Like Y2K: Will quantum computing be the end of cryptocurrencies? – Sydney Morning Herald

In 2012, when you heard about the wonders of blockchain technology, did you go and buy a big chunk of Bitcoin? Are you now obscenely wealthy?

I did not. Its funny, I got so wrapped up in the value of the underlying technology, I kind of forgot to invest in that part of it.

Cryptocurrencies such as Bitcoin rely on encryption methods that could easily be cracked by a quantum computer.Credit:Getty

Mores the pity. What exactly does Accentures blockchain division do?

We serve Fortune 100 and Fortune 500 companies, so we are constantly working with different industries and going through a very deliberate approach of evaluating how Web3 is impactful for each individual and each industry. Where will the value come from? What are those killer use cases? What clients are best positioned to go after these killer use cases?

We have a dedicated digital currency team thats working with central banks on bank-issued stable coins and central bank digital currency. We have a digital asset markets team fully focused on the modernisation of capital markets. Ive got a supply chain team thats working on using this technology to bring together order to cash [i.e. all business processes related to a sale] and procure to pay [business processes related to procurement from suppliers] and trade finance and logistics. We have all of these components that together form the ingredients for metaverse experiences.

Loading

When youre working with these Fortune 500 companies, is there a certain area of Web3 theyre most interested in?

Industry by industry, there are unique dimensions. With every one of our product company clients were now working with them to think through, do you have a valid digitally native product taking advantage of this tokenisation capability [ability to convert digital products into blockchain assets]? And then similarly, do you have an augmented reality version of your product and do you have a strategy there?

Then there are very industry-specific plays like the redefinition of money and financial services and the emergence of new payment rails, and what money for the metaverse will look like. And then you have these interesting dynamics like supply chains for digitally native products. You need to be able to effectively custody and transport things. Each industry has its own unique dimension to it.

Are there parts of the broader Web3 industry you think wont be around in five years time, or parts that will fail to find an actual use case?

If we look at non-fungible tokens (NFTs) versus fungible tokens, theres this unhelpful focus on what is too frequently a get-rich-quick scheme, all these NFTs with artificial scarcity. If a company only creates ten NFTs of a product because they want a big marketing splash and a wild valuation for them, to me, thats not nearly as interesting as getting your brand to show up everywhere.

Everything that currently exists right now will need to be retrofitted. And that is a big, big job.

Instead, companies should be making millions of fungible tokens and selling them each for $2.99 because I want everyone to be wearing my branded shoe, hat, whatever it is, as they show up in the metaverse.

We just need to move past this artificial scarcity, wild valuation moment and really think through the utility of what digitally native and digitally augmented products will create.

Loading

Youve also got some expertise in the quantum computing space. I know its early stages, but when we have fully functional quantum computers, what does that mean for the security of the blockchain, considering that quantum computers will be able to easily crack modern encryption that things like Bitcoin rely on?

The advancement of quantum does challenge our existing encryption, just as you described, but every advancement is as applicable to offence as it is defence. For anything new that were building now, were already very much considering what the post-quantum cryptography requirements will be. The standards for that are just now emerging.

However, everything that currently exists right now will need to be retrofitted. And that is a big, big job. Its a bit trite to say, but I do equate it to the whole Y2K issue.

But with Y2K, we had the benefit of a known date and a known fix. The challenge we have now is that we dont know when that quantum supremacy will be achieved to break the current RSA encryption. A lot of work has to go into that and so our advice to clients is to get started on that work straight away.

Loading

The major cornerstones of crypto - Bitcoin and Ethereum - arent quantum-proof. How confident are you that theyll achieve that in the timeframes they need to?

We think theres real urgency around being prepared. If good guys develop it first, they will announce it. If a bad actor is the first one to get there, Im not sure theyre going to announce that, instead well just start to see the impacts of it. So getting ready is super important.

The Business Briefing newsletter delivers major stories, exclusive coverage and expert opinion. Sign up to get it every weekday morning.

View post:
Like Y2K: Will quantum computing be the end of cryptocurrencies? - Sydney Morning Herald

Researchers Find Breakthrough on Quantum Computing With Silicon Chips – TechAcute

Researchers from Simon Fraser University were successful in making a breakthrough in the field of quantum technology development. Their study paves the way for creating silicon-based quantum computing processors compatible with the existing semiconductor manufacturing technology.

The researchers light up the silicon chips tiny defects with intense light beams. Stephanie Simmons, the principal investigator of the research, explains that the imperfections of the chips serve as an information carrier. Investigators point out that the tiny defect reflects the transmitted light.

Some of the naturally occurring silicon imperfections may act as quantum bits or qubits. Scientists consider these defects as spin qubits. Also, previous research shows how silicon produces long-lived and stale qubits.

Daniel Higginbottom, their lead author, considers this breakthrough promising. He explains that the researchers were able to combine silicon defects with quantum physics when it was considered to be impossible to do before.

Furthermore, he notes that while silicon defects have been studied extensively from the 1970s to the 1990s and quantum physics research being done for decades, its only now that they saw these two studies come together. He says that by utilizing optical technology in silicon defects[theyve] have found something with applications in quantum technology thats certainly remarkable.

Simmons acknowledges that quantum computing is the future of computers with its capability to solve simple and complex problems, however, its still in its early stages. But with the use of silicon chips, the process can become more streamlined and bring quantum computing faster to the public than expected.

This study demonstrates the possibility of making quantum computers with enough power and scale to manage significant computation. It gives an opportunity for advancements in the fields of cybersecurity, chemistry, medicine, and other fields.

Photo credit: The feature image is symbolic and has been taken by Solar Seven.Sources: Chat News Today / Quantum Inspire

Did this article help you? If not, let us know what we missed.

Go here to read the rest:
Researchers Find Breakthrough on Quantum Computing With Silicon Chips - TechAcute

"Quantum materials" could give the human brain a run for its money – Inverse

Why cant a computer both play chess and recognize images familiar to most people? Its a simple question that cuts to the core of the biggest challenges in computing today: Despite their immense processing power, todays computers still fail when confronted with some of the most basic human tasks.

The problem stems from computers lack of general intelligence, or the ability to excel at more than just one task. Despite our range of niche obsessions, us humans tend to be pretty good at this but we cant say the same for machines. While the Deep Blue supercomputer bested humans at chess over two decades ago, it would have utterly failed at, say, comprehending the meaning of a handshake (so it doesnt sound too fun to hang out with).

Now, powerful machine learning algorithms are edging closer toward general intelligence by demonstrating their ability to recognize patterns and emulate human speech. But true general intelligence remains difficult for devices to achieve.

To tackle this feat, researchers have recently proposed computer designs inspired by the human brains structure, specifically its tens of billions of neurons that are laced together into intricate, interrelated networks.

Even the massive supercomputers that require enough energy to run a small town havent been able to achieve the intelligence inherent in the human mind. Xinhua/Getty Images

Take, for instance, the SpiNNaker supercomputer from the University of Manchester in England. The high-tech machine can emulate tens of thousands of neurons to mimic the way a brain works.

But thats still only a fraction of the number of neurons contained in our powerful heads, and SpiNNaker is a long way from being human. Instead, Axel Hoffmann, a materials scientist at the University of Illinois at Urbana-Champaign, hopes that the solution lies in futuristic quantum materials.

In a paper published in the journal APL Materials last month, Hoffmann and his co-authors explore how these materials would enable computer chips to behave like human neurons. These chips could carry out functions far more efficiently than most computers, and even form networks that behave like regions of the brain.

The Power Problem Its difficult to create computers with human-like cognition because we need massive amounts of power to emulate the brain. While our minds only require about 20 watts of power to do their thing, a supercomputer like Chinas Tianhe-2 sucks up 17.8 million watts (enough to power a small town) and still hasnt reached general intelligence.

Clearly, throwing more processors at the problem isnt a sustainable solution. Thats why scientists like Hoffmann are rethinking the basic architecture of a computer, which encodes information using long strings of ones and zeros.

Maintaining those ones and zeros takes a lot of energy, partly because computers need to keep them strictly separated, Hoffmann says.

And unlike the mind, traditional computers carry out their processing separately from their memory. That means they use a lot of energy simply carrying information back and forth from memory to processor, which sounds pretty exhausting.

By imitating networks of neurons in the human brain, computer chips made of quantum materials could allow for more efficient, intelligent devices that perhaps rival our own minds.ARTUR PLAWGO / SCIENCE PHOTO LIBRARY/Science Photo Library/Getty Images

Recreating Neurons To circumvent this problem, Hoffmann and other researchers want to make computer chips inspired by the basic mechanics of our brains neurons and synapses. In their APL Materials paper, Hoffmann and his co-authors lay out an innovative approach that would incorporate circuits made not of silicon, the current standard ingredient, but of quantum materials.

A quantum material may sound far-fetched, but Hoffmann says its simply an umbrella term for materials with properties that traditional models of physics cant quite explain. (Quantum materials are also distinct from quantum computers, which rely on units of information called qubits that hold superpositions of a one and a zero simultaneously.)

Specifically, Hoffmann is most interested in materials that can change state from, for instance, a zero to a one with very little energy input, also called non-linear responses. This property is found in substances such as vanadium dioxide, a dark blue compound that can transition efficiently from a conductor to an insulator, and do so at nearly room temperature.

Hoffmann likens such responses to what goes down in water when its heated or cooled. When we change the temperature of water, not much happens until suddenly it either freezes or starts boiling, he says.

Crossing the threshold The neurons in our brains rely on similar tipping points, also called thresholds. Mimicking that property within a computer circuit made of vanadium oxide could unlock super-powerful computing abilities at a fraction of the energy cost. This could be a big step forward in establishing energy-efficient brain-like systems, Hoffmann says.

To take advantage of these tipping points, researchers can utilize materials that can change how they're magnetized. Theoretically, these materials would oscillate between different magnetic states, benefitting from the kind of non-linear responses Hoffmann is searching for. While it's still an area of developing research, scientists have observed these kinds of magnetic oscillations in layered combinations of metals like iron and rhodium, along with cobalt and nickel.

Metals like the rhodium shown here can be incorporated into materials that switch between magnetic states and act somewhat like neurons.Shutterstock

It appears that these magnetic oscillators can resemble a lot of the properties that we know from natural neurons, he says.

Along with providing computers with brain-inspired efficiency, Hoffman and his colleagues see additional possibilities for machines concocted from quantum materials. For example, when hooked together, magnetic oscillators seem to influence each other, much in the same way that networks of neurons work in sync to perform complex tasks. This behavior could eventually pave the way for general intelligence and perhaps even consciousness.

We believe that larger networks of coupled magnetic oscillators may provide similarly complex dynamics as the natural brain, Hoffmann says.

All in all, this development could mark a major step toward forging artificial intelligence that can rival our own minds. And while theyre at it, computers may even become better conversationalists.

LEARN SOMETHING NEW EVERY DAY.

Excerpt from:
"Quantum materials" could give the human brain a run for its money - Inverse

Vitalik Buterin, The Future Of Ethereum (ETH) And The Challenge Of Quantum Computing – Nation World News

Vitalik Buterin believes that the future of the Ethereum blockchain and crypto ETH is good, but there are many challenges to be solved.

Not long ago the founder of Ethereum made public about the future of blockchain which is widely used for various crypto projects. Heres the gist of what he told BUIDL in Asia programahead of plan Sickness going to Ethereum 2.0 Which will be held in September 2022.

The ZK-Rollup project is considered the most important foundation Example The Ethereum blockchain is getting widespread.

There are ZK-rollups Crypto transaction protocol that allows indirect transactions via the Ethereum blockchain aka off-chain,

This method will radically speed up transactions and increase their volume. In the end this will increase efficiency and expand Example Ethereum blockchain itself, including adoption ETH As for its crypto.

This technique is similar to the technique power network Used to improve from 2018 Example Blockchain Litecoin and Bitcoin.

In the long term, ZK-rollups will outperform optimistic rollup techniques, Vitalik said.

Again according to Vitalik, Ethereum developers should be prepared to face the threat of quantum computing, which is expected to get exponentially better in terms of speed.

The discourse on quantum computing, which is considered a major threat to current blockchain technology, including bitcoin, has been going on since 4 years ago.

Because at that time quantum computing technology experienced significant development, after it was proved that it is capable of computing very complex calculations in just 10 minutes. If you use todays supercomputers, it could take up to thousands of years.

Quantum computing does not rely on the combination of 0 or 1 numbers, binary numbers, but on the concept of qubitwhere two states Can run at once, i.e. 0 or 1 and 0 and 1. This may be because the processor does not take advantage of the electrical dynamics of transistors, but particles at the subatomic level.

This means that the computational speed is millions of times higher than that of todays supercomputers and is expected to continue to increase in the future to make it easier for humans to do their jobs.

The problem is that the smarter quantum computers are, the more they threaten current human cryptographic security systems, including the bitcoin blockchain that uses SHA256.

Vitalik Buterin: Googles quantum computer failed

This huge growth in quantum computing was noted by Vitalik last year, that the power of new computers is not a threat now, but will be in the future.

This is because quantum computing promises a new world of derivative technology, but at the same time poses a threat to traditional technology. This is exactly what happened when the first supercomputer was developed.

You can read the Blockchainmedia.id archive Related to quantum computing on this page,

We are currently working with several artificial intelligence researchers to develop new algorithms that can compete with the high capabilities of quantum computing. This is still a long way off, between 10-30 years from now, said Vitalik. he said. [ps]

Visit link:
Vitalik Buterin, The Future Of Ethereum (ETH) And The Challenge Of Quantum Computing - Nation World News

Mainstream Crypto-Agility and Other Emerging Trends in Cryptography: Part 2 – Security Boulevard

Contact Sales[emailprotected]+1-216-931-0465

In the first article of the two-part series, Ted Shorter, CTO, Keyfactor, discussed a few key trends in cryptography and public key infrastructure (PKI). In this article, the second of the series, he discusses a few more crucial trends to watch out for in cryptography this year.

In todays digital world, cryptography has emerged as one of the most important tools for building secure systems. By properly leveraging cryptography, modern businesses can ensure the integrity, confidentiality, and authenticity of sensitive data that is essential to essential to business operations.

In the first part of this series, we discussed some of the biggest trends andemerging changes in cryptographythat we expect to have a huge impact on a companys business and cryptographic needs. Rounding out the list, here are two more of the most significant trends in cryptography that we expect to see this year.

A growing awareness of supply chain risk, the global drive toward zero-trust, and the widespread adoption of public key infrastructure (PKI) for software security requires that organizations give priority to crypto-agility, the ability to rapidly switch between multiple cryptographic primitives and algorithms without the rest of the systems infrastructure being significantly affected by the changes. In fact,according to Keyfactor and Ponemon Institute, 57% of IT and security leaders have identified crypto-agility as a leading strategic priority in preparing for quantum computing.

Today, speed and security rule the world of enterprise technology. Unfortunately, the two are often at odds, creating a disconnect between DevOps and security teams. DevOps teams need to move fast to develop products that are in line with market needs, and many are not all that concerned about where certificates are issued from and what policies they comply with, so long as they have what they need to keep moving forward at speed. Faced with this primary concern, many DevOps teams have started to issue their own digital certificates, creating numerous blind spots for their security counterparts and leaving their solutions open to risk. In fact, most security teams do not fully know how many certificates have been issued, let alone where they live and when they expire.

The key to bridging this divide without sacrificing speed or security is introducing back-end controls for certificates that get issued through DevOps tools. This approach allows DevOps teams to move as quickly as they need to without changing their existing architecture since they can continue to issue and use certificates the same way they have been. But on the back-end, it gives security teams visibility into every certificate that gets issued to enforce policies and ensure accountability. And with automated certificate lifecycle management, the security team can automatically renew certificates as they expire to help ensure nothing breaks and to manage certificates with the necessary speed.

This type of collaboration will give rise to true crypto-agility. Organizations will use cryptography to its full potential, including rolling out digital identities as needed, securing the software supply chain, and deploying PKI to support DevSecOps, all with the ability to respond to changes rapidly.

The potential impact of quantum technology threatens both national security and the very foundation upon which internet security is based. According to the National Security Agency, a quantum computer of sufficient size and sophistication will be able to break much of the public-key cryptography used on digital systems across the United States.

In early May, the Biden-Harris administration announced an Executive Order that would bolster the National Quantum Initiative Advisory Committee. The committee guides policymaking and will work directly under the White House to ensure President Biden, Congress, federal agencies, and the public have the latest, most accurate information about advances in quantum technology. At the same time, President Joe Biden signed a National Security Memorandum, which outlines steps to mitigate the risks posed to Americas cybersecurity infrastructure. Both directives are intended to advance national initiatives in quantum science and raise awareness of the potential threats quantum computing will bring to the integrity of internet security.

In addition, a number of industry groups, including those in the automotive and medical industries, are developing their own security baselines. As the looming threat of quantum computing draws nearer, we will start to see more adoption of security standards as guidelines or even regulations.

The high-profile cyber incidents of the past year have thrown a spotlight on the sudden and significant impact modern threats can have on an organizations cybersecurity and cryptographic needs. As we muse on what the coming year will bring, trust and agility will become paramount to ensuring businesses continue to operate securely. In the face of the disruptive events of the last year, enterprises have increasingly embraced the zero-trust principle, trust nothing, validate everything. In this model, PKI and machine identities have emerged as essential technologies to authenticate and establish digital trust between users, devices, and workloads across the business.

However, it is important to remember that trust is not static. As the threat landscape evolves and new technologies like quantum computing emerge, security standards will inevitably change. An organizations ability to effectively manage and quickly adapt PKI infrastructure and machine identities to new algorithms, standards, and environments (i.e., their crypto-agility) will be equally important.

The good news is that organizations are becoming more aware of the urgency to become more crypto agile. In ourrecent surveyanalyzing the role of PKI, keys, and digital certificates in securing IT organizations, preparing for crypto-agility was ranked as a top strategic priority for digital security by 57% of IT security professionals. As the threat landscape continues to evolve, cryptographys importance will only grow along with the need for centralized management of machine identities.

In the first article of the two-part series, Ted Shorter, CTO, Keyfactor, discussed a few key trends in cryptography and public key infrastructure (PKI). In this article, the second of the series, he discusses a few more crucial trends to watch out for in cryptography this year.

In todays digital world, cryptography has emerged as one of the most important tools for building secure systems. By properly leveraging cryptography, modern businesses can ensure the integrity, confidentiality, and authenticity of sensitive data that is essential to essential to business operations.

In the first part of this series, we discussed some of the biggest trends andemerging changes in cryptographythat we expect to have a huge impact on a companys business and cryptographic needs. Rounding out the list, here are two more of the most significant trends in cryptography that we expect to see this year.

A growing awareness of supply chain risk, the global drive toward zero-trust, and the widespread adoption of public key infrastructure (PKI) for software security requires that organizations give priority to crypto-agility, the ability to rapidly switch between multiple cryptographic primitives and algorithms without the rest of the systems infrastructure being significantly affected by the changes. In fact,according to Keyfactor and Ponemon Institute, 57% of IT and security leaders have identified crypto-agility as a leading strategic priority in preparing for quantum computing.

Today, speed and security rule the world of enterprise technology. Unfortunately, the two are often at odds, creating a disconnect between DevOps and security teams. DevOps teams need to move fast to develop products that are in line with market needs, and many are not all that concerned about where certificates are issued from and what policies they comply with, so long as they have what they need to keep moving forward at speed. Faced with this primary concern, many DevOps teams have started to issue their own digital certificates, creating numerous blind spots for their security counterparts and leaving their solutions open to risk. In fact, most security teams do not fully know how many certificates have been issued, let alone where they live and when they expire.

The key to bridging this divide without sacrificing speed or security is introducing back-end controls for certificates that get issued through DevOps tools. This approach allows DevOps teams to move as quickly as they need to without changing their existing architecture since they can continue to issue and use certificates the same way they have been. But on the back-end, it gives security teams visibility into every certificate that gets issued to enforce policies and ensure accountability. And with automated certificate lifecycle management, the security team can automatically renew certificates as they expire to help ensure nothing breaks and to manage certificates with the necessary speed.

This type of collaboration will give rise to true crypto-agility. Organizations will use cryptography to its full potential, including rolling out digital identities as needed, securing the software supply chain, and deploying PKI to support DevSecOps, all with the ability to respond to changes rapidly.

The potential impact of quantum technology threatens both national security and the very foundation upon which internet security is based. According to the National Security Agency, a quantum computer of sufficient size and sophistication will be able to break much of the public-key cryptography used on digital systems across the United States.

In early May, the Biden-Harris administration announced an Executive Order that would bolster the National Quantum Initiative Advisory Committee. The committee guides policymaking and will work directly under the White House to ensure President Biden, Congress, federal agencies, and the public have the latest, most accurate information about advances in quantum technology. At the same time, President Joe Biden signed a National Security Memorandum, which outlines steps to mitigate the risks posed to Americas cybersecurity infrastructure. Both directives are intended to advance national initiatives in quantum science and raise awareness of the potential threats quantum computing will bring to the integrity of internet security.

In addition, a number of industry groups, including those in the automotive and medical industries, are developing their own security baselines. As the looming threat of quantum computing draws nearer, we will start to see more adoption of security standards as guidelines or even regulations.

The high-profile cyber incidents of the past year have thrown a spotlight on the sudden and significant impact modern threats can have on an organizations cybersecurity and cryptographic needs. As we muse on what the coming year will bring, trust and agility will become paramount to ensuring businesses continue to operate securely. In the face of the disruptive events of the last year, enterprises have increasingly embraced the zero-trust principle, trust nothing, validate everything. In this model, PKI and machine identities have emerged as essential technologies to authenticate and establish digital trust between users, devices, and workloads across the business.

However, it is important to remember that trust is not static. As the threat landscape evolves and new technologies like quantum computing emerge, security standards will inevitably change. An organizations ability to effectively manage and quickly adapt PKI infrastructure and machine identities to new algorithms, standards, and environments (i.e., their crypto-agility) will be equally important.

The good news is that organizations are becoming more aware of the urgency to become more crypto agile. In ourrecent surveyanalyzing the role of PKI, keys, and digital certificates in securing IT organizations, preparing for crypto-agility was ranked as a top strategic priority for digital security by 57% of IT security professionals. As the threat landscape continues to evolve, cryptographys importance will only grow along with the need for centralized management of machine identities.

In the first article of the two-part series, Ted Shorter, CTO, Keyfactor, discussed a few key trends in cryptography and public key infrastructure (PKI). In this article, the second of the series, he discusses a few more crucial trends to watch out for in cryptography this year.

In todays digital world, cryptography has emerged as one of the most important tools for building secure systems. By properly leveraging cryptography, modern businesses can ensure the integrity, confidentiality, and authenticity of sensitive data that is essential to essential to business operations.

In the first part of this series, we discussed some of the biggest trends andemerging changes in cryptographythat we expect to have a huge impact on a companys business and cryptographic needs. Rounding out the list, here are two more of the most significant trends in cryptography that we expect to see this year.

A growing awareness of supply chain risk, the global drive toward zero-trust, and the widespread adoption of public key infrastructure (PKI) for software security requires that organizations give priority to crypto-agility, the ability to rapidly switch between multiple cryptographic primitives and algorithms without the rest of the systems infrastructure being significantly affected by the changes. In fact,according to Keyfactor and Ponemon Institute, 57% of IT and security leaders have identified crypto-agility as a leading strategic priority in preparing for quantum computing.

Today, speed and security rule the world of enterprise technology. Unfortunately, the two are often at odds, creating a disconnect between DevOps and security teams. DevOps teams need to move fast to develop products that are in line with market needs, and many are not all that concerned about where certificates are issued from and what policies they comply with, so long as they have what they need to keep moving forward at speed. Faced with this primary concern, many DevOps teams have started to issue their own digital certificates, creating numerous blind spots for their security counterparts and leaving their solutions open to risk. In fact, most security teams do not fully know how many certificates have been issued, let alone where they live and when they expire.

The key to bridging this divide without sacrificing speed or security is introducing back-end controls for certificates that get issued through DevOps tools. This approach allows DevOps teams to move as quickly as they need to without changing their existing architecture since they can continue to issue and use certificates the same way they have been. But on the back-end, it gives security teams visibility into every certificate that gets issued to enforce policies and ensure accountability. And with automated certificate lifecycle management, the security team can automatically renew certificates as they expire to help ensure nothing breaks and to manage certificates with the necessary speed.

This type of collaboration will give rise to true crypto-agility. Organizations will use cryptography to its full potential, including rolling out digital identities as needed, securing the software supply chain, and deploying PKI to support DevSecOps, all with the ability to respond to changes rapidly.

The potential impact of quantum technology threatens both national security and the very foundation upon which internet security is based. According to the National Security Agency, a quantum computer of sufficient size and sophistication will be able to break much of the public-key cryptography used on digital systems across the United States.

In early May, the Biden-Harris administration announced an Executive Order that would bolster the National Quantum Initiative Advisory Committee. The committee guides policymaking and will work directly under the White House to ensure President Biden, Congress, federal agencies, and the public have the latest, most accurate information about advances in quantum technology. At the same time, President Joe Biden signed a National Security Memorandum, which outlines steps to mitigate the risks posed to Americas cybersecurity infrastructure. Both directives are intended to advance national initiatives in quantum science and raise awareness of the potential threats quantum computing will bring to the integrity of internet security.

In addition, a number of industry groups, including those in the automotive and medical industries, are developing their own security baselines. As the looming threat of quantum computing draws nearer, we will start to see more adoption of security standards as guidelines or even regulations.

The high-profile cyber incidents of the past year have thrown a spotlight on the sudden and significant impact modern threats can have on an organizations cybersecurity and cryptographic needs. As we muse on what the coming year will bring, trust and agility will become paramount to ensuring businesses continue to operate securely. In the face of the disruptive events of the last year, enterprises have increasingly embraced the zero-trust principle, trust nothing, validate everything. In this model, PKI and machine identities have emerged as essential technologies to authenticate and establish digital trust between users, devices, and workloads across the business.

However, it is important to remember that trust is not static. As the threat landscape evolves and new technologies like quantum computing emerge, security standards will inevitably change. An organizations ability to effectively manage and quickly adapt PKI infrastructure and machine identities to new algorithms, standards, and environments (i.e., their crypto-agility) will be equally important.

The good news is that organizations are becoming more aware of the urgency to become more crypto agile. In ourrecent surveyanalyzing the role of PKI, keys, and digital certificates in securing IT organizations, preparing for crypto-agility was ranked as a top strategic priority for digital security by 57% of IT security professionals. As the threat landscape continues to evolve, cryptographys importance will only grow along with the need for centralized management of machine identities.

In the first article of the two-part series, Ted Shorter, CTO, Keyfactor, discussed a few key trends in cryptography and public key infrastructure (PKI). In this article, the second of the series, he discusses a few more crucial trends to watch out for in cryptography this year.

In todays digital world, cryptography has emerged as one of the most important tools for building secure systems. By properly leveraging cryptography, modern businesses can ensure the integrity, confidentiality, and authenticity of sensitive data that is essential to essential to business operations.

In the first part of this series, we discussed some of the biggest trends andemerging changes in cryptographythat we expect to have a huge impact on a companys business and cryptographic needs. Rounding out the list, here are two more of the most significant trends in cryptography that we expect to see this year.

A growing awareness of supply chain risk, the global drive toward zero-trust, and the widespread adoption of public key infrastructure (PKI) for software security requires that organizations give priority to crypto-agility, the ability to rapidly switch between multiple cryptographic primitives and algorithms without the rest of the systems infrastructure being significantly affected by the changes. In fact,according to Keyfactor and Ponemon Institute, 57% of IT and security leaders have identified crypto-agility as a leading strategic priority in preparing for quantum computing.

Today, speed and security rule the world of enterprise technology. Unfortunately, the two are often at odds, creating a disconnect between DevOps and security teams. DevOps teams need to move fast to develop products that are in line with market needs, and many are not all that concerned about where certificates are issued from and what policies they comply with, so long as they have what they need to keep moving forward at speed. Faced with this primary concern, many DevOps teams have started to issue their own digital certificates, creating numerous blind spots for their security counterparts and leaving their solutions open to risk. In fact, most security teams do not fully know how many certificates have been issued, let alone where they live and when they expire.

The key to bridging this divide without sacrificing speed or security is introducing back-end controls for certificates that get issued through DevOps tools. This approach allows DevOps teams to move as quickly as they need to without changing their existing architecture since they can continue to issue and use certificates the same way they have been. But on the back-end, it gives security teams visibility into every certificate that gets issued to enforce policies and ensure accountability. And with automated certificate lifecycle management, the security team can automatically renew certificates as they expire to help ensure nothing breaks and to manage certificates with the necessary speed.

This type of collaboration will give rise to true crypto-agility. Organizations will use cryptography to its full potential, including rolling out digital identities as needed, securing the software supply chain, and deploying PKI to support DevSecOps, all with the ability to respond to changes rapidly.

The potential impact of quantum technology threatens both national security and the very foundation upon which internet security is based. According to the National Security Agency, a quantum computer of sufficient size and sophistication will be able to break much of the public-key cryptography used on digital systems across the United States.

In early May, the Biden-Harris administration announced an Executive Order that would bolster the National Quantum Initiative Advisory Committee. The committee guides policymaking and will work directly under the White House to ensure President Biden, Congress, federal agencies, and the public have the latest, most accurate information about advances in quantum technology. At the same time, President Joe Biden signed a National Security Memorandum, which outlines steps to mitigate the risks posed to Americas cybersecurity infrastructure. Both directives are intended to advance national initiatives in quantum science and raise awareness of the potential threats quantum computing will bring to the integrity of internet security.

In addition, a number of industry groups, including those in the automotive and medical industries, are developing their own security baselines. As the looming threat of quantum computing draws nearer, we will start to see more adoption of security standards as guidelines or even regulations.

The high-profile cyber incidents of the past year have thrown a spotlight on the sudden and significant impact modern threats can have on an organizations cybersecurity and cryptographic needs. As we muse on what the coming year will bring, trust and agility will become paramount to ensuring businesses continue to operate securely. In the face of the disruptive events of the last year, enterprises have increasingly embraced the zero-trust principle, trust nothing, validate everything. In this model, PKI and machine identities have emerged as essential technologies to authenticate and establish digital trust between users, devices, and workloads across the business.

However, it is important to remember that trust is not static. As the threat landscape evolves and new technologies like quantum computing emerge, security standards will inevitably change. An organizations ability to effectively manage and quickly adapt PKI infrastructure and machine identities to new algorithms, standards, and environments (i.e., their crypto-agility) will be equally important.

The good news is that organizations are becoming more aware of the urgency to become more crypto agile. In ourrecent surveyanalyzing the role of PKI, keys, and digital certificates in securing IT organizations, preparing for crypto-agility was ranked as a top strategic priority for digital security by 57% of IT security professionals. As the threat landscape continues to evolve, cryptographys importance will only grow along with the need for centralized management of machine identities.

Get actionable insights from 1,200+ IT and security professionals on the next frontier for IAM strategy machine identities.

Read the Report

Get actionable insights from 1,200+ IT and security professionals on the next frontier for IAM strategy machine identities.

Read the Report

Go here to see the original:
Mainstream Crypto-Agility and Other Emerging Trends in Cryptography: Part 2 - Security Boulevard

2022-08-09 | NDAQ:WKEY | Press Release | WISeKey International Holding AG – Stockhouse

WISeKey Implementing PostQuantum Algorithms in itsSecure Semiconductors MS6001/MS6003

Geneva August 9, 2022 WISeKey International Holding Ltd (WISeKey ) (SIX: WIHN, NASDAQ: WKEY), a leading global cybersecurity, AI, Blockchain and IoT company, announces substantial progress in the implementation of post-quantum algorithms in its Secure Semiconductors MS6001/MS6003.

During the last two years, WISeKey has made substantial progress in developing post-quantum resistant algorithms by establishing strategic R&D partnerships with MINES Saint-Etienne Research Institute (MINES Saint-Etienne”), an internationally renowned multidisciplinary university and lab created in 1816, aiming to help the international community find cryptography algorithms that will resist future quantum computing based cyber-attacks.

The WISeKey’s team of experts is working with several NIST’s candidates for the MS600X Common Criteria products: Crystals-Kyber for key exchange mechanism, and Crystals-Dilithium for signatures. The partnership is focusing into the practical implementation aspects for both algorithms, considering physical side-channel attack and deep learning process. This work completes the implementation of NTRU and ROLLO algorithms that the team has already studied, paving the way of a complete post-quantum cryptography toolbox.

This post-quantum cryptography toolbox will help to protect against the security threat posed by quantum computers, allowing hybrid solutions no later than 2025 as recommended by the French ANSSI. In addition to this, WISeKey will upgrade its PKI offer, adding new post-quantum features for the IoT market: Secure authentication, Brand protection, Network communications, future FIDO (Fast IDentity Online”) evolutions and additional generally web-connected smart devices that obtain, analyze, and process the data collected from their surroundings.

WISeKey is also working with NIST to define recommended practices for performing trusted network-layer onboarding, which will aid in the implementation and use of trusted onboarding solutions for IoT devices at scale. The WISeKey contribution to the project will be Trust Services for credentials and secure semiconductors to keep credential secure. Specifically, WISeKey will offer INeS Certificate Management Service (CMS) for issuing credentials and VaultIC secure semiconductors to provide tamperproof key storage and cryptographic acceleration.

While quantum computing offers endless perspectives to incredibly increase computing power, hackers will take advantage of this technology to crack cryptography algorithms, corrupt cybersecurity and compromise global economy. Research about quantum computing, namely how to use quantum mechanical phenomena to perform fast computation, was initiated in the early 1980s. The perspectives and unbelievable performances offered by this promising technology are so huge that many countries are sponsoring public/private R&D initiatives.

WISeKey brings its decades of expertise in designing Common Criteria EAL5+ and FIPS 140-2 Level 3 certified hardware based secure elements (MS600x secure microcontrollers, VaultIC, etc.) and in developing hacker resistant firmware. The new algorithms to be evaluated will first have to practically run on WISeKey’s existing and new hardware architectures. The Company will also share its expertise in deep learning AI techniques to prove the robustness of the implementations.

About WISeKey WISeKey (NASDAQ: WKEY; SIX Swiss Exchange: WIHN) is a leading global cybersecurity company currently deploying large scale digital identity ecosystems for people and objects using Blockchain, AI and IoT respecting the Human as the Fulcrum of the Internet. WISeKey microprocessors secure the pervasive computing shaping today’s Internet of Everything. WISeKey IoT has an install base of over 1.5 billion microchips in virtually all IoT sectors (connected cars, smart cities, drones, agricultural sensors, anti-counterfeiting, smart lighting, servers, computers, mobile phones, crypto tokens etc.). WISeKey is uniquely positioned to be at the edge of IoT as our semiconductors produce a huge amount of Big Data that, when analyzed with Artificial Intelligence (AI), can help industrial applications to predict the failure of their equipment before it happens.

Our technology is Trusted by the OISTE/WISeKey’s Swiss based cryptographic Root of Trust (RoT”) provides secure authentication and identification, in both physical and virtual environments, for the Internet of Things, Blockchain and Artificial Intelligence. The WISeKey RoT serves as a common trust anchor to ensure the integrity of online transactions among objects and between objects and people. For more information, visit http://www.wisekey.com.

Press and investor contacts: WISeKey International Holding Ltd Company Contact: Carlos Moreira Chairman & CEO Tel: +41 22 594 3000 info@wisekey.com WISeKey Investor Relations (US) Contact: Lena Cati The Equity Group Inc. Tel: +1 212 836-9611 lcati@equityny.com

Disclaimer: This communication expressly or implicitly contains certain forward-looking statements concerning WISeKey International Holding Ltd and its business. Such statements involve certain known and unknown risks, uncertainties, and other factors, which could cause the actual results, financial condition, performance, or achievements of WISeKey International Holding Ltd to be materially different from any future results, performance or achievements expressed or implied by such forward-looking statements. WISeKey International Holding Ltd is providing this communication as of this date and does not undertake to update any forward-looking statements contained herein as a result of new information, future events or otherwise. This press release does not constitute an offer to sell, or a solicitation of an offer to buy, any securities, and it does not constitute an offering prospectus within the meaning of article 652a or article 1156 of the Swiss Code of Obligations or a listing prospectus within the meaning of the listing rules of the SIX Swiss Exchange. Investors must rely on their own evaluation of WISeKey and its securities, including the merits and risks involved. Nothing contained herein is, or shall be relied on as, a promise or representation as to the future performance of WISeKey.

Read more from the original source:
2022-08-09 | NDAQ:WKEY | Press Release | WISeKey International Holding AG - Stockhouse

Best Programming Language to Learn in 2022 – Server Watch

Whether youre an experienced developer or just starting out, adding a new programming language to your list of skills can be a powerful way to stand out in a competitive job market. Being eager and willing to learn is important, but knowing which programming language to choose can feel overwhelming and confusing.

Keep reading to gain a better understanding of the most popular programming languages, their average annual salaries, and a brief overview of their strengths.

When evaluating programming languages, its important to understand that each language has its own features, frameworks, and style. Because classifying programming languages can be somewhat subjective, think of each type as a philosophy instead of a strict definition.

Procedural programming languages work through code in a logical and structured order using procedures, modules, and procedure calls. Though some scenarios are best handled by the top-down simplicity of procedural programming, importance is placed on operation over data, which makes it difficult to relate with real-world solutions.

Object-oriented programming is built using objects that contain data, attributes, properties, and methods. By employing four fundamental conceptsinheritance, encapsulation, polymorphism, and data abstractionobject-oriented programming languages increase code reuse, provide data security, and make it easier to maintain existing applications.

Functional programming focuses on the evaluation of expressions, placing priority on results instead of processes. Unit testing and debugging make functional programming good for increasing developer productivity, but the learning curve isnt easy for beginners and the code can be hard to maintain.

Scripting programming languages deliver instructions that are interpreted individually, at run time, instead of being compiled ahead of time. The specific features and functionality will depend on the run time environment being used, but the strengths remain the same: ease of learning, rapid development, and quick debugging.

Logic programming languages contain familiar-looking, easy-to-read, statements detailing what needs to be accomplished. By taking away the need to understand how tasks are accomplished, developers can focus on the knowledge and rules that will lead to the end results.

Looking for a faster solution? Read Why Low-Code/No-Code Is Revolutionizing App Development

The most popular programming languages include Python, Java, SQL, JavaScript, HTML, CSS, C#, Swift, C++, PHP.

Described as a general-purpose language, Python can read and write files and directories, create GUIs and APIs, power web development frameworks, and more. With simple syntax and a large developer community to lean on, Python is considered one of the easiest programming languages to learn.

Get started with the Premium Python Programming Certification Bundle from TechRepublic Academy.

Java is a powerful programming language with platform independence and version resiliencecode that was written in Java decades ago is likely to run without issue today. Whether being used for web applications, Android apps, desktop software, or scientific applications, Java is one of the most diverse programming languages in use today.

Get started with the Complete Java Coder Bundle from TechRepublic Academy.

SQL is the ideal companion programming language for all others, and arguably the most important in this data-driven world. Short for Structured Query Language, SQL provides the means to create, populate, and manage databases.

Get started with the Ultimate SQL Bootcamp from TechRepublic Academy.

Thought by many to be the most popular programming language in the world, JavaScript helps to deliver dynamic and interactive web content. This is one language that grows in sophistication and complexity in direct proportion to the skill of the developer using it.

Get started with the Comprehensive JavaScript Bundle from TechRepublic Academy.

HTML is the most basic programming language, used in web design to deliver browser content. Basic programming tasks are easy to execute with HTML, but skilled programmers know how to use this language to create accessible, attractive, and cross-browser/cross-platform compatible content.

Get started with the Complete Web Developer Coding Bundle from TechRepublic Academy.

CSS is the fresh coat of paint and new window dressing of the programming world, but it is quickly becoming among the most important languages. Designed to make front-end layouts beautiful and functional, CSS contributes to the usability and accessibility of web-based applications.

Get started with the HTML & CSS: Learn to Build Sleek Websites from TechRepublic Academy.

C# (pronounced C Sharp) is part of Microsofts .NET platform. Commonly used when developing desktop applications, C# is also known for being the language behind the Unity game engine.

Get started with the Complete C# Master Class Course from TechRepublic Academy.

Though some developers choose to use Objective-C, Swift is the programming language recommended for those looking to create applications for iOS, iPadOS, macOS, tvOS, and watchOS. Apple created Swift as a safe, fast, and fun means to create clean and consistent code.

Get started with the SwiftUI: The Complete Developer Course from TechRepublic Academy.

C++ is one of the most powerful, versatile, and sophisticated object-oriented programming languages. The strength of C++ is seen when powering processor- and graphics-heavy software like the Unreal Engine and gaming consoles, including Xbox, PlayStation, and Nintendo Switch.

Get started with the C++ Programming Bundle: Beginner to Expert from TechRepublic Academy.

PHP is one of the most widely utilized general-purpose scripting languages available. PHP is platform independent, supports all of the major web servers, and has a tremendous library of open-source software available to build on. These include content management systems (CMS) and eCommerce platforms.

Get started with the Ultimate PHP Training Bundle from TechRepublic Academy.

Though they may not be the most popular, there are a few programming languages that are still used by many programmers:

Used by scientists and engineers, MATLAB is a proprietary programming language developed by MathWorks that is designed to analyze data and create algorithms. Though MATLAB is used most often by universities, it has been gaining traction in the image processing industry.

Get started with the Complete MATLAB Programming Certification Bundle from TechRepublic Academy.

R excels at manipulating and graphing statistical data and is beloved by researchers.

Get started with the Complete R Programming Certification Bundle from TechRepublic Academy.

Ruby is a popular open-source programming language used most often in web development, data analysis, and prototyping. It is often regarded as a popular programming language for beginners.

Get started with the Complete Ruby on Rails & Ruby Programming Bundle from TechRepublic Academy.

Deciding which programming language to learn can feel overwhelming and confusing. The following criteria may help determine which programming language is the best to learn or use for a specific project.

Still not sure where to start? Check out the Complete Learn to Code Bundle from TechRepublic Academy.

Go here to see the original:
Best Programming Language to Learn in 2022 - Server Watch

Open-source Acorn takes a new approach to deploy cloud-native apps on Kubernetes – VentureBeat

Kubernetes has become the de facto standard for multicloud deployments, with services on every major public cloud and a host of vendor technologies, including Red Hat OpenShift and Suse Rancher.

Packaging and then deploying applications to run in cloud-native environments, with the Kubernetes container orchestration system, can be complex. Its a challenge that Acorn is looking to help solve. There is no shortage of vendors in the Kubernetes space, but Acorns pedigree is particularly strong.

Acorns cofounders, Sheng Liang, Darren Shepherd, Shannon Williams and Will Chang, were the cofounders of Rancher, which was acquired by Suse in 2020 for $600 million. Prior to founding Rancher, the group founded cloud.com, an early infrastructure-as-a-service provider that was acquired by Citrix in 2011. The technology that was cloud.com now exists as the open-source Apache CloudStack platform.

Acorn, which has raised an undisclosed amount of seed funding, just unveiled an early preview of its open-source technology.

I have a lot of respect for what Kubernetes has done, but being a user of Kubernetes, I still think it is too hard, Darren Shepherd, cofounder and chief architect of Acorn told VentureBeat. I think theres a much easier way to deploy applications on Kubernetes to harness its raw power without interacting directly with it and really having to be an expert in it.

A Kubernetes cluster can be configured in any number of ways to meet the needs of an organization, or even to meet the requirements of a particular workload. The basic idea is that a workload can be distributed across multiple nodes in a cloud, or even across clouds to help enable application availability, performance and resilience.

Shannon Williams, cofounder and president of Acorn, explained that Kubernetes itself is a platform that accepts commands, but its often up to the user deploying a workload to work through the complexity in order to get the optimal deployment. With Acorn, Williams said that his company is introducing a packaging approach that can make upgrading and consumption of containers easier for enterprises running Kubernetes workloads.

While Kubernetes provides the software infrastructure on which to run container-based application workloads, the goal with Acorn is to focus on the needs of applications.

The idea of creating a format and approach to enable the deployment of applications into Kubernetes is not a new one. There are multiple approaches, including Helm, Cloud Native Application Bundle (CNAB) and Operators, though each has its shortfalls, according to the cofounders of Acorn.

Currently, among the most common ways to deploy an application in Kubernetes is to use of a Helm chart. Shepherd said that while Helm provides a generic way of packaging, Acorn can have a higher degree of specificity that is optimized for application deployment. Acorn also has a service discovery model built-in, which understands what resources are available in a given Kubernetes cluster.

Shepherd explained that Acorn works as an abstraction layer above the core concepts that Kubernetes supports. For example, among the primary concepts in Kubernetes are the ideas of service and ingress, which are methods of exposing networking services. Acorn doesnt require users to understand or configure those concepts, instead it elevates to the higher level concept of simply exposing a networking port to an application.

Acorns cofounders also see the technology as being a rival to Kubernetes Operators. The concept of a Kubernetes Operator was pioneered by CoreOS in 2016 and integrated into Red Hat OpenShift, when CoreOS was acquired by Red Hat in 2018 for $250 million. The promise of an Operator is to go beyond just deployment with a Helm chart and help organizations to configure an application to scale and run in production.

We actually see that Acorn can replace the need for operators because we built Acorn to be sufficient enough to run like the most complicated stateful applications, Shepherd said. There are also capabilities in Acorn to deal with day-to-day operations and backups.

Its still early for the Acorn project, though according to cofounder and CEO Sheng Liang, his team is already talking to customers about the technology every day.

Clearly, this stuff solves a problem, but the open-source Acorn project is really just the start, Liang told VentureBeat. We need to build a bunch of enterprise capabilities around Acorn, and that will take some time.

Williams noted that with the experience of building cloud.com and Rancher, the cofounders of Acorn have seen time and again that open-source adoption leads to business.

Weve seen it over and over again, that as people use the technology, we uncover really interesting business opportunities to build companies and to build revenue, Williams said.

Originally posted here:
Open-source Acorn takes a new approach to deploy cloud-native apps on Kubernetes - VentureBeat

Anaconda Announces Strategic Cloud Partnership with Oracle to Enable Seamless, Secure Open-Source Innovation in the Cloud – SDTimes.com

Anaconda Inc., provider of the worlds most popular data science platform, today announced a collaboration withOracle Cloud Infrastructureto offer secure open-source Python and R tools and packages by embedding and enabling AnacondasrepositoryacrossOCI Artificial Intelligence and Machine Learning Services. Customers have access to Anaconda services directly from within OCI without a separate enterprise license.

We are committed to helping enterprises secure their open-source pipelines through the ability to use Anaconda anywhere, and that includes inside the Oracle Cloud, said Peter Wang, CEO and co-founder of Anaconda. By combining Anacondas package dependency manager and curated open-source repository with OCIs products, data scientists and developers can seamlessly collaborate using the open-source Python tools they know and trust while helping meet enterprise IT governance requirements.

Python has become the most popular programming language in the data science ecosystem, and for good reason; it is a widely-accessible language that facilitates a variety of programming-driven tasks. Because the velocity of innovation powered by the open-source community outpaces any single technology vendor, more and more organizations are adopting open-source Python for enterprise use.

Oracles partnership to provide data scientists with seamless access to Anaconda not only delivers high-performance machine learning, but also helps ensure strong enterprise governance and security, said Elad Ziklik, vice president, AI Services, Oracle. With security built into the core OCI experience, plus the security of Anacondas curated repository, data scientists can use their favorite open-source tools to build, train, and deploy models.

Together, Anaconda and Oracle are looking forward to bringing open-source innovation to the enterprise, helping apply ML and AI to the most important business and research initiatives. For more information on how to use Anaconda in OCI,click here.

Read the original:
Anaconda Announces Strategic Cloud Partnership with Oracle to Enable Seamless, Secure Open-Source Innovation in the Cloud - SDTimes.com

CrowPi L Review Part 2: Learn programming and electronics with a Raspberry Pi 4 laptop – CNX Software

In the first part of our review of CrowPi L Raspberry Pi 4 laptop for education, we checked the hardware and accessories such as the CrowTail starter kit with various sensors and other electronics modules, and showed how to install or remove the Raspberry Pi 4 SBC from the laptop shell.

Ive now had more time to play with the educational software, so Ill report my experience with the laptop when learning game design and hardware control with Letscode visual programming IDE, as well as the Python lessons for more advanced students.

Its the rainy season here in Thailand meaning its both hot and humid, and even though Im not entirely sure its related, I recently had to reinstall Raspberry Pi OS on one of my Raspberry Pi with a corrupted SD card. It happened again with the CrowPi L after I left it in its package for two to three weeks

But thats not a big issue, as Elecrow provides CrowPi OS images for download. So I just downloaded and flashed the CrowPi L image to a microSD card with USBImager, and I was good to do. Note that I often get the error The software needs to run on Crowpi-Laptop! at boot time.

But when that happens I can just click on the Pi Panel icon on the far right of the taskbar to start it up.

The Pi Panel program offers shortcuts to Letscode tutorials to learn visual programming, Python lessons, as well as other programming tools such as Thonny (Python IDE), Geany text editor, and the Arduino IDE, all of which are preinstalled in the image.

The Accessories tab provides shortcuts to desktop programs such as VLC Player, Chromium, or a File Manager, the Website tab gets links to relevant websites (Raspberry Pi, Arduino, Linux, Ubuntu, Open Source)

while the Forum tab offers links to popular maker forums. Note that the CrowPi OS is basically Raspberry Pi OS with the Pi Panel programs and developer tools.

Lets check Letscode lessons first. There are three options with the game designs, hardware control (which requires the CrowTail Starter Kit with electronics modules), and finally an option to add future tutorials.

The game designs section does not rely on electronics at all, it will just teach kids and adults how to create games with visual programming.

There are sixteen lessons in total, and I tried Lesson 3 Undersea World to have a look.

Letscode program will show on the left, and the Pi Panels tutorial on the right of the screen. As you can see the Letscode window overlaps on the tutorial section. Its not ideal, but still usable.

The tutorial will explain step-by-step what the student has to do first with text, followed by a tutorial video showing where to click.

Youll also have access to background images and sprites to make game development easier, although letscode also allows you to draw your own sprites.

Youll have to drag and drop visual programming blocks to manage the behavior of sprites in your scene. It was fairly easy to follow, and both reading the text and watching the video are mandatory to complete a lesson, at least initially. This can be cumbersome on the small 11.6-inch display of the laptop, so I decided to connect a 10.1-inch HDMI display to the HDMI port of the laptop, have Letscode in full screen on the laptops screen, and the tutorial and videos on the HDMI display.

I found myself to be quite more productive that way. Note that by default, the screens will mirror, and youll need to run Screen Layout Editor to change the layout as follows.

Lets now switch to the section more relevant to CNX Software topics with Hardware control lessons.

There are 24 lessons in total from the basic light flickering lesson to more complex projects such as a welcome robot or a smart planting system. I went with Lesson 6 Motor Drive to have a closer look at the way those tutorials combining electronics and visual programming are conducted.

Ill keep using my dual display setup, as its even more imporant here, since the tutorial window is even bigger.

Before getting started with any of those lessons youll want to install the CrowPi L Extension by first clicking on the icon at the bottom left in the Letscode program

.. then select CrowPi L Extension which comes with the visual programming block well need for hardware control lessons.

The lesson starts with an explanation of the learning targets,

and provide a description of each module used in the project followed, if needed, by the theory behind the working principle of the sensors, in this case, the IR reflective sensor.

The motor drive tutorial also use a MOSFET module,

and a TT motor, so weve got an explanation for both.

After all that theory, well need to dig into our CrowTail Starter Kit for Raspberry Pi to get the necessary boards and modules for the project. The Starter Kit has plenty of modules (22), but since the package is well-described they are easy to locate.

This is followed by the connection diagram, and I think it could be more detailed. I had to take 3 jumper wires, two to connect the TT motor, and one to connect the female jumper cable of the battery pack. I also had to use my screwdriver to connect the wires to the screw terminals of the MOSFET board, as well as a tool to open the battery compartment and insert two AAA batteries of my own. None of this was explained, and it might be head scratching for kids without supervision. I also find the use of jumper wires to connect to the TT motor a bit odd, as they can be loose.

But lets carry on with the lesson now that we have connected our project. The visual programming part is fairly easy to follow as its explained step-by-step. Youll also see the Python automatically generated as you may more programming blocks. Once you program is done select the baud rate (115,000) in the bottom right, and click on the start/play button.

Everything looks fine, but does it really work? You bet it does as the TT motor as I place my finger on top of the IR reflective sensor

Lets switch to Python programming lessons and tutorials.

Just like for visual programming, there are three sections: Introduction to syntax, Hardware control, and an option to add a new course.

The introduction to syntax does not require any additional hardware, it just teached Python basics to more complex examples such as games that all run on the laptop itself. If we select one of the lessons, the Pi Panel tutorial will show on the right, and Thonny Python IDE will show on the left with the lesson providing step-by-step instructions to write the program.

The Hardware control Python lessons are exactly the same as with the Letcode program, but instead of using visual programming, students will learn to code Python.

I did flick through the Motor Drive lesson, and its basically the same as for the visual programming lesson with theory, explanation about the modules, a connection diagram, and the main difference is that youll learn Python programming on the way as well. By the way, you can also do this in the visual programming lesson, as Letscode will automatically generate the Python code as you drag and drop the blocks.

But I did not try it in detail, as the CrowTail Started Kit for Raspberry Pi comes with a printed user guide, and I personally prefer to learn that way. But thats a mistake as Ill explain better, and you should learn Python with the program inside CrowPi L laptop, instead of the book as it is outdated.

I first noticed the list of lessons was different. But I still went ahead, and installed samples and drivers as explained in the book:

pi@Crowpi-Laptop:~ $ git clone https://github.com/Elecrow-RD/RPi-Starter-Kit

pi@Crowpi-Laptop:~ $ git clone https://github.com/Elecrow-RD/RPi-Starter-Kit

Lets go into the examples directory to list the samples:

cd ../RPi-Starter-Kit/examples/pi@Crowpi-Laptop:~/RPi-Starter-Kit/examples $ ls -ltotal 80-rw-r--r-- 1 pi pi 745 Aug 10 14:31 10_plant_doctor.py-rw-r--r-- 1 pi pi 642 Aug 10 14:31 11_dimmer.py-rw-r--r-- 1 pi pi 647 Aug 10 14:31 12_speed_fan.py-rw-r--r-- 1 pi pi 834 Aug 10 14:31 13_servo_control.py-rw-r--r-- 1 pi pi 917 Aug 10 14:31 14_obstacle_alert.py-rw-r--r-- 1 pi pi 1588 Aug 10 14:31 15_smart_lantern.py-rw-r--r-- 1 pi pi 1015 Aug 10 14:31 16_distance_display.py-rw-r--r-- 1 pi pi 1086 Aug 10 14:31 17_weather_station.py-rw-r--r-- 1 pi pi 1396 Aug 10 14:31 19_speed_measurement.py-rw-r--r-- 1 pi pi 86 Aug 10 14:31 1_hello_world.py-rw-r--r-- 1 pi pi 1282 Aug 10 14:31 20_plant_expert.py-rw-r--r-- 1 pi pi 1370 Aug 10 14:31 21_remote_door.py-rw-r--r-- 1 pi pi 231 Aug 10 14:31 2_blinking_led.py-rw-r--r-- 1 pi pi 381 Aug 10 14:31 3_contorl_led.py-rw-r--r-- 1 pi pi 427 Aug 10 14:31 4_doorbell.py-rw-r--r-- 1 pi pi 674 Aug 10 14:31 5_treasure_chest.py-rw-r--r-- 1 pi pi 597 Aug 10 14:31 6_bright_and_dark.py-rw-r--r-- 1 pi pi 387 Aug 10 14:31 7_smart_light.py-rw-r--r-- 1 pi pi 705 Aug 10 14:31 8_collision_alert.py-rw-r--r-- 1 pi pi 591 Aug 10 14:31 9_car_tracking.py

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

cd ../RPi-Starter-Kit/examples/

pi@Crowpi-Laptop:~/RPi-Starter-Kit/examples $ ls -l

total 80

-rw-r--r-- 1 pi pi 745 Aug 10 14:31 10_plant_doctor.py

-rw-r--r-- 1 pi pi 642 Aug 10 14:31 11_dimmer.py

-rw-r--r-- 1 pi pi 647 Aug 10 14:31 12_speed_fan.py

-rw-r--r-- 1 pi pi 834 Aug 10 14:31 13_servo_control.py

-rw-r--r-- 1 pi pi 917 Aug 10 14:31 14_obstacle_alert.py

-rw-r--r-- 1 pi pi 1588 Aug 10 14:31 15_smart_lantern.py

-rw-r--r-- 1 pi pi 1015 Aug 10 14:31 16_distance_display.py

Read the original here:
CrowPi L Review Part 2: Learn programming and electronics with a Raspberry Pi 4 laptop - CNX Software