EU tells staff to ditch WhatsApp and other secure messaging apps and use Signal instead – Fast Company

The EUs European Commission has told all staff that they should switch to the Signal messaging app instead of using messaging apps such as WhatsApp, Facebook Messenger, and Apples Messages due to increasing cybersecurity fears, Politico reports.The dictum came in early February when the European Commission sent a message to all staff on its internal messaging boards saying, Signal has been selected as the recommended application for public instant messaging.

Signal has long been praised as the most secure messaging app out there by security and privacy advocates, including Edward Snowden. Thats thanks to the apps strong end-to-end encryption. But other messaging apps like WhatsApp and Apples Messages are also end-to-end encrypted (Facebook Messenger is not), so why is the EC recommending its staff switch to Signal instead of those apps?

Part of the reason is that hacking attempts have increased on high-profile individuals, including Jeff Bezos, by using messages sent via popular messaging apps, including WhatsApp, as a vector. However, the biggest single differentiator between Signal and other end-to-end encrypted message apps is Signal is open source, while Facebooks WhatsApp and Apples Messages are not.

An open-source secure messaging app means anyone can view the source code of the app and check to see that the app is really doing all it claims, such as keeping your messages safe from prying eyes, including the app maker itself. While its unlikely Facebook or Apples secure messaging apps are being less than honest about their capabilities, Signals open-source nature provides peace of mind for those who want to confirm an app is doing what it says on the tin. Thats very appealing to a large governmental organization like the European Commission.

Thinking of switching to Signal yourself? Here are all the reasons why you may want to.

See original here:
EU tells staff to ditch WhatsApp and other secure messaging apps and use Signal instead - Fast Company

National Security Cinema: The Shocking New Evidence of Government Control in HollywoodHow the US military and CIA go about their propaganda operations…

National Security Cinema: The Shocking New Evidence of Government Control in HollywoodHow the US military and CIA go about their propaganda operations By Charles Bogle 27 February 2020

In National Security Cinema: The Shocking New Evidence of Government Control in Hollywood (2017), Dr. Matthew Alford and Tom Secker offer convincing proof that the US Department of Defense, CIA and FBI have for decades used various means to manipulate content and even deny production of certain Hollywood projects, often using national security as a pretext to censor film and television. The real aim of these operations, according to the authors, is to advance violent, American-centric solutions to international problems based on twisted readings of history.

Alford is a Teaching Fellow at the University of Bath in England. He is also the author of Reel Power: Hollywood Cinema and American Supremacy (2010). Secker is a private researcher who runs spyculture.coman online archive about government involvement in the entertainment industry.

Their book argues that the US military has had an influential relationship with Hollywood products since its earliest days. Alford and Secker point out that the Home Guard (reserve forces outside the National Guard) provided tanks for the infamous feature film [D.W. Griffiths] Birth of a Nation (1915), in which black slaves revolt against their masters, before the Ku Klux Klan ride in on horseback to save the day.

Using the Freedom of Information Act, the authors gained access to files that exposed the extent of government censorship in films between 1911 and 2017. The DOD (Department of Defense, or Pentagon) provided military equipment and advice, and even allowed members of the military to make appearances, in exchange for some degree of control over the content of 814 films.

The authors continue, If we include the 1,133 TV titles in our count, the number of screen entertainment products supported by the DOD leaps to 1,947. If we are to include the individual episodes for each title on long-running shows like 24, Homeland, and NCIS, as well as the influence of other major organisations like the FBI, CIA and White House then it becomes clear that the national security state has supported thousands of products.

Alford and Secker offer theTransformermovie franchise (2007-2018 so far, most of it directed by Michael Bay) as an example of how the DOD reinforces its national security interests by using different under the table methods of influencing the making of what was (and still is) considered to be pure entertainment.

Normally, filmmakers have to send drafts of the script to the DOD along with their request for material support. Not so with the makers ofTransformers.The DOD paid the filmmakers to gain very early influence over the scripts by giving them the most military assistance in filmmaking history, e.g., twelve types of Air Force aircraft and troops from four different bases. The secondTransformersfilm was provided with $150m F-22 fighters.

The authors rightly conclude that the Transformers franchise is anything but apolitical, and is, in fact, an example of whats come to be known as war pornography. The unstated but intentional message to the audience is to trust in officialdom to bring em home from foreign wars and invasions, no matter the number of human beings, American or otherwise, soldier or civilian, who are killed in the process.

When the authors turn to investigating the CIAs influences on movies, they work from available facts and information in regard to three different eras: 1943-1965, 1966-1986 and 1986 to the present. While the CIA has censored or interfered with far fewer movies, its repressive methods and means, fittingly, are even more insidious.

During the immediate postwar period, officials of the newly formed CIA worked, according to Alford and Secker, to ensure that Hollywood films did not depict them in any form. Meanwhile, the agency, from its establishment, was busy recruiting assets within the highest levels of the film industry and using them to spy on Hollywood and to add and remove material from movie scripts.

The film versions of George Orwells Animal Farm (1954, John Halas and Joy Batchelor) and Nineteen Eighty-Four (1956, Michael Anderson) exemplify the kind of movies that the CIA would be expected to censor. Indeed, film scholars, our authors point out, have long been aware that both adaptations were directly affected by the CIA. In the case of Animal Farm, the changes to the films ending were designed to encourage revolts against communist dictatorships, i.e., the various Stalinist regimes in the USSR and Eastern Europe, ironically just as, in the real world, Alford and Secker point out, the CIA was overthrowing the democratically elected governments in Iran and Guatemala and launching operations against Sukarnos independence government in Indonesia.

The CIA discovered the effectiveness of working through agentsor Hollywood figures who would act as agentsduring the Cold War period. As an example, the authors reveal that Luigi Luraschi, the head of censorship at Paramount Studios, regularly contacted an anonymous individual at the CIA to inform him of Paramounts ability and willingness to alter films to conform to US government interests.

Among the many Paramount movies from which scenes were added or deletedintended to improve the image of American societyinclude the apparently innocuous Sangaree (Edward Ludwig), The Caddy (Norman Taurog) and Houdini (George Marshall), all released in 1953, and Strategic Air Command (Anthony Mann), from 1955. The latter was changed to ensure that America did not appear as a lot of trigger-happy warmongering people.

In 1961 the CIA suffered its first high profile failure during the attempted invasion of Cuba at the Bay of Pigs, an operation aimed at overthrowing the Castro government. One of the CIAs responses to the debacle was to turn to movies to improve its image. Nowhere was this more apparent than in Thunderball (Terence Young, 1965), the James Bond film based on the novel by Ian Fleming (a friend of CIA director Allen Dulles), featuring a number of positive references to the agency, and the first movie with a likable CIA character, Felix Leiter (Rik Van Nutter).

1966-1986: Richard Helms, who began working in intelligence in 1943 and who served as CIA director from 1966-1973, presided over what appeared to be a less intrusive relationship with Hollywood. Alford and Secker ask, But was all as it seemed?

Two films from this periodTopaz (Alfred Hitchcock, 1969) and Three Days of the Condor (Sydney Pollack, 1975)portrayed the CIA as a ruthless intelligence agency that sent murderous villains, i.e., CIA agents, out into the public. The authors hypothesize that the agency may have welcomed the more menacing image that these and other films presented. They write that if there really was tacit CIA approval for the Condor script, it would suggest that the CIA was actually at ease with being represented in such threatening terms. The final scene of the film rationalises the CIAs criminal activity, as ultimately it is only the Agency that appears able to protect the flow of oil that is vital to the nations survival.

Alford and Secker point out that Helms, who was dismissed as CIA chief by President Richard Nixon in early 1973 (due in part to Helmss refusal to help cover up the developing Watergate scandal), spoke with star Robert Redford for hours on the set of Condor in 1975.

The authors notion that the CIA was deliberately cultivating a tough-guy image is probably correct, but providing at least a brief history of Nixons firing of Helms and the surrounding developments, including the state of the flow of oil, would have strengthened their arguments and enlightened the reader.

1986-present: Top Gun (Tony Scott, 1986) proved to be a successful promotional film for the US Navyin the year following the movies release, Navy recruitment figures saw a spike of 16,000, and enlistment for naval aviators jumped 500 percent. This success, according to Alford and Secker, caused the CIA to change its means of manipulating Hollywood. In fact, the CIA was taking advantage of a reactionary political and cultural atmosphere, one of whose central events was the collapse of the Eastern European Stalinist regimes and the dissolution of the Soviet Union between 1989 and 1991.

After building a relationship with author espionage-thriller writer Tom Clancy, the CIA allowed adaptations of two Clancy products, Patriot Games (1992) and Mission Impossible (1996), to be the first movies filmed at the CIAs Langley headquarters in two decades.

Other celebrity links quickly followed, giving the CIA control over the development of a number of films. In his capacity as CIAs Entertainment Liaison Officer (ELO), Chase Brandon, a 25-year veteran of CIA operations and cousin of Hollywood star Tommy Lee Jones, helped give the spy agency influence over the production of a number of films, such as The Bourne Identity (Doug Liman, 2002) , The Sum of All Fears (Phil Alden Robinson, 2002also based on a Clancy Cold War potboiler) and The Recruit (Roger Donaldson, 2003). Brandons role as ghostwriter of the last film has been verified. The Recruit, as the authors note, is intended to counter political concerns, such as the CIAs apparent failure to predict the 9/11 attacks, and to promote the Agencys number one priority, terrorism.

Perhaps the most surprising and disgraceful of the authors findings is the number of Hollywood performers who have, in one way or another, shilled for the CIA and the US military. Robert De Niro (who had left-wing parents and should know better), Tom Cruise, Dan Aykroyd, Dean Cain, Will Smith, Claire Danes, Kevin Bacon, Patrick Stewart and Mike Myers are among those who have publicly visited Langley headquarters. George Clooney and Angelina Jolie have worked on films with the CIA. Ben Affleck, a friend of Rwandan dictator Paul Kagame, and star in the aforementioned CIA and DOD-assisted The Sum of All Fears, told an interviewer that Hollywood is probably full of CIA agents.

A Case Studies section allows the authors to scrutinize more closely the influence of the military-intelligence apparatus on 14 contemporary films in different genres, including James Camerons Avatar (2009); Mike Nicholss Charlie Wilsons War (2007); Robert Zemeckiss Contact (1997); Terry Georges Hotel Rwanda (2004); Seth Rogen-Evan Goldbergs The Interview (2014); The Kingdom (2007) and Lone Survivor (2013), both directed by Peter Berg; William Friedkins Rules of Engagement (2000); and Paul Greengrasss United 93 (2006).

(The WSWS, without of course knowing the specific role of the military and CIA in every case, sharply criticized each of the films on this list that we reviewed.)

A detailed examination of these films brings to light the fact that most of them promote a common underlying ideology, that American military supremacy is fundamentally benevolent.

In the case of Charlie Wilsons War, the CIA advanced this ideology by deleting scenes from the script that portrayed Soviet goodwill during their occupation of Afghanistan, e.g., in one of several scenes removed from the script, a maverick CIA operative described Russian soldiers gathering Afghan refugees together in a semi-circle and teaching them how to read and write. Iron Man (2008) follows a familiar Hollywood plot line to prove the benevolence of American domination. Initially, Tony Stark (Robert Downey Jr.) is a stereotypically rich playboy, but his capture and imprisonment change him almost instantaneously into a heroic figure who, as Iron Man, uses sophisticated equipment to kill generic Muslim terrorists, just as the Pentagon was doing. The US Air Force rewarded the filmmakers by providing aircraft and airmen as extras, along with script and technical advice. Alford and Secker observe that Air Force Captain Christian Hodge, the Defense Departments project officer for the production, commented that the Air Force is going to come off looking like rock stars. The Case Studies section concludes with a consideration of the relationship between various government departments and agencies, especially the CIA, and the work of Clancy and directors Oliver Stone and Paul Verhoeven.

While the authors note that Clancy is hardly a laudable figure politically, the Hollywood versions of his novels removed whatever anti-establishment elements they contained, and shifted them in the direction of misleading people about real events and political dynamics while portraying the security state as the only answer to a dangerous and hostile world.

Alford and Secker rather generously refer to Verhoevens politically subversive trio of moviesthe sci-fi trilogy of Robocop, Total Recall, and Starship Troopers. The latter film, according to Verhoeven, got past the censors because nobody [at Sony Pictures] ever saw it, due to the fact that Sony was turning over management every three or four months.

Veteran filmmaker Oliver Stone had no such luck. After the release of Snowden, about whistleblower Edward Snowden, Stone spoke of his inability to find American financing for the movie, according to the authors, his first major political movie in 21 years. Stone commented, Its a very strange thing to do [a story about] an American man, and not be able to finance this movie in America.

Stone faced censorship from multiple US government departments and agencies as well as a dry well when looking for American financing of any movie that was not sympathetic to US imperialist policies.

At times, the authors fail to bring enough historical background to their statements and assertions, although a valuable Endnotes concludes the book. The critical subject matter, about which the American public knows next to nothing, deserves an even larger study.

Overall, National Security Cinema: The Shocking New Evidence of Government Control in Hollywood offers a clearly written presentation of a Hollywood industry and government departments and agencies that are, indeed, intent on delivering more and more war propaganda. Until they are stopped, we will, to quote the authors, continue to live and die in a military-industrial nightmare.

2019 has been a year of mass social upheaval. We need you to help the WSWS and ICFI make 2020 the year of international socialist revival. We must expand our work and our influence in the international working class. If you agree, donate today. Thank you.

Read this article:
National Security Cinema: The Shocking New Evidence of Government Control in HollywoodHow the US military and CIA go about their propaganda operations...

Is Bernie Sanders a deep cover Communist revolutionary? Uh, no. – The Week

Bernie Sanders has a problem. On a few occasions he has given qualified praise to dastardly Communist regimes in the Soviet Union and Cuba, thus proving his sympathy with the Red menace. So says both the army of Never Trump conservatives (numbering in my count at maybe two dozen, every one of which has a newspaper column somewhere), and various Democratic elites, including some of Sanders' presidential opponents.

But this is just the latest flailing attempt of a political establishment desperate to stop Sanders from securing the Democratic presidential nomination. Bernie Sanders is not a Communist and this kind of knee-jerk red-baiting is as childish as it is outdated.

So what are we talking about? In a press conference after visiting the Soviet Union back in 1988, Sanders spoke positively about the Moscow metro, Soviet youth culture programs, and expressed hope at the potential reforms that appeared to be unfolding there. In a recent 60 Minutes interview, when asked by Anderson Cooper about Cuba and Fidel Castro, Sanders explained Castro's literacy program was one reason why the population hadn't helped the U.S. overthrow him.

The first thing to note here is that Sanders does not deny the worst things about Communist rule in either the USSR or Cuba. In the press conference, he noted that Soviet reformers he spoke with were "absolutely open in acknowledging that they are not a democratic society." He noted that while health care and housing were cheap, they were outdated and low-quality. On Cuba, Sanders said, "We're very opposed to the authoritarian nature of Cuba." When Cooper noted that Castro had imprisoned a lot of dissidents, Sanders responded: "That's right, and we condemn that."

Secondly, Sanders' comments about the Moscow metro, the high quality of Soviet arts programs, and Cuban social programs are basically correct. The Moscow subway system is a shockingly beautiful and functional system even to this day especially if you compare it to the grimy, broken-down, ridiculously expensive rat warrens of the few subways that even exist in the United States. Soviet culture programs in singing, theater, ballet, and so on were famously world-class.

Castro, meanwhile, really did create an excellent literacy program, and Cuba's health care system is astoundingly good considering how dirt-poor the country is (in part a result of the decades-long U.S. embargo, mind). Cuba has more than three times the number of doctors per capita as the United States, its infant mortality rate is a third lower than the U.S., and its life expectancy for men is slightly higher (though not for women). In his film Sicko, Michael Moore famously took several ill 9/11 first responders to Cuba, where they got decent care they could not get in America. One woman on a meager disability pension found her asthma medicine cost 0.0005 percent what it did in the U.S.

On the other hand, it's not like the United States is some beacon of democracy and humane behavior. Another reason most Cubans did not support President Kennedy's attempt to overthrow Castro is that we almost certainly would have helped install a brutal right-wing dictatorship just like we did in Nicaragua, Guatemala, Iran, Argentina, and elsewhere. Anderson Cooper may also be interested to learn that the U.S. imprisons its population at levels approaching the Soviet gulag system at its height, or the names of Chelsea Manning, Reality Winner, Edward Snowden, John Kiriakou, or Thomas Drake. Every president of both parties going back to the 1940s has supported reprehensible dictators in places like Saudi Arabia, Romania, the Philippines, and elsewhere. And Trump has obviously buddied up with authoritarians the world over he's currently in India making nice with Narendra Modi, an anti-democratic strongman implicated in violent crackdowns against his country's Muslim minority.

It is of course true that Communist countries often imposed horrible conditions on their populations to build their trains and welfare states. Cuban doctors are poorly paid and sometimes forced to serve overseas as part of Cuban diplomatic efforts. Communism is a failed model of human development indeed, the only real lesson here is how humiliating it is for the United States that a rattletrap country like Cuba can manage a health care system somewhat competitive with ours in terms of outcomes on a tiny fraction of the resource base.

But that is why Sanders does not point to those nations when talking about what he actually wants to do. When he is delivering his stump speech, he always refers to Denmark, Norway, France, or other European social democracies as his actual lodestar. Rich countries can have quality services and infrastructure without slave labor camps or abolishing democracy.

At bottom, this attack on Sanders is classic red-baiting. Point to something positive somebody said about a Communist country taken out of context and hysterically accuse them of guilt by association. But taken to its logical endpoint, the move is simply silly. Are we supposed to automatically forgo something if the dread Communists happened to do it? I guess we must tear down all American public schools, the Social Security and Medicare programs, all roads and highways, and all our public transit systems. Cuba has 5-cent asthma inhalers? Well ours will have to cost $1,000, otherwise Lenin will make capitalist baby Jesus cry.

Back in the heyday of the Soviet Union in the '50s and '60s, Sanders' comments would no doubt have been disqualifying for most Americans, gripped as they were by Cold War paranoia. But where international Communism was then a formidable globe-spanning behemoth, today it is almost completely dead. The USSR collapsed almost 30 years ago, and most Americans have a dim at best memory of it as a dysfunctional basket case.

To any even slightly good-faith interlocutor, what Sanders said about the USSR or Cuba is anodyne or even boring. These countries have a few good aspects but are generally pretty wretched. That's why we should aim at the Norway example, which proves we can have a dramatically more equal and comfortable society without sacrificing democracy. Attempting to whip up a McCarthyite frenzy over gentle social-democratic reforms is transparently ridiculous and smacks of desperation.

Want more essential commentary and analysis like this delivered straight to your inbox? Sign up for The Week's "Today's best articles" newsletter here.

Read the rest here:
Is Bernie Sanders a deep cover Communist revolutionary? Uh, no. - The Week

When is GOTS not in the national interest? – FedScoop

Written by Shyam Sankar Feb 26, 2020 | FEDSCOOP

The modern open-source software (OSS) movement can be traced back to the early 1980s with the birth of Richard Stallmans GNU Project and the Free Software Foundation.

This revolution ushered in a new era of egalitarian software development, untethered from corporate interests. At the time, it would have been impossible to fathom what is now a truism that OSS is one of the best things that has happened to commercial, for-profit software makers.

Although paradoxical, the success of open source software is principally the result of market forces specifically, the desire to commoditize complementary products to increase demand for ones own products. In every organization, software operates as an ecosystem with many interconnected software products. If an enabling technology for a particular software product is made cheaper (commoditized), that increases demand for the product because the overall ecosystem has become less expensive. The idea can be summed up in a quote from Joel Spolskyswonderful essay on the topic: Smart companies try to commoditize their products complements.

This drive for complementary commoditization turns out to be a dramatic forcing function for innovation. Companies are required to develop more value-added capabilities if they want to win and maintain business. Customers see a world with reduced costs and more interoperability. This pressure is maintained because of the depth and breadth of the open-source community. OpenHub.net, an online community and directory of free and open-source software (FOSS) tracks almost 500,000 OSS projects, nearly 30 billion lines of code, and over 5 million contributors. Interestingly, one studyfound that the average commercial application was more than 35% OSS with internal development projects pushing the needle at 75% open-source. OSS is huge. And it is everywhere.

This leads us to examine GOTS or Government-off-the-Shelf software. The idea behind GOTS is that the government builds the software itself (or, more likely, contracts with an external firm). The government then owns and maintains the source code and any government agency can apply to use the GOTS software for free. This model is problematic for a number of reasons.

First, we must recognize that GOTS is not a good deal. A representative analysis performed by the U.S. Geospatial Intelligence Foundation (USGIF) found that GOTS programs cost the government 70% more than similar commercial-off-the-shelf (COTS) solutions.

However, cost is a red herring for the real challenge presented by GOTS software solutions. On the surface, GOTS seems very similar to OSS which implies that it has the larger structural advantages of OSS. If handled cautiously, it can have those advantages, but care needs to be taken about what sort of existing software is being commoditized. The U.S. has a national interest in maintaining a strong software development capability. We are fortunate to be the dominant software-building country in the world. According to the Forbes 2000list, the total market capitalization of U.S. internet, software, and computer services companies is close to $4.7 trillion more than twice the rest of the world combined. Software tech is an enormous comparative advantage for the U.S. As a result, it is clearly in the national interest to have the government avoid directly competing against and potentially weakening the U.S. private sector.

In the modern era, power struggles between nation-states were the norm. In contrast, most 21st century conflict takes place among a variety of diverse actors, not limited to nation-states, and on the non-kinetic battlegrounds of economic and industrial competition (in addition to diplomatic and military arenas). One of the supreme commitments of the U.S. government is to protect the security of the nation; central to this is recognizing that security is tightly linked to prosperity. Maintaining technological superiority is at the heart of this. Specifically, we need to identify how and where the government is spending money that may unintentionally harm American industry leading to compromised national security.

It is important to note that governments around the world, including our adversaries, are actively depriving U.S. software companies of opportunities in key sectors because they seek to create a protected domestic industry a movement called digital sovereignty. Although inadvertent, the U.S. government is helping them by reducing market access and directly competing with its economic base. Examples of this misapplied competition are unfortunately common. SIMDISis a GOTS software suite developed by the U.S. Naval Research Laboratory for use in 2D and 3D geospatial analysis. As a program, SIMDIS has its roots in the late 1980s and has been under development ever since. SIMDIS promotional materialsboast that it has provided cost savings and avoidance for the DOD over similar COTS products directly admitting that the existence of the program is in competition with the U.S. private sector.

Another example would be Ghidrawhich is a software reverse engineering (SRE) toolset developed as GOTS and subsequently open-sourced by the NSA. It also directly competes with privately developed disassemblersand decompilers, effectively commoditizing these products. In neither case, should we assume ill-will or malice on the part of these programs or their contributors. However, what we should expect is that when programs like this are executed, the effect on U.S. national security will be complex and multi-faceted and it may be the case that commoditizing a private-sector product is not in the best long-term interest of the United States. Our own experience is colored by the fact that many government agencies have tried to rebuild our products (not successfully so far) at great expense to the American taxpayer. These failures are unsurprising given the intrinsic risk in developing enterprise software, where the expected outcome is delay and failure: 98% of OSS projects fail so we should expect similar success rates for its U.S. government cousin, GOTS.

The U.S. government should use successful OSS as should commercial organizations. It fuels innovation, controls costs, and not doing so puts our nation at risk. But the government should also recognize that competitor countries are deliberately investing in OSS to compete against and commoditize U.S. dominance in software as part of their security strategy. Fortunately for the U.S., the rest of the world is a long way from taking on Americas commanding position in software; instead they must fight a proxy war to commoditizing piece-by-piece to. Github, the premier OSS code repository hosting platform, bears out this economic trend: Since 2014, OSS contributions from developers outside the U.S. have surpassed those of U.S. contributors. In 2019, fully 80% of Github contributions came from non-U.S. developers. Chinese developers have created 48% more source repositories in 2019 than they did 2018, and the trend will likely continue. Iranian developers had the second-highest rate of growth in open source projects created in public repositories. These trends continue to accelerate, as we are now experiencing a new Moores Law in which the number of OSS projects is doubling every 14 months. Given this competitive landscape, we must ensure that U.S. procurement policy does not exacerbate these trends.

What is required is a highly nuanced approach to GOTS software. As previously stated, GOTS software is more expensive than both COTS and OSS, since the cost to develop and maintain is born entirely by the government and not the broader market. Leaving cost aside, there is a critically important national interest question. There are good reasons to build GOTS software e.g. when the software itself will be classified. However, where GOTS software may compete with U.S. companies, we should consider that we are likely harming the very interests we aim to protect. When GOTS software is strategically leveraged to commoditize innovations from adversarial nations or to provide a capability that does not exist commercially, it is advancing the national interest. Creating a more rigorous process to review and re-consider the national interest in this context will improve U.S. competitiveness and bolster national security.

Shyam Sankar is president of Palantir Technologies.

Go here to see the original:
When is GOTS not in the national interest? - FedScoop

Software eats telco: The coming disruption – VentureBeat

The telco industry has a problem. In moving to 4G and soon to 5G, the cost and complexity of constructing and running networks has gotten out of hand. Building out the telco infrastructure with conventional equipment is slow and expensive work, and the amount of human labor required to manage those networks is just no longer practical.

As data is considered to be the new oil, the status quo is also an issue for governments, who are wary of their nations data infrastructures being controlled by foreign players. Just three equipment vendors Huawei, Nokia, and Ericsson hold 80% of market share between them. And their proprietary hardware, architecture, and software systems are closed black boxes. That makes a monolithic triopoly in telco equipment more than just a business liability it is also a national security problem.

However you cut it, telco is ripe for disruption.

So why has there been such a drought in new infrastructure players? Until recently, disrupting telco was a Herculean task. The capital requirements were too high and the road to ROI was too long for investors. But now thats all about to radically change with Open RAN (O-RAN) technology. And a cast of new telco players and fresh startups are poised to jump into the game.

If you think about the telco problem, it sounds quite like what happened with IT infrastructure over the past decade. The industry was dominated by a few monoliths with expensive, proprietary, solutions. But then that changed. We got open source, cloud computing, containerization, non-relational databases, and other tools that eliminated the need for a soup-to-nuts solution from a single, powerful vendor.

Today in IT infrastructure, there is a thriving ecosystem of players large and small as a result of this shift. And the hardware and labor costs of running IT data centers are a fraction of what they are for a telco. So why cant we do the same thing in telecommunications? Why cant we build 5G on an open source software model, following in the footsteps of the transformation of IT?

The answer is, we can, and we must. Currently, each telco antenna tower requires multiple hardware units (the black boxes) to connect to devices, access user and system information, and process data. With O-RAN, much of that functionality is virtualized and containerized by software at a core mobile communications facility. That eliminates the proprietary, vertically-integrated nature of the system and allows network operators to customize their own services using any number of vendors, instead of being beholden to the big three suppliers.

Although it isnt talked about that much yet, telco is already being radically reshaped in some global markets. Rakuten Mobile, a renegade telco entrant in Japan, is building 4,000 mobile edge nodes for its 5G network. The system will run on commodity X86 computers and standard data accelerators that anyone can buy.

Then there is Reliance Jio Infocomm. In just three years, Jio has become the largest mobile network operator in India, serving 600 million users. How did they do it? When Jio announced its intention to build a 4G network using more open source components, incumbent players dropped their equipment prices to stay in the game. The mere threat of virtualization was enough to create strong competitive cost advantages.

Its not just the benefits of reduced capital investment in hardware that could benefit new telco players, though. The shift from hardware to software will drastically reduce operating expenses as well. Cloud and edge technologies used by Google, Amazon, and Microsoft like OpenStack, Kubernetes, QEMU, and Akraino will provide the basic network management stack. Virtualization, automation, and containerization solutions from companies like VMWare, Red Hat and emerging startups like Portworx, Rancher Labs, and Robin.io will replace the black boxes with full network transparency. (Full disclosure: My firm is an investor in Robin.io.) AI will reduce operational costs as it does in IT. Consequently, operators will be able to run their networks at one tenth of the current labor cost.

The United States is now catching on. In January 2020, a $1 billion bi-partisan bill was introduced in the Senate, proposing to help US companies develop 5G alternatives to the big three. Of note, it offers financial incentives specifically to develop O-RAN technology. Between this bill and the recent announcement by the FCC Chairman to free up mid-band spectrum for 5G, the FCC seems to be doing its part right.

That makes a lot of sense for the US economy. Moving to an O-RAN paradigm would not only eliminate the worries of monolithic foreign vendors hoarding data under opaque circumstances, it would also stimulate growth. All those X86 boxes? Thats more revenue for Intel and AMD. The accelerators? Theyll come from NVidia, Xilinx, and others. Meanwhile, Telco suppliers like Altiostar, Parallel Wireless, Mavenir, and Affirmed Networks will have an opportunity to grow into major global players. (Full disclosure, I am an investor in Parallel Wireless.)

FCC chairman Ajit Pai seems to support this vision. At CES in January, he said There is no America based supplier of equipment as we currently conceive it. But people are innovating here in the United States and in other parts of the world to virtualize the radio access networks. Using the software layer to address not just the security elements, but also the cost element, I think is a win for everybody.

It is. Telcos should jump on the O-RAN opportunity now. If they dont, they might see themselves leapfrogged. Dish Network, for instance, flush with spectrum from the T-Mobile/Sprint merger agreement, could disrupt the space with a much more cost-effective network. (In fact, DISH has already committed to the mentality of virtualization espoused by O-RAN).

The drought in greenfield telco players is coming to an end, and with it, over-reliance on a foreign equipment vendor triopoly. Open source computing will soon transform telco the way that it did to IT. And for both greenfield and brownfield players who embrace the technology now, O-RAN will prove fertile ground in which to prosper.

Rajeev Madhavan is Founder and General Partner of Clear Ventures.

Continued here:
Software eats telco: The coming disruption - VentureBeat

International Centre for Free and Open Source Software wins honour by Malayalam Mission – The New Indian Express

By Express News Service

THIRUVANANTHAPURAM: The International Centre for Free and Open Source Software (ICFOSS) was awarded the first-ever Bhasha Pratibha Puraskaram instituted by the Malayalam Mission. ICFOSS was selected for making Malayalam language technology-friendly and also for promoting open-source software.ICFOSS chief and CEO of Kerala IT Parks Sasi PM received the award from Chief Minister Pinarayi Vijayan at the Ayyankali Hall here recently. The award carries a cash prize of Rs 50,000 and a citation.

This is the first technology award instituted by the Malayalam Mission for the technical help got for expanding and democratising Malayalam on the internet and Malayalam computing, said a statement. ICFOSS focuses on a variety of areas including machine translation, free and open-source software (FOSS) training, research and development.

The jury observed that the ICFOSS made commendable efforts in coordinating the development of free software and thus by defending corporatisation in the language computing arena. It also lauded the efforts of the agency in developing new fonts and for giving free training government staff in language computing.

See the article here:
International Centre for Free and Open Source Software wins honour by Malayalam Mission - The New Indian Express

Red Hat Extends Partner Offerings to Drive Open Hybrid Cloud Innovation – Yahoo Finance

New features include enhancements to Red Hat Container Certification with Red Hat Universal Base Image, new support for OpenShift Operator Certifications and a simplified path to partnership opportunities

Red Hat, Inc., the world's leading provider of open source solutions, today announced enhancements to its partner offerings centered around open hybrid cloud innovation and in support of the growing demand for cloud-native solutions within the Red Hat ecosystem. Using the proven innovations of Red Hat Enterprise Linux 8 and Red Hat OpenShift 4 as the foundation, Red Hat Partner Connect is expanding its certification programs and support services to better equip partners for an IT world built on hybrid and multicloud deployments.

Red Hat Partner Connect provides many partnership opportunities, including certification offerings and enablement for software, hardware, services and cloud service providers that develop products and services for Red Hat hybrid cloud platforms. The program offers partners a set of tools and alignment opportunities to automate, accelerate and streamline modern application development for the worlds leading enterprise Linux platform in Red Hat Enterprise Linux and the industrys most comprehensive enterprise Kubernetes platform, Red Hat OpenShift. Certified partner products deliver interoperable, supported solutions to customers. Marketing and sales related benefits are also available to partners completing certification programs.

Participating Red Hat technology partners can now access:

To learn more about the latest certification and support offerings, and start building on Red Hat hybrid cloud platforms, visit connect.redhat.com.

Supporting Quotes

Lars Herrmann, senior director of technology partnerships, Red Hat"Transitioning to cloud-native offerings without vendor lock-in is complex, and existing and prospective Red Hat partners are often unaware of what it takes to enable business agility, freedom of choice and enterprise quality all at once. Meeting business and IT needs in the enterprise is greatly simplified by building on Red Hats hybrid cloud platforms. By making it easier to take advantage of our certification offerings for containerized, Kubernetes applications, we are creating a more seamless experience for both partners and customers to explore, develop and adopt cloud-native applications on hybrid and multi-cloud, while avoiding vendor lock-in and forced business model changes. We are excited to see how our partner ecosystem leverages these improved offerings to help customers remain competitive and meet market demand with open hybrid cloud innovation."

Spencer Kimball, chief executive officer, Cockroach Labs, Inc."Many of our enterprise customers require certification for Red Hats OpenShift platform as they move to an open hybrid cloud strategy. We continue to work closely with the Red Hat Partner Connect team and are excited about the enhancements to the tools, processes and programs they have recently added. Certification, along with these updates will dramatically help our customers adopt CockroachDB for their cloud-native transactional workloads."

Ilan Rabinovitch, vice president of product management, Datadog"Containers and orchestration are becoming a standard practice for organizations seeking to operate efficiently at scale. They offer better resource efficiency and simplified deployments that enable the portability customers need to succeed at multicloud. Datadog provides our customers with the visibility they need to understand the health of these workloads, and being a Red Hat certified solution offers them a leading enterprise-ready open hybrid cloud experience."

About Red Hat, Inc.

Red Hat is the worlds leading provider of enterprise open source software solutions, using a community-powered approach to deliver reliable and high-performing Linux, hybrid cloud, container, and Kubernetes technologies. Red Hat helps customers integrate new and existing IT applications, develop cloud-native applications, standardize on our industry-leading operating system, and automate, secure, and manage complex environments. Award-winning support, training, and consulting services make Red Hat a trusted adviser to the Fortune 500. As a strategic partner to cloud providers, system integrators, application vendors, customers, and open source communities, Red Hat can help organizations prepare for the digital future.

Story continues

Forward-Looking Statements

Certain statements contained in this press release may constitute "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995. Forward-looking statements provide current expectations of future events based on certain assumptions and include any statement that does not directly relate to any historical or current fact. Actual results may differ materially from those indicated by such forward-looking statements as a result of various important factors, including: risks related to the ability of the Company to compete effectively; the ability to deliver and stimulate demand for new products and technological innovations on a timely basis; delays or reductions in information technology spending; the integration of acquisitions and the ability to market successfully acquired technologies and products; risks related to errors or defects in our offerings and third-party products upon which our offerings depend; risks related to the security of our offerings and other data security vulnerabilities; fluctuations in exchange rates; changes in and a dependence on key personnel; the effects of industry consolidation; uncertainty and adverse results in litigation and related settlements; the inability to adequately protect Company intellectual property and the potential for infringement or breach of license claims of or relating to third party intellectual property; the ability to meet financial and operational challenges encountered in our international operations; and ineffective management of, and control over, the Company's growth and international operations, as well as other factors. In addition to these factors, actual future performance, outcomes, and results may differ materially because of more general factors including (without limitation) general industry and market conditions and growth rates, economic and political conditions, governmental and public policy changes and the impact of natural disasters such as earthquakes and floods. The forward-looking statements included in this press release represent the Company's views as of the date of this press release and these views could change. However, while the Company may elect to update these forward-looking statements at some point in the future, the Company specifically disclaims any obligation to do so. These forward-looking statements should not be relied upon as representing the Company's views as of any date subsequent to the date of this press release.

Red Hat, Red Hat Enterprise Linux, the Red Hat logo and OpenShift are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the U.S. and other countries. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries.

View source version on businesswire.com: https://www.businesswire.com/news/home/20200226005514/en/

Contacts

Red Hat, Inc.Jessie Beachjbeach@redhat.com 919.301.3065

Read the rest here:
Red Hat Extends Partner Offerings to Drive Open Hybrid Cloud Innovation - Yahoo Finance

Windows 10 Is About To Get A New Browser (Whether You Want It Or Not) – Lifehacker Australia

Microsoft has released its new Google Chromium-based browser into the wild and to everyone's surprise, it's actual pretty good. Now, the company will be adding it to upcoming Windows 10 updates so you'll have to join the part or uninstall it out of spite.

Microsoft's Edge Chromium was released back in January 2020 giving the horrid browser a much-needed face (and features) lift. The browser now offers much of Google Chrome's friendly usability with the convenience of some of Microsoft's features.

Microsoft has finally launched its latest browser, Edge Chromium, and it's based on Google's open source software. Here's what you need to know and whether it's worth testing out.

Read more

While you can just update the browser right now, Microsoft has announced its will begin including automatic updates of the browser in upcoming Windows 10 versions, starting with the Insiders program.

"If you'd prefer not to install Microsoft Edge manually, you can wait for it to be installed in a future update to Windows 10, following our measured roll-out approach over the next several months. We will start to migrate Windows 10 customers to the new Microsoft Edge in the coming weeks, starting with a subset of Windows Insiders in the Release Preview ring," a Windows blog outlined.

"The automatic rollout will maintain your default browser setting if your default is currently set to a browser other than Microsoft Edge, your setting will carry over once the new Microsoft Edge is installed."

So, at least the good part is it won't replace your current browser preferences, which is handy. Nobody wants to boot up their computer and find Microsoft has forced them to use Edge no matter how much better it may now be.

Microsoft plans to roll out Edge via a Windows Update on January 15. Weve had a great time playing around with it since the Chromium version of the browser debuted in April, and well probably have even more to say before its official release next month. But its also OK to not want another browser on your desktop or laptopunfortunately, you dont get much of a choice in the matter.

Read more

See original here:
Windows 10 Is About To Get A New Browser (Whether You Want It Or Not) - Lifehacker Australia

Particle accelerator technology could solve one of the most vexing problems in building quantum computers – Fermi National Accelerator Laboratory

Last year, researchers at Fermilab received over $3.5 million for projects that delve into the burgeoning field of quantum information science. Research funded by the grant runs the gamut, from building and modeling devices for possible use in the development of quantum computers to using ultracold atoms to look for dark matter.

For their quantum computer project, Fermilab particle physicist Adam Lyon and computer scientist Jim Kowalkowski are collaborating with researchers at Argonne National Laboratory, where theyll be running simulations on high-performance computers. Their work will help determine whether instruments called superconducting radio-frequency cavities, also used in particle accelerators, can solve one of the biggest problems facing the successful development of a quantum computer: the decoherence of qubits.

Fermilab has pioneered making superconducting cavities that can accelerate particles to an extremely high degree in a short amount of space, said Lyon, one of the lead scientists on the project. It turns out this is directly applicable to a qubit.

Researchers in the field have worked on developing successful quantum computing devices for the last several decades; so far, its been difficult. This is primarily because quantum computers have to maintain very stable conditions to keep qubits in a quantum state called superposition.

Superconducting radio-frequency cavities, such as the one seen here, are used in particle accelerators. They can also solve one of the biggest problems facing the successful development of a quantum computer: the decoherence of qubits. Photo: Reidar Hahn, Fermilab

Superposition

Classical computers use a binary system of 0s and 1s called bits to store and analyze data. Eight bits combined make one byte of data, which can be strung together to encode even more information. (There are about 31.8 million bytes in the average three-minute digital song.) In contrast, quantum computers arent constrained by a strict binary system. Rather, they operate on a system of qubits, each of which can take on a continuous range of states during computation. Just as an electron orbiting an atomic nucleus doesnt have a discrete location but rather occupies all positions in its orbit at once in an electron cloud, a qubit can be maintained in a superposition of both 0 and 1

Since there are two possible states for any given qubit, a pair doubles the amount of information that can be manipulated: 22 = 4. Use four qubits, and that amount of information grows to 24 = 16. With this exponential increase, it would take only 300 entangled qubits to encode more information than there is matter in the universe.

Qubits can be in a superposition of 0 and 1, while classical bits can be only one or the other. Image: Jerald Pinson

Parallel positions

Qubits dont represent data in the same way as bits. Because qubits in superposition are both 0 and 1 at the same time, they can similarly represent all possible answers to a given problem simultaneously. This is called quantum parallelism, and its one of the properties that makes quantum computers so much faster than classical systems.

The difference between classical computers and their quantum counterparts could be compared to a situation in which there is a book with some pages randomly printed in blue ink instead of black. The two computers are given the task of determining how many pages were printed in each color.

A classical computer would go through every page, Lyon said. Each page would be marked, one at a time, as either being printed in black or in blue. A quantum computer, instead of going through the pages sequentially, would go through them all at once.

Once the computation was complete, a classical computer would give you a definite, discrete answer. If the book had three pages printed in blue, thats the answer youd get.

But a quantum computer is inherently probabilistic, Kowalkowski said.

This means the data you get back isnt definite. In a book with 100 pages, the data from a quantum computer wouldnt be just three. It also could give you, for example, a 1 percent chance of having three blue pages or a 1 percent chance of 50 blue pages.

An obvious problem arises when trying to interpret this data. A quantum computer can perform incredibly fast calculations using parallel qubits, but it spits out only probabilities, which, of course, isnt very helpful unless, that is, the right answer could somehow be given a higher probability.

Interference

Consider two water waves that approach each other. As they meet, they may constructively interfere, producing one wave with a higher crest. Or they may destructively interfere, canceling each other so that theres no longer any wave to speak of. Qubit states can also act as waves, exhibiting the same patterns of interference, a property researchers can exploit to identify the most likely answer to the problem theyre given.

If you can set up interference between the right answers and the wrong answers, you can increase the likelihood that the right answers pop up more than the wrong answers, Lyon said. Youre trying to find a quantum way to make the correct answers constructively interfere and the wrong answers destructively interfere.

When a calculation is run on a quantum computer, the same calculation is run multiple times, and the qubits are allowed to interfere with one another. The result is a distribution curve in which the correct answer is the most frequent response.

When waves meet, they may constructively interfere, producing one wave with a higher crest. Image: Jerald Pinson

As waves, they may also destructively interfere, canceling each other so that theres no longer any wave to speak of. Image: Jerald Pinson

Listening for signals above the noise

In the last five years, researchers at universities, government facilities and large companies have made encouraging advancements toward the development of a useful quantum computer. Last year, Google announced that it had performed calculations on their quantum processor called Sycamore in a fraction of the time it would have taken the worlds largest supercomputer to complete the same task.

Yet the quantum devices that we have today are still prototypes, akin to the first large vacuum tube computers of the 1940s.

The machines we have now dont scale up much at all, Lyon said.

Theres still a few hurdles researchers have to overcome before quantum computers become viable and competitive. One of the largest is finding a way to keep delicate qubit states isolated long enough for them to perform calculations.

If a stray photon a particle of light from outside the system were to interact with a qubit, its wave would interfere with the qubits superposition, essentially turning the calculations into a jumbled mess a process called decoherence. While the refrigerators do a moderately good job at keeping unwanted interactions to a minimum, they can do so only for a fraction of a second.

Quantum systems like to be isolated, Lyon said, and theres just no easy way to do that.

When a quantum computer is operating, it needs to be placed in a large refrigerator, like the one pictured here, to cool the device to less than a degree above absolute zero. This is done to keep energy from the surrounding environment from entering the machine. Photo: Reidar Hahn, Fermilab

Which is where Lyon and Kowalkowskis simulation work comes in. If the qubits cant be kept cold enough to maintain an entangled superposition of states, perhaps the devices themselves can be constructed in a way that makes them less susceptible to noise.

It turns out that superconducting cavities made of niobium, normally used to propel particle beams in accelerators, could be the solution. These cavities need to be constructed very precisely and operate at very low temperatures to efficiently propagate the radio waves that accelerate particle beams. Researchers theorize that by placing quantum processors in these cavities, the qubits will be able to interact undisturbed for seconds rather than the current record of milliseconds, giving them enough time to perform complex calculations.

Qubits come in several different varieties. They can be created by trapping ions within a magnetic field or by using nitrogen atoms surrounded by the carbon lattice formed naturally in crystals. The research at Fermilab and Argonne will be focused on qubits made from photons.

Lyon and his team have taken on the job of simulating how well radio-frequency cavities are expected to perform. By carrying out their simulations on high-performance computers, known as HPCs, at Argonne National Laboratory, they can predict how long photon qubits can interact in this ultralow-noise environment and account for any unexpected interactions.

Researchers around the world have used open-source software for desktop computers to simulate different applications of quantum mechanics, providing developers with blueprints for how to incorporate the results into technology. The scope of these programs, however, is limited by the amount of memory available on personal computers. In order to simulate the exponential scaling of multiple qubits, researchers have to use HPCs.

Going from one desktop to an HPC, you might be 10,000 times faster, said Matthew Otten, a fellow at Argonne National Laboratory and collaborator on the project.

Once the team has completed their simulations, the results will be used by Fermilab researchers to help improve and test the cavities for acting as computational devices.

If we set up a simulation framework, we can ask very targeted questions on the best way to store quantum information and the best way to manipulate it, said Eric Holland, the deputy head of quantum technology at Fermilab. We can use that to guide what we develop for quantum technologies.

This work is supported by the Department of Energy Office of Science.

Originally posted here:
Particle accelerator technology could solve one of the most vexing problems in building quantum computers - Fermi National Accelerator Laboratory

Top 10 breakthrough technologies of 2020 – TechRepublic

Between tiny AI and unhackable internet, this decade's tech trends will revolutionize the business world.

MIT Technology Review unveiled its top 10 breakthrough technology predictions on Wednesday. The trends--which include hype-inducing tech like quantum computing and unhackable internet--are expected to become realities in the next decade, changing the enterprise and world.

SEE: Internet of Things: Progress, risks, and opportunities (free PDF) (TechRepublic)

While many of the trends have a more scientific background, most can also apply to business, said David Rotman editor at MIT Technology Review.

"Even though some of these sound science-y or research-y, all really do have important implications and business impacts. [For example], unhackable internet," Rotman said. "It's early, but we can all see why that would be a big deal.

"Digital money will change how we do commerce; satellite mega constellations will potentially change how we do communications and the price of communications," Rotman added.The methodology behind determining the breakthrough technologies focused on what writers, editors, and journalists have been reporting on in the past year. All of the technologies are still being developed and improved in labs, Rotman said.

The MIT Technology Review outlined the following 10 most exciting technologies being created and deployed in the next 10 years.

One of the most exciting technologies of the bunch, according to Rotman, quantum supremacy indicates that quantum computers are not only becoming a reality, but the functionality is becoming even more advanced.Murmurs of quantum computer development have floated around the enterprise. The technology is able to process massive computational solutions faster than any supercomputer.

While this form of computing hasn't been widely used yet, it will not only be usable by 2030, but possibly reach quantum supremacy, MIT found.

"Quantum supremacy is the point where a quantum computer can do something that a classical conventional computer cannot do or take hundreds of years for a classical computer to do," Rotman said.

The technology is now getting to the point where people can test them in their businesses and try different applications, and will become more popular in the coming years, Rotman said.

Quantum computers are especially useful for massive scheduling or logistical problems, which can be particularly useful in large corporations with many moving parts, he added.

"Satellites have become so small and relatively cheap that people are sending up whole clusters of these satellites," Rotman said. "It's going to have an enormous impact on communication and all the things that we rely on satellites for."

These satellites could be able to cover the entire globe with high-speed internet. Applications of satellite mega-constellation use are currently being tested by companies including SpaceX, OneWeb, Amazon, and Telesat, according to the report.

Another interesting, and surprising, technology in the study concerned tiny AI. The surprising nature of this comes with how quickly AI is growing, Rotman said.

Starting in the present day, AI will become even more functional, independently running on phones and wearables. This ability would prevent devices from needing the cloud to use AI-driven features, Rotman said.

"It's not just a first step, but it would be an important step in speeding up the search for new drugs," Rotman said.

Scientists have used AI to find drug-like compounds with specific desirable characteristics. In the next three to five years, new drugs might be able to be commercialized for a lesser cost, compared to the current $2.5 billion it takes to currently commercialize a new drug, the report found.

Researchers are now able to detect climate change's role in extreme weather conditions. With this discovery, scientists can help people better prepare for severe weather, according to the report.

In less than five years, researchers will find drugs that treat ailments based on the body's natural aging process, the report found. Potentially, diseases including cancer, heart disease and dementia could be treated by slowing age.

Within five years, the internet could be unhackable, the report found.

Researchers are using quantum encryption to try and make an unhackable internet, which is particularly important as data privacy concerns heighten, Rotman said.

Digital money, also known as cryptocurrency, will become more widely used in 2020. However, the rise of this money will also have major impacts on financial privacy, as the need for an intermediary becomes less necessary, according to the report.

Occupying three trends on the list, medicine is proving to potentially be a huge area for innovation. Currently, doctors and researchers are designing novel drugs to treat unique genetic mutations. These specialized drugs could cure some ailments that were previously uncurable, the report found.

Differential privacy is a technique currently being used by the US government collecting data for the 2020 census. The US Census Bureau has issues keeping the data it collects private, but this tactic helps to anonymize the data, a tactic other countries may also adopt, according to the report.

For more, check out Forget quantum supremacy: This quantum-computing milestone could be just as important on ZDNet.

Be in the know about smart cities, AI, Internet of Things, VR, AR, robotics, drones, autonomous driving, and more of the coolest tech innovations. Delivered Wednesdays and Fridays

Image: Urupong, Getty Images/iStockphoto

More here:
Top 10 breakthrough technologies of 2020 - TechRepublic