Innovative AI and Machine-Learning Technology That Detects Emotion Wins Top Award – Express Computer

CampaignTester was awarded Best Application of Artificial Intelligence to Optimize Creative at the 2020 Campaigns & Elections Reed Awards.

CampaignTester is a cutting-edge mobile-based platform that utilizes emotion analytics and machine learning to detect a users emotion and engagement level while watching video content. Their proprietary platform aims to deliver key audience insights for organizations to validate, revise and perfect their video content messaging.

Campaigns & Elections Reed Award winners represent the best-of-the-best in the political campaign and advocacy industries. The 2020 Reed Awards honored winners across 16 distinct category groups, representing the different specialisms of the political campaign industry, with distinct category groups for International (non-US) work, and Grassroots Advocacy work.

It was particularly meaningful being recognized among some of the finest marketers and technologists in the world. Bill Lickson, CampaignTesters Chief Operating Officer affirmed. I was thrilled and honored to accept this prestigious award on behalf of our entire talented team.

Aaron Itzkowitz, Chief Executive Officer and Founder of CampaignTester added, This award is a great start to what looks to be a wonderful year for our client-partners and our company. While our technology was recognized for excellence in political marketing, our technology is for any industry that uses video in marketing

If you have an interesting article / experience / case study to share, please get in touch with us at [emailprotected]

Get real time updates directly on you device, subscribe now.

Express Computer is one of India's most respected IT media brands and has been in publication for 24 years running. We cover enterprise technology in all its flavours, including processors, storage, networking, wireless, business applications, cloud computing, analytics, green initiatives and anything that can help companies make the most of their ICT investments. Additionally, we also report on the fast emerging realm of eGovernance in India.

See the rest here:
Innovative AI and Machine-Learning Technology That Detects Emotion Wins Top Award - Express Computer

Encryption app to avoid coronavirus censorship removed by Apple in China – Quartz

Apple yesterday removed Boom the Encryption Keyboard, an app that allowed Chinese internet users to bypass censorship, from the China app store, according to its developer.

Wang Huiyu, a New York-based Chinese citizen in his 20s, told Quartz that he developed Boom together with one of his university classmates during the outbreak of the coronavirus. Part of the motivation for Wang to develop the app, which went live on Feb. 15, was to offer people a chance to counter rigid online surveillance, and to provide them with an entertaining private messaging app.

According to an email sent by Apple to Wang, the app was removed because it contained content that is illegal in China. The app is still available in other regions, including Hong Kong, he said.

I designed the app because I wanted to remind people of the importance of privacy, and my target customers are people born after 1995 or 2000. I feel those under 20 will be able to accept new things and ideas the fastest, said Wang.

Boom encrypts text, both in Chinese and English, by turning them into emoji or Japanese or Korean characters, as well as rearranging lines of text in random order. The receivers of such messages can decrypt them by copying the emoji or characters using the app, with the original text then displayed automatically on the keyboards interface. As Chinas blanket online censorship relies heavily on the detection of key words or even pictures containing sensitive words, apps like Boom can help users avoid such scrutiny.

Another app developed by Wang, which offered animated wallpapers featuring political figures including former Chinese leader Jiang Zemin, was also removed (link in Chinese) from Apples mainland China app store on the same day as Boom, he said.

Apple has removed apps from its China app store in the past for containingillegal content. Among the apps that have been pulled were Quartzs news app, which was removed from the China app store last year.

Apple did not immediately reply to a request for comment.

While most apps that enable encrypted messages and communications have long been banned in China, Wang said he suspects Boom drew the attention of authorities because of the way Chinese internet users quickly moved to preserve a particular coronavirus-linked article from being scrubbed by censors recently.

The article in question is an interview with Ai Fen, a Wuhan doctor who said she was reprimanded for alerting other people about the novel coronavirus. The article, published on March 10 by Chinas Ren Wu magazine, was deleted within hours of its publication. Various versions of the article, including those reproduced in emoji, English, and even Hebrew, emerged after the deletion as people scrambled to save Ais story, part of a broader wave of efforts by internet users in China to prevent censors from removing crucial stories and memories related to the epidemic. Wang said downloads of Boom from mainland China surged after the incident.

Apple has been repeatedly accused of bowing to China by removing apps, such as a Hong Kong live map app that allowed protesters to crowdsource police movements during last years protests in the city.

Continued here:
Encryption app to avoid coronavirus censorship removed by Apple in China - Quartz

EARN IT: The US Anti-Encryption Bill That Threatens Private Speech… – Bitcoin Magazine

Theres a new bill in the works to fight against child sexual abuse material (CSAM) and other risky services on the internet but it could come at a cost to online privacy.

Eliminating Abusive or Rampant Neglect of Interactive Technologies (EARN IT) was proposed by the Senate Judiciary Committee and sponsored by senators from both sides of the aisle such as Lindsey Graham (R-SC) and Richard Blumenthal (D-CT). The bill is also supported by the National Center for Missing and Exploited Children and the National Center on Sexual Exploitation.

However, this bill is problematic for both freedom of speech and privacy online according to Riana Pfefferkorn, associate director of Surveillance and Cybersecurity at the Center for Internet and Society.

This bill is trying to convert your anger at Big Tech into law enforcements long-desired dream of banning strong encryption, argued Pfefferkorn in a blog post. Pfefferkorns detailed explanation says EARN IT appears less like a legitimate way to prevent the spread of child exploitation content and more like a covert attempt to ban end-to-end encryption, without having to ban it outright.

At the end of January 2020, a draft of the proposal was leaked and met with similar apprehension not only by Big tech juggernauts (Facebook, Google, etc.) but also their sometimes opposing counterparts, freedom of speech advocates.

Were concerned the EARN IT Act may be used to roll back encryption, which protects everyones safety from hackers and criminals, and may limit the ability of American companies to provide the private and secure services that people expect, Facebook spokesperson Thomas Richards said in a statement to the Washington Post.

Clearly, the issue could not be more sensitive. Patrick A. Trueman, president and CEO of the National Center on Sexual Exploitation, recently voiced this opinion, apparently advocating for EARN IT.

Right now, Big Tech has no incentive to prevent predators from grooming, recruiting, and trafficking children online and as a result countless children have fallen victim to child abusers on platforms like Instagram, Snapchat, and TikTok, said Trueman.

While everyone who has publicly condemned EARN IT has also stated a universal commitment to child safety online and in the real world, many say the bills far-reaching approach to content moderation could do more harm than good by essentially eliminating private conversations across the internet, particularly on social media platforms and messaging apps.

To fully comprehend what EARN IT proposes, one needs to understand the importance of two bills passed in the 90s. These laid the groundwork for how privacy and free speech are supposed to operate for U.S. citizens.

First, Section 230 of the Communications Decency Act (CDA), passed in 1996, allows for the continued development of the internet as a free market and universal good for free speech. Section 230 says that online platforms or providers of interactive computer services mostly cannot be held responsible for the things their users say or do on their platforms. It uses the term mostly instead of always because platforms are still liable for exceptions that violate intellectual and federal criminal law. Essentially, this means if someone is defamed for being a fraud, that person can sue their defamer, but they cannot sue the platform for providing the space for free speech.

Second, the Communications Assistance for Law Enforcement Act (CALEA), passed in 1994, requires telecom providers to make their networks wiretappable for law enforcement. However, it also ensured a carve-out for encrypted messages and information services where websites, email, social media, messaging apps and cloud storage fall out of CALEAs jurisdiction.

The purpose of these carve-outs was to reach a compromise between the competing interests of network security providers, privacy advocates, civil liberties, technological growth and law enforcement. In combination, Section 230 and CALEA prevent regulation from suffocating growth and development of the U.S. information economy.

Since the 90s, more regulation has passed to undo Section 230. Section 230 has been amended since it was passed: SESTA/FOSTA, enacted in 2018, pierces providers immunity from civil and state-law claims about sex trafficking, wrote Pfefferkorn. SESTA/FOSTA is currently being challenged in federal court being unconstitutional and doing more harm than good.

There is also already a regulatory reporting scheme for online providers combatting CSAM. Also, Section 230 does not keep federal prosecutors from holding providers accountable for CSAM on their services.

While the current reporting schemes success is questionable, there is reasonable evidence to believe that EARN IT is an attempt to regulate communication on the internet more broadly.

The so-called EARN IT bill will strip Section 230 protections away from any website that doesnt follow a list of best practices, meaning those sites can be sued into bankruptcy, writes Joe Mullin, a policy analyst with the Electronic Freedom Foundation.

Mullin is referring to how EARN IT would target CSAM. It proposes to do this by creating a federal commission to develop a list of best practices for preventing CSAM that online platform providers would have to follow or else lose their immunity under Section 230 meaning they could be sued into bankruptcy. This commission would largely be made up of law enforcement and allied groups such as the National Center for Missing and Exploited Children (NCMEC).

According to Mullin, The best practices list will be created by a government commission, headed by Attorney General Barr, who has made it very clear he would like to ban encryption and guarantee law enforcement legal access to any digital message.

Although the word encryption does not appear anywhere in the EARN IT bill, Mullin is suspicious of how the federal commission might design best practices. For instance, in an earlier draft of the bill, the NCMEC Vice-President stated that online services should be made to screen all messages using screening technology approved by themselves and law enforcement, report what they find in messages to the NCMEC and be held legally responsible for the content of the messages sent by others.

In short, the commission could quietly give backdoor access to all U.S. hosted information services, undoing encrypted messages altogether.

Mullin, Pfefferkorn and other outspoken critics of EARN IT all agree that the bills proposed execution is opening the door for the elimination of encryption: the fact that it is never explicitly addressed is especially concerning..

According to Mullin, its also possible that the current draft of EARN IT will be amended to undo the damage it could do to online privacy. Could be as straightforward as putting a clause in[,] saying the bill doesnt apply to encryption, he writes.

However, until some amendment occurs, critics are wary of a federal commission consisting of fewer than twenty people, according to the latest reports, who would be making large-scale privacy and security decisions for the entire U.S. population.

Such a potentially big power grab would seem a bit ridiculous, but Pfefferkorn also acknowledged that EARN IT rides on a wave of resentment or techlash the U.S. population has begun to harbor against many internet-based companies. This animosity is directed toward both U.S. tech juggernauts, whose business models run off of surveillance capitalism and online free speech platforms which, for the average person, can feel like the concentrated font of human venality every time we open our phones, according to Pfefferkorn.

In general, free speech on social media platforms is already a nuanced and complicated topic. Even under Section 230, social media platforms can still censor content when they deem it inappropriate internally. For example, Twitter has a keyword blacklist and the protocol for how it works can change on a dime.

For Nozomi Hayase, social psychologist and writer, surveillance of encrypted messaging is a movement toward forfeiting democracy. By Hayases reasoning, privacy is a prerequisite for a kind of solitude that allows people to think and act independently and is, therefore, essential to a functioning democratic society.

Democracy requires sovereign individuals who are able to communicate with one another freely. This freedom comes with great responsibility, said Hayase, who recognized EARN IT as the newest installment of a dangerous trend toward online censorship. If we really want to have a truly democratic society, we have to accept the fact that it is the duty of each person to develop his or her own moral capacity to determine what is right and wrong, instead of depending on an external authority to tell us what we should or should not do.

Currently, EARN IT has been referred to the Senate Judiciary Committee. Citizens can contact their congressmen directly or take action through the Electronic Frontier Foundations website.

More here:
EARN IT: The US Anti-Encryption Bill That Threatens Private Speech... - Bitcoin Magazine

Apple censors encrypted chat app BOOM on behalf of Chinese government – Reclaim The Net

While the whole world is being crippled by the coronavirus pandemic, China, the country to be first affected, says that its not improving drastically.

It is, however, questionable whether they improved as a result of the prompt healthcare delivery or blatant censorship that hides whats really going on in the country.

The latter may be equally true, considering Chinas rampant authoritarian censorship practices.

Apple is now amidst more censorship drama with the Chinese government.

The big tech company is under pressure for removing an app from the Chinese App Store that was being used to share news related to the pandemic inside the country.

The Boom Text Encryption Keyboard app by Huiyu Wang, a New York-based Chinese developer, was developed in an effort to encrypt and decrypt text messages.

Chinese citizens used the app to share information and get a hold of the recent developments surrounding the coronavirus pandemic.

At a juncture where the Chinese government may end up tightening the leash around information circulation, apps such as Boom are invaluable.

The app makes use of techniques such as emoji replacement and word jumbling to facilitate encrypted message communication.

The app allowed Chinese users to share information about the coronavirus without being detected by the filters deployed by the Chinese government.

It was first available when the coronavirus infestation reached up to mainland China. Based on Wangs recent tweet, it was found that Apple pulled out the app as it was content that is illegal in China.

Wang says that the app must have attracted attention from the Chinese officials when it was used to circulate an interview related to Coronavirus that the government was trying to censor.

Whats more, Wang says that his social media profiles as well as an app, completely unrelated to the encrypted keyboard, were now removed.

Alas, this hasnt been the first time Apple has censored on behalf of the Chinese government.

Time and again, Apple took down several apps, especially VPN applications from the App Store just because the Chinese government directed it to do so.

While proclaiming that privacy is a human right, the tech giant ends up removing several applications that allow the Chinese netizens to have private conversations and steer clear of the censorship imposed by their government.

Continued here:
Apple censors encrypted chat app BOOM on behalf of Chinese government - Reclaim The Net

Privacy & Encryption Will Be More Important Than Ever In Wake Of Coronavirus – Techdirt

from the encrypt-ALL-the-things! dept

Be it Cambridge Analytica, Equifax, or wireless carrier location data, the U.S. has already faced a steady parade of privacy and security related scandals. Now as countries around the world hunker down to slow the rate of COVID-19, the problem could easily grow even larger as a chain reaction of implications make privacy, security, and tools like encryption more important than ever.

Millions of Americans are now telecommuting for the first time. As they do so, more than a few of them won't be wise enough to use basic security precautions while handling sensitive work or health related data. And as we've noted for years, services like VPNs often don't provide reliable protection, given it's hard to verify just how secure or trustworthy service owners are. Many services were already shady as hell, and even the reliable offerings may struggle under the load.

Many folks are already using the pandemic as scam fodder. As a result, the shift to home work -- and the dramatic spike in healthcare information being shoveled around the internet -- means that the battle over encryption is also more important than ever:

As with everything this pandemic is going to touch, there are layers and layers of complications here. Many popular teleconferencing services don't have particularly great privacy standards. And with no U.S. privacy law to speak of for the internet era (outside of the problematic COPPA), it shouldn't be hard to see how we might run into some additional problems. It should also be easy to see how the pandemic may provide justification for all manner of problematic privacy and security related behavior, from the war on encryption to the quest to expand domestic surveillance.

Israel, for example, has started using a previously unknown database of phone location data to help track the spread of COVID-19. The Washington Post this week indicated that both Google and Facebook (that bastion of privacy-related trust) are also working with the U.S. government to explore the use of location data to help combat the spread of the virus. Experts suggest that we should be able to walk and chew gum at the same time, including data sharing and sunset provisions into any efforts designed to battle the pandemic:

We're only going to have so much attention to go around as we worry about ourselves, our families, and our livelihoods. Unfortunately, the pandemic could easily provide cover for the steady expansion of problematic domestic surveillance efforts that continues at a pretty brisk clip, even in normal times.

Filed Under: covid-19, encryption, privacy, surveillance, tracking

See more here:
Privacy & Encryption Will Be More Important Than Ever In Wake Of Coronavirus - Techdirt

WhatsApp Is at the Center of Coronavirus Response – WIRED

The Covid-19 pandemic is impacting communities around the world. For the 2 billion of those people who also use the encrypted communication service WhatsApp, now more than ever is a time for calling, messaging, and seeking trustworthy information. So the World Health Organization is going where the people are, launching a new tool called WHO Health Alert on WhatsApp today.

When you text "hi" to +41 79 893 1892 over WhatsApp, you'll receive back a text from the WHO that includes a variety of menu items for the latest information, like novel coronavirus infection rates around the world, travel advisories, and misinformation that should be debunked. Think of it like a hotline: Text 1 for the latest statistics, 4 for mythbusters, that type of thing. The WHO can also send out proactive alerts as needed to everyone who's signed up.

Read all of our coronavirus coverage here.

The WHO isn't the first to enlist WhatsApp in this manner. The Facebook-owned app's ubiquity and experience handling disinformation has made an obvious choice for governments and international organizations, placing it squarely at the center of the novel coronavirus responsewith all the responsibility and controversy that entails.

"We already have over one million people signed up even though we havent even announced it yet," says Will Cathcart, who runs WhatsApp, of WHO Health Alert. "It's great. There seems to be a lot of appetite from people for ways to get good, accurate information and were happy to do what we can there to help."

Helplines are preferable in many ways to landing pages, social media profiles, or massive open channels, because they allow governments to use WhatsApp like regular users, having one-to-one interactions with constituents. The only difference is that the responses are automated.

Organizations can find out their options for setting up similar chatbot mechanisms at this landing page for WhatsApp's Coronavirus resources. The bots run through WhatsApp's business application programming interface, which maintains WhatsApp's encryption and allows entities to manage their services

All the new institutional uses combined with widespread social isolation means that more people than ever are using WhatsApp for messagingand an especially large volume of phone calls and video chats. To keep up with demand, Cathcart says that WhatsApp has nearly doubled its server capacity in the last few weeks.

"We dont know whats coming, and we view WhatsApp as a lifeline for people to communicate when they need it. And the core thing we offer is that itll be there and work," he says. "Were hearing all these amazing anecdotes especially out of places on the front lines of things like health care workers using WhatsApp to communicate with patients, to communicate with each other. Schools using it to try to do remote education, people using it to keep in touch with their friends and family, either through messaging, but actually exceptionally through video calling and voice calling. And were seeing that in the data with a ton of extra usage."

On a platform that has struggled for years to curb misinformation, all of that extra usage has also bred pandemic-related rumors and myths. WhatsApp's end-to-end encryption means that only the devices at either end of a communication hold data unencrypted. WhatsApp itself is totally boxed out of being able to access user communications other than metadata like which accounts are interacting. This means the company can't moderate content on the service like social networks can. Users can communicate on WhatsApp without being surveilled by oppressive governments, but those same protections can also make it easier for misinformation to spread. Meanwhile, law enforcement in the US and around the world have increasingly lobbied to undermine end-to-end encryption.

Cathcart says WhatsApp's priority, even more so during the pandemic, is to elevate accurate information and support fact-checking organizations around the world. The company announced a $1 million donation on Wednesday to the Poynter Institute's International Fact-Checking Network. The goal is to help buoy the #CoronaVirusFacts Alliance, which is bringing together 100 local organizations in more than 45 countries to fight Covid-19-related disinformation.

Read the original here:
WhatsApp Is at the Center of Coronavirus Response - WIRED

Bored during lockdown? Why not try out these data-spilling Krk Wi-Fi bug exploits against your nearby devices – The Register

Proof-of-concept exploit code has emerged for last month's data-leaking Krk vulnerability present in a billion-plus Wi-Fi-connected devices and computers.

The team at infosec outfit Hexway told The Register on Friday it has crafted a working exploit for the flaw which is present in equipment that uses Broadcom's communications chipsets. This design blunder can be abused by nearby miscreants to snatch snapshots of private data, such as web requests, messages, and passwords, over the air from devices as they are transmitted, if said data is not securely encrypted using an encapsulating protocol, such as HTTPS, DNS-over-HTTPS, a VPN, and SSH.

Crucially, to pull this off, a hacker does not need to be on the same Wi-Fi network as the victim: just within radio range of a vulnerable phone, gateway, laptop, or whatever is being probed.

"Among the devices vulnerable to this attack are the ones from Samsung, Apple, Xiaomi and other popular brands," Hexway told The Register. "To perform the Krk attack, a hacker just needs his or her victim to be connected to the Wi-Fi."

Designated CVE-2019-15126, the Krk bug revolves around the transmission data buffers in Broadcom chips. Researchers at ESET found that, in specific circumstances, an attacker can force a nearby device to disconnect from its Wi-Fi point, causing it to emit any data still in its transmit buffer with an encryption key value of zero. Thus a nearby snooper can decrypt this transmitted information flushed from the buffer. If the data isn't wrapped up in additional encryption, such as HTTPS, it can be read as plain text.

Hexway has managed to weaponize the design error in Broadcom's hardware by using a Raspberry Pi 3 with a Python script. This setup was able to yield keys and private data from a Sony Xperia Z3 Compact and Huawei Honor 4X, because they use the vulnerable chipset.

It is also believed that certain models of Amazon Echo and Kindle, Google Nexus smartphones, and both the iPad and iPhone are vulnerable to the flaw.

"After testing this PoC on different devices, we found out that the data of the clients that generated plenty of UDP traffic was the easiest to intercept," Hexway said in an advisory accompanying its code.

"Among those clients, for example, there are various streaming apps because this kind of traffic (unlike small TCP packets) will always be kept in the buffer of a Wi-Fi chip."

Those so inclined can get the script from Hexway via GitHub. Meanwhile, security outfit Thice has cooked up its own exploit proof-of-concept as well.

The Thice report includes further details on the flaw, which may not be as bad as feared.

"So, yeah, Krk is real and not that hard to exploit when a vulnerable router is involved," says the Thice recap. "However, the amount of data that you can steal this way is limited since it is only a couple of packets per disconnect."

If you haven't already done so, and if you're able to, and if it's necessary, check for and install software patches from your devices' manufacturers to address the Krk vulnerability.

Sponsored: Webcast: Why you need managed detection and response

Visit link:
Bored during lockdown? Why not try out these data-spilling Krk Wi-Fi bug exploits against your nearby devices - The Register

Quantum computing is right around the corner, but cooling is a problem. What are the options? – Diginomica

(Shutterstock.com)

Why would you be thinking about quantum computing? Yes, it may be two years or more before quantum computing will be widely available, but there are already quite a few organizations that are pressing ahead. I'll get into those use cases, but first - Lets start with the basics:

Classical computers require built-in fans and other ways to dissipate heat, and quantum computers are no different. Instead of working with bits of information that can be either 0 or 1, as in a classical machine, a quantum computer relies on "qubits," which can be in both states simultaneously called a superposition thanks to the quirks of quantum mechanics. Those qubits must be shielded from all external noise, since the slightest interference will destroy the superposition, resulting in calculation errors. Well-isolated qubits heat up quickly, so keeping them cool is a challenge.

The current operating temperature of quantum computers is 0.015 Kelvin or -273C or -460F. That is the only way to slow down the movement of atoms, so a "qubit" can hold a value.

There have been some creative solutions proposed for this problem, such as the nanofridge," which builds a circuit with an energy gap dividing two channels: a superconducting fast lane, where electrons can zip along with zero resistance, and a slow resistive (non-superconducting) lane. Only electrons with sufficient energy to jump across that gap can get to the superconductor highway; the rest are stuck in the slow lane. This has a cooling effect.

Just one problem though: The inventor, MikkoMttnen, is confident enough in the eventual success that he has applied for a patent for the device. However, "Maybe in 10 to 15 years, this might be commercially useful, he said. Its going to take some time, but Im pretty sure well get there."

Ten to fifteen years? It may be two years or more before quantum computing will be widely available, but there are already quite a few organizations that are pressing ahead in the following sectors:

An excellent, detailed report on the quantum computing ecosystem is: The Next Decade in Quantum Computingand How to Play.

But the cooling problem must get sorted. It may be diamonds that finally solve some of the commercial and operational/cost issues in quantum computing: synthetic, also known as lab-grown diamonds.

The first synthetic diamond was grown by GE in 1954. It was an ugly little brown thing. By the '70s, GE and others were growing up to 1-carat off-color diamonds for industrial use. By the '90s, a company called Gemesis (renamed Pure Grown Diamonds) successfully created one-carat flawless diamonds graded ILA, meaning perfect. Today designer diamonds come in all sizes and colors: adding Boron to make them pink or nitrogen to make them yellow.

Diamonds have unique properties. They have high thermal conductivity (meaning they don't melt like silicon). The thermal conductivity of a pure diamond is the highest of any known solid. They are also an excellent electrical insulator. In its center, it has an impurity called an N-V center, where a carbon atom is replaced by a nitrogen atom leaving a gap where an unpaired electron circles the nitrogen gap and can be excited or polarized by a laser. When excited, the electron gives off a single photon leaving it in a reduced energy state. Somehow, and I admit I dont completely understand this, the particle is placed into a quantum superposition. In quantum-speak, that means it can be two things, two values, two places at once, where it has both spin up and spin down. That is the essence of quantum computing, the creation of a "qubit," something that can be both 0 and 1 at the same time.

If that isnt weird enough, there is the issue of entanglement. A microwave pulse can be directed at a pair of qubits, placing them both in the same state. But you can "entangle" them so that they are always in the same state. In other words, if you change the state of one of them, the other also changes, even if great distances separate them, a phenomenon Einstein dubbed, spooky action at a distance. Entangled photons don't need bulky equipment to keep them in their quantum state, and they can transmit quantum information across long distances.

At least in the theory of the predictive nature of entanglement, adding qubits explodes a quantum computer's computing power. In telecommunications, for example, entangled photons that span the traditional telecommunications spectrum have enormous potential for multi-channel quantum communication.

News Flash: Physicists have just demonstrated a 3-particle entanglement. This increases the capacity of quantum computing geometrically.

The cooling of qubits is the stumbling block. Diamonds seem to offer a solution, one that could quantum computing into the mainstream. The impurities in synthetic diamonds can be manipulated, and the state of od qubit can held at room temperature, unlike other potential quantum computing systems, and NV-center qubits (described above) are long-lived. There are still many issues to unravel to make quantum computers feasible, but today, unless you have a refrigerator at home that can operate at near absolute-zero, hang on to that laptop.

But doesnt diamonds in computers sound expensive, flagrant, excessive? It begs the question, What is anything worth? Synthetic diamonds for jewelry are not as expensive as mined gems, but the price one pays at retail s burdened by the effect of monopoly, and so many intermediaries, distributors, jewelry companies, and retailers.

A recent book explored the value of fine things and explains the perceived value which only has a psychological basis.In the 1930s, De Beers, which had a monopoly on the world diamond market and too many for the weak demand, engaged the N. W. Ayers advertising agency realizing that diamonds were only sold to the very rich, while everyone else was buying cars and appliances. They created a market for diamond engagement rings and introduced the idea that a man should spend at least three months salary on a diamond for his betrothed.

And in classic selling of an idea, not a brand, they used their earworm taglines like diamonds are forever. These four iconic words have appeared in every single De Beers advertisement since 1948, and AdAge named it the #1 slogan of the century in 1999. Incidentally, diamonds arent forever. That diamond on your finger is slowly evaporating.

The worldwide outrage over the Blood Diamond scandal is increasing supply and demand for fine jewelry applications of synthetic diamonds. If quantum computers take off, and a diamond-based architecture becomes a standard, it will spawn a synthetic diamond production boom, increasing supply and drastically lowering the cost, making it feasible.

Many thanks to my daughter, Aja Raden, an author, jeweler, and behavioral economist for her insights about the diamond trade.

Here is the original post:
Quantum computing is right around the corner, but cooling is a problem. What are the options? - Diginomica

Extra! Extra!: Chelsea Manning Will Be Free, and More News Amid This Strange Week – Autostraddle

So many things feel like theyve come to a standstill because of the Coronavirus, but, in the words of Anais Mitchell, the sun just goes on rising. This weeks Extra! Extra! Covers US election interference, two articles from opposite sides of the world sharing the challenges facing immigrants and refugees and Chelsea Mannings recent release from jail.

A reminder that for right now, were putting news about COVID-19 in its own roundup that can be found here!

Justice Department Drops Plans for Trial over Russian Interference in 2016 U.S. Election

Natalie: Its been amazing to see what Republicans across the country are doing while our collective attentions are monopolized by coronavirus.

In Kentucky, the legislature continues to meet (so much for social distancing!) and just passed a voter ID law thatll govern this falls election. In Idaho, where one county has been forced to shelter in place due to a community outbreak of coronavirus, legislators are focused instead on anti-trans legislation..

And in DC, theres this: while Congress is consumed with finding a suitable relief package, the Attorney General of the United States is trying to eliminate the possibility that there will be any accountability for the attack on American democracy in 2016. Once again, the Trump presidency will be shielded from being exposed for the fraud that he is.

Its all just a reminder we need to be vigilant about staying engaged on issues beyond coronavirusbecause, as the saying goes, the Devil never sleeps.

Anchor Babies: The Ludicrous Immigration Myth That Treats People as Pawns

Somewhere Like Home: Uighur Kids Find A Haven At Boarding School In Turkey

Himani: Around the world, people continue to be dehumanized for being different, for being other. America has long positioned itself as the country of immigrants, the melting pot, the place where people from around the world could go to find solace. Of course, that was always a lie.

In America, Republicans and the Trump administration keep spreading dangerous myths about immigrants. This isnt new: the notion of anchor babies has been around for at least two decades and the 1996 immigration law arguably created the inhumane situation that exists in the US today. Now were at a point where the US has resettled the lowest numbers of refugees in the last three decades, people in situations like the Uighars in China who face violence and persecution.

What these two articles reminds us is that the vast majority of immigrants face countless challenges when they make the difficult decision to uproot their lives. Thats true whether were talking about Latinx people seeking a better life for their family in the US or Uighars trying to find safety and security for their children in Turkey. People dont make decisions like this out of malice. They dont just have children because that will somehow give them security. (In fact, they sometimes have children because the hUS has made contraceptive care so difficult to access.) And those children even if they are more fortunate than the ones who were left behind dont, by any means, have it easy.

But the other thing that connects these two stories, for me, is the hope these communities create for each other and their dedication to the fight to improve the lives of others in situations like their own.

Immigrant rights group and Microsoft workers blast ICE raids amid coronavirus crisis: The way ICE is operating is reckless

Thousands of ICE detainees at high risk amid coronavirus pandemic

Yudith is a wife and mother of six children whose husband has been detained by ICE.

Rachel: Given the context that only essential jobs and orgs are supposed to be operating normally right now, its become even more glaringly clear that this administration views ICE raids, family separation and deportation as essential raids have continued, including on quarantined homes and in hospitals where people are seeking treatment. In at least one (anecdotal) case, its reported that ICE agents posed as doctors to gain access to a home where they wanted to arrest someone. While of course ICEs actions are always harmful and violent on a personal and structural level, right now its incredibly clear that theyre also willfully contributing to the spread of a pandemic and potentially condemning those who they detain to infection ICE detention centers are crowded and have always been severely lacking in hygiene and sanitation resources, even before they became in short supply. In addition to demanding our elected officials work to release and distribute the necessary resources to healthcare workers and to individuals, we need to demand that they stop expending state resources on an institution that now more than ever serves only to harm.

Rachel: As many of us know and have been following, whistleblower Chelsea Manning has been detained indefinitely in solitary confinement essentially as punishment and coercion for refusing to testify before a grand jury against Julian Assange and WikiLeaks. She was initially jailed for her cooperation with WikiLeaks, and had her sentence commuted in 2017 by Obama; she was then subpoenaed to appear before a grand jury and once again jailed when she refused to testify. In addition to her incarceration, Chelsea was fined exorbitant amounts, $1000 per day, as a repercussion for her refusal to cooperate. Incarceration is always harmful, and hers has been no different; this week, news broke that Chelsea had attempted suicide while in prison, her third attempt over the long course of her multiple incarcerations. She survived, and was treated in the hospital.

The good news is that shortly after her hospitalization, a federal judge actually ordered Chelseas release he announced that her testimony was no longer needed before the grand jury, and so coercive measures werent necessary any longer. Its unclear whether this was a genuine announcement Judge Trenga was already scheduled to issue a ruling or whether the court was motivated to wrap up the issue and Chelseas incarceration by her suicide attempt.

While Chelsea will be freed, her fines remain, totaling over $250,000 obviously Chelsea hasnt been able to earn income while incarcerated. A friend has organized a GoFundMe for supporters to help contribute toward paying the cost.

+ Chelsea Manning attempted suicide while in jail for refusing to testify against WikiLeaks

+ Chelsea Manning Is Ordered Released From Jail

New Challenge to Transgender Military Ban Filed by Naval Officer

Dousing the Glim: Reflections on Shutting Down Canada

Tribunal Orders Canada to Compensate Parents Who Lost Children in Care

A Sneaky Attempt to End Encryption Is Worming Its Way through Congress

More here:
Extra! Extra!: Chelsea Manning Will Be Free, and More News Amid This Strange Week - Autostraddle

Are machine-learning-based automation tools good enough for storage management and other areas of IT? Let us know – The Register

Reader survey We hear a lot these days about IT automation. Yet whether it's labelled intelligent infrastructure, AIOps, self-driving IT, or even private cloud, the aim is the same.

And that aim is: to use the likes of machine learning, workflow automation, and infrastructure-as-code to automatically make changes in real-time, eliminating as much as possible of the manual drudgery associated with routine IT administration.

Are the latest AI/ML-powered intelligent automation solutions trustworthy and ready for mainstream deployment, particularly in areas such as storage management?

Should we go ahead and implement the technology now on offer?

This controversial topic is the subject of our latest reader survey, and we are eager to hear your views.

Please complete our short survey, here.

As always, your responses will be anonymous and your privacy assured.

Sponsored: Webcast: Why you need managed detection and response

Read the original post:
Are machine-learning-based automation tools good enough for storage management and other areas of IT? Let us know - The Register