What Will Be the Future Prospects Of the Machine Learning Software Market? Trends, Factors, Opportunities and Restraints – Science In Me

Regal Intelligence has added latest report on Machine Learning Software Market in its offering. The global market for Machine Learning Software is expected to grow impressive CAGR during the forecast period. Furthermore, this report provides a complete overview of the Machine Learning Software Market offering a comprehensive insight into historical market trends, performance and 2020 outlook.

The report sheds light on the highly lucrative Global Machine Learning Software Market and its dynamic nature. The report provides a detailed analysis of the market to define, describe, and forecast the global Machine Learning Software market, based on components (solutions and services), deployment types, applications, and regions with respect to individual growth trends and contributions toward the overall market.

Request a sample of Machine Learning Software Market report @ https://www.regalintelligence.com/request-sample/102477

Market Segment as follows:

The global Machine Learning Software Market report highly focuses on key industry players to identify the potential growth opportunities, along with the increased marketing activities is projected to accelerate market growth throughout the forecast period. Additionally, the market is expected to grow immensely throughout the forecast period owing to some primary factors fuelling the growth of this global market. Finally, the report provides detailed profile and data information analysis of leading Machine Learning Software company.

Key Companies included in this report: Microsoft, Google, TensorFlow, Kount, Warwick Analytics, Valohai, Torch, Apache SINGA, AWS, BigML, Figure Eight, Floyd Labs

Market by Application: Application A, Application B, Application C

Market by Types: On-Premises, Cloud Based

Get Table of Contents @ https://www.regalintelligence.com/request-toc/102477

The Machine Learning Software Market research presents a study by combining primary as well as secondary research. The report gives insights on the key factors concerned with generating and limiting Machine Learning Software market growth. Additionally, the report also studies competitive developments, such as mergers and acquisitions, new partnerships, new contracts, and new product developments in the global Machine Learning Software market. The past trends and future prospects included in this report makes it highly comprehensible for the analysis of the market. Moreover, The latest trends, product portfolio, demographics, geographical segmentation, and regulatory framework of the Machine Learning Software market have also been included in the study.

Global Machine Learning Software Market Research Report 2020

Buy The Report @ https://www.regalintelligence.com/buyNow/102477

To conclude, the report presents SWOT analysis to sum up the information covered in the global Machine Learning Software market report, making it easier for the customers to plan their activities accordingly and make informed decisions. To know more about the report, get in touch with Regal Intelligence.

Read more:
What Will Be the Future Prospects Of the Machine Learning Software Market? Trends, Factors, Opportunities and Restraints - Science In Me

How Microsoft Teams will use AI to filter out typing, barking, and other noise from video calls – VentureBeat

Last month, Microsoft announced that Teams, its competitor to Slack, Facebooks Workplace, and Googles Hangouts Chat, had passed 44 million daily active users. The milestone overshadowed its unveiling of a few new features coming later this year. Most were straightforward: a hand-raising feature to indicate you have something to say, offline and low-bandwidth support to read chat messages and write responses even if you have poor or no internet connection, and an option to pop chats out into a separate window. But one feature, real-time noise suppression, stood out Microsoft demoed how the AI minimized distracting background noise during a call.

Weve all been there. How many times have you asked someone to mute themselves or to relocate from a noisy area? Real-time noise suppression will filter out someone typing on their keyboard while in a meeting, the rustling of a bag of chips (as you can see in the video above), and a vacuum cleaner running in the background. AI will remove the background noise in real time so you can hear only speech on the call. But how exactly does it work? We talked to Robert Aichner, Microsoft Teams group program manager, to find out.

The use of collaboration and video conferencing tools is exploding as the coronavirus crisis forces millions to learn and work from home. Microsoft is pushing Teams as the solution for businesses and consumers as part of its Microsoft 365 subscription suite. The company is leaning on its machine learning expertise to ensure AI features are one of its big differentiators. When it finally arrives, real-time background noise suppression will be a boon for businesses and households full of distracting noises. Additionally, how Microsoft built the feature is also instructive to other companies tapping machine learning.

Of course, noise suppression has existed in the Microsoft Teams, Skype, and Skype for Business apps for years. Other communication tools and video conferencing apps have some form of noise suppression as well. But that noise suppression covers stationary noise, such as a computer fan or air conditioner running in the background. The traditional noise suppression method is to look for speech pauses, estimate the baseline of noise, assume that the continuous background noise doesnt change over time, and filter it out.

Going forward, Microsoft Teams will suppress non-stationary noises like a dog barking or somebody shutting a door. That is not stationary, Aichner explained. You cannot estimate that in speech pauses. What machine learning now allows you to do is to create this big training set, with a lot of representative noises.

In fact, Microsoft open-sourced its training set earlier this year on GitHub to advance the research community in that field. While the first version is publicly available, Microsoft is actively working on extending the data sets. A company spokesperson confirmed that as part of the real-time noise suppression feature, certain categories of noises in the data sets will not be filtered out on calls, including musical instruments, laughter, and singing.

Microsoft cant simply isolate the sound of human voices because other noises also happen at the same frequencies. On a spectrogram of speech signal, unwanted noise appears in the gaps between speech and overlapping with the speech. Its thus next to impossible to filter out the noise if your speech and noise overlap, you cant distinguish the two. Instead, you need to train a neural network beforehand on what noise looks like and speech looks like.

To get his points across, Aichner compared machine learning models for noise suppression to machine learning models for speech recognition. For speech recognition, you need to record a large corpus of users talking into the microphone and then have humans label that speech data by writing down what was said. Instead of mapping microphone input to written words, in noise suppression youre trying to get from noisy speech to clean speech.

We train a model to understand the difference between noise and speech, and then the model is trying to just keep the speech, Aichner said. We have training data sets. We took thousands of diverse speakers and more than 100 noise types. And then what we do is we mix the clean speech without noise with the noise. So we simulate a microphone signal. And then you also give the model the clean speech as the ground truth. So youre asking the model, From this noisy data, please extract this clean signal, and this is how it should look like. Thats how you train neural networks [in] supervised learning, where you basically have some ground truth.

For speech recognition, the ground truth is what was said into the microphone. For real-time noise suppression, the ground truth is the speech without noise. By feeding a large enough data set in this case hundreds of hours of data Microsoft can effectively train its model. Its able to generalize and reduce the noise with my voice even though my voice wasnt part of the training data, Aichner said. In real time, when I speak, there is noise that the model would be able to extract the clean speech [from] and just send that to the remote person.

Comparing the functionality to speech recognition makes noise suppression sound much more achievable, even though its happening in real time. So why has it not been done before? Can Microsofts competitors quickly recreate it? Aichner listed challenges for building real-time noise suppression, including finding representative data sets, building and shrinking the model, and leveraging machine learning expertise.

We already touched on the first challenge: representative data sets. The team spent a lot of time figuring out how to produce sound files that exemplify what happens on a typical call.

They used audio books for representing male and female voices, since speech characteristics do differ between male and female voices. They used YouTube data sets with labeled data that specify that a recording includes, say, typing and music. Aichners team then combined the speech data and noises data using a synthesizer script at different signal to noise ratios. By amplifying the noise, they could imitate different realistic situations that can happen on a call.

But audiobooks are drastically different than conference calls. Would that not affect the model, and thus the noise suppression?

That is a good point, Aichner conceded. Our team did make some recordings as well to make sure that we are not just training on synthetic data we generate ourselves, but that it also works on actual data. But its definitely harder to get those real recordings.

Aichners team is not allowed to look at any customer data. Additionally, Microsoft has strict privacy guidelines internally. I cant just simply say, Now I record every meeting.'

So the team couldnt use Microsoft Teams calls. Even if they could say, if some Microsoft employees opted-in to have their meetings recorded someone would still have to mark down when exactly distracting noises occurred.

And so thats why we right now have some smaller-scale effort of making sure that we collect some of these real recordings with a variety of devices and speakers and so on, said Aichner. What we then do is we make that part of the test set. So we have a test set which we believe is even more representative of real meetings. And then, we see if we use a certain training set, how well does that do on the test set? So ideally yes, I would love to have a training set, which is all Teams recordings and have all types of noises people are listening to. Its just that I cant easily get the same number of the same volume of data that I can by grabbing some other open source data set.

I pushed the point once more: How would an opt-in program to record Microsoft employees using Teams impact the feature?

You could argue that it gets better, Aichner said. If you have more representative data, it could get even better. So I think thats a good idea to potentially in the future see if we can improve even further. But I think what we are seeing so far is even with just taking public data, it works really well.

The next challenge is to figure out how to build the neural network, what the model architecture should be, and iterate. The machine learning model went through a lot of tuning. That required a lot of compute. Aichners team was of course relying on Azure, using many GPUs. Even with all that compute, however, training a large model with a large data set could take multiple days.

A lot of the machine learning happens in the cloud, Aichner said. So, for speech recognition for example, you speak into the microphone, thats sent to the cloud. The cloud has huge compute, and then you run these large models to recognize your speech. For us, since its real-time communication, I need to process every frame. Lets say its 10 or 20 millisecond frames. I need to now process that within that time, so that I can send that immediately to you. I cant send it to the cloud, wait for some noise suppression, and send it back.

For speech recognition, leveraging the cloud may make sense. For real-time noise suppression, its a nonstarter. Once you have the machine learning model, you then have to shrink it to fit on the client. You need to be able to run it on a typical phone or computer. A machine learning model only for people with high-end machines is useless.

Theres another reason why the machine learning model should live on the edge rather than the cloud. Microsoft wants to limit server use. Sometimes, there isnt even a server in the equation to begin with. For one-to-one calls in Microsoft Teams, the call setup goes through a server, but the actual audio and video signal packets are sent directly between the two participants. For group calls or scheduled meetings, there is a server in the picture, but Microsoft minimizes the load on that server. Doing a lot of server processing for each call increases costs, and every additional network hop adds latency. Its more efficient from a cost and latency perspective to do the processing on the edge.

You want to make sure that you push as much of the compute to the endpoint of the user because there isnt really any cost involved in that. You already have your laptop or your PC or your mobile phone, so now lets do some additional processing. As long as youre not overloading the CPU, that should be fine, Aichner said.

I pointed out there is a cost, especially on devices that arent plugged in: battery life. Yeah, battery life, we are obviously paying attention to that too, he said. We dont want you now to have much lower battery life just because we added some noise suppression. Thats definitely another requirement we have when we are shipping. We need to make sure that we are not regressing there.

Its not just regression that the team has to consider, but progression in the future as well. Because were talking about a machine learning model, the work never ends.

We are trying to build something which is flexible in the future because we are not going to stop investing in noise suppression after we release the first feature, Aichner said. We want to make it better and better. Maybe for some noise tests we are not doing as good as we should. We definitely want to have the ability to improve that. The Teams client will be able to download new models and improve the quality over time whenever we think we have something better.

The model itself will clock in at a few megabytes, but it wont affect the size of the client itself. He said, Thats also another requirement we have. When users download the app on the phone or on the desktop or laptop, you want to minimize the download size. You want to help the people get going as fast as possible.

Adding megabytes to that download just for some model isnt going to fly, Aichner said. After you install Microsoft Teams, later in the background it will download that model. Thats what also allows us to be flexible in the future that we could do even more, have different models.

All the above requires one final component: talent.

You also need to have the machine learning expertise to know what you want to do with that data, Aichner said. Thats why we created this machine learning team in this intelligent communications group. You need experts to know what they should do with that data. What are the right models? Deep learning has a very broad meaning. There are many different types of models you can create. We have several centers around the world in Microsoft Research, and we have a lot of audio experts there too. We are working very closely with them because they have a lot of expertise in this deep learning space.

The data is open source and can be improved upon. A lot of compute is required, but any company can simply leverage a public cloud, including the leaders Amazon Web Services, Microsoft Azure, and Google Cloud. So if another company with a video chat tool had the right machine learners, could they pull this off?

The answer is probably yes, similar to how several companies are getting speech recognition, Aichner said. They have a speech recognizer where theres also lots of data involved. Theres also lots of expertise needed to build a model. So the large companies are doing that.

Aichner believes Microsoft still has a heavy advantage because of its scale. I think that the value is the data, he said. What we want to do in the future is like what you said, have a program where Microsoft employees can give us more than enough real Teams Calls so that we have an even better analysis of what our customers are really doing, what problems they are facing, and customize it more towards that.

Original post:
How Microsoft Teams will use AI to filter out typing, barking, and other noise from video calls - VentureBeat

With A.I., the Secret Life of Pets Is Not So Secret – The New York Times

This article is part of our latest Artificial Intelligence special report, which focuses on how the technology continues to evolve and affect our lives.

Most dog owners intuitively understand what their pet is saying. They know the difference between a bark for Im hungry and one for Im hurt.

Soon, a device at home will be able to understand them as well.

Furbo, a streaming camera that can dispense treats for your pet, snap photos and send you a notification if your dog is barking, provides a live feed of your home that you can check on a smartphone app.

In the coming months, Furbo is expected to roll out a new feature that allows it to differentiate among kinds of barking and alert owners if a dogs behavior appears abnormal.

Thats sort of why dogs were hired in the first place, to alert you of danger, said Andrew Bleiman, the North America general manager for Tomofun, the company that makes Furbo. So we can tell you not only is your dog barking, but also if your dog is howling or whining or frantically barking, and send you basically a real emergency alert.

The ever-expanding world of pet-oriented technology now allows owners to toss treats, snap a dog selfie and play with the cat all from afar. And the artificial intelligence used in such products is continuing to refine what we know about animal behavior.

Mr. Bleiman said the new version of Furbo was a result of machine learning from the video data of thousands of users. It relied on 10-second clips captured with its technology that users gave feedback on. (Furbo also allows users to opt out of sharing their data.)

The real evolution of the product has been on the computer vision and bioacoustics side, so the intelligence of the software, he said. When you have a camera that stares at a dog all day and listens to dogs all day, the amount of data is just tremendous.

The Furbo team is even able to refine the data by the breed or size of a dog: I can tell you, for example, that on average, at least as much as our camera picks up, a Newfoundland barks four times a day and a Husky barks 36 times a day.

Petcube is another interactive pet camera, the latest iteration of which is equipped with the Amazon Alexa voice assistant.

Yaroslav Azhnyuk, the companys chief executive and co-founder, is confident that A.I. is helping pet owners better understand their animals behavior. The company is working on being able to detect unusual behaviors.

We started applying algorithms to understand pet behavior and understand what they might be trying to say or how they are feeling, he said. We can warn you that OK, your dogs activity is lower than usual, you should maybe check with the vet.

Before the coronavirus pandemic forced many pet owners to work from home during the day, they were comforted by the ability to check on their pet in real time, which had driven demand for all kinds of cameras. Mr. Bleiman said the average Furbo user would check on their pet more than 10 times a day during the workweek.

Petcube users spent about 50 minutes a week talking to their pet through the camera, Mr. Azhnyuk said.

The same way you want to call your mom or child, you want to call your dog or cat, he said. Weve seen people using Petcubes for turtles and for snakes and chickens and pigs, all kinds of animals.

Now that shes working from home as part of measures to contain the spread of coronavirus in New York City, Patty Lynch, 43, has plenty of time to watch her dog, Sadie. When shes away from her Battery Park apartment, she uses a Google Nest to keep an eye on her. Ms. Lynch originally bought the camera three years ago to stream video of Sadie while she recovered from surgery.

I get alerts whenever she moves around, Ms. Lynch said. I also get noise alerts if she starts barking at something. Ill be able to go in and then see her in real time and figure out what shes doing.

Sometimes I just like to check in on her, she said. I just look at her and she makes me smile.

Lionel P. Robert Jr., associate professor at the University of Michigans school of information and a core faculty member at Michigans Robotics Institute, said A.I.-enabled technology has so far centered on the owners need for assurance that their pet was OK while they were away from home.

He predicted that future technology would focus more on the wellness of the pet.

There are a lot of people using these cameras because when they see their pet they feel assured and they feel comfortable. Right now, its less for the pet and more for the humans, he said.

Imagine if all that data was being fed to your veterinarian in real time and theyre sending back data. The idea of well-being for the pet, its weight, how far its walking.

Mr. Robert noted that other parts of the world had gone a step further with technology: Theyre actually adopting robotic pets.

While products like Petcube and Furbo are mostly used by dog owners, there are A.I. devices out there for cats as well. Many people track them throughout the day using interactive cameras, and one start-up has devised an intelligent laser for automated playtime.

Yuri Brigance came up with the idea about four years ago, after his divorce. He was away from the house, working up to 10 hours a day, and was worried about his two cats at home.

This idea came up of using a camera to track animals, where their positions are in the room and moving the laser intelligently instead of randomly so that they have something more real to chase, he said.

The result was Felik, a toy that can be scheduled via an app for certain playtimes and has features such as zone restriction, which designates areas in the home the laser cant go, such as on furniture.

Mr. Brigance said his product did not store video in the cloud and required an internet connection to work, like many video products. It analyzes data in the device.

We use machine-learning models to perform whats called semantic segmentation, which is basically separating the background, the room and all the objects in it, from interesting objects, things that are moving, like cats or humans, Mr. Brigance explained.

The device then determines where the cat has been and what it is currently doing, and predicts what it is about to do next, so it can create a playful game that mirrors chasing live prey.

The laser toy, Mr. Brigance said, has provided his cats, and those of his customers, with hours upon hours of playtime.

Some people are using it almost on a daily basis and theyre recording things like where they used to have a cat that would scratch furniture, that would get really agitated if it had nothing to do, that this actually prevents them from destroying the house, he said.

Or cats that meow in the morning and try to wake up their owners if you set a schedule for this thing to activate in the morning, it can distract the cat and let you sleep a little bit longer.

See the original post here:
With A.I., the Secret Life of Pets Is Not So Secret - The New York Times

What Is The Hiring Process Of Data Scientists At IBM? – Analytics India Magazine

In a world that is increasingly becoming digitalized, businesses are relying more heavily on data analytics to drive decision-making. In this setting, tech giant IBM has secured a firm footing in the domain of data science. With the opportunities that the company could offer in this space, how can aspirants get a leg up on a data science career with IBM?

According to the companys Asia Pacific Leader of Technical Elite Team for Data Warehouse & AI, Vishal Chahal, demonstrating holistic skills around ML Ops as well as Data Ops can go a long way.

As a data scientist, experience in handling data Ops has become far more important than just a candidates educational background, he says. They will need to demonstrate the stack skills where they have dealt with data before. A statistical background will be considered an added bonus, he adds.

The technical skills that IBM looks for in data science candidates encompasses ML Ops, which includes some of the newer skills, like debiasing and machine learning model runtime management.

In addition to that, they need to possess adequate skills in the areas of Data ops, data wrangling and domain knowledge, which is essentially a cross section between industry knowledge and applicability of machine learning in those industries, says Chahal.

Although the company does not overemphasize candidates educational background, they need to have a good grasp of the relevant competencies mentioned above. With several platforms abound with machine learning certifications, Chahal feels that that may be a good approach for data science aspirants to upskill themselves.

These certifications can verify their awareness about various platforms, tools, libraries and packages that are being used across enterprises today, as well as the familiarity or the ability to work with open source or enterprise/vendor-specific tools.

In fact, IBM also offers code patterns on data science for free, which explores the use of machine learning approaches to different industry scenarios and solution domains.

ALSO READ: Why Companies Like IBM Are Coming Up With Free Data Science Courses

Although the benefits of certifications cannot be emphasized enough, with changing times, the industry requirements for data scientists have evolved too. While online courses have their place in the sector, today the industry is looking for data science stack skills in developing programs, which requires augmented certification along with hands-on experience of having worked on projects. That is, the overall requirement is dual, and this trend is being observed in the hiring practices at IBM as well.

If you are starting off your career as a data scientist, certifications will certainly help you establish your skill, says Chahal. But what will give you the edge is demonstrating a few projects to prove that you have applied the acquired knowledge and skills, he adds.

According to him, having published code or open sourced on GitHub on data science, or having participated in Kaggle competitions, would prove a candidates credential that they have hands-on experience in different fields of data science. As an accomplished data scientist, we look for experience of having worked on a variety of projects in the data science technology stack.

Concurs Sharath Kumar RK, who has been working as a data scientist at IBM for nearly four years. While recruiters will test aspirants ability to solve problems on paper, the prime focus will still be on their understanding of challenges at both a micro and a macro level, he says.

READ MORE: Is Data Science For You? This IBM Data Scientist Tells How To Figure It Out

According to Chahal, once hired, data scientists at IBM, while focused on getting insights, have to adopt three important data science related best practices:

According to Chahal, while the popular hiring trend has seen the recruitment of experts from pure data science background with little or no industry experience in the beginning, this is no longer the case.

Lately, the trend has moved towards recruiting data scientists with stack skills, including Data Ops and ML Ops, or of data scientists possessing domain knowledge, he says. Some companies continue to recruit pure data science experts. However, they do look for additional certification, which proves their ability to work across enterprise-wide platforms or open source tools, he adds.

comments

View post:
What Is The Hiring Process Of Data Scientists At IBM? - Analytics India Magazine

Data Science and Machine-Learning Platforms Market discussed in a new research report – WhaTech Technology and Markets News

2020 Research Report on Global Data Science and Machine-Learning Platforms Market is a professional and comprehensive report on the Data Science and Machine-Learning Platforms industry.

Report: http://www.reportsnreports.com/contactme=3095475

The key players covered in this study- SAS- Alteryx- IBM- RapidMiner- KNIME- Microsoft- Dataiku- Databricks- TIBCO Software- MathWorks- H20.ai- Anaconda- SAP- Google- Domino Data Lab- Angoss- Lexalytics- Rapid Insight

The report pinpoints on the leading market competitors with explaining Data Science and Machine-Learning Platforms company profile depends on SWOT analysis to illustrate the competitive nature of the Data Science and Machine-Learning Platforms market globally. Even more, the report consists of company recent Data Science and Machine-Learning Platforms market evolution, market shares, associations and level of investments with other Data Science and Machine-Learning Platforms leading companies, monetary settlements impacting the Data Science and Machine-Learning Platforms market in recent years are analyzed.

Development policies and plans are discussed as well as manufacturing processes and cost structures are also analyzed. This report also states import/export consmption, supply and demand Figures, cost, price, revenue and gross margins.

The report focuses on global major leading Data Science and Machine-Learning Platforms Industry players providing information such as company profiles, product picture and specification, capacity, production, price, cost, revenue and contact information. Upstream raw materials and equipment and downstream demand analysis is also carried out.

The Data Science and Machine-Learning Platforms industry development trends and marketing channels are analyzed. Finally the feasibility of new investment projects are assessed and overall research conclusions offered.

Geographically, this report is categorized into various main regions, including sales, proceeds, market share and expansion Rate (percent) of Data Science and Machine-Learning Platforms in the following areas, North America, Asia-Pacific, South America, Europe, Asia-Pacific, The Middle East and Africa.

Report: http://www.reportsnreports.com/.aspx?name=3095475

Major Points from Table of Contents

Chapter 1 - Data Science and Machine-Learning Platforms Market Overview

Chapter 2 - Global Data Science and Machine-Learning Platforms Competition by Players/Suppliers, Type and Application

Chapter 3 - United States Data Science and Machine-Learning Platforms (Volume, Value and Sales Price)

Chapter 4 - China Data Science and Machine-Learning Platforms (Volume, Value and Sales Price)

Chapter 5- Europe Data Science and Machine-Learning Platforms (Volume, Value and Sales Price)

Chapter 6 - Japan Data Science and Machine-Learning Platforms (Volume, Value and Sales Price)

Chapter 7 - Southeast Asia Data Science and Machine-Learning Platforms (Volume, Value and Sales Price)

Chapter 8 - India Data Science and Machine-Learning Platforms (Volume, Value and Sales Price)

Chapter 9 - Global Data Science and Machine-Learning Platforms Players/Suppliers Profiles and Sales Data

Chapter 10 - Data Science and Machine-Learning Platforms Maufacturing Cost Analysis

Chapter 11 - Industrial Chain, Sourcing Strategy and Downstream Buyers

Chapter 12 - Marketing Strategy Analysis, Distributors/Traders

Chapter 13 - Market Effect Factors Analysis

Chapter 14 - Global Data Science and Machine-Learning Platforms Market Forecast (2020-2026)

Chapter 15 - Research Findings and Conclusion

Chapter 16 - Appendix

Report: http://www.reportsnreports.com/contactme=3095475

In the end, the Global Data Science and Machine-Learning Platforms Market report's conclusion part notes the estimation of the industry veterans.

This email address is being protected from spambots. You need JavaScript enabled to view it.

Excerpt from:
Data Science and Machine-Learning Platforms Market discussed in a new research report - WhaTech Technology and Markets News

Kin Insurance Partners with Cape Analytics to Improve Insurance Experience – AiThority

Cape Analytics is announcing that Kin Insurance a fully licensed home insurance technology company that provides easy, affordable coverage to homeowners in catastrophe-prone regions has expanded its partnership with Cape Analytics. Kin is using Cape Analytics geospatial property intelligence to inform its homeowner insurance offering and provide customers the best possible coverage at the lowest price with the least hassle. By utilizing Cape Analytics for remote risk assessment, Kin is continuing to write policies and serve customers, while maintaining social distancing rules that keep customers and employees safe.

We are thrilled to have a growing partnership with an innovative, data-first carrier like Kin where we can enable them to expand usage in alignment with their rapid growth as an upstart insurer

Cape Analytics is providing Kin with the most comprehensive, timely, and accurate property information available, by leveraging geospatial imagery, computer vision, and machine learning. The integration of Cape Analytics data allows Kin to provide customers with policies tailored to individual property and coverage needs. Cape Analytics automatically provides information such as roof condition, roof type, tree coverage, and presence of a swimming pool, allowing Kin customers to get the right coverage faster.

Recommended AI News: Help Stop the Spread of COVID-19 at TrackMyTemp

Kin is using this new form of instant property intelligence in innovative ways by leveraging property attributes that are related to geo-specific risks. For example, in a wind-prone state like Florida, Kin can access Capes wind-related property attributes such as roof type and the presence of pool enclosures. In states with higher risk of wildfire, Kin may automatically retrieve Cape information regarding vegetation coverage surrounding a structure. In precipitation-heavy areas, Capes loss-predictive Roof Condition Rating can allow Kin to better understand the potential of a property experiencing water damage from a leaking roof.

In a recent study of Hurricane Irma, Cape Analytics found that Florida homes with roofs in poor or severe condition were far more vulnerable and had a 45 percent higher chance of suffering major damage. In addition, 65 percent of homes affected by the hurricane took more than six months to repair. Kin is leveraging these and other insights to decrease customer risk while improving their experience.

Recommended AI News: Cox Communications Uses Virtual Assistance to Support Customers at Social Distance During Coronavirus Crisis

Our platform is built from the ground up to seamlessly integrate industry-leading sources of data, which is exactly what Cape Analytics provides. As a result, we can leverage our machine learning prediction framework to instantly assess risk and customize coverage and prices through our super simple online experience, said Blake Konrardy, VP of Product at Kin.

We are thrilled to have a growing partnership with an innovative, data-first carrier like Kin where we can enable them to expand usage in alignment with their rapid growth as an upstart insurer, said Busy Cummings, VP of Sales at Cape Analytics.

Both companies have received outstanding recognition in recent months: Fast Company named Kin one of the most innovative finance companies of 2020, while Insurance Insider shortlisted Cape Analytics as 2020 InsurTech of the Year.

Recommended AI News: Extreme Networks Continues Rapid Expansion of Cloud Footprint

More:
Kin Insurance Partners with Cape Analytics to Improve Insurance Experience - AiThority

Signal warns it could stop operating in US if anti-encryption bill passes – Mashable

Image: Getty Images / iStockphoto

PCMag.com is a leading authority on technology, delivering Labs-based, independent reviews of the latest products and services. Our expert industry analysis and practical solutions help you make better buying decisions and get more from technology.

Signalis warning that an anti-encryption bill circulating in Congress could force the private messaging app to pull out of the US market.

Since the start of the coronavirus pandemic, the free app, which offersend-to-end encryption, has seen a surge in traffic. But on Wednesday, the nonprofit behind the app published a blog post, raising the alarm around the EARN IT Act. At a time when more people than ever are benefiting from these (encryption) protections, the EARN IT bill proposed by the Senate Judiciary Committee threatens to put them at risk, Signal developer Joshua Lund wrote in the post.

Although the goal of the legislation, which has bipartisan support, is to stamp out online child exploitation, it does so by letting the US government regulate how internet companies should combat the problemeven if it means undermining the end-to-end encryption protecting your messages from snoops.

If the companies fail to do so, they risk losing legal immunity under Section 230 of the Communications Decency Act, which can shield them from lawsuits concerning objectionable or illegal content posted on their websites or apps.

Some large tech behemoths could hypothetically shoulder the enormous financial burden of handling hundreds of new lawsuits if they suddenly became responsible for the random things their users say, but it would not be possible for a small nonprofit like Signal to continue to operate within the United States, Lund wrote in the blog post.

Why Signal is concerned the bill will undermine end-to-end encryption is because it gives US Attorney General William Barr a major critic of encryption the power to dictate how internet companies fight online child exploitation. In recent months, Barr has been calling on Facebook to reverse a plan to expand end-to-end encryption across its services, on claims the technology is preventing law enforcement from tracking down criminals, including child sex offenders.

Companies should not deliberately design their systems to preclude any form of access to content, even for preventing or investigating the most serious crimes, Barr wrote to Facebook back in October. This puts our citizens and societies at risk by severely eroding a companys ability to detect and respond to illegal content and activity, such as child sexual exploitation and abuse, terrorism.

However, Signal says the efforts to undermine end-to-end encryption risk doing more harm to innocent users than actual criminals, who will simply choose other ways to mask their activities online. If easy-to-use software like Signal somehow became inaccessible, the security of millions of Americans (including elected officials and members of the armed forces) would be negatively affected, Lund added. Meanwhile, criminals would just continue to use widely available (but less convenient) software to jump through hoops and keep having encrypted conversations.

The EARN IT Act opposed by privacy advocates and tech lobbying groups but has received support from six Democratic US senators and four Republican senators.Our goal is to do this in a balanced way that doesnt overly inhibit innovation, but forcibly deals with child exploitation, US Senator Lindsey Graham (R-South Carolina) said last month in announcing the legislation.

Simply put, tech companies need to do better, added Senator Richard Blumenthal (D-Connecticut). Tech companies have an extraordinary special safeguard against legal liability, but that unique protection comes with a responsibility.

But other lawmakers say they're against the bill, citing its potential to be abused. "This terrible legislation is a Trojan horse to give Attorney General Barr and Donald Trump the power to control online speech and require government access to every aspect of Americans' lives," said Senator Ron Wyden (D-Oregon) last month.

This article originally published at PCMaghere

Read more:
Signal warns it could stop operating in US if anti-encryption bill passes - Mashable

Customer Personal Information Is the Number One Data Protection Priority nCipher 2020 Global Encryption Trends Study – Financial Post

Organizations racing to protect sensitive data as it proliferates across cloud, IoT devices and 5G networks

MINNEAPOLIS & CAMBRIDGE, England As organizations accelerate digital initiatives such as cloud and the internet of things (IoT), and data volumes and types continue to rise, IT professionals cite protection of customer personal information as their number one priority, according to the 2020 Global Encryption Trends Study from the Ponemon Institute.

The Ponemon Institute has collaborated with nCipher Security, an Entrust Datacard company and world leader in hardware security modules (HSMs), on this multinational survey of how and why organizations deploy encryption, now in its fifteenth year.

Threats, drivers and priorities

For the first time, protecting consumer personal information is the top driver for deploying encryption (54% of respondents), outranking compliance, which ranked fourth (47%). Traditionally compliance with regulations was the top driver for deploying encryption, but has dropped in priority since 2017, indicating that encryption is transitioning from a requirement to a proactive choice to safeguard critical information.

Employee mistakes continue to be the biggest threat to sensitive data (54%) and significantly outweigh concerns over attacks by hackers (29%), or malicious insiders (20%). In contrast, the least significant threats cited include government eavesdropping (11%) and lawful data requests (12%).

Data discovery the number one challenge

With the proliferation of data from digital initiatives, cloud use, mobility, IoT devices and the advent of 5G networks, data discovery continues to be the biggest challenge in planning and executing a data encryption strategy, with 67% of respondents citing this as their top concern. And that is likely to increase, with a pandemic-driven surge in employees working remotely, using data at home, creating extra copies on personal devices and cloud storage.

Blockchain, quantum and adoption of new encryption technologies

The study indicates that 48% of organizations have adopted encryption strategies across their enterprises, up from 45% in 2019. With encryption deployment steadily growing, how are organizations looking ahead? In the near term, 60% of organizations plan to use blockchain, with cryptocurrency/wallets, asset transactions, identity, supply chain and smart contracts cited at the top use cases.

Other much-hyped technologies are not on IT organizations near-term radar. Most IT professionals see the mainstream adoption of multi-party computation at least five years away, with mainstream adoption of homomorphic encryption more than six years away, and quantum resistant algorithms over eight years out.

Trust, integrity, control

The use of hardware security modules (HSMs) continues to grow, with 48% of respondents deploying HSMs to provide a hardened, tamper-resistant environment with higher levels of trust, integrity and control for both data and applications. Organizations in Germany, the United States and Middle East are more likely to deploy HSMs, with Australia, Germany and the United States most likely to assign importance to HSMs as part of their organizations encryption or key management activities.

HSM usage is no longer limited to traditional use cases such as public key infrastructure (PKI), databases, application and network encryption (TLS/SSL). The demand for trusted encryption for new digital initiatives has driven significant HSM growth for big data encryption (up 17%) code signing (up 12%), IoT root of trust (up 10%) and document signing (up 7%). Additionally, 35% of respondents report using HSMs to secure access to public cloud applications.

The race to the cloud

Eighty-three percent of respondents report transferring sensitive data to the cloud, or planning to do so within the next 12 to 24 months, with organizations in the United States, Brazil, Germany, India and South Korea doing so most frequently.

In the next 12 months, respondents predict a significant increase in the ownership and operation of HSMs to generate and manage Bring Your Own Key (BYOK), and integration with a Cloud Access Security Broker (CASB) to manage keys and cryptographic operations. The survey found that the most important cloud encryption features are:

Consumers expect brands to keep their data safe from breaches and have their best interests at heart. The survey found that IT leaders are taking this seriously, with protection of consumer data cited as the top driver of encryption growth for the first time, says Dr Larry Ponemon, chairman and founder of Ponemon Institute. Encryption use is at an all-time high with 48% of respondents this year saying their organization has an overall encryption plan applied consistently across the entire enterprise, and a further 39% having a limited plan or strategy applied to certain application and data types.

As the world goes digital, the impact of the global pandemic highlights how security and identity have become critical for organizations and individuals both at work and at home, says John Grimm vice president of strategy at nCipher Security. Organizations are under relentless pressure to deliver high security and seamless access protecting their customer data, business critical information and applications while ensuring business continuity. nCipher empowers customers by providing a high assurance security foundation that ensures the integrity and trustworthiness of their data, applications and intellectual property.

Other key trends include:

Download the 2020 Global Encryption Trends Study here.

2020 Global Encryption Trends Study methodology

The 2020 Global Encryption Trends Study, based on research by the Ponemon Institute, captures how organizations around the world are dealing with compliance, increased threats, and the implementation of encryption to protect their business critical information and applications. 6,457 IT professionals were surveyed across multiple industry sectors in 17 countries/regions: Australia, Brazil, France, Germany, India, Japan, Hong Kong, Mexico, the Middle East (which is a combination of respondents located in Saudi Arabia and the United Arab Emirates), the Russian Federation, Southeast Asia (Indonesia, Malaysia, Philippines, Thailand, and Vietnam), South Korea, Taiwan, the United Kingdom, the United States and two new regions for the first time, Netherlands and Sweden.

About nCipher Security

nCipher Security, an Entrust Datacard company, is a leader in the general-purpose hardware security module (HSM) market, empowering world-leading organizations by delivering trust, integrity and control to their business-critical information and applications. Todays fast-moving digital environment enhances customer satisfaction, gives competitive advantage and improves operational efficiency it also multiplies the security risks. Our cryptographic solutions secure emerging technologies such as cloud, IoT, blockchain, and digital payments and help meet new compliance mandates. We do this using our same proven technology that global organizations depend on today to protect against threats to their sensitive data, network communications and enterprise infrastructure. We deliver trust for your business-critical applications, ensure the integrity of your data and put you in complete control today, tomorrow, always. http://www.ncipher.com

Follow us on LinkedIn, Twitter, Facebook and Instagram search nCipherSecurity.

View source version on businesswire.com: https://www.businesswire.com/news/home/20200407005297/en/

Contacts

nCipher Security Liz Harris liz.harris@ncipher.com +44 7973 973648

Continued here:
Customer Personal Information Is the Number One Data Protection Priority nCipher 2020 Global Encryption Trends Study - Financial Post

Foreign Spies Are Targeting Americans on Zoom and Other Video Chat Platforms, U.S. Intel Officials Say – TIME

As much of the world works from home, an explosion of video conference calls has provided a playground not just for Zoombombers, phishermen and cybercriminals, but also for spies. Everyone from top business executives to government officials and scientists are using conferencing apps to stay in touch during the new coronavirus lockdowns and U.S. counterintelligence agencies have observed the espionage services of Russia, Iran, and North Korea attempting to spy on Americans video chats, three U.S. intelligence officials tell TIME.

But the cyberspies that have moved fastest and most aggressively during the pandemic, the intelligence officials say, have been Chinas. More than anyone else, the Chinese are interested in what American companies are doing, said one of the three. And that, in turn, has some U.S. counterintelligence officials worrying about one video conference platform in particular: Zoom. While the Chinese, Russians, and others are targeting virtually every tool Americans and others are using now that theyre forced to work from home, Zoom is an attractive target, especially for China, the intelligence officials and internet security researchers say.

An Apr. 3 report by The Citizen Lab, a research organization at the University of Toronto, found a number of shortcomings in Zooms security, including some that made it particularly vulnerable to China. It found that Zooms encryption scheme has significant weaknesses, including routing some encryption keys through Chinese servers, and that its ownership structure and reliance on Chinese labor could make Zoom responsive to pressure from Chinese authorities.

The U.S. intelligence officials stress there is no evidence that Zoom is cooperating with China or has been compromised by it, only that Zooms security measures leave gaps, some of which may make the application less secure than others. All three intelligence officials, who requested anonymity because they are not authorized to discuss ongoing operations with the media, said spies are using multiple applications to search government, corporate, and academic conversations for financial, personal, product development, research, and intellectual property information and leads. Federal experts have warned both government and private officials not to use video conference applications to discuss or exchange sensitive information. In a memo on Thursday, the Senate Sergeant-at-Arms told Senators not to use Zoom, according to one person who received the memo.

Keep up to date on the growing threat to global health by signing up for our daily coronavirus newsletter.

Zoom has responded to the particular criticism of its security with multiple public efforts to address the concerns. After initially claiming that its platform provides end-to-end encryption for all its conversations, Zoom later said some encryption was in fact absent from some online messaging tools. While we never intended to deceive any of our customers, we recognize that there is a discrepancy between the commonly accepted definition of end-to-end encryption and how we were using it, wrote Oded Gal, the chief product officer for Zoom Video, in an April 1 blog post.

The subsequent investigation by The Citizen Lab found other weaknesses. During a test of a Zoom meeting with two users, one in the United States and one in Canada, the Citizen Labs researchers found that the key for conference encryption and decryption was sent to one of the participants from a Zoom server apparently located in Beijing. A scan located a total of five servers in China and 68 in the United States that apparently run the same Zoom server software as the Beijing server, their report says.

Zooms headquarters are in San Jose, California and it is listed on the NASDAQ. The companys main applications have been developed in part by three companies in China that all are named Ruanshi Software, the Citizen Lab study found. Two are owned by Zoom, and one is owned by a company called American Cloud Video Software Technology Co., Ltd. Zooms most recent SEC filing says the company employs at least 700 research and development employees in China, and job postings for Ruanshi Software in Suzhou, China include positions for C++ coders, Android and iOS app developers, and testing engineers, the Citizen Lab reported.

Zoom says it is not alone in having workers and servers in China, and says it has resolved the issue of encryption keys being routed through a server there. Zoom is not unique among its U.S. based teleconferencing peers in having a data center and employees in China; Zoom is perhaps just more transparent about it, the company said in a statement to TIME. Ruanshi is the Chinese name that Zoom uses to name our subsidiaries in China, the company said, and Our engineers are employed through these three subsidiaries and we are fully transparent about itall of this is disclosed in our filings. The company added that it has a number of documented controls and protections in place to protect data and prevent unauthorized access, including from Zoom employees. These controls are strictly enforced across the Company, regardless of jurisdiction.

In the wake of the Citizen Lab report, Zoom has taken other steps to reassure users about its commitment to security. On April 8, Alex Stamos, former chief security officer at Facebook and Yahoo, posted a note on Medium saying Zoom CEO Eric Yuan had called and asked if I would be interested in helping Zoom build up its security, privacy and safety capabilities as an outside consultant, and I readily agreed.

Sens. Amy Klobuchar of Minnesota and Michael Bennet of Colorado and Reps. Frank Pallone of New Jersey, the Chairman of the House Energy and Commerce Committee, and Jan Schakowsky of Illinois have called for the Federal Trade Commission to investigate whether Zoom has taken the measures necessary to protect its users. Multiple state attorneys general already have begun looking into the company, Politico reported. And despite Zooms reassurances, some intelligence experts remain concerned about its vulnerabilities. Zooms links to China, regardless of what its CEO promises, create a persistent threat, former director of the National Security Agency and the Central Intelligence Agency Michael Hayden, tells TIME.

Please send tips, leads, and stories from the frontlines to virus@time.com.

Thank you! For your security, we've sent a confirmation email to the address you entered. Click the link to confirm your subscription and begin receiving our newsletters. If you don't get the confirmation within 10 minutes, please check your spam folder.

Contact us at editors@time.com.

Go here to read the rest:
Foreign Spies Are Targeting Americans on Zoom and Other Video Chat Platforms, U.S. Intel Officials Say - TIME

Worried about Zoom’s privacy problems? A guide to your video-conferencing options – The Guardian

With offices and schools around the world temporarily shut amid the coronavirus crisis, the video platform Zoom has seen overnight success. But growing concerns over security across the platform have many consumers wondering about tech alternatives.

Privacy-minded consumers should consider video chat options carefully, said Arvind Narayanan, an associate computer science professor at Princeton University who has been outspoken about the security concerns surrounding Zoom.

There is a tradeoff between security and usability when picking a video-conferencing product, he said. Companies and schools should consider supporting multiple software options, configuring them securely, and educating their users about the risks.

Among the most important criteria for evaluating a video conferencing platform is end-to-end encryption of calls and data protection policies, said Charles Ragland, security engineer at Digital Shadows, a San Francisco-based security provider. Companies should be in compliance with privacy frameworks like Europes General Data Protection Regulation or Californias Consumer Privacy Act, he continued, and should also tell users what data is being collected and what third parties can access that data.

Here are some of your video-conferencing options for staying connected while sheltering in place:

The app is headquartered in San Jose, California, and was valued at $16bn when it went public in 2019. It quickly became the most popular option for meetings and other events moving online following shelter-in-place orders this year.

Pros: Its seamless to use attendees can join by a publicly shared link from anywhere, and joining does not require downloading any software. Its a great option if you are not discussing anything private or secure a virtual happy hour with friends, for example. The company has promised to fix issues with privacy and security, recently making default options more secure by requiring passwords to join meetings.

Cons: Zoom has had some glaring problems of privacy and security. Zoom bombings, in which hackers enter chat rooms to drop racist language and violent threats, persist. The company had to fix a bug that would have allowed hackers to take over a Zoom users Mac. It also had to change some of its policies after a Motherboard report found Zoom sends data from users of its iOS app to Facebook for advertising purposes.

The company also claimed its calls were encrypted, and then backtracked when it was proven wrong by a report in the Intercept. Senator Michael Bennet of Colorado has requested responses from Zooms CEO, Eric Yuan, on privacy concerns and the FTC is being called to investigate the company.

Released in 2003, Skype is one of the longest-standing options for video chatting. It was bought by Microsoft in 2011 and is a free option for one-on-one or group video chats.

Pros: Skype is free, easy to use and widely known.

Cons: The maximum number of people who can join a Skype meeting is 50, making it a difficult option for larger organizations or big get-togethers.

Schools in New York are transitioning from Zoom to Microsoft Teams, a work-from-home collaboration platform. The app has been gaining traction: Teams saw its daily active user count rise more than 37% during just one week last month, from 32 million to 44 million around the world.

Pros: The video platform allows for 250 people in a meeting or up to 10,000 viewers through its presentation feature. Users can easily share files and chat during meetings as well as screen-share. It is free and integrates with Skype.

Cons: The platform is built primarily for businesses, or teams. People who want individual access can do so via Skype accounts, but it appears to require a download of Skype to join meetings unlike Zoom, which lets users attend meetings through their web browsers.

The built-in video call option for Apple products is an often overlooked option for group video chats, but a strong one for a number of reasons.

Pros: Apple is known for its strong encryption practices, meaning the company cannot see what you share during a call. FaceTime is also free for Apple users and does not require the download of an app.

Cons: FaceTime is only available for users who have Apple devices, has a maximum of 32 users per call, and does not allow people to join by link, making it hard to spread the word about your online event in advance.

Signal is an encrypted messaging app widely considered to be the worlds most secure and it is increasingly going mainstream. It allows for large group chats, but not group video calls.

Pros: Its encrypted and free to download.

Cons: Signal does not allow for group video chats, but it is useful for one-on-one video chats that require strong security and encryption.

The Cambridge, England-based video conferencing provider Starleaf was founded in 2008 and has grown in popularity as it pitches itself as a more secure video-conferencing alternative to Zoom. Call volume on StarLeaf has grown more than 1,000% compared to February 2020, the company said by email.

Pros: Starleaf is based in the UK and subject to local data privacy laws there. It also allows the consumer to choose where their user data is stored. It is used by NHS trusts in the UK.

Cons: Rather than the individual consumer, it targets organizations with 500+ employees a good option for your company but maybe not for happy hour with your friends. Starleaf only hosts up to 20 people per meeting and has a maximum of 46 minutes per meeting.

This video-conferencing platform was founded in 2003 by a student in France, and it has gained popularity as a more secure alternative to Zoom.

Pros: Jitsi Meet is free; open-source, meaning outside parties can check its security; and encrypted.

Cons: It allows a maximum of 75 participants in a chat (and a better experience with 35 or fewer).

A series of now debunked reports claimed Houseparty had been breached rumors the company is now claiming were part of a paid commercial smear by a rival.

Pros: This is perhaps the most fun video-conferencing app, with a number of games within the app, including trivia and drawing challenges.

Cons: It appears that when you start a house party, anyone in your contacts can join, but it is possible to lock a room once the people you want to be there are in it. It also has questionable privacy policies and collects a worrying amount of information, according to one security researcher.

For those of us who use Gmail, Google Hangouts is a seamless option for video chats. Up to 150 people can participate in a chat, but only 25 people can participate in a video call at once.

Pros: Its free and accessible.

Cons: Use it with the knowledge that Google will have even more of your data than it already does. A hangout can be joined via Gmail, the Hangouts app or a Chrome extension but it requires a Gmail account.

The California-based video conference platform BlueJeans is a good option for work teams and meetings that require a little more security than a free Zoom session.

Pros: Videos are encrypted by default. BlueJeans can be accessed via browser and does not require an account or the download of a new program.

Cons: It is not free BlueJeans costs $9.99 for a basic plan that allows meetings up to 50 people and $13.99 for its pro product, which allows up to 75 people per meeting, among other features.

View post:
Worried about Zoom's privacy problems? A guide to your video-conferencing options - The Guardian