Garda needs new technology for online child abuse investigations – The Irish Times

The Garda must wait for new technology to be developed before it can break into encrypted digital devices suspected of containing evidence of child sex abuse and other crimes.

Some devices currently in the custody of Garda National Cyber Crime Bureau (GNCCB) are so heavily encrypted that the technology has not been invented to gain access to their content, according to the Department of Justice.

Others are so damaged that technological advances are required before the data on them can be retrieved and examined. The Garda Inspectorate previously reported that digital devices were becoming damaged while in Garda custody due to improper storage methods over long periods of time, rendering them unreadable.

Since 2013, the GNCCB and its predecessor bureau, the Cyber Crime Investigation Unit, have faced a massive backlog of cases due in part to a lack of qualified computer crime experts and the increasing prevalence of digital evidence in criminal investigations.

Last week The Irish Times reported that it takes an average of five years, between the start of an investigation and sentencing, for cases of online child abuse to be completed, with some cases taking nearly ten10 years.Delays are leading to lighter sentences for some abusers and, according to child-protection experts, children being exposed to additional risk.

However, according to new figures released by the department, the wait-time for forensic analysis of devices has improved dramatically.

The maximum age of cases currently caught in the backlog in Garda HQ is 2 years, it said. This is down from five years at the end of 2018 and six years at the end of 2017.

It may further be noted that Garda management has indicated that this general maximum age profile relates to a very small number of the cases on hand, a department spokesman said.

However, in a small number of cases the maximum age is older than 2 years. These include damaged or heavily encrypted devices where technological advances may be required to facilitate access to their content, the department said.

In some cases involving high levels of encryption, the Garda sends the devices to a foreign company which specialises in breaking encryptions for police forces.

It is understood the Department of Justice is satisfied with the reduction in the backlog. Two years ago, it set a target for garda to reduce waiting times by 25 per cent. Last year the target was 5 per cent. No target has been set for 2020.

There are currently 26 garda and six civilian staff employed in the GNCCB. The Garda intends to further reduce the backlog by employing more civilian digital forensic analysts in 2020.

It is also currently reviewing a plan to roll out regional cybercrime units with a view to increasing operational effectiveness and addressing the forensic case backlog, the department said.

The GNCCB deals with increasing numbers of cases which require forensic analysis of digital devices, the department said. The majority of these relate to online child abuse imagery but the bureau is also responsible for analysing devices related to other offences including organised crime and money-laundering.

There has been a massive increase in the number of new online child abuse cases coming through the system. In 2013 there were 116 new cases, a figure which tripled to 392 in 2018.

According to an Irish Times analysis, nearly 60 per cent of child pornography possession cases dealt with in the Circuit Criminal Court resulted in either a suspended sentence or probation last year.

Read the rest here:
Garda needs new technology for online child abuse investigations - The Irish Times

Cryptic Rumblings Ahead of First 2020 Patch Tuesday – Krebs on Security

Sources tell KrebsOnSecurity thatMicrosoft Corp. is slated to release a software update on Tuesday to fix an extraordinarily serious security vulnerability in a core cryptographic component present in all versions of Windows. Those sources say Microsoft has quietly shipped a patch for the bug to branches of the U.S. military and to other high-value customers/targets that manage key Internet infrastructure, and that those organizations have been asked to sign agreements preventing them from disclosing details of the flaw prior to Jan. 14, the first Patch Tuesday of 2020.

According to sources, the vulnerability in question resides in a Windows component known as crypt32.dll, a Windows module that Microsoft says handles certificate and cryptographic messaging functions in the CryptoAPI. The Microsoft CryptoAPIprovides services that enable developers to secure Windows-based applications using cryptography, and includes functionality for encrypting and decrypting data using digital certificates.

A critical vulnerability in this Windows component could have wide-ranging security implications for a number of important Windows functions, including authentication on Windows desktops and servers, the protection of sensitive data handled by Microsofts Internet Explorer/Edge browsers, as well as a number of third-party applications and tools.

Equally concerning, a flaw in crypt32.dll might also be abused to spoof the digital signature tied to a specific piece of software. Such a weakness could be exploited by attackers to make malware appear to be a benign program that was produced and signed by a legitimate software company.

This component was introduced into Windows more than 20 years ago back in Windows NT 4.0. Consequently, all versions of Windows are likely affected (including Windows XP, which is no longer being supported with patches from Microsoft).

Microsoft has not yet responded to requests for comment. However, KrebsOnSecurity has heard rumblings from several sources over the past 48 hours that this Patch Tuesday (tomorrow) will include a doozy of an update that will need to be addressed immediately by all organizations running Windows.

Update 7:49 p.m. ET: Microsoft responded, saying that it does not discuss the details of reported vulnerabilities before an update is available. The company also said it does not release production-ready updates ahead of regular Update Tuesday schedule. Through our Security Update Validation Program (SUVP), we release advance versions of our updates for the purpose of validation and interoperability testing in lab environments, Microsoft said in a written statement. Participants in this program are contractually disallowed from applying the fix to any system outside of this purpose and may not apply it to production infrastructure.

Original story:

Will Dormann, a security researcher who authors many of the vulnerability reports for the CERT Coordination Center (CERT-CC), tweeted today that people should perhaps pay very close attention to installing tomorrows Microsoft Patch Tuesday updates in a timely manner. Even more so than others. I dont knowjust call it a hunch? Dormann declined to elaborate on that teaser.

It could be that the timing and topic here (cryptography) is nothing more than a coincidence, but KrebsOnSecurity today received a heads up from the U.S. National Security Agency (NSA) stating that NSAs Director of Cybersecurity Anne Neuberger is slated to host a call on Jan. 14 with the news media that will provide advanced notification of a current NSA cybersecurity issue.

The NSAs public affairs folks did not respond to requests for more information on the nature or purpose of the discussion. The invitation from the agency said only that the call reflects NSAs efforts to enhance dialogue with industry partners regarding its work in the cybersecurity domain.

Stay tuned for tomorrows coverage of Patch Tuesday and possibly more information on this particular vulnerability.

Tags: Anne Neuberger, CERT Coordination Center, CERT-CC, crypt32.dll, microsoft, Microsoft CryptoAPI, national security agency, nsa, Patch Tuesday January 2020, Will Dormann, windows

This entry was posted on Monday, January 13th, 2020 at 5:17 pmand is filed under Time to Patch.You can follow any comments to this entry through the RSS 2.0 feed.You can skip to the end and leave a comment. Pinging is currently not allowed.

Link:
Cryptic Rumblings Ahead of First 2020 Patch Tuesday - Krebs on Security

ConsenSys Co-Founder says Ethereum 2.0 will be launched in 2020 – BitBoy Crypto

In a post on the ConsenSys site published on last week, one of the co-founders of ConsenSys, also a managing partner at DARMA Capital, Andrew Keys, shared his predictions about numerous issues that are important to the world today. Ethereum next generation is on its way.

According to Andrew Keys, with the current state of development, Ethereums Serenity will launch by the end of this year, 2020 will see Ethereum move stridently beyond Phase 0 of Ethereum 2.0, onto Phase 1 and the launch of shard chains, according to Keys.

The recent Istanbul hard fork which introduced several improvements and adjustments was the last stage in Ethereum 1.0.

There are some of the core Ethereum Improvement Proposals (EIPs) that went into the upgrade, were closely related to Zcash (ZEC). EIP-152 improved interoperability with the actual Zcash blockchain, and EIP-1108 made optimizations for cryptography routines leveraged by projects such as Aztec and Zether.

The same powering Zcash shielded transactions, SNARK zero-knowledge technology is used in Aztec Protocol to introduce confidential transactions within the Ethereum (ETH) blockchain.

On a basic level, SNARKs Zk Sync technology would allow offloading of the majority of transactional computations off-chain by using a zero-knowledge proof to guarantee their correct execution. Matter Labs is attempting to leverage SNARKs. Meanwhile, Plasma is focusing on creating sidechains for specific use cases.

CEO of ConsenSys Joseph Lubin explained in a 2019 interview with Cointelegraph:

Plasma is this class of technologies that enable you to have less decentralized platforms sitting at layer two in the Ethereum ecosystem. They can benefit from the full trust in some cases sometimes they benefit from partial trust but if they're linked in really rigorously, they can benefit from the full trust of the base trust layer, and you can get the best of both worlds.

However, these technologies have not yet appeared, and only Aztec is expected to launch its cryptography engine this month. In a blog post, Matter Labs revealed that it would launch a smart contract framework this month, but not the full scaling technology.

A non-profit research group, Plasma Group, stated that their theoretical work on the technology is complete, but the group failed to indicate specific implementations underway.

When asked by Cointelegraph whether 2020 will feature working sidechain solutions, Afri Schoeden, a former Parity Technologies developer replied:

No. We will see COSMOS maturing, Polkadot launching maybe, and Ethereum 2.0 finally taking shape. But we are still far away from viable solutions that would work in production.

While progress may not be as quick as some would hope, Ethereum is demonstrating that crypto technology can grow to tackle new challenges. 2020 promises to be an existing year for crypto, and Ethereum in particular.

Original post:
ConsenSys Co-Founder says Ethereum 2.0 will be launched in 2020 - BitBoy Crypto

Googles Quantum Supremacy will mark the End of the Bitcoin in 2020 – The Coin Republic

Ritika Sharma Monday, 13 January 2020, 03:49 EST Modified date: Monday, 13 January 2020, 05:00 EST

Quantum computing whenever hit the headlines left not just Bitcoin holders but also every Cryptocurrency holder worried about the uncertainty around their holdings.

It widely believed that the underlying technology of Bitcoin, Blockchain is immutable, meaning it cannot be changed or encrypted without authority over encryption keys.

However, with quantum computers, it is possible to break a blockchains cryptographic codes. Quantum computing can hit the most significant features of Blockchain like unchangeable data, unalterable, and security making it vulnerable.

Google has achieved quantum supremacy as of late 2019, which poses a threat to Bitcoin. It will be a threat to Blockchain, as quantum computing will affect one blockchains key features like inalterability and security, thus making Blockchain as highly vulnerable technology.

Later, china Joined Google in the quantum supremacy Race and announced working on quantum technology. With this, the year 2020 might witness the end of the Crypto Era.

How can Quantum computing break the Blockchain?

The reason behind this fear is quite genuine and straightforward: Bitcoin or any Cryptocurrency depends on cryptography, hash functions, and asymmetric cryptographic number mainly relies on the computing power of computers. The hash function calculates a random number for each block.

The results obtained by this process are effortless to verify, but challenging to find. However, quantum computing has powerful algorithmic capabilities, which is precisely the enemy of this key.

Quantum computing uses subatomic particles, which will be available in more than one state at one time. This feature makes Quantum computing faster than the technology we use today.

Quantum computers can work 100 million times faster than current systems; the computational power is capable of solving any complex mathematical equation in a matter of a few seconds, which current systems take 10,000 years to solve.

With such super computational powers, Quantum computers is capable of calculating the one-way functions that will make one-way encryption obsolete.

The risk over Blockchain is more if it gets in the wrong hands. Hackers with a quantum computer can hack the Cryptocurrency ledger and take complete control of Blockchain.

Will Googles Quantum computing wipe out your Bitcoins?

Googles quantum Supremacy only to traditional computers on classical problems; this isnt actual quantum technology. It was presented bluntly as, quantum supremacy, though it is just a step in the world of quantum computing space.

Even if Googles quantum computer demonstrates, its computing power on specific problems far exceeds the best performing supercomputing. The results of this research by Google do not have much meaning in terms of Bitcoin. This isnt even near to what we can call breaking Bitcoin or Blockchain.

However, Googles quantum supremacy does not pose any threat to Bitcoin; many people in the space still stressed about quantum threat theory. Many analysts claim that the quantum algorithm used by Shor can crack private keys, but again, there Is a long way to go before it could break bitcoins Blockchain.

According to researchers, a quantum computer with 4,000 qubits is undoubtedly able to break the Blockchain. Still, googles the quantum computer has only 53 qubits, which cannot cause any harm to Blockchain, and it is worth mentioning that The higher the qubit, the more difficult it becomes.

Satoshi Nakamotos Proposed solution to beat Quantum Supremacy

Satoshi was a true visionary, the things we are concerned about today, and had already been answered by him. In 2010, satoshi Nakamoto responded to the question about quantum computers by username llama on bitcoin talk.

He replied that If Bitcoin suddenly cracked, the signature will be destroyed; but if it is slowly changed, the system still has time to convert to a stronger function, and Re-sign all your assets. Another cruder answer to this question suggested by the author of Mastering Bitcoin, Andreas Antonopoulos, If the quantum computer comes, we will upgrade.

The Quantum supremacy threat isnt new to the crypto world, and many cryptocurrency projects such as Ethereum, quantum chains, etc., focused on making blockchain quantum resistance, experts in Cryptocurrency space also advocating the development of quantum encryption technology to ensure the security of funds.

Unless a threat of Actual Quantum computing of far more powerful processor explodes, Bitcoin and its developers still have time to secure it. With the continuous development in Quantum technology and the development of more qubit chips, still, there will be the sword of Damocles hanging on the head of the cryptocurrency.

Read the original here:
Googles Quantum Supremacy will mark the End of the Bitcoin in 2020 - The Coin Republic

Blockchain in Retail Market by Component, Application, and Organization Size : Global Opportunity Analysis and Industry Forecast, 2018-2026 – Yahoo…

Blockchain in Retail Market by Component (Platform and Services), Application (Compliance Management, Identity Management, Loyalty and Rewards Management, Payments & Smart Contracts, Supply Chain Management, and Others), and Organization Size (Large Enterprises and Small & Medium Enterprises): Global Opportunity Analysis and Industry Forecast, 2018-2026

New York, Jan. 13, 2020 (GLOBE NEWSWIRE) -- Reportlinker.com announces the release of the report "Blockchain in Retail Market by Component, Application, and Organization Size : Global Opportunity Analysis and Industry Forecast, 2018-2026" - https://www.reportlinker.com/p05837036/?utm_source=GNW

Blockchain is a solution for majority of the industrial digital concerns such as, supply chain management, transaction speed, compliance management, product security and counterfeiting, transparency, and others. Blockchain as a technology initially was developed to serve as the public transaction ledger for cryptocurrencies, which uses distributed databases and cryptography to record and secure transactions. This characteristic of blockchain provides a high level of security while transmitting and storing data, open and transparent network infrastructure, decentralized ledger, and low cost of operations benefits. Moreover, blockchain in retail is anticipated to change the paper-intensive international trade processes to digital processes.

Factors such as increase in demand for transparent transactions and smart contracts is the key factor driving the market growth for the blockchain in retail industry. In addition, increase in investment by retail industries in blockchain-based solutions is also expected to boost the market growth. Moreover, rise in need to ensure quality, reliability, authenticity, and product safety are also some of the factors fueling the demand for blockchain solutions and services across global retailers. However, scarcity of skilled experts is expected to impede the market growth during the forecast period. Furthermore, rapid changes in the retail industry due to technological advancements and international trade are expected to provide major growth opportunities for the blockchain retail market in upcoming years.

The global blockchain in retail market is segmented based on component, application, organization size, and region. Based on component, the market is bifurcated into platform and services. Based on application, the market is divided into compliance management, identity management, loyalty and rewards management, payments & smart contracts, supply chain management, others. Based on organization size, the market is classified into large enterprises and small & medium enterprises. Based on region, the market is analyzed across North America, Europe, Asia-Pacific, and LAMEA.

The report analyzes the profiles of key players operating in the market. These include Amazon Web Services, Inc. (AWS), Auxesis Services & Technologies (P) Ltd., Bitfury Group Limited, Cognizant, Infosys Limited, International Business Machines Corporation (IBM), Microsoft Corporation, Oracle Corporation, SAP SE, and Tata Consultancy Services Limited.

KEY BENEFITS The report provides an in-depth analysis of the global blockchain in retail market, outlining current trends, key driving factors, and potential areas for product investments. Key players are analyzed with respect to their primary offerings, recent investments, and future development strategies. Porters five forces analysis illustrates the potency of buyers and suppliers operating in the industry. The quantitative analysis of the global blockchain in retail market from 2018 to 2026 is provided to determine the market potential.

KEY MARKET SEGMENTS

BY COMPONENT Platform Services

BY APPLICATION Compliance management Identity Management Loyalty and Rewards Management Payments & Smart Contracts Supply Chain Management Others

BY ORGANIZATION SIZE Large Enterprises Small & Medium Enterprises

BY REGION North America o U.S. o Canada

Europe o UK o Germany o France o Spain o Rest of Europe

Asia-Pacific o China o India o Japan o Australia o Rest of Asia-Pacific

LAMEA o Latin America o Middle East o Africa

KEY MARKET PLAYERS PROFILED IN THE REPORT Amazon Web Services, Inc. (AWS) Auxesis Services & Technologies (P) Ltd. Bitfury Group Limited Cognizant Infosys Limited International Business Machines Corporation (IBM) Microsoft Corporation Oracle Corporation SAP SE Tata Consultancy Services Limited.

Read the full report: https://www.reportlinker.com/p05837036/?utm_source=GNW

About ReportlinkerReportLinker is an award-winning market research solution. Reportlinker finds and organizes the latest industry data so you get all the market research you need - instantly, in one place.

__________________________

Story continues

Clare: clare@reportlinker.comUS: (339)-368-6001Intl: +1 339-368-6001

View post:
Blockchain in Retail Market by Component, Application, and Organization Size : Global Opportunity Analysis and Industry Forecast, 2018-2026 - Yahoo...

Encryption Software Market Global Analysis, Share Report, Industry Trends, Demand, Application and Regional Forecast to 2027 – Expert Recorder

Encryption Software Market Overview:

Worldwide Encryption software Market to 2027 research report conveys industry business patterns and the undertaking information, tolerating one to grasp clients and the stock driving gainfulness and yield development. The report highlights information on improvements and Global Encryption software Market trends, drivers, revenue and furthermore available. The market report pulls in the most peculiar bits of knowledge of this business additionally makes Stevia forecast that is important out there. It accompanies estimations concerning the Encryption software advancement, subordinate and draws in the distinguishing proof of their industry status.

Encryption software is program that makes use of cryptography in order to prevent unlawful admission to digital information. Today cryptography is used to protect the digital information on electronic devices as well as the digital information that is sent to other computers over the Internet.

The report aims to provide an overview of Global Encryption Software Market along with detailed segmentation of market by services, deployment type, application, end users and five major geographical regions. Global encryption software market is expected to witness growth during the forecast period due to rising adoption of encryption software in order to boost data proficiency and security.

Get Sample Copy @ https://www.theinsightpartners.com/sample/TIPTE100000523/

Encryption Software Market Analysis:

The report on the area of Encryption software by Insight Partners includes extensive primary research and detailed analysis of the qualitative and quantitative aspects of various industry experts, key opinion leaders, to better understand the performance of the market Encryption software.

The reports cover key market developments in the Encryption software as organic and inorganic growth strategies. Various companies focus on organic growth strategies such as product launches, product approvals and others such as patents and events. The inorganic growth strategy activities observed in the market were acquisitions, partnerships and collaborations. These activities paved the way for an expansion of the businesses and customers of the market players. The market payers of the Encryption software are destined for lucrative growth opportunities in the future with the increasing demand for market Encryption software in the world market.

Market Analysis of Global Encryption software Until 2027 is an in-depth and in-depth study of the technology, media and telecommunications sector, with particular attention to market trend analysis world. The report aims to provide an overview of the Encryption software market with detailed segmentation of the market by component, type of deployment, industry and region. The global Encryption software market is expected to experience strong growth over the forecast period. The report provides key statistics on the state of the main market Encryption software market players and presents key market trends and opportunities.

Research report @ https://www.theinsightpartners.com/reports/encryption-software-market

About Us:

The Insight Partners is a one stop industry research provider of actionable intelligence. We help our clients in getting solutions to their research requirements through our syndicated and consulting research services. We are a specialist in Technology, Healthcare, Manufacturing, Automotive and Defense.

Contact Us:

Call: +1-646-491-9876

Email: [emailprotected]

Continued here:
Encryption Software Market Global Analysis, Share Report, Industry Trends, Demand, Application and Regional Forecast to 2027 - Expert Recorder

Bleeding edge information technology developments – IT World Canada

What are some bleeding-edge information technology developments that a forward-thinking CIO should keep an eye on?

Here are a few emerging technologies that have caught my attention. These are likely to have an increasing impact on the world of business in the future. Consider which ones you should follow a little more closely.

A recent advance in quantum computing that a Google team achieved indicates that quantum computing technology is making progress out of the lab and closing in on practical business applications. Quantum computing is not likely to change routine business transaction processing or data analytics applications. However, quantum computing is likely to dramatically change computationally intense applications required for:

Since most businesses can benefit from at least a few of these applications, quantum computing is worth evaluating. For a more detailed discussion of specific applications in various topic areas, please read: Applying Paradigm-Shifting Quantum Computers to Real-World Issues.

Machine learning is the science of computers acting without software developers writing detailed code to handle every case in the data that the software will encounter. Machine learning software develops its own algorithms that discover knowledge from specific data and the softwares prior experience. Machine learning is based on statistical concepts and computational principles.

The leading cloud computing infrastructure providers machine learning routines that are quite easy to integrate into machine learning applications. These routines greatly reduce expertise barriers that have slowed machine learning adoption at many businesses.

Selected business applications of machine learning include:

For summary descriptions of specific applications, please read: 10 Companies Using Machine Learning in Cool Ways.

Distributed ledger technology is often called blockchain. It enables new business and trust models. A distributed ledger enables all parties in a business community to see agreed information about all transactions, not just their own. That visibility builds trust within the community.

Bitcoin, a cryptocurrency, is the mostly widely known example application of blockchain.

Distributed ledger technology has great potential to revolutionize the way governments, institutions, and corporations interact with each other and with their clients or customers.Selected business applications of distributed ledger technology include:

For descriptions of industry-specific distributed ledger applications, please read: 17 Blockchain Applications That Are Transforming Society.

The Industrial Internet of Things (IIoT) is a major advance on Supervisor Control and Data Acquisition (SCADA). SCADA, in many forms, has been used for decades to safely operate major industrial facilities including oil refineries, petrochemical plants, electrical power generation stations, and assembly lines of all kinds.

IIOT is a major advance over relatively expensive SCADA. IIoT relies on dramatically cheaper components including sensors, network bandwidth, storage and computing resources. As a result, IIoT is feasible in many smaller facilities and offers a huge increase in data points for larger facilities. Business examples where IIoT delivers considerable value include production plants, trucks, cars, jet engines, elevators, and weather buoys.

The aggressive implementation of IIoT can:

For summary descriptions of specific IIOT applications, please read: The Top 20 Industrial IoT Applications.

RISC-V is an open-source hardware instruction set architecture (ISA) for CPU microprocessors that is growing in importance. Its based on established reduced instruction set computer (RISC) principles. The open-source aspect of the RISC-V ISA is a significant change compared to the proprietary ISA designs of the dominant computer chip manufacturers Intel and Arm.

RISC-V offers a way around paying ISA royalties for CPU microprocessors to either of the monopolists. The royalties may not be significant for chips used in expensive servers or smartphones, but they are significant for the cheap chips required in large numbers to implement the IIOT applications listed above.

For an expanded discussion of RISC-V, please read: A new blueprint for microprocessors challenges the industrys giants.

What bleeding edge information technology developments would you add to this list? Let us know in the comments below.

Here is the original post:
Bleeding edge information technology developments - IT World Canada

Start-ups join Google, SpaceX and OneWeb to bring new technologies to space – CNBC

Space X CEO Elon Musk

Photo by Kevork Djansezian

For a long time, American space exploration was a closed circle: There was just one customer, the U.S. government (NASA) and a handful of giant defense contractors. Then in 2008 Elon Musk's SpaceX put the first privately-financed rocket into orbit, Jeff Bezos' Blue Origin promised private flights, and space was suddenly a lively market with companies vying to put satellites and humans into orbit.

A decade later hundreds of start-ups have flocked to the space sector, bringing sophisticated technologies that include artificial intelligence, quantum computing, phased array radar, space-based solar power, "tiny" satellites and services that could not be imagined just a few years ago.

Space Angels, an early stage investor that also tracks investments in the sector, reported that venture capitalists invested $5 billion into space technologies in the first three quarters of 2019, putting the year on track to be the biggest year yet, with Blue Origin pulling in $1.4 billion from Bezos. Since 2009, said Chad Anderson, CEO of Space Angels, investors have poured nearly $24 billion into 509 companies.

Anderson said that SpaceX triggered the transformation not just by offering competition to NASA but publishing its prices for a launch. Before that revelation, space was really an opaque market, making it difficult for potential competitors to price their products. "It's been a really big decade for commercial space," said Anderson.

The largest amount of venture capital still goes into the most fundamental task: putting satellites into orbit. Anderson says 89 companies have received funding for so-called small-lift launch vehicles. These are companies promising to put payloads of up to 2,000 kilos (4,400 lbs) into low Earth orbit. Their focus is a new generation of small satellites such as those used by OneWeb and SpaceX's StarLink, which promise broadband internet access in even the most remote parts of the world by deploying "constellations" of hundreds or even thousands of tiny satellites.

Satellites have become so mainstream you can now buy a standard 4-in. by 4-in. "cubesat" kit online. All this activity could mean 20,000 to 40,000 satellites joining the 1,000 now in orbit over the next few years. "It's quickly becoming congested," Anderson said of the market for small-lift launch. Of the venture-backed rocket companies, SpaceX and Rocket Lab, with launch sites in New Zealand and Virginia, are making regular launches, although Richard Branson's Virgin Galactic is scheduled to begin flying its manned shuttle this year.

The sky is also getting crowded. Aside from the thousands of new satellites scheduled for launch, there is already a lot of clutter in space as many as 250,000 pieces of junk and debris circle the Earth. Up to now the U.S. Air Force has taken the lead role in tracking debris and warning satellite operators about possible collisions. But the military's tracking radar, with some components dating back to the cold war, can only detect pieces 10 cm (4 in.) across or larger. LeoLabs, a start-up based in Menlo Park, California, has developed an advanced radar system that can detect objects in orbit as small as 2 cm (less than an inch) long.

LeoLabs' Kiwi Space Radar was set up in Central Otago, New Zealand, in 2019. It is the first in the world to track space debris smaller than 10 cm.

LeoLabs

A tiny object traveling at several thousand miles an hour can cause severe damage to a satellite. LeoLabs enables customers to track their small satellites more easily and to safely move them to a new position. "That will take a lot of the collision risks off the table," says founder and CEO Dan Ceperley. His company has built phased array radars that steer the radar beam electronically faster than a traditional dish antenna in three locations: Alaska, Texas and New Zealand. To date, LeoLabs has raised $17 million from venture funds, including Marc Bell Capital Partners, Seraphim Capital and Space Angels.

Many of the 1,000 satellites now in orbit are engaged in observing Earth. They monitor the weather, humidity and temperature, among dozens of other phenomena, and capture millions of images. SkyWatch, based in Waterloo, Ontario, recently closed a $10 million round of funding led by San Francisco's Bullpen Capital to develop its service to make satellite data easily available to companies.

SkyWatch would handle licensing and payment for data through subscription fees, and companies could use its software to build their own apps for tasks such as tracking crops or assessing damage from natural disasters. SkyWatch CEO James Slifierz compares his timing to the aftermath of the creation of the global positioning system infrastructure. Once GPS was in place, civilian applications followed.

The growing flow of data from satellites has raised concerns about data security. SpeQtral, based in Singapore, plans to build encryption keys based on the laws of quantum physics to protect space-to-Earth communications. "The security of any communications is essential," says Chune Yang Lum, CEO of SpeQtral, which has raised a $1.9 million seed round led by Space Capital, the venture arm of Space Angels. Quantum encryption has been touted as practically unbreakable.

An illustration of the SPS-ALPHA (Solar Power Satellite by means of Arbitrarily Large Phased Array) transmitting energy to Australia. This approach, in concept phase, includes a series of enormous platforms positioned in space in high Earth orbit to continuously collect and convert solar energy into electricity.

SPS-ALPHA concept and illustration, courtesy John C. Mankins

Start-ups don't have a monopoly on developing new space applications. Tech giant Google has sought ways to commercialize its growing expertise in artificial intelligence and its vast computing power in the cloud. "We work with some of our largest and most transformative customers to do something epic," said Scott Penberthy, director of applied AI at Google Cloud.

He said Google Cloud has done a number of projects with NASA's Frontier Development Lab, including one that takes low-resolution photographs and combines them using AI to create a high-resolution image. Another proposal from Google would enable navigation on the moon's surface (which has no GPS) by having AI comparing an astronaut's surroundings with photos of the moon taken from space.

NASA is itself trying to benefit from the innovations brought by start-ups. In December, NASA's Ames Research Center announced a deal with the Founders Institute, a renowned start-up accelerator, to make some of its technology available to start-up entrepreneurs. In September 2019 the space agency announced the latest round of its Tipping Point Program, a public-private initiative, was distributing $43.2 million to 14 American companies whose technologies could contribute to NASA's plan for its Moon-to-Mars project. Participants include SpaceX, which will work on nozzles to refuel spaceships, and Blue Canyon Technologies, a Denver start-up developing autonomous navigation systems to enable small satellites to maneuver without communicating with "Earth."

In the past five years, NASA has awarded five groups of Tipping Point Awards, worth more than $120 million combined. Broadly speaking, a company or project selected for a tipping point award receives NASA resources up to a fixed amount, with the private side paying for at least 25% of the program's total costs. This allows NASA to shepherd the development of important space technologies while trying to save the agency money.

Despite the surge of cash, not all space projects find funding easily. John Mankins, a former NASA physicist, has long been an advocate of space-based solar power. Satellites would capture solar energy, convert it to microwaves and beam it down to Earth, where it would be converted into electricity. Mankins believes such a system taking advantage of recent technological advances can deliver electricity at a competitive price to areas of the world where power is expensive.

Mankins' company, Solar Space Technologies, has formed a joint venture with an Australian company to seek funding to supply power to remote parts of Australia with minimum impact on the environment. While the cost for space-based solar power may have been prohibitive in the past, Dr. Michael Shara, an astrophysicist at New York's Museum of Natural History, said "it really gets interesting" as costs come down.

Anderson, the Space Angels CEO, said venture capitalists hesitate to invest in space solar power because these are large infrastructure projects. "They require a significant amount of capex, and their paybacks are much longer than the typical 10-year lifetime of a venture capital fund." But as concern about climate change increases and the cost of putting "stuff" in orbit drops, clean energy from space may become an attractive entrepreneurial proposition.

More from Tech Drivers:Meet the robots that may be coming to the airport near youHow to use Apple Pay on all your devicesUber aviation head Eric Allison on new partnership with Hyundai

Read this article:
Start-ups join Google, SpaceX and OneWeb to bring new technologies to space - CNBC

Google and IBM square off in Schrodingers catfight over quantum supremacy – The Register

Column Just before Christmas, Google claimed quantum supremacy. The company had configured a quantum computer to produce results that would take conventional computers some 10,000 years to replicate - a landmark event.

Bollocks, said IBM - which also has big investments both in quantum computing and not letting Google get away with stuff. Using Summit, the world's largest conventional supercomputer at the Oak Ridge National Laboratories in Tennessee, IBM claimed it could do the same calculation in a smidge over two days.

As befits all things quantum, the truth is a bit of both. IBM's claim is fair enough - but it's right at the edge of Summit's capability and frankly a massive waste of its time. Google could, if it wished, tweak the quantum calculation to move it out of that range. And it might: the calculation was chosen precisely not because it was easy, but because it was hard. Harder is better.

Google's quantum CPU has 54 qubits, quantum bits that can stay in a state of being simultaneously one and zero. The active device itself is remarkably tiny, a silicon chip around a centimetre square, or four times the size of the Z80 die in your childhood ZX Spectrum. On top of the silicon, a nest of aluminium tickled by microwaves hosts the actual qubits. The aluminium becomes superconducting below around 100K, but the very coldest part of the circuit is just 15 millikelvins. At this temperature the qubits have low enough noise to survive long enough to be useful

By configuring the qubits in a circuit, setting up data and analysing the patterns that emerge when the superpositions are observed and thus collapse to either one or zero, Google can determine the probable correct outcome for the problem the circuit represents. 54 qubits, if represented in conventional computer terms, would need 254 bits of RAM to represent each step of the calculation, or two petabytes' worth. Manipulating this much data many times over gives the 10 millennia figure Google claims.

IBM, on the other hand, says that it has just enough disk space on Summit to store the complete calculation. However you do it, though, it's not very useful; the only application is in random number generation. That's a fun, important and curiously nuanced field, but you don't really need a refrigerator stuffed full of qubits to get there. You certainly don't need the 27,648 NVidia Tesla GPUs in Summit chewing through 16 megawatts of power.

What Google is actually doing is known in the trade as "pulling a Steve", from the marketing antics of the late Steve Jobs. In particular, his tour at NeXT Inc, the company he started in the late 1980s to annoy Apple and produce idiosyncratic workstations. Hugely expensive to make and even more so to buy, the NeXT systems were never in danger of achieving dominance - but you wouldn't know that from Jobs' pronouncements. He declared market supremacy at every opportunity, although in carefully crafted phrases that critics joked defined the market as "black cubic workstations running NeXTOS."

Much the same is true of Google's claim. The calculation is carefully crafted to do precisely the things that Google's quantum computer can do - the important thing isn't the result, but the journey. Perhaps the best analogy is with the Wright Brothers' first flight: of no practical use, but tremendous significance.

What happened to NeXT? It got out of hardware and concentrated on software, then Jobs sold it - and himself - to Apple, and folded in some of that software into MacOS development. Oh, and some cat called Berners-Lee built something called the World Wide Web on a Next Cube.

Nothing like this will happen with Google's technology. There's no new web waiting to be borne on the wings of supercooled qubits. Even some of the more plausible things, like quantum decryption of internet traffic, is a very long way from reality - and, once it happens, it's going to be relatively trivial to tweak conventional encryption to defeat it. But the raw demonstration, that a frozen lunchbox consuming virtually no power in its core can outperform a computer chewing through enough wattage to keep a small town going, is a powerful inducement for more work.

That's Google's big achievement. So many new and promising technologies have failed not because they could never live up to expectations but because they cant survive infancy. Existing, established technology has all the advantages: it generates money, it has distribution channels, it has an army of experts behind it, and it can adjust to close down challengers before they get going. To take just one company - Intel has tried for decades to break out of the x86 CPU prison. New wireless standards, new memory technologies, new chip architectures, new display systems, new storage and security ideas - year after year, the company casts about for something new that'll make money. It never gets there.

Google's "quantum supremacy" isn't there either, but it has done enough to protect its infant prince in its superconducting crib. That's worth a bit of hype.

Sponsored: Detecting cyber attacks as a small to medium business

Read the original:
Google and IBM square off in Schrodingers catfight over quantum supremacy - The Register

Were approaching the limits of computer power we need new programmers now – The Guardian

Way back in the 1960s, Gordon Moore, the co-founder of Intel, observed that the number of transistors that could be fitted on a silicon chip was doubling every two years. Since the transistor count is related to processing power, that meant that computing power was effectively doubling every two years. Thus was born Moores law, which for most people working in the computer industry or at any rate those younger than 40 has provided the kind of bedrock certainty that Newtons laws of motion did for mechanical engineers.

There is, however, one difference. Moores law is just a statement of an empirical correlation observed over a particular period in history and we are reaching the limits of its application. In 2010, Moore himself predicted that the laws of physics would call a halt to the exponential increases. In terms of size of transistor, he said, you can see that were approaching the size of atoms, which is a fundamental barrier, but itll be two or three generations before we get that far but thats as far out as weve ever been able to see. We have another 10 to 20 years before we reach a fundamental limit.

Weve now reached 2020 and so the certainty that we will always have sufficiently powerful computing hardware for our expanding needs is beginning to look complacent. Since this has been obvious for decades to those in the business, theres been lots of research into ingenious ways of packing more computing power into machines, for example using multi-core architectures in which a CPU has two or more separate processing units called cores in the hope of postponing the awful day when the silicon chip finally runs out of road. (The new Apple Mac Pro, for example, is powered by a 28-core Intel Xeon processor.) And of course there is also a good deal of frenzied research into quantum computing, which could, in principle, be an epochal development.

But computing involves a combination of hardware and software and one of the predictable consequences of Moores law is that it made programmers lazier. Writing software is a craft and some people are better at it than others. They write code that is more elegant and, more importantly, leaner, so that it executes faster. In the early days, when the hardware was relatively primitive, craftsmanship really mattered. When Bill Gates was a lad, for example, he wrote a Basic interpreter for one of the earliest microcomputers, the TRS-80. Because the machine had only a tiny read-only memory, Gates had to fit it into just 16 kilobytes. He wrote it in assembly language to increase efficiency and save space; theres a legend that for years afterwards he could recite the entire program by heart.

There are thousands of stories like this from the early days of computing. But as Moores law took hold, the need to write lean, parsimonious code gradually disappeared and incentives changed. Programming became industrialised as software engineering. The construction of sprawling software ecosystems such as operating systems and commercial applications required large teams of developers; these then spawned associated bureaucracies of project managers and executives. Large software projects morphed into the kind of death march memorably chronicled in Fred Brookss celebrated book, The Mythical Man-Month, which was published in 1975 and has never been out of print, for the very good reason that its still relevant. And in the process, software became bloated and often inefficient.

But this didnt matter because the hardware was always delivering the computing power that concealed the bloatware problem. Conscientious programmers were often infuriated by this. The only consequence of the powerful hardware I see, wrote one, is that programmers write more and more bloated software on it. They become lazier, because the hardware is fast they do not try to learn algorithms nor to optimise their code this is crazy!

It is. In a lecture in 1997, Nathan Myhrvold, who was once Bill Gatess chief technology officer, set out his Four Laws of Software. 1: software is like a gas it expands to fill its container. 2: software grows until it is limited by Moores law. 3: software growth makes Moores law possible people buy new hardware because the software requires it. And, finally, 4: software is only limited by human ambition and expectation.

As Moores law reaches the end of its dominion, Myhrvolds laws suggest that we basically have only two options. Either we moderate our ambitions or we go back to writing leaner, more efficient code. In other words, back to the future.

What just happened?Writer and researcher Dan Wang has a remarkable review of the year in technology on his blog, including an informed, detached perspective on the prospects for Chinese domination of new tech.

Algorithm says noTheres a provocative essay by Cory Doctorow on the LA Review of Books blog on the innate conservatism of machine-learning.

Fall of the big beastsHow to lose a monopoly: Microsoft, IBM and antitrust is a terrific long-view essay about company survival and change by Benedict Evans on his blog.

Read the original post:
Were approaching the limits of computer power we need new programmers now - The Guardian