Curoverse Announces New Infrastructure Software for Precision Medicine, Genomics and Bioinformatics

Boston, MA (PRWEB) April 14, 2015

Curoverse today announced the public beta of cloud and on-premise solutions for organizations and individuals using the new Arvados open source software platform to manage, process, and share genomic and biomedical data.

The explosion in genomic and biomedical data generated for precision medicine is creating significant new IT infrastructure challenges for research institutions, clinical labs, and pharmaceutical companies, said Alexander Wait Zaranek, PhD, chief scientist at Curoverse. We built Arvados to provide a modern distributed computing platform that addresses the unique data management and processing requirements of the medical and life sciences industries.

The Arvados project was originally started by a team of scientists and engineers led by Dr. Zaranek at Harvard Medical School to manage the genomic and biomedical data being collected for major research projects such as the Harvard Personal Genome Project. Now an independent open source project, the new Arvados platform is available to research and clinical institutions around the world.

Biomedical informatics and big data computing infrastructure are essential to developing and delivering precision medicine, said Isaac Kohane, co-director at the Harvard Medical School Center for Biomedical Informatics. Its now possible to deliver more individually targeted medical care because were making sense of the molecular data that uniquely describe each patient, but precision medicine requires powerful new software infrastructure such as Arvados to handle the flood of new biomedical data.

Curoverse is supporting Arvados deployments both in the cloud and on-premise in customer data centers. The company is implementing Arvados pilots at major medical and research institutions in the US and Europe including projects at Johns Hopkins University, Harvard Medical School, and the Wellcome Trust Sanger Institute.

Were already working with more than 20 petabytes of genomic data and seeing firsthand the incredible challenges involved in processing these massive data sets, said Joshua Randall, senior scientific manager in Human Genetics Informatics at the Wellcome Trust Sanger Institute. Were now planning the next generation of our bioinformatics infrastructure and are piloting Arvados as a foundation for that new infrastructure.

Intel Corporation is helping to support the on-premise Curoverse pilot program by providing funding for equipment being deployed at several institutions, including the Massachusetts Green High Performance Computing Center, a research computing center operated by five of the largest research universities in Massachusetts, under a program sponsored by the Massachusetts Life Sciences Center.

Through our work with leading medical and research institutions worldwide, were witnessing the new computing challenges created by genomics and precision medicine, said Ketan Paranjape, general manager of life sciences at Intel. Were supporting the Curoverse pilot program because Arvados provides new open source software for managing and processing genomic data that lets organizations take advantage of the unique capabilities of Intel compute, storage, networking and software components to accelerate computations.

In addition to on-premise implementations of Arvados, the company is also making the platform available through a Software-as-a-Service (SaaS) offering called Curoverse Cloud. The Curoverse Cloud beta is currently free to use and beta accounts provide 1 terabyte of storage and 100 hours of compute time per month for 6 months. According to the company, larger pilots are also available on request.

Go here to read the rest:
Curoverse Announces New Infrastructure Software for Precision Medicine, Genomics and Bioinformatics

Bitcoin Alternative NEM (XEM) Officially Launches with 100% Original Codebase Cryptocurrency

DAEGU, South Korea, April 13, 2015 /PRNewswire/ -- NEM, is an original blockchain technology platform using a breakthrough innovation for blockchain consensus called Proof-of-Importance (POI). POI is a consensus mechanism that calculates an importance score for an account by taking into consideration its balance, activity of the account, as well as the importance of accounts transacted with.

Logo - http://photos.prnewswire.com/prnh/20150413/198087LOGO

This importance score enables accounts to create blocks and "harvest" transaction fees based on the account's importance to the NEM economynot just those who simply have the largest amount of XEM. This encourages use of the currency and discourages hoarding, thus increasing the velocity of money. This helps alleviate many problems associated with Proof-of-Work mining, such as extreme price fluctuation on exchanges, deflation, massive power consumption, and centralization.

With security being a main concern for blockchain platforms, NEM has taken steps to introduce new innovations to both secure the network and an individual's account. One of these innovations is a peer reputation system using Eigentrust++, which helps protect the network. Eigentrust++ measures how well different computers on the network interact with each other and directs network traffic to the most trusted sources. NEM has also integrated an innovative time synchronization service between nodes and a new form of spam protection not seen in a cryptocurrency before.

NEM incorporates a multitude of features to protect the user: blockchain-based multi-signature capabilities to maximize security while also maintaining ease of use, encrypted messaging, and a robust client-server web architecture that accommodates encapsulation of layers within the system.

NEM is built using test-driven development, which is a professional method of software development, and is written in Java and Javascript. The NEM team includes some of the most experienced and passionate developers in the industry, with many holding PhDs. The overall NEM team, including the core developers, includes more than 70 people from around the world. These dedicated members of the NEM team perform the multitude of daily tasks necessary for the development and proliferation of the NEM ecosystem, such as marketing, testing, design, PR, technical support, and more.

The NEM ecosystem has been meticulously designed from the ground up and rigorously tested, with comprehensive stress tests including millions of transactions during the nine months of open alpha and beta testing. NEM is designed for practical use in a variety of applications ranging from personal finance to e-commerce, office automation, and secure, personal messaging; therefore, security and reliability have been a number one priority throughout development.

The NEM software consists of the NEM Infrastructure Server (NIS) and the NEM Community Client (NCC). XEM, the cryptocurrency powered by NEM, is only an incidental part of the NEM ecosystem as NIS and NCC together form arguably one of the most advanced decentralized blockchain platforms in the world. Future releases will include smart property tiles, a decentralized asset exchange, smart contracts, and many more applications that utilize NEM's core blockchain technology in innovative and revolutionary new ways to empower individualssimple concepts, but with infinite expressibility.

NEM's architecture enables the use of "thin clients" that utilize NEM's remote NIS feature. This feature allows for a broad range of devices and opens up access to NEM to a wider audience by allowing full NEM ecosystem functionality on extremely low-cost, low-power devices, like mobile phones, without any intermediary third parties required. This enables a user to have absolute control over using the NEM platform, without fear of a third party escrow taking control of their funds or assets.

The release of NIS and NCC is only the first step towards launching the NEM ecosystem. The platform is designed with simple system integration in mind, which can enable features like high frequency exchange trading, real-world financial integration (e.g., stocks, derivatives, options, and forex), social media and social networking, enhanced and easy-to-use mobile applications, and many more advancements that can be easily integrated with NEM's flexible and robust platform.

Follow this link:
Bitcoin Alternative NEM (XEM) Officially Launches with 100% Original Codebase Cryptocurrency

WikiLeaks accuses Hillary Clinton of stealing Twitter logo design for her campaign

Hillary Clinton's new campaign logo came in for instant ridicule after it was released on Sunday Some compared it to the work of a third-grader others suggested it was thrown together in 15 minutes Users compared the logo to Cuban flag, an English grocery store that went out of business in the 1980s, hospital road signs, the History Channel logo or the FedEx logo

By Michael Zennie and Kelly Mclaughlin For Dailymail.com

Published: 19:35 EST, 12 April 2015 | Updated: 15:55 EST, 13 April 2015

206 shares

172

View comments

Hillary Clinton engineered a low-profile start to her campaign. But she's getting some high-profile attention over an unlikely target - her campaign logo.

Thousands of people have weighed in online to mock the simplistic logo. Many pointed out that despite the $1billion Clinton is likely to raise in the 2016 campaign, her campaign graphic looks like it was slapped together in 15 minutes.

'Savvy first move by Hillary. The biggest knock on her is she's too elitist, so she's like, "Boom, let's make the campaign logo in MS Paint,' quipped Aaron Levie, the CEO of tech startup Box.

'So what lucky 3rd grader won the Design the Hillary Clinton Campaign Logo contest?' joked another Twitter user.

Link:
WikiLeaks accuses Hillary Clinton of stealing Twitter logo design for her campaign

WikiLeaks accuses Hillary Clinton of stealing its logo for her 2016 presidential campaign

Hilliary Clinton was today accused by WikiLeaks of stealing its 'innovative' Twitter logo design for her 2016 presidential campaign.

Hilliary Clinton was today accused by WikiLeaks of stealing its 'innovative' Twitter logo design for her 2016 presidential campaign.

"Hillary Clinton has stolen our innovative WikiLeaks twitter logo design," WikiLeakes said on Twitter. The tweet offered a side-by-side comparison of the logos. WikiLeaks' artwork features an hourglass with a dripping earth, along with a red arrow, while Clinton's shows a red arrow used to form a large "H".

The 67-year-old former first lady and New York senator on Sunday launched her second Oval Office bid, which led to countless reactions on social media. One response was a tweet from WikiLeaks, accusing Clinton's campaign of swiping their twitter logo.

This will be Clinton's second attempt for securing the top post.The one-time first lady enters the race seven years after her bitter nomination defeat to President Barack Obama in 2008. Clinton will be the top contender for the Democratic party in the elections.

Read: Hillary Clinton to run for US President in 2016; says wants to be Americans' champion

View post:
WikiLeaks accuses Hillary Clinton of stealing its logo for her 2016 presidential campaign

Sweden says WikiLeaks founder Julian Assange remains under arrest warrant

WikiLeaks founder Julian Assange has lived at Ecuador's London embassy since June 2012.

Sweden's Attorney-General says he is confident Julian Assange will remain subject to an arrest warrant relating to allegations of sexual assault.

Attorney-General Anders Perklev also reaffirmed his confidence in Swedish prosecutor Marianne Ny, who for more than four-and-a-half years refused to interview the Australian WikiLeaks publisher in London, but abruptly changed her mind last month after Sweden's highest court decided to hear an appeal by Mr Assange asking that the warrant for his arrest be quashed.

In an interview with Sweden's Expressen newspaper, Mr Perklev denied that Mr Assange's high profile and "special" circumstances had any impact on the handling of his case and insisted that the matter was being dealt with "entirely under Swedish law".

Mr Assange has lived at Ecuador's London embassy since June 2012. Ecuador has granted him political asylum on the grounds that he is at risk of extradition to the United States to face espionage and conspiracy charges arising from the leaking of thousands of secret diplomatic and military documents by US Army private Chelsea Manning.

Advertisement

Last month, a US court confirmed that WikiLeaks and Mr Assange are still being targeted by the US Department of Justice and Federal Bureau of Investigation in a criminal investigation relating to espionage, conspiracy, theft of US government property and computer fraud.

British police are on guard outside the Ecuadorian embassy 24 hours a day, waiting to arrest Mr Assange so he can be extradited to Sweden for questioning about the sexual assault allegations. The allegations were first raised in August 2010.

Mr Assange denies the allegations and his lawyers have advised that his extradition to Stockholm could facilitate his eventual extradition to the US.

Last month, Sweden's Supreme Court decided to hear an appeal by Mr Assange seeking to quash the arrest warrant on the grounds that prosecutors had failed to progress the case by refusing to interview him in London and that he had been denied access to key facts forming the basis for the decision to arrest him.

The rest is here:
Sweden says WikiLeaks founder Julian Assange remains under arrest warrant

Chelsea Manning Gives 1st Interview Since Sentencing – to …

Chelsea Manning, the transgender Army private formerly known as Bradley Manning, has given her first interview since she was convicted of leaking hundreds of thousands of classified documents to WikiLeaks.

The interview, done by mail because the military does not allow prisoners to speak with reporters by phone or in person, appears in Cosmopolitan magazine -- a womens magazine best known for its fashion, sex and dating advice.

In the article, Manning, convicted and sentenced to 35 years in a military prison in July 2013, shares details of her time in the Army and her struggles with the lifelong desire to live as a woman despite being born male.

Manning focuses on her struggle with gender dysphoria, telling the magazine she would sneak into her older sister's room to secretly spend time dressing as a girl when she was 5 or 6.

"I had always known that I was 'different.' I didn't really understand it all until I got older," Manning tells Cosmopolitan. "But there was always this foreboding sense something was 'wrong.' I never knew how to talk about it. I just remember feeling terrified about what would happen if someone found out. It was a very lonely feeling."

Manning also touches on her quest for medical care for gender dysphoria, which was diagnosed by military doctors. After more than a year without medical care, Manning and the American Civil Liberties Union sued the military. Manning is optimistic, but told the magazine she feels like a joke to officials in the military.

I am torn up. I get through each day OK, but at night, when Im alone in my room, I finally burn out and crash, she says.

Just four days ago, it became known that Manning apparently joined from prison. In her posts, Manning revealed her plans for Twitter, thanked her supporters and shared the difficulties of tweeting while incarcerated.

"I'm hoping to stay connected with this account as much as possible but would rather tweet about more meaningful things than not #lessismore," she said in one tweet. Tweeting from prison reqs a lot of effort and using a voice phone to dictate #90sproblems.

Today, Manning tweeted out the Cosmopolitan article.

Read the original post:
Chelsea Manning Gives 1st Interview Since Sentencing - to ...

Snowden’s ‘Sexy Margaret Thatcher’ Password Isn’t So Secure

Edward Snowden appears to have a thing for the late British conservative prime minister Margaret Thatcher. And his obsession may even be clouding his famously paranoid sense of security.

In a YouTube extra from his interview with John Oliver posted late last week, Snowden offered some password security advice: He pans Olivers comically awful suggestions like passwerd, onetwothreefour, and limpbiscuit4eva, and instead wisely recommends that computer users switch from passwords to much longer passphrases. He goes on to offer an example: MargaretThatcheris110%SEXY.

This was not just an off-the-cuff suggestion in a live interview, but a piece of advice that Snowden had thought about for at least two years. When he first contacted Glenn Greenwald in 2012 under the pseudonym Cincinnatus, Snowden urged Greenwald to start using the encryption software PGP for their communications, and even made him a 12-minute video tutorial. His voice garbled and auto-tuned for anonymity, Cincinnatus offered Greenwald the same example of a strong password he would give to Oliver:MargaretThatcheris110%SEXY. The mention of comes around the six minute mark in the below video.

Heres the thing, though: For a guy so careful about passwords that hes known to pull a blanket over his head when entering them into his laptop, Snowdens ironic Tory-fetishizing password advice is far from ideal.

Considering that hes recommended it for someone like Greenwald, whos going up againstthe NSAs uber-hackers and supercomputers, Snowdens MargaretThatcheris110%SEXY is only a borderline secure password, says Joseph Bonneau, a postdoctoral cryptography researcher at Stanford who has published papers in several academic journals on optimizing password security. Just because somethings a phrase and its longer, people get fixated on that, he says. The length doesnt mean that much to your adversary. The real problem is that people are really bad at producing randomness. Its really hard to tell if what youve picked is hard to guess.

Before elaborating on that randomness problem, Bonneau first notes that its important to think about where a password is being used. If its for an online account like Gmail, the service provider like Google probably limits the number of attempts a hacker can make before locking them out. For that sort of application, Snowdens Thatcher passphrase works fine, Bonneau says. But for offline password cracking, say, on a seized computer, an attacker can try passwords much, much faster. Assume your adversary is capable of one trillion guesses per second, Snowden himself told journalist Laura Poitras in their initial email exchange.

To withstand that sort of ultra-high-speed cracking, a passphrase has to be secure against an algorithm that will exploit virtually any pattern to narrow the scope of possibilities. And anything that makes sense to humanseven the unlikely notion of sexual attraction to Margaret Thatcherfollows plenty of linguistic patterns. In a 2012 study, Bonneau and his fellow researchers checked if phrases had already been signed up for by users of the Amazon service PayPhrase, which required a unique series of multiple words to be chosen bya user for every registration. They found that they could narrow down their guesses at whichphrases were already takenusinglanguage samples and lists of proper names from Wikipedia, IMDB, the language learning website English Language Learning Online, and even the Urban Dictionarys collection of slang idioms.

With those data sets built into their guessing algorithm, they found that Amazon users four-word phrases have only 30 bits of entropyin other words, two to the 30th power possibilities. Bonneau estimatesthat a passphrase needs at least 70 or 80 bits of entropy to be considered secureIn other words, to withstand Snowdens trillion-guesses-a-second standard for years or decades rather than seconds or days.

In another related study published six years earlier, a group of Carnegie Mellon researchers found that when they asked users to come up with mnemonic passwords based on phrasesFour score and seven years ago, our Fathers turns into 4s&7yaoF, for instance65 percent of them used phrases that they could find on Google. Out of 144 subjects in the study, two chose lyrics from the same Oscar Meyer Weiner jingle. None of that bodes well for humans potential to choose a passphrase thats as unique as they think it is.

Tweaking a passphrase with character changes can certainly help. Snowden writes in the notes of his video for Greenwald that intentional, personal, and memorable typos can make passphrases far more secure. He even suggests that spelling sexy as sessy in his Margaret Thatcher example could help. But Snowden also rebuts his own point in his conversation with John Oliver, when he says that permutations of common words could still be included in attackers dictionaries.

See more here:
Snowden’s ‘Sexy Margaret Thatcher’ Password Isn’t So Secure