New Informative Report of IoT Security Solution for Encryption Top Key Players are Cisco Systems, Intel Corporation, IBM Corporation, Symantec…

Global IoT Security Solution for Encryption Market Size, Status and Forecast 2020-2027

The research study presented in this report offers complete and intelligent analysis of the competition, segmentation, dynamics, and geographical advancement of the Global IoT Security Solution for Encryption Market. The research study has been prepared with the use of in-depth qualitative and quantitative analyses of the global IoT Security Solution for Encryption market. We have also provided absolute dollar opportunity and other types of market analysis on the global IoT Security Solution for Encryption market.

It takes into account the CAGR, value, volume, revenue, production, consumption, sales, manufacturing cost, prices, and other key factors related to the global IoT Security Solution for Encryption market. All findings and data on the global IoT Security Solution for Encryption market provided in the report are calculated, gathered, and verified using advanced and reliable primary and secondary research sources. The regional analysis offered in the report will help you to identify key opportunities of the global IoT Security Solution for Encryption market available in different regions and countries.

Get sample copy of this [emailprotected] https://bit.ly/2NejHnp

Top Key players: Cisco Systems, Intel Corporation, IBM Corporation, Symantec Corporation, Trend Micro, Digicert, Infineon Technologies, ARM Holdings, Gemalto NV, Kaspersky Lab, CheckPoint Software Technologies, Sophos Plc, Advantech, Verizon Enterprise Solutions, Trustwave, INSIDE Secure SA, PTC Inc., and AT&T Inc.

The report scrutinizes different business approaches and frameworks that pave the way for success in businesses. The report used Porters five techniques for analyzing the IoT Security Solution for Encryption Market; it also offers the examination of the global market. To make the report more potent and easy to understand, it consists of info graphics and diagrams. Furthermore, it has different policies and development plans which are presented in summary. It analyzes the technical barriers, other issues, and cost-effectiveness affecting the market.

Global IoT Security Solution for Encryption Market Research Report 2020 carries in-depth case studies on the various countries which are involved in the IoT Security Solution for Encryption market. The report is segmented according to usage wherever applicable and the report offers all this information for all major countries and associations. It offers an analysis of the technical barriers, other issues, and cost-effectiveness affecting the market. Important contents analyzed and discussed in the report include market size, operation situation, and current & future development trends of the market, market segments, business development, and consumption tendencies. Moreover, the report includes the list of major companies/competitors and their competition data that helps the user to determine their current position in the market and take corrective measures to maintain or increase their share holds.

What questions does the IoT Security Solution for Encryption market report answer pertaining to the regional reach of the industry

A short overview of the IoT Security Solution for Encryption market scope:

Reasons for Buying this Report

TABLE OF CONTENT:

1 Report Overview

2 Global Growth Trends

3 Market Share by Key Players

4 Breakdown Data by Type and Application

5 United Stat

6 Europe

7 China

8 Japan

9 Southeast Asia

10 India

11 Central & South America

12 International Players Profiles

13 Market Forecast 2020-2027

14 Analysts Viewpoints/Conclusions

15 Appendix

Get Complete Brochure @ https://bit.ly/2NejHnp

About Us:

Reports And Markets is part of the Algoro Research Consultants Pvt. Ltd. and offers premium progressive statistical surveying, market research reports, analysis & forecast data for industries and governments around the globe. Are you mastering your market? Do you know what the market potential is for your product, who the market players are and what the growth forecast is? We offer standard global, regional or country specific market research studies for almost every market you can imagine.

Contact Us:

Sanjay Jain

Manager Partner Relations & International Marketing

http://www.reportsandmarkets.com

[emailprotected]

Ph: +1-352-353-0818 (US)

Read the rest here:
New Informative Report of IoT Security Solution for Encryption Top Key Players are Cisco Systems, Intel Corporation, IBM Corporation, Symantec...

Keep Your Business Secure From Online Threats – BBN Times

Every business faces a threat from malicious software and cybercriminals. Although you can use the internet to scale the operations of your business, it also poses security threats and scams to your organisation. When your company gets attacked, you risk losing vital data. Besides, your reputation can get significantly affected.

Your business is not immune to cyber-attacks. In order to secure it from online threats, practice the following tips:

Ensure that all the vital data on your website and the business is backed up. Doing so will help you retrieve all the information when your data gets breached. The backing up of the critical business data should get carried out regularly. Furthermore, the cost of backing up data is not expensive.

When backing up, use multiple backup devices to help keep the critical files safe. Similarly, when picking on a good backup system, ensure that it either has a yearly, quarterly, end-of-the-week, or daily incremental server backups. After backing up, test to ascertain whether you can restore the backed up data.

Furthermore, back up your data to a portable device or the cloud. Ensure that you store the devices separately and away from the site. Doing so will safeguard them from getting infected by any malware sent by cybercriminals. You can later use the devices to restore all the data when you lose all your data from a data breach.

Make sure that all your running software is set to automatic updates to keep them regularly updated.The regular updatesmight have vital security upgrades for the recent attacks and viruses. Furthermore, schedule these updates to occur after regular business hours or any other time that you deem convenient. Updating your software will help you fix all the dangerous security flaws and zero day in your software. Therefore, avoid ignoring update prompts from the installed device software.

Ensure that all your business computers and devices getinstalled with security software. Doing so will safeguard them from possible infections while using the internet. When installing security software, cross-check to see if it has an anti-spam filter, anti-spyware, and anti-virus.

Viruses or malware can infect your mobile device, laptops, and computers and steal your data. With this, you risk losing all your vital data to the hands of unwarranted individuals.

A firewall is a hardware or software which sits between the internet and your computer. Additionally, it acts asa gatekeeper for the outgoing and incoming traffic. When you set up a firewall, you will protect the internal networks of your business. However, the firewall should also get patched regularly to perform optimally. Ensure that all the electronic devices in the industry have an installation of a firewall.

Ensure that the spam filters are turned on. The spam filters will help you reduce the number of phishing emails and spam that you receive. The spam emails are the emails received from a company or a person that you do not know. From the filter, you can customize the responses or the action to be taken when you receive the spam. Doing so will minimize the chances of your employees opening a dishonest or a spam mail accidentally.

Make sure that the network encryption is on while using your devices on the internet. Similarly, when you store or send your data online, encrypt it. Through encryption, you can convert your data to a secret character or code before it gets sent over the internet. Additionally, encryption will help you reduce tampering, destruction, or theft of your data by unwarranted personnel.

With authentication, you will employ two distinct factors of user verification. They include a code and a password that will get sent to your mobile device. Similarly, you may be required to use a combination of a password and a fingerprint. When you employ this security feature, it will be harder for the attackers to have access to your business data.

Carry out the above tips, and you will protect your business from the online data threats.

Continue reading here:
Keep Your Business Secure From Online Threats - BBN Times

Email Encryption Market Size 2019 and Market Analysis By Top Companies – Food & Beverage Herald

New Jersey, United States, Verified Market Research has recently published a research report titled, Global Email Encryption Market . Primary and secondary research methodologies have been used to formulate this report. The analysis has been derived using historic and forecast. The global Email Encryption Market is expected to thrive in terms of volume and value during the forecast years. This report offers an understanding of various drivers, threats, opportunities, and restraints in the market. Analysts have used SWOT and Porters five forces analysis to determine the effect these factors will have on the market growth during the forecast period. The report includes in-depth examination of geographical regions, revenue forecasts, segmentation, and market share.

Global Email Encryption Market Status and Outlook 2019-2025 :

The research report titled Global Email Encryption Market offers useful insights into the trends and the factors that propel this Global market. This market study comprehensively discusses the salient features of the Global Email Encryption Market in terms of the market structure and landscape, the challenges, demand factors, and the expected market performance.

Global Email Encryption Market was valued at USD 2.05 billion in 2016 and is projected to reach USD 14.19 billion by 2025, growing at a CAGR of 24.01% from 2017 to 2025.

Symantec Corporation, Entrust, Trend Micro, ZIX Corporation, Mcafee (Intel), Proofpoint, Cisco Systems, Sophos Ltd, Hewlett Packard, Microsoft Corporation

As part of primary research, our analysts interviewed a number of primary sources from the demand and supply sides of the global Email Encryption Market . This helped them to obtain both quantitative and qualitative data and information. On the demand side of the global Email Encryption Market are end users, whereas on the supply side are distributors, vendors, and manufacturers.

During secondary research, we Gathered information from different sources such as databases, regulatory bodies, gold and silver-standard websites, articles by recognized authors, certified publications, white papers, investor presentations and press releases of companies, and annual reports.

The research report includes segmentation of the global Email Encryption Market on the basis of application, technology, end users, and region. Each segment gives a microscopic view of the market. It delves deeper into the changing political scenario and the environmental concerns that are likely to shape the future of the market. Furthermore, the segment includes graphs to give the readers a birds eye view.

Last but not the least, the research report on global Email Encryption Market profiles some of the leading companies. It mentions their strategic initiatives and provides a brief about their structure. Analysts have also mentioned the research and development statuses of these companies and their provided complete information about their existing products and the ones in the pipeline.

Based on regions, the market is classified into North America, Europe, Asia Pacific, Middle East & Africa and Latin America. The study will provide detailed qualitative and quantitative information on the above mentioned segments for every region and country covered under the scope of the study.

North America o U.S. o Canada o Mexico Europe o Germany o UK o France o Rest of Europe Asia Pacific o China o Japan o India o Rest of Asia Pacific Rest of the World

Verified market research partners with clients to provide insight into strategic and growth analytics; data that help achieve business goals and targets. Our core values include trust, integrity, and authenticity for our clients. Our research studies help our clients to make superior data-driven decisions, capitalize on future opportunities, optimize efficiency and keeping them competitive by working as their partner to deliver the right information without compromise.

This post was originally published on Food and Beverage Herald

Go here to see the original:
Email Encryption Market Size 2019 and Market Analysis By Top Companies - Food & Beverage Herald

State Department Adds ITAR Definitions in Interim Final Rule for Activities that Are Not Exports, Reexports, Retransfers or Temporary Imports -…

On December 30, 2019, the U.S. Department of States Directorate of Defense Trade Controls (DDTC) issued an interim final rule seeking to amend the International Traffic in Arms Regulations (ITAR) with definitions more clearly explaining activities that are not considered to be exports, reexports, retransfers or temporary imports of secured and unclassified technical data. This interim final rule is part of DDTCs ongoing effort to update the ITAR and will become effective on March 25, 2020. Before that date, DDTC is accepting public comments on the rule until January 27, 2020.

While the interim final rule addresses a number of definitions, a new definition has been proposed under a new section of the ITAR, 22 C.F.R. 120.54, covering activities that are not exports and thus not controlled and subject to the ITAR, including:

The proposal regarding the sending, storing or taking of unclassified technical data is intended to help address questions and concerns as to email transmissions as well as cloud computing and storage. DDTC makes clear that electronic transmissions and storage of secured unclassified technical data is not an export as long as the technical data is encrypted prior to leaving the senders facilities and remains encrypted until decrypted by the intended authorized recipient or retrieved by the sender, as in the case of remote storage. This provision contains important requirements that must be met in order to remain compliant with U.S. export control laws and to prevent an unauthorized or inadvertent export violation.

The transmission must employ end-to-end encryption, which is defined as: (i) the provision of cryptographic protection of data, such that the data is not in an unencrypted form, between an originator (or the originators in-country security boundary) and an intended recipient (or the recipients in-country security boundary); and (ii) the means of decryption are not provided to any third party. Further, the transmission and/or storage must be secured using cryptographic modules (hardware or software) compliant with the Federal Information Processing Standards Publication 140-2 (FIPS 140-2) or its successors, supplemented by software implementation, cryptographic key management, and other procedures and controls that are in accordance with guidance provided in current U.S. National Institute for Standards and Technology (NIST) publications, or by other cryptographic means that provide security strength that is at least comparable to the minimum 128 bits of security strength achieved by the Advanced Encryption Standard (AES-128). Also, the sending, storing or taking of secured unclassified technical data may not involve, be stored in or be sent from the Russian Federation or a DDTC-restricted country, including Belarus, Burma, China, Cuba, Iran, North Korea, Syria, Venezuela, Afghanistan, Central African Republic, Cyprus, Democratic Republic of Congo, Eritrea, Haiti, Iraq, Lebanon, Libya, Somalia, South Sudan, Sudan and Zimbabwe.

Those interested in addressing the interim final rule before the January 27, 2020 deadline may submit comments by (i) email to DDTCPublicComments@state.gov with the subject line, Revisions to Definitions; Data Transmission and Storage or (ii) using the federal rulemaking portal at http://www.regulations.gov and filing comments under Docket DOS20190040.

See the article here:
State Department Adds ITAR Definitions in Interim Final Rule for Activities that Are Not Exports, Reexports, Retransfers or Temporary Imports -...

Global Hardware-based Full Disk Encryption (FDE) Market Executive Summary and Analysis by Top Players 2020-2027: Seagate Technology PLC, Western…

The report gives the detailed overview of Global Hardware-based Full Disk Encryption (FDE) Market 2020 and predicts future market trends throughout 2027. It focuses deeply on satisfactory solutions to user in terms of value and volume forecast 2020-2027. Also the report executes the great study of Price and Gross Margin, Capacity, Production, Revenue, current geographical zones, technology, demand-supply, Consumption, Import, Export, Market Drivers and Opportunities around the world. In this Professional report, we have investigated the principals, players in the market, product type, and market end-client applications. This report comprises of primary and secondary data research which is analyzed in the form of pie outlines, Professional tables, analytical figures, and reference diagrams. The dominant firms are Seagate Technology PLC, Western Digital Corp, Samsung Electronics, Toshiba, Kingston, Micron Technology Inc, Intel mentioned within the report.

Get a Sample Copy of the Report: https://www.reportsbuzz.com/request-for-sample.html?repid=57059

Global Hardware-based Full Disk Encryption (FDE) Market Growth Factors:-

The scope of the report covers detailed information regarding the major factors influencing the growth of the Hardware-based Full Disk Encryption (FDE) market such as drivers, restraints, challenges, and opportunities. A detailed analysis of the key industry players has been done to provide insights into their business overview, products and services, key strategies such as new product launches, mergers & acquisitions, partnerships, agreements, joint ventures, and recent developments associated with the Hardware-based Full Disk Encryption (FDE) market.

The Global Hardware-based Full Disk Encryption (FDE) Market is poised to grow strongly throughout the forecast period 2020- 2027. Some of the distinguished trends that the market is witnessing include regulatory restrictions, the growing usage of Hardware-based Full Disk Encryption (FDE) in several end user segments, recent technological developments of the industry and growth investment opportunities.

By Region:-

Read Detailed Index of full Research Study at: https://www.reportsbuzz.com/57059/global-hardware-based-full-disk-encryption-fde-market/

There are 15 Chapters to display the Global Hardware-based Full Disk Encryption (FDE) market

Chapter 1: Definition, Specifications and Classification, Applications of Hardware-based Full Disk Encryption (FDE), Market Segment by Regions;

Chapter 2: Manufacturing Cost Structure, Raw Material and Suppliers, Manufacturing Process, Industry Chain Structure;

Chapter 3: Technical Data and Manufacturing Plants Analysis of Hardware-based Full Disk Encryption (FDE), Capacity and Commercial Production Date, Manufacturing Plants Distribution, R&D Status and Technology Source, Raw Materials Sources Analysis;

Chapter 4: Overall Market Analysis, Capacity Analysis (Company Segment), Sales Analysis (Company Segment), Sales Price Analysis (Company Segment);

Chapter 5 and 6: Regional Market Analysis that includes North America, Europe, Asia-Pacific, South America, Middle East and Africa, Hardware-based Full Disk Encryption (FDE) Segment Market Analysis (by Type);

Chapter 7 and 8: The Hardware-based Full Disk Encryption (FDE) Segment Market Analysis (by Application) Major Manufacturers Analysis;

Chapter 9: Market Trend Analysis, Regional Market Trend, Market Trend by Product Type- Hard Disk Drive (HDD) FDE, Solid State Drives (SSD) FDE, Market Trend by Application- IT & Telecom, BFSI, Government & Public Utilities, Manufacturing Enterprise, Others

Chapter 10: Regional Marketing Type Analysis, International Trade Type Analysis, Supply Chain Analysis;

Chapter 11: The Consumers Analysis;

Chapter 12: Hardware-based Full Disk Encryption (FDE) Research Findings SWOT anlysis, Conclusion, Appendix, methodology and data source;

Chapter 13, 14 and 15:Market sales channel, distributors, traders, dealers, Research Findings and Conclusion, appendix and data source.

Enquire Here, Get customization & check discount for report @ https://www.reportsbuzz.com/inquiry-for-buying.html?repid=57059

Research Objective:

Our panel of industry contributors as well as industry analysts across the value chain have taken immense efforts in doing this brainstorming and heavy-lifting work in order to provide the key players with beneficial primary & secondary information regarding the global Hardware-based Full Disk Encryption (FDE) market. In addition, the report also contains inputs from our industry experts that can help the key players in saving their time from the internal research part. Companies who buy and use this report will be thoroughly profited with the inferences delivered in it. Apart from this, the report also provides in-depth analysis on Hardware-based Full Disk Encryption (FDE) sale as well as the factors that influence the customers as well as enterprises towards this technique.

If you want special requirement orany other report, simply Fillthe Sample Copy form given above.

More:
Global Hardware-based Full Disk Encryption (FDE) Market Executive Summary and Analysis by Top Players 2020-2027: Seagate Technology PLC, Western...

Clop Ransomware Now Kills Windows 10 Apps and 3rd Party Tools – BleepingComputer

The Clop Ransomware continues to evolve with a new and integrated process killer that targets some interesting processes belonging to Windows 10 apps, text editors, programming IDEs and languages, and office applications.

When the Clop Ransomwarestarted circulating in February 2019, it was just your normal garden variety CryptoMix ransomware variant with the same features we have been seeing in this family since 2017.

In March 2019, though, the Clop Ransomwaresuddenly changed and began disablingservices for Microsoft Exchange, Microsoft SQL Server, MySQL, BackupExec, and other enterprise software. The ransom note had also changed to indicate that the attackers were targeting an entire network rather than individual PCs.

It was determined at that time, that a threat actor group known asTA505 had adopted the Clop Ransomware as their final payload of choice after compromising a network, similar to how Ryuk, BitPaymer, and DoppelPaymer were being used.

This adoption by the threat actors has most likely fueled the ransomware's developmentas the actors change it to fit their needs when performing network-wide encryption.

Development continued in November 2019, when a new variant was released that attempted to disable Windows Defender running on local computers so that it would not be detected by future signature updates.

These changes also coincided with the threat actors continued targeting of companies in theNetherlands and France.

Just last month, Maastricht University (UM) in the Netherlands was infected by the Clop Ransomware.

In late December 2019a new Clop variant was discovered by MalwareHunterTeam and reverse engineered by Vitali Kremez that add improves their process termination feature; Clop now terminates 663 Windows processes before encrypting files.

It is not uncommon for ransomware to terminate processes before encrypting files as the attackers want to disable security software and do not want any files to be open as it could prevent them from being encrypted.

This new variant takes it a step further by terminating a total of 663 processes, which include new Windows 10 apps, popular text editors, debuggers, programming languages, terminal programs, and programming IDE software.

Some of the more interesting processes that are terminated include the Android Debug Bridge, Notepad++, Everything, Tomcat, SnagIt, Bash, Visual Studio, Microsoft Office applications, programming languages such as Python and Ruby, the SecureCRT terminal application, the Windows calculator, and even the new Windows 10 Your Phone app.

It is not known why some of these processes are terminated, especially ones like Calculator,Snagit, and SecureCRT, but its possible they want to encrypt configuration files used by some of these tools.

A full list of the terminated processes can be found in Kremez'sGitHub repository.

In the past,the process termination functionality was performed by a Windows batch file. By embedding this functionality into the main executable, it further signifies active development by the group.

"This change signifies that the ransomware group decided to include the "process killer" in the main bot making it a more universal Swiss-army approach rather thanrelying on theirexternal libraries like "av_block" for this purpose," Kremez told BleepingComputer in a conversation.

In addition to the new and large list of targeted processes, this Clop Ransomwarevariantalso utilizes a new .Cl0pextension, rather than the .CIop or .Clop extensionsused in previous versions.

As Clop continues to infect organizations, and reap large ransoms for doing so, we can expect to see its development to continue as the actors evolve their tactics.

Read more here:
Clop Ransomware Now Kills Windows 10 Apps and 3rd Party Tools - BleepingComputer

Mexico president calls for Julian Assange to be released from UK prison – Reuters

MEXICO CITY (Reuters) - Mexicos President Andres Manuel Lopez Obrador on Friday called for Wikileaks founder Julian Assange to be released from prison in London, urging an end to what he described as his torture in detention.

Mexico's President Andres Manuel Lopez Obrador holds a book as he calls for the release of Wikileaks founder Julian Assange from a prison in London, during his daily news conference at the National Palace in Mexico City, Mexico, January 3, 2020. Mexico's Presidency/Handout via REUTERS

Assange, 48, is in a British jail for skipping bail when he sought asylum in Ecuadors embassy in London, where he spent nearly seven years to avoid extradition to Sweden over allegations of rape that were dropped in November.

Assange is also battling U.S. attempts to extradite him over Wikileaks publication of vast caches of leaked military documents and diplomatic cables. He faces a lengthy prison term if extradited to the United States.

A U.N. human rights investigator last year said Assange has suffered psychological torture from a defamation campaign and should not be extradited to the United States where he would face a politicized show trial.

Lopez Obrador, a leftist who has close ties with Britains opposition Labour Party leader Jeremy Corbyn, expressed his solidarity with Assange and said he hoped the former hacker and activist is forgiven and released from prison.

I dont know if he has recognized that he acted against rules and norms of a political system, but at the time these cables demonstrated how the world system functions in its authoritarian nature, Lopez Obrador said in response to a question about Assange at a regular government news briefing.

Hopefully consideration will be given to this, and hes released and wont continue to be tortured.

Assanges presence in London, holed up in Ecuadors embassy and then in jail, has been a diplomatic irritation for Britain, affecting domestic politics and relations with several countries.

Corbyn, who was a guest of honor at Lopez Obradors inauguration in December 2018, said Assange should not be extradited to the United States for exposing evidence of atrocities in Iraq and Afghanistan.

British Prime Minister Boris Johnson, whose Conservative Party trounced Labour in last months elections, has vowed to strike new trade deals with countries outside Europe after Britains departure from the European Union.

Writing by Drazen Jorgic; Editing by Richard Chang

See the original post:
Mexico president calls for Julian Assange to be released from UK prison - Reuters

UN Official Blasts UK Government’s Indifference Toward Assange’s Torture – Shadowproof

The government of the United Kingdom informed United Nations Special Rapporteur on Torture Nils Melzer that they reject any allegation that WikiLeaks founder Julian Assange has been subjected to torture in any form as a result of actions by the U.K. government. Officials also reject the findings of the UN Working Group on Arbitrary Detention (WGAD) that Assange was ever arbitrarily detained. While living under diplomatic asylum from Ecuador, they contend that Assange was free to leave the Ecuadorian embassy at any time. Melzer strongly objected to the UK governments indifference toward Assanges ongoing abuse and mistreatment.In April 2019, Assange was expelled from the Ecuadorian embassy and arrested by U.K. authorities. The United States government charged him with conspiracy to commit a computer crime and requested his extradition. U.S. prosecutors subsequently charged him with 17 violations of the Espionage Act in May. All charges related to WikiLeaks publication of the Afghanistan War Logs in 2010, which were provided to the media organization by U.S. military whistleblower Chelsea Manning. Assange completed a 50-week sentence for violating bail conditions and remains detained at Her Majestys Prison Belmarsh in London. A letter from October 29, 2019, which Melzer released, indicates, Despite significant efforts made by my mandate to ensure a prompt and objective assessment of this case, and despite the urgency of my requests, it took more than four months for [the U.K. government] to respond.Melzer adds, The governments response failed to address any of my recommendations and to provide any of the information requested and made no effort towards engaging in a constructive dialogue with my mandate.During May 2019, Melzer visited Assange and later condemned the collective persecution against him by Ecuador, Sweden, the U.K., and the U.S. governments. Based on a careful evaluation of the available evidence, I found that the U.K. had contributed decisively to producing the observed medical symptoms, most notably through its participation, over the course of almost a decade, in Mr. Assanges arbitrary confinement, his judicial persecution, as well as his sustained and unrestrained public mobbing, intimidation and defamation, Melzer noted.Two medical experts Melzer consulted determined there was reasonable ground to believe that U.K. officials were responsible for contributing to psychological torture against Assange.Under the Convention Against Torture, the U.K. government has an obligation to conduct a prompt and impartial investigation into Melzers allegations. They do not have the political discretion to merely reject his conclusions. This reinforces my concerns expressed in a separate communication about the U.K. governments recent refusal to conduct a judicial inquiry into British involvement in the U.S. torture and rendition program, Melzer further declared. Melzer seemed appalled that the U.K. government would suggest Assange was ever free to leave the Ecuadorian embassy. The U.S. government likely would have violated his right to a free trial, right to not be arbitrarily detained, and right to not be tortured or subject to cruel and inhuman treatment. In fact, the U.K. government completely ignores the ongoing grand jury investigation that was empaneled prior to Assanges decision to seek asylum. No objective observer can escape the conclusion that Mr. Assanges due process rights have been seriously, consistently, and deliberately violated in every phase of each judicial proceeding conducted against him in all involved jurisdictions, Melzer asserted. The list of due process rights violations, as Melzer noted, included: obstruction of his rights during Swedish proceedings; conflicts of interest and overt bias on the part of judicial magistrates; arbitrary conviction and grossly disproportionate imprisonment for having violated U.K. bail by seeking and receiving diplomatic asylum from political persecution by another U.N. member state; and obstruction of his access to legal counsel, documents, and other facilities, which has deprived him of his right to an adequate defense.Despite the obvious inappropriateness of such harsh and discriminatory treatment for a non-violent inmate held solely in relation to a pending extradition procedure, no adequate explanations appear to be given by the prison administration, and no alternative measures, such as house arrest, or his re-integration in the general population, seem to be envisaged. Melzer reiterated his concerns about Assanges deteriorating health, and in the final part of his letter, he urged the U.K. government to withdraw their authorization for extradition and release him from jail. Or place him on house arrest so Assange may regains his health and resume a normal and social professional life.Assange is detained in conditions that amount to solitary confinement. He spends 22 hours on average in a prison healthcare unit. He has daily walks for 45 minutes, access to church services, as well as meetings with lawyers and social visits. But he is not permitted to work or go to the gym, and he apparently cannot talk with other inmates. Meanwhile, in Alexandria, Virginia, Manning is jailed at the William G. Truesdale Adult Detention Center, where she has been confined for 294 days. She owes $185,000 in fines as of January 1. Every day, she is fined $1000 more for refusing to go before a grand jury and testify against WikiLeaks.Melzer released a letter [PDF] from November 1, 2019, to the U.S. government that raised serious concerns over coercive measures against Manning. He suggested authorities were intentionally inflicting progressively severe mental and emotional suffering for the purposes of coercion and intimidation at the order of judicial authorities, and it is compounding Mannings post-traumatic symptoms and other mental and physical health problems she still experiences as a result of prior abuse she endured when she was imprisoned for releasing documents to WikiLeaks.I conclude that such deprivation of liberty does not constitute a circumscribed sanction for a specific offense but an open-ended, progressively severe measure of coercion fulfilling all the constitutive elements of torture or other cruel, inhuman or degrading treatment or punishment, Melzer declared. He requested information about her continued detention and daily fines, especially since her categorical and persistent refusal to give testimony demonstrates the lack of their coercive effect.

Manning reacted in a statement, Nearly every other legal system in the world condemns coercive confinement, and long ago replaced secret grand juries with public hearings. I am thrilled to see the practice of coercive confinement called out for what it is: incompatible with international human rights standards.

Regardless, even knowing I am very likely to stay in jail for an even longer time, Im never backing down, Manning added.On February 25, a major hearing in Assanges extradition case is expected to unfold at a court adjacent to the Belmarsh prison. It is expected to last three to four weeks, and U.S. prosecutors will present their case for extradition.

Originally posted here:
UN Official Blasts UK Government's Indifference Toward Assange's Torture - Shadowproof

The Top 10 Artificial Intelligence Trends Everyone Should Be Watching In 2020 – Forbes

Artificial Intelligence (AI) has undoubtedly been the technology story of the 2010s, and it doesn't look like the excitement is going to wear off as a new decade dawns.

The past decade will be remembered as the time when machines that can truly be thought of as intelligent as in capable of thinking, and learning, like we do started to become a reality outside of science fiction.

While no prediction engine has yet been built that can plot the course of AI over the coming decade, we can be fairly certain about what might happen over the next year. Spending on research, development, and deployment continues to rise, and debate over the wider social implications rages on. Meanwhile, the incentives only get bigger for those looking to roll out AI-driven innovation into new areas of industry, fields of science, and our day-to-day lives.

The Top 10 Artificial Intelligence Trends Everyone Should Be Watching In 2020

Here are my predictions for what we're likely to see continue or emerge in the first year of the 2020s.

1. AI will increasingly be monitoring and refining business processes

While the first robots in the workplace were mainly involved with automating manual tasks such as manufacturing and production lines, today's software-based robots will take on the repetitive but necessary work that we carry out on computers. Filling in forms, generating reports and diagrams and producing documentation and instructions are all tasks that can be automated by machines that watch what we do and learn to do it for us in a quicker and more streamlined manner. This automation known as robotic process automation will free us from the drudgery of time-consuming but essential administrative work, leaving us to spend more time on complex, strategic, creative and interpersonal tasks.

2. More and more personalization will take place in real-time

This trend is driven by the success of internet giants like Amazon, Alibaba, and Google, and their ability to deliver personalized experiences and recommendations. AI allows providers of goods and services to quickly and accurately project a 360-degree view of customers in real-time as they interact through online portals and mobile apps, quickly learning how their predictions can fit our wants and needs with ever-increasing accuracy. Just as pizza delivery companies like Dominos will learn when we are most likely to want pizza, and make sure the "Order Now" button is in front of us at the right time, every other industry will roll out solutions aimed at offering personalized customer experiences at scale.

3. AI becomes increasingly useful as data becomes more accurate and available

The quality of information available is often a barrier to businesses and organizations wanting to move towards AI-driven automated decision-making. But as technology and methods of simulating real-world processes and mechanisms in the digital domain have improved over recent years, accurate data has become increasingly available. Simulations have advanced to the stage where car manufacturers and others working on the development of autonomous vehicles can gain thousands of hours of driving data without vehicles even leaving the lab, leading to huge reductions in cost as well as increases in the quality of data that can be gathered. Why risk the expense and danger of testing AI systems in the real world when computers are now powerful enough, and trained on accurate-enough data, to simulate it all in the digital world? 2020 will see an increase in the accuracy and availability of real-world simulations, which in turn will lead to more powerful and accurate AI.

4. More devices will run AI-powered technology

As the hardware and expertise needed to deploy AI become cheaper and more available, we will start to see it used in an increasing number of tools, gadgets, and devices. In 2019 were already used to running apps that give us AI-powered predictions on our computers, phones, and watches. As the next decade approaches and the cost of hardware and software continues to fall, AI tools will increasingly be embedded into our vehicles, household appliances, and workplace tools. Augmented by technology such as virtual and augmented reality displays, and paradigms like the cloud and Internet of Things, the next year will see more and more devices of every shape and size starting to think and learn for themselves.

5. Human and AI cooperation increases

More and more of us will get used to the idea of working alongside AI-powered tools and bots in our day-to-day working lives. Increasingly, tools will be built that allow us to make the most of our human skills those which AI can't quite manage yet such as imaginative, design, strategy, and communication skills. While augmenting them with super-fast analytics abilities fed by vast datasets that are updated in real-time.

For many of us, this will mean learning new skills, or at least new ways to use our skills alongside these new robotic and software-based tools. The IDC predicts that by 2025, 75% of organizations will be investing in employee retraining in order to fill skill gaps caused by the need to adopt AI. This trend will become increasingly apparent throughout 2020, to the point where if your employer isnt investing in AI tools and training, it might be worth considering how well placed they are to grow over the coming years.

6. AI increasingly at the edge

Much of the AI were used to interacting with now in our day-to-day lives takes place in the cloud when we search on Google or flick through recommendations on Netflix, the complex, data-driven algorithms run on high-powered processors inside remote data centers, with the devices in our hands or on our desktops simply acting as conduits for information to pass through.

Increasingly, however, as these algorithms become more efficient and capable of running on low-power devices, AI is taking place at the "edge," close to the point where data is gathered and used. This paradigm will continue to become more popular in 2020 and beyond, making AI-powered insights a reality outside of the times and places where super-fast fiber optic and mobile networks are available. Custom processors designed to carry out real-time analytics on-the-fly will increasingly become part of the technology we interact with day-to-day, and increasingly we will be able to do this even if we have patchy or non-existent internet connections.

7. AI increasingly used to create films, music, and games

Some things, even in 2020, are probably still best left to humans. Anyone who has seen the current state-of-the-art in AI-generated music, poetry or storytelling is likely to agree that the most sophisticated machines still have some way to go until their output will be as enjoyable to us as the best that humans can produce. However, the influence of AI on entertainment media is likely to increase. This year we saw Robert De Niro de-aged in front of our eyes with the assistance of AI, in Martin Scorseses epic The Irishman, and the use of AI in creating brand new visual effects and trickery is likely to become increasingly common.

In videogames, AI will continue to be used to create challenging, human-like opponents for players to compete against, as well as to dynamically adjust gameplay and difficulty so that games can continue to offer a compelling challenge for gamers of all skill levels. And while completely AI-generated music may not be everyones cup of tea, where AI does excel is in creating dynamic soundscapes think of smart playlists on services like Spotify or Google Music that match tunes and tempo to the mood and pace of our everyday lives.

8. AI will become ever more present in cybersecurity

As hacking, phishing and social engineering attacks become ever-more sophisticated, and themselves powered by AI and advanced prediction algorithms, smart technology will play an increasingly important role in protecting us from these attempted intrusions into our lives. AI can be used to spot giveaway signs that digital activity or transactions follow patterns that are likely to be indicators of nefarious activity, and raise alarms before defenses can be breached and sensitive data compromised.

The rollout of 5G and other super-fast wireless communications technology will bring huge opportunities for businesses to provide services in new and innovative ways, but they will also potentially open us up to more sophisticated cyber-attacks. Spending on cybersecurity will continue to increase, and those with relevant skills will be highly sought-after.

9. More of us will interact with AI, maybe without even knowing it

Lets face it, despite the huge investment in recent years in natural-language powered chatbots in customer service, most of us can recognize whether were dealing with a robot or a human. However, as the datasets used to train natural language processing algorithms continue to grow, the line between humans and machines will become harder and harder to distinguish. With the advent of deep learning and semi-supervised models of machine learning such as reinforcement learning, the algorithms that attempt to match our speech patterns and infer meaning from our own human language will become more and more able to fool us into thinking there is a human on the other end of the conversation. And while many of us may think we would rather deal with a human when looking for information or assistance, if robots fill their promise of becoming more efficient and accurate at interpreting our questions, that could change. Given the ongoing investment and maturation of the technology powering customer service bots and portals, 2020 could be the first time many of us interact with a robot without even realizing it.

10. But AI will recognize us, even if we dont recognize it

Perhaps even more unsettlingly, the rollout of facial recognition technology is only likely to intensify as we move into the next decade. Not just in China (where the government is looking at ways of making facial recognition compulsory for accessing services like communication networks and public transport) but around the world. Corporations and governments are increasingly investing in these methods of telling who we are and interpreting our activity and behavior. There's some pushback against this this year, San Francisco became the first major city to ban the use of facial recognition technology by the police and municipal agencies, and others are likely to follow in 2020. But the question of whether people will ultimately begin to accept this intrusion into their lives, in return for the increased security and convenience it will bring, is likely to be a hotly debated topic of the next 12 months.

Here is the original post:
The Top 10 Artificial Intelligence Trends Everyone Should Be Watching In 2020 - Forbes

Why Neuro-Symbolic Artificial Intelligence Is The AI Of The Future – Digital Trends

Picture a tray. On the tray is an assortment of shapes: Some cubes, others spheres. The shapes are made from a variety of different materials and represent an assortment of sizes. In total there are, perhaps, eight objects. My question: Looking at the objects, are there an equal number of large things and metal spheres?

Its not a trick question. The fact that it sounds as if it is is proof positive of just how simple it actually is. Its the kind of question that a preschooler could most likely answer with ease. But its next to impossible for todays state-of-the-art neural networks. This needs to change. And it needs to happen by reinventing artificial intelligence as we know it.

Thats not my opinion; its the opinion of David Cox, director of the MIT-IBM Watson A.I. Lab in Cambridge, MA. In a previous life, Cox was a professor at Harvard University, where his team used insights from neuroscience to help build better brain-inspired machine learning computer systems. In his current role at IBM, he oversees work on the companys Watson A.I. platform.Watson, for those who dont know, was the A.I. which famously defeated two of the top game show players in history at TV quiz show Jeopardy. Watson also happens to be a primarily machine-learning system, trained using masses of data as opposed to human-derived rules.

So when Cox says that the world needs to rethink A.I. as it heads into a new decade, it sounds kind of strange. After all, the 2010s has been arguably the most successful ten-year in A.I. history: A period in which breakthroughs happen seemingly weekly, and with no frosty hint of an A.I. winter in sight.This is exactly why he thinks A.I. needs to change, however. And his suggestion for that change, a currently obscure term called neuro-symbolic A.I., could well become one of those phrases were intimately acquainted with by the time the 2020s come to an end.

Neuro-symbolic A.I. is not, strictly speaking, a totally new way of doing A.I. Its a combination of two existing approaches to building thinking machines; ones which were once pitted against each as mortal enemies.

The symbolic part of the name refers to the first mainstream approach to creating artificial intelligence. From the 1950s through the 1980s, symbolic A.I. ruled supreme. To a symbolic A.I. researcher, intelligence is based on humans ability to understand the world around them by forming internal symbolic representations. They then create rules for dealing with these concepts, and these rules can be formalized in a way that captures everyday knowledge.

If the brain is analogous to a computer, this means that every situation we encounter relies on us running an internal computer program which explains, step by step, how to carry out an operation, based entirely on logic. Provided that this is the case, symbolic A.I. researchers believe that those same rules about the organization of the world could be discovered and then codified, in the form of an algorithm, for a computer to carry out.

Symbolic A.I. resulted in some pretty impressive demonstrations. For example, in 1964 the computer scientist Bertram Raphael developed a system called SIR, standing for Semantic Information Retrieval. SIR was a computational reasoning system that was seemingly able to learn relationships between objects in a way that resembled real intelligence. If you were to tell it that, for instance, John is a boy; a boy is a person; a person has two hands; a hand has five fingers, then SIR would answer the question How many fingers does John have? with the correct number 10.

there are concerning cracks in the wall that are starting to show.

Computer systems based on symbolic A.I. hit the height of their powers (and their decline) in the 1980s. This was the decade of the so-called expert system which attempted to use rule-based systems to solve real-world problems, such as helping organic chemists identify unknown organic molecules or assisting doctors in recommending the right dose of antibiotics for infections.

The underlying concept of these expert systems was solid. But they had problems. The systems were expensive, required constant updating, and, worst of all, could actually become less accurate the more rules were incorporated.

The neuro part of neuro-symbolic A.I. refers to deep learning neural networks. Neural nets are the brain-inspired type of computation which has driven many of the A.I. breakthroughs seen over the past decade. A.I. that can drive cars? Neural nets. A.I. which can translate text into dozens of different languages? Neural nets. A.I. which helps the smart speaker in your home to understand your voice? Neural nets are the technology to thank.

Neural networks work differently to symbolic A.I. because theyre data-driven, rather than rule-based. To explain something to a symbolic A.I. system means explicitly providing it with every bit of information it needs to be able to make a correct identification. As an analogy, imagine sending someone to pick up your mom from the bus station, but having to describe her by providing a set of rules that would let your friend pick her out from the crowd. To train a neural network to do it, you simply show it thousands of pictures of the object in question. Once it gets smart enough, not only will it be able to recognize that object; it can make up its own similar objects that have never actually existed in the real world.

For sure, deep learning has enabled amazing advances, David Cox told Digital Trends. At the same time, there are concerning cracks in the wall that are starting to show.

One of these so-called cracks relies on exactly the thing that has made todays neural networks so powerful: data. Just like a human, a neural network learns based on examples. But while a human might only need to see one or two training examples of an object to remember it correctly, an A.I. will require many, many more. Accuracy depends on having large amounts of annotated data with which it can learn each new task.

That makes them less good at statistically rare black swan problems. A black swan event, popularized by Nassim Nicholas Taleb, is a corner case that is statistically rare. Many of our deep learning solutions today as amazing as they are are kind of 80-20 solutions, Cox continued. Theyll get 80% of cases right, but if those corner cases matter, theyll tend to fall down. If you see an object that doesnt normally belong [in a certain place], or an object at an orientation thats slightly weird, even amazing systems will fall down.

Before he joined IBM, Cox co-founded a company, Perceptive Automata, that developed software for self-driving cars. The team had a Slack channel in which they posted funny images they had stumbled across during the course of data collection. One of them, taken at an intersection, showed a traffic light on fire. Its one of those cases that you might never see in your lifetime, Cox said. I dont know if Waymo and Tesla have images of traffic lights on fire in the datasets they use to train their neural networks, but Im willing to bet if they have any, theyll only have a very few.

Its one thing for a corner case to be something thats insignificant because it rarely happens and doesnt matter all that much when it does. Getting a bad restaurant recommendation might not be ideal, but its probably not going to be enough to even ruin your day. So long as the previous 99 recommendations the system made are good, theres no real cause for frustration. A self-driving car failing to respond properly at an intersection because of a burning traffic light or a horse-drawn carriage could do a lot more than ruin your day. It might be unlikely to happen, but if it does we want to know that the system is designed to be able to cope with it.

If you have the ability to reason and extrapolate beyond what weve seen before, we can deal with these scenarios, Cox explained. We know that humans can do that. If I see a traffic light on fire, I can bring a lot of knowledge to bear. I know, for example, that the light is not going to tell me whether I should stop or go. I know I need to be careful because [drivers around me will be confused.] I know that drivers coming the other way may be behaving differently because their light might be working. I can reason a plan of action that will take me where I need to go. In those kinds of safety-critical, mission-critical settings, thats somewhere I dont think that deep learning is serving us perfectly well yet. Thats why we need additional solutions.

The idea of neuro-symbolic A.I. is to bring together these approaches to combine both learning and logic. Neural networks will help make symbolic A.I. systems smarter by breaking the world into symbols, rather than relying on human programmers to do it for them. Meanwhile, symbolic A.I. algorithms will help incorporate common sense reasoning and domain knowledge into deep learning. The results could lead to significant advances in A.I. systems tackling complex tasks, relating to everything from self-driving cars to natural language processing. And all while requiring much less data for training.

Neural networks and symbolic ideas are really wonderfully complementary to each other, Cox said. Because neural networks give you the answers for getting from the messiness of the real world to a symbolic representation of the world, finding all the correlations within images. Once youve got that symbolic representation, you can do some pretty magical things in terms of reasoning.

For instance, in the shape example I started this article with, a neuro-symbolic system would use a neural networks pattern recognition capabilities to identify objects. Then it would rely on symbolic A.I. to apply logic and semantic reasoning to uncover new relationships. Such systems have already been proven to work effectively.

Its not just corner cases where this would be useful, either. Increasingly, it is important that A.I. systems are explainable when required. A neural network can carry out certain tasks exceptionally well, but much of its inner reasoning is black boxed, rendered inscrutable to those who want to know how it made its decision. Again, this doesnt matter so much if its a bot that recommends the wrong track on Spotify. But if youve been denied a bank loan, rejected from a job application, or someone has been injured in an incident involving an autonomous car, youd better be able to explain why certain recommendations have been made. Thats where neuro-symbolic A.I. could come in.

A few decades ago, the worlds of symbolic A.I. and neural networks were at odds with one another. The renowned figures who championed the approaches not only believed that their approach was right; they believed that this meant the other approach was wrong. They werent necessarily incorrect to do so. Competing to solve the same problems, and with limited funding to go around, both schools of A.I. appeared fundamentally opposed to each other. Today, it seems like the opposite could turn out to be true.

Its really fascinating to see the younger generation, Cox said. [Many of the people in my team are] relatively junior people: fresh, excited, fairly recently out of their Ph.Ds. They just dont have any of that history. They just dont care [about the two approaches being pitted against each other] and not caring is really powerful because it opens you up and gets rid of those prejudices. Theyre happy to explore intersections They just want to do something cool with A.I.

Should all go according to plan, all of us will benefit from the results.

See the original post here:
Why Neuro-Symbolic Artificial Intelligence Is The AI Of The Future - Digital Trends