Edward Snowden: CBDC Is a Perversion of Cryptocurrency – CryptoPotato

The infamous US whistleblower Edward Snowden criticized CBDCs potential impact on the financial network. He labeled them as a perversion of cryptocurrency and a cryptofascist currency, as they could grant a lot of power to the governments and leave less freedom to the people.

The computer programmer who worked as a subcontractor for the National Security Agency (NSA) Edward Snowden opined strongly against the potential use cases of central bank digital currencies. In a recent note called Your Money and Your Life, he opposed the belief that a CBDC will be the representation of the digital dollar, explaining:

I will tell you what a CBDC is NOT it is NOT, as Wikipedia might tell you, a digital dollar. After all, most dollars are already digital, existing not as something folded in your wallet, but as an entry in a banks database, faithfully requested and rendered beneath the glass of your phone.

Snowed further explained on Twitter the main disadvantages of central bank digital currencies:

A CBDC is a perversion of cryptocurrency, or at least of the founding principles and protocols of cryptocurrency a cryptofascist currency.

He added that launching the financial tool would put the government at the center of every transaction, meaning less ownership of money from the general population and thus less freedom.

As an example of his statement, Snowden pointed out China. There, the total ban on everything crypto, alongside the release of the digital-yuan, is intended to increase the ability of the State to impose itself in the middle of every last transaction.

The 38-year-old American, who now resides in Russia because of his issues with the US government, has been both a critic and an admirer of the leading cryptocurrency throughout the years.

He interacted with bitcoin after embezzling numerous classified documents from the National Security Agency, such as proof of mass government surveillance, espionage, computer hacking, and phone tapping. Snowden admitted he used BTC to help him reveal the stolen information:

The servers that I used to transfer this information to journalists were paid for using bitcoin.

In March this year, Snowden stated that the digital assets operational structure has many disadvantages, especially when it comes to financial privacy:

Bitcoin sucks in many ways, such as financial privacy.

Last week, though, he praised bitcoins stability, saying that the Chinese ban only strengthened it. Thus, he joined the party of people who believe that the harsh stance on crypto in the most populated country is a huge opportunity for further progress of BTC.

Featured Image Courtesy of Politico

PrimeXBT Special Offer: Use this link to register & enter POTATO50 code to get 50% free bonus on any deposit up to 1 BTC.

See more here:
Edward Snowden: CBDC Is a Perversion of Cryptocurrency - CryptoPotato

Is it ethical to invest in cryptocurrency? – Stuff.co.nz

OPINION: As someone whos seen many investment fads, I think most retail investors will lose money from crypto currencies.

It is gambling, not investing. And, like gambling, only a few insiders will win.

Simplicity has recently become an indirect investor in a local crypto currency exchange called Easy Crypto, via an Icehouse Ventures fund we are invested in.

We insist our suppliers have an approach to ethical investing consistent with ours, but this is a good example of how different groups can reach different conclusions. Another KiwiSaver manager has invested directly.

READ MORE:* Monday thoughts: Why an ethical KiwiSaver provider invested in cryptocurrency industry* Four free online tools for investors* Warren Buffett becomes sixth member of US$100 billion club

Easy Crypto is a local success story, professionally run by people who passionately believe in the power of crypto to change the world.

And because it facilitates the buying and selling of crypto, investing in it is legitimising the industry. You might not invest in drugs directly, but if you own shops that sell them, youre invested in the drug trade.

So is crypto unethical? It is debatable. We have four areas of concern.

The first is how bad it is for the environment.

Chris McGrath/Getty Images

Cryptocurrencies show no evidence of allowing the unbanked greater financial inclusion, says Simplicity KiwiSaver chief executive Sam Stubbs.

No one knows for sure how much power is used to create (or mine) crypto. Estimates range from the amount of power used by Finland each year, to that used by Brazil.

An authoritative source, the University of Cambridge Bitcoin Electricity Consumption Index, calculates total consumption at over 80 GwH, or the equivalent of 23 coal fired power stations.

That is a huge amount of power for relatively few crypto users and miners.

And the more people that mine crypto, the more power is required. It currently costs between USD $7-11,000 of electricity to mine one bitcoin. But because they sell for much more, there is every incentive to carry on mining and pay the power costs.

Charlie Riedel/AP

Because cryptocurrencies require so much coal to be burnt to mine them, they are contributing to global carbon emissions. One estimate says crypto mining has the annual equivalent power requirements of a large country.

But is it the planet that really pays? The Cambridge study says 39 per cent of crypto uses at least some coal fired electricity, with the combined carbon footprint of London. Some crypto operators claim they only use renewable energy, although these claims have been challenged. But even if its true, it ignores the obvious consequence - the renewable power they use is unavailable to others, which forces the burning of more fossil fuels.

And an over-looked consequence of all the computing power required to mine crypto is the e-waste. The ever-increasing computing power required means hardware usually needs replacing every 18 months. It is too rarely re-used, or re-cycled. Credit to Icehouse Ventures and others who have backed local recycling company Mint Innovation, which extracts precious metals from e-waste.

The second concern is it exploits the poor.

In spite of assertions that crypto banks the unbanked, there is very little evidence to substantiate this. Quite the opposite in fact. Like gambling, it can hook them into yet another get rich quick scheme.

I have travelled enough in the developing nations to know that crypto features nowhere in daily transactions and cannot be used for essential financial services.

Fourteen years after the internet and mobile phones were invented, they were a viable way for the third world to access useful financial services. In contrast, 14 years after crypto was invented, almost no one is using it to transact anything useful.

SUPPLIED

E-waste recycling around the world is patchy at best.

Instead, crypto offers the poor the allure of getting rich quick by investing their hard-won savings.

And if crypto is just another form of gambling, and ethical investors wont invest in gambling, how is investing in crypto ethical?

Another virtue signal from crypto investors is that it is building a better financial infrastructure. This is a very dubious claim, and arguably virtue signalling. Better infrastructure is provided by the internet and blockchain, neither of which are exclusive to or because of, crypto.

Getty Images

Do cryptocurrencies offer better financial future for the poorest people in the poorest countries? Simplicity KiwiSaver chief executive Sam Stubbs says theres no evidence to support this claim.

The third concern is it harbours illegal activity.

The crypto world was designed to operate outside regulation and the law. So its a natural place to hide and launder the proceeds of crime. Some negate this by saying how little illegal money there is in crypto. But due to its untraceable nature, this is a dubious assertion.

Simple logic says the un-traceable and un-taxable nature of crypto means it is highly likely to be a magnet for criminals.

LAWRENCE SMITH/Stuff

Simplicity's Sam Stubbs says crypto was designed in ways that help criminals launder money.

And defenders say because criminals also use cash for laundering, crypto is no worse. But two wrongs dont make a right, and at least cash used for crime is traceable. Crypto simply isnt, and was designed to be that way.

And if taxes are the price of civil society, anything designed to hide wealth and avoid tax is, ipso facto, ethically questionable.

The fourth concern is how crypto thrives on ignorance and greed I first became concerned about the ethics of crypto when, on the same day, two Uber drivers told me they were in crypto, and asked me which one to buy. Neither had any real idea what they were investing in. They both used get rich quick, FOMO-fuelled language.

NZ Police/Supplied

Photos of the firearms, cash and gold organised crime gang individuals had possession over.

And the marketing used by the crypto industry is hardly re-assuring. Many use language very similar to pay day lenders.

At best, crypto is ethically questionable. At worst, it could be environmentally toxic, exploitative, fostering criminal activity and thriving on ignorance and greed. Ethical investors take note.

And when it comes to the motivation of greed, I will leave the last word to the worlds best investor, Warren Buffett.

Be fearful when others are greedy, and greedy when others are fearful.

Visit link:
Is it ethical to invest in cryptocurrency? - Stuff.co.nz

[Update: Rolling out] WhatsApp adds end-to-end encryption for Android cloud backups – 9to5Google

After being hinted at and after testing in previous beta builds, WhatsApp has confirmed that end-to-end encryption for cloud backups is set to roll out soon.

[Update 10/11]: After being officially announced, WhatsApps long-awaited encrypted backups are now beginning to roll out with the latest beta update for the Android and iOS apps. As the original post (below) notes, youll need to choose between a password or 64-bit key. Losing either will result in your backup being lost be that on Android or iOS.

Spotted by WABetaInfo, the option is said to be available as of v2.21.21.5 of WhatsApp for Android. However, after updating were not yet seeing the option when heading to Settings > Chats > Chat backup. This hints that the feature is not yet widely available but likely coming very soon to most users of the messaging platform.

When you do enable the feature, the backups are encrypted before upload. Which is why a cloud-based key or a password is required to recover when you sign in to a new device. The latest beta update should be rolling out right now via the Google Play Store provided that you are enrolled.

Original article posted 09/10 below

Announced in a Facebook Engineering blog post, end-to-end encryption has been missing from cloud backups despite the fact that the messages in chat gained the added security layer way back in 2016. The current implementation has relied heavily on iCloud and Google Drive for cloud backup storage, but security was only offered with 2FA when restoring on your device.

If you are a WhatsApp user, Facebook confirmed that end-to-end encryption for your future cloud backups will begin rolling out in the coming weeks. WhatsApp says that once the feature is enabled, neither WhatsApp nor the backup service provider will be able to access your backups or the encryption key used for backups:

People can already back up their WhatsApp message history via cloud-based services like Google Drive and iCloud. WhatsApp does not have access to these backups, and they are secured by the individual cloud-based storage services.

But now, if people choose to enable end-to-end encrypted (E2EE) backups once available, neither WhatsApp nor the backup service provider will be able to access their backup or their backup encryption key.

You will be able to choose between two options, either manually storing the 64-digit encryption key or setting a password:

This should make cloud backups and the backup process much more secure with WhatsApp, but it is worth noting that end-to-end encryption still doesnt guarantee 100% security for your data. Its also important to note that should you choose to use a 64-digit encryption key and lose the key, you will lose access to your backup. However, you can change or reset your password if you forget it.

Multi-device support has recently rolled out, but its worth noting that encrypted backups will only be available on your main or primary device. You can read the full white paper on WhatsApp and the end-to-end encrypted cloud backups here.

FTC: We use income earning auto affiliate links. More.

Check out 9to5Google on YouTube for more news:

Continue reading here:
[Update: Rolling out] WhatsApp adds end-to-end encryption for Android cloud backups - 9to5Google

Homomorphic Encryption Market New Coming Industry to Witness Great Growth Opportunities in Coming Years From 2021 to 2027: Microsoft (US), IBM…

An overview of the Homomorphic Encryption Market will help you provide scope and definitions, key findings, growth drivers, and a variety of dynamics.

The global Homomorphic Encryption market focuses on covering key statistical evidence of the Homomorphic Encryption industry. This is to add value to our readers as a guide in the face of market obstacles. Studies have reported a comprehensive addition of several factors, including global distribution, manufacturers, market size, and market factors that influence global contributions. In addition, the Homomorphic Encryption study focuses on detailed competitive environments, clear growth opportunities, market share combined with product types and applications, key production companies, and usage strategies.

Request a Sample PDF Brochure to Understand More Details about Homomorphic Encryption Market:https://www.worldwidemarketreports.com/sample/homomorphic-encryption

This intelligence and forecast for 2030 The Homomorphic Encryption industry report further show patterns that analyze previous data sources collected from trusted sources and sets a precedent growth trajectory for the Homomorphic Encryption market. The report also focuses on comprehensive market revenue flows, along with growth patterns, market trend-focused analysis, and overall market volume.

In addition, the Homomorphic Encryption report describes market segmentation based on various parameters and attributes based on geographic distribution, product type, application, and more. Market segmentation further clarifies the Homomorphic Encryption market, business trends, potential sources of revenue, and future regional distribution. Market opportunity.

Profiles of top industry players covered in this report:

Microsoft (U.S.), IBM Corporation (U.S.), Galois Inc (U.S.), CryptoExperts (France)

Global Homomorphic Encryption Market Trends: By Type

Partially Homomorphism, Somewhat Homomorphism, Fully Homomorphism

Global Homomorphic Encryption Business Analysis: By Application

Industrial, Government, Financial & Insurance, Health Care, Others

Regional analysis:

The report comes up with an accurate representation of the geographic extent of the global Homomorphic Encryption market, including a graphical description of popular product hotspots and the performance of various products and services in line with user preferences and priorities.

North America (US, Canada, and Mexico)Europe (Germany, UK, France, Italy, Russia, Spain, etc.)Asia Pacific (China, Japan, South Korea, India, Australia, Southeast Asia, etc.)South America (Brazil, Argentina, Colombia, etc.)The Middle East and Africa (South Africa, United Arab Emirates, Saudi Arabia, etc.)

Due to the ongoing COVID-19 pandemic around the world, the Homomorphic Encryption survey figures presented in this study may differ along with capacity and other mentioned aspects. Also, please note that there is a possibility of a cool-down period after the pandemic, and the data may differ as the world economy catches up.

Get Sample Report Containing Special COVID 19 Segments:https://worldwidemarketreports.com/covid19/homomorphic-encryption

The Homomorphic Encryption market research further emphasizes the fragmentation of the Homomorphic Encryption industry in global distribution. The report focuses on North America, Europe, Asia, and other regions in terms of business trend development, priority market channels, investment feasibility, long-term investment, and environmental analysis. The Homomorphic Encryption report also calls attention to investigating product capacity, product prices, profit flows, supply-to-demand ratios, production and market growth rates, and projected growth forecasts.

In addition, Homomorphic Encryption Market Research covers several factors such as market conditions, key market trends, growth forecasts, and growth opportunities. In addition, we analyze the challenges facing the Homomorphic Encryption market from a global and regional perspective. The survey also includes many opportunities and new trends to be considered considering the global impact of gaining a majority of market share.

Some of the features of this report:

Market Size Estimate: Homomorphic Encryption Market Size Estimate (value $ M).

Trend and Forecast Analysis: Market trends and forecasts by end-use and industry.

Segmentation analysis: Homomorphic Encryption market size by application and headset in terms of value and shipment volume.

Regional Analysis: Breakdown of the Homomorphic Encryption market by major regions such as North America, Europe, Asia, and other regions.

Growth Opportunities: Analysis of various applications in the Homomorphic Encryption market and growth opportunities in the region.

Strategic Analysis: This includes M & A, new product development, and the competitive environment of the Homomorphic Encryption market.

Analysis of fierce competition in the industry based on Porters Five Forces,SWOT Analysis, and PESTLE Analysis.

Get this Report on Discounted Price to Access Full Vital Information:https://www.worldwidemarketreports.com/discount/homomorphic-encryption

Read the original:
Homomorphic Encryption Market New Coming Industry to Witness Great Growth Opportunities in Coming Years From 2021 to 2027: Microsoft (US), IBM...

No outages, no data leaks: The new WhatsApp killer built on the blockchain creates privacy-focused encrypted messenger – Cointelegraph

Oxen is a privacy-focused platform built on top of a proof-of-stake (PoS) network. It has also built a secure and anonymous messaging platform Session.

The companys chief technical officer Kee Jefferys talked to Cointelegraph about its platform, its technology and how important privacy and data protection are for the end-user.

1. Hello! Tell us about Oxen and Session.

OXEN is a private, stakeable cryptocurrency. The Oxen coin(OXEN) has brought a lot of innovation to the CryptoNote space (CN), including instant transactions and a large-scale PoS system. However, the real magic is the service node network. Its powering a whole range of decentralized privacy applications all incentivized by OXEN.

So far, our shining star is Session.

Session is an encrypted messenger that takes an uncompromising stance on preserving user privacy. No phone numbers, email addresses, or any identifying information are needed to sign up for Session. The messenger lets people benefit from the best bits of blockchain without needing to run a node, hold any cryptocurrency, or even being familiar with what blockchain is. Because of that, its already getting mainstream adoption, and Session currently has over 200,000 active users. The app is available for free on iOS, Android, Mac, Windows and Linux.

2. Whats wrong with messaging giants like Messenger and WhatsApp?

Messenger and WhatsApp are both owned by Facebook, a company known for aggregating user data to be sold for profit to advertising companies at the expense of the end users privacy, putting very little energy into maximizing privacy and security for users.

So heres what we know about Facebook Messenger and WhatsApp:

WhatsApp and Facebook Messenger are the most popular messaging applications in the world, which technically means that encrypted messaging applications are the most popular form of communication. However, there is uncertainty about WhatsApps end-to-end encryption implementation because their closed source code makes it impossible to verify the quality of their encryption.

In addition to this, the centralized servers used by WhatsApp give them a central point of failure. Apps like Session that are built on a decentralized network can be more resilient to attacks and have less downtime.

3. How does Session plan to get ahead in this competitive space?

A primary focus early on for Session was to reach out to journalists, activists and NGOs to test the app and provide feedback.

Now, the encrypted platform is used all the way from Boston to Baghdad by well over 200,000 people across more than 200 countries. Activists, journalists and human rights defenders rely on Session to be able to communicate safely and effectively and continue doing their pivotal work. Users are able to have conversations with their friends and family without worrying whether their conversation is secure.

4. Why is anonymity in messaging so important?

Anonymity is privacy, and privacy, according to the United Nations, is a human right everyone should be entitled to see Article 12 of the UNs Declaration on Human Rights.

Around the world, people are persecuted for their opinions, beliefs and conversations. And even if its not your job, anyone posting on social media these days can be a whistleblower, activist, or revolutionary. That opens a lot of people up to being targeted and makes anonymity a huge issue for every single person on the internet.

5. How many people currently use Session?

Session has been downloaded over 500,000 times and currently has over 200,000 monthly active users, according to recent estimations. Due to the decentralized nature of Session, were unable to see the exact number of users we have. Apps like WhatsApp and Telegram have access to more accurate information regarding user numbers and activity.

6. What are the premium paid features that Session is planning to offer?

We strongly believe that the apps core functionality a hardcore private messenger should remain free. Secure messaging is an incredibly difficult challenge to solve, and the monetization features we add should improve the apps user experience and not restrict it behind a paywall.

That said, some of the paid features that Session may offer in the future:

All decentralized core components of Session are free. Some additional features and services that would consume OPTF resources to provide or put additional strain on the Oxen network will be included among Sessions premium features.

Sessions monetization strategy includes premium features that can be used to buy back and burn OXEN from the open market, adding additional deflationary pressure to the OXEN cryptocurrency.

7. Is it possible to migrate from other platforms to Session?

Community groups from other apps can easily shift from, lets say, the centralized Telegram to decentralized Session. However, there is no means of porting users directly from Telegram to Session.

The platforms open groups facilitate real-time group chats with an unlimited number of users, while the closed group feature where users can chat with up to 100 people with the same metadata protections as Sessions one-on-one conversations.

8. What are Sessions plans for the coming 12 months?

Our main objectives for the next 12 months are to increase the number of users and improve the monetization model. Were planning to add user-generated sticker packs, increase file size limits, remote device wiping, local message editing and more.

The biggest upgrade on the horizon is Lokinet integration, which will bring lower latency communication and better, non-Apple/Google-like push notifications as well as onion-routed voice and video calls.

Disclaimer. Cointelegraph does not endorse any content or product on this page. While we aim at providing you all important information that we could obtain, readers should do their own research before taking any actions related to the company and carry full responsibility for their decisions, nor this article can be considered as an investment advice.

Read more:
No outages, no data leaks: The new WhatsApp killer built on the blockchain creates privacy-focused encrypted messenger - Cointelegraph

SmartKargo Incorporates EDIfly Advanced Aviation Messaging At No Cost for Customers of its E-Commerce Logistics Solution – PR Web

"SmartKargo is pleased to provide the advanced benefits of EDIfly SM messaging at no cost to customers of our e-commerce solution." - Milind Tavshikar, CEO, SmartKargo

CAMBRIDGE, Mass. (PRWEB) October 12, 2021

SmartKargo has now embedded EDIfly into its end-to-end e-commerce solution to support free encrypted messaging for its airline clients. Air Asia Cargo, a cornerstone customer of SmartKargo, recently implemented the EDI-messaging solution with its ground handling partners in Indonesia. Air Asia is the leading low-cost carrier in Asia and a leading integrated logistics provider facilitating the movement of goods and e-commerce packages, through its Teleport cargo subsidiary, across Southeast Asia and beyond.

The EDIfly messaging platform is the signature tool of Luxembourg-based Innovative Software. Innovative Software SARL recently joined the IATA EPIC Platform and has now added logistics.cloud to support encrypted connectivity options through its low-cost EDIfly messaging technology based on open-source components. The platforms are facilitating exchanges for a growing number of partners in ground handling and warehouse management, airline trucking, forwarding, logistics, cargo community systems, or even some governments.

"EDIfly enables our airline customers like Air Asia to securely exchange operational messages with their logistics partners, which is so vital in the fulfillment of e-commerce transactions," said Milind Tavshikar, CEO of SmartKargo. "SmartKargo is pleased to provide the advanced benefits of EDIfly SM messaging at no cost to customers of our e-commerce solution."

The implementation of EDIfly is simple for SmartKargo's customers of SmartKargo's platform, as EDIfly relies on the same addresses already in use by legacy aviation messaging providers such as SITA, ARINC, Cargo-Community-Systems, and others. EDIfly SM also adds value to these exchanges with instant proof of delivery through a digital signature. This means comprehensive process control for business partners and a secured exchange not available with other traditional means, including email.

"In addition to the significant cost reduction over alternative messaging methods, EDIfly provides Air Asia with the utmost in data security for our messaging, and it is based on IATA standards," said Javed Malik, title, AirAsia.

SmartKargo's customers now benefit from complete tracking without the volume-related pricing typically incurred. EDIfly is the only solution today that can be GDPR and PCI/DSS compliant with certifiable encryption end-to-end, including into the application of the customer.

"EDIfly uniquely allows seamless integration and allows for self-administration capabilities," said Ingo Ressler, Chief Commercial Officer at EDIfly. "In addition, the messaging provides full transparency on performance and message delivery, and guarantees the delivery order through end-to-end sequencing of messages."

For more information, please visit http://www.smartkargo.com or http://www.edifly.com.

About SmartKargoSmartKargo delivers advanced digital technology to facilitate the efficient digital transformation of an airline's cargo business. With deep expertise in air cargo, technology, and e-commerce, SmartKargo empowers airlines to open new revenue streams through e-commerce package shipping and delivery, as recently featured in Forbes. The company is headquartered in Cambridge, Massachusetts (in what The New York Times called "the most innovative square mile on the planet"), with key offices in India, the Philippines, Brazil, and Canada. Learn more at http://www.smartkargo.com or on our social media at Linkedin, Twitter, or Instagram.

About EDIflyEDIfly, a product of Innovative Software SARL, provides innovative software for seamless integrated messaging in aviation and logistics since 2010. The company provides banking-like data security, superior rule-based message routing + monitoring based on IATA standards. EDIfly uses standard RSA/AES encryption and obtains a real-time non-repudiation proof-of-delivery from the receiving address. Innovative Software SARL has partnered with industry initiatives including IATA EPIC and logistics.cloud to support low-cost connectivity options through its EDIfly messaging technology based on open-source components. EDIfly promotes seamless migration away from legacy and fixed-link connectivity using the existing addressing Type B, Type X, Cargo: XML, PIMA schema, etc., while supporting high-level encryption to exchanges without applications changes. For more information contact http://www.edifly.com.

Share article on social media or email:

Continued here:
SmartKargo Incorporates EDIfly Advanced Aviation Messaging At No Cost for Customers of its E-Commerce Logistics Solution - PR Web

Cybersixgill Recognized as the Best Machine Learning Autonomous Solution by the 2021 Tech Ascension Awards – Yahoo Finance

TEL AVIV, Israel, Oct. 11, 2021 /PRNewswire/ -- Cybersixgill today announced its Investigative Portal and Darkfeed have been recognized as the best machine learning autonomous solution by the 2021 Tech Ascension Awards.

Cybersixgill Logo

Cybersixgill autonomous threat intelligence solutions provide real-time contextual intelligence and the necessary insight into the nature and source of each threat. Analysts can leverage the best-in-market data collection of hundreds of millions of intelligence items from the deep, dark and clear web, including historical data dating back to the 90s, deleted posts, invite-only messaging groups, and millions of threat actors.

With custom alerting and monitoring tailored to each organization's assets and needs, Cybersixgill eliminates the information overload - empowering security teams by delivering relevant and actionable intel to create faster security processes, break organizational silos, reduce operational costs while increasing return on security investment.

The Tech Ascension Awards recognized the very best innovations in cybersecurity. The Tech Ascension awards judged over 500 cybersecurity applicants based on technology innovation, market research, and competitive differentiators. The class-leading vendors that received recognition from the Tech Ascension Awards showcased technology that solves critical industry challenges and produces invaluable business outcomes for their customers.

"The only way cybersecurity can stay ahead of the threat curve is by leveraging autonomous technology that can deliver relevant intelligence in real time." said Sharon Wagner, CEO, Cybersixgill. "By understanding threat actors' network, expertise, and motivations, teams can build a complete intelligence picture and defend against data leaks, fraud, ransomware attacks."

"The proliferation of ransomware, nation-state threats, and an uptick in cybercriminal activity due to COVID-19 are just some of the factors that have made a strong cybersecurity defense paramount for every business that touches sensitive data," said David Campbell, CEO, Tech Ascension Awards. "We're honored to recognize these industry leaders that have demonstrated their ability to defend organizations with unique approaches, innovative technology, and world-class talent."

Story continues

To learn more about Cybersixgill, please visit http://www.cybersixgill.com and follow us on LinkedIn.

For more information about the Tech Ascension Awards, please visit http://www.techascensionawards.com

About Cybersixgill

Cybersixgill's fully automated threat intelligence solutions help organizations fight cyber crime, detect phishing, data leaks, fraud and vulnerabilities as well as amplify incident response in real-time. The Cybersixgill Investigative Portal empowers security teams with contextual and actionable insights as well as the ability to conduct real-time investigations. Rich data feeds such as Darkfeed and CVE insights from DVE Score harness Cybersixgill's unmatched intelligence collection capabilities and deliver real-time intel into organizations' existing security systems. Most recently, Cybersixgill introduced agility to threat intel with their CI/CP methodology (Continuous Investigation/Continuous Protection). Current customers include enterprises, financial services, MSSPs, government and law enforcement entities.

About the Tech Ascension Awards

The Tech Ascension Awards elevate companies that possess cutting-edge, innovative technology that solve critical challenges in their respective markets. Tech Ascension winners rise above the crowded consumer and enterprise technology industries and receive validation from an independent organization. Applicants are judged based on technology innovation and uniqueness, market research (analyst reports, media coverage, customer case studies), hard performance stats, and competitive differentiators. The awards recognize leaders in cybersecurity, DevOps, big data and consumer technology. For information about the Tech Ascension Awards, please visit http://www.techascensionawards.com.

Media contact: Laurie Ben-HaimCybersixgill+1-646-300-9549+972-52-7831911laurie@cybersixgill.com

Cision

View original content:https://www.prnewswire.com/news-releases/cybersixgill-recognized-as-the-best-machine-learning-autonomous-solution-by-the-2021-tech-ascension-awards-301397008.html

SOURCE Cybersixgill

Visit link:
Cybersixgill Recognized as the Best Machine Learning Autonomous Solution by the 2021 Tech Ascension Awards - Yahoo Finance

Toyota Research Institute Announces Machine Learning Advances at the International Conference on Computer Vision – Yahoo Finance

TRI Publishes Six Research Papers Pushing Boundaries of Scalable Learning at the Premier International Conference on Computer Vision

LOS ALTOS, Calif., Oct. 11, 2021 /PRNewswire/ -- Today, the Toyota Research Institute (TRI) announced the acceptance of six research papers in the field of machine learning at the International Conference on Computer Vision (ICCV). The research advances understanding across various tasks crucial for robotic perception, including semantic segmentation, 3D object detection and multi-object tracking.

TRIs research on multi-object tracking reveals that synthetic data could endow machines with fundamental human cognitive abilities, like object permanence, that are historically hard for machine learning models but second nature for humans.

Over the last six years, TRI's researchers have made significant strides in robotics, automated driving and materials science in large part due to machine learning the application of computer algorithms that constantly improve with experience and data.

"Machine learning is the foundation of our research," said Dr. Gill Pratt, CEO of TRI. "We are working to create scientific breakthroughs in the discipline of machine learning itself and then apply those breakthroughs to accelerate discoveries in robotics, automated driving, and battery testing and development."

As the International Conference on Computer Vision (ICCV) started, TRI shared six papers demonstrating TRI's robust research in machine learning, including geometric deep learning for 3D vision, self-supervised learning and simulation to real or "sim-to-real" transfer.

"Within the field of machine learning, scalable supervision is our focus," said Adrien Gaidon, head of TRI's Machine Learning team. "It is impossible to manually label everything you need at Toyota's scale, yet this is the state-of-the-art approach, especially for Deep Learning and Computer Vision. Thankfully, we can leverage Toyota's domain expertise in vehicles, robots or batteries to invent alternative forms of scalable supervision, whether via simulation or self-supervised learning from raw data. This approach can boost performance in a wide array of tasks important for automated cars to be safer everywhere anytime, robots to learn faster and battery development to speed up lengthy testing cycles."

Story continues

In the six papers accepted at ICCV, TRI researchers report several key findings. Notably, they show that geometric self-supervised learning significantly improves sim-to-real transfer for scene understanding. The resulting unsupervised domain adaptation algorithm enables recognizing real-world categories without requiring any expensive manual real-world labels.

In addition, TRI's research on multi-object tracking reveals that synthetic data could endow machines with fundamental human cognitive abilities, like object permanence, that are historically hard for machine learning models but second nature for humans. This new development increases the robustness of computer vision algorithms, making them more aligned with people's visual common sense.

Finally, TRI's research on pseudo-lidar shows that large-scale self-supervised pre-training considerably boosts performance of image-based 3D object detectors. The proposed geometric pre-training enables training powerful 3D Deep Learning models from limited 3D labels, which are expensive or sometimes impossible to get from images alone.

You can learn more about all six papers and TRI's machine learning work on TRI's Medium page or attend TRI's presentations at ICCV.

About Toyota Research Institute Toyota Research Institute (TRI) conducts research to advance robotics, energy and materials, machine learning, and human-centered artificial intelligence. Led by Dr. Gill Pratt, TRI's team of world-class researchers are developing technologies to amplify human ability, focused on making our lives safer and more sustainable. Established in 2015, TRI has offices in Los Altos, California; Cambridge, Massachusetts; and Ann Arbor, Michigan. For more information about TRI, please visit http://tri.global.

Media Contact:Wendy RosenDirector of CommunicationsToyota Research InstituteWendy.Rosen@tri.global

Toyota Research Institute Logo (PRNewsfoto/Toyota Research Institute)

Cision

View original content to download multimedia:https://www.prnewswire.com/news-releases/toyota-research-institute-announces-machine-learning-advances-at-the-international-conference-on-computer-vision-301396768.html

SOURCE Toyota Research Institute

Read this article:
Toyota Research Institute Announces Machine Learning Advances at the International Conference on Computer Vision - Yahoo Finance

Zebrium Releases New SaaS and On-Premises Editions that use Machine Learning to Quickly and Accurately Find the Root Cause of Software Problems -…

LOS ANGELES, Oct. 11, 2021 /PRNewswire/ -- KubeCon + CloudNative ConBooth # SU41 -Zebrium, the leader in using machine learning on logs to automatically find the root cause of software problems, today announced a major new release of its SaaS solution and, for the first time, afullyon-premises edition catering to organizations with the most stringentsecurity requirements. The on-premises solution ensuressensitivelog data always remainswithin a company'sprivate network.

The new SaaS edition includes a completely redesigned user interface and delivers a 10x performanceimprovement for finding theroot causein logs. The on-premises editionis packaged as a Kubernetes-deployed application and can be installed with just a single Helm command, making it easy to install, upgrade and manage. It includes open-APIsforeasyintegrationinto existing tools and workflows andis designed to scaleto meet the needs of the largest enterprise customers.It is based on the same proven Zebrium machine learning technology that is deployed in customerenvironments around the world.

Today's distributed applications generate huge volumes of software logs collected frommany different applications and microservices. Some of the log streams can intentionally or inadvertently contain sensitive PersonallyIdentifiable Information (PII), such as names, addresses and even credit card numbersor other details. For this reason, some companies, particularly those in regulated industries or in certain geographical locations,are not able to send log data to the cloud.The new on-premises edition satisfies their requirementsby keepingall logdatawithin an organization's own network.

"Quickly and accurately resolving application failures,or preventing them in the first place,is a top goal forall organizations," said Ajay Singh, CEO, Zebrium. "With this release, any type of company can achieve this goal, by deploying a SaaS solutionor an on-premises version wherethere is a strictrequirement to keep log data within a private network."

Newfeaturesand enhancements in SaaS and on-premises editions:

The new on-premisesand improved SaaS editionsare now in general availability.

For more information about Zebrium, please contact [emailprotected], visit the websiteor stop by Booth #SU41 at KubeCon + CloudNative Con at the Los Angeles Convention Center fromOctober 13to 15.

Media Contact:Kira WojackMerritt Public Relations[emailprotected] (415) 419-4062

SOURCE Zebrium

http://www.zebrium.com

Read the original:
Zebrium Releases New SaaS and On-Premises Editions that use Machine Learning to Quickly and Accurately Find the Root Cause of Software Problems -...

ScaleOut Software Adds Machine Learning Capabilities to its Twin Streaming Service – Database Trends and Applications

ScaleOut Software is adding major extensions to its ScaleOut Digital Twin Streaming Service that enable real-time digital twin software to implement and host machine learning and statistical analysis algorithms.

Real-time digital twins can now make extensive use of Microsofts ML.NET machine learning library to implement these groundbreaking capabilities for virtually any IoT device or source object.

Integration of machine learning with real-time digital twins offers powerful new options for real-time monitoring across a wide variety of applications, according to the vendor.

For example, cloud-based real-time digital twins can track a fleet of trucks to identify subtle changes in key engine parameters with predictive analytics that avoid costly failures. Security monitors tracking perimeter entrances and sound sensors can use machine learning techniques to automatically identify unexpected behaviors and generate alerts.

By harnessing the no-code ScaleOut Model Development Tool, a real-time digital twin can easily be enhanced to automatically analyze incoming telemetry messages using machine learning techniques.

Machine learning provides important real-time insights that enhance situational awareness and enable fast, effective responses.

The tool provides three configuration options for analyzing numeric parameters contained within incoming messages to spot issues as they arise:

Once configured through the ScaleOut Model Development Tool, the ML algorithms run automatically and independently for each data source within their corresponding real-time digital twins as incoming messages are received.

Each real-time digital twin can automatically capture anomalous events for follow-up analysis and generate alerts to popular alerting providers, such as Splunk, Slack, and Pager Duty, to support remediation by service or security teams.

We are excited to offer powerful machine learning capabilities for real-time digital twins that will make it even easier to immediately spot issues or identify opportunities across a large population of data sources, said Dr. William Bain, ScaleOut Softwares CEO and founder. ScaleOut Software has built the next step in the evolution of the Microsoft Azure IoT and ML.NET ecosystem, and we look forward to helping our customers harness these technologies to enhance their real-time monitoring and streaming analytics.

For more information about this news, visit?www.scaleoutsoftware.com.

See original here:
ScaleOut Software Adds Machine Learning Capabilities to its Twin Streaming Service - Database Trends and Applications