NSF award will boost UAB research in machine-learning-enabled plasma synthesis of novel materials – University of Alabama at Birmingham

The $20 million National Science Foundation award will help UAB and eight other Alabama-based universities build research infrastructure. UABs share will be about $2 million.

Yogesh Vohra Yogesh Vohra, Ph.D., is a co-principal investigator on a National Science Foundation award that will bring the University of Alabama at Birmingham about $2 million over five years.

The total NSF EPSCoR Research Infrastructure Improvement Program award of $20 million with its principal investigator Gary Zank, Ph.D., based at the University of Alabama in Huntsville will help strengthen research infrastructure at UAB, UAH, Auburn University, Tuskegee University, the University of South Alabama, Alabama A&M University, Alabama State University, Oakwood University, and the University of Alabama.

The award, Future technologies and enabling plasma processes, or FTPP, aims to develop new technologies using plasma in hard and soft biomaterials, food safety and sterilization, and space weather prediction. This project will build plasma expertise, research and industrial capacity, as well as a highly trained and capable plasma science and engineering workforce, across Alabama.

Unlike solids, liquids and gas, plasma the fourth state of matter does not exist naturally on Earth. This ionized gaseous substance can be made by heating neutral gases. At UAB, Vohra, a professor and university scholar in the UAB Department of Physics, has employed microwave-generated plasmas to create thin diamond films that have many potential uses, including super-hard coatings and diamond-encapsulated sensors for extreme environments. This new FTPP grant will support research into plasma synthesis of materials that maintain their strength at high temperatures, superconducting thin films and developing plasma surface modifications that incorporate antimicrobial materials in biomedical implants.

Vohra says the UAB Department of Physics will mostly use its share of the award to support faculty in the UAB Center for Nanoscale Materials and Biointegration and two full-time postdoctoral scholars, and support hiring of a new faculty member in computational physics with a background in machine-learning. The machine-learning predictions using the existing databases on materials properties will enable our research team to reduce the time from materials discovery to actual deployment in real-world applications, Vohra said.

The NSF EPSCoR Research Infrastructure Improvement Program helps establish partnerships among academic institutions to make sustainable improvements in research infrastructure, and research and development capacity. EPSCoR is the acronym for Established Program to Stimulate Competitive Research, an effort to level the playing field for states, territories and a commonwealth that historically have received lesser amounts of federal research and development funding.

Jurisdictions can compete for NSF EPSCoR awards if their five-year level of total NSF funding is less than 0.75 percent of the total NSF budget. Current qualifiers include Alabama, 22 other states, and Guam, the U.S. Virgin Islands and Puerto Rico.

Besides Alabama, the other four 2022 EPSCoR Research Infrastructure Improvement Program awardees are Hawaii, Kansas, Nevada and Wyoming.

In 2017, UAB was part of another five-year, $20 million NSF EPSCoR award to Alabama universities.

The Department of Physics is part of the UAB College of Arts and Sciences.

Read more here:
NSF award will boost UAB research in machine-learning-enabled plasma synthesis of novel materials - University of Alabama at Birmingham

Leveraging the benefits of deep learning in the smart factory – Packaging Europe

In our latest Innovation Spotlight, Cognex introduces a vision system that automates error detection in minutes without PC or programming skills.

Increasingly, packaging products require their own custom inspection systems to perfect quality, eliminate false rejects, improve throughput, and eliminate the risk of a recall. Some of the foundational machine vision applications along a packaging line include verifying that a label on a package is present, correct, straight, and readable. Other simple packaging inspections involve presence, position, quality, and readability on a label.

But packaging like bottles, cans, cases, and boxes cant always be accurately inspected by traditional machine vision. For applications that present variable, unpredictable defects on confusing surfaces such as those that are highly patterned or suffer from specular glare, manufacturers have typically relied on the flexibility and judgment-based decision-making of human inspectors. Yet human inspectors have some very large tradeoffs for the modern consumer packaged goods industry: they arent necessarily scalable.

Deep Learning expands the range of possible inspection applications

For applications which resist automation yet demand high quality and throughput, Deep Learning technology is a flexible tool that application engineers can have confidence in as their packaging needs grow and change.

Deep Learning technology from Cognex can handle all different types of packaging surfaces, including paper, glass, plastics, and ceramics, as well as their labels. Be it a specific defect on a printed label or the cutting zone for a piece of packaging, Deep Learning solutions can identify all these regions of interest simply by learning the varying appearance of the targeted zone.

Using an array of tools, Deep Learning can then locate and count complex objects or features, detect anomalies, and classify said objects or even entire scenes. And finally, it can recognize and verify alphanumeric characters using a pre-trained font library.

A simple solution, even for complex tasks

While manufacturers recognize the importance of digitalizing their processes using artificial intelligence, many are still hesitant to invest in them because of a lack of resources. Yet the combination of machine vision and Deep Learning is the on-ramp for companies to adopt smarter technologies that will give them the scale, precision, efficiency, and financial growth for the next generation.

A new, full-featured vision system now puts the power of Deep Learning-based image analysis into an easy-to-use package that gets error-proofing applications running in minutes.

The In-Sight 2800 system can be trained with just a few images to automate everything from simple pass/fail inspections to advanced classification and sorting - no PC or programming is needed. The interface guides users through the application development process step-by-step, making it simple for even new vision users to set up any job.

Changes in products and materials or line speed? Not a problem!

The combination of Deep Learning and traditional vision tools gives users the flexibility to solve a broad range of inspection applications. Tools can be used individually for simple jobs or chained together for more complex logic sequences. A powerful classifying tool can be trained using as few as five images to identify and sort defects into different categories and correctly identify parts with variation.

The new In-Sight 2800 system also offers a wide variety of accessories and field-changeable components to help users adapt quickly to changes such as new parts, faster line speeds and higher quality standards.

Watch this video to see why In-Sight 2800 is the easy choice for your next machine vision deployment and enter for your chance to win an In-Sight 2800:

https://connect.cognex.com/IS2800-Giveaway-LP-EN?src=7014W000000urCPQAY

This content was sponsored by Cognex.

Go here to see the original:
Leveraging the benefits of deep learning in the smart factory - Packaging Europe

Artificial Intelligence (AI) In Drug Discovery Market Growth Is Driven At A 30% Rate With Increasing Adoption Of Cloud-Based Applications And Services…

LONDON, May 24, 2022 (GLOBE NEWSWIRE) -- According to The Business Research Companys research report on the artificial intelligence (AI) in drug discovery market, the rising adoption of cloud-based applications and services by pharmaceutical companies will contribute to the growth of AI in the drug discovery market. Among the various end-users of cloud-based drug discovery platforms, pharmaceutical vendors are likely to be major stakeholders, holding a high-value share of the global cloud-based drug discovery platform market. An opportunity analysis of the global market reveals that leading software vendors have already adopted cloud-based drug discovery platforms to facilitate seamless research and development processes. Moreover, the cloud-based drug discovery platform revolution will witness significant growth in the coming years, thereby creating better opportunities for software vendors for growth and expansion. For example, Amazon Web Services, Inc. (AWS), an Amazon.com, Inc. company, announced in December 2021 that it is collaborating with Pfizer to develop innovative, cloud-based solutions that have the potential to improve how new medicines are developed, manufactured, and distributed for clinical trials. The companies are exploring these advances through their newly created Pfizer Amazon Collaboration Team (PACT) initiative, which applies AWS capabilities in analytics, machine learning, compute, storage, security, and cloud data warehousing to Pfizer laboratory, clinical manufacturing, and clinical supply chain efforts. Thus, the increasing adoption of cloud-based applications and services by pharmaceutical companies will contribute positively to the AI drug discovery market size.

Request for a sample of the global artificial intelligence (AI) in drug discovery market report

The global artificial intelligence in drug discovery market size is expected to grow from $0.79 billion in 2021 to $1.04 billion in 2022 at a compound annual growth rate (CAGR) of 31.6%. The growth in the market is mainly due to the companies resuming their operations and adapting to the new normal while recovering from the COVID-19 impact, which had earlier led to restrictive containment measures involving social distancing, remote working, and the closure of commercial activities that resulted in operational challenges. The AI in drug discovery market is expected to reach $2.99 billion in 2026 at a CAGR of 30.2%.

Use of AI through Machine Learning (ML) is a trend in assessing pre-clinical studies during the drug development process. Pre-clinical studies are non-clinical studies for novel drug substances to establish clinical efficacy and safety in a controlled environment before testing with a final target population. ML modelling pharmacokinetic (PK) and pharmacodynamic (PD) methodologies are applied in in-vitro and preclinical PK studies to successfully anticipate the dose concentration response relationship of pipeline assets. In addition, deep learning methodologies are employed as In-Silico methods for successfully predicting the therapeutic/pharmacological properties of novel molecules by utilizing transcriptomic data, which includes various biological systems and controlled conditions. Besides the drug discovery market, machine learning technology finds its application in the AI in medical diagnostics market as well as AI in medical imaging market.

Major players in the artificial intelligence for drug discovery and development market are IBM Corporation, Microsoft, Atomwise Inc., Deep Genomics, Cloud Pharmaceuticals, Insilico Medicine, Benevolent AI, Exscientia, Cyclica, and BIOAGE.

The global artificial intelligence in drug discovery market report is segmented by technology into deep learning, machine learning; by drug type into small molecule, large molecules; by disease type into metabolic disease, cardiovascular disease, oncology, neurodegenerative diseases, others; by end-users into pharmaceutical companies, biopharmaceutical companies, academic and research institutes, others.

In 2021, North America was the largest region in the artificial intelligence (AI) in drug discovery market. It was followed by the Asia-Pacific, Western Europe, and then the other regions. The regions covered in the AI in drug discovery market report are Asia-Pacific, Western Europe, Eastern Europe, North America, South America, Middle East, and Africa.

Artificial Intelligence (AI) In Drug Discovery Global Market Report 2022 Market Size, Trends, And Global Forecast 2022-2026 is one of a series of new reports from The Business Research Company that provide artificial intelligence (AI) in drug discovery market overviews, artificial intelligence (AI) in drug discovery market analyze and forecast market size and growth for the whole market, artificial intelligence (AI) in drug discovery market segments and geographies, artificial intelligence (AI) in drug discovery market trends, artificial intelligence (AI) in drug discovery market drivers, artificial intelligence (AI) in drug discovery market restraints, artificial intelligence (AI) in drug discovery market leading competitors revenues, profiles and market shares in over 1,000 industry reports, covering over 2,500 market segments and 60 geographies.

The report also gives in-depth analysis of the impact of COVID-19 on the market. The reports draw on 150,000 datasets, extensive secondary research, and exclusive insights from interviews with industry leaders. A highly experienced and expert team of analysts and modelers provides market analysis and forecasts. The reports identify top countries and segments for opportunities and strategies based on market trends and leading competitors approaches.

Not the market you are looking for? Check out some similar market intelligence reports:

AI In Pharma Global Market Report 2022 By Technology (Context-Aware Processing, Natural Language Processing, Querying Method, Deep Learning), By Drug Type (Small Molecule, Large Molecules), By Application (Diagnosis, Clinical Trial Research, Drug Discovery, Research And Development, Epidemic Prediction) Market Size, Trends, And Global Forecast 2022-2026

Artificial Intelligence In Healthcare Global Market Report 2022 By Offering (Hardware, Software), By Algorithms (Deep Learning, Querying Method, Natural Language Processing, Context Aware Processing), By Application (Robot-Assisted Surgery, Virtual Nursing Assistant, Administrative Workflow Assistance, Fraud Detection, Dosage Error Reduction, Clinical Trial Participant Identifier, Preliminary Diagnosis), By End User(Hospitals And Diagnostic Centers, Pharmaceutical And Biopharmaceutical Companies, Healthcare Payers, Patients) Market Size, Trends, And Global Forecast 2022-2026

Cloud Services Global Market Report 2022 By Type (Software As A Service (SaaS), Platform As A Service (PaaS), Infrastructure As A Service (IaaS), Business Process As A Service (BPaaS)), By End-User Industry (BFSI, Media And Entertainment, IT And Telecommunications, Energy And Utilities, Government And Public Sector, Retail And Consumer Goods, Manufacturing), By Application (Storage, Backup, And Disaster Recovery, Application Development And Testing, Database Management, Business Analytics, Integration And Orchestration, Customer Relationship Management), By Deployment Model (Public Cloud, Private Cloud, Hybrid Cloud), By Organization Size (Large Enterprises, Small And Medium Enterprises) Market Size, Trends, And Global Forecast 2022-2026

Interested to know more about The Business Research Company?

The Business Research Company is a market intelligence firm that excels in company, market, and consumer research. Located globally it has specialist consultants in a wide range of industries including manufacturing, healthcare, financial services, chemicals, and technology.

The Worlds Most Comprehensive Database

The Business Research Companys flagship product, Global Market Model, is a market intelligence platform covering various macroeconomic indicators and metrics across 60 geographies and 27 industries. The Global Market Model covers multi-layered datasets which help its users assess supply-demand gaps.

View original post here:
Artificial Intelligence (AI) In Drug Discovery Market Growth Is Driven At A 30% Rate With Increasing Adoption Of Cloud-Based Applications And Services...

VMware claims ‘bare-metal’ performance on virtualized GPUs – The Register

The future of high-performance computing will be virtualized, VMware's Uday Kurkure has told The Register.

Kurkure, the lead engineer for VMware's performance engineering team, has spent the past five years working on ways to virtualize machine-learning workloads running on accelerators. Earlier this month his team reported "near or better than bare-metal performance" for Bidirectional Encoder Representations from Transformers (BERT) and Mask R-CNN two popular machine-learning workloads running on virtualized GPUs (vGPU) connected using Nvidia's NVLink interconnect.

NVLink enables compute and memory resources to be shared across up to four GPUs over a high-bandwidth mesh fabric operating at 6.25GB/s per lane compared to PCIe 4.0's 2.5GB/s. The interconnect enabled Kurkure's team to pool 160GB of GPU memory from the Dell PowerEdge system's four 40GB Nvidia A100 SXM GPUs.

"As the machine learning models get bigger and bigger, they don't fit into the graphics memory of a single chip, so you need to use multiple GPUs," he explained.

Support for NVLink in VMware's vSphere is a relatively new addition. By toggling NVLink on and off in vSphere between tests, Kurkure was able to determine how large of an impact the interconnect had on performance.

And in what should be a surprise to no one, the large ML workloads ran faster, scaling linearly with additional GPUs, when NVLink was enabled.

Testing showed Mask R-CNN training running 15 percent faster in a twin GPU, NVLink configuration, and 18 percent faster when using all four A100s. The performance delta was even greater in the BERT natural language processing model, where the NVLink-enabled system performed 243 percent faster when running on all four GPUs.

What's more, Kurkure says the virtualized GPUs were able to achieve the same or better performance compared to running the same workloads on bare metal.

"Now with NVLink being supported in vSphere, customers have the flexibility where they can combine multiple GPUs on the same host using NVLink so they can support bigger models, without a significant communication overhead," Kurkure said.

Based on the results of these tests, Kurkure expects most HPC workloads will be virtualized moving forward. The HPC community is always running into performance bottlenecks that leaves systems underutilized, he added, arguing that virtualization enables users to make much more efficient use of their systems.

Kurkure's team was able to achieve performance comparable to bare metal while using just a fraction of the dual-socket system's CPU resources.

"We were only using 16 logical cores out of 128 available," he said. "You could use that CPU resources for other jobs without affecting your machine-learning intensive graphics modules. This is going to improve your utilization, and bring down the cost of your datacenter."

By toggling on and off NVLink between GPUs, additional platform flexibility can be achieved by enabling multiple isolated AI/ML workloads to be spread across the GPUs simultaneously.

"One of the key takeaways of this testing was that because of the improved utilization offered by vGPUs connected over a NVLink mesh network, VMware was able to achieve bare-metal-like performance while freeing idle resources for other workloads," Kurkure said.

VMWare expects these results to improve resource utilization in several applications, including investment banking, pharmaceutical research, 3D CAD, and auto manufacturing. 3D CAD is a particularly high-demand area for HPC virtualization, according to Kurkure, who cited several customers looking to implement machine learning to assist with the design process.

And while it's possible to run many of these workloads on GPUs in the cloud, he argued that cost and/or intellectual property rules may prevent them from doing so.

An important note is VMware's tests were conducted using Nvidia's vGPU Manager in vSphere as opposed to the hardware-level partitioning offered by multi-instance GPU (MIG) on the A100. MIG essentially allows the A100 to behave like up to seven less-powerful GPUs.

By comparison, vGPUs are defined in the hypervisor and are time-sliced. You can think of this as multitasking where the GPU rapidly cycles through each vGPU workload until they're completed.

The benefit of vGPUs is users can scale well beyond seven GPU instances at the cost of potential overheads associated with rapid context switching, Kurkure explained. However, at least in his testing, the use of vGPUs didn't appear to have a negative impact on performance compared to running on bare metal with the GPUs passed through to the VM.

Whether MIG would change this dynamic remains to be seen and is the subject of another ongoing investigation by Kurkure's team. "It's not clear when you should be using vGPU and when we should be running in MIG mode," he said.

With vGPU with NVLink validated for scale-up workloads, VMware is now exploringoptions such as how these workloads scale across multiple systems and racks over RDMA over converged Ethernet (RoCE). Here, he says, networking becomes a major consideration.

"The natural extension of this is scale out," he said. "So, we'll have a number of hosted connected by RoCE."

VMware is also investing how virtualized GPUs perform with even larger AI/ML models,

Kurkure's team is also investigating how these architectures scale with even larger AI/ML, like GPT-3, as well as how they can be applied to telco workloads running at the edge.

Go here to read the rest:
VMware claims 'bare-metal' performance on virtualized GPUs - The Register

Crypto Is An Invaluable Tool In The Fight Against Financial Oppression – – FinanceFeeds

Crypto has proven itself to be much more than just a hot investment. Indeed, some say its poised to play a critical role in the future of finance

Money, as we know it, has evolved from its earliest form of clay tablets and precious metals to coins and banknotes and most recently, digital bank balances. So, will crypto become the next progression in the history of money?

There are reasons to think it wont. Governments across the world have plenty of motives to want to defend the status quo, which ensures state-backed institutions have a complete monopoly on everything that makes the economy go round namely printing money. Yet, crypto has several characteristics that have so far prevented governments from keeping a lid on it.

Crypto promises to put economic control back into the hands of the masses because it is built on an open, global network that doesnt recognize any national borders. With crypto, people can transact on a shared network in the same way they can communicate with people anywhere in the world on the internet. Better still, these networks are beyond the control of national governments and have so far proven impossible to shut down. This principle was designed by Bitcoin creator Satoshi Nakamoto and is designed to create more open markets and promote financial freedom for all crypto users.

Prior to the invention of crypto, financial freedom was limited to the trust people have in their governments and respect for the rule of law. Crypto makes it possible for anyone to grow their wealth without worrying about the intervention and seizure of their assets by third parties such as a bank or the government.

Another benefit of crypto is smart contracts. Previously, contractual agreements were governed by laws, which meant people couldnt always be confident that the courts would enforce them. With smart contracts, agreements are no longer enforced by courts but by the blockchain.

Furthermore, crypto is anonymous. It doesnt matter if its Bitcoin or Ethereum or Fantom or Avalanche or some other network. Crypto doesnt give a damn whether youre white or Black, Hispanic or Asian. It doesnt care about your gender, your religion, or your political views. That compares to the existing financial system, which in some countries is inherently biased towards people of certain creeds and dispositions. With crypto, all anyone needs is a smartphone and an internet connection and they can download a mobile wallet and get paid in tokens, buy them and sell them, participate in decentralized finance, and more.

A final characteristic of crypto is its mobility, a key component of economic freedom. Users can send any amount of Bitcoin to anyone, anywhere in the world, and they can fly from San Francisco to Tel Aviv with millions of dollars worth of funds without having to inform anyone or declare anything. As a result, crypto significantly reduces the barriers to emigration, boosting economic freedom.

The economic freedom promoted by crypto has given cause for concern. In the wake of Russias invasion of Ukraine, some observers have suggested crypto could give Vladimir Putins government a way to mitigate international sanctions. Others have warned that criminals are undoubtedly using cryptocurrency to launder the proceeds of crime or fund terrorism around the world.

Those fears may be grounded in truth, however, it could be a price worth paying for the freedom from financial and political repression, surveillance, and deplatforming that crypto also enables.

The unique characteristics of crypto mean that it is, to all intents and purposes, resistant to censorship. That means the government cannot control or monitor peoples financial activity or prevent them from accessing their funds as they can in the traditional banking system.

A good example of this occurred in Nigeria in 2020, when protests erupted against the government in its largest city, Lagos. The population was protesting against the illegal actions of a police force known as the Special Anti-Robbery Squad (SARS), which became infamous for police brutality. The government attempted to clamp down on the protests by suspending the bank accounts of key leaders in the movement. However, they immediately turned to cryptocurrency, in particular Bitcoin, to raise funds to sustain their movement, which ultimately caused the government to disband SARS.

The event was no flash in the pan. Usage of Bitcoin in Nigeria and other African nations has grown rapidly as an alternative to the traditional day-to-day banking system. Thats because anyone can use Bitcoin, and its transaction fees are minimal compared to the charges people face for using traditional systems.

Nigerias Central Bank has been far from enthusiastic about the populations embrace of cryptocurrency and in early 2021 issued a ban on banks and financial institutions dealing with digital money. However, Nigerias young and tech-savvy quickly found a way around the ban, using peer-to-peer trading services to buy cryptocurrencies and cash out without using traditional banks. In May, Nigerias Securities and Exchange Commission did an about-turn, publishing a set of regulations around digital assets in an effort to find a middle ground between an outright ban and the unregulated use of crypto.

The experience of Nigeria is not unique. In Belarus for instance, President Alexander Lukashenko also tried to use the monetary and banking system to silence his critics following disputed elections in 2020. Protestors flooded the streets of Minsk and other cities following Lukashenkos apparent win, and leaders soon found their bank accounts were frozen. Yet they continued raising funds for their protests with crypto, with one fund called BYSOL reportedly netting over $2 million worth of donations in a month.

Crypto has value beyond funding protest movements though. It can also serve as a replacement for cash, which is seen as an essential ingredient of financial freedom because it allows for anonymous transactions away from state surveillance. Unfortunately, cash is in terminal decline in many parts of the world. In China, for example, the government has pressed its citizens to replace cash and use digital apps for their day-to-day payments instead. While such apps may offer more convenience, they also give the government much greater control over peoples finances, and the ability to cut off someones access to payments, credit, and savings for any reason.

In the world of decentralized finance, this kind of financial deplatforming of government critics becomes impossible. With new cryptocurrencies such as Verse, the utility token of the Bitcoin.com ecosystem, anyone can access a full ecosystem of decentralized finance services that are beyond the control of any government entity.

Bitcoin.com provides users with a non-custodial multi-coin wallet that only they can access, meaning no one can freeze or seize their crypto assets. Users of Bitcoin.coms ecosystem of products and services will not only earn Verse tokens for doing so but also unlock various rewards and DeFi services.

For example, holders of Verse can provide liquidity to the Verse DEX, a decentralized exchange, in return for earning a share of the trading fees on that platform. They can also stake Verse tokens for rewards, and access other services that allow them to lend and borrow cryptocurrency. In other words, Verse and Bitcoin.com provide access to a comprehensive, alternative banking system that no government can control.

Crypto ecosystems have already thrived where theres a need. Take Venezuela, where thousands of merchants began using the Dash cryptocurrency in the wake of hyperinflation that rendered the national currency, the Bolivar, virtually worthless. Its a similar story in Afghanistan today. Since the Taliban swept to power last year, the country has been almost completely cut off from the international banking system. As a result, many Afghans have turned to crypto to send and receive money from abroad and also for their everyday transactions.

The takeaway from all of this is that crypto can and will play a fundamental role in enabling greater economic freedom all over the world. With crypto, people have an alternative to the traditional banking system thats immune to political oppression. It has shown it can help to build better-functioning economies in countries with runaway inflation, making it easier for people to transact, protect their wealth and perhaps even emigrate to a better life.

Read the original here:

Crypto Is An Invaluable Tool In The Fight Against Financial Oppression - - FinanceFeeds

Asymmetric Encryption: What It Is & Why Your Security Depends on It – Hashed Out by The SSL Store

From securing websites to signing software, youll find asymmetric cryptography (including encryption) in use virtually everywhere online. Heres what you need to know about the cryptographic process that helps keep your data secure online

Asymmetric encryption is the backbone of internet security. Without it, stealing your critically sensitive data is as easy as taking candy from a baby for most cybercriminals. Weve seen plenty of the painful reminders over the last few years in data breaches that resulted from expired SSL/TLS certificates. (Hence why we always talk about the importance of certificate management to avoid these issues.)

But what is asymmetric encryption? Well start with a quick public key encryption definition before moving on to explore this more technical topic at length. Dont worry, well try to keep this briefer than our usual tome-style explanatory posts.

Lets hash it out.

To put it simply, asymmetric encryption encrypts and decrypts the data shared between two parties in public, insecure channels (like the internet). This process involves using two separate but related keys. In a nutshell, its all about securing your sensitive information to keep it out of the hands of unauthorized users or entities (e.g., cybercriminals) when you need to upload it to a website, send it via email, etc.

Asymmetric encryption is also part of whats known as asymmetric key cryptography and public key cryptography because the two keys used are mathematically related but unique (hence, asymmetric):

Heres a basic look at how this process occurs using the two keys:

Frankly, asymmetric encryption is a term that sounds more complex and intimidating than it actually is. Once you understand the basics, the whole thing will make a lot more sense. But if all of this is a bit hard to grasp, lets imagine that you have a special safe that uses two locks one key locks the safe and the other opens it. Likewise with asymmetric encryption, anyone who has access to the public key can use it to encrypt data, but only the person who has access to the private key can decrypt that information.

Asymmetric encryption is at the heart of a framework known as public key infrastructure. We arent going to get into the specifics of how PKI works because, frankly, describing it in every article is a bit of a time suck and gets monotonous. So, well just give you a quick summary before moving on: PKI is the foundation of technologies, policies, and processes that enables us to send sensitive data securely across the internet. It relies on a combination of public- and private-key algorithms, digital certificates, and policies.

The purpose of encryption is to ensure that any sensitive data you want to share with a specific person is kept secret to everyone except your intended recipient. This is necessary because we live in a time when we share and transmit data via multiple ISPs and routers, and many miles of cables beneath the oceans.

Historically, you used to have to meet up with someone face to face to exchange messages or secret keys to unlock future communications. (This is known as key distribution.) This process typically required taking a horse, boat or train to meet up with the other party to give them a copy of your secret key. But with the internet, these time-consuming rendezvous needed to exchange communications have been replaced with near-instant digital communications via the internet.

This is all fine and dandy except for one (not so teensy) little issue: the internet is incredibly insecure. Without a way for users to securely exchange keys to encrypt their data, then anyone could intercept the communications in transit. Asymmetric encryption solves this key distribution issue by creating a way to securely exchange keys (or key-related data) without ever having to meet the other party in person.

Encryption works by applying a complex mathematical formula to your original plain text (readable) data to convert it into a long, indecipherable data string. So, if you took the message I cant wait for season 4 of Stranger Things! and encrypted it using a 2048-bit RSA public key (more on RSA later), youd wind up with a gibberish message that looks like this:

Clearly, this isnt something that any human being can make heads or tails of in terms of deciphering the message thats a good thing when it comes to keeping your sensitive information secret. The good news is that computers allow us to use encryption keys this size and larger to encrypt data in a secure way so that unauthorized users cant access it.

What makes this even better news is that even if a bad guy tried using a modern supercomputer to try to crack the key, theyd still be out of luck. This is because the sheer computational processing resources and time required would span far longer than their entire lifetime and the lifetimes of many generations of family members that follow i.e., were talking millions of years here.

Well talk you through the process of how asymmetric key encryption works later in the article. But for now, we want to point out that asymmetric key encryption isnt the only tool we have up our sleeves when it comes to PKI

Technically, asymmetric encryption could be used on its own as a way to send and receive data. But why would you want to do that? Its just too bulky and resource-intensive to be used for that purpose at scale. (Not good for large businesses that handle a lot of connections to their websites and services.) This is why, in many cases, asymmetric encryption is used initially as a way to securely exchange sensitive data between two parties before they switch to using symmetric encryption for the rest of the exchange.

Symmetric encryption, or whats sometimes called symmetric key encryption, uses just one key for both for data encryption and decryption. This means that theres only a single key that must be kept secure hence, why this method of encryption is known as private key encryption or secret key encryption.

Symmetric encryption is faster and also is thought to be more secure than asymmetric encryption when the parties are using smaller key sizes. (When using large key sizes, asymmetric encryption wipes the floor with symmetric encryption but does so at the cost of speed.) But each cryptographic approach has its uses and applications. Check out our other article to learn more about the difference between asymmetric vs symmetric encryption.

So now that we know what asymmetric key encryption is and have a basic idea of what it does, lets explore a few examples of how you can use it to improve your organizations data security:

Algorithms are, basically, the instructions that computers use to solve a problem. Asymmetric key encryption algorithms come in different flavors or varieties for you to choose from. But you cant take a one-size-fits-all approach when it comes to selecting the right asymmetric encryption algorithms to meet your needs.

Of course, there are clear differences between many of these asymmetric key algorithms how they operate, what their specific key lengths and security strengths are, etc. You have to choose the right one based on your needs or use cases. Lets quickly explore two of the most common public key encryption algorithms:

Of course, RSA isnt the only asymmetric key exchange algorithm. Here are a few other notable algorithms worth mentioning for secure remote key distribution as well:

To learn more about each of the different types of asymmetric algorithms, be sure to check back with us over the next few months. Well publish an article that will focus on that exact topic (much like what we did with symmetric encryption algorithms).

Asymmetric encryption between two parties works by using a public key to encrypt data and a private key to decrypt it. The process looks something like this:

If you were to break down what this process looks like, lets consider the Stranger Things example from earlier. Lets say I want to send you the following message: I cant wait for season 4 of Stranger Things! (Not sure why this message would be sensitive enough to require encryption, but lets just run with it.) In this case, Ill use your public key (which looks something like this when using a 2048-bit RSA key) to decrypt the data:

When you apply it to the message, youll wind up with the data string we showed you earlier:

Obviously, you wont know what Im saying with the message still encrypted. Youll then use your private key, which is considerably longer to decrypt the data string:

This will then decrypt the data and allow you to read the original plain text message.

Dont worry, well cover all of this more in depth in a future article. Stay tuned for that!

Alright, weve droned on enough about asymmetric cryptography and its corresponding encryption and key exchange algorithms. Hopefully, youll leave this article with greater knowledge of asymmetric cryptosystems than you started with.

Asymmetric encryption and key exchange algorithms are the cornerstones of modern public key infrastructure. Without them, there would be no way to remotely exchange sensitive or otherwise secret information via public channels like the internet. Wed still be using clandestine face-to-face meetings like stereotypical spies from Hollywood films.

Understanding what asymmetric encryption is and how it all works is the first step to helping strengthen your organizations cyber defenses. When you realize the importance of managing your certificates and protecting your cryptographic keys, itll help you avoid many of the pitfalls that help companies make unflattering headlines due to data breaches and other security incidents.

Original post:
Asymmetric Encryption: What It Is & Why Your Security Depends on It - Hashed Out by The SSL Store

Aes Encryption Software Market is Expected to Reach US$ 43.33 Bn by the End of 2031-Dell, Eset, Gemalto, IBM, Mcafee, Microsoft, Pkware, Sophos,…

The report gives an abstract and quantitative examination of theGlobal Aes Encryption Software.The examination relies upon the division of the Aes Encryption Software which focuses on monetary and non-money related factors impacting the Aes Encryption Software improvement. The report joins a genuine scene which concludes the market position in the focal parts, including new help offered, thing dispatches, business associations, combinations and acquisitions in the past five years.

Companies operating in the Aes Encryption SoftwareDell, Eset, Gemalto, IBM, Mcafee, Microsoft, Pkware, Sophos, Symantec, Thales E-Security, Trend Micro, Cryptomathic, Stormshield

The report highlights of emerging examples, with principal drivers, risks, and likely entryways In the Aes Encryption Software. The crucial creators across the world in the worldwide Aes Encryption Software are organized in the report. Considering such things introduced in the Aes Encryption Software, the around the world Aes Encryption Software is ordered Into different segments. The part overpowered the Aes Encryption Software and held the greatest piece of around the world Aes Encryption Software in the year 2020, and continues to govern the market in 2021 are positive in the report.

We Have Recent Updates of Aes Encryption Software in Sample[emailprotected]https://www.mraccuracyreports.com/report-sample/359513

Considering use, the around the world Aes Encryption Software is ordered into different application sections. The application section that is depended upon to drive the slice of the pie of the Aes Encryption Software in the next few years are highlighted and thought about in the report. The indispensable components of advancement in this application segment are explained in the report. The areas that addressed the greatest pay part of around the world Aes Encryption Software in 2022 are considered in the report. Additionally are depended upon to continue with the edge over its opponents in the regarded time span are considered in the report. The grounded establishment and innumerable Vessel Monitoring System Software associations in these regions are organized in the report.

By the product type, the market is primarily split into:On-premises, Cloud.

By the end-users/application, this report covers the following segments:Disk Encryption, File/folder Encryption, Database Encryption, Communication Encryption, Cloud Encryption

Elements of the Report: New game plans and commitments that market players can imagine are in like manner discussed in the report. The possible entryways for business trailblazers and effect of the Coronavirus pandemic are associated with the around the world Aes Encryption Software. New things and organizations that are thriving in this speedy progressing around the world Aes Encryption Softwares monetary environment are discussed in the report. The report discusses the how certain advancement things, market frameworks, or game plans could assist with showcasing players. The pay open entryways and the growing new game plans are discussed in the report. The unquestionable characteristics of each part and market open entryways are explained in the report. The powers during the pandemic are relied upon to accelerate the hypothesis pace in the around the world Aes Encryption Software are point by point in the report. The report gives proposition on the way forward in the around the world Aes Encryption Software.

Table of Contents1.1 Study Scope1.2 Key Market Segments1.3 Players Covered: Ranking by Vessel Monitoring System Software Revenue1.4 Market Analysis by Type1.4.1 Aes Encryption Software Size Growth Rate by Type: 2020 VS 20281.5 Market by Application1.5.1 Aes Encryption Software Share by Application: 2020 VS 20281.6 Study Objectives1.7 Years Considered1.8 Continue

Inquiry for Buying Report @https://www.mraccuracyreports.com/checkout/359513

This report tends to a couple of key requests: What is the by and large expected advancement of around the world Aes Encryption Software after Coronavirus vaccination or treatment is found? What are the new essential methodologies that can be executed post-pandemic to remain merciless, agile, client driven, and helpful in the around the world Aes Encryption Software? Which unequivocal regions are depended upon to drive improvement in the around the world Aes Encryption Software? What are key government approaches and interventions did by driving around the world Aes Encryption Software countries to help with advancing gathering or improvement of Vessel Monitoring System Software.

Read the rest here:
Aes Encryption Software Market is Expected to Reach US$ 43.33 Bn by the End of 2031-Dell, Eset, Gemalto, IBM, Mcafee, Microsoft, Pkware, Sophos,...

Senate bill to limit police encryption scores another victory – The Almanac Online

Senate Bill 1000, which would require law enforcement agencies throughout California to find alternatives to encrypting their radio communications, received a 5-2 vote from the Senate Appropriation Committee on May 19, 2022. Embarcadero Media file photo.

State Sen. Josh Becker's proposal to require police departments to find alternatives to radio encryption took another major step forward Thursday when the Senate Appropriations Committee voted to advance the bill.

The committee's 5-2 vote means that Senate Bill 1000 will now advance for a full vote by the state Senate. The bill would still need to clear the state Assembly and get the governors signature before it becomes law.

State Sen. Josh Becker, D-Menlo Park, speaks to media about school reopenings at Barron Park Elementary in Palo Alto on March 2, 2021. Photo by Magali Gauthier.

Becker's bill addresses a recent trend by police departments throughout California, including in Palo Alto, to encrypt their radio communications, a practice that removed the historic ability of journalists and members of the general public to monitor police activities through a police scanner.

SB 1000 would require agencies to come up with policies that would open up communications while ensuring that personal identifiable information such as Social Security numbers and criminal records remains protected. Some agencies, including the California Highway Patrol, already have such policies in place.

Though Palo Alto moved to encrypt police radio communication in January 2021, the City Council has since come out in support of the Becker bill. The legislation has also been endorsed by the California Newspaper Publishers Association and the California Broadcasters Association.

See the original post:
Senate bill to limit police encryption scores another victory - The Almanac Online

WhatsApp beta update seeks to remind everyone why encryption is so vital – iMore

Source: Luke Filipowicz/iMore

WhatsApp has rolled out a new beta to iOS users that includes a tweaked privacy and encryption message while also linking out to more information for those who want to learn about what it means for them.

The latest WhatsApp beta tweaks something that was already added in a previous one a new line of text that reminds users their chats are encrypted and adds a link to a page that further explains what the use of encryption actually offers users and what it protects.

WABetaInfo has all the details:

After updating to the new WhatsApp beta for iOS 22.11.0.73 update, a new footer for end-to-end encryption shows up at the bottom of your status updates, call history, chats list, and devices list. The page that shows up when tapping the footer informs people what is secured by end-to-end encryption: text and voice messages, audio and video calls, photos, videos, and documents, location sharing, and status updates.

Notably, the page that is now linked to isn't actually a new one and is instead an existing explainer that can be found within the settings portion of the app.

Encryption is an important part of WhatsApp and it's one of the reasons that it is one of the best iPhone messaging apps around. It isn't the only offering that features encryption, of course, but its large user base and cross-platform support makes it a great solution for people that need to be able to communicate with people on other platforms, including Android and Windows-based PCs.

Visit link:
WhatsApp beta update seeks to remind everyone why encryption is so vital - iMore

Hoping Club will invest in startup in the field of digital encryption in Singapore – GlobeNewswire

London, UK, May 24, 2022 (GLOBE NEWSWIRE) -- Hoping Club, a global asset management and investment organization, revealed that it will invest in a startup in the field of digital cryptoin Singapore, and the specific details are under negotiation.The investment is led by thunder flight, the Singapore Branch of Hoping Club, to help Hoping Club expand its investment business in the field of digitalcrypto. Singapore is a popular location for cryptocurrency companies and one of the pioneers in formulating a formal licensing framework in the world. Because the regulatory and operating environment is relatively clear, it has attracted many technology giants to settle down, and has also been favored by many financial investment fields.

Hoping Club is an investment organization founded on Wall Street by KobySadan, CEO of VikingLongFundMasterLtd. At the beginning, the company only did simple investment business. In just a few years, it went out of Wall Street and became a multinational organization. Its investment involves traditional and emerging fields such as real estate, financial bonds, heavy metals, energy and digital crypto.

Initial Stage Based on Local

Hoping Club is headquartered on Wall Street in Manhattan, New York. In July 2012, Koby Sadan, CEO of Viking Long Master Fund Ltd., founded Hoping Club in order to try to expand the investment field outside the fund's stocks. The early members of Hoping Club are composed of senior managers of major investment banks on Wall Street. The organization has three departments: stock investment, fund investment and futures venture capital. Koby Sadan has rich investment experience. With the support of Viking Long Master Fund Ltd., Hoping Club won its first battle in the financial market.

Medium Term Global Perspective& FutureChallenge Technology

In recent years, Hoping Club has also been involved in high liquidity digital crypto assets, digital art NFT collection and decentralized financial investment including technology, IT, blockchain and digital quantification. Hoping Club has established a digital team composed of 30 data scientists and engineers, which is responsible for the comprehensive digital upgrading of business model and technological innovation in the investment field, and applies big data analysis to the investment decision-making process. Hoping Club has become an organization focusing on practice and research. They will formulate a detailed investment strategy according to their own industry survey, and encourage the team to find new ideas.

Under this mechanism, the new technology and culture empower Hoping Club to achieve a win-win situation between members and the guild through a complete ecology, and achieve new breakthroughs in the wave of new technology.

Original post:
Hoping Club will invest in startup in the field of digital encryption in Singapore - GlobeNewswire