Steamrollers, explosions, and ‘cartoon violence’: the artistic eruptions of Cornelia Parker – The Guardian

Cornelia Parker is softly spoken and bird-like; an artist who peppers her conversation with nervous little laughs. Yet her work is all about blowing things up.

Over her career, the Turner prize-shortlisted English artist, who was appointed an Order of the British Empire in 2010, has made a name treating objects with what she terms cartoon violence. Silver cutlery has been crushed with a steamroller. A garden shed has been blown to smithereens. Wedding rings have been stretched. And stretched. And stretched.

I did a series of work with things meeting their end like a cartoon death: throwing silver objects off the White Cliffs of Dover or steamrolling stuff or putting money on the railway track, says Parker. When we meet, despite the heat, she is dressed in black tights and a monochrome fleece topped off with her trademark page-boy bob. These were all cliches. I like cliches. They are a monumental thing [My practice asks]: why are they so universally loved?

Now Parker, 63, is hosting her first major survey in the southern hemisphere. Cornelia Parker, showing at Sydneys Museum of Contemporary Art, features over 40 artworks ranging from smaller pieces on paper to her epic, soul-stirring large-scale installations.

Art is just political. Full stop. Whether it's party-political is another matter

Most famous of these is 1991s Cold Dark Matter: An Exploded View. Parker enlisted the British army to detonate a purpose-built shed, stuffed with donations from friends (soft toys, gardening tools) and items found in charity stores. The blackened, broken parts were then suspended from the ceiling, as if at the moment of eruption. Casting shadows on to the walls, Cold Dark Matter looks like a giant chandelier poised gorgeously between destruction and creation.

But if Parker talks about the violence within her work with a Wham! Bam! Pow! joviality (it was quite satisfying, she says of the explosion), those works also contain an eerie sense of turmoil and deep unsettlement.

The blowing up was part of trying to disrupt something that was cosy and suburban, like the garden shed. Blowing it up was just causing havoc in a place that was really quite benign and quite peaceful. She shrugs. It was pre-September 11, so it seemed like a childlike thing to do.

And yet: We had IRA bombs going off in London and you couldnt turn on the news without there being yet another explosion. The knowledge gives Cold Dark Matter a grim twist.

Sculpture, for Parker, is a nexus of change, rather than a place to build something substantial and solid. She finds herself drawn to leaves on trees, blades of grass in the field they are made up of lots of small things that are mobile. Those are the things I really quite enjoy rather than having big static lumps of stone, which might be a more traditional way of sculpture. I like things being ephemeral.

Her early 2000s work Subconscious of a Monument is, like Cold Dark Matter, about freezing a transitory moment in time and space. Engineers, tasked with preventing the Leaning Tower of Pisa from collapsing, eventually found a workable method: the extraction of soil from underneath the monument.

They were desperate to save it but they took 10 years to find the right technique, says Parker, who was dating an Italian architect at the time (she is now married to American-born artist Jeff McMillan, with whom she has a daughter). Intrigued, she asked if she could use the excavated clay, hanging each chunk from the ceiling by an individual wire. A lot of my work is about gravity for me to suspend the clods of earth lain in the dark for over a thousand years, its like the turning of the earth, she says.

In 2015, Parker turned her attention to another world attraction: Magna Carta (An Embroidery) is a tapestry of the charter of rights Wikipedia page as it stood on the cusp of its 800th anniversary. The twist? Many of the 4,000-plus words in the 13-metre long tapestry were embroidered by men and women with opposing political views, values or life experiences: Julian Assange and Edward Snowden contributed, as did the American ambassador to the UK and convicted murderers in state prisons. Former Guardian editor Alan Rusbridger embroidered the words political contemporary relevance, spilling, as he pricked his finger, some of his own blood.

I wanted to have good and evil, it to be left and right, says Parker. To have the American ambassador alongside Edward Snowden all on the same bit of fabric. I wanted to turn an embroidery into something a bit more pithy, a bit more edgy.

Today, as a staunch remainer, Parker is keen to talk about something else altogether: the impending general election in her home country. She is looking on with wry humour, scepticism (Jeremy Corbyn is ineffectual and vain; Boris Johnson a racist, sexist and quite Machiavellian), as well as relief that, unlike in 2017, she is no longer the UKs official election artist.

Art is just political. Full stop. Whether its party-political is another matter, she says. I keep thinking: If you want to say something just open your mouth and say it. I really feel particular about things like climate change and Brexit Id rather just be verbal about it than make work about it.

At heart, Parkers art speaks to the human condition above day-to-day squabbles. She has long been fascinated with The Golden Bough, anthropologist Sir James George Frazers seminal book on mythology. Ancient religions had to kill something off every time they wanted something to be regenerated. For every death you get a resurrection, she says. Thats what happens when I suspend [my work]. It is very like a morgue; [but] in the air they are reanimated.

Cornelia Parker is showing at Sydneys Museum of Contemporary Art until 16 February 2020

Continue reading here:
Steamrollers, explosions, and 'cartoon violence': the artistic eruptions of Cornelia Parker - The Guardian

Almost anyone could have cyber-hacked the Labour Party and now our democracy is under threat – The Independent

Today the Labour Party was the victim of a large and sophisticated cyber attack. It shouldnt come as a surprise, however. After the hack of the US Democratic National Committee in 2016, security experts warned it was only a matter time before a UK political party was targeted.

Hacker politics is nothing new to parties though. In fact, they often use it to their advantage, leveraging dark data and social media manipulation techniques. Yet our entire system of political regulation is still stuck in the20thCentury and unprepared for the current threat from foreign state or private criminal hacking.

The Electoral Commission devotes almost all of its resources to the problems faced by electoral systems in an analogue world. Todays breach has exposed how urgently the independent body needs to develop its e-regulations to control how political parties remain digitally secure, and how they can use data responsibly and fairly.

Sharing the full story, not just the headlines

In the absence of any specific requirements for data security within political parties, organisations are left to muddle through. The situation is murky enough that just last week the Information Commissionerwroteto all major political parties reminding them they are not above data protection law (the assumption being that perhaps they believed they were).

Currently held by the SNP with a majority of 2

Getty

Currently held by Labour with a majority of 20

Getty

Currently held by the SNP with a majority of 21

Getty

Currently held by independent, formerly Labour, MP Ian Austin with a majority of 22

LivingInMediocrity

Currently held by Labour with a majority of 30

Derek Harper

Currently held by the Conservatives with a majority of 31

Rob Candish

Currently held by the Conservatives with a majority of 45

Robin Webster

Currently held by Labour with a majority of 48

Jaggery

Currently held by the SNP with a majority of 60

Alec MacKinnon

Currently held by the SNP with a majority of 75

Christine Johnstone

Currently held by the SNP with a majority of 2

Getty

Currently held by Labour with a majority of 20

Getty

Currently held by the SNP with a majority of 21

Getty

Currently held by independent, formerly Labour, MP Ian Austin with a majority of 22

LivingInMediocrity

Currently held by Labour with a majority of 30

Derek Harper

Currently held by the Conservatives with a majority of 31

Rob Candish

Currently held by the Conservatives with a majority of 45

Robin Webster

Currently held by Labour with a majority of 48

Jaggery

Currently held by the SNP with a majority of 60

Alec MacKinnon

Currently held by the SNP with a majority of 75

Christine Johnstone

Worryingly, the Labour Party websitesprivacy policy, under How we protect your information, makes no mention of any technical cybersecurity measures. It does not even specify whether the party uses a certified data centre.

It appears that this Labour breach (a DDoS or Distributed Denial of Service) was not a highly sophisticated form of cyber attack. These weapons which, if ever successful, could seriously disrupt or even swing an election can be easily sourced by anyone on the dark web. There is a de facto right to bear digital arms and no one is taking it seriously.

There is every chance, however, that a foreign government was directly or indirectly behind this attack. Russia is best-known for having a high level hacking capability that is directed from within the Kremlin, but China, Iran, and even North Korea are known to have hacker special forces within their military and intelligence apparatus.

A state actor could have outsourced this to attempt to cover their tracks, or perhaps even deliberately used a relatively low-tech method to make it look like it was a small hacktivist group rather than a foreign government.

The only thing we can say with certainty is that our democracy is vulnerable. This is not a particular criticism of the Labour Party, or even all political parties. Recent successful cyberattacks have targeted large companies, and the fact that this hack is believed to have been successfully defended against suggests that Labour had at least some measures in place.

Political parties must be held to a higher standard than other organisations, however. I know small businesses with more robust security measures than the political parties who make up our parliament, with all the consequences for national security that come with that.

More broadly, the threat is even bigger. Political parties have access to a huge amount of personal data. The Labour Party, for example, has detailed data on half a million members. But like any major party, they will also have a data operation that seeks to profile every British voter.

This big data makes political parties more effective, but also makes them more attractive targets for cyber attackers. Any hacker looking for a huge data haul in an organisation that is perhaps bureaucratic or out-dated in its security measures would quickly find him or herself setting their sights on British political parties.

Support free-thinking journalism and attend Independent events

No-one knows how exactly this data has been collected, because there are almost no rules about this: laws likeGDPRare, as Edward Snowden recently claimed, a paper tiger, focussing on data protection, not data collection. This means that there is likely a much larger data haul within political parties than many of us realise.

It is time for the Electoral Commission to take this seriously. Fraudulent postal ballots might corrupt a single constituency, but a successful hack can destroy our entire democracy. Some may say it is just a matter of time.

JamalAhmedis aFellow of Information Privacyand founder ofKazient Privacy Experts

Continued here:
Almost anyone could have cyber-hacked the Labour Party and now our democracy is under threat - The Independent

The Community Reacts To Edward Snowden On Twitter (2019-11-12) – Global Real News

Hola! Today we did a serious analysis of Edward Snowdens Twitter activity. So lets do it. These are the main things: as of 2019-11-12, Edward Snowden (@Snowden) has 4171034 Twitter followers, is following 1 people, has tweeted 4424 times, has liked 301 tweets, has uploaded 372 photos and videos and has been on Twitter since December 2014.

Going from top to bottom, their latest tweet, at the time of writing, has 56 replies, 179 retweets and 1,346 likes, their second latest tweet has 6 replies, 108 reweets and 275 likes, their third latest tweet has 31 replies, 119 retweets and 1,026 likes, their fourth latest tweet has 3 replies, 80 retweets and 344 likes and their fifth latest tweet has 2 replies, 73 retweets and 196 likes. (We could keep going, but we think you get the idea )

MOST POPULAR:

Going through Edward Snowdens last couple-dozen tweets (including retweets), the one we consider the most popular, having let to a very nice 161 direct replies at the time of writing, is this:

That looks to have caused quite a bit of discussion, having also had 2642 retweets and 5810 likes.

LEAST POPULAR:

Now what about Edward Snowdens least popular tweet as of late (again, including retweets)? We have concluded that its this one:

That only had 2 direct replies, 73 retweets and 196 likes.

THE VERDICT:

We did a huge amount of of research into Edward Snowdens Twitter activity, looking through what people are saying in response to them, their likes/retweet numbers compared to the past, the amount of positive/negative responses and so on. We wont drone on and on about the numbers, so our verdict is this: we believe the online sentiment for Edward Snowden on Twitter right now is good, and most people like them.

Thats it for now. Thanks for coming, and write a comment if you disagree with me. However, we wont publish anything overly rude.

Continue reading here:
The Community Reacts To Edward Snowden On Twitter (2019-11-12) - Global Real News

Another leading House Republican decides to retire – World Socialist Web Site

By Philip Guelpa 12 November 2019

New York Congressman Peter King announced that he would not seek re-election to the House of Representatives next year. As the longest-serving Republican in New Yorks congressional delegation, his departure adds to a growing number of long-time Republican legislators who are abandoning the party in the run-up to the 2020 election, where they would share the ballot with President Donald Trump.

King represents an upscale district that extends along the south shore of Long Island, with a median household income of $90,614, making it 21st out of 435 districts in the United States. He has held the seat for 28 years, starting out on the right wing of the Republican Party and ending up, without changing his own positions, characterized as a moderate, because of the drastic shift to the right by the Republican Party and bourgeois politics as a whole.

While the 75-year-old King couched his departure in personal terms, it is clear that his retirement is at least in part a response to the defeat of the Republicans last year, and the likelihood that the Republicans will remain in the minority in 2020. The Republican losses in 2018 placed King in the minority and stripped him of most of his political influence in the House.

King's own margin of victory fell from 24 points in 2016 to 6 points in 2018, and 2020 was looking even closer. His likely opponent in next years election is Jackie Gordon, an African-American councilwoman in Babylon, Long Island, who is a 29-year veteran of the US military.

Gordons campaign website is typical of those candidates the WSWS profiled in the 2018 campaign as the CIA Democrats, veterans of the military-intelligence apparatus who highlighted their national-security credentials as the focus of their campaigns, in keeping with the Democrats effort to divert all popular opposition to Trump behind the CIA-instigated anti-Russia campaign.

Her campaign website declares: Over her 29-year career in the Armed Forces, Jackie served our country overseas as a platoon leader in Germany during Operation Desert Storm, as an operations officer at Guantanamo Bay during the Global War on Terror, as a battle captain in Baghdad during the U.S.-led invasion of Iraq, and as Commander of the 310th Military Police Battalion in Afghanistan in 2012. She retired from the Army Reserve with the rank of Lieutenant Colonel in 2014.

King himself has the closest connections to the military-intelligence apparatus. He served two different terms as chairman of the House Committee on Homeland Security, and is particularly vociferous in his defense of domestic spying. But his political position has been undermined by the shift, over the past two elections, by upper-middle-class suburban voters like those in his district towards the Democrats.

The New York Times praises King for his ability to reach across party lines to enact bipartisan legislation. While considered a moderate among current Republicans, Kings political positions are far to the right. He has long been especially vicious on immigration. He was a co-sponsor of the 2005 Border Protection, Anti-Terrorism and Illegal Immigration Control Act. The bill, which was passed by the House but not by the Senate, would have, among other things, supported the building of a wall along parts of the Mexican border, a decade before this issue was made infamous by Donald Trump. In 2006, King vehemently opposed the so-called guest worker program proposed by the Bush administration. Its not the kind of issue you can compromise on. Either youre giving amnesty to people who are here illegally, or you arent, railed King.

Regarding unaccompanied minors crossing the Mexican border, King called last year for secret police-style in-depth vetting not only of unaccompanied minors, but of their host familiesoften distant relatives of the youth, their only connection in the US. A disproportionate number of the MS-13 members are unaccompanied minors, King said, echoing the demagogic accusations made by Trump.

The Republican has also been outspoken in attacking democratic rights, free speech and freedom of the press. He supports the frame-up and persecution of Julian Assange. In 2017, when the State Department announced new charges against Assange, alleging that he had conspired with Edward Snowden to disclose NSA spying, King stated, in an interview with CNN, Im glad that the Justice Department has found a way to go after Assange. Hes gotten a free ride for too long. King had earlier said of Snowden, I think Edward Snowden is a defector and a traitor. According to King, there were no abuses by the NSA. He called for the prosecution of journalists, including Glenn Greenwald, who published material leaked by Snowden.

Kings departure reflects a growing political trend. Over the past several months, two dozen congressional Republicans have announced their retirements, far more than the number of Democrats doing the same. In some cases, as with Francis Rooney in Florida, the congressman publicly vacillated on the question of impeachment, and within a day or too had announced his retirement.

King sits on the House Intelligence Committee and has been at the Trump impeachment inquiry hearings. In his retirement statement, King said that he would vote against the Trump impeachment and would support him in the next election. However, his close ties with the military-intelligence apparatus, which is the major institutional force motivating the drive against Trump, could bring that into question.

Read more from the original source:
Another leading House Republican decides to retire - World Socialist Web Site

Edward Snowden Is Doing Great On Twitter (2019-11-11) – Global Real News

Whats up. Today we did a serious analysis of Edward Snowdens Twitter activity. Lets jump right into it. First, the simple stuff: as of 2019-11-11, Edward Snowden (@Snowden) has 4169083 Twitter followers, is following 1 people, has tweeted 4405 times, has liked 284 tweets, has uploaded 365 photos and videos and has been on Twitter since December 2014.

Going from top to bottom, their latest tweet, at the time of writing, has 7 replies, 91 retweets and 267 likes, their second latest tweet has 4 replies, 77 reweets and 200 likes, their third latest tweet has 7 replies, 128 retweets and 225 likes, their fourth latest tweet has 236 replies, 5,107 retweets and 8,733 likes and their fifth latest tweet has 109 replies, 1,186 retweets and 5,666 likes. That gives you an idea of how much activity they usually get.

MOST POPULAR:

Going through Edward Snowdens last couple-dozen tweets (and retweets), the one we consider the most popular, having incited a very nice 8696 direct replies at the time of writing, is this:

That looks to have caused quite a ruckus, having also had 13995 retweets and 81792 likes.

LEAST POPULAR:

And what about Edward Snowdens least popular tweet in the recent past (including any retweets)? We reckon its this one:

That only had 4 direct replies, 77 retweets and 200 likes.

THE VERDICT:

We did a huge amount of of research into Edward Snowdens Twitter activity, looking through what people were saying in response to them, their likes/retweet numbers compared to the past, the amount of positive/negative responses and more. We wont bore you with the details, so our conclusion is this: we say the online sentiment for Edward Snowden on Twitter right now is just OK.

Thats it for now. Thanks for reading, and leave a comment if you disagree or agree with me. Just dont write anything too mean.

See original here:
Edward Snowden Is Doing Great On Twitter (2019-11-11) - Global Real News

China’s J-20 Stealth Fighter Surely Has F-35 ‘DNA’ – The National Interest Online

Key Point:China is the world's leader in stealing and reverse-engineering other countries products.

Photos of the J-20 provide an up close and personal look at the fuselage of the new interceptor. But the photos also appear to show a sensor system that looks awfully similar to the Lockheed Martin Electro-Optical Targeting System (EOTS) on the front of the F-35 Lighting II.

Theres a reason for this: In 2007, Lockheed Martin dealt with something of acyber Oceans 11when Chinese hackersstoletechnical documents related to the development of the F-35. The details on the hack, eventually revealed in documents leaked by Edward Snowden, are just one example ofChinese attemptsto steal foreign aviation technology; as recently as 2017, Chinese hackerswent after Australian F-35defense contractors, nabbing even more info on the cutting-edge fighter.

Although the two electro-optical systems pictured above are not identical, they share quite a few similarities in shape and placement: compared to the Eurofighter or Su-57s electro-optical systems and Infrared Tracking Systems (IRTS), respectively, which are also mounted on top of the fuselage, the differences between the Lockheed Martin and J-20s Systems are relatively minor. The systems positioning under the nose of the aircraft also reinforces that the J-20 is probably designed for both long-range strike missions against ground targets and interceptor duties. However, the J-20 EOTS appears to be less capable than the F-35 equivalent, judging by the size and layout of the J-20 EOTS enclosure.

Much about the J-20 is shrouded in secrecy, but the plane is most likely powered by the same two AL-31F engines which are used in the Su-27, a Russian fighter that is capable of a top speed of Mach 2.3. Butthe J-20 could also be flying withindigenous (but less reliable) WS-10B engines, due to a lack of Russian engines or as a stopgap until the more powerful WS-15 jet engines are ready for operational use. And while parts of the design of the J-20 appear to resemble the F-22 and its stealthy curves, these similarities could be skin deep as the angularity on the jet inlets and wings remain quite different, and the J-20 lacks all-aspect stealth. Recently the Indian Air Forceclaimed they could trackthe J-20 using the Su-30MKIs electronically scanned Phazotron Zhuk-AE radar.

Although the J-20 has been pushed into service, recentproblems with the J-15carrier-based fighter suggest that the Chinese answer to the F-22 isnt quite ready for prime-time despite propaganda fromChinese-owned media outletsthat portray the J-20 as a fully-armed and operational battle station. That certainly sounds familiar

This first appeared in Task and Purpose here.

Image: Reuters.

Excerpt from:
China's J-20 Stealth Fighter Surely Has F-35 'DNA' - The National Interest Online

New data-crunching technologies used by spy agencies could threaten civil liberties, analyst warns – CBC.ca

Rapid technological advances in data collection and analysis are transforming the way spy agencies work, potentially putting civil liberties at risk, an Israeli intelligence expert has warned the Canadian security community.

The organizations responsible for keeping people safe must ensure privacy and basic rights are not compromised in the process or they risk losing public faith, Shay Hershkovitz said in a presentation to the Canadian Association for Security and Intelligence Studies.

Spycraft is being revolutionized by the growing number of smart devices, almost-unlimited data storage and the advent of artificial intelligence, Hershkovitz told the association's recent annual conference in Ottawa.

"Transparency will be key here, and legislators will have to limit the use of these technologies," he said.

"If intelligence agencies will not ask these questions and will not lead the public debate, they will be dragged into it kicking and screaming, and everyone will suffer and lose."

Hershkovitz, a senior research fellow and former intelligence officer in Israel, attended the conference at the Canadian War Museum, though a sudden illness meant the gathering of security officials and academics saw a pre-recorded, multimedia presentation of his ideas about the future of one of the world's oldest professions.

"If we really want to learn what intelligence will look like, we must look outside the national-security establishment that is, we should explore not only what governments are doing but, more important, what is happening in the private sector and in academia," he said.

By next year, some 50 billion devices will be connected to the internet, growing to 100 billion devices by 2025, said Hershkovitz, head of research at the XPRIZE Foundation, a non-profit organization in California that manages public competitions intended to encourage beneficial technologies.

"The inevitable conclusion is that in the near future, in about five years from now, information will be spewing from every street, every car, every house and even from the sky," he said.

The price of data storage, meanwhile, is falling steadily. The cost of storing one gigabyte of data in 1980 was about half a million dollars, but just two cents today, he said.

At the same time, the flood of data will only speed up the development of artificial intelligence, Hershkovitz predicted.

Intelligence agencies have traditionally made decisions to collect information about specific people and groups, taking away resources that could have been used to monitor other targets, he said. Now they can collect and sort information on a massive scale and decide later what information already in hand is most relevant.

Agencies will have to decide what information to store, and for how long, and analysts will need to work side-by-side with computers to sift the huge amounts of data, Hershkovitz added.

Revelations in recent years by former U.S. spy contractor Edward Snowden about widespread surveillance of communications created public awareness about the privacy risks of digital technologies and society's increasing reliance on them.

Newly enacted security legislation recognizes the burgeoning role of big data, requiring the Canadian Security Intelligence Service to seek a judge's permission to keep datasets that primarily contain personal information about Canadians.

During a conference panel discussion, engineer and lawyer Samuel Witherspoon emphasized the continuing need for humans to help make sense of such information.

Key decisions, possibly involving life or death, can't simply be left to algorithms, said Witherspoon, co-founder of IMRSV Data Labs Inc., which is teaching computers to read, hear and see. "I think that's an incredibly problematic approach."

The intelligence community will have to grapple with the necessary restraints as storing vast amounts of data becomes even less expensive in coming years, said Benoit Hamelin, who has worked as a developer, researcher and manager at startup companies involved in cyberdefence and threat detection.

"Of course there are ethical implications," he said. "We have to set out an ethical framework."

Originally posted here:
New data-crunching technologies used by spy agencies could threaten civil liberties, analyst warns - CBC.ca

Huawei Has Defied Trumps Blacklist: So What Happens Now? – Forbes

LightRocket via Getty Images

Back in May, when U.S. President Trump stripped Huawei of its U.S. supply chain, the companys short to medium term future looked bleak. The blacklist was aimed at 5G networking equipment, but it was Huaweis consumer goods business that seemed to be hit hardest. Huawei execs forecast billions in lost revenue as CEO Ren Zhengfei talked survival: It's good enough for us to just survive, he told Bloomberg in May, you can come back to interview us in two or three years and see if we still exist.

Fast forward six months, though, and its all change. Huawei defies the odds to lead the global telecoms market after 180 days on the U.S. trade blacklist, announced a South China Morning Post headline on November 8. Performance, it reported, that has defied early predictions that it would stumble under the U.S. trade ban. And this isnt a slant on the truthwith this story, there are no rose-tinted spectacles in sight.

Far from losing the hard-fought number two slot for global smartphone sales it won from Apple last year, Huawei has continued to grow, leaving Apple further behind and chasing down Samsung for the global crown. This year, the blacklisted company has shipped 200 million smartphones 64 days faster than it managed in 2018pre-blacklist. Huawei targeted 2020 as the year it would overtake Samsung. It remains on course to do exactly that. Samsung is no slouchaccording to Canalys it posted annualised growth of 11% in the third quarter this yearHuawei, though, hit 33%.

So all good on the consumer front, but what about sales of 5G networking equipment. Well, despite the blacklist, Huawei still leads the world. In the first quarter of 2019, despite a relentless U.S. campaign against the company, Huaweis market share was 28%. During the following quarter in which the blacklist was put in place, this increased to 29%. Second-placed Nokia remained a distance behind, at around 16%.

Worse for the U.S., Reuters reported that half of Huaweis 65+ 5G contracts are in Europethe primary international battleground between Washington politicians and Shenzhen execs. A recent EU report warned of the dangers associated with a dominant 5G player from an authoritarian regime. But the two key battlegrounds, Germany and the U.K., remain undecided and could still opt for Huawei. If that happens, it is likely that other markets around the world will follow suit. If key markets, especially the U.K., allow Huawei into their networks, it undermines the U.S. case considerably.

So what went wrong with the U.S. campaign? In a wordChina. Huaweis domestic market has pulled hard enough to make all the difference. Huaweis overall growth was strong, but its performance in China was exceptionala 66% increase catapulting the company to a 42% market share. The company is chasing down an extraordinary 50% market share of the worlds largest smartphone marketa market that has been a recent nightmare for both Apple and Samsung as they struggle to compete. Huawei eased past the $100 billion revenue mark last year for the first time, after a decade of uninterrupted growth. Against the odds, it looks set to do the same this year.

There are three allegations behind the U.S. campaign against Huawei. The first that the company will facilitate espionage or data theft at the behest of Chinas intelligence agencies if asked. The second that the company receives state subsidies at the expense of non-Chinese competitors. And the third that its technologies have been used to help suppress Chinas ethnic minorities, most notably the Uighurs in Xinjiang.

Underpinning Huaweis defense against U.S. claims has been a carefully orchestrated media campaign that was underway before the sanctions were in place. Back in February, at the flagship Mobile World Congress event in Barcelona, Huawei hit back at the U.S. in front of its industry peers. The companys chairman Guo Ping used a keynote speech to remind the world about the cybersecurity controversies emanating from the U.S. entered around the Edward Snowden revelations. As I wrote at the time, the approach has all the hallmarks of a carefully orchestrated line of defense that has been in the works for some timeand its a very good one.

In short, that campaign hasnt stopped since. We have seen a new transparency from Shenzhen, open access to the once reclusive CEO, an open-door policy at HQ, a growing team of Western media and PR professionals drafted in to shape the messages and manage the media. And those messages have focused on innovation, investment, legacy, history and performance. All underpinned by trust, loyalty and consistent denials of any security wrongdoing.

Behind all this has been a darker message, though. Essentially Huawei is offering the world a choice. Take the U.S. line, swallow its tech dominance through the likes of Google, Apple, Microsoft, Amazon, Facebook and Qualcomm. Or push back, dont take it all at face value, and support this leading non-U.S. player as it carves out a new way. The messaging around a replacement for Android itself or a replacement for Google Mobile Services aligns with this. The worlds consumers dont want to move from Google, but in truth no company has offered them a viable alternative in a decade.

Huawei has ridden out the storm. Between its 5G contracts and its smartphone market position it is well protected for another 12-18 months, with perhaps another 10% market share in China on offer to offset any slowing non-China sales. Beyond that, there are one of two paths open to the company. Either Google (and the others) will be returned under Commerce Department licenses, in which case the company will be even stronger, even more of a threat to its competition. Or the blacklist will hold, in which case the company will invest in Huawei Mobile Services and in an app ecosystem to wean millions to its new third way.

Unless there is a significant change in the U.S. stance, this analysis on Huawei will continue back and forth. And the more the company is seen to ride out its sanctions, the more likely the U.S. will trade away more restrictions for trade talk benefits while they still carry some weight. Meanwhile, behind the scenes, U.S. tech giants continue to lobby for a return to business as usual. What is certain, is that there was no expectation that Huawei would field the first six months of its blacklist as well as it has. For the U.S. to campaign this strongly against a commercial enterprise is unprecedentedthe result of that campaign, though, is arguably even more so.

See the original post:
Huawei Has Defied Trumps Blacklist: So What Happens Now? - Forbes

The movies and books we’d give as gifts – Engadget

Die Hard 4K Blu-ray

Die Hard is a Christmas movie. You know this in your heart to be true. Buy it in 4K and give it to every John, Hans and Holly on your holiday shopping list. -- Andrew Tarantola, Senior Editor

A millennial young woman's true coming-of-age story, set in Silicon Valley startups, Uncanny Valley is an incisive peek at tech culture circa 2012 and what it meant to gain access to a system that has now expanded far beyond the Bay Area. Anna Wiener contrasts her twentysomething wandering with the messianic certainty of a hyper-optimistic tech industry. It's a paradox many young adults are encountering -- and perhaps an apt reflection for the entry-level coder on your list. -- Chris Ip, Associate Features Editor

If you have a little one on your holiday shopping list more interested in Jack Skellington than Santa Claus, we have the book for you! In Will Cats Eat My Eyeballs? mortician and best-selling author Caitlin Doughty answers 35 of people's most burning questions about what happens after we kick off with humor, grace and calm candidness. -- A.T.

For the voracious reader on your list, Wanderers is a must-have. Tipping the scales at 800 pages, this apocalyptic end-of-the-world tale dives into a world bewitched with a mysterious malady that turns its victims into sleepwalkers. Difficult to harm and dangerous to touch, these sleepwalkers do not speak or wake; they just walk toward a singular destination known only to them. Their family and friends serve as shepherds defending these "flocks" as they shamble forward, which quickly becomes a deadly proposition when an ultra-violent militia starts targeting the sleepwalkers.

Teenaged Shana is one such shepherd. Her quest to save her sister hinges on solving the mystery of the sleepwalker sickness, but the secret behind the epidemic could very well tear an already fractured nation far beyond its breaking point. -- A.T.

Avengers: Endgame arrived in theaters earlier this year, but the 4K Blu-ray version only dropped in August. If an avid Marvel film fan on your holiday list hasn't managed to pick up this Blu-ray yet, it's well worth adding to their collection. The film is an epic follow-up to its slightly less acclaimed precursor, Avengers: Infinity War. Heck, if your giftee has been lax about collecting them, you may as well get both. As usual, the package includes both the physical disc and a digital code, so owners can enjoy the uncompressed media experience while also having the freedom to watch on the fly from various digital platforms. It's presented in Dolby Atmos audio and HDR10, so those who've invested in a capable home-theater setup can enjoy a pretty stunning cinematic experience. -- Jon Turi, Homepage Editor

Mary H.K. Choi has emerged as an author who knows how to write about young romance through social media and texts -- which is basically how all romance works now. Her latest is Permanent Record, a young adult novel centered on two protagonists: a bodega worker who dropped out of college and a pop star beloved by her Instagram following. It's one for the teens in your life, or the adults trying to understand them. -- C.I.

Despite sharing a title, this is certainly not the same mood as the young adult romance above. Instead, Edward Snowden's memoir is both a thriller and a reflection on the pervasiveness of big data. It charts his childhood instinct for gaming the system (case in point: changing the time on clocks in the family house to stay up late) as well as his path from the army to the CIA to becoming an NSA contractor. Then, of course, is the the play-by-play of his whistle-blowing. The memoir is a glimpse at what it took to reveal the extent of digital mass surveillance, a phenomenon that six years after Snowden's revelations, we all accept as normal. -- C.I.

The Expanse and The Boys have both been breakout hits for Amazon Prime this year. The Expanse follows a ragtag team of antihero spacefarers as they defend the solar system from alien threats and human conspiracies. But the TV series, as great as it is, only explores a sliver of the Expanse universe. If there's a fan of the show on your holiday shopping list, they're going to flip if you get them this eight-story set of Hugo Award-winning novels by James S. A. Corey, ahead of the ninth and final book's release in 2020.

Conversely, if the sci-fi fan on your list is big on antiheroes but not so much space adventures, introduce them to The Boys. This four-volume graphic novel series from Garth Ennis and Darick Robertson tells of a world dominated by corrupt superhuman "heroes" and the corporate powers that control them. The only ones willing and able to stand up in this dystopia are a motley team of special operatives, assassins and one poor schmuck in way over his head. This story is a must-read, but be warned: Things get real bloody, real quick. -- A.T.

For tech enthusiasts who have their eye on the future, there's an easily consumable read on computing's history written by Howard Rheingold called Tools for Thought. He covers some of the key figures in the history of coding and tech going much further back than the 1970s homebrew explosion in Silicon Valley. The book was originally published in 1985, and as a futurist, Rheingold tried to imagine what was coming next. That provides an interesting quirk, reading his predictions and perspective after the fact while he was in the middle of technology's still-emerging story. This updated version, released in 2000, has an afterward with interviews including some of the document's key players, helping to close the circle, at least for now. -- J.T.

Hackers of the world unite and give Cult of the Dead Cow to the white hat on your gift list. This is a fantastic oral history of one of the world's most powerful and prolific hacking collectives. You probably haven't heard of it -- because it's that good -- but the cDc has long sought to protect freedom, security and democracy around the globe through its efforts. Author Joseph Menn recounts the rise and diffusion of the world's premiere hacking supergroup. -- A.T.

If you've ever thought your loved ones spend too much time watching Netflix and should really pick up a book once in a while, the Murderbot Diaries might be right up their alley. This series of novellas has plenty of action and existential angst, they read fairly quickly and the titular character is pretty relatable to anyone who'd rather stay in and binge their favorite shows than deal with people, because that's all Murderbot wants to do too. -- Kris Naudus, Buyer's Guide Editor

The Calculating Stars, Mary Robinette Kowal's fiction debut, is an extraordinary and inspiring tale of one woman's nigh unstoppable quest to achieve her goal of becoming an astronaut -- patriarchal politics and social conventions be damned. Winner of the 2018 Nebulus, 2019 Locus and 2019 Hugo awards for best novel, The Calculating Stars and its newly released sequel, The Fated Sky, will make the perfect gift for any STEM- and space-obsessed teen or adult on your list. -- A.T.

The game-changing transformation of a legacy industry. The pomp and downfall of a billionaire founder. The behind-the-scenes misdeeds and eight-figure party expenditures. Uber embodies much of the tech industry's gargantuan potential as well as its worst impulses, and Mike Isaac, a reporter for The New York Times, chronicles it all. Based on hundreds of interviews, this is both a definitive account and a cautionary tale. -- C.I.

If Rube Goldberg machines have taught us anything, it's that something worth doing right is worth doing in the most convoluted manner possible. And as author Randall Munroe of XKCD fame shows, the same applies to science. In How To, your inquisitive gift recipient will learn how to predict the weather through pixel analysis of Facebook posts, determine their age by measuring the radioactivity of their teeth and even how to take a selfie from space! -- A.T.

Who says manga can't be both entertaining and educational? This series from Riichiro Inagaki (with illustrations by Boichi) follows the efforts of teenage genius Senku Ishigami and his friends as they rebuild civilization after awakening from a mysterious 3,689-year petrified slumber. But fear not, they have science on their side! Filled with lighthearted adventure and laugh-out-loud comedic gags and packed to the rafters with clever explanations of scientific principles, Dr. Stone is the perfect gift for the technologically curious of all ages. -- A.T.

Time travelers are notoriously difficult to shop for. Any clothes you buy them will immediately be out of fashion, and any gadgets you get will become obsolete the moment they step out of the chrono-portal. So this year, give them the gift of knowledge in the form of How to Invent Everything, by Ryan North. This "survival guide for the stranded time traveler" is chock-full of helpful tips and tricks to make the most of one's life should they accidentally jump the wrong direction in time, sideswipe a dinosaur and irreparably break their machine's flux capacitor. -- A.T.

This year, for once, you can get a great gift for the World War II buff on your list without having to endlessly trawl eBay for 80-year-old knickknacks. The Bastard Brigade by Sam Kean recounts the Allies' desperate struggle to keep Nazi Germany and the rest of the Axis powers from developing and deploying a nuclear bomb. From the opening days of the war to the final march on Berlin, Kean's vivid storytelling grabs the reader and doesn't let go until VE Day. -- A.T.

Choose the recently released Spider-Man: Far From Home 4K Blu-ray as a gift for someone who enjoys action, humor and awkward teen romance with tons of pixels. It's the second of Spidey's standalone flicks and seems to be positioning him for bigger things. Overall, the film is a wild ride with Mysterio's mind games and immersive Dolby Atmos audio making it a spectacle to behold. Plus, it's a recent Blu-ray release, so there's a strong chance your intended hasn't snagged it for themselves yet. If this film is still missing in your giftee's collection, it's a timely and affordable idea for someone with the home theater system to let it sing. -- J.T.

It's a film about a family and a vacation -- perfect for the holidays, right? But truly, Jordan Peele's Us is not only one of the best films of the year but also a chilling reflection on our divided times. Just look at the title: It speaks to an us-and-them mentality and doubles as the acronym for "United States." Consider it a sly present if discussing current affairs head on is the real scare at your holiday get-togethers. -- C.I.

There are few things as fun as sitting down to watch a cute family movie that's as entertaining for adults as it is for kids. And there's something for everyone in Pokmon: Detective Pikachu, now available on 4K Blu-ray. For grown-ups, it's a pretty serious film noir about a boy looking for his lost father. For kids, his sidekick is a bright yellow mouse that shoots electricity out of its rear.

The story is interesting enough, but you're really there to be swept away by the charm of Ryan Reynolds. Since you can't play Deadpool in the family room, this will have to do as the next best thing. Plus, there are enough knowing winks and gags to keep everyone entertained between action set pieces. The fact that it's based on a spin-off is a bonus, since showing how Pokmon battles would play out in the real world might look like animal cruelty. -- Daniel Cooper, Senior Editor

More:
The movies and books we'd give as gifts - Engadget

Global Encryption Software Market Industry Analysis and Forecast (2018-2026) – Markets Gazette 24

Global Encryption Software Market was valued US$ 3.45 Bn in 2017 and is expected to reach US$ 9.23 Bn by 2026, at a CAGR of 14% during a forecast period.

The global encryption software market based on component, application, deployment type, organization size, vertical, and region. In terms of component, the encryption software market is classified into solution and services. Based on application, the encryption software market is categorized into disk encryption, file/folder encryption, communication encryption, and cloud encryption. On the basis of deployment type, the encryption software market is segregated into on-premises and cloud. In terms of organization size, the encryption software market is classified into large enterprises, small and medium-sized enterprises (SMEs). Based on vertical, the encryption software market is divided into Banking, Financial Services, and Insurance (BFSI), healthcare, government, and public utilities, telecom and IT, retail, aerospace and defense, and others. Region wise into North America, Europe, Asia Pacific, Middle East & Africa, and Latin America.

The growing concerns of data breaches and privacy compliance regulations are making companies keener to adopt software-based encryption solutions to achieve compliance, improved data security, and better flexibility in operations. Encryption software allows the organizations to safeguard their intellectual property and other sensitive data, thus escalating the market growth over the forecast period. Although this encryption software offer significant benefits, their adoption may experience challenges terms of budget. The deployment options for these solutions are complex and time-consuming, however, the benefits offered by them often overshadow the challenges pertaining to the complexity and the time associated with their deployment.

REQUEST FOR FREE SAMPLE REPORT: https://www.maximizemarketresearch.com/request-sample/Code

In terms of deployment type, the on-premise segment emerged as a dominant deployment segment. However, the cloud-based segment is anticipated to grow considerably over the forecast period. The establishment of new businesses in the developing economies is further expected to propel the demand for cloud-based solutions.

Based on application, the cloud solutions segment is anticipated to witness growth. Data storage is one of the major resources for several industries including banking & financial, retail, and others to move to the cloud. The growing mobile theft and cyber-attacks have led to mandated regulatory standards related to data transfer and its security.

In terms of region, North America leading the global encryption software market, followed by Europe. Owing to rising adoption of technologies and strict data privacy regulatory compliance, North America is anticipated to retain its leadership in the global encryption software market during the forecast period.

Some of the key players in the global encryption software market are Symantec, Microsoft Corporation, Bloombase, Cisco Systems, EMC Corporation, Check Point Software Technologies, IBM Corporation, Intel Security, Trend Micro, and Sophos.

DO INQUIRY BEFORE PURCHASING REPORT HERE: https://www.maximizemarketresearch.com/inquiry-before-buying/Code

Scope of the Global Encryption Software Market

Global Encryption Software Market by Component

Solution ServicesGlobal Encryption Software Market by Application

Disk Encryption File/Folder Encryption Communication Encryption Cloud EncryptionGlobal Encryption Software Market by Deployment Type

On-premises Cloud

Global Encryption Software Market by Organization Size

Large Enterprises Small and Medium-sized Enterprises (SMEs)

Global Encryption Software Market by Vertical

Banking, Financial Services, and Insurance (BFSI) Healthcare Government and public utilities Telecom and IT Retail Aerospace and defense Others

Global Encryption Software Market by Geography

North America Europe Asia-Pacific Middle East & Africa Latin America

Key Players operating in the Global Encryption Software Market

Symantec Microsoft Corporation Bloombase Cisco Systems EMC Corporation Check Point Software Technologies IBM Corporation Intel Security Trend Micro Sophos SAS Institute Inc. WinMagic Inc. OpenPuff Cryptocat KeePass

Browse Full Report with Facts and Figures of Encryption Software Market Report at: https://www.maximizemarketresearch.com/market-report/global-encryption-software-market/20765/

MAJOR TOC OF THE REPORT

Chapter One: Encryption Software Market Overview

Chapter Two: Manufacturers Profiles

Chapter Three: Global Encryption Software Market Competition, by Players

Chapter Four: Global Encryption Software Market Size by Regions

Chapter Five: North America Encryption Software Revenue by Countries

Chapter Six: Europe Encryption Software Revenue by Countries

Chapter Seven: Asia-Pacific Encryption Software Revenue by Countries

Chapter Eight: South America Encryption Software Revenue by Countries

Chapter Nine: Middle East and Africa Revenue Encryption Software by Countries

Chapter Ten: Global Encryption Software Market Segment by Type

Chapter Eleven: Global Encryption Software Market Segment by Application

Chapter Twelve: Global Encryption Software Market Size Forecast (2019-2026)

About Us:

Maximize Market Research provides B2B and B2C market research on 20,000 high growth emerging technologies & opportunities in Chemical, Healthcare, Pharmaceuticals, Electronics & Communications, Internet of Things, Food and Beverages, Aerospace and Defense and other manufacturing sectors.

Contact info:

Name: Lumawant Godage

Organization: MAXIMIZE MARKET RESEARCH PVT. LTD.

Email: sales@maximizemarketresearch.com

Contact: +919607065656/ +919607195908

Website: http://www.maximizemarketresearch.com

Read more from the original source:
Global Encryption Software Market Industry Analysis and Forecast (2018-2026) - Markets Gazette 24