Indian government yet to approve the cryptocurrency ban bill – FXStreet

In reply to an RTI submitted earlier, the Finance and Department of Economic Affairs (DEA) has said that the inter-ministerial committees cryptocurrency bill is awaiting approval of the government. Several ministries are currently examining the bill.

In February 2019, the inter-ministerial committee had submitted the bill titled Banning of Cryptocurrency and Regulation of Official Digital Currencies Bill 2019. Former DEA Secretary Subhash Chandra Garg heads the committee.

Mohammed Danish, lawyer and co-founder of Crypto Kanoon, had filed an RTI with the DEA requesting the status of the bill. In a short reply, the DEA wrote:

The government has set up inter-ministerial committee (IMC) for examining the issues of cryptocurrencies under the chairmanship of Secretary (EA).

The report of the IMC on VCs [virtual currencies] has since been submitted by its members, but is awaiting approval of the government. The report and bill now be examined by the government through inter-ministerial consultation by moving a cabinet note in due course.

Danish explained that the bill in question proposes a blanket ban on all cryptocurrency-related activities. He added that the bill prescribes punishments for every activity from mining, holding, advertising, promoting, buying, and selling digital assets.

He added that it is unclear and quite pre-mature to predict what the Ministry of Finance will do. However, it appears that the ministry does not want to proceed with this crypto bill for parliamentary clearance in the present form. He added:

If the govt. decides to pass a law banning crypto, this law can be challenged by crypto business, traders, or enthusiasts based on various rights available to them under the Constitution.

View post:
Indian government yet to approve the cryptocurrency ban bill - FXStreet

OpenLogic by Perforce Expands Java Support Offering with Trusted Distributions of OpenJDK – Stockhouse

MINNEAPOLIS, Aug. 4, 2020 /PRNewswire/ -- OpenLogic by Perforce, the leading provider in agnostic open source support, now provides an enterprise-class alternative to Oracle Java by offering the most widely-used OpenJDK distributions backed by OpenLogic support.

The expansion of OpenLogic's Java Support offering with OpenJDK builds follows an overall growth trend for the business of almost 40% since its acquisition by Perforce Software in March 2019. This success has been underpinned by growth in the customer base, increased services and strategic partnerships with open source industry leaders.

"With organizations deploying several open source packages in production environments, managing the technology stack with multiple support vendors has become unsustainable," said Tim Russell, Chief Product Officer at Perforce. "OpenLogic provides product-agnostic, consolidated open source support so companies can reduce to one vendor for their entire stack. This enables organizations to simplify issue resolution and receive unbiased innovation guidance, while cutting costs and risks so they can confidently deploy open source in business critical systems."

In addition to supporting their own OpenJDK builds, OpenLogic also offers commercial support for all Java distributions, including Adopt OpenJDK, IBM, and Oracle's Java. Java support from OpenLogic includes security patches and bug fixes, in addition to guidance for the usage and administration of Java and the JVM.

"The licensing changes from Oracle have left many organizations looking for guidance on Java alternatives" explained Justin Reock, Chief Architect for OpenLogic at Perforce. "Because OpenLogic supports all Java, we are uniquely positioned to help organizations better understand their Java needs today vs tomorrow, reduce their TCO, and plan their overall open source strategy moving forward."

OpenLogic's OpenJDK builds are fully compliant with the Java SE specifications. All JDKs and JREs are verified with an inhouse test suite that validates execution. OpenLogic provides and supports free distributions for Linux, Windows, and MacOS. These distributions will be updated quarterly, with critical security patches on-demand.

The OpenLogic OpenJDK distributions are available from the OpenLogic website at openlogic.com/openjdk-downloads. After downloading an OpenJDK build, your team can choose to connect with an OpenJDK expert from OpenLogic if you're looking to get support.

In addition to supporting OpenJDK, OpenLogic provides commercial support for over 400 open source packages and common Java stack elements including Spring, ActiveMQ, Tomcat, JBoss/Wildfly, Kafka, Camel and CentOS.

About OpenLogic

OpenLogic provides enterprise-level support and services for organizations using open source software as part of their infrastructure and application stacks.

OpenLogic's team of experienced enterprise architects delivers commercial SLAs for critical open source packages including key enterprise components and platforms such as CentOS, OpenJDK, Jenkins CI, Apache, Docker, and Kubernetes.

For more information, visit http://www.openlogic.com.

About Perforce

Perforce powers innovation at unrivaled scale. With a portfolio of scalable DevOps solutions, we help modern enterprises overcome complex product development challenges by improving productivity, visibility, and security throughout the product lifecycle.

Our portfolio includes solutions for Agile planning & ALM, API management, automated mobile & web testing, embeddable analytics, open source support, repository management, static & dynamic code analysis, version control, and more.

With over 15,000 customers, Perforce is trusted by the world's leading brands to drive their business critical technology development.

For more information, visit http://www.perforce.com.

PERFORCE GLOBAL Colleen Kulhanek Perforce Software Ph: +1 612 517 2069 ckulhanek@perforce.com

PERFORCE UK/EMEA Maxine Ambrose Ambrose Communications Ph: +44 118 328 0180 perforcepr@ambrosecomms.com

View original content to download multimedia:http://www.prnewswire.com/news-releases/openlogic-by-perforce-expands-java-support-offering-with-trusted-distributions-of-openjdk-301105500.html

SOURCE Perforce Software

Read the original here:
OpenLogic by Perforce Expands Java Support Offering with Trusted Distributions of OpenJDK - Stockhouse

E-mail Encryption Market 2020 Global Outlook, Research, Trends and Forecast to 2026 – Express Journal

In the latest E-mail Encryption market report, numerous aspects pivotal to the industry augmentation in the recent past as well as the key global developments are analyzed to help businesses stay ahead of the curve. The research document has been put together in a manner that aids companies in better understanding the prevailing trends and identifying future growth prospects to make well-informed decisions.

Key growth drivers and opportunities that are slated to influence to profitability graph of the industry over the assessment period are highlighted in the report. Moreover, it suggests strategies to tackle the challenges and threats plaguing the business sphere.

Projected growth rate of the industry over the analysis timeline, backed with a comparative study of the historical data and current market scenario is included. Additionally, the impact of the COVID-19 pandemic at the global and regional level has been outlined in the report.

Request Sample Copy of this Report @ https://www.express-journal.com/request-sample/162746

Key Pointers indexed in TOC:

Product terrain

Application scope

Regional landscape

Competitive arena

The E-mail Encryption market, in brief, has been rigorously studied through multiple fragmentations, while keeping track of industry supply chain and sales channel with respect to the raw materials, upstream suppliers, distributors, and downstream buyers.

Reasons for buying this report:

The key questions answered in this report:

Significant Point Mentioned in theResearch report:

Major Points Covered in Table of Contents:

Request Customization on This Report @ https://www.express-journal.com/request-for-customization/162746

More:
E-mail Encryption Market 2020 Global Outlook, Research, Trends and Forecast to 2026 - Express Journal

Canon ransomware attack highlights rise of name and shame tactics – Verdict

Canon has been hit by a ransomware attack perpetrated by Maze Group, an organisation known for its unorthodox name and shame tactics.

Maze is believed to have stolen at least 10TB of data from the camera maker, and has encrypted access to key systems. More than 20 websites operated by Canon have been impacted, and currently show a down for maintenance message.

However, somewhat unusually for a ransomware attack, Maze Group is threatening to publish the stolen data if Canon does not pay the currently undisclosed ransom fee a tactic dubbed name and shame.

While uncommon for ransomware generally, this is a standard approach for Maze, which has previously undertaken attacks against organisations including Cognizant, Chubb, Xerox and LG. It also was behind an attack on the government of the city of Pensacola, Florida, and began releasing files after the city refused to pay a $1m ransom.

The name and shame method used by Maze is particularly concerning because it challenges general advice from cybersecurity experts to not pay in ransomware incidents.

What makes the Maze cybercriminal group sothreateningis that it takes exploitation a step further, not only encrypting the victims data, but also stealing it and threatening to release it to the public, explained Stephen Manley, chief technologist at Druva.

This adds another layer of complexity to the conversation around whether to pay or not pay the ransom.

In general, those targeted by ransomware that do pay risk being re-targeted, as they become seen as easy prey. However, the risk of exposing data in the case of non-payment makes this decision harder to make while also increasing costs for those who are victims of ransomware.

The bullying tactics used by such ransomware groups are making attacks even more expensive, and they are not going to stop any time soon, particularly within the current climate, said Matt Walmsley, EMEA director at Vectra.

These attackers will attempt to exploit, coerce, and capitalise on organisations valuable digital assets.

And with growing numbers targeted by Maze, it is thought that more will be hit in the future.

Canon, LG and Xerox were all recent victims of a Maze ransomware attack, and well continue to see more and more organisations fall prey to such breaches, said Sanjay Jagad, senior director of products and solutions at Cloudian.

Get the Verdict weekly email

For organisations that fear they are at risk of being targeted by a ransomware attack similar to the one conducted against Canon, having a skilled and well-resourced security team is vital.

Ransomware attackers tend to seek privileged entities associated to accounts, hosts and services due to the unrestricted access they can provide and to ease replication and propagation. Attackers will manoeuvre themselves through a network and make that step from a regular user account, to a privileged account which can allow them to deploy their tools and access all the data they need in order to finalise their ransomware attack and coerce their victims, explained Walmsley.

Therefore, security teams need to be agile as time is their most precious resource in dealing with ransomware attacks. Early detection and response is key to gaining back control and stopping the attackers in their tracks before they can propagate across the organisation, stealing and denying access to data.

For senior decision makers, it is also important to remember that encryption, while valuable for many forms of cybersecurity, is not a silver bullet for ransomware.

Encryption doesnt work against ransomware because the attacker can simply re-encrypt the data to prevent access to its rightful owner, said Jagad.

Other traditional approaches to combating ransomware, such as anti-phishing training, firewalls and password software, often fall short. The only way for organisations to really safeguard themselves is to protect data at the storage layer.

The importance of effective cloud security is also vital to recognize.

Organisations that embrace the agility and flexibility of cloud data protection are best positioned to respond and ensure their data remains safe and accessible from cyberattackers, said Manley.

Its the most effective way to detect malware/ransomware intrusions and protect the entire environment, including endpoints, SaaS applications, the cloud and data centers, and can automatically restore systems that can neutralise the ransomware. Deploying a robust cloud-based ransomware protection and recovery solution will be the best medicine for staying ahead of malicious threats in the future.

Read more: Number of UK organistions paying ransomware has doubled: CrowdStrike

Continue reading here:
Canon ransomware attack highlights rise of name and shame tactics - Verdict

National Cybersecurity Authority (NCA): What You Need to Know – tripwire.com

In its Vision 2030 development plan, Saudi Arabia included a National Transformation Program whose purpose is to diversify the Kingdoms income away from the oil industry. One of the core tenets of that program is to enable the growth of the private sector by developing the digital economy. Specifically, Saudi Arabia set out its intention to increase the contribution of the digital economy thats non-oil GDP from 2% to 3% by 2030. The Kingdom made clear that this process must involve partnering with private actors to develop more telecommunications/IT infrastructure along with supporting local investment in those sectors.

The Kingdom also recognized that it must take appropriate security measures to secure this process. As stated in a document published on its website:

This transformation requires easing the flow of information, securing it and preserving the integrity of all systems. It also requires maintaining and supporting the cybersecurity of the Kingdom in order to protect its vital interests, national security, critical infrastructures, high priority sectors and governmental services and practices.

Acknowledging these tasks, Saudi Arabia created the National Cybersecurity Authority (NCA) as well as approved the government entitys mandate to develop national digital security policies by royal decree. The NCA acted upon this directive by developing the Essential Cybersecurity Controls (ECC), measures which constitute the minimum security requirements for in-scope national organizations. As such, compliance with ECC is mandatory for those entities.

So, how can organizations ensure compliance with ECC?To answer that question, this blog post will first examine the five domains of ECC. It will then explain how Tripwire Enterprise can assist organizations in achieving compliance with the Controls domains using foundational controls for security, compliance and IT operations.

The NCA created the Essential Cybersecurity Controls in 2018 to help government organizations as well as private sector actors who own, operate or host national critical infrastructure to minimize the risks from external and internal digital security threats. Taking into account in-scope entities strategies, people, processes and technology, these security measures consist of 114 individual controls that are designed to uphold the confidentiality, integrity and availability of information and technology assets.

The ECC consist of five domains comprised of 29 subdomains. These are as follows:

1. Cybersecurity Governance

a. Cybersecurity strategy: All digital security plans and policies must advance the organizations efforts to comply with pertinent laws and regulations.

b. Cybersecurity management: An Authorizing Official within each organization must create a digital security department, steering committee and function head.

c. Cybersecurity policies and procedures: Each organization must have documented digital security policies/plans as well as comply with those strategies.

d. Cybersecurity roles and responsibilities: An organization must define all roles and positions related to digital security within its workforce.

e. Cybersecurity risk management: An in-scope entity must take a methodological approach to minimize risks pertaining to its IT and technological assets.

f. Cybersecurity in information and technology project management: Project management methodology procedures must take digital security into account.

g. Compliance with cybersecurity standards, laws and regulations: An entitys digital security program must comply with existing laws and regulations.

h. Periodical cybersecurity review and audit: Organizations must submit to an audit process to determine if their plans and procedures are in compliance with ECC.

i. Cybersecurity in human resources: An entity must address employee digital security from the time when someones hired to when they leave the company.

j. Cybersecurity awareness and training program: All employees need to receive whatever resources are necessary to fulfill their digital security responsibilities.

2. Cybersecurity Defense

a. Asset management: An organization needs to know what hardware and software are connected to the network if they are to protect their IT and technology assets.

b. Identity and access management: Without proper access controls, unauthorized users could compromise an organizations information and technology assets.

c. Information system and information processing facilities protection: An organization needs to safeguard its information system and processing facilities.

d. Email protection: In-scope entities need to take the proper precautions to defend their email systems against digital threats.

e. Networks security management: An organization should use network segmentation/segregation, IPSes and other tools to secure their networks.

f. Mobile devices security: Entities need to protect all mobile devices against digital threats and secure all information under their BYOD policy.

g. Data and information protection: An organization needs to take the proper measures to safeguard their data and information assets.

h. Cryptography: In the name of data protection, an organization needs to efficiently use cryptography to protect its information per its policies and procedures.

i. Backup and recovery management: Entities in the scope of ECC need to secure their information systems and software configurations against digital risks.

j. Vulnerabilities management: If they fail to detect and remediate security bugs on a timely basis, an organization could allow attackers to exploit vulnerabilities.

k. Penetration testing: An organization should use simulated digital attacks to evaluate its digital defenses against malicious actors.

l. Cybersecurity event logs and monitoring management: Logs can help an organization detect a security issue before it balloons into a security incident.

m. Cybersecurity incident and threat management: In the event of an incident, an organization needs to respond appropriately so as to minimize the damages.

n. Physical security: An organization must safeguard their IT and technology assets against physical loss, damage and/or unauthorized access.

o. Web application security: Digital threats pose a risk to external web applications; an organization needs to defend itself accordingly.

3. Cybersecurity Resilience

a. Cybersecurity Resilience Aspects of Business Continuity Management (BCM): An organization needs to protect its IT assets against potential disasters and include resiliency requirements within its business continuity plan.

4. Third-Party and Cloud-Computing Cybersecurity

a. Third-party cybersecurity: Third parties including managed services and outsourced agents pose a threat to information assets; an organization needs to follow its policies and procedures to defend itself accordingly.

b. Cloud computing and hosting cybersecurity: To remediate digital threats pertaining to its hosting and cloud computing systems, an organization needs to protect its assets hosted on the cloud and managed by third parties.

5. Industrial Control Systems Cybersecurity

a. Industrial Control Systems (ICS) Protection: An organization needs to safeguard its industrial control systems and OT assets against digital threats.

The NCA ultimately leverages self-assessments, reports from its assessment and compliance tool and/or on-site audits to ensure that in-scope entities remain compliant with the Essential Cybersecurity Controls. In pursuit of this objective, organizations should follow the NCAs guidance and implement whatever necessary to ensure continuous compliance with the controls. (This recommendation reflects the reality that not every organization can implement every control identified above. As an example, the fourth and fifth domains would not pertain to organizations that do not use the cloud and that dont manage ICS systems.)

Tripwire Enterprise can help organizations achieve their ECC compliance with the NCA. This solution is particularly effective with regards to some of the controls identified in the second domain of Cybersecurity Defense. It does this by converting the technical controls for the purpose of configuration hardening, thereby ensuring a systems security configurations are appropriate given the job that it needs to do.

Here are five controls as an example:

Organizations can easily monitor their performance across all of these and other security controls using the dashboard provided by Tripwire Enterprise.

Tripwire Enterprise specifically provides customers with several important secure configuration management (SCM) capabilities. These include the following:

Taken together, organizations can leverage these SCM capabilities to ensure the confidentiality, integrity and availability of their IT and technology assets for the purpose of helping to grow Saudi Arabias digital economy.

For more information on how Tripwire can help your organization maintain ECC compliance, click here.

Excerpt from:
National Cybersecurity Authority (NCA): What You Need to Know - tripwire.com

University of Arizona Awarded $26M to Architect the Quantum Internet – HPCwire

Aug. 5, 2020 The University of Arizona will receive an initial, five-year, $26 million grant from the National Science Foundation, with an additional five-year $24.6 million option, to establish and lead a new National Science Foundation Engineering Research Center called theCenter for Quantum Networks with core partners Harvard University, the Massachusetts Institute of Technology and Yale University.

Laying the Foundations of the Future Quantum Internet

CQN aims to lay the foundations of the quantum internet, which will revolutionize how humankind computes, communicates and senses the world, by creating a fabric to connect quantum computers, data centers and gadgets using their native quantum information states of quantum bits, or qubits. Qubits offer dramatic increases in processing capacity by not just having the 0 or 1 state of the classical bit, but also allowing what is termed a superposition of both states at the same time.

The University of Arizona has been fortunate to attract key talent in quantum optics, materials and information sciences, said University of Arizona PresidentRobert C. Robbins. It is rewarding to see our deep culture of collaboration across campus naturally position us to lead this extremely ambitious project in partnership with amazing institutions across the nation.

In February, the White House National Quantum Coordination Office underscored the importance of the field by issuing A Strategic Vision for Americas Quantum Networks. The document stated, By leading the way in quantum networking, America is poised to revolutionize national and financial security, patient privacy, drug discovery, and the design and manufacturing of new materials, while increasing our scientific understanding of the universe.

Transformative Technology

The transformation of todays internet through quantum technology will spur entirely new tech industries and create an innovation ecosystem of quantum devices and components, service

providers and applications. The potential impact of CQN is so immense, it is almost incalculable, notesSaikat Guha, CQN director and principal investigator and associate professor of optical sciences. What we are proposing to do with CQN is analogous to the critical role played by the ARPANET, the historical precursor to the internet. The pioneering scientists behind the ARPANET could not have possibly imagined the kind of computing, communications and mobile networking capabilities their discoveries would inspire and enable, and CQN aspires to follow in their footsteps to usher the world into the era of quantum networking.

The team at the University of Arizona is led by theJames C. Wyant College of Optical Sciencesand includes theCollege of Engineering, theJames E. Rogers College of Lawand theCollege of Social and Behavioral Sciences.

In recent years, the university has focused heavily on quantum engineering, increasing the breadth and depth of our expertise by hiring across several colleges six additional faculty members specializing in quantum technologies, saidElizabeth Betsy Cantwell, University of Arizona senior vice president for research and innovation. With the strength and innovative approaches of these researchers and our strong culture of industry partnerships to translate cutting-edge technologies to the market, CQN will make significant strides towards ushering in a new era of quantum networking at market scale.

CQN also includes scientific and educational leaders at core partners Harvard University, the Massachusetts Institute of Technology and Yale University, in addition to those at Brigham Young University, Howard University, Northern Arizona University, the University of Massachusetts Amherst, the University of Oregon and the University of Chicago.

A major focus of the CQN team will be research to advance quantum materials and devices, quantum and classical processing required at a network node, and quantum network protocols and architectures. CQN also aims to demonstrate the first U.S.-based quantum network that can distribute quantum information at high speeds, over long distances, to multiple user groups.

As one of the key goals of CQN, we will be creating a versatile Quantum Network Testbed and making it available as a national resource to validate system performance and boost innovation by the scientific and industrial communities alike, saidZheshen Zhang, CQN Testbed co-lead and assistant professor of materials science and engineering.

For the full announcement and additional graphics, visit https://news.arizona.edu/story/university-arizona-awarded-26m-architect-quantum-internet

Source: University of Arizona

Continued here:
University of Arizona Awarded $26M to Architect the Quantum Internet - HPCwire

Global Next Generation Computing Market 2020 Industry Insights, Share and Forecast Growth 2026 – Owned

Computing companies are racing to develop next generation computing technologies to solve a myriad of problems ranging from integrating artificial intelligence (at the chipset, IC, and component level) and cognitive computing to improving the efficiency and effectiveness of supercomputers. There are many technologies involved, including distributed computing (swarm computing), computational collaboration (bio-computing), improving performance of existing supercomputers, and completely new computer architectures (Quantum Computing).

Since the COVID-19 virus outbreak in December 2019, the disease has spread to almost 100 countries around the globe with the World Health Organization declaring it a public health emergency. The global impacts of the coronavirus disease 2019 (COVID-19) are already starting to be felt, and will significantly affect the Next Generation Computing market in 2020.

COVID-19 can affect the global economy in three main ways: by directly affecting production and demand, by creating supply chain and market disruption, and by its financial impact on firms and financial markets.

Get sample copy of this report @https://www.bigmarketresearch.com/request-sample/3851115?utm_source=SHASHI&utm_medium=PF

The outbreak of COVID-19 has brought effects on many aspects, like flight cancellations; travel bans and quarantines; restaurants closed; all indoor events restricted; over forty countries state of emergency declared; massive slowing of the supply chain; stock market volatility; falling business confidence, growing panic among the population, and uncertainty about future.This report also analyses the impact of Coronavirus COVID-19 on the Next Generation Computing industry.Based on our recent survey, we have several different scenarios about the Next Generation Computing YoY growth rate for 2020. The probable scenario is expected to grow by a xx% in 2020 and the revenue will be xx in 2020 from US$ xx million in 2019. The market size of Next Generation Computing will reach xx in 2026, with a CAGR of xx% from 2020 to 2026.

With industry-standard accuracy in analysis and high data integrity, the report makes a brilliant attempt to unveil key opportunities available in the global Next Generation Computing market to help players in achieving a strong market position. Buyers of the report can access verified and reliable market forecasts, including those for the overall size of the global Next Generation Computing market in terms of revenue.

Players, stakeholders, and other participants in the global Next Generation Computing market will be able to gain the upper hand as they use the report as a powerful resource. For this version of the report, the segmental analysis focuses on revenue and forecast by each application segment in terms of revenue and forecast by each type segment in terms of revenue for the period 2015-2026.Regional and Country-level Analysis

The report offers an exhaustive geographical analysis of the global Next Generation Computing market, covering important regions, viz, North America, Europe, China, Japan, Southeast Asia, India and Central & South America. It also covers key countries (regions), viz, U.S., Canada, Germany, France, U.K., Italy, Russia, China, Japan, South Korea, India, Australia, Taiwan, Indonesia, Thailand, Malaysia, Philippines, Vietnam, Mexico, Brazil, Turkey, Saudi Arabia, U.A.E, etc.The report includes country-wise and region-wise market size for the period 2015-2026. It also includes market size and forecast by each application segment in terms of revenue for the period 2015-2026.

Avail the Discount on this Report @https://www.bigmarketresearch.com/request-for-discount/3851115?utm_source=SHASHI&utm_medium=PF

Competition AnalysisIn the competitive analysis section of the report, leading as well as prominent players of the global Next Generation Computing market are broadly studied on the basis of key factors. The report offers comprehensive analysis and accurate statistics on revenue by the player for the period 2015-2020. It also offers detailed analysis supported by reliable statistics on price and revenue (global level) by player for the period 2015-2020.

On the whole, the report proves to be an effective tool that players can use to gain a competitive edge over their competitors and ensure lasting success in the global Next Generation Computing market. All of the findings, data, and information provided in the report are validated and revalidated with the help of trustworthy sources. The analysts who have authored the report took a unique and industry-best research and analysis approach for an in-depth study of the global Next Generation Computing market.

The following players are covered in this report:ABMAdvanced Brain MonitoringAmazonAgilent TechnologiesAlibaba CloudGoogleBoschSAPHuaweiHewlettIBMIntelMicrosoftOracleSamsungNokiaNECEmotivCisco SystemsToshibaFujitsuAtos SEDell

Next Generation Computing Breakdown Data by TypeSwarm ComputingBio-computingQuantum Computing

Next Generation Computing Breakdown Data by ApplicationSmall and Medium EnterprisesLarge Enterprises

Report link:https://www.bigmarketresearch.com/report/3851115/global-next-generation-computing-market?utm_source=SHASHI&utm_medium=PF

About Us:

Big Market Research has a range of research reports from various publishers across the world. Our database of reports of various market categories and sub-categories would help to find the exact report you may be looking for.

We are instrumental in providing quantitative and qualitative insights on your area of interest by bringing reports from various publishers at one place to save your time and money. A lot of organizations across the world are gaining profits and great benefits from information gained through reports sourced by us.

Contact us:Mr. Abhishek PaliwalBig Market Research5933 NE Win Sivers Drive, #205, Portland,OR 97220 United StatesDirect:+1-971-202-1575Toll Free:+1-800-910-6452Email:[emailprotected]

Excerpt from:
Global Next Generation Computing Market 2020 Industry Insights, Share and Forecast Growth 2026 - Owned

War crimes in Afghanistan covered up by UK Ministry of Defence – WSWS

By Jean Shaoul 6 August 2020

The government has been caught out lying about evidence on the killing of civilians in Afghanistan by the elite Special Air Service (SAS).

Three years into a civil case in the High Court brought by Saiffulah Yar into the deaths of four family members at the hand of the SAS, the Ministry of Defence (MoD) has finally handed over a tranche of e-mails and documents revealing official concerns about the killing of Afghan civilians. The MoD previously indicated it had no such documents.

The documents, written by SAS officers and military personnel, provide evidence of war crimes. They show that while the government claimed that there was no credible evidence about these events, the evidence had been sitting in Whitehall.

It is a damning confirmation of the criminality of the 2001 US-led invasion and occupation of Afghanistan that has led to more than 175,000 deaths, hundreds of thousands of wounded, and millions forced from their homes.

The intervention in Afghanistan, planned well in advance of the bombing of the twin towers in New York in 2001, was not launched to prosecute a war on terrorism but rather to project US military power into Central and South Asia. The US was intent on seizing control of a country bordering on the oil-rich former Soviet republics of the Caspian Basin, as well as China. The UK joined as a willing partner on behalf of its own oil corporations in this criminal venture.

The High Court has now ordered Ben Wallace, the Secretary of State for Defence, to explain why the ministry withheld evidence suggesting SAS soldiers executed 33 civilians in Afghanistan in early 2011. He has until November to reply. The MoD claimed it was not new evidence, as it had been reviewed by the official inquiryOperation Northmoorinto allegations of civilian killings.

Saifullah brought the case against the MoD to discover what happened to his family and whether the case had been thoroughly investigated by the British authorities. His father, two brothers, and a cousin were killed during a raid on his familys home in Qala-e-Bost, east of Lashkar Gah in Helmand province in southern Afghanistan, under British occupation in 2011.

After the raid, Saifullah, who was 16 at the time, found his father, Haji Abdul Kaliq, 55, two brothers, Sadam, 23, and Atullah, 25, and a cousin shot dead. One of his brothers and his father had been handcuffed and hooded before being shot as they lay face down on the ground. Royal Military Police (RMP) officers had arrived at his familys compound by helicopter and handcuffed and fingerprinted him, along with the other male members of his family, before he was taken to a barn with the women and children, where they were guarded by soldiers during the raid. He denies that his family had any weapons or were connected to the Taliban, the ostensible cause of the raid.

According to the 1977 Geneva Conventions, shooting civilians is only lawful if they are participating directly in hostilities. With no precise definition of direct participation, civilians are expected to be given the benefit of the doubt. Under UK domestic law, which is applicable to the armed forces, a soldier can use force to defend him/herself and others, including lethal force, only provided it is reasonable in the circumstances.

The MoD had previously maintained that it was unaware of any complaint about the raid until the family launched a legal case in 2013. But six years later, it transpired that the Royal Military Police (RMP) had interviewed 54 soldiers involved in the operation leading up to the raid on Saifullahs family home, with the governments lawyers claiming that none of those involved could remember very much about the operation.

The documents, first revealed by BBC TVs Panorama and the Sunday Times, tell a different story. They confirm claims that the government covered up dozens of allegationsincluding by UK soldiersof the killing of innocent civilians in Afghanistan and Iraq.

Philip Alston, the former UN Special Rapporteur on executions, told Panorama, I have no doubt that overall many of the allegations [of innocent people being killed] are justified, and that we can conclude that a large number of civilians were killed in night raids, totally unjustifiably.

One of the e-mails, sent by an SAS officer the morning after the raid, described it as the latest massacre! and added, Ive heard a couple of rumours. Another document revealed that there had been a secret review of suspicious killings and a string of related incidents in which the SAS had killed fighting-age men, often during a search of premises, allegedly because they had picked up a weapon.

According to the review that covered the first quarter of 2011, 23 people were killed and 10 guns were recovered in three operations. It was clear a senior officer examining the official reports filed about the SASs night raids was sceptical of their veracity, remarking on their similarity in that the detained men suddenly grabbed a weapon. He found at least five separate incidents where more people were killed than weapons were recovered. Taken together, this led him to conclude, In my view there is enough here to convince me that we are getting some things wrong, right now.

One SAS commander even wrote to London warning there was possibly a deliberate policy and that the SAS troops had potentially strayed into indefensible behaviour that could amount to being criminal.

His concern was that the killings were jeopardising the support of Afghan forces, which were refusing to accompany the British on night raids, and put[ting] at risk the [redacted] transition plan and more importantly the prospects of enduring UK influence in Afghanistan.

While the RMP had launched an investigation called Operation Northmoor into 657 allegations of abuse, mistreatment, and killings, including into the deaths of Saifullahs family members, at the hands of British forces, the government closed it down in 2017. Once again, a three-year-long official probe, costing at least 10 million, failed to result in a single prosecution.

The corporate media had gone into overdrive, branding the investigations as a witch-hunt. The MoD filed complaints against the lawyers bringing civil suits against it, including against Saifullahs lawyer Leigh Day. Leigh Day was cleared of wrongdoing after a six-week tribunal in September 2017.

In March, the government introduced legislation proposing a five-year limit on prosecutions for soldiers serving outside the UK. With its presumption against prosecution that gives the green light to future war crimes, including the mass murder of civilians, the military will now be above the law.

It was WikiLeaks publisher and journalist Julian Assange who, by publishing the Afghan war logs in 2010, a vast trove of leaked US military documents, first brought to the worlds attention evidence of the criminality of a war that has now lasted 19 years. The Afghan war logs exposed the myth that the occupation of Afghanistan was a good war, supposedly waged to defeat terrorism, extend democracy, and protect womens rights. They revealed the mass killings of civilians by both US and UK forces, detailing at least 21 occasions when British troops opened fire on civilians.

It is not just those soldiers who perpetrated these crimes on behalf of British imperialism that have escaped punishment. The guilty include those at the top of the political and military ladder that planned and executed this criminal war, even as they plot new crimes, including catastrophic conflicts with nuclear-armed powers such as China and Russia.

Instead, the only two people who have faced criminal repercussions are those who reported the crimes: Chelsea Manning, who has endured a decade of persecution, and Julian Assange, who is imprisoned in Britains maximum-security Belmarsh Prison awaiting court hearings for his extradition to the US where he faces 175 years of imprisonment under the Espionage Act. The exposures of the horrors of both the Afghan and Iraq wars earned Assange the undying hatred of Britains political establishment, which is why they have hounded, intimidated, tortured and imprisoned him.

The author also recommends:

UK covered up war crimes in Afghanistan and Iraq [22 November 2019]

Service Prosecuting Authority drops all but one investigation into British war crimes in Iraq [13 June 2020]

Ten years since WikiLeaks published the Afghan war logs [31 July 2020]

Read this article:
War crimes in Afghanistan covered up by UK Ministry of Defence - WSWS

OpenLogic by Perforce Expands Java Support Offering with Trusted Distributions of OpenJDK – RealWire

Minneapolis, August 4, 2020 OpenLogic by Perforce, the leading provider in agnostic open source support, now provides an enterprise-class alternative to Oracle Java by offering the most widely-used OpenJDK distributions backed by OpenLogic support.

The expansion of OpenLogics Java Support offering with OpenJDK builds follows an overall growth trend for the business of almost 40% since its acquisition by Perforce Software in March 2019. This success has been underpinned by growth in the customer base, increased services and strategic partnerships with open source industry leaders.

With organizations deploying several open source packages in production environments, managing the technology stack with multiple support vendors has become unsustainable, said Tim Russell, Chief Product Officer at Perforce. OpenLogic provides product-agnostic, consolidated open source support so companies can reduce to one vendor for their entire stack. This enables organizations to simplify issue resolution and receive unbiased innovation guidance, while cutting costs and risks so they can confidently deploy open source in business critical systems.

In addition to supporting their own OpenJDK builds, OpenLogic also offers commercial support for all Java distributions, including Adopt OpenJDK, IBM, and Oracle's Java. Java support from OpenLogic includes security patches and bug fixes, in addition to guidance for the usage and administration of Java and the JVM.

The licensing changes from Oracle have left many organizations looking for guidance on Java alternatives explained Justin Reock, Chief Architect for OpenLogic at Perforce. Because OpenLogic supports all Java, we are uniquely positioned to help organizations better understand their Java needs today vs tomorrow, reduce their TCO, and plan their overall open source strategy moving forward.

OpenLogics OpenJDK builds are fully compliant with the Java SE specifications. All JDKs and JREs are verified with an inhouse test suite that validates execution. OpenLogic provides and supports free distributions for Linux, Windows, and MacOS. These distributions will be updated quarterly, with critical security patches on-demand.

The OpenLogic OpenJDK distributions are available from the OpenLogic website at openlogic.com/openjdk-downloads. After downloading an OpenJDK build, your team can choose to connect with an OpenJDK expert from OpenLogic if youre looking to get support.

In addition to supporting OpenJDK, OpenLogic provides commercial support for over 400 open source packages and common Java stack elements including Spring, ActiveMQ, Tomcat, JBoss/Wildfly, Kafka, Camel and CentOS.

About OpenLogic OpenLogic provides enterprise-level support and services for organizations using open source software as part of their infrastructure and application stacks.

OpenLogics team of experienced enterprise architects delivers commercial SLAs for critical open source packages including key enterprise components and platforms such as CentOS, OpenJDK, Jenkins CI, Apache, Docker, and Kubernetes.

For more information, visit http://www.openlogic.com.

About PerforcePerforce powers innovation at unrivaled scale. With a portfolio of scalable DevOps solutions, we help modern enterprises overcome complex product development challenges by improving productivity, visibility, and security throughout the product lifecycle.

Our portfolio includes solutions for Agile planning & ALM, API management, automated mobile & web testing, embeddable analytics, open source support, repository management, static & dynamic code analysis, version control, and more.

With over 15,000 customers, Perforce is trusted by the world's leading brands to drive their business critical technology development.

For more information, visit http://www.perforce.com.

Read the rest here:
OpenLogic by Perforce Expands Java Support Offering with Trusted Distributions of OpenJDK - RealWire

Terabytes of data were buried in the Artic. We ask the person in charge, why? – Mashable SE Asia

Some of you who are into the programming field know what's GitHub. For those of you who don't, GitHub is a website where people who have developed open source codes can store and collaborate on.

Companies mainly use it as a collaborative tool where any changes they make to the software's code can be uploaded to GitHub and the next person would just need to pull the updated code and make other changes.

But the company is now embarking on a unique journey to archive terabytes of code from all around the world.

Curiosity got the better of us, and we had some questions to ask VP of Strategic Programs at GitHub, Thomas Dohmke, on why they did such a thing?

We thought its worth preserving that open source software for future generations to come and we came up with the idea of the archive program. It uses different approaches to archive open-source software in various forms of media.

Not everything on your SSD is kind of like up to date, and then you might upload it into Dropbox or One Drive every other day or so.

But then youll do like an (Apple) Time Machine backup or like an external hard drive backup more rarely, right? Because you dont have the time to always connect that hardware. You might not have it with you when you go on a trip. We do a similar thing, and we have a hot layer which is real-time backups. First, of course, in GitHub itself, our data centres have backups.

And we have multiple regions where we store our data, so if there are some thunderstorms, we can just hand over to a different region, taking over the data. But then we also stream data through our API into two partners. Theyre called GH Archive and GH torrent.

If you have some cool projects that have more than just one, that was kind of like a classifier to figure out which ones to pick.

This is a real open source project and not just some students Hello, World kind of project where you just created something to try it out. Its all the relevant open source code in the world.

That includes like Linux for example, and the Bitcoin source code, the Ruby or JavaScript source codes. It goes all the way from operating systems to Crypto Currency.

Thousands and thousands of libraries that are used in the dependency tree of basically every kind of software project where thats commercial or not. It also includes Microsoft MS-DOS because a couple of years ago they made that open source.

It depends on the layer. Like in the cold layer, its more like a museum or history lesson.

We put it into the vault about two weeks ago, so thats now code frozen in time. The value is not so much to recover this code and make it run and found your startup in 1,000 years. The value is similar to learning about our past in the medieval ages.

We have a saying at GitHub, software is the biggest team sport on Earth. Because people all around the world in their spare time, weekends, and of course professional players are working together and they dont care about where theyve come from. They dont care about languages. They dont care about cultural differences.

All they care about is collaborating on the codes to make them better, and this is what the archive preserves in the first place.

Thats why we also have the warm and the hot layer. They will be updated all the time, assuming that those entities and including GitHub, are there for the next 100 years.

For the cold layer, were also thinking about going back, in the next five years or so to do another snapshot. Maybe we put the next snapshot in a different location. We havent figured that part out. We are thinking about new ways of archiving software all around the world.

I would say pretty strong in the sense that its in a coal mine, and the entrance to the core is 100 meters above sea level so that you have to go up a hill first to get into the coal mine.

Its unlikely that the sea levels will rise 100 meters, right? What the scientists are talking about is a single-digit rise. Thats already a problem because of cities like Miami or in the Netherlands thats built on ocean level.

You go down a little bit and then up a little bit again and down a little bit and that way its protected from meltwater. So, if the permafrost is melting and some water is flowing into the mine, its basically stuck in those valleys of the shafts. Unless a lot of the ice melts, it shouldnt be an issue.

And then you get into the actual archive, which looks like a metal container thats protecting the archive data from the permafrost. But its deep, and you have to go down 300 meters in the mountain.

Then you have the code which is stored in a plastic container, and the plastic containers are wrapped with aluminium foil to keep it in constant conditions. So I would with high confidence say that this will survive most of the likely events that are happening now.

We have not only that copy in the Arctic. We have the other copies in Paris and in San Francisco on their servers. Were also putting two reels into the Library of Oxford which have been archiving data since the 1500s.

The archive is locked down. Its kind of like a data centre or a bank vault so you cant access this unless you have a scientific reason or youre like a partner with the Norwegian government and the company that we are working with.

Occasionally they might have visitors there to do another drop. For example, if the Singapore government wants to store the data. They can of course access the archive and they do photo shoots. But normal people cannot go into the archives. They can go into the coal mine and see the coal mine.

I personally think its fascinating what GitHub is doing. We always talk about preserving history so we can learn from it. But with how much technology has integrated into our lives, we should remember how it has help in human advancement.

These types of technology are ingrained into history. Therefore, it should be given the same treatment as any other pieces of history.

Cover image sourced from GitHub.

Go here to read the rest:
Terabytes of data were buried in the Artic. We ask the person in charge, why? - Mashable SE Asia