Quantum Key Distribution: The Next Generation – A Ten-year Forecast and Revenue Assessment 2020-2029 – ResearchAndMarkets.com – Business Wire

DUBLIN--(BUSINESS WIRE)--The "Quantum Key Distribution: The Next Generation - A Ten-year Forecast and Revenue Assessment: 2020 to 2029" report has been added to ResearchAndMarkets.com's offering.

This report provides forecasts and analysis for key QKD industry developments. The author was the first industry analysis firm to predict that quantum security in mobile phones would become a significant revenue earner in the short-term. Phones using QRNGs were announced earlier this year and this report discusses how the mobile QRNG market will evolve.

There have been some big developments in the QKD space. In particular, the regulatory and financial framework for the development of a vibrant QKD business has matured. On the standardization and funding front, the ITU-T standardization is near complete while both the US and UK governments have announced major funding for large-scale quantum networks with QKD as a central component. And the QuantumCtek IPO may just be the beginning of the new public companies in this space.

The report contains forecasts of the hardware and service revenues from QKD in all the major end-user groups. It also profiles all the leading suppliers of QKD boxes and services. These profiles are designed to provide the reader of this report with an understanding of how the major players are creating QKD products and building marketing strategies for QKD as quantum computers become more ubiquitous.

Key Topics Covered:

Executive Summary

E.1 Key Developments Since our Last Report

E.2 Specific Signs that the Market for QKD is Growing

E.3 Evolution of QKD Technology and its Impact on the Market

E.3.1 Reach (Transmission Distance)

E.3.2 Speed (Key Exchange Rate)

E.3.3 Cost (Equipment)

E.4 Summary of Ten-year Forecasts of QKD Markets

E.4.1 Forecasts by End-user Segment

E.5 Five Firms to Watch Closely in the QKD Space

Chapter One: Introduction

1.1 Why QKD is a Growing Market Opportunity

1.2 Overview of QKD Technological Challenges

1.3 Goals and Scope of this Report

1.4 Methodology of this Report

1.5 Plan of this Report

Chapter Two: Technological Assessment

2.1 Setting the Scene: QKD in Cryptography-land

2.2 Why QKD: What Exactly does QKD Bring to the Cryptography Table?

2.3 PQC's Love-Hate Relationship with QKD

2.4 QKD's Technological Challenges

2.5 QKD Transmission Infrastructure

2.6 Chip-based QKD

2.7 QKD Standardization: Together we are Stronger

2.8 Key Takeaways from this Chapter

Chapter Three: QKD Markets - Established and Emerging

3.1 QKD Markets: A Quantum Opportunity Being Driven by Quantum Threats

3.2 Government and Military Markets - Where it all Began

3.3 Civilian Markets for QKD

3.4 Key Points from this Chapter

Chapter Four: Ten-year Forecasts of QKD Markets

4.1 Forecasting Methodology

4.2 Changes in Forecast Since Our Last Report

4.2.1 The Impact of COVID-19

4.2.2 Reduction in Satellite Penetration

4.2.3 Faster Reduction in Pricing

4.2.4 Bigger Role for China?

4.2 Forecast by End-User Type

4.3 Forecast by Type of QKD Infrastructure: Terrestrial or Satellite

4.4 Forecast of Key QKD-related Equipment and Components

4.5 Forecast by Geography/Location of End Users

Chapter Five: Profiles of QKD Companies

5.1 Approach to Profiling

5.2 ABB (Switzerland/Sweden)

5.3 Cambridge Quantum Computing (United Kingdom)

5.4 ID Quantique (Switzerland)

5.5 KETS Quantum Security (United Kingdom)

5.6 MagiQ Technologies (United States)

5.7 Nokia (Finland)

5.8 QuantumCtek (China)

5.9 Quantum Xchange (United States)

5.10 Qubitekk (United States)

5.11 QuintessenceLabs (Australia)

5.12 SK Telecom (Korea)

5.13 Toshiba (Japan)

For more information about this report visit https://www.researchandmarkets.com/r/jp7dzd

About ResearchAndMarkets.com

ResearchAndMarkets.com is the world's leading source for international market research reports and market data. We provide you with the latest data on international and regional markets, key industries, the top companies, new products and the latest trends.

Go here to read the rest:
Quantum Key Distribution: The Next Generation - A Ten-year Forecast and Revenue Assessment 2020-2029 - ResearchAndMarkets.com - Business Wire

Quantum-safe security firm evolutionQ awarded contribution from Canada Space Agency for Quantum Key Distribution (QKD) Network Research and…

KITCHENER, Ontario (PRWEB) August 10, 2020

evolutionQ was awarded a Space Technology Development Program (STDP) contribution by the CSA to develop solutions to advance satellite-based secure quantum communication services and tools to address challenges related to satellite-based Quantum Key Distribution (QKD) networks.

Cryptography underpins the secure communications required for the digital, network-based social and financial interactions that are at the heart of modern society and the economy, including banking, the sharing of confidential healthcare data, and the exchange of sensitive information between governmental institutions. However, rapid advancements in quantum computing threaten current encryption methods because quantum computers, when built, will be able to break commonly used cybersecurity systems. It is important to develop tools, like QKD, that will be resistant to such quantum threats.

QKD technologies leverage the fundamental laws of quantum physics to distribute confidential cryptographic keys between two users, while detecting the attempts of malicious third-parties to intercept such keys. Unfortunately, typical terrestrial methods to establish such direct secure connection between locations are limited to relatively short distances, of the order of at most 200 km. This is clearly a challenge for a country as vast as Canada. Satellite-based QKD will enable secure, reliable, and economical key-sharing across Canada.

A powerful quantum computer has the power to decimate todays cryptography. As key quantum computing milestones are achieved, the need for quantum-safe solutions intensifies, said Dr. Michele Mosca, President and CEO of evolutionQ. Robust cryptography is absolutely necessary for our safety and the proper functioning of our digital economy. We must adopt quantum-safe solutions to secure and safeguard our critical infrastructures, financial services and intellectual property."

Quantum Key Distribution is an important tool in addressing the quantum threat. QKD uses the fundamental laws of physics to protect information shared between two parties. CTO of evolutionQ, Dr. Norbert Ltkenhaus remarked. Satellite-based QKD is essential for a vast country like Canada and will help secure communications from coast to coast. evolutionQ is poised to utilize its expertise and develop solutions to help establish satellite QKD, and to integrate it with existing terrestrial solutions.

evolutionQ will develop tools to address the challenges unique to satellite-based QKD. This will be accomplished by modelling the role and performance of QKD satellites, and by designing optimization algorithms to integrate QKD satellites with terrestrial networks. The software solutions will be designed to be integrated with existing and planned satellite hardware. The project is expected to last 24 months.

The initiative will also help Canada safeguard sovereignty in the quantum age and strengthen Canadian leadership in the space and quantum sectors. The initiative aligns with the new Space Strategy for Canada, the safety and security principle in Canadas Digital Charter and the Government of Canadas Innovations and Skills Plan.

This project is undertaken with the financial support of the Canadian Space Agency.

About evolutionQ:evolutionQ is a leading quantum-safe cybersecurity company led by world-renowned quantum computing experts Dr. Michele Mosca and Dr. Norbert Ltkenhaus. evolutionQ delivers quantum-risk management strategy and advisory services along with robust cybersecurity products designed to be safe against quantum computers.

Share article on social media or email:

See the article here:
Quantum-safe security firm evolutionQ awarded contribution from Canada Space Agency for Quantum Key Distribution (QKD) Network Research and...

Deep tech may stumble on insufficient computing power – Livemint

It appears that many of the deep tech" algorithms the world is excited about will run into physical barriers before they reach their true promise. Take Bitcoin. A cryptocurrency based on blockchain technology, it has a sophisticated algorithm that grows in complexity, as very few new Bitcoin are mintedthrough a digital process called mining". For a simple description of Bitcoin and blockchain, you could refer to an earlier Mint column of mine.

Bitcoins assurance of validity is achieved by its proving" algorithm, which is designed to continually increase in mathematical complexityand hence the computing power needed to process itevery time a Bitcoin is mined. Individual miners are continually doing work to assess the validity of each Bitcoin transaction and confirm whether it adheres to the cryptocurrencys rules. They earn small amounts of new Bitcoin for their efforts. The complexity of getting several miners to agree on the same history of transactions (and thereby validate them) is managed by the same miners who try outpacing one another to create a valid block".

The machines that perform this work consume huge amounts of energy. According to Digiconomist.net, each transaction uses almost 544KWh of electrical energyenough to provide for the average US household for almost three weeks. The total energy consumption of the Bitcoin network alone is about 64 TWh, enough to provide for all the energy needs of Switzerland. The website also tracks the carbon footprint and electronic waste left behind by Bitcoin, which are both startlingly high. This exploitation of resources is unsustainable in the long run, and directly impacts global warming. At a more mundane level, the costs of mining Bitcoin can outstrip the rewards.

But cryptocurrencies are not the worlds only hogs of computing power. Many Artificial Intelligence (AI) deep learning neural" algorithms also place crushing demands on the planets digital processing capacity.

A neural network" attempts to mimic the functioning of the human brain and nervous system in AI learning models. There are many of these. The two most widely used are recursive neural networks, which develop a memory pattern, and convolutional neural networks, which develop spatial reasoning. The first is used for tasks such as language translation, and the second for image processing. These use enormous computing power, as do other AI neural network models that help with deep learning".

Frenetic research has been going into new chip architectures for these to handle the ever-increasing complexity of AI models more efficiently. Todays computers are binary", meaning they depend on the two simple states of a transistor bitwhich could be either on or off, and thus either a 0 or 1 in binary notation. Newer chips try to achieve efficiency through other architectures. This will ostensibly help binary computers execute algorithms more efficiently. These chips are designed as graphic-processing units, since they are more capable of dealing with AIs demands than central processing units, which are the mainstay of most devices.

In a parallel attempt to get beyond binary computing, firms such as DWave, Google and IBM are working on a different class of machines called quantum computers, which make use of the so-called qubit" , with each qubit able to hold 0 and 1 values simultaneously. This enhances computing power. The problem with these, though, is that they are far from seeing widespread adoption. First off, they are not yet sophisticated enough to manage todays AI models efficiently, and second, they need to be maintained at temperatures that are close to absolute zero (-273 celsius). This refrigeration, in turn, uses up enormous amounts of electrical energy.

Clearly, advances in both binary chip design and quantum computing are not keeping pace with the increasing sophistication of deep tech algorithms.

In a research paper, Neil Thompson of the Massachusetts Institute of Technology and others analyse five widely-used AI application areas and show that advances in each of these fields of use come at a huge cost, since they are reliant on massive increases in computing capability. The authors argue that extrapolating this reliance forward reveals that current progress is rapidly becoming economically, technically and environmentally unsustainable.

Sustained progress in these applications will require changes to their deep learning algorithms and/or moving away from deep learning to other machine learning models that allow greater efficiency in their use of computing capability. The authors further argue that we are currently in an era where improvements in hardware performance are slowing, which means that this shift away from deep neural networks is now all the more urgent.

Thompson et al argue that the economic, environmental and purely technical costs of providing all this additional computing power will soon constrain deep learning and a range of applications, making the achievement of key milestones impossible, if current trajectories hold.

We are designing increasingly sophisticated algorithms, but we dont yet have computers that are sophisticated enough to match their demands efficiently. Without significant changes in how AI models are built, the usefulness of AI and other forms of deep tech is likely to hit a wall soon.

Siddharth Pai is founder of Siana Capital, a venture fund management company focused on deep science and tech in India

Subscribe to newsletters

* Enter a valid email

* Thank you for subscribing to our newsletter.

Read more from the original source:
Deep tech may stumble on insufficient computing power - Livemint

Former Intel exec to be new CEO of Semiconductor Research Corporation – WRAL Tech Wire

DURHAM A former Intel Corporation executive has been appointed as president and CEO ofSemiconductor Research Corporation (SRC), a global semiconductor research consortium based in Durham.

Todd Younkin, who is currently executive director of SRCs Joint University Microelectronics Program (JUMP),replacesKen Hansen who is retiring after leading SRC the past five years. Younkin will starttransitioning to his new role on August 18.

I am honored to lead SRC, a one-of-a-kind consortium with incredible potential and exceptionally talented people, Younkin said in a statement. Together, we will deliver on SRCs mission to bring the best minds together to achieve the unimaginable. SRC is well-positioned to meet our commitment to SRC members, employees, and stakeholders by paving the way for the semiconductor industry. Our strong values, unique innovation model, and unflinching commitment to our members are core SRC principles that we will maintain as we move forward.

Todd Younkin

Prior to SRC, Younkin held senior technical positions at Intel Corporation. Among them, he was an assignee to IMEC, an international semiconductor research and development hub, where he worked closely within the consortium to help move Extreme Ultraviolet Lithography (EUVL) into commercialization.

He holds a Ph.D. from the California Institute of Technology and Bachelor of Science from the University of Florida.

The challenges facing the semiconductor industry today are as exciting and demanding as ever before, said Gil Vandentop, SRC Chairman of the Board, in a statement. At the same time, AI, 5G+, and Quantum Computing promise to provide unfathomable gains and benefits for humanity. The need for research investments that bring these technology advances to bear is paramount. Todd has demonstrated an ability to bring organizations together, tackle common research causes, and advance technologies into industry. He has a clear vision to take SRC to the next level. I am delighted that Todd has accepted this challenge and will become the next SRC CEO.

Here is the original post:
Former Intel exec to be new CEO of Semiconductor Research Corporation - WRAL Tech Wire

Rep. John Joyce: TikTok, the spy in your child’s pocket, just tip of tech iceberg – TribLIVE

TribLIVE's Daily and Weekly email newsletters deliver the news you want and information you need, right to your inbox.

During the coronavirus crisis, Americans have increasingly turned to technology for work, school, keeping in touch with friends and loved ones, and entertainment. Staying at home, we improvised and took advantage of the video chats and conference calls that connected us to the outside world.

At the same time, droves of young Americans found virtual community and amusement on TikTok, a popular video sharing platform. And, contrary to what our kids may believe, it is not a safe space.

Videos uploaded by American children and teenagers, which can range from seemingly benign dance routines to harmful depictions of violence or worse, are stored on TikToks servers deep within communist China along with every TikTok users personal information. Owned by the Chinese company ByteDance, TikTok is a shameless front for data harvesting on behalf of the Chinese Communist Party (CCP).

If youre concerned about TikToks influence and encroachment on the American people, youre not alone. Recently, President Donald Trump and national security leaders like Secretary of State Mike Pompeo have indicated that they will not allow TikTok to continue pocketing the private data of American citizens.

Congress also is taking action. On the China Task Force, we have been taking on the CCP and exposing TikToks efforts to mine Americans data and edge out competition in the free market. We know that the CCPs end goal is to limit free speech and the flow of information in America and across the world.

Our nation simply cannot allow this trajectory to continue. Ending TikToks influence in the United States would be a solid step in the right direction, but this platform is just the beginning of our problems. For too long, the Chinese communist government has sought to exert influence in the world by gaining dominance in the global telecommunications network.

In addition to TikToks parent company ByteDance, the CCP uses pawns like Huawei and ZTE to gain control over next-generation technology including artificial intelligence, semiconductor production, quantum computing and 5G.

Enabled by years of manipulative practices, including cheating and even outright theft, the Chinese government is poised to achieve global dominance in the technology and telecommunications sectors with the ultimate goal of controlling critical market segments and weaponizing global supply chains for medical equipment, weapons and other critical electronics.

In the 21st century, America cannot allow China to win the race to next-generation technology, and we on the China Task Force are leading Congress efforts in this pursuit.

Countering Chinas overreach into our technology requires a comprehensive approach. To be successful, we must equip young Americans with the skills and resources they need to once again lead in innovation. Additionally, we must move the manufacturing of our technology away from China.

As a solution, I introduced legislation that seeks to end Americas dependence on China for the rare earth elements and other minerals which are used to manufacture medical supplies, defense technology and high-tech products by establishing a supply chain for these resources in the United States. Instead of relying on China for the materials needed to make smartphones and other devices that we use every day, we should be utilizing the resources that we have here at home. In Pennsylvania, we have the dedicated skilled workforce and the rich stores of minerals needed to move the supply chain away from the hostile Chinese government and create jobs in our community.

Given Americans ever-increasing dependence on technology, its more important than ever that we guard against cyberattacks and protect our country from foreign interference. As our nation seeks to combat the CCP, we know that theres a long road ahead but this is the time to make a difference.

Each parents first step should be removing the spies from our childrens pockets by deleting TikTok to protect their privacy and thats just the beginning. Beyond banning TikTok, we must take steps today to limit the Chinese governments attempts to gain dominance tomorrow.

As a nation, we cannot afford to fall behind and endanger our national security. On the China Task Force, we are working to protect you and your data from the Chinese communist government. To win this fight, the China Task Force is leading the way to correct course and ensure that Americans are never beholden to the CCP.

U.S. Rep. John Joyce, M.D., a Republican from Altoona, represents Pennsylvanias 13th Congressional District.

Categories:Featured Commentary | Opinion

TribLIVE's Daily and Weekly email newsletters deliver the news you want and information you need, right to your inbox.

Here is the original post:
Rep. John Joyce: TikTok, the spy in your child's pocket, just tip of tech iceberg - TribLIVE

Cancel culture and conservative glass houses – The Week

It is often the case that those who are the least entitled to complain about something do so the loudest. So it is with conservatives and so-called "cancel culture" firing or de-platforming individuals because of their views. Hardly a day goes by when some conservative somewhere doesn't warn Americans that the lefty "cancel crew will come for you" or that a "new purge" reminiscent of "Stalin" is underway from which "no one is safe."

But those conservatives need to take a deep breath and mind their own house. When it comes to the politically correct left, liberals are themselves rising to defend old-fashioned tolerance, showing that a free marketplace of ideas when left to its own devices can regulate itself.

To be sure, it is an open question, as notes Ross Douthat, The New York Times' uber thoughtful conservative columnist and no friend of the woke left, whether the progressive camp's new censoriousness towards real or imagined disrespect toward marginalized groups would necessarily be more illiberal than the old Protestant consensus they seek to replace. Even liberal polities firmly committed to protecting free speech, after all, impose cultural limits on what ideas they admit in respectable company. And it is inevitable that an ethnically and religiously homogeneous society with one dominant group would draw the lines very differently from a more diverse one. Indeed, as more women and minorities enter the public space, they'll question old rules of social interaction. Many norms that were previously acceptable would no longer be so and vice versa.

But the trouble with the new left is that instead of letting these norms shift spontaneously at a natural pace, after due sifting and sorting, it wants to overthrow all of them, all at once. And to accomplish that, it has developed a strategy of pushing hard on power nodes corporate human resources departments, university bureaucracies to engineer institution-wide, top-down change.

The upshot is excesses. One does not have to buy the right-wing hype that politically correct activists are modern-day Jacobins thirsting for cultural revenge to be deeply troubled when they go after an obscure graphic designer for sporting blackface to mock a celebrity years after the actual event. Or a data analyst for tweeting a study by a black professor showing that non-violent tactics are more effective in affecting social change than violent ones. Or a museum curator who wouldn't spurn art just because it came from white people. All these people were liberals and they lost their jobs for running afoul of PC sensibilities.

Social change inevitably hurts some people. But progress depends on minimizing the collateral damage, the cost to innocent parties. Progressives, however, are leaving too many victims in their wake, including on their own side. But the good news is that now liberals are joining conservatives, who've been railing against PCism for decades, in pushing back.

New York Magazine's Jonathan Chait has been warning for five years that the left is on a censorious path. But in recent months his fellow liberals have started joining him in noticeable numbers. Chait's colleague at New York Magazine, the celebrated centrist gay writer who spearheaded the gay marriage movement, Andrew Sullivan, quit two weeks ago because, as he noted in his parting column, he no longer felt that its growing ideological narrow-mindedness had space for him. He has already reignited his old blog with the express purpose of critiquing precisely this tendency in the left. Meanwhile, some leading progressives joined public intellectuals on the other side of the ideological spectrum to sign an open letter in Harper's magazine expressing alarm at the culture of "intolerance of opposing views" and "a vogue for public shaming and ostracism" that was engulfing their movement. Among them, notably, was firebrand professor Noam Chomsky who is arguably one of the foremost inspirations of the modern left. And then there is the enthusiastic reception that Johns Hopkins professor Yascha Mounk's new venture Persuasion has received from across the ideological spectrum. Mounk, a centrist liberal, has founded this subscription newsletter to explicitly debate, articulate, and defend the values of a free society and pry open space for the expression of a wider array of opinions than the mainstream media is allowing.

Meanwhile, young conservatives like Ben Shapiro who act like cancel culture is some new left-wing invention are forgetting that right-wingers themselves have been its main practitioners through most of American history. One does not have to go back to pre-Revolutionary America when Puritans were engaging in the ultimate cancellation and hanging "witches" to find examples of cultural conservatives "canceling those who defied their moral strictures. In living memory, employers regularly fired those suspected of being atheists, gays and, of course, communists (remember the McCarthy era?). Only a short time ago, allowing gays in the military on a "don't ask, don't tell" basis, a policy hesitantly implemented by a Democratic president against stiff conservative opposition, was considered progress.

The patriotically inclined right also still has its own list of cancellation-worthy offenses. NFL quarterback Colin Kaepernick found himself blackballed from the league after President Trump berated him for taking the knee during the national anthem and asked the league to "get that son of a bitch off the field right now." The right's uproar over comments by lefty stand-up comic Bill Maher (that the 9-11 terrorists were brave compared to American forces that launched bombs from a safe 2,000 mile distance) got his show, Politically Incorrect, canceled in the wake of the attack on the World Trade Center. The band Dixie Chicks was likewise canceled after its members voiced public disgust at the Iraq War.

With respect to Kaepernick, Trump is now saying he should get a second chance, but his habit of viciously attacking Republican lawmakers who oppose him has prompted scores of them to remain silent or permanently quit politics in other words, self-cancel. And he has explicitly called for the firing of journalists and dissenters that stand up to him. Even before he became president, he was into cancellation, calling on the Scots to boycott Glenfiddich because the brand honored a farmer who refused to sell his property for a Trump golf course.

But Trump is hardly alone. The conservative establishment itself is doing a masterful job. Far from allowing the full range of opinions to be expressed about the president, conservative publications are canceling anti-Trump voices left and right.

One of the raps against liberal cancel culture warriors is that, unlike in the past when the pressure to fire writers came from irate readers, now woke colleagues on the inside are pushing out dissenters. As proof, critics point to the recent departure of conservative editor Bari Weiss from The New York Times. She published a scathing resignation letter slamming her liberal colleagues for "constant bullying" in response to her heterodox views. But Weiss was also a refugee from the opinion section of the Wall Street Journal that she along with several of her anti-Trump colleagues quit after Trump's nomination made their views verboten. Meanwhile, Sol Stern, a former fellow at the Manhattan Institute, a conservative think tank, has revealed that he resigned in protest two years ago after the institute's flagship publication, The City Journal, started muzzling anti-Trump voices, thanks to donor pressure. Indeed, David French, a former writer for National Review and current editor at The Dispatch, notes that "every single dysfunction you've observed from the Online Left and progressive media more broadly applies to the Online Right and conservative media as well. Except in conservative media, the focus isn't on intersectionality and social justice but rather Trump and his followers."

Of course, that conservatives are no strangers to quashing debate and discussion hardly makes the left's zeal to cancel people and viewpoints more palatable.

In the rough and tumble of the marketplace of ideas it is never clear that the "right" side is prevailing until it does. However, what these vigorous defenses of old-fashioned liberal values of debate and discussion from within the progressive camp itself make clear is that free societies defend themselves in unexpected and unpredictable ways. Conservatives should take note of these trends and let liberals police their own side while they get to work on theirs. With this president, they have plenty to keep their hands full even without a pre-occupation with the liberal enemy.

Want more essential commentary and analysis like this delivered straight to your inbox? Sign up for The Week's "Today's best articles" newsletter here.

Link:

Cancel culture and conservative glass houses - The Week

Top stars support the 2020 Platform Presents Playwright’s Prize – London Theatre 1

The 5,000 winner will be announced on Saturday, August 15 at 6pm

As the judges make the final decision on the winner of the 5,000 2020 Platform Presents Playwrights Prize, filmed excerpts from five of the finalists plays, recorded in isolation during Lockdown by major stars of TV and film, are being released.

My Dads a Cunt by Anoushka WardenAimee Lou Wood (above) played Aimee Gibbs, a central character in two seasons of the Netflix comedy series Sex Education. She will soon to be seen in the feature film Louis Wain alongside Benedict Cumberbatch and Claire Foy.

Watch Aimee Lou Wood in the excerpt from My Dads a Cunt with this link:https://www.youtube.com/watch?v=fpz951fVvUo

Is Edward Snowden Single? by Kate CortesiDianna Agron starred in The Family opposite Robert DeNiro and Michelle Pfeiffer, I Am Number Four and ZIipper for producer Darren Aronofsky. Dianna came to prominence as Quinn Fabray in Ryan Murphys hit TV series Glee.

Watch Dianna Agron in the excerpt from Is Edward Snowden Single? with this link:https://www.youtube.com/watch?v=w_IplJjcDYY

Burning Falling Rising Monster by Kate VozellaKyle Soller and Phoebe Fox feature.Kyle won the Olivier Award and Critics Circle Award as Best Actor in The Inheritance in the West End and on Broadway. Phoebe was nominated Best Supporting Actress in the Oliviers in A View from the Bridge in the West End, which she transferred in to Broadway. Phoebe can currently be seen in The Great on Hulu.

Watch Kyle Soller and Phoebe Fox in the excerpt from Burning Falling Rising Monster with this link:https://www.youtube.com/watch?v=bAyCD2bQzEA

Stripped by Hew Rous-EyrePippa Bennett-Warner recently played Shannon in Gangs of London.Aki Omoshaybi had the lead role in the film Burning Men and was in Star Wars: The Last Jedi.

Watch Pippa Bennett-Warner and Aki Omoshaybi in the excerpt from Stripped with this link:https://www.youtube.com/watch?v=hbzTTcPObfg

Burn by Chris ThompsonGeorge MacKay was critically acclaimed in the lead role of Lance Corporal Schofield in Sam Mendess award-winning film 1917.

Watch George MacKay in the excerpt from Burn with this link:https://www.youtube.com/watch?v=bAyCD2bQzEA

There are four more plays in consideration:Private by Mona PirnotFuckboys by Katie BurnettEverything Beautiful Happens At Night by Ted MalawerBird in a Ribcage by Lizzie Stern

The videos will be hosted from Monday, August 10th on the Google Arts & Culture Hub and released on the Platform Presents

Production company Platform Presents was founded in 2017 by actress Gala Gordon and producer Isabella Macpherson to give a platform to rising star talent, with a particular interest in female voices. And to raise the 5,000 prize money for their annual Playwrights Prize, Platform Presents founded an annual Poetry Gala, to celebrate and highlight great writing, through the inspiring medium of poetry, brought to life by stars of the stage and screen.

For the 2020 Platform Presents Prize, over 200 plays were submitted from writers based from London to New York, LA to Melbourne. These were shortlisted to nine by the PlatformPresents co-founders and script readers.

The Platform Presents prize includes ongoing mentoring as well as the 5,000 cash prize.

Read more:
Top stars support the 2020 Platform Presents Playwright's Prize - London Theatre 1

Global Quantum Cryptography Market (2020 to 2025) – Increasing Need for Integration Solutions Presents Opportunities – Yahoo Finance

Dublin, Aug. 10, 2020 (GLOBE NEWSWIRE) -- The "Quantum Cryptography Market by Component (Solutions and Services), Services (Consulting and Advisory, Deployment and Integration, and Support and Maintenance), Security Type (Network and Application Security), Vertical & Region - Global Forecast to 2025" report has been added to ResearchAndMarkets.com's offering.

The global quantum cryptography market size is estimated to be USD 89 million in 2020 and is projected to reach USD 214 million by 2025, at a CAGR of 19.1%

Major growth factors for the market include the growing incidents of cyber-attacks in the era of digitalization, increasing cybersecurity funding, rising demand of next-generation security solutions for cloud and IoT technologies, and evolving next-generation wireless network technologies. However, lack of expertise and high implementation cost could restrain the market growth.

Growing demand for integration of quantum cryptography solutions is set to fuel the growth of solutions segment

The continuous increase of data transmitted electronically has led to an increased need for and reliance on cryptography. Quantum cryptography solutions enable people to experience the same level of trust and confidence in the digital world as in the physical world. These solutions further enable millions of people to interact electronically via e-mail, eCommerce, ATMs, cell phones, etc. The quantum cryptographic solutions such as Quantum Key Distribution (QKD) platforms, QKD servers, virtual encryptors, QKD distributors, key and policy managers, SDK to integrate cryptography, quantum cryptography communication device, quantum security gateway, Quantum Random Number Generator (QRNG), hacker box, quantum secure communication network products, and repeaters, used to secure advanced cyber-attacks are in huge demand across the globe. Moreover, this solution can easily be integrated with existing security systems. Hence, the solution segment is expected to hold the highest market share in the quantum cryptography space.

North America to hold the largest market size, and to grow at the highest growth rate during the forecast period

The US is the most developed country in terms of technology adoption and investments. The widespread adoption of PCs and internet services for business purposes and storage of critical data across the world has increased the propensity of data breach and theft. In addition, the major growth factors that would drive the adoption of quantum cryptography include the growing need for data privacy and security and an increasing number of cyber-attacks. The Americas are the largest revenue contributors in the quantum cryptography market, as the market is being driven by the early adoption of advanced technologies such as cloud and IoT, high level of IT capabilities, and higher IT investments.

Key Topics Covered:

1 Introduction

2 Research Methodology

3 Executive Summary

4 Premium Insights4.1 Attractive Opportunities in the Quantum Cryptography Market4.2 Market in the Americas, by Security Type and Country4.3 Market: Investment Scenario

5 Market Overview and Industry Trends5.1 Introduction5.2 Market Dynamics5.2.1 Drivers5.2.1.1 Growing Cyber Attacks in the Era of Digitalization5.2.1.2 Increasing Cybersecurity Funding5.2.1.3 Rising Demand for Next-Generation Security Solutions for Cloud and IoT Technologies5.2.1.4 Evolving Next-Generation Wireless Network Technologies5.2.2 Restraints5.2.2.1 High Implementation Cost5.2.2.2 Lack of Expertise5.2.3 Opportunities5.2.3.1 Spur in Demand for Security Solutions Across Industry Verticals5.2.3.2 Increasing Need for Integration Solutions5.2.4 Challenges5.2.4.1 Quantum Cryptography Commercialization5.2.4.2 Technological and Implementation Challenges5.3 COVID-19 Pandemic-Driven Market Dynamics and Factor Analysis5.3.1 COVID-19 Dynamics Impacting Market Growth5.4 Industry Trends5.4.1 Quantum Cryptography Protocols5.4.1.1 Bb84 Protocol5.4.1.2 B92 Protocol5.4.1.3 Sarg04 Protocol5.4.1.4 E91 Protocol5.4.1.5 SSP Protocol5.4.2 Quantum Cryptography Types5.4.2.1 Position-Based Quantum Cryptography5.4.2.2 Device-Independent Quantum Cryptography5.4.2.3 Bounded- and Noisy-Quantum-Storage Model5.4.3 Quantum Cryptography Margins5.4.3.1 Quantum Repeaters5.4.3.2 Point-To-Point Communication5.4.3.3 Vulnerable to Attacks5.4.4 Future Scope of Quantum Cryptography5.4.5 Use Cases

6 Quantum Cryptography Market, by Component6.1 Introduction6.2 Solutions6.2.1 Increasing Need to Encrypt Critical Information Without Any Leakage6.3 Services6.3.1 Growing Need for Expert Assistance for a Customized Solution

7 Quantum Cryptography Market, by Service7.1 Introduction7.2 Consulting and Advisory7.2.1 Increasing Demand for Consultation to Resolve Hindrances for Commercial Clients' Business Growth7.3 Deployment and Integration7.3.1 Rising Need for Secure Data Transmission7.4 Support and Maintenance7.4.1 Demand for Support and Maintenance Services for the Implementation and Use of Hardware

8 Quantum Cryptography Market, by Security Type8.1 Introduction8.2 Network Security8.2.1 Growing Need to Ensure the Integrity and Usability of Network and Information8.3 Application Security8.3.1 Increasing Demand to Protect Applications from Intruders

9 Quantum Cryptography Market, by Vertical9.1 Introduction9.2 Government and Defense9.2.1 Increasing Need to Secure Confidential Data from Thefts and Unauthorized Access9.2.2 Government and Defense: COVID-19 Impact9.3 Banking, Financial Services, and Insurance9.3.1 Need to Cater to Financial Security, Online Fund Transfer Security, and Data Security9.3.2 Banking, Financial Services, and Insurance: COVID-19 Impact9.4 Retail9.4.1 Increasing Adoption of Quantum-Safe Encryption Hardware to Encrypt and Protect Customers' Confidential and Private Information9.4.2 Retail: COVID-19 Impact9.5 Healthcare9.5.1 Need to Improve the Proficiency of Clinical and IT Staff and Provide Real-Time Information Access During Emergencies Such as Pandemic9.5.2 Healthcare: COVID-19 Impact9.6 Automotive9.6.1 Increasing Demand to Provide Physical Access and Protection to Confidential Information and Critical Safety Systems9.6.2 Automotive: COVID-19 Impact9.7 Others

10 Quantum Cryptography Market, by Region10.1 Introduction10.2 the Americas10.2.1 Americas: COVID-19 Impact10.2.2 United States10.2.2.1 Increase in Funding and Adoption of Quantum Technology10.2.3 Canada10.2.3.1 Growing Need for a Developed Quantum Ecosystem10.2.4 Rest of Americas10.3 Europe10.3.1 Europe: COVID-19 Impact10.3.2 United Kingdom10.3.2.1 the Need to Deliver Quantum Encryption Systems That Enable Secure Data Transactions and Transmissions10.3.3 Germany10.3.3.1 Need to Explore the Development of Highly Secure Communication Links to Recognize Every Attack10.3.4 Rest of Europe10.4 Asia-Pacific10.4.1 Asia-Pacific: COVID-19 Impact10.4.2 China10.4.2.1 China to Gather Quantum Technology Researchers to Enhance Its Cybersecurity Space10.4.3 Japan10.4.3.1 Upsurge Demand for Quantum Communication10.4.4 India10.4.4.1 the Need to Revolutionize Future Computation and Communication Systems10.4.5 Rest of Asia-Pacific10.5 Middle East and Africa10.5.1 Middle East and Africa: COVID-19 Impact10.5.2 Middle East10.5.2.1 Growing Demand for Securing Business Content10.5.3 Africa10.5.3.1 Increasing Number of Security Initiatives

11 Competitive Landscape11.1 Overview11.2 Competitive Leadership Mapping (Start-Up/SMSE)11.2.1 Progressive11.2.2 Responsive11.2.3 Dynamic Companies11.2.4 Starting Blocks11.3 Market Ranking11.4 Competitive Scenario11.4.1 New Product Launches and Product Enhancements11.4.2 Partnerships, Collaborations, and Agreements

12 Company Profiles12.1 Id Quantique12.2 QuintessenceLabs12.3 Crypta Labs12.4 Qasky12.5 Qubitekk12.6 Isara12.7 Post-Quantum12.8 Quantumctek12.9 Magiq Technologies12.10 Nucrypt12.11 Quantum Xchange12.12 Aurea Technology12.13 Qutools12.14 Qunu Labs12.15 Infineon12.16 Mitsubishi Electric12.17 IBM12.18 Hp12.19 NEC12.20 Toshiba12.21 Microsoft12.22 Raytheon Technologies12.23 Crypto Quantique12.24 Qrypt12.25 Onboard Security (Qualcomm)

13 Adjacent/Related Market13.1 Cybersecurity Market13.1.1 Market Definition13.1.2 Market Overview13.1.3 Cybersecurity Market, by Component13.1.4 Cybersecurity Market, by Industry Vertical13.2 Quantum Computing Market13.2.1 Market Definition13.2.2 Market Overview13.2.3 Quantum Computing Market, by End-Use13.3 Encryption Software Market13.3.1 Market Definition13.3.2 Market Overview13.3.3 Encryption Software Market, by Industry Vertical

14 Appendix

For more information about this report visit https://www.researchandmarkets.com/r/111755

Research and Markets also offers Custom Research services providing focused, comprehensive and tailored research.

Follow this link:
Global Quantum Cryptography Market (2020 to 2025) - Increasing Need for Integration Solutions Presents Opportunities - Yahoo Finance

Symposium: Free exercise, RFRA and the need for a constitutional safety net – SCOTUSblog

This article is part of aSCOTUSblog symposiumon the Roberts court and the religion clauses.

Kim Colbyis director of the Christian Legal Societys Center for Law and Religious Freedom. She was counsel on amicus briefs on behalf of the Christian Legal Society inEspinoza v. Montana Department of Revenue,Our Lady of Guadalupe School v. Morrissey-Berru, Tanzin v. TanvirandFulton v. City of Philadelphia.

Americans religious freedom depends on a patchwork of protections scattered throughout federal and state laws. Religious freedom is protected to a limited degree by the First Amendments free exercise clause; to a much greater degree, but only at the federal level, by the Religious Freedom Restoration Act; and to various degrees by specific religious exemptions tucked here and there into federal statutes and regulations. While state constitutions, as well as some state and local statutes, pay homage to religious freedom, when state courts apply them the results frequently tend to be less robust than their language would suggest.

The Supreme Courts 2019-20 term brought significant religious freedom victories. But it also highlighted the lack of a constitutional safety net for religious freedom. The 2020-21 term offers a critical opportunity to restore a constitutional safety net that has been sorely lacking for three decades.

Thirty years ago, the Employment Division v. Smith decision unexpectedly weakened the constitutional protection for religious freedom. The Smith decision substituted rational basis review or possibly, no review at all for strict scrutiny review whenever a burden on the free exercise of religion is imposed by a neutral and generally applicable law. The court has never explained what it means by a neutral and generally applicable law; it is still not clear whether Smith completely gutted the First Amendment protection for religious freedom or merely shrank it considerably and made it much more complicated and confused. Whatever the degree of damage, this loss of protection applies at the federal level and also at state and local levels.

The cases before the court this term and next term illustrate Smiths regrettable long-term consequences and demonstrate why the court should overrule Smith. A case to be heard next term, Fulton v. City of Philadelphia, expressly presents that question.

1. Constitutional protection at state and local levels is needed.

Americans religious freedom varies widely depending on the state in which they live. Smith deprived religious persons of previous bargaining power and incentives necessary to persuade state and local officials to respect religious freedom.

To provide protection in states, the court has labored to identify discriminatory treatment of religious persons because Smith itself left strict scrutiny in place when religious persons suffer discriminatory treatment. The court has utilized two distinct buckets to protect religious persons:

1. Discrimination based on religious status: In Espinoza v. Montana Department of Revenue, relying on the state constitution, Montana bureaucrats excluded parents and students from a state tuition tax-credit program because many participating families chose to send their children to religious schools. The court held that the Montana constitution impermissibly discriminated on the basis of religious status in violation of the federal free exercise clause.

2. Discriminatory treatment compared to similar secular conduct: Just three years after Smith, in Church of the Lukumi Babalu Aye v. City of Hialeah, the court unanimously ruled that a municipality violated the free exercise clause when it prohibited killing animals as part of a religious ritual, but not as part of a secular activity, such as hunting. In 2018, in Masterpiece Cakeshop v. Colorado Civil Rights Commission, the court applied Lukumi in ruling that state officials unconstitutionally punished a man of deep religious convictions who refused to create a wedding cake to celebrate a same-sex wedding, but did not penalize other bakers who refused to create cakes with messages to which they personally objected.

Requiring government officials to treat religious conduct with the same respect given similar secular conduct has been an important, if unevenly applied, protection for religious freedom under the Smith regime. But it is not an adequate substitute for reliable constitutional protection of religious freedom achieved through consistent application of strict scrutiny analysis to laws that burden religious freedom. Fulton which involves a citys denial of licensure to a Catholic organizations foster-care program gives the court an opportunity to reinstate strict scrutiny for such laws.

2. RFRAs protection for religious freedom at the federal level requires reinforcement.

In response to Smith, Congress passed the Religious Freedom Restoration Act by an overwhelming, bipartisan vote, and President Bill Clinton signed it into law. RFRA requires the federal government to demonstrate a compelling interest unachievable by a less restrictive means before it may enforce a neutral, generally applicable law against a person whose sincerely held religious beliefs would be substantially burdened by the law.

RFRA, rather than the First Amendment, has provided the primary protection for Americans religious freedom at the federal level for 27 years. A singular legislative achievement, RFRA ensures a level playing field for Americans of all faiths by putting minority faiths and unpopular religious beliefs on an equal footing with faiths that are politically popular.

Two cases on the courts 2019 and 2020 dockets illustrate RFRAs importance to persons of all faiths. In Little Sisters of the Poor v. Pennsylvania, Catholic nuns returned to the Supreme Court for the third time in their nine-year effort to win the right to serve the poor without violating their religious convictions regarding contraceptives. Ruling in the Little Sisters favor, the court held that the federal government had the authority under RFRA to provide a generous religious and moral exemption from an administrative regulation that required employers to provide contraceptive coverage through their insurance plans. Unfortunately, the court did not follow the course urged by Justices Samuel Alito and Neil Gorsuch to find that RFRA not only permitted the exemption but actually required it. In a concurrence, Justice Elena Kagan, joined by Justice Stephen Breyer, provided a roadmap for the lower court on remand to rule against the religious exemption a prospect that may necessitate a fourth trip to the Supreme Court for the Little Sisters before final victory.

The second RFRA case, Tanzin v. Tanvir, will be argued this fall. Three Muslim men, one a U.S. citizen and two lawful permanent residents, seek to recover money damages from federal FBI employees who allegedly retaliated against them by placing them on the No Fly List for their refusal to become FBI informants within their religious congregations. The issue before the court is whether RFRAs authorization of appropriate relief includes recovery of money damages from federal officials acting in their personal capacities.

The coalition of 68 organizations from across the religious and political spectrum that urged RFRAs passage had one overriding operative principle: RFRA would protect all Americans religious freedom. Anticipating RFRAs main task as protecting minority faiths, few proponents foresaw that Catholic nuns would be denied a modest religious exemption by a popularly elected administration and, therefore, need RFRAs protection.

But the times have changed rapidly and dramatically. Since 2010, religious social conservatives have increasingly faced a rigid insistence that they conform to and promote the orthodoxies of the abortion and LGBT movements even when those orthodoxies directly conflict with their religious beliefs.

As a result, Congress is being pressured to eviscerate RFRA. The Equality Act, H.R. 5, passed the House of Representatives in May 2019 by a vote of 236-173, with a provision buried in it to gut RFRA. The Equality Acts proponents are willing to forfeit all Americans religious freedom in order to suppress religious dissent.

In its decision this term in Bostock v. Clayton County, which re-interpreted Title VII of the Civil Rights Act to include sexual orientation and gender identity as protected classes, the court offered reassurance that RFRA, Title VIIs religious exemption and the ministerial exception will suffice to protect religious individuals and institutions. But more needs to be done to make its promise a reality. This is particularly true because many state officials are likely to apply Bostocks rationale to re-interpret state prohibitions on sex discrimination in employment, public accommodations and government programs. Title VIIs religious exemption and RFRA do not follow Bostocks analysis downstream to the states.

The courts reaffirmation in Our Lady of Guadalupe School v. Morrissey-Berru of the First Amendments strong protection for religious employers decisions about who will lead their religious mission and teach their religious beliefs does apply to the states. But the protection, while strong, is limited and does not extend to all employees.

More to the point, Our Ladys protection of this essential right was possible only because, eight years ago in Hosanna-Tabor Evangelical Lutheran Church and School v. Equal Employment Opportunity Commission, the court set Smith to one side. In Hosanna-Tabor, the U.S. government argued that the free exercise clause offered no protection to a religious congregations decisions regarding who would be its minister or teach its faith in its school. The government understandably relied on Smith for this jaw-dropping proposition, only to find its reliance rejected by a unanimous court. But by requiring the court continually to cabin it or create workarounds, Smith works distinctive institutional damage to the courts reputation.

RFRA and the ministerial exception have performed yeomans work. But they urgently need reinforcement through restoration of consistent and reliable constitutional protection for religious freedom.

By protecting all religious beliefs regardless of their popularity, religious freedom makes it possible for Americans with starkly different worldviews to live peaceably together. Now is the time to restore substantive constitutional protection for all Americans regardless of what they believe or where they live.

Posted in Symposium on the Roberts court and the religion clauses, Featured

Recommended Citation: Kim Colby, Symposium: Free exercise, RFRA and the need for a constitutional safety net, SCOTUSblog (Aug. 10, 2020, 11:20 AM), https://www.scotusblog.com/2020/08/symposium-free-exercise-rfra-and-the-need-for-a-constitutional-safety-net/

Original post:

Symposium: Free exercise, RFRA and the need for a constitutional safety net - SCOTUSblog

The Logic of a US WeChat Ban – The Diplomat

Advertisement

Following the Clean Network Program initiative from theU.S. Department of State, the Trump administration further escalated its aggression against Chinese mobile applications, particularly WeChat and TikTok. On August 6, U.S. President Donald Trump signed an executive order addressing the threat posed by WeChat. Accusing WeChat and TikTok of censoring political content and identifying them as potential vectors for disinformation campaigns, the Trump administration prohibited transactions related to WeChat by any person or property subject to the jurisdiction of the United States after 45 days.

There are many details yet to be released by U.S. officials about implementing the executive order. It remains unclear what actions are considered to be transactions. And the impact that the executive order will have on average WeChat users is also vague. But many view the order as a plan to ban WeChat from operating in the United States.

A petition calling the federal government not to ban WeChat has received 60,415 signatures as of August 10 While Chinese Americans can give up a leisure app among the many that exist, they cannot give up the only app linking them to their families in China, the petition argues. During this pandemic, WeChat plays an even more important role in helping families stay connected and updated.

Different from TikTok, most Americans are not familiar with WeChat, a mobile application developed by the Chinese company Tencent. A Statista Survey in 2018 shows that 87 percent of U.S. internet users have never used the application, and only 4 percent of the surveyed individuals use WeChat every day.

The majority of WeChat users in the United States, and other democratic countries such as Canada, Australia, and New Zealand, are Chinese-speaking immigrants with significant ties with the Peoples Republic of China. In other words, expanding on its success in China, WeChat arrived in the United States, Canada, and many other countries through immigration. The Chinese mobile application has shaped the Chinese communities in these countries significantly. Instead of searching through yellow pages, local community bulletin boards, and online forums, newcomers with language barriers can now find many services available through the application. From buying groceries to purchasing a property, WeChat can help.

Enjoying this article? Click here to subscribe for full access. Just $5 a month.

Thus WeChat is more than a mobile application used to send messages to friends and relatives. It also includes functions to send and collect payments, as well as sharing words, pictures, and videos on your friends content feed.WeChat is a super app that covers the feature of several mobile applications that we are more familiar with.

While WeChat facilitates daily life for many of its users, the application is also involved in several significant issues. WeChat has not been able to successfully combat misinformation, fake news, and hateful messages, which are prevalent on the platform. Because WeChat posts target users who may have difficulties in reading local newspapers and conducting fact-check research, misinformation on WeChat from misinformation on drugs to fake news regarding COVID-19 is concerning and may cause more damage to democratic institutions.

Censorship from the Chinese government is the other significant problem facing WeChat. The Citizen Lab from the University of Toronto conducted in-depth research on WeChats efforts to use overseas data to boost its censorship apparatus. In addition to censoring articles, websites, and social media posts critical of the Chinese government, WeChat also stores, monitors, and intercepts messages in private conversations between individual users. With no protection of freedom of expression and freedom of the press, WeChat also became a tool for Chinese state media to reach out to the countrys overseas diaspora groups. While WeChat denies censorship allegations, numerous and robust evidence are suggesting otherwise.

Those issues are not only raising flags in the United States but also are recognized by other countries around the world. Canadas House of Commons directed members of parliament and staff not to use WeChat due to cybersecurity risks. Australian media The Canberra Times calls WeChat the channel for China disinformation campaigns.

The petition pleading with the U.S. government not to ban WeChat is right about one thing: WeChat is one of the few mobile applications that can be used by users both in and outside of China. But it would not be fair to blame the outsized impact of potentially banning WeChat on the Trump administration. Chinas Great Firewall prevents other messaging apps such as Facebook Messenger, WhatsApp, and Telegram from operating in China. With its major competitors blocked in China, WeChat obtained unfair advantages by complying with Chinese government censorship and influence operations. WeChat is very unlikely to disobey orders and censorship requests from the Chinese government and that leaves other countries with limited options to regulate the mobile application.

While WeChat serves as a tool for people to connect through the Great Firewall, it does not exonerate the application from engaging in mass censorship and influence campaigns in the free world. Democratic countries, including the United States, must step up and investigate further options to maintain their democratic integrity while minimizing the cost and inconvenience that any proposed policies may bring to diaspora groups.

Original post:

The Logic of a US WeChat Ban - The Diplomat