Artificial Intelligence witnessed highest number of VC investors in 2019, finds GlobalData – Silicon Canals

In the past decade, the rise of AI has revolutionised both workplace and computer science. On the other hand, a lot of experts are raising questions about what AI means for the future of human intelligence.

According to the latest report published by GlobalData, Artificial Intelligence (AI) attracted the highest number of venture capital (VC) investors during 2019 while big data and internet-of-things (IoT) led in terms of investors-to-idea ratio (number of venture capital investors/number of funded companies) and average deal size.

As per the report, around 2,300 AI startups received funding worth $30 billion (approx 27.7 billion) from around 4,000 investors during 2019, which is the highest among all emerging technologies.

However, AI lagged behind other technologies (including cloud, Fintech, Big Data, and IoT) in terms of average deal size and had the second-lowest investors-to-idea ratio. Its worth mentioning that the key funded companies across these disruptive technologies were mostly located in US or Asia-Pacific regions such as China.

Some of the key funded AI companies of 2019 included US-based Nuro, Chinese firm Megvii Technology, and US firm UiPath.

Aurojyoti Bose, Financial Deals Analyst at GlobalData, comments:

AI has already made its way through many sectors and virtually no major industries today remain untouched by AI. However, with different companies, industries, and countries at different phases of their AI journey, the technology is gearing up to play a more significant role in conjunction with other disruptive technologies. One such example is big data, which has been witnessing the use of AI for data analysis. Interestingly, big data registered the highest investors-to-idea ratio of 1.87 in 2019. With the huge volume of data generated and used for making decisions on a daily basis, big data plays a crucial role in data processing. Consequently, companies working in the space are gaining prominence, and investors are also taking note.

On the other hand, IoT occupied the top position in terms of average deal size in 2019, riding on the back of some of the big-ticket VC investments announced in the space during the year.

Main image credits: metamorworks/Shutterstock

Stay tuned toSilicon Canalsfor more European technology news

See more here:
Artificial Intelligence witnessed highest number of VC investors in 2019, finds GlobalData - Silicon Canals

Brian Burch Joins zvelo as Head of Artificial Intelligence and Machine Learning to Drive New Growth Initiatives – Benzinga

GREENWOOD VILLAGE, Colo., Feb. 17, 2020 /PRNewswire-PRWeb/ --Driven by a passion for learning and all things data science, Brian Burch has cultivated an exemplary career in building solutions which solve business problems across multiple industries including cybersecurity, financial services, retail, telecommunications, and aerospace. In addition to having a strong technical background across a broad range of vertical markets, Brian brings deep expertise in the areas of Artificial Intelligence and Machine Learning (AI/ML), Software Engineering, and Product Management.

"We are excited about Brian Burch joining the zvelo leadership team," explains zvelo CEO, Jeff Finn. "zvelo is quickly gaining momentum with tremendous growth opportunities built upon the zveloAI platform. Brian brings an impressive background in AI/ML and data science to further zvelo's leadership for URL classification, objectionable and malicious detection and his passion aligns perfectly with zvelo's mission to improve internet safety and security."

From large organizations like CenturyLink and Regions Bank to successful startups like StorePerform Technologies and Cognilytics, Brian has a proven history of leveraging his vast experience in key leadership roles to advance business goals through a fully-immersed, hands-on approach.

"I'm especially excited about combining zvelo's strong web categorization technologies with the latest advances in AI/ML to identify malicious websites, phishing URLs, and malware distribution infrastructure, and play a key role in supporting the mission to make the internet safer for everyone," stated Burch.

About zvelo, Inc. zvelo is a leading provider of web content classification and detection of objectionable, malicious and threat detection services with a mission of making the Internet safer and more secure. zvelo combines advanced artificial intelligence-based contextual categorization with sophisticated malicious and phishing detection capabilities that customers integrate into network and endpoint security, URL and DNS filtering, brand safety, contextual targeting, and other applications where data quality, accuracy, and detection rates are critical.

Learn more at: https://www.zvelo.com

Corporate Information: zvelo, Inc. 8350 East Crescent Parkway, Suite 450 Greenwood Village, CO 80111 Phone: (720) 897-8113 zvelo.com or pr@zvelo.com

SOURCE zvelo

Originally posted here:
Brian Burch Joins zvelo as Head of Artificial Intelligence and Machine Learning to Drive New Growth Initiatives - Benzinga

VCUarts Qatar to host lecture on Artificial Intelligence and Art – MENAFN.COM

(MENAFN - The Peninsula) Virginia Commonwealth University School of the Arts in Qatar (VCUarts Qatar) in Education City, a Qatar Foundation partner university, will be hosting a lecture by Dr. James She (pictured) from Hong Kong University of Science and Technology (HKUST), titled, ''AI and Smartphone Technologies for New Artwork Creation, Interaction and Definition.The lecture will take place today at 12.30pm at the Atrium at VCUarts Qatar and the vent is open to public.Emerging Artificial Intelligence (AI) and smartphone technologies are making disruptive changes and new possibilities for people in business, manufacturing, travel, education and even art.In this talk, examples of AI and smartphone technologies will be selected to show how recent developments in those technologies could facilitate the creation of, and interaction with, artworks. Dr. James She will also share the story of how his artworks are evolving due to the related technologies invented by himself and others.Through these artworks, Dr .James She, a new media artist and university professor who is interested in merging traditional and new media techniques, will explore trends in artwork creation, new forms of artwork, and novel interaction modalities. He will discuss a few key moments in art history, and rethink definitions of art, craftsmanship, ownership and other related matters which may affect how we evaluate artwork produced by AI and smartphone technologies.At the same time, the Gallery at VCUarts Qatar is hosting an exhibition that combines augmented reality, art, and the music of Johann Sebastian Bach from an album by acclaimed cellist Yo-Yo Ma, to give visitors a unique and immersive audio-visual gallery experience. The exhibition, titled, ''Into the Light will run until February 22.The exhibition opened on January 15 with a well-attended panel discussion titled, ''Art + Technology: How do artists use it to shape their craft and the way their audiences experience it?Amir Berbi, the Dean of VCUarts Qatar, said that the lectures and exhibition highlight how the University is increasingly combining art, design, and AI and VR technologies, and is bringing them into the classroom and to new audiences with lectures and exhibitions by renowned experts. ''Artificial intelligence and virtual reality are increasingly being used in our programs, such as Art Foundation, Interior Design, and Graphic Design, and they have enormous benefits for our graduating students who are entering industries in Qatar and around the world where these skills are much in demand, he said.Dr. James She, who is the founding director of HKUST-NIE Social Media Lab, is currently a visiting professor at the College of Science and Engineering at Hamad Bin Khalifa University, Qatar, and launched the first AI and Art event in Qatar in 2019.

MENAFN1802202000630000ID1099719857

Read more here:
VCUarts Qatar to host lecture on Artificial Intelligence and Art - MENAFN.COM

The Pentagon’s Art of the Deal: Wars without victories and weapons without end – Milwaukee Independent

The expression self-licking ice cream cone was first used in 1992 to describe a hidebound bureaucracy at NASA. Yet, as an image, it is even more apt for Americas military-industrial complex, an institution far vaster than NASA and thoroughly dedicated to working for its own perpetuation and little else.

Thinking about that led me to another phrase based on Americas seemingly endless string of victory-less wars: the self-defeating military. The U.S., after all, has not won a major conflict since World War II, when it was aided by a grand alliance that included Soviet dictator Josef Stalins godless communists. And yet here is the wonder of it all: despite such a woeful 75-year military record, including both the Korean and Vietnam wars of the last century and the never-ending war on terror of this one, the Pentagons coffers are overflowing with taxpayer dollars.

The lack of results should not surprise anyone who has been paying the slightest attention, since the present military establishment has been designed less to protect this country than to protect itself, its privileges, and its power. That rarely discussed reality has, in turn, contributed to practices and mindsets that make it a force truly effective at only one thing: defeating any conceivable enemy in Washington as it continues to win massive budgets and the cultural authority to match. That it loses most everywhere else is, it seems, just part of the bargain.

The list of recent debacles should be as obvious as it is alarming: Afghanistan, Iraq, Libya, Somalia, Yemen (and points around and in between). And even if it is a reality rarely focused on in the mainstream media, none of this has been a secret to the senior officers who run that military. Look at the Pentagon Papers from the Vietnam War era or the Afghanistan Papers recently revealed by the Washington Post. In both cases, prominent U.S. military leaders admitted to fundamental flaws in their war-making practices, including the lack of a coherent strategy, a thorough misunderstanding of the nature and skills of their enemies, and the total absence of any real progress in achieving victory, no matter the cost.

Of course, such honest appraisals of this countrys actual war-making prowess were made in secret, while military spokespeople and American commanders laid down a public smokescreen to hide the worst aspects of those wars from the American people. As they talked grimly (and secretly) among themselves about losing, they spoke enthusiastically and openly to Congress and the public about winning. In case you had not noticed, in places like Afghanistan and Iraq that military was, year after endless year, making progress and turning corners. Such happy talk (a mixture of lies and self-deception) may have served to keep the money flowing and weapons sales booming, but it also kept the body bags coming in (and civilians dying in distant lands)and for nothing, or at least nothing by any reasonable definition of national security.

Curiously, despite the obvious disparity between the militarys lies and reality, the American people, or at least their representatives in Congress, have largely bought those lies in bulk and at astronomical prices. Yet this countrys refusal to face the facts of defeat has only ensured ever more disastrous military interventions. The result: a self-defeating military, engorged with money, lurching toward yet more defeats even as it looks over its shoulder at an increasingly falsified past.

The Future Is What It Used to Be

Long ago, New York Yankee catcher and later manager Yogi Berra summed up what was to come this way: The future aint what it used to be. And it was not. We used to dream, for example, of flying cars, personal jetpacks, liberating robots, and oodles of leisure time. We even dreamed of mind-bending trips to Jupiter, as in Stanley Kubricks epic film 2001: A Space Odyssey. Like so much else we imagined, those dreams have not exactly panned out.

Yet here is an exception to Berras wisdom: strangely enough, for the U.S. military, the future is predictably just what it used to be. After all, the latest futuristic vision of Americas military leaders ishold onto your Kevlar helmetsa new cold war with its former communist rivals Russia and China. Add in one other aspect of that militarys future vision: wars, as they see it, are going to be fought and settled with modernized and ever more expensive versions of the same old weapons systems that carried us through much of the mid-twentieth century: ever more pricey aircraft carriers, tanks, and top of the line jet fighters and bombers withhey!maybe a few thoroughly destabilizing tactical nukes thrown in, along with plenty of updated missiles carried by planes of an ever more stealthy and far more expensive variety. Think: the F-35 fighter, the most expensive weapons system in history and the B-21 bomber.

For such a future, of course, todays military hardly needs to change at all, or so our generals and admirals argue. For example, yet more ships will, of course, be needed. The Navy high command is already clamoring for 355 of them, while complaining that the record-setting $738 billion Pentagon budget for 2020 is too tight to support such a fleet.

Not to be outdone when it comes to complaints about tight budgets, the Air Force is arguing vociferously that it needs yet more billions to build a fleet of planes that can wage two major wars at once. Meanwhile, the Army is typically lobbying for a new armored personnel carrier (to replace the M2 Bradley) that is so esoteric insiders joke it will have to be made of unobtainium.

In short, no matter how much money the Trump administration and Congress throw at the Pentagon, it is a guarantee that the military high command will only complain that more is needed, including for nuclear weapons to the tune of possibly $1.7 trillion over 30 years. But doubling down on more of the same, after a record 75 years of non-victories (not to speak of outright losses), is more than stubbornness, more than grift. It is obdurate stupidity.

Why, then, does it persist? The answer would have to be because this country does not hold its failing military leaders accountable. Instead, it applauds them and promotes them, rewarding them when they retire with six-figure pensions, often augmented by cushy jobs with major defense contractors. Given such a system, why should Americas generals and admirals speak truth to power? They are power and they will keep harsh and unflattering truths to themselves, thank you very much, unless they are leaked by heroes like Daniel Ellsberg during the Vietnam War and Chelsea Manning during the Iraq War, or pried from them via a lawsuit like the one by the Washington Post that recently led to those Afghanistan Papers.

My Polish mother-in-law taught me a phrase that translates as, Dont say nothin to nobody. When it comes to Americas wars and their true progress and prospects, consider that the official dictum of Pentagon spokespeople. Yet even as Americas wars sink into Vietnam-style quagmires, the money keeps flowing, especially to high-cost weapons programs.

Consider my old service, the Air Force. As one defense news site put it, Congressional appropriators gave the Air Force [and Lockheed Martin] a holiday gift in the 2019 spending agreement $1.87 billion for 20 additional F-35s and associated spare parts. The new total just for 2020 is 98 aircraft62 F-35As, 16 F-35Bs, and 20 F-35Csat the whopping cost of $9.3 billion, crowning the F-35 as the biggest Pentagon procurement program ever.

And that is not all. The Air Force (and Northrop Grumman) got another gift as well: $3 billion more to be put into its new, redundant, B-21 stealth bomber. Even much-beleaguered Boeing, responsible for the disastrous 737 MAX program, got a gift: nearly a billion dollars for the revamped F-15EX fighter, a much-modified version of a plane that first flew in the early 1970s. Yet, despite those gifts, Air Force officials continue to claim with straight faces that the service is getting the short straw in todays budgetary battles in the Pentagon. What does this all mean? One obvious answer would be: the only truly winning battles for the Pentagon are the ones for our taxpayer dollars.

Dopes and Babies Galore

I cannot claim that I ever traveled in the circles of generals and admirals, though I met a few during my military career. Still, no one can question that our commanders are dedicated. The only question is: dedication to what exactlyto the Constitution and the American people or to their own service branch, with an eye toward a comfortable and profitable retirement? Certainly, loyalty to service (and the conformity that goes with it), rather than out-of-the-box thinking in those endlessly losing wars, helped most of them win promotion to flag rank.

Perhaps this is one reason why, back in July 2017, the militarys current commander-in-chief, Donald Trump, reportedly railed at his top national security people in a windowless Pentagon room known as the Tank. He called themincluding then-Chairman of the Joint Chiefs of Staff Joseph Dunford, Jr.a bunch of dopes and babies. As the president put it, Americas senior military leaders do not win anymore and, as he made clear, nothing is worse than being a loser. He added, I want to win. We do not win any wars anymore We spend $7 trillion, everybody else got the oil and we are not winning anymore. (And, please note, that has not changed a whit in the year and a half since that moment.)

Sure, Trump threw a typical tantrum, but his comments about losing at a strikingly high cost were (and remain) absolutely on the mark, not that he had any idea how to turn Americas losing wars and their losing commanders into winners. In many ways, his strategy has proven remarkably like those of the two previous presidents, George W. Bush and Barack Obama. Send more troops to the Middle East. Drone and bomb ever more, not just in Afghanistan and Iraq but even in places like Somalia and Libya. Prolong our commitment to loser wars like the Afghan one, even while talking ceaselessly about ending them and bringing the troops home. And continue to rebuild that same military, empowering those same dopes and babies, with yet more taxpayer dollars.

The results have been all-too predictable. Americas generals and admirals have so much money that they do not ever have to make truly tough choices. They hardly have to think. The Air Force, for example, just keeps planning for and purchasing more ultra-expensive stealth fighters and bombers to fight a future Cold War that we allegedly won 30 years ago. Meanwhile, actual future national security threats like climate-related catastrophes or pandemics go largely unaddressed. Who cares about them when this country will clearly have the most stealth fighters and bombers in the world?

For the Pentagon, the future is the past and the past, the future. Why should military leaders have to think when the president and Congress keep rewarding them for lies and failures of every sort?

Trump believes America does not win anymore because we are not ruthless enough. Take the oil! The real reason: because Americas wars are unwinnable from the git-go, something the last 18 years should have proved in no uncertain way. And the irony of all ironies is that the wars are completely unnecessary from the standpoint of true national defense. There is no way for the U.S. military to win hearts and minds across the Greater Middle East and Africa with salvos of Hellfire missiles. In fact, there is only one way to win such wars: end them. And there is only one way to keep winning: by avoiding future ones.

With a system that could not work better in Washington, Americas military refuses to admit this. Instead, our generals just keep saluting smartly while lying in public the details of which we will find out about only when the next set of papers is released someday. In the meantime, when it comes to demanding and getting tax dollars, they could not be more skilled. In that sense, and that alone, they are the ultimate winners.

Dopes and babies, Mister President? No, just men who are genuinely skilled in the art of the deal. Small wonder Americas leader is upset. For when it comes to the military-industrial complex and its power and prerogatives, even Trump has met his match. He has been out-conned. And if the rest of us remain silent on the subject, then so have we.

Read this article:
The Pentagon's Art of the Deal: Wars without victories and weapons without end - Milwaukee Independent

Can the World’s Second Superpower Rise From the Ashes of 20 Years of War? – The Bullet – Socialist Project

War/Peace February 17, 2020 Medea Benjamin and Nicolas J. S. Davies

February 15 marked the day, 17 years ago, when global demonstrations against the pending Iraq invasion were so massive that the New York Times called world public opinion the second superpower. But the US ignored it and invaded Iraq anyway. So what has become of the momentous hopes of that day?

The US military has not won a war since 1945, unless you count recovering the tiny colonial outposts of Grenada, Panama and Kuwait, but there is one threat it has consistently outmaneuvered without firing more than a few deadly rifle shots and some tear gas. Ironically, this existential threat is the very one that could peacefully cut it down to size and take away its most dangerous and expensive weapons: its own peace-loving citizens.

During the Vietnam War, young Americans facing a life-and-death draft lottery built a powerful anti-war movement. President Nixon proposed ending the draft as a way to undermine the peace movement, since he believed that young people would stop protesting the war once they were no longer obligated to fight. In 1973, the draft was ended, leaving a volunteer army that insulated the vast majority of Americans from the deadly impact of Americas wars.

Despite the lack of a draft, a new anti-war movement this time with global reach sprung up in the period between the crimes of 9/11 and the illegal US invasion of Iraq in March 2003. The February 15, 2003, protests were the largest demonstrations in human history, uniting people around the world in opposition to the unthinkable prospect that the US would actually launch its threatened shock and awe assault on Iraq. Some 30 million people in 800 cities took part on every continent, including Antarctica. This massive repudiation of war, memorialized in the documentary We Are Many, led New York Times journalist Patrick E. Tyler to comment that there were now two superpowers on the planet: the United States and world public opinion.

The US war machine demonstrated total disdain for its upstart rival, and unleashed an illegal war based on lies that has now raged on through many phases of violence and chaos for 17 years. With no end in sight to US and allied wars in Afghanistan, Iraq, Somalia, Libya, Syria, Palestine, Yemen and West Africa, and Trumps escalating diplomatic and economic warfare against Iran, Venezuela and North Korea threatening to explode into new wars, where is the second superpower now, when we need it more than ever?

Since the US assassination of Irans General Soleimani in Iraq on January 2, the peace movement has reemerged onto the streets, including people who marched in February 2003 and new activists too young to remember a time when the US was not at war. There have been three separate days of protest, one on January 4, another on January 9 and a global day of action on January 25. The rallies took place in hundreds of cities, but they did not attract nearly the numbers who came out to protest the pending war with Iraq in 2003, or even those of the smaller rallies and vigils that continued as the Iraq war spiraled out of control until at least 2007.

Our failure to stop the US war on Iraq in 2003 was deeply discouraging. But the number of people active in the US anti-war movement shrank even more after the 2008 election of Barack Obama. Many people did not want to protest the nations first black president, and many, including the Nobel Peace Prize Committee, really believed he would be a peace president.

While Obama reluctantly honored Bushs agreement with the Iraqi government to withdraw US troops from Iraq and he signed the Iran nuclear deal, he was far from a peace president. He oversaw a new doctrine of covert and proxy war that substantially reduced US military casualties, but unleashed an escalation of the war in Afghanistan, a campaign against ISIS in Iraq and Syria that destroyed entire cities, a tenfold increase in CIA drone strikes on Pakistan, Yemen and Somalia, and bloody proxy wars in Libya and Syria that rage on today. In the end, Obama spent more on the military and dropped more bombs on more countries than Bush did. He also refused to hold Bush and his cronies responsible for their war crimes.

Obamas wars were no more successful than Bushs in restoring peace or stability to any of those countries or improving the lives of their people. But Obamas disguised, quiet, media-free approach to war made the US state of endless war much more politically sustainable. By reducing US casualties and waging war with less fanfare, he moved Americas wars farther into the shadows and gave the American public an illusion of peace in the midst of endless war, effectively disarming and dividing the peace movement.

Obamas secretive war policy was backed up by a vicious campaign against any brave whistleblowers who tried to drag it out into the light. Jeffrey Sterling, Thomas Drake, Chelsea Manning, John Kiriakou, Edward Snowden and now Julian Assange have been prosecuted and jailed under unprecedented new interpretations of the WWI-era Espionage Act.

With Donald Trump in the White House, we hear Republicans making the same excuses for Trump who ran on an anti-war platform that Democrats made for Obama. First, his supporters accept lip service about wanting to end wars and bring troops home as revealing what the president really wants to do, even as he keeps escalating the wars. Second, they ask us to be patient because, despite all the real-world evidence, they are convinced he is working hard behind the scenes for peace. Third, in a final cop-out that undermines their other two arguments, they throw up their hands and say that he is only the president, and the Pentagon or deep state is too powerful for even him to tame.

Obama and Trump supporters alike have used this shaky tripod of political unaccountability to give the man behind the desk where the buck used to stop an entire deck of get out of jail free cards for endless war and war crimes.

Obama and Trumps disguised, quiet, media-free approach to war has inoculated Americas wars and militarism against the virus of democracy, but new social movements have grown up to tackle problems closer to home. The financial crisis led to the rise of the Occupy Movement, and now the climate crisis and Americas entrenched race and immigration problems have all provoked new grassroots movements. Peace advocates have been encouraging these movements to join the call for major Pentagon cuts, insisting that the hundreds of billions saved could help fund everything from Medicare for All to the Green New Deal to free college tuition.

A few sectors of the peace movement have been showing how to use creative tactics and build diverse movements. The movement for Palestinians human and civil rights includes students, Muslim and Jewish groups, as well as black and indigenous groups fighting similar struggles here at home. Also inspirational are campaigns for peace on the Korean peninsula led by Korean Americans, such as Women Cross the DMZ, which has brought together women from North Korea, South Korea and the United States to show the Trump administration what real diplomacy looks like.

There have also been successful popular efforts pushing a reluctant Congress to take anti-war positions. For decades, Congress has been only too happy to leave war-making to the president, abrogating its constitutional role as the only power authorized to declare war. Thanks to public pressure, there has been a remarkable shift.

In 2019, both houses of Congress voted to end US support for the Saudi-led war in Yemen and to ban arms sales to Saudi Arabia for the war in Yemen, although President Trump vetoed both bills. Now Congress has passed bipartisan bills to explicitly prohibit an unauthorized war on Iran. These bills prove that public pressure can move Congress, including a Republican-dominated Senate, to reclaim its constitutional powers over war and peace from the executive branch.

Another bright light in Congress is the pioneering work of first-term Congresswoman Ilhan Omar, who recently laid out a series of bills called Pathway to PEACE that challenge our militaristic foreign policy. While her bills will be hard to get passed in Congress, they lay out a marker for where we should be headed. Omars office, unlike many others in Congress, actually works directly with grassroots organizations that can push this vision forward.

The presidential election offers an opportunity to push the anti-war agenda. The most effective and committed anti-war champion in the race is Bernie Sanders. The popularity of his call for getting the US out of its imperial interventions and his votes against 84 per cent of military spending bills since 2013 are reflected not only in his poll numbers but also in the way other Democratic candidates are rushing to take similar positions. All now say the US should rejoin the Iran nuclear deal; all have criticized the bloated Pentagon budget, despite regularly voting for it; and most have promised to bring US troops home from the greater Middle East.

So, as we look to the future in this election year, what are our chances of reviving the worlds second superpower and ending Americas wars?

Absent a major new war, we are unlikely to see big demonstrations in the streets. But two decades of endless war have created a strong anti-war sentiment among the public. A 2019 Pew Research Center poll found that 62 per cent of Americans said the war in Iraq was not worth fighting and 59 per cent said the same for the war in Afghanistan.

On Iran, a September 2019 University of Maryland poll showed that a mere one-fifth of Americans said the US should be prepared to go to war to achieve its goals in Iran, while three-quarters said that US goals do not warrant military intervention. Along with the Pentagons assessment of how disastrous a war with Iran would be, this public sentiment fueled global protests and condemnation that have temporarily forced Trump to dial down his military escalation and threats against Iran.

So, while our governments war propaganda has convinced many Americans that we are powerless to stop its catastrophic wars, it has failed to convince most Americans that we are wrong to want to. As on other issues, activism has two main hurdles to overcome: first to convince people that something is wrong; and second to show them that, by working together to build a popular movement, we can do something about it.

The peace movements small victories demonstrate that we have more power to challenge US militarism than most Americans realize. As more peace-loving people in the US and across the world discover the power they really have, the second superpower we glimpsed briefly on February 15, 2003, has the potential to rise stronger, more committed and more determined from the ashes of two decades of war.

A new president like Bernie Sanders in the White House would create a new opening for peace. But as on many domestic issues, that opening will only bear fruit and overcome the opposition of powerful vested interests if there is a mass movement behind it every step of the way. If there is a lesson for peace-loving Americans in the Obama and Trump presidencies, it is that we cannot just walk out of the voting booth and leave it to a champion in the White House to end our wars and bring us peace. In the final analysis, it really is up to us. Please join us!

This article was produced by Local Peace Economy, a project of the Independent Media Institute.

Read more from the original source:
Can the World's Second Superpower Rise From the Ashes of 20 Years of War? - The Bullet - Socialist Project

RSAC 2020: Trust in the Cloud. What Should You Do with Your Encryption Keys? – Security Boulevard

In the past decade, businesses started evaluating the pros and cons of moving to the cloud in order to meet the increased demand for the cost and IT efficiency benefits of cloud computing and Software as a Service (SaaS). Many businesses subsequently adopted a Platform as a Service (PaaS), Infrastructure as a Service (IaaS) or SaaS model, thus positioning the cloud as the foundation for digital transformation. In the process, however, they embraced a large number of connected devices and IoT platforms, which means that additional data and processes are now moving outside of the firewall and into the cloud. This presents a security risk to businesses.

The need for strong security in the cloud is a factor that can either slow or speed movement to the cloud, depending on workload and other needs. As such, security professionals need to tackle certain security challenges associated with the cloud head-on. In particular, they need to address the challenge of cloud key management.

Businesses oftentimes struggle to manage their use of multiple cloud vendors such as AWS, Google Cloud Platform and Microsoft Azure. When it comes to data security, more organizations are tempted to use cloud native encryption and key management services because its simple and easily available. This decision comes with many challenges.

One issue is that cloud native encryption and key management services provide just basic data security. Cloud services need to afford the same level of policy, control and visibility as the on-premises delivered services. Many organizations cant rely solely on the services offered by key management tools built in the cloud platforms. These tools are very good at provisioning keys for the development teams, but when it comes to policy compliance, particularly for sensitive data or data under the purview of the latest privacy mandates such as the California Consumer Privacy Act, there are many gaps that may jeopardize a seemingly simple key management strategy.

Furthermore, leaving key control and management to cloud providers presents potential security risks and data ownership issues. Its simply not a good idea to get locked into a single cloud vendor. Cloud computing has revolutionized the ways that companies do business. However, this increased reliance on cloud computing also comes with the risk of dependency. By making your company more flexible and adaptable, being cloud agnostic inoculates against the risk of vendor lock-in.

From an operational standpoint, the use of multiple cloud key management services translates to decentralized key management, which is a definite no-no when it comes to security best practices. Unfortunately, this rush to cloud native encryption and key management has put sensitive data at risk as evidenced by the multitude of data breaches we have witnessed over the past couple of years.

Finally, if your on-premises policies, methodology, controls and visibility are well-tested and well-implemented, why should you change them? Successful on-premises best practices will be just as successful when you extend them into the cloud.

The good news is that there are emerging options available for security professionals, but the trick is determining which one works best for their organization to ensure data is protected, brand trust is retained, and shareholders are appeased. Never before has maintaining access and control of keys been so important, especially given the financial implications (which may or may not include non-compliance fines) from a data breach.

During the upcoming RSA Conference 2020, I will be discussing the best practices for cloud key management to minimize risk. My objective for the audience is as follows: 1) understand the challenges and pitfalls associated with cloud key management, 2) learn about the various options available, 3) identify the right fit for your organization, and 4) evaluate how to adopt changes internally. To meet these objectives, I will be highlighting the four Cs: Challenges, Choices, Capabilities and Changes.

If you are attending RSA Conference in San Francisco next week, grab a cup of coffee and join me in this discussion on Wednesday, February 26 at 8:00 a.m. in the North Hall Briefing Center. Or stop by Thaless RSA Conference booth #N5445. Before the show, you can claim your free conference pass by clicking here and entering code XS0UTHALE.

The post RSAC 2020: Trust in the Cloud. What Should You Do with Your Encryption Keys? appeared first on Data Security Blog | Thales eSecurity.

*** This is a Security Bloggers Network syndicated blog from Data Security Blog | Thales eSecurity authored by Sol Cates. Read the original post at: https://blog.thalesesecurity.com/2020/02/17/rsac-2020-trust-in-the-cloud-what-should-you-do-with-your-encryption-keys/

Read more from the original source:
RSAC 2020: Trust in the Cloud. What Should You Do with Your Encryption Keys? - Security Boulevard

The $600 quantum computer that could spell the end for conventional encryption – BetaNews

Concerns that quantum computing could place current encryption techniques at risk have been around for some time.

But now cybersecurity startup Active Cypher has built a password-hacking quantum computer to demonstrate that the dangers are very real.

Using easily available parts costing just $600, Active Cyphers founder and CTO, Dan Gleason, created a portable quantum computer dubbed QUBY (named after qubits, the basic unit of quantum information). QUBY runs recently open-sourced quantum algorithms capable of executing within a quantum emulator that can perform cryptographic cracking algorithms. Calculations that would have otherwise taken years on conventional computers are now performed in seconds on QUBY.

Gleason explains, "After years of foreseeing this danger and trying to warn the cybersecurity community that current cybersecurity protocols were not up to par, I decided to take a week and move my theory to prototype. I hope that QUBY can increase awareness of how the cyberthreats of quantum computing are not reserved to billion-dollar state-sponsored projects, but can be seen on much a smaller, localized scale."

The concern is that quantum computing will lead to the sunset of AES-256 (the current encryption standard), meaning all encrypted files could one day be decrypted. "The disruption that will come about from that will be on an unprecedented, global scale. It's going to be massive," says Gleason. Modelled after the SADM, a man-portable nuclear weapon deployed in the 1960s, QUBY was downsized so that it fits in a backpack and is therefore untraceable. Low-level 'neighborhood hackers' have already been using portable devices that can surreptitiously swipe credit card information from an unsuspecting passerby. Quantum compute emulating devices will open the door for significantly more cyberthreats.

In response to the threat, Active Cypher has developed advanced dynamic cyphering encryption that is built to be quantum resilient. Gleason explains that, "Our encryption is not based on solving a mathematical problem. It's based on a very large, random key which is used in creating the obfuscated cyphertext, without any key information within the cyphertext, and is thus impossible to be derived through prime factorization -- traditional brute force attempts which use the cyphertext to extract key information from patterns derived from the key material."

Active Cypher's completely random cyphertext cannot be deciphered using even large quantum computers since the only solution to cracking the key is to try every possible combination of the key, which will produce every known possible output of the text, without knowledge of which version might be the correct one. "In other words, you'll find a greater chance of finding a specific grain of sand in a desert than cracking this open," says Gleason.

Active Cypher showcased QUBY in early February at Ready -- an internal Microsoft conference held in Seattle. The prototype will also be presented at RSA in San Francisco later this month.

See the article here:
The $600 quantum computer that could spell the end for conventional encryption - BetaNews

Why do activists fear that Facebooks encryption plans will reduce child safety online? – The Hindu

The story so far: After Facebook announced end-to-end encryption for Facebook Messenger and Instagram, a coalition of child protection organisations and experts from all over the world, anchored by the National Society for the Prevention of Cruelty to Children, U.K., sent an open letter to CEO Mark Zuckerberg, expressing significant concerns about the companys proposals. They were worried that this decision would reduce child safety online, because such a move will not allow the due process of monitoring for content that is not safe for children, including online grooming or uploading of child pornographic content. The petition said: We urge you to recognise and accept that an increased risk of child abuse being facilitated on or by Facebook is not a reasonable trade-off to make.

It is a system of locking messages wherein only those who are communicating can view them. Encryption kicks in the minute the message is sent, and only unravels for the intended recipient. No third party can decrypt the message, including platform administrators and law enforcement agencies. It can only be shared through screenshots. The advantage with this kind of encryption is that it ensures online privacy.

Last year, Mr. Zuckerberg revealed his intention to rejig the architecture to integrate three platforms: WhatsApp, Facebook Messenger and Instagram. He also announced his intention to write in default end-to-end encryption.

Child safety activists are aghast as they believe that as far as child safety goes, this could well be a misstep. The U.K.-based John Carr, who has anchored the campaign against such encryption, is a leading authority on the use of the Internet by children and young people. He has summed up the primary opposition, on his blog, thus: We are creating what are, for practical purposes, impregnable or unreachable spaces. These confer impunity on any and all manner of wrongdoing. Paedophiles and persons who wish to exchange child sex abuse material are permanently shielded, as are terrorists and an infinite variety of scam artists.

Limiting the ability of companies themselves to detect and prevent behaviour which contravenes their own terms of services is wrong and makes a mockery of the very idea of having terms of service in the first place, he records.

The evidence on the field, activists claim, makes their case a persuasive one. Mr. Carr outlines data from a series of Freedom of Information requests made to the police in England and Wales involving online grooming behaviour directed at a child, or the distribution of child sex abuse material on Facebook, Instagram and WhatsApp. From a total of 9,259 instances, over a year (2017-2018), police reported that 22% were on Instagram, 19% were on Facebook or Facebook Messenger, and 3% from WhatsApp. Since all three belong to one company that wants to encrypt everything, the petition takes on an urgent tone. Mr. Carr also clarifies: We are not talking about Facebooks main platform. Nothing will change there. So, yes, if an illegal image goes up, they will find it and delete it in minutes, maybe seconds But, this is all about their Messaging services. So thats Facebook Messenger and Instagram Direct where they are proposing to make themselves blind.

In 2018, Facebook made 16.8 million reports to the National Center for Missing and Exploited Children (NCMEC), leading to 2,500 arrests and 3,000 children being safeguarded in the U.K alone. As per reports on online child sexual abuse imagery (CSAI) collated between 2008 and 2017 by the NCMEC, India tops the list of 10 nations where CSAI originated. A total of 38,80,235 cases were reported from India, the report said, but added that distortions might occur if virtual private networks (VPNs) or proxy servers were used.

The Rajya Sabha ad-hoc committee that went into the issue of pornography on social media and its effect on children has called specifically to permit breaking of end-to-end encryption to trace distributors of child pornography. It has also suggested that Prime Minister Narendra Modi take the lead in building a global alliance to combat child pornography on social media.

The signatories, including three Indian organisations (Tulir, Arpan and Equations), have urged that Facebook put the brakes on end-to-end encryption until it is able to satisfactorily demonstrate that there will be no reduction in childrens safety.

The petition says: Strong encryption plays a hugely valuable role in keeping citizens and their data safe. We fully recognise that users of online services have a legitimate interest in ensuring their data is protected, and there seems to be a growing appetite for users to have greater control over how their data is used by tech companies... Facebook has a responsibility to work with law enforcement and to prevent the use of sites and services for sexual abuse, including grooming, the sharing of child abuse images, and children being coerced into sending self-generated images and videos. In fact, Mr. Zuckerberg has himself recorded such concerns in a blogpost: When billions of people use a service to connect, some of them are going to misuse it for truly terrible things like child exploitation, terrorism, and extortion. But we face an inherent trade-off because we will never find all of the potential harm we do today when our security systems can see the messages themselves.

The process of securing end-to-end encryption is not easy. Meanwhile, the coalition has also pledged its support to work with Facebook to embed safety mechanisms. Ultimately, the true test will be to pick that mode of encryption that will ensure privacy but address concerns of online safety too.

Read more:
Why do activists fear that Facebooks encryption plans will reduce child safety online? - The Hindu

Encryption Software Market: Global Opportunities, Regional Overview, Top Leaders, Size, Revenue and Forecast up to 2025 by WMR – Instant Tech News

Worldwide Market Reports analysis report on Encryption Software Market provides an deep analysis on market-size, shares supply-demand analysis, sales worth and volume study of various industries combined with division study, with regard to necessary geographics regions. This report conjointly consists of the present evolution within the global industry and crucial components that affects the growth of the Encryption Software market. The Encryption Software market has additionally been categorised depending upon varied sections. The important sections are additional divided into Encryption Software sub-sections that provided the better understanding of the entire international market and assist to form a conclusive discernment on sensible workplace business.

Company provides detailed analysis of market and future aspects of Encryption Software Market. It focuses on vital and important information that makes the analysis a really important tool for specialists, analysts and managers to induce ready-to-access analysis. Report provides comprehensive analysis of Encryption Software market size development forecast from 2019-2026.

Download Free PDF Brochure or Sample of [emailprotected] https://www.worldwidemarketreports.com/sample/221411

The report covers market dynamics poignant the market throughout the forecast period. Moreover, the report analyses the competitive scenario, geographic trends, and opportunities inside the markets with relevancy all geographic regions. The report collectively includes the detailed company profiles of the key players within the market beside their market strategies. The report in addition provides persecutor analysis of all 5 regions along side the SWOT analysis for all company profiled within the report.

Regional Analysis For Encryption Software Market:

The report provides a detailed breakdown of the market region-wise and categorizes it at various levels. Regional segment analysis displaying regional production volume, consumption volume, revenue, and growth rate from 2019-2026 covers: Americas (United States, Canada, Mexico, Brazil), APAC (China, Japan, Korea, Southeast Asia, India, Australia), Europe (Germany, France, UK, Italy, Russia, Spain), Middle East & Africa (Egypt, South Africa, Israel, Turkey, GCC Countries)

What are the market factors that are explained in the report?

Key Strategic Developments: The study also includes the key strategic developments of the market, comprising R&D, new product launch, M&A, agreements, collaborations, partnerships, joint ventures, and regional growth of the leading competitors operating in the market on a global and regional scale.

Key Market Features: The report evaluated key market features, including revenue, price, capacity, capacity utilization rate, gross, production, production rate, consumption, import/export, supply/demand, cost, market share, CAGR, and gross margin. In addition, the study offers a comprehensive study of the key market dynamics and their latest trends, along with pertinent market segments and sub-segments.

Analytical Tools: The Global Encryption Software Market report includes the accurately studied and assessed data of the key industry players and their scope in the market by means of a number of analytical tools. The analytical tools such as Porters five forces analysis, SWOT analysis, feasibility study, and investment return analysis have been used to analyze the growth of the key players operating in the mark

Influence of the Encryption Software Market Report:

-Comprehensive assessment of all opportunities and risk in the Encryption Software market.

-Encryption Software market recent innovations and major events.

-Detailed study of business strategies for growth of the Encryption Software market-leading players.

-Conclusive study about the growth plot of Encryption Software market for forthcoming years.

-In-depth understanding of Encryption Software market-particular drivers, constraints and major micro markets.

-Favourable impression inside vital technological and market latest trends striking the Encryption Software market.

Inquire For Further Detailed Information Of Encryption Software Market Report At: https://www.worldwidemarketreports.com/quiry/221411

Encryption Software market will prove as a valuable source of guidance for professional clients like Tier 1, Tier 2, Tier 3 level managers, CEOs, CMOs, as well as interested individual readers across the world. Vendor Landscape provide acts as key development and focus of above professional with common aim to lead the way of Encryption Software market Worldwide.

If you need to Customization this report according to your industry prospect, Please let us know! we will offer you the report as per request.

Read more from the original source:
Encryption Software Market: Global Opportunities, Regional Overview, Top Leaders, Size, Revenue and Forecast up to 2025 by WMR - Instant Tech News

Encryption Software Market 2020 Trends, Market Share, Industry Size, Opportunities, Analysis and Forecast by 2026 – Instant Tech News

Encryption Software Market Overview:

Global Encryption Software Market was valued at USD 3.32 billion in 2016 and is projected to reach USD 30.54 billion by 2025, growing at a CAGR of 27.96% from 2017 to 2025.

In the report, we thoroughly examine and analyze the Global market for Encryption Software so that market participants can improve their business strategy and ensure long-term success. The reports authors used easy-to-understand language and complex statistical images, but provided detailed information and data on the global Encryption Software market. This report provides players with useful information and suggests result-based ideas to give them a competitive advantage in the global Encryption Software market. Show how other players compete in the global Encryption Software market and explain the strategies you use to differentiate yourself from other participants.

The researchers provided quantitative and qualitative analyzes with evaluations of the absolute dollar opportunity in the report. The report also includes an analysis of Porters Five Forces and PESTLE for more detailed comparisons and other important studies. Each section of the report offers players something to improve their gross margins, sales and marketing strategies, and profit margins. As a tool for insightful market analysis, this report enables players to identify the changes they need to do business and improve their operations. You can also identify key electrical bags and compete with other players in the global Encryption Software market.

Request a Report Brochure @ https://www.verifiedmarketresearch.com/download-sample/?rid=1826&utm_source=ITN&utm_medium=001

Top 10 Companies in the Encryption Software Market Research Report:

Dell, Thales E-Security, Eset, Symantec, IBM Corporation, Sophos, Ciphercloud, Pkware, Mcafee, Gemalto, Trend Micro, Microsoft Corporation

Encryption Software Market Competition:

Each company evaluated in the report is examined for various factors such as the product and application portfolio, market share, growth potential, future plans and recent developments. Readers gain a comprehensive understanding and knowledge of the competitive environment. Most importantly, this report describes the strategies that key players in the global Encryption Software market use to maintain their advantage. It shows how market competition will change in the coming years and how players are preparing to anticipate the competition.

Encryption Software Market Segmentation:

The analysts who wrote the report ranked the global Encryption Software market by product, application, and region. All sectors were examined in detail, focusing on CAGR, market size, growth potential, market share and other important factors. The segment studies included in the report will help players focus on the lucrative areas of the global Encryption Software market. Regional analysis will help players strengthen their base in the major regional markets. This shows the opportunities for unexplored growth in local markets and how capital can be used in the forecast period.

Regions Covered by the global market for Smart Camera:

Middle East and Africa (GCC countries and Egypt)North America (USA, Mexico and Canada)South America (Brazil, etc.)Europe (Turkey, Germany, Russia, Great Britain, Italy, France etc.)Asia Pacific (Vietnam, China, Malaysia, Japan, Philippines, Korea, Thailand, India, Indonesia and Australia)

Ask for Discount @ https://www.verifiedmarketresearch.com/ask-for-discount/?rid=1826&utm_source=ITN&utm_medium=001

Table of Content

1 Introduction of Encryption Software Market

1.1 Overview of the Market1.2 Scope of Report1.3 Assumptions

2 Executive Summary

3 Research Methodology of Verified Market Research

3.1 Data Mining3.2 Validation3.3 Primary Interviews3.4 List of Data Sources

4 Encryption Software Market Outlook

4.1 Overview4.2 Market Dynamics4.2.1 Drivers4.2.2 Restraints4.2.3 Opportunities4.3 Porters Five Force Model4.4 Value Chain Analysis

5 Encryption Software Market, By Deployment Model

5.1 Overview

6 Encryption Software Market, By Solution

6.1 Overview

7 Encryption Software Market, By Vertical

7.1 Overview

8 Encryption Software Market, By Geography

8.1 Overview8.2 North America8.2.1 U.S.8.2.2 Canada8.2.3 Mexico8.3 Europe8.3.1 Germany8.3.2 U.K.8.3.3 France8.3.4 Rest of Europe8.4 Asia Pacific8.4.1 China8.4.2 Japan8.4.3 India8.4.4 Rest of Asia Pacific8.5 Rest of the World8.5.1 Latin America8.5.2 Middle East

9 Encryption Software Market Competitive Landscape

9.1 Overview9.2 Company Market Ranking9.3 Key Development Strategies

10 Company Profiles

10.1.1 Overview10.1.2 Financial Performance10.1.3 Product Outlook10.1.4 Key Developments

11 Appendix

11.1 Related Research

Get a Complete Market Report in your Inbox within 24 hours @ https://www.verifiedmarketresearch.com/product/global-encryption-software-market-size-and-forecast-to-2025/?utm_source=ITN&utm_medium=001

About Us:

Verified market research partners with clients to provide insight into strategic and growth analytics; data that help achieve business goals and targets. Our core values include trust, integrity, and authenticity for our clients.

Analysts with high expertise in data gathering and governance utilize industry techniques to collate and examine data at all stages. Our analysts are trained to combine modern data collection techniques, superior research methodology, subject expertise and years of collective experience to produce informative and accurate research reports.

Contact Us:

Mr. Edwyne FernandesCall: +1 (650) 781 4080Email: [emailprotected]

TAGS: Encryption Software Market Size, Encryption Software Market Growth, Encryption Software Market Forecast, Encryption Software Market Analysis, Encryption Software Market Trends, Encryption Software Market

See the original post here:
Encryption Software Market 2020 Trends, Market Share, Industry Size, Opportunities, Analysis and Forecast by 2026 - Instant Tech News