IoT Security Solution For Encryption Market Size Analysis, Top Manufacturers, Shares, Growth Opportunities and Forecast to 2026 – Science In Me

New Jersey, United States:The new report has been added by Market Research Intellect to provide a detailed overview of the IoT Security Solution For Encryption Market. The study will help to better understand the IoT Security Solution For Encryption industry competitors, the sales channel, IoT Security Solution For Encryption growth potential, potentially disruptive trends, IoT Security Solution For Encryption industry product innovations and the value / volume of size market (regional / national level, IoT Security Solution For Encryption- Industrial segments), market share of the best actors / products.

Information has been added to the report to provide a realistic view of the industry based on data from IoT Security Solution For Encryption manufacturers, i.e. H. Shipping, price, sales, gross profit, business distribution, etc., SWOT analysis, consumer preference, current developments and trends, drivers and limiting factors, company profile, investment opportunities, analysis of the demand gap, market size value / volume, services and products, Porters five models , socio-economic factors, official regulations in the IoT Security Solution For Encryption branch. Market participants can use the report to take a look at the future of the IoT Security Solution For Encryption market and make significant changes to their operating style and marketing tactics in order to achieve sustainable growth.

Get | Download Sample Copy @ https://www.marketresearchintellect.com/download-sample/?rid=170784&utm_source=SI&utm_medium=888

The report examines the competitive environment scenario observed with key players in IoT Security Solution For Encryption sales, the profile of their business, their earnings, their sales, their business tactics, and the forecasting situations of the IoT Security Solution For Encryption sales industry. According to studies, the IoT Security Solution For Encryption sales market is very competitive and diverse due to global and local suppliers.

The IoT Security Solution For Encryption Sales Market Report mainly contains the following Manufacturers:

Market Competition

The competitive landscape of the IoT Security Solution For Encryption market is examined in detail in the report, with a focus on the latest developments, the future plans of the main players and the most important growth strategies that they have adopted. The analysts who compiled the report have created a portrait of almost all of the major players in the IoT Security Solution For Encryption market, highlighting their key commercial aspects such as production, areas of activity and product portfolio. All companies analyzed in the report are examined on the basis of important factors such as market share, market growth, company size, production, sales and earnings.

Report Highlights

Assessment of sales channels

innovation trends

sustainability strategies

Niche market trends

Market entry analysis

market size and forecast

The geographic department provides data that give you an overview of the turnover of companies and sales figures for the growth activity IoT Security Solution For Encryption for electrical meters. Here are the strengths of the geographic divisions: North America (United States, Canada and Mexico), Europe (Germany, Spain, France, Great Britain, Russia and Italy and more), Asia-Pacific (China, Japan, Korea, India and Southeast Asia) and more ), South America (Brazil, Argentina, Colombia), the Middle East and Africa (Saudi Arabia, United Arab Emirates, Egypt, Nigeria and South Africa) and ROW.

Ask For Discount (Special Offer: Get 25% discount on this report) @ https://www.marketresearchintellect.com/ask-for-discount/?rid=170784&utm_source=SI&utm_medium=888

Table of Content

1 Introduction of IoT Security Solution For Encryption Market1.1 Overview of the Market1.2 Scope of Report1.3 Assumptions

2 Executive Summary

3 Research Methodology3.1 Data Mining3.2 Validation3.3 Primary Interviews3.4 List of Data Sources

4 IoT Security Solution For Encryption Market Outlook4.1 Overview4.2 Market Dynamics4.2.1 Drivers4.2.2 Restraints4.2.3 Opportunities4.3 Porters Five Force Model4.4 Value Chain Analysis

5 IoT Security Solution For Encryption Market, By Deployment Model5.1 Overview

6 IoT Security Solution For Encryption Market, By Solution6.1 Overview

7 IoT Security Solution For Encryption Market, By Vertical7.1 Overview

8 IoT Security Solution For Encryption Market, By Geography8.1 Overview8.2 North America8.2.1 U.S.8.2.2 Canada8.2.3 Mexico8.3 Europe8.3.1 Germany8.3.2 U.K.8.3.3 France8.3.4 Rest of Europe8.4 Asia Pacific8.4.1 China8.4.2 Japan8.4.3 India8.4.4 Rest of Asia Pacific8.5 Rest of the World8.5.1 Latin America8.5.2 Middle East

9 IoT Security Solution For Encryption Market Competitive Landscape9.1 Overview9.2 Company Market Ranking9.3 Key Development Strategies

10 Company Profiles10.1.1 Overview10.1.2 Financial Performance10.1.3 Product Outlook10.1.4 Key Developments

11 Appendix11.1 Related Research

Complete Report is Available @ https://www.marketresearchintellect.com/product/global-iot-security-solution-for-encryption-market-size-forecast/?utm_source=SI&utm_medium=888

We also offer customization on reports based on specific client requirement:

1-Freecountry level analysis forany 5 countriesof your choice.

2-FreeCompetitive analysis of any market players.

3-Free 40 analyst hoursto cover any other data points

About Us:

Market Research Intellect provides syndicated and customized research reports to clients from various industries and organizations with the aim of delivering functional expertise. We provide reports for all industries including Energy, Technology, Manufacturing and Construction, Chemicals and Materials, Food and Beverage and more. These reports deliver an in-depth study of the market with industry analysis, market value for regions and countries and trends that are pertinent to the industry.

Contact Us:

Mr. Steven FernandesMarket Research IntellectNew Jersey ( USA )Tel: +1-650-781-4080

Email: [emailprotected]

Get Our Trending Report

https://www.marketresearchblogs.com/

https://www.marktforschungsblogs.com/

Tags: IoT Security Solution For Encryption Market Size, IoT Security Solution For Encryption Market Growth, IoT Security Solution For Encryption Market Forecast, IoT Security Solution For Encryption Market Analysis, IoT Security Solution For Encryption Market Trends, IoT Security Solution For Encryption Market

Here is the original post:
IoT Security Solution For Encryption Market Size Analysis, Top Manufacturers, Shares, Growth Opportunities and Forecast to 2026 - Science In Me

Incentives and infrastructure what govt can do to boost data centres in India – ThePrint

Text Size:A- A+

In her budget speech earlier this year, Finance Minister Nirmala Sitharaman proposed to allocate Rs 8,000 crore to set up data centres and IT parks, over the next five years. Her announcement came on the back of the Personal Data Protection Bill, 2019, which stipulates that an individuals critical and sensitive personal data must be stored in India.

A data centre is afacilitywhich stores large volumes of digital information and the modern digital economy functions around them. But the conversations around privacy, different categories of data and data localisation haveput them under the spotlight. In India, the data centre ecosystem is still in its infancy. However, thegovernment of Indiahas an ambitious plan to make thecountry a $1 trillion digital economy by 2025. Consequently, companies may find it appealing to set up data centres in India.

On the surface, the Finance Ministers announcement, the governments ambition and legislative support may sound like an inviting proposition. But a closer analysis of Indias regulatory and internet infrastructure illustrates that the country requires calibrated policy measures to ensure it becomes a regional data hub.

Also Read: India has to toe a fine line in defining non-personal data between public interest and IPR

In 2017,India ranked 134 out of 176 countries on theICT development index, a measure developed by the UNs International Telecommunication Union, to determine a countrys digital development. Poor network infrastructure quality, aided by restrictive rules and laws, is the principle reason responsible for this dismal performanceof India.

For instance,data centres may use dark fibre to overcome degraded network performance. Though expensive, these avoid latency, provide greater bandwidth, stability and security. However, dark fibrenetwork is consideredastelecom infrastructure and can only be accessed through a licensed partner. Consequently, companies who want to operate data centres are forced to enter into commercial agreements with telecom service providers, even though the service they provide is non-telecommunication connectivity. Relaxing such requirements for data centers will attract more investments and promote competition in this segment.

Lack of encryption standards which are essential to prevent breaches, especially if data is stored in one location, is another hurdle. An encryption standard ranging from 128 bits to 256 bits or more can ensure the security of sensitive information, exchanged via the Internet. Indian laws mandate varying levels of encryption. In the past, The Department of Telecom (DoT), had, prescribed weak encryption standards of 40-bits for Internet Service Providers (ISPs) and encryption above this requires specific permission. But, banking transactions need to be secured with 128-bit encryption, at the very minimum. For data to be secure, these standards will have to be strengthened across sectors.

Another hurdle is a restrictive company National Internet Exchange of India (NIXI). It allows ISPs to interconnect via exchanges in India. If the NIXI was opened up, it would lead to cost-effective data transmission between customers and enterprises. Its connection with domestic data centers, ISPs and content providers, will enable efficient traffic routing. For that to happen, data centres need to be recognised as key components of a core internet network. The London Internet Exchange (LINX) and the Amsterdam Internet Exchange (AMS-IX) allow private peering a direct connection between data centres and enterprises. As a result, data transfers are quicker and cost-effective.

Also Read: Coronavirus doesnt stop Indian Army from carrying out its annual cyber security exercise

Around the world, governments give several incentives to companiesto help them set up data centres.

Inthe US, several state governments offer low property and sales tax rates on power infrastructure, equipment and electricity to attract data centres, subject to certain investment and employment thresholds. In Florida, for example, data centres fall under the Florida Enterprise Zone incentives programme which hasa qualified target industry taxrefund incentive. Under the scheme, companies that create high wage jobs in the state are eligible for tax reimbursements on their corporate incomes, sales, intangible personal property and insurance premiums. In 2017, Swedenslashedthe tax rate on electricity used by data centres, by 97 per cent.

Other incentives include capacity development and infrastructure support. To develop the countrys data hub in Guizhou, the Chinese government encourages tertiary institutionstooffercourses in big data. Singapores data centre parks provide power related infrastructural facilities like on-site power plants, dual power feeds and redundant sources of network path diversity.

Also Read: Virus brings Digital India to govt as papers, meetings make way for e-Office, WhatsApp

Some companies in India have been quick to recognise the importance of data centres. CtrlS, a Hyderabad-based company, was the first to set up a tier-IV data centre that is available 99.95per centtimes of the year, with the most advanced facilities. Another company,STT Global Data Centres India Pvt. Ltda joint venture between Tata Communications andSingaporesSTT India DC Pte. Ltdoperates15data centres in major cities including Pune, Hyderabad, Delhi and Mumbai.

Some state governments too have recognised their importance. Maharashtra provides incentives like stamp duty exemption, VAT refund and an electricity duty exemption to companies that invest a minimum of Rs 1,500 crore to set up a data centre, according to its2015 IT policy.

Telanganas2016datacentrepolicyoffers sales tax and building fee rebates, as well as land at subsidised costs. Gujarat too offers subsidies on power tariffs and lease rentals. But restrictive labour laws in these states, blunt these incentives and act as hurdles in the path of data centres.

In 2008, the Maharashtra governmentmade it mandatoryfor all industrial enterprises to ensure that 50 per cent of their supervisory stuff and 80 per cent of all employees are locals. In 2019, the Shiv Sena-led governmentsaidthat it would enact a law to ensure 80 per cent of all private sector jobs are reserved for sons of the soil. Gujarat too istrying to implementa similar law.

In India, it is critical to have a robust telecom sector and the ability to leverage new technologies like 5G for smooth functioning of data centres. Regulatory and labour laws in the country need to change.India needs anational policy that provides clarity on licencing, harmonises standards, provides incentives, improves infrastructure and promotes the flow of data. The finance ministersBudget 2020 provisions for data centres is the springboard for such a policy.

Theauthorswork at Koan Advisory Group, a technology policy consulting firm. This article is part of ThePrint-Koan Advisory series that analyses emerging policies, laws and regulations in Indias technology sector.

Read all articles in the series here.

ThePrint is now on Telegram. For the best reports & opinion on politics, governance and more, subscribe to ThePrint on Telegram.

Subscribe to our YouTube channel.

See the original post:
Incentives and infrastructure what govt can do to boost data centres in India - ThePrint

How to encrypt a USB in Windows and Apple macOS – Explica

Very commonly used to transport all kinds of data, from photos to important documents, programs, music, etc., USB sticks are part of our daily lives, but they are also very vulnerable devices. It is common for us to leave them connected to other computers, to lose them with all our information inside them, or to find them, someone has used them, and we run the risk of being infected.

For this reason, and as the OCU advises us, we are going to encrypt a USB device in Windows and Apples MacOS:

Encrypt a USB in Windows

On Windows operating systems we have the BitLocker tool. It is a tool developed by Microsoft that usually comes pre-installed in almost all versions of its operating system.

With this tool, to encrypt a USB or hard drive you just have to go to the folder This team where all the storage units of your computer are listed. If you do not know how to get to this folder, just write its name in the Windows start menu and you can quickly access it. Then haz right click on the device and / or unit what do you want to protect and choose the option Activate BitLocker to start the process.

You will enter a window where you are given two options to unlock the unit. You have to activate the first one, Use a password to unlock the unit , and then write the password that you will use for encryption.

When you click Next, Windows will tell you that it will generate a recovery key in the event that you forget your password, it will offer to save it to your Microsoft account, in a file, or print it. Choose the option you prefer

When you press next again, you will have to choose between two encryption options: A quick one that encrypts only the space used and another slower that completely encrypts the USB memory. The difference is that the second option will also encrypt the data that you may have erased, but that could still be recovered. Choose the one you prefer and click Next.

The previous action will take you to a new window with two other options to choose the encryption mode:

New encryption mode. It is designed for fixed units of a single device such as hard drives that are inside your laptop.Compatible mode. You will have to choose if you want the USB you are going to encrypt to be used in other Windows computers. and therefore It is the most recommended option.

Press Next to go to the last window listing all the options you have chosen. If you are satisfied with everything, press Start encryption. Depending on the configuration you have chosen it will take more or less time, but generally it should not be too much. When you connect this unit to a Windows computer, first it will give you a read error. Next, it will show you a notification announcing that it is protected with Bitlocker.

When you click on it, a box will appear in the upper right part of the desktop for you to write your password. When you do, you will normally enter the unit.

Encrypt a USB on MacOS

All you have to do is connect the USB to the computer and do right click about its icon when it appears on the desktop.In the drop-down menu you will only have to choose the option Encrypt to enter the password you want to lock it with.

See more here:
How to encrypt a USB in Windows and Apple macOS - Explica

Hardware Encryption Technology Market Growth Analysis, Top Manufacturers, Shares, Growth Opportunities and Forecast to 2026 – Germany English News

New Jersey, United States:The new report has been added by Market Research Intellect to provide a detailed overview of the Hardware Encryption Technology Market. The study will help to better understand the Hardware Encryption Technology industry competitors, the sales channel, Hardware Encryption Technology growth potential, potentially disruptive trends, Hardware Encryption Technology industry product innovations and the value / volume of size market (regional / national level, Hardware Encryption Technology- Industrial segments), market share of the best actors / products.

Information has been added to the report to provide a realistic view of the industry based on data from Hardware Encryption Technology manufacturers, i.e. H. Shipping, price, sales, gross profit, business distribution, etc., SWOT analysis, consumer preference, current developments and trends, drivers and limiting factors, company profile, investment opportunities, analysis of the demand gap, market size value / volume, services and products, Porters five models , socio-economic factors, official regulations in the Hardware Encryption Technology branch. Market participants can use the report to take a look at the future of the Hardware Encryption Technology market and make significant changes to their operating style and marketing tactics in order to achieve sustainable growth.

Get | Download Sample Copy @ https://www.marketresearchintellect.com/download-sample/?rid=195049&utm_source=GEN&utm_medium=888

The report examines the competitive environment scenario observed with key players in Hardware Encryption Technology sales, the profile of their business, their earnings, their sales, their business tactics, and the forecasting situations of the Hardware Encryption Technology sales industry. According to studies, the Hardware Encryption Technology sales market is very competitive and diverse due to global and local suppliers.

The Hardware Encryption Technology Sales Market Report mainly contains the following Manufacturers:

Market Competition

The competitive landscape of the Hardware Encryption Technology market is examined in detail in the report, with a focus on the latest developments, the future plans of the main players and the most important growth strategies that they have adopted. The analysts who compiled the report have created a portrait of almost all of the major players in the Hardware Encryption Technology market, highlighting their key commercial aspects such as production, areas of activity and product portfolio. All companies analyzed in the report are examined on the basis of important factors such as market share, market growth, company size, production, sales and earnings.

Report Highlights

Assessment of sales channels

innovation trends

sustainability strategies

Niche market trends

Market entry analysis

market size and forecast

The geographic department provides data that give you an overview of the turnover of companies and sales figures for the growth activity Hardware Encryption Technology for electrical meters. Here are the strengths of the geographic divisions: North America (United States, Canada and Mexico), Europe (Germany, Spain, France, Great Britain, Russia and Italy and more), Asia-Pacific (China, Japan, Korea, India and Southeast Asia) and more ), South America (Brazil, Argentina, Colombia), the Middle East and Africa (Saudi Arabia, United Arab Emirates, Egypt, Nigeria and South Africa) and ROW.

Ask For Discount (Special Offer: Get 25% discount on this report) @ https://www.marketresearchintellect.com/ask-for-discount/?rid=195049&utm_source=GEN&utm_medium=888

Table of Content

1 Introduction of Hardware Encryption Technology Market1.1 Overview of the Market1.2 Scope of Report1.3 Assumptions

2 Executive Summary

3 Research Methodology3.1 Data Mining3.2 Validation3.3 Primary Interviews3.4 List of Data Sources

4 Hardware Encryption Technology Market Outlook4.1 Overview4.2 Market Dynamics4.2.1 Drivers4.2.2 Restraints4.2.3 Opportunities4.3 Porters Five Force Model4.4 Value Chain Analysis

5 Hardware Encryption Technology Market, By Deployment Model5.1 Overview

6 Hardware Encryption Technology Market, By Solution6.1 Overview

7 Hardware Encryption Technology Market, By Vertical7.1 Overview

8 Hardware Encryption Technology Market, By Geography8.1 Overview8.2 North America8.2.1 U.S.8.2.2 Canada8.2.3 Mexico8.3 Europe8.3.1 Germany8.3.2 U.K.8.3.3 France8.3.4 Rest of Europe8.4 Asia Pacific8.4.1 China8.4.2 Japan8.4.3 India8.4.4 Rest of Asia Pacific8.5 Rest of the World8.5.1 Latin America8.5.2 Middle East

9 Hardware Encryption Technology Market Competitive Landscape9.1 Overview9.2 Company Market Ranking9.3 Key Development Strategies

10 Company Profiles10.1.1 Overview10.1.2 Financial Performance10.1.3 Product Outlook10.1.4 Key Developments

11 Appendix11.1 Related Research

Complete Report is Available @ https://www.marketresearchintellect.com/product/global-hardware-encryption-technology-market-size-and-forecast/?utm_source=GEN&utm_medium=888

We also offer customization on reports based on specific client requirement:

1-Freecountry level analysis forany 5 countriesof your choice.

2-FreeCompetitive analysis of any market players.

3-Free 40 analyst hoursto cover any other data points

About Us:

Market Research Intellect provides syndicated and customized research reports to clients from various industries and organizations with the aim of delivering functional expertise. We provide reports for all industries including Energy, Technology, Manufacturing and Construction, Chemicals and Materials, Food and Beverage and more. These reports deliver an in-depth study of the market with industry analysis, market value for regions and countries and trends that are pertinent to the industry.

Contact Us:

Mr. Steven FernandesMarket Research IntellectNew Jersey ( USA )Tel: +1-650-781-4080

Email: [emailprotected]

Get Our Trending Report

https://www.marketresearchblogs.com/

https://www.marktforschungsblogs.com/

Tags: Hardware Encryption Technology Market Size, Hardware Encryption Technology Market Growth, Hardware Encryption Technology Market Forecast, Hardware Encryption Technology Market Analysis, Hardware Encryption Technology Market Trends, Hardware Encryption Technology Market

Read the original post:
Hardware Encryption Technology Market Growth Analysis, Top Manufacturers, Shares, Growth Opportunities and Forecast to 2026 - Germany English News

How WhatsApp is making it more expensive to spread misinformation – The Verge

We always have at least some reason to worry about the spread of misinformation, but we worry more about misinformation during a public health crisis. We are generally not well informed on public health issues even in good times, and so the emergence of new disease to which the human race has no natural immunity presents an incredible target for bad actors.

For example, if for whatever reason you are opposed to new 5G cellular networks, you could go on social networks and make a lot of posts suggesting that 5G networks are making the spread of the virus worse. Or you could say that 5G itself is causing COVID-19. Or you could say that the pandemic itself is a hoax, and that talk of a virus is intended to cover up the installation of 5G equipment. And if you said it often enough, and your posts got enough traction, then eventually the fringe press would write up your claims, and the misinformation would rapidly move into the mainstream.

In the United Kingdom last month, in the days after the government ordered citizens to remain in their homes, this is more or less exactly what happened. Some people are setting telephone poles on fire in an utterly misguided effort to fight back against 5G. Jim Waterson and Alex Hern talked to fact-checkers about the situation in the Guardian:

They cite the rapid growth of neighbourhood social media groups, a failure by networks to promote scientific evidence about 5G, and a terrified population looking to make sense of a world turned upside down. [...]

Tom Phillips, the editor of the factchecking organisation Full Fact, said it warned last summer about the growing prevalence of 5G health claims. But in recent weeks debunked claims about 5G had been transformed, potentially aided by the creation of new local Facebook and WhatsApp groups to help support neighbours during the pandemic. Google Trends data suggests British interest in 5G theories exploded in the final days of March, shortly after the lockdown was imposed.

Lets stipulate that fringe theories like these dont exist only on social networks and that, as the piece argues, telecoms should be doing a much better job at explaining to people what 5G is and isnt. (Heres a good overview from my colleague Chaim Gartenberg.)

But its clear that, as usual, social networks are amplifying some of these theories and helping them gain a foothold in the popular imagination. If youre Facebook, you can throw a bunch of fact-checkers and content moderators at the issue to remove viral posts and attempt to deny other fringe voices undue algorithmic promotion. But if the subject is Facebook-owned WhatsApp, the solution is murkier.

WhatsApp, after all, uses end-to-end encryption. In practice, this means WhatsApp itself cant peer into the contents of your message. There are obvious privacy benefits to an app like this, particularly in a world where far-right authoritarianism is on the rise. Will Cathcart, who runs WhatsApp, told me this week that WhatsApps commitment to privacy feels even more urgent in a pandemic-stricken world where nearly all of our communication is mediated digitally. (As an aside, the entire story of the recent Zoom backlash is that the products design enabled far too many strangers to interrupt your call.)

Part of what WhatsApp is trying to do is make what you used to do face to face possible, Cathcart told me. Part of that is privacy.

If we were talking face to face, he told me over Zoom, we probably wouldnt worry too much about someone spying on us. On a digital call, though, spying becomes a much bigger concern.

If all WhatsApp did was enable texts, calls, and chats, that would be the end of the story. But from the beginning, the app has had a feature that in at least some parts of the world transformed it into something that more closely resembles a social network like Facebook. That feature is the forward button, and I wrote about its history today at The Verge:

For much of WhatsApps existence, it was easy for users to forward a single message to as many as 256 people with just a few taps. Initially, these messages were not labeled as forwards, and the end-to-end encryption in WhatsApp could make it almost impossible for authorities to determine who might be using the app to spread hate speech or calls to violence. This triggered a crisis in India, where WhatsApp was linked to mob violence.

In 2018, WhatsApp began experimenting with limits on the number of times a message could be forwarded. It also began labeling forwarded messages for the first time, and adding two arrows to show that a message has been repeatedly forwarded. Last year, the company began limiting the number of people you can forward a single message to to five.

The occasion for my piece was the news that WhatsApp has taken another step down the path to removing the apps broadcast features: as of today, you can forward what the company calls a highly forwarded message one that it is at least five forwards away from its point of origin to just a single person.

As I note in the story, this is a soft limit. You can forward a highly forwarded message more than once just to one person at a time. (You could also just copy and paste it repeatedly.) But the amount of friction is meaningful. It effectively raises the price of using WhatsApp to spread misinformation, at least in terms of time. Misinformation will still spread on WhatsApp, just as it spreads on all messaging services. But it will spread more slowly and give fact-checkers more time to chase down the truth and promote it.

This strikes me as a healthy balance. In fact, Id say its a healthier balance than now exists on Apples iMessage another app that uses end-to-end encryption and enables mass forwarding, and is used by more than 1 billion people. Signal, the upstart messaging app funded by WhatsApp co-founder Brian Acton, uses the same scheme.

On Tuesday, the Washington Post reported that a group of Democratic senators sent a letter to WhatsApp asking that it do more to curb the spread of misinformation. But I hope the senators recognize that WhatsApp isnt the only popular encrypted messenger on the market and that its making moves that its competitors would do well to copy.

Today in news that could affect public perception of the big tech platforms.

Trending up: Facebook is giving these 400 local newsrooms grants of $5,000 each to support their coronavirus reporting as part of the Facebook Journalism Project. The company also announced a relief fund for local newsrooms struggling with the pandemic. These relief grants range from $25,000 to $100,000.

Trending up: Jack Dorsey announced he is moving $1 billion of his Square equityroughly 28 percent of his wealth to Startsmall LLC to fund COVID-19 relief and other efforts. Once the pandemic is under control he plans to shift the focus of the donations to girls health and education, as well as universal basic income.

Trending sideways: Amazon is giving partial pay to employees it sends home for showing up with a fever. Amazon is really on a run of doing almost right thing, just a few days after everyone expected they might.

Amazon has started disciplining warehouse workers who violate social distancing rules, which mandate that they stay 6 feet away from their colleagues in order to limit the spread of the coronavirus. If workers are caught twice breaking the rules, they may get fired. Heres Annie Palmer at CNBC:

Its unclear how Amazon is identifying employees who have violated the rules. In a blog post published last week, Dave Clark, who runs Amazons retail operations, said the company would use its top machine learning technologists to detect areas where it can improve social distancing in its facilities by relying on internal camera systems.

Three Amazon warehouse workers who asked to remain anonymous said they were told by site leadership that their facilities would identify individuals as they see them violate the rules, as well as by reviewing camera footage. The workers also expressed concerns that the policy would be unfairly applied to floor associates and not site leadership.

Amazon keeps changing the definition of what it considers an essential product. While the company originally said it would de-prioritize less necessary items, as of April 6th you could still order a bowling ball, a 10-pack of rubber chickens, and a prom dress in the United States, and have them show up at your door within a week. And so now I know what Im doing this weekend! (Maddy Varner / The Markup)

Amazon is postponing its major summer shopping event, Prime Day, until at least August. The company expects a potential $100 million hit from excess devices it might now have to sell at a discount. (Krystal Hu and Jeffrey Dastin / Reuters)

Some teachers are reporting that fewer than half of their students are participating in online learning. The absence rates are particularly high in schools with many low-income students, where access to home computers and internet connections can be spotty. Dana Goldstein, Adam Popescu and Nikole Hannah-Jones at The New York Times have the story:

The trend is leading to widespread concern among educators, with talk of a potential need for summer sessions, an early start in the fall, or perhaps having some or even all students repeat a grade once Americans are able to return to classrooms.

Students are struggling to connect in districts large and small. Los Angeles said last week that about a third of its high school students were not logging in for classes. And there are daunting challenges for rural communities like Minford, Ohio, where many students live in remote wooded areas unserved by internet providers.

IT contractors at Facebook have been told their physical presence is required to set up laptops for new hires and other remote employees. They have even been given letters to carry on their commutes stating that they are helping to provide essential services amid the COVID-19 pandemic. (Sam Biddle / The Intercept)

New York has 12 times as many coronavirus deaths as California. While it seemed to some that California lawmakers overreacted in early March, the decision to implement a state-wide shelter-in-place order early now seems like a necessary move. (German Lopez / Vox)

Heres what contact tracing, or tracking peoples locations via their smartphones, could look like in the US. The method, while invasive by American standards, is already working in South Korea and Singapore. (Derek Thompson / The Atlantic)

A group of disease experts is exploring using syndromic surveillance tracking aggregated data from emergency rooms to combat COVID-19. The technique was developed after 9/11 amid fears of bioterrorism. (Christina Farr / CNBC)

As government buildings throughout the US shut their doors to prevent the spread of COVID-19, many judges have moved operations online. The result is that custody hearings, bankruptcy proceedings, and abuse charges are being heard in virtual courts hosted on YouTube and Zoom. (Bloomberg)

Coronavirus has created an opportunity for tech companies to quietly lobby for long-held goals in the frantic political and economic environment created by the outbreak. Some of these involve delaying enforcement of Californias new privacy law and not reclassifying contractors as full-time employees. (David McCabe / The New York Times)

This is how coronavirus changed the way we use the internet from the devices we stream on, to the apps we use to connect with loved ones. While Americans are spending more time online, the growth hasnt been universal across all apps and services. (Ella Koeze and Nathaniel Popper / The New York Times)

Total cases in the US: At least 380,749

Total deaths in the US: At least 11,000

Reported cases in California: 16,329

Reported cases in New York: 138,836

Reported cases in New Jersey: 41,090

Reported cases in Michigan: 17,130

Data from The New York Times.

Wisconsin voters are facing a choice between protecting their health and exercising their right to vote after state Republican leaders rebuffed the Democratic governors attempt to postpone in-person voting in the presidential primary. The choice offers a grim foreshadowing of an expected national fight over voting rights in the year of COVID-19. Astead W. Herndon and Jim Rutenberg at The New York Times have the story:

The state stands as a first test case in what both national parties expect to be a protracted fight over changing voter rules to contend with the pandemic potentially the biggest voting rights battle since the passage of the Voting Rights Act of 1965. Mr. Evers was trying to push Wisconsin still further toward voting by mail.

Since the pandemic first forced stay-at-home orders across the country, many Democrats have advocated a universal vote-by-mail system in November. Republicans in several states and the president himself are pushing for as much in-person voting as possible.

Taiwan banned all government personnel from using Zoom due to security concerns. It recommended that officials use conferencing software provided by Google and Microsoft instead. (Mary Hui / Quartz)

The EU is moving ahead with its artificial intelligence regulations amid coronavirus disruptions. The proposed rules involve mandatory legal requirements for self-driving cars and biometric identification systems which could force companies to test AI prior to deployment and retrain their algorithms in Europe with different datasets to guarantee users rights are upheld. (Natalia Drozdiak / Bloomberg)

Facial recognition company Clearview AI has deep, longstanding ties to right-wing extremists. Some even helped build the app. Luke OBrien at HuffPost reports:

With the coronavirus pandemic increasingly throwing the country into chaos and President Donald Trump moving to expand domestic surveillance powers in theory, to better map disease spread Clearview has sought deeper inroads into government infrastructure and is now in discussions with state agencies to use its technology to track infected people, according to The Wall Street Journal. [...]

What hasnt been reported, however, is even scarier: Exclusive documents obtained by HuffPost reveal that Ton-That, as well as several people who have done work for the company, have deep, longstanding ties to far-right extremists. Some members of this alt-right cabal went on to work for Ton-That.

Facebook quietly released a new messaging app for couples called Tuned. The app lets two people send each other text and voice messages, along with photos and songs, after adding each others phone numbers. People have been building various versions of this app for years, and none has been a hit so far. (Alex Heath / The Information)

Mark Zuckerberg promised Instagram founder Kevin Systrom independence. But an excerpt from Sarah Friers book No Filter shows that once Instagram started to compete with Facebooks products, that independence gradually eroded. Ill have a lot more to say about this very good book, and soon! (Sarah Frier / Bloomberg)

Facebook Gaming launched tournaments for esports amateurs in early access across the globe. The tournament feature has been in the works for a while, but the company decided to release it early to help people cope with social isolation. (Dean Takahashi / VentureBeat)

Stuff to occupy you online during the quarantine.

Watch Mark Zuckerberg and Priscilla Chan interview Dr. Don Ganem, a leading infectious disease specialist, about developing treatments for COVID-19.

Read Tom Fords tips for looking good on video chats.

Apply for a grant to aid with coronavirus research. Or tell a scientist about it. Or donate to this effort! Cool project from Stripe co-founders Patrick and John Collison and some others.

Download yet another virtual Zoom background from this fun collection. Or this fun collection from the Hallmark Channel!

Send us tips, comments, questions, and WhatsApp forwards: casey@theverge.com and zoe@theverge.com.

View original post here:
How WhatsApp is making it more expensive to spread misinformation - The Verge

Zoom should be criticized for poor communication rather than privacy, security, expert says – ND Newswire

The video platform Zoom has experienced overnight success with offices and schools closed around the world due to the coronavirus pandemic. The increased usage has resulted in a string of security concerns, which, according to a University of Notre Dame cybersecurity and privacy expert, have largely been blown out of proportion.

Zoom is not dealing with a security and privacy crisis, its facing a communication and transparency crisis, according to MikeChapple, associate teaching professor of IT, analytics and operations at Notre Dames Mendoza College ofBusiness.

Zooms recent privacy and security issues arent any more significant than those facing any other tech company, and Zoom has quickly moved to correct each one of them, said Chapple, a former computer scientist with the National Security Agency. The challenge Zoom faces is that they were a specialized niche company that was suddenly thrust into the role of a critical infrastructure provider overnight and they simply werent ready for the intense level of scrutiny that theyve received as a result.

Perhaps the most publicized of Zooms woes is the practice of Zoombombing where people join unsecured Zoom calls and disrupt private conversations.

These arent the result of a security flaw in Zoom, Chapple explained. Zoombombing occurs when people either dont use a password to secure their Zoom meeting or give out the password on a public forum. You can protect yourself against this by following some simple best practices, such as not publishing your meeting password, using a waiting room to control access to your meeting and restricting screen sharing.

Zoom also has been criticized fornot offering end-to-end encryptionfor videoconferences, an approach Chapple says most people never use.

Its true that Zoom doesnt offer this level of encryption, Chapple said. Thats because its technically very difficult to do so. Look at the other major videoconferencing providers.Skype,Microsoft Teams andBlueJeansdont offer end-to-end encryption either. Its simply not a reasonable security expectation. Cisco WebEx does offer an end-to-end encryption option, butchoosing that option disables major features of the platform, including the ability to record a meeting.

Chapple points out that Zoom did make a major mistake in this area by publishing a false claim that the service supported end-to-end encryption. Theyve sinceapologized and published a technical descriptionof exactly how their encryption works.

There also have been reports ofZoom video recordings appearing on public websitesand cloud storage services, but Chapple says there is no indication this was Zooms doing.

Zoom offers a recording feature to meeting hosts anddiscloses to all participants when a meeting is being recorded, he said. At the end of the meeting, the host gets a copy of the video file. If they post it on an open forum, its not reasonable to hold Zoom accountable for the meeting hosts actions.

While researchers have identified afew security flaws in Zooms technologyover the past few weeks, Chapple says thats not unexpected for a platform suddenly thrust into the spotlight.

The reality is that every software product has critical security flaws that we simply havent discovered yet, he said. Zoom reacted to each one of these with apatch that corrected the problem. Thats what any responsible technology company would do.

Where Zoom really failed, according to Chapple, is with their pre-pandemic privacy policy.

It containedsome truly awful terms and conditionsthat basically granted the company the right to access private meeting information. After some scathing public criticism, Zoomrevised their privacy policyto align with industry best practices.

"If youre worried about the privacy and security issues at Zoom, dont use the service. Personally, Ive found Zoom to be a crucial part of my ability to teach and work from home. Im comfortable that theyre focusing on correcting security issues quickly and have built a platform that is scalable, reliable, and secure.

Contact: Mike Chapple, mchapple@nd.edu

Follow this link:
Zoom should be criticized for poor communication rather than privacy, security, expert says - ND Newswire

Are Bitcoin Cash Miners Driving Up the Price of Bitcoin? – Cointelegraph

Bitcoin (BTC) price has been a sight to behold over the last week. After successfully breaking through the resistance of $7,200 on Monday, April 6, all eyes were on the leading digital asset to hold $7K as fresh support, but as soon as the weekend was upon us, the price fell through this floor finding a new temporary bottom of $6,750.

So are these weekend dumps a sign that interest in Bitcoin is waning? Or is this simply whales taking advantage of thinner weekend volume to accumulate before the next big run?

Daily crypto market performance. Source: Coin360.com

BTC USD daily chart. Source: TradingView

Bitcoin keeps finding itself in a descending channel that formed 10 months ago. The last time the king of cryptocurrencies broke out of this channel, it encountered fierce resistance at 5 different levels ranging from $8,750 to $10,500.

Currently, Bitcoin is once more above this channel, with a new ascending channel taking form.From here Bitcoin needs to form support by closing the daily above $7,100 for history to start repeating itself, and this is not the only pattern repeating itself this year.

BTC USD weekly MACD chart Source: TradingView

The Moving Average Divergence Convergence (MACD) indicator on the weekly timeframe looks almost identical to that of Jan. 14, which is when Bitcoin last closed above the descending channel. This resulted in a rally from $9,000 to $10,500.

However, much like the last few days, Bitcoin did fall back into the channel before pushing forward to the yearly high.

At the time this was attributed to the mining difficulty increasing every 2 weeks, a trend that seems to be returning.

BTC mining difficulty. Source: BTC.com

After the Black Thursday event, which saw the price of Bitcoin plummet by 50%, the mining difficulty adjustment dropped by nearly 16%. This was one of the largest drops in a single period that Bitcoin had ever seen.

However, last week saw the difficulty increase by nearly 6% and the next adjustment is already looking to increase by 7%. With only 8 days left to go, its highly probable that this will wipe out the negative adjustment seen this year, so does that mean that price will follow?

If the price action at the beginning of 2020 is anything to go by, it might suggest another big price surge is due over the week ahead.

BCH hashrate chart. Source: BITINFOCHARTS

Last week Bitcoin Cash (BCH) had its halving and this caused a lackluster price spike of about 11% before the digital asset slowly settled back to its pre-halving price. However, as a result of the halving, the hash rate dropped off a cliff as can be seen in the chart above.

The most likely reason for this drop is due to the fact that those mining Bitcoin Cash use exactly the same hardware as Bitcoin miners. So when faced with a 50% reduction in profitability it would make more sense to point your miners to the real Bitcoin.

With more miners heading to the Bitcoin network, it would entirely make sense that the difficulty would start to rise. This is something that I expect to continue happening over the next 30 days ahead of the real Bitcoin halving.

However, this will also lead to the difficulty in mining BCH to plummet, so this little dance is something that will cause some very interesting price action over the coming weeks.

If Bitcoin closes above $7,100 it will be incredibly bullish for the week ahead. Once more $7,200 is the first level of resistance, however, $7,400 and $7,700 are the next two levels holding Bitcoin back from breaking $8,000.

With the growing number of miners driving up the difficulty on the Bitcoin network, a run to $9,200 isnt something that would be unreasonable to expect before the week is over.

It still feels like Bitcoin is recovering too soon and the pullback this weekend doesnt seem like it was enough. Should the weekly candle close below $7,100 I would first be looking at $6,750 and $6,500 as the last levels of support before opening up mid $5k range for buyers to step in.

The views and opinions expressed here are solely those of @officiallykeith and do not necessarily reflect the views of Cointelegraph. Every investment and trading move involves risk. You should conduct your own research when making a decision.

Read the original:
Are Bitcoin Cash Miners Driving Up the Price of Bitcoin? - Cointelegraph

Bitcoin Price Surges to $7,200 Heres What Top Traders Think Is Next – Cointelegraph

The sentiment of top traders on the short-term trend of the Bitcoin price remains mixed after BTC surged by more than five percent within less than six hours from $6,840 to $7,200.

Some prominent traders believe that the Bitcoin price could range between $7,700 and $7,300, grinding upwards to the low-$8,000 region. Others foresee a steep rejection in the $7,700 to $7,900 range, which has been a historically strong area of resistance.

Crypto market daily performance. Source: Coin360

The majority of top traders are seemingly convinced that Bitcoin price is likely to test $7,700 in the near-term.

BTC is currently hovering at its yearly open, and an upsurge to $7,700 would allow the dominant cryptocurrency to test a crucial reversal point that triggered the rally to $10,500 earlier this year.

When Bitcoin portrayed an unclean inverse head and shoulders pattern in December 2019, the $7,700 level served as the neckline of the entire formation. Eventually, Bitcoin climbed all the way to $10,500 by February 13, seeing an extended rally.

BTC USD daily chart. Source: TradingView

One trader who operates under the alias Thrillmex said that a CME gap exists at $8,400, which is the same area marked by renowned technical analyst PentarhUdi in early March.

On March 20, when the Bitcoin price was still trading at $5,200, PentarhUdi predicted that BTC is likely to rebound to as high as $8,500, which is an important weekly simple moving average level with historical significance.

PentarhUdi previously said:

This should bounce up from weekly SMA 200 ($5200) up to daily sma 200 ($8500). Break up of the upper trend line invalidates this bearish count. I remind you this is a hypothetical bearish outcome of previous published ideas.

The difference in the recent Bitcoin recovery beyond $7,100 is that its upward momentum has been supported with rising volume. Previous rallies saw declining volume, which typically indicate a fakeout.

In the short-term, traders are considering the following four scenarios:

The bearish scenario for BTC in the immediate-term is a higher time frame candle, like a weekly candle, closing below $6,900 and resuming the downtrend.

Cryptocurrency trader Scott Melker said:

If youre a bear, red was a clear spot to try a short. If you are a bull, a pull back to green looks like a good entry.

BTC USD 4-hour chart. Source: TradingView

With the price en-route to closing its weekly candle above $7,000, the general sentiment around BTC, at least in the short-term, remains a retest of $7,300 and possibly an extended upsurge to $7,700.

Bitcoin daily price chart. Source: Coin360

As the Bitcoin price pushed higher many of the top-10 altcoins followed suit. Ether (ETH) rallied 4.41%, Bitcoin Cash (BCH) gained 4.57% and Chainlink (LINK) added 12.92%.

The overall cryptocurrency market cap now stands at $201.4 billion and Bitcoins dominance rate is 64.2%.

Read more from the original source:
Bitcoin Price Surges to $7,200 Heres What Top Traders Think Is Next - Cointelegraph

Bitcoin Price Analysis: BTC/USD eyes $6,000 after breaking this pennant pattern support – FXStreet

Bitcoin is trading in the negative on Easter Monday following a weekend full of action. The price stepped above $7,500 but the lost steam before approaching the resistance at $7,600. Buyers and other investors were looking forward to pulling above $8,000. Instead, bears wasted no time enacting a revenge mission as BTC/USD dropped below several support areas including $7,200, $7,000 and $6,800.

At the time of writing, Bitcoin is trading at $6,713 after losing almost 3% of its value on the day. The prevailing picture is bearish amid high volatility. The RSI, for instance, has sharply retreated under the average (50). Further movement downwards could encourage sellers to increase their entries further pulling Bitcoin towards $6,000.

The same downward trend is emphasized by the MACD currently struggling to stay above the mean line. A bearish divergence puts the sellers in control. Besides, BTC/USD is trading below the moving average whereby the 100 SMA is hindering movement at $6,773 and the 50 SMA at $7,057.

A bearish weekend action saw Bitcoin price drop under a pennant patterns support. Continued reaction to this bearish pattern is deemed too detrimental for Bitcoin because the ongoing selling action could retest support at $6,000.

Read the original here:
Bitcoin Price Analysis: BTC/USD eyes $6,000 after breaking this pennant pattern support - FXStreet

Bitcoin Turned Sell After A Key Technical Rejection Above $7K – newsBTC

Bitcoin was rejected above the $7,000 level and it declined heavily against the US Dollar. BTC price is currently trading in a bearish zone and it could continue to slide towards $6,400.

After forming a support base above the $6,700 level, bitcoin price started a fresh increase against the US Dollar. BTC price climbed above the $6,900 and $7,000 levels, but it failed to gain bullish momentum.

It seems like the price was rejected above the $7,000 level and the 100 hourly simple moving average. More importantly, there is a crucial bearish trend line forming with resistance near $7,150 on the hourly chart of the BTC/USD pair.

Bitcoin Price

The pair formed a high near the $7,218 and declined heavily. It trimmed all its gains and even broke the $6,700 support area. A new weekly low is formed near the $6,559 level and the price is currently correcting higher.

It is trading near the 23.6% Fib retracement level of the recent decline from the $7,218 high to $6,559 low. An immediate resistance on the upside is near the $6,750 level (the recent breakdown zone).

If there are more gains above $6,750, bitcoin price might correct higher towards the $6,880 and $6,900 levels. The 50% Fib retracement level of the recent decline from the $7,218 high to $6,559 low is also near the $6,888 level to act as a resistance.

The main hurdle is now near the $7,150 and $7,200 levels, above which the price is likely to gain bullish momentum in the near term.

If bitcoin fails to recover above $6,750 or $6,900, there are chances of more downsides. An initial support is near the $6,600 level, below which the price might even decline below $6,500.

The next key support is near the $6,400 level, followed by $6,200 where the bulls are likely to take a stand.

Technical indicators:

Hourly MACD The MACD is currently showing a lot of bearish signs.

Hourly RSI (Relative Strength Index) The RSI for BTC/USD is now well below the 40 level.

Major Support Levels $6,500 followed by $6,200.

Major Resistance Levels $6,880, $7,000 and $7,150.

The rest is here:
Bitcoin Turned Sell After A Key Technical Rejection Above $7K - newsBTC