 10,000 patents. China is not only incubating blockchain technology it is accelerating its application to gain an enduring, first-mover advantage.

In December 2021, Chinas Central Commission for Cybersecurity and Informatization issued its 14th Five-Year Plan, which highlighted blockchains importance across multiple fields, such as distributed identification, data exploitation, cloud-networking, and domestic digital innovation. To date, China has demonstrated concentrated blockchain efforts in six areas: First, China developed the digital yuan, a blockchain-based central bank digital currency. After two years of experimentation, China showcased the digital yuan at the 2022 Winter Olympics as a more secure (and traceable) payment method. Second, blockchain enables Shanghais smart infrastructure. Since 2019, the smart city program has facilitated road network management, public health efforts, energy generation, and pollution reduction via blockchain networks. Third, Chinese police integrate blockchain into investigations. Blockchains traceability and immutability help preserve electronic and physical evidence for criminal prosecutions. Fourth, China uses blockchain platforms to broadcast verifiable public-health information about COVID-19 to its citizens and reduce the possibility of misinformation. Fifth, the Peoples Liberation Army is testing blockchain to manage personnel and pay records, reduce corruption, and boost performance. Finally, China uses blockchain technology to help monitor and control its population.

Most recently, Chinese authorities may have altered users COVID-19 status to false positives via a smartphone tracking app to prevent protests by forcing citizens into quarantine. This underlying blockchain technology assists police in gathering evidence of online dissidents and secures the Chinese social credit system. Yet Chinas blockchain efforts look beyond domestic applications China intends to build a global Chinese-controlled blockchain internet.

Chinas Belt and Road initiative extends to blockchain. Intending to influence the worlds blockchain ecosystem, China launched its Blockchain-based Service Network in April 2020. The network serves as a low-cost, back-end infrastructure system for software developers to build blockchain applications. Similar to the popular Ethereum blockchain network, the Blockchain-based Service Network is intended to become the blockchain internet via a cross-cloud, cross-portal, cross-framework, global infrastructure network and serve as a platform on which to create new software applications. Indeed, the accompanying white paper emphasizes that once the [Blockchain-based Service Network] is deployed globally, it will become the only global infrastructure network autonomously innovated by Chinese entities and for which network access is Chinese-controlled. This network, coupled with the massive number of blockchain patents, supports China Standards 2035, Chinas long-term attempt to set international standards in favor of Chinese interests. Congressional testimony from the Center for a New American Security underscores this danger: Blockchain developers [in democratic countries] should realize that if they help build the [Blockchain-based Service Network], they are constructing the Chinese Communist Partys new internet ecosystem. Absent leadership from the United States and its allies or partners, China is poised to achieve the critical mass required to shape tomorrows internet along Chinese Communist Party standards. A Chinese version of tomorrows internet is unlikely to support a free and open flow of information.

Implications

Lacking a firm understanding of blockchain, the United States risks competing in an information environment dominated by China. There are serious implications for miscomprehending blockchain and its role in developing tomorrows internet. Currently, the internet is evolving from centralized data anchored by a handful of large, influential technology firms like Meta (formerly Facebook) and Google in what is known as Web 2.0. The next iteration, web3, features decentralized blockchain networks and disaggregated data. (To be clear, instances of web3 are in use today alongside Web 2.0 and Web 1.0 but are less widespread or obvious to end users.) Unsurprisingly, applications of future technology are difficult to predict. For instance, few predicted the asymmetric effects of social media influencers or envisioned the easy spread of misinformation at Web 2.0s genesis. What misapplications, opportunities, or risks are not forecasted about web3? What are the unknown unknowns of a new blockchain internet and an unfamiliar information environment?

Blockchain is an enabling technology, not a panacea for competition in the information environment. For example, several nations (including the United States) are investigating blockchain technology to implement digital fiat currency or central bank digital currency, as China has already done with the digital yuan. On the positive side, creating a digital currency could streamline tax filing or the delivery of targeted stimulus programs. On the other hand, if a non-U.S. central bank digital currency or cryptocurrency quickly gains widespread adoption, could U.S. economic sanctions be rendered moot? North Koreas 2018 theft of $250 million worth of cryptocurrency was an evasion of international economic sanctions. What does integrated deterrence look like with minimized financial sanctions? How is diplomatic or military power affected if Americas economic instrument of power is weakened?

Blockchain technology extends beyond financial applications, however. It occupies a critical space in the information technology and data landscapes. Blockchain enhances both cybersecurity and zero-trust architecture, a new model for designing networks. For example, the effects of a ransomware attack are blunted if data is distributed across multiple nodes in a blockchain. Additionally, blockchain can efficiently inventory software across an information-technology enterprise an entire company or governmental department, for instance so administrators can rapidly patch targeted machines when required. Moreover, as the U.S. government shifts to a zero-trust architecture, blockchain has shown promise in creating data stacks resistant to tampering, decentralizing public key infrastructure, and utilizing intrusion detection systems. Blockchained data combined with artificial intelligence could even validate data like GPS signals to counter adversaries spoofing attempts.

Without concerted U.S. developmental efforts, what are the consequences when national-security information systems utilize Chinese or a public blockchain infrastructure? The nascent Chinese Blockchain-based Service Network is an obvious blockchain infrastructure developers should avoid. However, commercially available public blockchains like the Ethereum network are more challenging to understand. Like the Blockchain-based Service Network, the Ethereum network is designed for developers to easily build applications on top of the software infrastructure. It is not likely that the Ethereum network is constructed maliciously. Also, less is known about whether the network has significant cyber vulnerabilities for U.S. government applications. Regardless, the network is experimenting with new code to position itself for mass commercial user adoption without considering U.S. national security standards. What happens if future government networks or commercial-acquired applications compute on a public blockchain network like Ethereum because no ready alternative exists?

By far, blockchain technologys most considerable implications center around data. China views data as critical for competing in finance, industry, or even warfare. In 2013, Xi commented: [B]ig data is the free resource of the industrial society. Whoever has a hold of the data has the initiative. As the internet of things expands and data availability grows, blockchain offers a new framework to gather, disseminate, and exploit data. Instead of traditionally transmitting data back and forth between nodes for validation, trusted data could be broadcast to a network. This new network structure avoids the need for a central arbitration authority and generates overall network efficiencies. As an illustration, new cars could communicate directly with one another to avoid accidents or reduce traffic congestion. Those cars could also share their standardized and trusted data with a broad data ecosystem via blockchain, industries like food delivery, car insurance, civil engineering, and others. Blockchain is a new data-infrastructure paradigm, enabling other technologies like artificial intelligence and machine learning, and can support U.S. efforts to seize the initiative in data competition.

So, what happens when China leapfrogs the United States in the big data and blockchain sectors?

There is not yet a blockchain application that triggers immediate, widespread adoption of the technology or ushers in web3 at scale. China acknowledges this fact yet continues to prioritize blockchain development and promulgate the Blockchain-based Service Network in the countrys quest to exploit data and maintain the first-mover advantage. As one expert portends, web3 would enable an internet of things where all digital things can communicate and transact with each other, enabling a new era of digital innovation and economic possibilities. But it would be an internet where China owns the underlying infrastructure. Xis comments underscore that point: The amount of information controlled has become an important indicator of a nations soft power and competitiveness. Harnessing information has substantial implications for current U.S. economic and military advantages. China is looking 50 to 100 years in the future by developing technologies today that support a vision of Chinese data dominance in the information environment. Getting blockchain right first is a national imperative.

Suggested Way Ahead

Blockchain and web3 development require a whole-of-nation approach. The commercial industry, rather than a government agency, will most likely deliver a use case or application that achieves critical mass for widespread blockchain adoption. However, competition with China necessitates clear governmental policy to secure freedom of movement in a web3 environment for the United States and its allies and partners.

A critical first step in negating Chinese influence in web3 is developing blockchain standards for commercial and government use. What protocol governs decentralized blockchain applications, and what ethics govern smart contract execution? Should a standard blockchain ecosystem be available to government and industry developers as an alternative to Chinas sponsored Blockchain-based Service Network or the public Ethereum networks? The Department of Defenses sponsorship of TCP/IP as a standard protocol for data delivery in 1982 serves as an example of effective policy for new technology with international implications. And in the near term, the United States should blunt efforts to shape blockchain standards to Chinas advantage in international technology standards developing organizations. While several questions about blockchains tactical applicability for the military services remain, broader strategic policy questions must be settled in this burgeoning technology landscape, especially as blockchain will be a technology underlying future U.S. competitive efforts.

To research those questions, U.S. national security players like the Defense Department, the National Institute of Science and Technology, or the National Security Agency could establish an interagency cross-functional team to explore the blockchain space and inform long-term blockchain policy. In addition, this team should most certainly include industry and academia experts. After a sprint, the teams white paper or report should outline internal and external equities and detail blockchain courses of action tied to national security priorities.

Finally, in the near term, Department of Defense leaders should raise awareness among those evaluating and acquiring technology and communicate blockchains opportunities, risks, and vulnerabilities. Bolstered by improved blockchain and data literacy, Defense Department acquisitions professionals, technologists, and servicemembers can continue to innovate utilizing both current and emerging technologies. However, without a comprehensive understanding of blockchain technology, the United States risks contending in an information environment shaped by competitors and on an internet owned by the Chinese Communist Party. The United States should investigate blockchain technology and craft strategic policy today to compete successfully in tomorrows information environment.

Maj. Mike Knapp is a U.S. Air Force pilot stationed in the Washington, D.C. area. These opinions are the authors own and do not represent those of the Department of the Air Force or the Department of Defense.

Photo: OECD/Herv Cortinat

Read more from the original source:
The United States Is Behind the Curve on Blockchain - War on the Rocks

RKVST Launches RKVST Free and RKVST Team SaaS Supply Chain Integrity, Transparency and Trust Solution – Business Wire

SANTA CLARA, Calif. & CAMBRIDGE, England--(BUSINESS WIRE)--RKVST, a leading provider of supply chain integrity, transparency and trust, announces a Free and subscription-based Team tier of its award-winning enterprise SaaS solution, allowing organizations of any size to collaborate on and share data in near real-time, confident in the trustworthiness of that data.

The RKVST platform removes the hassles, mistakes and risk associated with the manual processes and paperwork involved in sharing data across organizations, enabling all partners in the supply chain to collaborate and work with a single source of truth. RKVST does this by capturing the identity of sources and origin of data, enforcing sharing and visibility rules with strong cryptography, and underpinning that with distributed ledger technology that prevents forgery, back-dating or shredding of evidence. Together, provenance, governance and immutability bring the right level of trust in data for faster, confident decisions with lower business risk for organizations.

Jon Geater, chief technology and product officer at RKVST, says:

With the RKVST Free tier, we are making our award-winning enterprise blockchain accessible to the mainstream market. Delivering integrity, transparency and trust to digital supply chains is now available to everyone with a single API call or a single click. RKVST ensures that the right data gets to the right place at the right time, matching the speed and complexity challenges of todays digital infrastructure and delivering the continuous assurance required for zero trust architecture.

Cost and complexity have traditionally been barriers for unifying supply chain operations, making them the preserve of large government agencies and enterprises, and where small suppliers are often left out. This creates blind spots that increase security and business risks for the entire supply chain as well as significant amounts of human resource spent auditing and validating partner data. RKVST is changing all of that by delivering a range of service options to suit organizations of every size. RKVST Free provides DevOps and R&D professionals with a try-before-you-buy option, and a free-forever service for small businesses. RKVST Team employs a pay-as-you-grow model for increased asset capacity, more features and more users per account tenancy.

Green aerospace company SATAVIA is using RKVST to provide transparent continuous asset assurance for the complex and often opaque carbon offset market in the aviation industry. By enabling aircraft operators to forecast, prevent, quantify and offset surface warming caused by aircraft-generated condensation trails or contrails, aviations per-flight climate impact can be reduced by up to 60%. SATAVIA started out using RKVST Free, transitioning to RKVST Team as their user and asset capacity needs increased.

Dr Adam Durant, chief executive officer, SATAVIA, says:

SATAVIAs ClimateTech platform DECISIONX:NETZERO optimizes aircraft flight plans for contrail prevention and quantifies climate benefit in terms of avoided surface warming. Immutable storage of flight-by-flight data, with clear oversight of provenance and governance, is a central requirement of climate benefit accounting. Were pleased to be working with RKVST to solve these technical challenges, leveraging data integrity for climate-positive activity.

The launch of RKVST Free and RKVST Team comes at a time when the push to adopt solutions that build trust and transparency is moving with unprecedented speed. The U.S. Executive Order 14028 highlights the need to transition to a zero trust mindset with supply chain transparency and trust as major pillars. The Internet Engineering Task Force (IETF) has established a new working group focused on the issues of supply chain integrity, transparency and trust, and the latest cybersecurity review from the U.K.s National Cyber Security Centre highlights the serious threats posed by supply chain attacks.

About RKVST

RKVST enables organizations to collaborate confidently and securely with partners, tracking physical and digital assets, reducing operational costs and increasing business resiliency. Customers use RKVST to provide integrity, transparency and trust for digital supply chains, solving challenges ranging from nuclear waste tracking and compliance in construction and other industries, to zero trust connected devices and software bill of materials (SBOMs). The RKVST software-as-a-service (SaaS) captures the identity of sources and origin of data, enforces sharing and visibility rules with strong cryptography, and is underpinned by distributed ledger technology that prevents forgery, back-dating or shredding of evidence. This zero trust approach, continuously verifying then trusting data, enables organizations to make confident business decisions based on verifiable data with real-time context. To learn more, visit RKVST.com.

Here is the original post:
RKVST Launches RKVST Free and RKVST Team SaaS Supply Chain Integrity, Transparency and Trust Solution - Business Wire

$3.7 Billion Worldwide Blockchain in Retail Industry to 2027 – Featuring Cognizant, Infosys and Oracle Among Others – ResearchAndMarkets.com -…

DUBLIN--(BUSINESS WIRE)--The "Blockchain in Retail Market: Global Industry Trends, Share, Size, Growth, Opportunity and Forecast 2022-2027" report has been added to ResearchAndMarkets.com's offering.

The global blockchain in retail market reached a value of US$ 233.5 Million in 2021. Looking forward, the publisher expects the market to reach a value of US$ 3,731.75 Million by 2027, exhibiting a CAGR of 58.71% during 2021-2027.

Companies Mentioned

Keeping in mind the uncertainties of COVID-19, we are continuously tracking and evaluating the direct as well as the indirect influence of the pandemic. These insights are included in the report as a major market contributor.

Blockchain in retail refers to a disruptive technology that relies on cryptography to record digital transactions on a distributed ledger in the retail industry. It is a cost-effective solution as it automates the transactions and the interoperability of applications and eliminates the need for administration.

It assists businesses in tracking the product back to the supply chain, identifying suppliers, manufacturers, and batches to solve supply chain issues. It enables decentralized identity (DID), which helps retailers verify user identity and data when required. In addition, it streamlines administrative processes in the back offices of retailers, thereby allowing employees to focus more on value-added work.

The growing demand for transparent transactions in the retail industry to build trust between suppliers, companies, and customers represents one of the key factors driving the market. Moreover, there is a rise in investments by retailers in blockchain-based solutions to ensure quality, reliability, authenticity, and product safety. This, along with increasing technological advancements and international trade in the retail sector, is propelling the growth of the market.

In addition, blockchain offers enhanced cryptographic security for its databases and transactions that help in fraud reduction and sustainability of retailers. This, coupled with the increasing utilization of blockchain in retail for digital payment, online shopping, and risk and compliance, is positively influencing the market.

Besides this, the rising employment of blockchain in retail to monitor supply chain transactions for easy traceability of goods is offering lucrative growth opportunities to industry players. Additionally, the escalating demand for smart contracts to save time and cost of companies and remove merchants who charge extra for authenticating a transaction is bolstering the market growth.

Key Questions Answered in This Report:

Key Topics Covered:

1 Preface

2 Scope and Methodology

3 Executive Summary

4 Introduction

4.1 Overview

4.2 Key Industry Trends

5 Global Blockchain in Retail Market

5.1 Market Overview

5.2 Market Performance

5.3 Impact of COVID-19

5.4 Market Forecast

6 Market Breakup by Component

7 Market Breakup by Type

8 Market Breakup by Organization Size

9 Market Breakup by Application

10 Market Breakup by Region

11 SWOT Analysis

12 Value Chain Analysis

13 Porters Five Forces Analysis

14 Price Analysis

15 Competitive Landscape

15.1 Market Structure

15.2 Key Players

15.3 Profiles of Key Players

For more information about this report visit https://www.researchandmarkets.com/r/g7765l

Follow this link:
$3.7 Billion Worldwide Blockchain in Retail Industry to 2027 - Featuring Cognizant, Infosys and Oracle Among Others - ResearchAndMarkets.com -...

Trump’s TRUTH Social is Shadow Banning Users’ Jan. 6 Posts – Mediaite

Chris Delmas/AFP via Getty Images

Former President Donald Trumps new social media platform TRUTH Social is shadow banning users for posting about certain topics, a new study claims.

The bans of certain types of content are at odds with the principles of free speech the platform was founded on, according to the progressive non-profit group Public Citizen.

Public Citizen, upon hearing complaints from users unable to post about topics such as the Jan. 6 House select committee, or the ongoing fight for abortion access, reported it found numerous instances in which some content was not allowed.

Our own research on the platform confirms that the site engages in shadow banning, which is fully or partially blocking users content without warning, notice, or recourse, Public Citizennoted. This is prevalent with regard to both progressive subject matter and across various other topics.

Cheyenne Hunt-Majer with the group wrote:

In June 2022, Truth Social users reported that any post containing the phrase abortion is healthcare would automatically be shadow banned from the platform. Much of this report describes my firsthand experience on Truth Social.

When I attempted to post the phrase abortion is healthcare, I received the standard notification that my truth had been posted, which would usually signify that my post would now be visible on my personal profile and on my feed. Instead, the post was nowhere to be found.

Hunt-Majer also noted issues with posting about hearings from the Jan. 6 committee.

A number of Truth Social users reported having their accounts permanently suspended after posting about the January 6th Committee hearings, Hunt-Majer wrote. Other users have alleged that their posts were censored or their accounts were deactivated after sharing a video from the January 6th hearings of Ivanka Trump doubting her fathers claims that the election was stolen.

Hunt-Majer noted similar issues with posting about the committees hearings.

In a post about Georgia election worker Wandrea Moss, Hunt-Majers truth was rejected, despite two attempts:

I attempted to post, Trumps defamatory lies about Shaye Moss and her mother were cruel, racist, and dangerous. Time for accountability. #Jan6 #january6th #January6thHearings.

That post was blocked. However, when I copied and pasted the exact text and attempted to post it for a second time, the post became visible. To date, the original post has not appeared on my page.

The study also noted issues with posts that were critical of Ukrainian President Volodymyr Zelensky.

Read the study in its entirety here.

Have a tip we should know? tips@mediaite.com

Original post:

Trump's TRUTH Social is Shadow Banning Users' Jan. 6 Posts - Mediaite