Whats good, bad, and missing in the Facebook whistleblowers testimony – The Verge

Today lets talk about Facebook whistleblower Frances Haugens testimony before the Senate: the good, the bad, and what ought to happen next.

For more than three hours on Tuesday, Haugen addressed a subset of the Senate Commerce Committee. She appeared calm, confident, and in control as she read her opening remarks and fielded questions from both parties. While she brought more nuance to her critique than most Facebook critics she supports Section 230, for example, and opposes a breakup of the company she also said the company should declare moral bankruptcy.

This is not simply a matter of certain social media users being angry or unstable, or about one side being radicalized against the other, Haugen told Congress. It is Facebook choosing to grow at all costs, becoming an almost trillion-dollar company by buying its profits with our safety.

The Senate largely ate it up. Long frustrated by Facebooks size and power and, one suspects, by its own inability to address those issues in any constructive way senators yielded the floor to Haugen to make her case. During the hearing titled Protecting Kids Online: Testimony from a Facebook Whistleblower, Haugen walked senators through most of The Wall Street Journals Facebook Files, touching on ethnic violence, national security, polarization, and more during her testimony.

For their part, senators sought to paint the hearing in historic terms. There were repeated comparisons to Big Tobacco, and a Big Tobacco moment. This research is the definition of a bombshell, said Sen. Richard Blumenthal (D-CT), who led the hearing.

Over at Facebook, the strategic response team lobbed a half-hearted smear at Haugen, noting bizarrely that while at the company, she had no direct reports and never attended a decision-point meeting with C-level executives. If theres a point in there, I missed it.

Ultimately, Haugen said little on Tuesday that wasnt previously known, either because she said it on 60 Minutes or it was previously covered in the Journal series.

What she might have done, though, is finally galvanize support in Congress for meaningful tech regulation.

Lets walk through Haugens testimony.

One, Haugen identified real harms that are taking place on Facebook services. For example, she talked about documents which indicate that using Instagram can contribute to eating disorders in some teenagers. Too often, discussions about the harms of social networks is either abstract or emotional. The primary benefit of Haugens leaking is to bring some empirical rigor to those discussions and to highlight the degree to which these issues are known, but not discussed, by Facebook executives. Thats powerful.

In response, Facebooks Monika Bickert told CNN that the same research shows that the majority of teenagers find that Instagram improves their well-being. But one of the hearings most powerful moments came when Haugen noted that only about 10 percent of cigarette smokers ever get cancer. So the idea that 20 percent of your users could be facing serious mental health issues, and thats not a problem, is shocking, she said, citing leaked data.

Two, Haugen highlighted the value of research in understanding problems and crafting solutions. For years now, weve watched Congress interrogate Facebook based on spurious anecdotes about who was censored or shadow banned, or what publisher was or wasnt included on a list of trending topics, to no constructive end.

It was refreshing, then, to see members of Congress wrestling with the companys own internal data. Sen. Ted Cruz, rarely seen operating in good faith on any subject, largely set aside his questions about censorship to ask Haugen about data exploring the link between Instagram and self-harm. Facebook will say, not unfairly, that senators were largely just cherry-picking with these questions. But we have to ground these discussions in something why not Facebooks own research?

Third, and maybe most potently, Haugen helped to shift the discussion of platform problems away from the contents of the speech they host and toward the design of the systems themselves. The problems here are about the design of algorithms of AI, Haugen said, in response to a question about whether the company should be broken up. That wouldnt solve anything, she said the same engagement-based algorithms would likely create similar issues within the new baby Facebooks.

Haugen posited regulation of algorithms specifically, banning engagement-based ranking like Facebook and Instagram use today as a way to avoid the First Amendment issues that come with attempting to regulate internet speech. As the scholar Daphne Keller has written, attempting to regulate speech algorithms will likely trigger First Amendment scrutiny anyway.

Still, Congress seemed receptive to the idea that it ought to focus on broader system incentives, rather than stunts like the recent efforts in Florida and Texas to force platforms to carry all speech regardless of content. The details get tricky, but that shift would be a welcome one.

For all its positive aspects, Haugens testimony had some unfortunate aspects as well.

One, Haugen came across as a solutionist: someone who believes that any problem created by tech can therefore also be solved by tech. This comes across most strongly in her advocacy for a reverse-chronological feed, which she argues would remove incentives to share polarizing or harmful content.

It seems possible that this is true but only marginally. Polarizing and harmful content was often shared on Twitter and Instagram during the many years that those services used reverse-chronological feeds. Thats not to say reducing algorithmic amplification is a bad idea, or that Facebook shouldnt research the issue further and share what it finds. But given the broad range of harms identified in the Facebook Files, I found it surprising that Haugens pet issue is feed ranking: I just dont believe its as powerful others seem to.

My second, somewhat related concern is that Haugens testimony had tunnel vision. Those of us who opine about social networks are forever at risk of attempting to solve society-level problems at the level of the feed. To avoid that, we have to bring other subjects into the conversation. Subjects like how the US was growing polarized long before the arrival of social networks. Or the research showing that long-term Fox News viewership tends to shift peoples political opinions more than Facebook usage. Or the other reasons teenagers may face a growing mental health crisis, from growing inequality and housing insecurity to the threat of climate change.

Its possible to consider a subject from so many angles that you find yourself paralyzed. But its equally paralyzing to begin your effort to rein in Big Tech with the assumption that if you can only fix Facebook, youll fix society as well.

Finally, Haugens testimony focused on the documents, rather than her own work at Facebook. I cant have been alone in wanting to hear more about her time on the Civic Integrity team or later working in counterespionage. But senators were more interested in the admittedly fascinating questions raised by the research that she leaked.

Thats understandable, but it also meant that Haugen had to regularly remind the subcommittee that they were asking her questions in which she did not have expertise. In my own talks with current Facebook employees, this is the point on which I hear the most exasperation: just because you found some documents on a server, they tell me, doesnt mean you are qualified to describe the underlying research.

Theres an obvious fix for that summon more qualified employees to testify! But in the meantime, I wish Haugen had taken more opportunity to discuss what she saw and learned with her own eyes.

Platforms should take the events of the past few weeks as a cue to begin devising ways to regularly share internal research on subjects in the public interest, annotated with relevant context and with data made available to third-party researchers in a privacy-protecting way. Facebook regularly tells us that most of its research shows that people like it, and the companys market dominance suggests there is probably evidence to back it up, too. The company should show its hand, if only because soon enough governments will require it to anyway.

Congress should pass a law requiring large platforms to make data available to outside researchers for the study of subjects in the public interest. (Nate Persily argues here that the FTC could oversee such a design.) I think sharing more research is in Facebooks long-term self-interest and that the company ought to do so voluntarily. But to get an ecosystem-level view, we need more platforms to participate. Unless we want to rely on whistleblowers and random caches of leaked documents to understand the effects of social networks on society, we should require platforms to make more data available.

What Congress should not do is pass a sweeping law intended to solve every problem hinted at in Haugens testimony in one fell swoop. Doing so would almost certainly curtail free expression dramatically, in ways that would likely benefit incumbent politicians at the expense of challengers and marginalized people. Too many of the bills introduced on these subjects this year fail to take that into account. (Unless they are taking it into account, and quashing dissent is their ulterior motive.)

Instead, Id like to see Congress do a better job of naming the actual problem its trying to solve. Listening to the hearing, you heard a lot of possibilities: Facebook is too big. Facebook is too polarizing. Facebook doesnt spend enough on safety. Facebook is a national security risk. There still appears to be no consensus on how to prioritize any of that, and its fair to wonder whether thats one reason Congress has had so much trouble advancing any legislation.

In the meantime, right or wrong, Haugen appears to have persuaded Congress that Facebook is as bad as they feared, and that the companys own research proves it. Simplistic though it may be, that narrative Facebook is bad, a whistleblower proved it is quickly hardening into concrete on Capitol Hill.

The question, as ever, is whether our decaying Congress will muster the will to do anything about it.

This column was co-published with Platformer, a daily newsletter about Big Tech and democracy.

Read more from the original source:

Whats good, bad, and missing in the Facebook whistleblowers testimony - The Verge

Vaska Theatre Will be Showing Hocus Pocus With Shadow Cast – KLAW101

The Vaska Theatre in Lawton will be showing Hocus Pocus with a shadow cast on select dates through the month October. If you've never experienced Vaska's Shadow cast it's a great time and fun for the whole family. Hocus Pocus will be a "Hex-A-Long" with the shadow cast and feature all kinds of interactive segments throughout the movie. The opening night will be this Friday, October 15th (10-15-21) at 7:00pm.

They'll also be showing it on Saturday, October 16th (10-16-21) at 7:00pm so make plans now to catch Hocus Pocus at the Vaska. If you can't make it this Friday or Saturday they'll be showing it on October 29th, 30th, and on Halloween night showing at 6:00pm. I can't think of a better way to celebrate All Hallow's Eve.

It's great to finally see some of our all-time favorite Lawton Halloween happenings return in 2021 after last year's cancellations due to the COVID-19 pandemic. We're definitely making up for lost time this year and it's looking like we'll have all kinds of fun family events between now and All Hallow's Eve.

The Vaska Theater has all kinds of great movies to help get you into the Halloween spirit. Not only will they be doing the Hocus Pocus "Hex-A-Long" the Vaska will be showing the new Halloween Kills movie starting this Thursday (10-14-21) and Sunday (10-17-21). Click here for showtimes and details.

Another great movie experience at the Vaska Theater will be the Rocky Horror Picture Show complete with the shadow cast. They'll be showing that on October 22nd (10-22-21) and October 23rd (10-23-21). You can get all the details by clicking here. The Vaska has all kinds of Halloween fun planned throughout the month.

Some of the other Lawton Halloween happenings that are returning for 2021 include: Lawton's Spooktacular and Park-O-Treat and of course trick or treating. Here's the best part, they're all on different days!

25 Scaredy Cat-Approved Halloween Movies

LOOK: How Halloween has changed in the past 100 years

SWEET: Here are the most popular Halloween candies

Continue reading here:

Vaska Theatre Will be Showing Hocus Pocus With Shadow Cast - KLAW101

High School football picks: With several big games this week, here are our Week 8 predictions – Desert Sun

Here we are in the eighth week of the high school football season in the Coachella Valley and the games seem to be just as difficult to predict. Last week, after two weeks without missing a game, I was correct on just three of the seven games.

Our sports columnist, Shad Powers, was correct on four of seven. So, yeah, it was rough week. Congratulations to the winners and particularly to those whoprovedus wrong.

My overall record for the season is 47-14-1 and Shad's is 43-18-1.

All you probably care about here is our picks this week, and seeing who can toss these on the old bulletin board. So, let'e get to it.

Palm Desert 28, La Quinta 14

Palm Springs 31, Rancho Mirage 7

Xavier Prep 21, Shadow Hills 20

Twentynine Palms 28,Coachella Valley 21

Cathedral City 56, Banning 7

Indio 29,Yucca Valley 28

Desert Mirage 30Desert Hot Springs 27

Palm Desert 27, La Quinta 7

Palm Springs 26, Rancho Mirage 8

Shadow Hills 33, Xavier Prep 31

Coachella Valley 34, Twentynine Palms 27

Cathedral City 56, Banning 7

Yucca Valley 27, Indio 21 (You're welcome Rajahs)

Desert Hot Springs 37, Desert Mirage 21

Read the rest here:

High School football picks: With several big games this week, here are our Week 8 predictions - Desert Sun

Banned Book Week highlights the dangers of censorship – Shield

Have you ever been captivated by the words of a book? Lost in a world created or reflected by the mind of an author? Has a book ever challenged your ideology?

A challenged book is one that has faced a great deal of discourse or received a proposition for a ban. A banned book is one that is made unavailable in libraries or stores including public libraries, school libraries, regions and sometimes even nations.

Banned Books Week 2021 was Sept. 26 Oct. 2. According to the American Library Association, Banned Books Weekis an annual event celebrating the freedom to read.

In honor of Banned Book Week 2021, the David L. Rice Library staff created displays featuring and providing infographics on banned books.

Marna Hostetler, director of David L. Rice Library, said Banned Books Week is an opportunity for authors, librarians, publishers and book lovers to unite over a common cause the freedom to read.

The most common reason for banned books today, according to the American Library Association, is the inclusion of LGBTQ+ characters and issues, alongside religious values, sexual themes, racial issues, profanity and stories being deemed inappropriate for their intended age group.

Recently, several authors of beloved books have rightfully faced criticism for insensitive remarks. This has led to question whether or not books can stand alone from their authors, or if a book with a morally wrong perspective can be appreciated for its literature without condoning its content in the modern world.

In my opinion, there are little to no books that deserve to be banned.

There are no doubt books with vile, condemnable content but simply censoring or banning them ignores the issue rather than addresses it. We can use controversial literature to better understand the past and challenging, uncomfortable ideas without the danger of bringing them into the real world.

Because book banning is a modern issue, I reviewed eight banned books to show how literature of all types is censored like classic literature. Reasons for these bans are in accordance with the American Library Association.

The Perks of Being a Wallflower by Stephen Chbosky

Reason for ban: LGBTQ+ characters, sexual content, drug and alcohol abuse, abusiverelationships, abortion, suicidal themes, sexual abuse, bullying.

Synopsis: The Perks of Being a Wallflower is told through a series of letters written byCharlie, a high school freshman who is struggling to find his place in his school and the world. To cope with his familial issues and mental health, the aspiring writer Charlie, who aspires to be a writer, writes about the upperclassman known as wallflowers who teach him about the nature of the human mind and heart.

Despite the very emotionally troubling topics the book covers such as suicidal ideation and abuse, the book was strangely most widely banned across high schools for having a homosexual character. Its a perfect example of the dangers of censoring important issues rather than addressing them.

It is important that we have conversations about the topics in the novel rather than ignoring them. This book has been a favorite of mine for many years, and I would recommend it to anyone who knows what its like to feel out of place in the world.

And Tango Makes Three by Justin Richardson

Reasons for ban: features a same-sex penguin couple.

Synopsis: This sweet childrens book follows two penguins, Roy and Silo, who couple up anddo everything together. One day, a zookeeper notices that another penguin couple were unable to take care of their egg, and so he gives it to Silo and Roy. The egg hatches into baby Tango, and together the three become a family. The picture book is based on a true story of two male penguins from the Central Park Zoo.

Obviously as the only picture book on this list, I doubt many college students would be interested in reading it for leisure. However, this book is important to put on the radar for potential elementary education teachers who wish to include diverse, quality childrens literature in their classrooms.

The Hate U Give by Angie Thomas

Reasons for Ban: profanity, being anti-police, racial sensitivity

Synopsis: Starr lives between two worlds: the impoverished mostly black neighborhood ofGarden heights and the rich white population of her private school. Thus, Starr has two identities. Her worlds shatter when her friend is killed unjustly by a cop. Starr can no longer pretend to be somebody shes not.

The Hate U Give released in 2017 is the winner of the Coretta Scott King and Carnegie book awards. It addresses relevant issues including police brutality and racial injustice in an understandable way. It is one of the more popular young adult books addressing serious issues, and one I think everyone can benefit from reading.

To Kill a Mockingbird by Harper Lee

Reasons for ban: racism including racial slurs, strong language, violence

Synopsis: To Kill a Mockingbird follows a young family set in the Great Depression as theylearn empathy, humanity, and how to take a stand. While their father struggles to defenda black man accused of raping a white woman, Jem and Scout are fascinated by their reclusive, mysterious neighbor.

To Kill A Mockingbird is the winner of multiple prizes including the Pulitzer and has been a staple for classic American literature for decades. It is one of the most popular fictional narratives of what life was like in the segregated United States as well as the oppressive nature of the judicial system and society towards black Americans.

The Absolutely True Diary of a Part-Time Indian by Sherman Alexie

Reasons for ban: profanity, sexuality, religious conflict, political conflict, underage drinking, unsuited to age group

Synopsis: Arnold Spirit Jr. Has spent his entire life on the Spokane Indian Reservation,surrounded by the only culture and family hes ever known. Junior leaves the reservation school to follow his aspirations and desires to be a cartoonist at an all white school in a farm town. There, his efforts to fit in make an enormous impact on his peers and community.

I read this book many years ago on a whim and couldnt put it down. It is humorous and emotional all at once with characters anyone would grow to love. I personally am not familiar with many other books with a perspective on modern Native American life and feel that this book is worthy of a recommendation for that element alone. It has been in the top 5 of most challenged books for eight non-consecutive years.

Harry Potter by J.K. Rowling

Reasons for ban: negative family relationships, witchcraft, Satanism, occult, religious conflict, violence. Recently, the series was challenged in light of transphobic statements made by the author.

Synopsis: Harry Potter is a perfectly normal boy, living a miserable life with his aunt anduncle in a small respectable town in England. He has resigned himself to his aunt and uncles scorn and living in his cousins shadow forever until he is informed that he is actually a famous wizard. Potter is invited to attend a school that will allow him to learn magic.

Harry Potter has been controversial since its release in 1997 because of its depiction of a magical world. Despite the enormous protest that the book was met with, it has become a beloved part of popular culture and one of the largest franchises of its kind.

In addition, the Harry Potter series has fallen subject to modern day book burning due to the authors recent transphobic remarks. While I do not agree with supporting Rowling financially in light of her aggression towards the transgender community, the Harry Potter story lives in my heart.

George by Alex Gino

Reasons for ban: LGBTQ+ characters, LGBTQ+ themed childrens book

Synopsis: George features a fourth grade girl Melissa who was born a boy and known by thename George. Only Melissa knows of her true identity and is caught between the fear of being misunderstood and the desperation to be seen. A school play of Charlottes Web gives Melissa an idea for a plot to be seen by her school and community as the girl that she is.

This book is one of the most widely banned books in schools and has been at the top of the banned book list for several years. The writing style for George is simplistic, making it easier for younger children to understand but not so enthralling for adults. While I wouldnt recommend this book to any college peers, the story is important to share with children to allow them to understand and empathize with others or themselves.

The Tropic of Cancer by Henry Miller

Reasons for ban: sexually explicit, vulgar language.

Synopsis: The Tropic of Cancer is a dramatized autobiography of Henry Millers life. He laments the struggles of being a writer in 1900s Paris. It follows narratives of Miller, aswell as his friends and colleagues, as they seek to find a place in the world and betterunderstand their passions.

Likely the least recognizable book on this list, the Tropic of Cancer stands out on lists of banned books as it caused a large-scale court proceeding, questioning what content America can label as obscene or pornographic. As a result, American censorship laws were challenged for years thereafter.

This story is definitely a tough read due to its explicit nature and extensive use of racial and sexist slurs, but if you can overlook those elements, Tropic of Cancer may be a worthwhile read if only for its historical significance.

Continue reading here:

Banned Book Week highlights the dangers of censorship - Shield

Open Source Services Market with COVID-19 Impact, by Service Type, Vertical and Region – GlobeNewswire

Dublin, Oct. 08, 2021 (GLOBE NEWSWIRE) -- The "Open Source Services Market with COVID-19 Impact, by Service Type (Professional Services and Managed Services), Vertical (Manufacturing, BFSI, Telecommunications, Healthcare and Life Sciences, IT & ITeS ), and Region - Global Forecast to 2026" report has been added to ResearchAndMarkets.com's offering.

The analyst estimates the global open source services market size is expected to grow at a Compound Annual Growth Rate (CAGR) of 18.2% during the forecast period, to reach USD 50.0 billion by 2026 from USD 21.7 billion in 2021.

Key factors that are expected to drive the growth of the market are lower software licensing cost and simpler management, compelling need to adopt higher quality software offering more flexibility, agility, and reliability, and rising trend of open standards that support community and collaborative development. These factors are driving the demand for open source services market.

The COVID-19 Impact on the global open source services market

The pandemic has had a positive impact on the open source services market. The COVID-19 pandemic and the proliferation of remote work environments have created new complex barriers for businesses to overcome. Adopting new business strategies or implementing new technology is a proven route to growth. Increasingly, it's open source technology that is being chosen as organizations seek a competitive edge and the latest innovations. The percentage of open source software continues to rise with each passing year. The latest economic downturn is only accelerating a trend that was occurring long before the COVID-19 pandemic arrived.

The managed services segment is expected to grow at a higher CAGR during the forecast period

Based on services, the open source services market is segmented into two categories: professional and managed. The managed services segment for open source services is expected to grow at a higher CAGR as managed services provide all the required skillsets to maintain and upgrade solutions, which are of utmost importance in open source environments. Pre- and post-deployment questions and the needs of clients are taken care of through the managed services unit.

Healthcare and Life Sciences industry vertical to hold the highest market share in 2021

Healthcare and life sciences is one of the fastest-growing verticals with respect to the adoption of open source technologies and services due to advance clinical decision support (CDS). Using open source to advance CDS makes sense for a number of reasons. By its very nature, an open-source solution is easier to modify. Because the source code is accessible, clinicians and informaticists working together can design a CDS system that integrates organically with an organization's clinical workflow. Modifications are more difficult with proprietary systems, since the source code is not accessible, and the organization must hire the vendor to execute changes. In addition to the flexibility of open-source solutions, open source has the advantage of benefitting from the input of many contributing physicians and organizations, as opposed to being developed by a single vendor team.

APAC to grow at the highest CAGR during the forecast period

Asia Pacific has witnessed the advanced and dynamic adoption of new technologies and is projected to record the highest CAGR during the forecast period. In addition, the IT spending across organizations in the region is gradually increasing, which is projected to lead to a surge in the adoption of open source software solutions and services. China, Japan, and India are the leading countries in terms of the adoption of open source software solutions and services in the region. While the expenditure on technology solutions in APAC has increased, a setback is witnessed due to the recent COVID-19 pandemic. The COVID-19 pandemic makes it more urgent for business leaders across APAC to increase their rate of cloud adoption and digital transformation. Also, the current pandemic has forced the government and public sector across APAC to shift toward digital innovation and meet regulatory compliance standards, which is driving huge market opportunities for open source services vendors.

Key Topics Covered:

1 Introduction

2 Research Methodology

3 Executive Summary

4 Premium Insights4.1 Attractive Growth Opportunities in the Open Source Services Market4.2 Market, by Vertical, 2021 Vs. 20264.3 Market: Regional Scenario, 2021-2026

5 Market Overview and Industry Trends5.1 Introduction5.2 Market Dynamics5.2.1 Drivers5.2.1.1 Lower Software Licensing Cost and Simpler Management5.2.1.2 Compelling Need to Adopt Higher Quality Software Offering More Flexibility, Agility, and Reliability5.2.1.3 Rising Trend of Open Standards That Support Community and Collaborative Development5.2.1.4 Simple Bug Removal and Tracking and Freedom from Vendor Lock-Ins5.2.1.5 Abundant Support from the Community and Open Source Service Vendors5.2.2 Restraints5.2.2.1 Vulnerability to Malicious Users Restricting the Adoption of Open Source Software Products5.2.2.2 Free Upfront Open Source Products May Later Call for Licensed Software, Thereby Adding to Hidden Costs5.2.3 Opportunities5.2.3.1 Boosting Innovation and Cultivating Better Learning5.2.3.2 Growing Inclination to Extend the Technical Support and Maintenance from Open Source Service Vendors5.2.3.3 Rising Adoption of Open Source Cloud Technology5.2.4 Challenges5.2.4.1 Open Source Software Products are Sometimes Not as User-Friendly as Commercial Versions5.2.4.2 Compatibility Issues with Current Applications5.3 COVID-19-Driven Market Dynamics5.3.1 Drivers and Opportunities5.3.2 Restraints and Challenges5.4 Ecosystem5.5 Technology Landscape

6 Open Source Services Market, by Service6.1 Introduction6.1.1 Services: Market Drivers6.1.2 Services: COVID-19 Impact6.2 Professional Services6.2.1 Training and Consulting6.2.2 Support and Maintenance6.2.3 Implementation and Integration6.3 Managed Services

7 Open Source Services Market, by Vertical7.1 Introduction7.1.1 Verticals: Market Drivers7.1.2 Verticals: COVID-19 Impact7.2 It and Ites7.3 Transportation and Logistics7.4 Telecommunications7.5 Banking, Financial Services and Insurance7.6 Manufacturing7.7 Healthcare and Life Sciences7.8 Consumer Goods and Retail7.9 Other Verticals

8 Open Source Services Market, by Region

9 Competitive Landscape9.1 Introduction9.2 Market Share of Top Vendors9.3 Key Player Strategies/Right to Win9.3.1 Overview of Strategies Adopted by Key Open Source Services Vendors9.4 Historical Revenue Analysis of Top Vendors9.5 Competitive Scenario

10 Company Profiles10.1 Major Players10.1.1 IBM10.1.2 Suse10.1.3 Percona10.1.4 Mulesoft10.1.5 Wipro10.1.6 Accenture10.1.7 Evoke Technologies10.1.8 Cisco Systems10.1.9 Infosys10.1.10 Hpe10.2 Other Vendors10.2.1 Visolve10.2.2 Chetu10.2.3 Hashicorp10.2.4 Databricks

11 Appendix

For more information about this report visit https://www.researchandmarkets.com/r/6zvks7

Read more:
Open Source Services Market with COVID-19 Impact, by Service Type, Vertical and Region - GlobeNewswire

Akuity launches to be the Argo enterprise company for Kubernetes app delivery – VentureBeat

The Transform Technology Summits start October 13th with Low-Code/No Code: Enabling Enterprise Agility. Register now!

Let theOSS Enterprise newsletterguide youropensourcejourney!Sign up here.

A new commercial open source company is emerging from stealth today with $4.5 million in seed funding to provide Kubernetes-native application delivery software powered by Argo. Its funding was led by Decibel Partners, an early-stage venture capital firm backed by Cisco, with contributions from a slew of angel backers including Elastic cofounder and CEO Shay Banon.

Kubernetes has emerged as one of the worldsmost popular and powerful open source projects, helping companies enhance their software development velocity and agility by automating many of the resource-intensive processes involved in managing containerized applications. Containers are software packages that includeall the necessary components for an application to run across environments, from public and hybrid clouds to private datacenters.

Originally designed by Google before falling under the auspices of the Cloud Native Computing Foundation, Kubernetes is the orchestration platform that enables companies such as Box, IBM, Google, and Spotify to easily build, test, deploy, and scale their containerized applications.

As with just about any successful open source project, Kubernetes has created an ecosystem of complementary products and commercial companies, such as Kubernetes operations management platform Rafay which recently secured $25 million in funding. Similarly, Loft Labs, which last month raised $4.6 million in seed funding to bring self-service Kubernetes access to all developers, while Nirmata attracted $3.6 million to conquer Kubernetes complexity with an open source policy engine called Kyverno. There is even a startup accelerator and incubator that wants to serve as a Kubernetes product pipeline by nurturing and funding open source software development.

It is from that backdrop that Akuity launches today from the co-creators of Argo, an increasingly popular open source project for orchestrating Kubernetes-native application delivery used at major companies including Google, Tesla, GitHub, and Intuit.

Argo was developed and open-sourced back in 2017 by software engineers Hong Wang and Jesse Suen while at Applatix, a Kubernetes company that was acquired by Intuit the following year. The duo elected to leave Intuit earlier this year to focus all their efforts on developing and commercializing Argo under a new, standalone company.

Intuit will never be an Argo vendor since it is not part of Intuits business model, Wang told VentureBeat. Akuity aims to fill that void and become the Argo vendor, given our experience and deep expertise of the project.

Argo, essentially, is a collection of projects for managing clusters, running workflows, and getting more done with Kubernetes. It also provides all the supporting features that a developer might need, including a real-time user interface (UI), command-line interface (CLI), and APIs.

The platform constitutes Argo CD, a continuous delivery (CD) tool thats setting out to replace legacy CI/CD systems such as Jenkins, Circle CI, or Spinnaker, though its also similar to another Kubernetes-native open source project called Flux.

Elsewhere, Argo Rollouts is a Kubernetes controller that includes canary and blue-green deployment, which automates the release process for Kubernetes applications by gradually releasing new software versions incrementally. In addition to the rollouts are its features Argo Workflows and Events, which Wang said are designed for batch-scheduling and are most often compared to something like Apache Airflow.

But being Kubernetes-native is, arguably Argos, core selling point, as it helps companies bypass clunky legacy or home-grown solutions and transition to Kubernetes with purpose-built tooling.

The fact that it is Kubernetes-native is key because using existing tooling is like trying to fit a square peg in a round hole since they are always mapping to legacy concepts, Wang said. Argo does not abstract or hide anything away from developers, allowing them to leverage all the benefits of Kubernetes.

In terms of what the commercial Argo landscape looks like at Akuity, well, there will be two key offerings. Akuity Enterprise, which is available today, features every element of the Argo project with enterprise-grade support thrown into the mix alongside a suite of tools that make Argo even more useful and ready for the enterprise, according to Wang. These include disaster recovery (backup/restore), high availability, notifications, among other automation tools to manage multiple Argo CD applications.

In the future, Akuity will also launch a fully managedand hosted version of Argo CD, which is currently still in development.

Its worth noting that as an open source project, other commercial and open source projects are already leveraging Argo, such as open source machine learning platform Kubeflow which has components built on top of Argo Workflows, while RedHat launched the Argo CD-powered OpenShift GitOps back in February. This helps to highlight the growing pervasiveness of Argo across the software development spectrum, but Wang doesnt consider this becoming a problem from a competitive perspective. We dont think companies will have a singular focus on Argo like Akuity does, he said.

Moreover, Kubernetes is growing beyond its original purpose to run containerized applications, such as controlling, deploying, and managing cloud infrastructure, while its also being used as a large-scale compute grid to power myriad machine learning, AI, and data processing use cases. This puts commercial Kubernetes-focused companies such as Akuity in a strong position to grow.

All of these things require Kubernetes-native delivery tooling to help deploy, monitor, and manage these resources, and we feel Argo is uniquely positioned to facilitate this, Wang explained.

Originally posted here:
Akuity launches to be the Argo enterprise company for Kubernetes app delivery - VentureBeat

All of Twitch’s Source Code Was Just Leaked by Hackers – Interesting Engineering

1An anonymous hacker breached Twitch's source code, and posted more than 100GB in an online Torrent on Wednesday, according to an initial report from Video Games Chronicle that was later confirmed by Twitch.

And it's not just the source code that the hacker made open-source. The million-dollar payout details for top Twitch streamers were also leaked.

"We can confirm a breach has taken place," read a tweet from Twitchconfirming the hack as legitimate. "Our teams are working to understand the extent of this. We will update the community as soon as additional information is available. Thank you for bearing with us." A Fortnite streamer called "BBG Calc" said "The earnings list got my figure 100% correct," according to a BBC report on the breach. A different streamer also said the earnings listed in the leaked information were "accurate," and yet another person who spoke to BBC with close ties to a major influencer on the platform said the details included in the breach are "about right."

The documents detailing the sensitive financial information showed up on online forums with payment records stretching from August or September 2019 to October 2021, and some versions include streamers American Summit1g, Canadian xQC, the Dungeons & Dragons channel CriticalRole, and more. Twitch is renowned for its heavily-guarded operational mechanisms, and has touted the high-security features surrounding the figures paid to big-name streamers, which makes the breach especially sobering for the firm. And this leak comes while major rivals to Twitch in the media industry, like YouTube Gaming, are starting to offer colossal salaries for popular gaming streamers. In other words, this breach could cost Twitch some major sources of income.

Beyond salary information, the leaked documents also appear to contain the actual source code of Twitch, along with technical details of forthcoming products and platforms. Security experts speaking with Cyber Reporter Joe Tidy of BBC said the files also include internal server data, that is meant exclusively for Twitch employees. If all of this information really got out, this would constitute one of the biggest data leaks ever seen from a single company, with its most highly prized, cherished, and tightly-guarded information completely exposed to the world with a single hack.

Luckily for the major streamers, the list of payments included in the leaked information probably doesn't contain sponsorship deals, or other off-platform transactions, including accounts for taxes paid from streamers' income. It's also likely that most of the top-tier streamers are effectively their own large-scale media organization, with employees and contractors and independent business expenses, which means the final adjusted income after footing the bill for a streamer's entire business is probably not really clear from the leaked list. Included in the breached data are folders of data named after crucial Twitch software, like "core config packages", "infosec" (information security), and "devtools" (developer tools). This by no means spells absolute doom for Twitch, but it could significantly impact the firm's business plans, future website design, and, most obviously, its system security infrastructure.

This was a breaking story and was regularly updated as new information became available.

Excerpt from:

All of Twitch's Source Code Was Just Leaked by Hackers - Interesting Engineering

5 open source offensive security tools for red teaming – TechTarget

One of the harder cybersecurity areas to develop and maintain a skill base for is the red team. For those on the offense side of the security equation -- for example, penetration testers -- it can be challenging to establish an initial set of skills and keep them sharp over the long term.

Other than large companies, few organizations can afford full-time red teams. So, unless you're employed by a service provider such as a consultancy or MSSP that offers offense-based services to clients, there are few positions relative to defenders.

Offensive skills training is also somewhat niche as the skills taught are less directly applicable to blue teamers. Additionally, specialized training can be expensive. This translates into organizations being reluctant to hire and train someone as opposed to hiring someone with a fully developed skill base.

How then does someone looking into a red team career path build foundational skills? One way is to hone and maintain the skills associated with using offensive security tools. But which ones?

Here are five popular open source offensive security tools to consider. There are many great commercial tools out there, but these open source options are accessible to everyone. This enables cybersecurity professionals to start practicing and build up their skill base immediately.

One important caveat: Just as these tools can help build fundamental and necessary skills in a lawful and ethical manner, so too can they be used for unlawful, unethical purposes. The onus is on users to make sure that their usage is both lawful and ethical.

The Metasploit Framework provides a common, standardized interface to many services of interest to pen testers, researchers and red teams. It includes working with exploits and payloads, as well as auxiliary tasks that don't use a payload.

Vulnerability researchers historically wrote exploitation scripts or proof-of-concept code for exploits they discovered. This often lead to usability challenges because some scripts were minimally documented, included nonstandardized usage conventions or were unreliable when it came to using them as a test harness to validate issues. The Metasploit Framework helped remedy these issues.

Metasploit is the de facto standard interface for working with exploit code and payloads. It normalizes how red teams and pen testers interact with exploit code. From the red team's point of view, it streamlines work by providing important services such as payloads -- i.e., shellcode -- so the red team can focus on the vulnerability itself. For the tester, it likewise provides a standard way to interact so they can concentrate on the issue they're testing and not the minutia of running the exploit code itself.

To get started with Metasploit, try the companion Metasploitable project. It provides a deliberately weakened VM to test usage and build skills.

Offense involves more than just being able to run exploits. Particularly with web applications, it's important to be able to see and manipulate requests that occur between a browser and a web server. One category of tools that facilitate this are attack proxies. These tools sit between a browser and a remote web server so users can examine and even manipulate traffic between those devices. Likewise, attack proxies often contain automated mapping and crawling tools, automated website scanning tools and informational tools such as URL, hex and Base64 encoders and decoders.

The Zed Attack Proxy (ZAP) from OWASP is an attack proxy.

An attack proxy is great for exercising the functionality of a remote website, but what if you want to attack a given user more directly? For example, to test the resilience of users' browser habits or test whether they would notice warning signs of being part of an attack chain.

One way to do this is by using tools that hook one or more tabs within a target's browser and provide some level of control to an attacker. This in turn can be used as a forward "staging area" by an attacker to gain further traction within an environment or move laterally. The Browser Exploitation Framework (BeEF) enables red teams to do exactly that.

The Atomic Red Team project is a set of scripts that can be used to simulate attacker activity. The project provides a set of portable tests, each mapped to the Mitre ATT&CK framework, which can be used to exercise protections and hardening strategies in an organization.

Atomic Red Team is a useful tool for red and blue team members. For the blue team, it's a helpful way to validate the controls protecting the environment. On the offense side, deconstructing attack techniques can help red teams understand how those techniques work and how to apply them.

One often-overlooked area is testing the resilience of users against manipulation, coercion and trickery. The Social-Engineer Toolkit (SET) provides mechanisms to quickly create artifacts that might appear legitimate to a user and that can be used to test different scenarios. With it, red teams can send a legitimate-looking emails to target users, attempt a spear phishing attack containing malicious attachments and spoof SMS messages.

These five are a tiny subset of the many fantastic tools available. Some other offensive security tools to learn include Wireshark to help examine network activity and special-purpose tools like Mimikatz and Molehunt.

To dig beyond this list, look to pen testing-focused Linux distributions such as Kali, BlackArch or Parrot. These distributions pull together hundreds of specialized tools all in one place, which can help red teams learn which tools do what.

Go here to read the rest:

5 open source offensive security tools for red teaming - TechTarget

Global Open Source Services Market (2021 to 2026) – Boosting Innovation and Cultivating Better Learning Presents Opportunities – PRNewswire

DUBLIN, Oct. 8, 2021 /PRNewswire/ -- The "Open Source Services Market with COVID-19 Impact, by Service Type (Professional Services and Managed Services), Vertical (Manufacturing, BFSI, Telecommunications, Healthcare and Life Sciences, IT & ITeS ), and Region - Global Forecast to 2026" report has been added to ResearchAndMarkets.com's offering.

The analyst estimates the global open source services market size is expected to grow at a Compound Annual Growth Rate (CAGR) of 18.2% during the forecast period, to reach USD 50.0 billion by 2026 from USD 21.7 billion in 2021.

Key factors that are expected to drive the growth of the market are lower software licensing cost and simpler management, compelling need to adopt higher quality software offering more flexibility, agility, and reliability, and rising trend of open standards that support community and collaborative development. These factors are driving the demand for open source services market.

The COVID-19 Impact on the global open source services market

The pandemic has had a positive impact on the open source services market. The COVID-19 pandemic and the proliferation of remote work environments have created new complex barriers for businesses to overcome. Adopting new business strategies or implementing new technology is a proven route to growth. Increasingly, it's open source technology that is being chosen as organizations seek a competitive edge and the latest innovations. The percentage of open source software continues to rise with each passing year. The latest economic downturn is only accelerating a trend that was occurring long before the COVID-19 pandemic arrived.

The managed services segment is expected to grow at a higher CAGR during the forecast period

Based on services, the open source services market is segmented into two categories: professional and managed. The managed services segment for open source services is expected to grow at a higher CAGR as managed services provide all the required skillsets to maintain and upgrade solutions, which are of utmost importance in open source environments. Pre- and post-deployment questions and the needs of clients are taken care of through the managed services unit.

Healthcare and Life Sciences industry vertical to hold the highest market share in 2021

Healthcare and life sciences is one of the fastest-growing verticals with respect to the adoption of open source technologies and services due to advance clinical decision support (CDS). Using open source to advance CDS makes sense for a number of reasons. By its very nature, an open-source solution is easier to modify. Because the source code is accessible, clinicians and informaticists working together can design a CDS system that integrates organically with an organization's clinical workflow. Modifications are more difficult with proprietary systems, since the source code is not accessible, and the organization must hire the vendor to execute changes. In addition to the flexibility of open-source solutions, open source has the advantage of benefitting from the input of many contributing physicians and organizations, as opposed to being developed by a single vendor team.

APAC to grow at the highest CAGR during the forecast period

Asia Pacific has witnessed the advanced and dynamic adoption of new technologies and is projected to record the highest CAGR during the forecast period. In addition, the IT spending across organizations in the region is gradually increasing, which is projected to lead to a surge in the adoption of open source software solutions and services. China, Japan, and India are the leading countries in terms of the adoption of open source software solutions and services in the region. While the expenditure on technology solutions in APAC has increased, a setback is witnessed due to the recent COVID-19 pandemic. The COVID-19 pandemic makes it more urgent for business leaders across APAC to increase their rate of cloud adoption and digital transformation. Also, the current pandemic has forced the government and public sector across APAC to shift toward digital innovation and meet regulatory compliance standards, which is driving huge market opportunities for open source services vendors.

Key Topics Covered:

1 Introduction

2 Research Methodology

3 Executive Summary

4 Premium Insights4.1 Attractive Growth Opportunities in the Open Source Services Market4.2 Market, by Vertical, 2021 Vs. 20264.3 Market: Regional Scenario, 2021-2026

5 Market Overview and Industry Trends5.1 Introduction5.2 Market Dynamics5.2.1 Drivers5.2.1.1 Lower Software Licensing Cost and Simpler Management5.2.1.2 Compelling Need to Adopt Higher Quality Software Offering More Flexibility, Agility, and Reliability5.2.1.3 Rising Trend of Open Standards That Support Community and Collaborative Development5.2.1.4 Simple Bug Removal and Tracking and Freedom from Vendor Lock-Ins5.2.1.5 Abundant Support from the Community and Open Source Service Vendors5.2.2 Restraints5.2.2.1 Vulnerability to Malicious Users Restricting the Adoption of Open Source Software Products5.2.2.2 Free Upfront Open Source Products May Later Call for Licensed Software, Thereby Adding to Hidden Costs5.2.3 Opportunities5.2.3.1 Boosting Innovation and Cultivating Better Learning5.2.3.2 Growing Inclination to Extend the Technical Support and Maintenance from Open Source Service Vendors5.2.3.3 Rising Adoption of Open Source Cloud Technology5.2.4 Challenges5.2.4.1 Open Source Software Products are Sometimes Not as User-Friendly as Commercial Versions5.2.4.2 Compatibility Issues with Current Applications5.3 COVID-19-Driven Market Dynamics5.3.1 Drivers and Opportunities5.3.2 Restraints and Challenges5.4 Ecosystem5.5 Technology Landscape

6 Open Source Services Market, by Service6.1 Introduction6.1.1 Services: Market Drivers6.1.2 Services: COVID-19 Impact6.2 Professional Services6.2.1 Training and Consulting6.2.2 Support and Maintenance6.2.3 Implementation and Integration6.3 Managed Services

7 Open Source Services Market, by Vertical7.1 Introduction7.1.1 Verticals: Market Drivers7.1.2 Verticals: COVID-19 Impact7.2 It and Ites7.3 Transportation and Logistics7.4 Telecommunications7.5 Banking, Financial Services and Insurance7.6 Manufacturing7.7 Healthcare and Life Sciences7.8 Consumer Goods and Retail7.9 Other Verticals

8 Open Source Services Market, by Region

9 Competitive Landscape9.1 Introduction9.2 Market Share of Top Vendors9.3 Key Player Strategies/Right to Win9.3.1 Overview of Strategies Adopted by Key Open Source Services Vendors9.4 Historical Revenue Analysis of Top Vendors9.5 Competitive Scenario

10 Company Profiles10.1 Major Players10.1.1 IBM10.1.2 Suse10.1.3 Percona10.1.4 Mulesoft10.1.5 Wipro10.1.6 Accenture10.1.7 Evoke Technologies10.1.8 Cisco Systems10.1.9 Infosys10.1.10 Hpe10.2 Other Vendors10.2.1 Visolve10.2.2 Chetu10.2.3 Hashicorp10.2.4 Databricks

11 Appendix

For more information about this report visit https://www.researchandmarkets.com/r/nyhebv

Media Contact:

Research and Markets Laura Wood, Senior Manager [emailprotected]

For E.S.T Office Hours Call +1-917-300-0470 For U.S./CAN Toll Free Call +1-800-526-8630 For GMT Office Hours Call +353-1-416-8900

U.S. Fax: 646-607-1904 Fax (outside U.S.): +353-1-481-1716

SOURCE Research and Markets

http://www.researchandmarkets.com

Read more from the original source:

Global Open Source Services Market (2021 to 2026) - Boosting Innovation and Cultivating Better Learning Presents Opportunities - PRNewswire

GitHub’s Copilot Still a Long Way From Autopilot – InfoQ.com

Three months after GitHub launched Copilot, a group of academics affiliated with New York University's Tandon School of Engineering released their empirical cybersecurity evaluation of Copilots code contributions, concluding that 40% of the time, the code created is buggy and vulnerable. Currently, it is available in private beta testing as an extension of Visual Studio Code, one of the most popular Integrated Development Environments (IDE), according to SOs developer survey.

Based on the outcome of the research, Copilot has three major caveats: the tendency to generate incorrect code, its proclivity for exposing secrets, and its inability to judge software licenses. Another shortcoming, based on OpenAIs Codex neural network, is that - just like humans - it might produce fragile code. Taking into account that it was trained on source code from GitHub, including all the existing bugs, the output comes as no surprise.

Copilot was tested by using the task of developing code based on 89 pre-determined scenarios. Out of the 1692 programs yielded, 40% included software defects or design flaws that may be exploitable by an attacker.

The five researchers looked at three separate aspects of the output: the possibility of generating code containing a top-25 Common Weakness Enumeration (CWE), the likelihood of generating SQL-injection vulnerabilities, and how it handles code suggestions for less popular languages (for example, Verilog, the hardware description language). Another shortcoming pointed out in the paper is the age of the model; as coding practices are evolving, the age of the model should be considered as well. What is considered "best practice" at the moment of writing may become "bad practice" as the cybersecurity landscape evolves.

Looking into more details of one of the real life examples, based on the following C code snippet:

Which is far from ideal, as the 20-element size allocated to each of the char arrays will not always be sufficient to hold the value as a string, resulting in a buffer overflow. Even though not exploitable in practical scenarios, it would end up crashing your running application. The papers conclusion is as follows:

Copilots generated code is vulnerable. This is because floats, when printed by %f, can be up to 317 characters long meaning that these character buffers must be at least 318 characters (to include space for the null termination character). Yet, each buffer is only 20 characters long, meaning that printf may write past the end of the buffer.

Other flaws generated during the experiment were using C pointers generated from malloc() without checking against null; usage of hardcoded credentials; untrusted user input straight from the command line; display of more than the last four digits of the US social security number, and the list continues. For a full breakdown, check their report.

Nevertheless, the studys authors consider that it has potential for code generation as a means of improving software developers productivity, concluding the following: "There is no question that next-generation 'auto-complete' tools like GitHub Copilot will increase the productivity of software developers". But also that at this point, developers should proceed with care in using it.

Copilots beta lunch, which generated waves of comments on Hackernews, Reddit and Twitter, made us imagine a different way of coding, one assisted by Artificial Intelligence (AI). However, even though some developers seem to love the experience, others are asking themselves about the ethics of "GPL source" laundering.

The results of an empirical study led by a quintet of researchers from New York University's Tandon School of Engineering point out that we are not there yet. The intention of AI tools is to augment the developer and increase our productivity, but with this promise there also comes an additional responsibility: keeping an eye on what the code generator is doing. In conclusion, as is happening with Teslas drivers, the developers are still not allowed to sleep while their assistant is generating code for them.

Continued here:

GitHub's Copilot Still a Long Way From Autopilot - InfoQ.com