Forex and Cryptocurrency Forecast for August – Action Forex

First, a review of last weeks events:

EUR/USD. The U.S. economy is not just in recession. Its flying down at a breakneck speed. The decline in US GDP in the second quarter was the largest ever recorded minus 32.9%. The reasons for this fall are well known these are quarantine measures caused by the coronavirus pandemic. The authorities hope they can stop the spread of COVID-19 without turning the economy to zero. Some states have managed to tighten quarantines without restricting economic activity and to achieve a smoothing of the incidence curve.

However, there are hopes and there is a reality the same minus 32.9%, which plunged investors into a real shock, causing a simultaneous fall in both the US dollar and stock indices. While these two indicators were going in antiphase in spring the USD index (DXY) grew, when the Nasdaq and the S&P500 fell, and vice versa, now they all fell.

In contrast to the United States, things in Europe turned out to be not so bad, as evidenced by the macroeconomic indicators published last week. Germanys GDP fell by only 10.1% in absolute terms, and in the Eurozone by 12.1%, the data on GDP and consumer spending of France, as well as retail sales in Germany look rather optimistic, which contributes to the strengthening of the European currency.

The EUR/USD pair is growing for the third month in a row, the strongest strengthening since 1998 and the sharpest upward jump in 10 years. In July alone, the euro strengthened against the dollar by 725 points (5.6%), which has not been observed since September 2010. As a result, the pair reached a local high of 1.1908 on Friday 31 July, followed by a pullback on the wave of the monthly profit fixing, and it ended the session at 1.1775;

GBP/USD. Following the EUR/USD, the pair continues to strive up. Over the past week, the pound has slipped the dollar by 380 points, and has almost reached 1.3200, stopping at 1.3170. Then, just like in the case of the euro, the July profit was fixed, and the finish was at 1.3085;

USD/JPY. The Japanese currency has been strengthening its positions for almost the entire week. A particularly noticeable move occurred on Thursday, July 30, following the release of dismal US GDP data. At this point, the pair almost came close to the 104 yen to the dollar mark. However, there was a sharp reversal of the trend on Friday, and it returned almost where it started the five-day period. The final chord was played at 105.90. And thus, the change in the quote for the week was only about 20 points;

cryptocurrencies. What everyone has been waiting for since mid-May, when bitcoin was halved, finally happened. Bitcoin broke through the level of $10,000 in a powerful snatch and stopped, only reaching the height of $11,365, then moved into a sideways trend with gradually fading fluctuations, choosing as Pivot Point the horizon $11,000.

Experts cite the continuing fall of the dollar and the beginning of the fall in stock markets as the reason for the growth of the main cryptocurrency. The dollar has ceased to play the role of a defensive asset, which it was this spring, in the midst of the panic caused by the COVID-19 pandemic, and investors again turned to such traditional instruments as precious metals, and at the same time to the digital gold bitcoin.

The BTC/USD pair ceased to correlate with stock indices and returned to the correlation with XAU/USD. This has once again shown that big institutional investors see BTC only as a supplement to core financial assets. It is difficult to argue with that, because even the total capitalization of the crypto market, which has reached $330 billion, is a drop in the ocean compared to traditional markets.

So, over the past week, the capitalization on the high-rise has grown by $44 billion, or about 15%. The Crypto Fear & Greed Index has jumped to 75 (53 a week ago), matching the coin being heavily overbought and pointing to a possible correction.

In its quest to upward, the main cryptocurrency has pulled the top altcoins, which show even greater growth than the mother asset: bitcoin (BTC/USD) 17%, ripple (XRP/USD) 19%, ethereum (ETH/USD) 21%, litecoin (LTC/USD) 30%. In the long term, experts assess Ethereums chances above all else. With a 75% probability, this coin could rise in price to $400 by the end of the year.

The growth of the crypto market has certainly become the main news of the week, but there are other that may play a significant role in the future. So, a Federal Court in the United States has finally recognized bitcoin as money. This was stated by Chief Justice of the District Court of the District of Columbia Beryl Howell, considering the case of Coin Ninja CEO Larry Dean Harmon, accused of laundering $ 311 million. She noted that the concept of money usually means a means of circulation, a method of payment or a means of saving. And bitcoin is those things. Recall that the US has precedent law, and such a judges decision can have far-reaching consequences.

As for the forecast for the coming week, summarizing the views of a number of experts, as well as forecasts made on the basis of a variety of methods of technical and graphical analysis, we can say the following:

EUR/USD. Fed officials acknowledged last week that the pace of recovery in the U.S. economy is directly dependent on the epidemiological situation. Naturally, the same goes for Europe. However, despite the fact that in order to make any decisions, European politicians each time need to reach a consensus, it is difficult, but they manage to do it. Quarantine measures taken by the leaders of individual EU countries, in total, turned out to be much more coordinated and effective than in the United States, which has a direct impact on the economic situation. It is evident that America feels noticeably worse than Europe, which is reflected in the EUR/USD pair rate.

75% of trend indicators on H4 and 100% on D1 are painted green, as well as 85% of oscillators on both timeframes. Also, 45% of experts are expecting the continuation of the euro growth, supported by graphical analysis on D1. The target is an important psychological level 1.2000, after breaking which in the medium term the road to 1.2500 will open.

Although, referring to September 2017, we see that after reaching the level of 1.2000, a deep two-month correction to 1.1550 followed, and only after its completion the pair reached the height of 1.2500.

Of course, there was no coronavirus pandemic three years ago and things may now go according to a different scenario. However, according to 55% of analysts, the dollar should not be written off. And as far as the immediate outlook is concerned, they believe the pair could drop to the 1.1650-1.1700 zone, which is confirmed by graphical analysis on H4 and 15% of oscillators that signal it is overbought.

As for the coming week, we should pay attention to the indicators of the ISM Business Activity Index in the US manufacturing and services sector (to be published on August 03 and 04, respectively), as well as to the labour market data (NFP), traditionally published on the first Friday of the month.

It should be noted that in the medium term, the overwhelming majority (80%) of experts expect the US to improve and the dollar to return to 1.1000-1.1300;

GBP/USD. Unlike EUR/USD, the pair being overbought signals here are given by significantly more oscillators: 15% on H4 and 35% on D1. Graphical analysis on H4 looks south as well. But the trend indicators 90% on H4 and 100% on D1 are still pointing north.

Among experts, the majority of votes are given to bears 60% on W1 and 80% on MN indicating markets are uncertain about the strength of the British currency. Indeed, despite some lull, the problems associated with Brexit have not gone away.

Some clarity regarding the state and prospects of the UK economy can be given on Thursday, August 06, when the Bank of England will meet, its monetary policy report will be published and the decision on the interest rate will become known. Also, of interest to traders and investors is the subsequent speech of the head of the Bank of England Andrew Bailey.

In the meantime, the following levels can be marked for the GBP/USD pair: support -1.3000, 1.2900, 1.2770 and 1.2670, resistance 1.3200 and the December 2019 high, 1.3515;

USD/JPY. 60% of experts supported by graphical analysis on H4 believe that the pair will try to test the 104.00 level once again in the next few days. And it will not succeed and will return first to the area of 106.00 within a month, and then rise even higher to the zone 106.60-108.00. According to the remaining 40% of analysts, there will be no attempt to re-break south, and the pair will immediately strive to the height of 108.00.

After the forward and reverse movement of the pair last week, there is complete confusion among the indicators on H4. But the D1 is still dominated by red, 80% of oscillators and the same number of trend indicators are painted in it;

cryptocurrencies. According to Glassnode specialists, after the price overcame the psychological barrier of $10,000, miners began to hold on to most of the bitcoins they mined. This can create a certain deficit in the market and contribute to the growth of quotations.

According to billionaire Max Kaiser, founder of Heisenberg Capital, the main cryptocurrency should break the previous record of $20,000 and rise in price to $28,000. True, there are also those who disagree with this forecast. Bitcoin is attractive for investment. Nevertheless, an update of highs in the region of $28,000, which Kaiser designated, is unlikely, retorted the billionaire of the Data Center Six-Nines Sergey Troshin. As usual, the first hype is the most powerful, the other hypes are already lower. Perhaps when bitcoin reaches the $17,000-$18,000 mark, many will start fixing profits, waiting for a correction,

An even more modest forecast was given by analysts at Bloomberg. They believe that if the number of active user addresses does not change, the bitcoins target will be the 2019 high, $12,734.

As for the average forecast of analysts, 60% of them expect a correction in the near future and a decline of the pair to the resistance of $10,000. The remaining 40% agree with the Bloomberg forecast. At the same time, the most cautious experts do not tire of reminding about the volatility of crypto trends. Thus, the launch of futures in December 2017. became the starting point of crypto winter, and after impressive growth in the first month and a half of 2020 bitcoin collapsed to $3,830, jeopardizing the existence of all of the digital currency market.

But there is also good news for those who fear a similar apocalypse. One of the veterans of the bitcoin industry, the Abra platform has added the feature to earn on deposits in cryptocurrency and stablecoins. According to the companys website, TrueUSD (TUSD), Tether (USDT) and USD Coin (USDC) are the most profitable 9% per annum. The annual return of deposits in bitcoin and ethereum is 4.1% and 4.0% respectively. The rates offered by Abra are indeed higher than bank interest on deposits in dollars or euros, which is good news. But the question arises about the reliability of these deposits in a conversation with The Block, Abra representatives said that rates will be revised weekly. And it will be very sad if they go down to zero or go into the negative zone altogether.

Read the original here:
Forex and Cryptocurrency Forecast for August - Action Forex

New South African online school uses machine learning to teach children Here is how much it costs – MyBroadband

Private learning group AdvTech has announced the launch of a new online school for grades R to 9.

AdvTech is the largest private education provider in Africa, and its schools division includes major brands such as Crawford Schools, Trinityhouse and Abbotts.

Its new school, which is called Evolve Online School (Evolve), will begin operations from 1 January 2021 and will offer a curriculum mapping system developed by MIT.

This IEB-aligned mapping curriculum allows learners to progress at their own deliberate or accelerated pace, Evolve states.

In this rapidly changing society, the one-size-fits-all method of teaching no longer makes any sense, said Principal Colin Northmore. Evolve starts by answering the question of how we can make learning an adventure for each child?

This system places students within subjects according to their abilities, letting them progress up to their potential in each subject.

The result is that each students learning experience is tailored to their specific needs, and they are encouraged to grow at a pace that suits their ability and enthusiasm, the school states.

One of the key features touted by the Evolve Online School is its use of machine learning, which it says is employed to:

Evolve also offers a range of forward-looking subjects that differ depending on which phase the student is in.

The school separates students into three phases Foundation Phase, Intermediate Phase, and Senior Phase. These comprise students from Grades R-3, Grades 4-6, and Grades 7-9, respectively.

Evolve said that it plans to add a phase which caters to Grades 10-12 from 2022.

The subjects included in each phase are described as follows, according to the schools website:

Instead of teachers, Evolve states that its students will be taught by learning activators, which draw from master teachers across the country to develop curriculum content.

There will be a strong focus on foundational, social, and emotional learning skills. Our team of life coaches will focus exclusively on these skills. Our children are growing up in a world very different from the one in which we grew up, Northmore said.

Things that we, as adults, deal with and take in our stride they are already facing at a very young age. Our life coaches will play a very important role in teaching students how to deal with issues such as stress and anxiety, helping them develop coping mechanisms, resilience and a growth mindset.

Registrations for the 2021 academic year open in September, with Evolves school year set to start in 2021.

The Evolve 2021 fee structure is shown below.

It should be noted that a non-refundable registration fee of R300 is payable at the start of the online application process, and the school will supply each childs iPad with all the required books and apps they will need.

Original post:
New South African online school uses machine learning to teach children Here is how much it costs - MyBroadband

This hardware-encrypted USB-C drive is rugged, inexpensive, and can run Windows – TechRadar

Apricorn has released its new Aegis Secure Key 3NXC drive that features robust security, a rugged chassis, and a USB Type-C connector.

The ApricornAegis Secure Key 3NXCdrive, which is fast enough to run an operating system, features its own AES-XTS 256-bit encryption chip as well as a keypad to enter numerical PINs. At present, the storage device isFIPS 140-2 level 3 validation pending and the company expects to get it in Q3 2020.

The USB-C Aegis Secure Key 3NXC drive supports read-only mode for those who need to carry sensitive data and do not need to alter it anyhow as well as a read-write mode for those who may need to change the data on the drive or boot an operating system from it. Since encryption is hardware-based, it is seamless for OS and therefore the Aegis Secure Key 3NXC devices are compatible with virtually all operating systems available today, including Apples MacOS, Googles Android, Microsofts Windows, and even Symbian.

The firmware of the drive is locked down and cannot be altered by malware or exploits (e.g., BadUSB), which means that thedriveitself is secure. Furthermore, the drive has its own battery that charges when it is plugged to a host, so an unlock pin can be entered while the drive is not plugged.

The Aegis Secure Key 3NXC drive comes in an aluminum chassis and is IP68-rated against water and dust. It also comes in an enclosure for extra protection. Measuring 81mm x 18.4mm x 9.5mm, the device weighs 22 grams.

Apricorn, which specializes in hardware-encrypted storage devices, offers multiple versions of its Aegis Secure Key 3NXC drives featuring capacities ranging from 4GB to 128GB. The company does not disclose performance of the storage device and only mentions a 5Gbps theoretical throughput of a USB 3.2 Gen 1 interface, but higher-end Aegis Secure Key 3NXC are probably fast enough to boot an operating system in a reasonable amount of time.

There is one caveat with using Apricorns Aegis Secure Key 3NXC drive as a boot drive. Microsoft recentlycanned Windows To Goin Windows 10 Enterprise and Windows 10 Education (version 2004 and later) that enabled the creation of a Windows To Go workspace that could be booted from a USB drive. To that end, those who would like to use an Aegis Secure Key 3NXC to boot an OS will have to use an outdated version of Windows, or go with a Linux OS.

Apricorns Aegis Secure Key 3NXC drive are available directly from the company. A 4GB model costs $59 or 52.45, whereas a 128GB is priced at $179 or 159.13 depending where are you at. Considering the fact that the devices are aimed at various government and corporate personnel who have access to sensitive data as well as hardware encryption, metallic chassis, and other sophisticated features, prices of these drives look justified.

Source:Apricorn

Go here to see the original:
This hardware-encrypted USB-C drive is rugged, inexpensive, and can run Windows - TechRadar

Avoid bad security practices that caused Postbank’s breach – ITWeb

The news a couple of months ago that Postbank has to replace 12 million bank cards due to a major data breach is an excellent case study in the risks of poor security processes and the reality that the human element remains a weak link in the security chain.

The breach resulted from Postbank's encrypted master key being printed in a plain, unencrypted format at its old data centre in Pretoria, and then being stolen by staff members.

The breach might appear to be a stroke of hacking genius, but, in truth, its just a case of inadequate security practices and seemingly rogue and corrupt individuals who stole the 36-digit (encryption) master key, says Karl Nimmo, CEO and founder of InTouch.

Manual key management is fraught with difficulties, says IT security expert Ian Farquhar, a director of Worldwide Security Architecture Team at Gigamon in Australia. In Postbanks case, its going to cost them far more to fix this than the actual fraud, he adds.

People routinely underestimate the cost of getting key management wrong. Theres another risk involved here, too. Not only financial loss, but poor key management can actually lead to outages that can cost as much if not more than fraud. Hopefully, this will be a wake-up call for other regional banks, so that they can improve their technology and processes around keys.

According to Farquhar, its a credit to the payment card industry that they have, in the vast majority of cases, properly implemented controls around the cryptographic keys used to protect electronic financial transactions (EMV). However, it seems that in the Postbank case, a key was exposed during a data centre migration, and rather than being managed properly, it was seriously mishandled by those involved. This fraud was the result, he says.

Farquhar stresses that most organisations don't rely on EMV keys alone. EMV, which originally stood for Europay, Mastercard, and Visa, is a payment method based upon a technical standard for smart payment cards and for payment terminals and ATMs that are able to accept them.

I was recently speaking to a large international financial organisation that was managing 170 000 different keys. While an extreme example, even small financial institutions will be managing 1 000 or 2 000 keys, far more than can be reliably handled with manual processes.

In the Postbank case, breaking the 36-character key using a brute force hacking technique would be practically impossible, based on the current state of modern supercomputers, adds Nimmo.

The most sophisticated hackers in the world would consider this a non-trivial task with a very low likelihood of success, which is why this breach was not the work of sophisticated attackers, but, rather, the result of bad security practices and dishonestindividuals who had access to the physical systems. This breach is a reminder that hacking isnt always done by someone sitting on the other side of the world, but often employs clever social engineering where the attacker has access to physical devices. The best way to protect against this is to strictly adhere to best security practices and processes.

According to Nimmo, there are several encryption methods to protect data to ensure it remains safe and private to the intended parties, who should have access to the encrypted data.

End-to-end encryption is a robust asymmetric encryption technique for encrypting data where the keys are stored by both the sender and the recipient with public and private keys. This form of encryption puts the key in the hands of the end-user. A breach would require the attacker to breach either the senders or the receiver's device.

The concept of a master key to protect all the other cryptographic keys is another well-known implementation of encryption, adds Nimmo.

Typically, these master keys are very strong and would be nearly impossible to break using even the most powerful supercomputers in existence. Using a master key has the advantage that only one piece of plaintext material needs to be protected and stored.

The flip side of the coin and the inherent disadvantage of this single point of failure is that if this key is breached, then the entire system is breached, as in the case of Postbank.

The good news, says Farquahar, is that there are solutions in this space: hardware security modules (HSMs) for securely storing keys and enterprise key management systems, as well as associated technologies such as enterprise certificate lifecycle management systems.

These all help to secure and automate key management, removing the need for problematic manual processes. Im seeing a lot of organisations, inside as well as outside the financial services industryimplement these. They need to be backed up with strong operational processes supported by standards published by organisations like the ISO and NIST, Farquahar adds.

The Postbank breach is a reminder that information security has many idiosyncratic foibles that do not always rely on a technical solution. It is a collective engagement of technical best practices as well as real-world physical security. `Do not allow your master key to be printed would be a sound security starting point, Nimmo concludes.

Attempts by ITWeb to get further details from Postbank went unanswered.

Read more:
Avoid bad security practices that caused Postbank's breach - ITWeb

Europe Network Encryption Market 2020 Top Manufactures, Growth Opportunities and Investment Feasibility 2025 – Research Newspaper

Global Network Encryption Market Research Report 2020: COVID-19 Outbreak Impact Analysis

The Network Encryption market research report drafted by Brand Essence Market Research elucidates relevant market and competitive insights as well as regional and consumer information. In a nutshell, the research study covers every pivotal aspect of this business sphere that influences the existing trends, profitability position, market share, market size, regional valuation, and business expansion plans of key players in the Network Encryption market.

Download Premium Sample of the Report: https://brandessenceresearch.biz/Request/Sample?ResearchPostId=166064&RequestType=Sample

Network Encryption Market unveils a succinct analysis of the market size, regional spectrum and revenue forecast about the Network Encryption market. Furthermore, the report points out major challenges and latest growth plans embraced by key manufacturers that constitute the competitive spectrum of this business domain.

Network encryption (sometimes called network layer, or network level encryption) is a network security process that applies crypto services at the network transfer layer above the data link level, but below the application level. The network transfer layers are layers 3 and 4 of the Open Systems Interconnection (OSI) reference model, the layers responsible for connectivity and routing between two end points. Using the existing network services and application software, network encryption is invisible to the end user and operates independently of any other encryption processes used. Data is encrypted only while in transit, existing as plaintext on the originating and receiving hosts.

This report focuses on the global Network Encryption status, future forecast, growth opportunity, key market and key players. The study objectives are to present the Network Encryption development in United States, Europe and China.

The key players covered in this study Cisco Thales Esecurity Atos Juniper Networks Certes Networks Rohde & Schwarz Cybersecurity Adva Gemalto Nokia Colt Technology Services Aruba Huawei Ciena Eci Telecom Senetas Viasat F5 Networks Raytheon Arris Stormshield Atmedia Securosys Packetlight Networks Quantum Corporation Technical Communication Corporation

Market segment by Type, the product can be split into Hardware Platform Services

Market segment by Application, split into Large Enterprises Small and Medium-Sized Enterprises

Network Encryption market report consists of the worlds crucial region market share, size (volume), trends including the product profit, price, value, production, capacity, capability utilization, supply, and demand. Besides, market growth rate, size, and forecasts at the global level have been provided. The geographic areas covered in this report:North America (United States, Canada and Mexico), Europe (Germany, France, UK, Russia and Italy), Asia-Pacific (China, Japan, Korea, India and Southeast Asia), South America (Brazil, Argentina, Colombia etc.), Middle East and Africa (Saudi Arabia, UAE, Egypt, Nigeria and South Africa).

This research study involved the extensive usage of both primary and secondary data sources. The research process involved the study of various factors affecting the industry, including the government policy, market environment, competitive landscape, historical data, present trends in the market, technological innovation, upcoming technologies and the technical progress in related industry, and market risks, opportunities, market barriers and challenges. Top-down and bottom-up approaches are used to validate the global market size market and estimate the market size for manufacturers, regions segments, product segments and applications (end users). All possible factors that influence the markets included in this research study have been accounted for, viewed in extensive detail, verified through primary research, and analyzed to get the final quantitative and qualitative data. The market size for top-level markets and sub-segments is normalized, and the effect of inflation, economic downturns, and regulatory & policy changes or other factors are not accounted for in the market forecast. This data is combined and added with detailed inputs and analysis from BrandEssenceResearch and presented in this report.

After complete market engineering with calculations for market statistics; market size estimations; market forecasting; market breakdown; and data triangulation, extensive primary research was conducted to gather information and verify and validate the critical numbers arrived at. In the complete market engineering process, both top-down and bottom-up approaches were extensively used, along with several data triangulation methods, to perform market estimation and market forecasting for the overall market segments and sub segments listed in this report. Extensive qualitative and further quantitative analysis is also done from all the numbers arrived at in the complete market engineering process to list key information throughout the report.

The study objectives of this report are: To analyze global Network Encryption status, future forecast, growth opportunity, key market and key players. To present the Network Encryption development in United States, Europe and China. To strategically profile the key players and comprehensively analyze their development plan and strategies. To define, describe and forecast the market by product type, market and key regions.

In this study, the years considered to estimate the market size of Network Encryption are as follows: History Year: 2014-2018 Base Year: 2018 Estimated Year: 2019 Forecast Year 2019 to 2025

For the data information by region, company, type and application, 2018 is considered as the base year. Whenever data information was unavailable for the base year, the prior year has been considered.

>>>>Get Full Customize report@ https://brandessenceresearch.biz/Request/Sample?ResearchPostId=166064&RequestType=Customization

Our industry professionals are working reluctantly to understand, assemble and timely deliver assessment on impact of COVID-19 disaster on many corporations and their clients to help them in taking excellent business decisions. We acknowledge everyone who is doing their part in this financial and healthcare crisis.

The Essential Content Covered in the Global Network Encryption Market Report:

* Top Key Company Profiles.* Main Business and Rival Information* SWOT Analysis and PESTEL Analysis* Production, Sales, Revenue, Price and Gross Margin* Market Share and Size

The report provides a 6-year forecast (2020-2026) assessed based on how the Network Encryption market is predicted to grow in major regions like USA, Europe, Japan, China, India, Southeast Asia, South America, South Africa, Others.

Strategic Points Covered in TOC:

Chapter 1:Introduction, market driving force product scope, market risk, market overview, and market opportunities of the global Network Encryption market.

Chapter 2:Evaluating the leading manufacturers of the global Network Encryption market which consists of its revenue, sales, and price of the products.

Chapter 3: the competitive nature among key manufacturers, with market share, revenue, and sales.

Chapter 4:Presenting global Network Encryption market by regions, market share and revenue and sales for the projected period.

Chapters 5, 6, 7, 8 and 9:To evaluate the market by segments, by countries and by manufacturers with revenue share and sales by key countries in these various regions.

Read More: https://brandessenceresearch.biz/ICT-and-Media/Top-Growth-OnNetwork-Encryption-Market-Size-and-Share/Summary

About us: Brandessence Market Research and Consulting Pvt. ltd.

Brandessence market research publishes market research reports & business insights produced by highly qualified and experienced industry analysts. Our research reports are available in a wide range of industry verticals including aviation, food & beverage, healthcare, ICT, Construction, Chemicals and lot more. Brand Essence Market Research report will be best fit for senior executives, business development managers, marketing managers, consultants, CEOs, CIOs, COOs, and Directors, governments, agencies, organizations and Ph.D. Students. We have a delivery center in Pune, India and our sales office is in London.

Contact us at: +44-2038074155 or mail us at[emailprotected]

Original post:
Europe Network Encryption Market 2020 Top Manufactures, Growth Opportunities and Investment Feasibility 2025 - Research Newspaper

Duality Technologies and NumFOCUS Partner to Develop Platform for Privacy-Preserving Analysis of the Real Impact of Academic Scholarships – Stockhouse

NEWARK, N.J., Aug. 3, 2020 /PRNewswire/ -- Duality Technologies, a leading provider of Privacy-Enhancing Technologies (PETs) enabling collaboration between organizations on sensitive data, announced today a new partnership with NumFOCUS, a non-profit organization which sponsors the use of open-source software in research, data science and scientific computing. The partnership between Duality and NumFOCUS is aimed at creating a privacy-preserving collaboration platform enabling academic institutions and public agencies to evaluate the effects of grant-making, scholarships and other financial support on students' performance, future occupations and contributions to academic research.

In cooperation with the Institute for Research on Innovation and Science (IRIS) at the University of Michigan, Duality will develop a privacy-preserving data science framework based on the PALISADE open-source Homomorphic Encryption (HE) library in order to carry out secure analysis of sensitive student data while keeping Personally Identifiable Information (PII) private.

The new framework offers academic institutions and public agencies tools to conduct privacy-preserving research on the impact and the societal benefit of financial support for students. Previously, researchers had not been able to comprehensively analyze relevant data held by different public agencies due to data privacy regulations and agencies' reluctance to share such sensitive information. Socio-economic data indicative of scholarship recipients' lifestyles and occupations are inherently sensitive and until now, researchers had to undertake cumbersome anonymization processes with available data, limiting the studies' scope and reliability.

The development of the framework is also supported by the Albert P. Sloan Foundation, which issued a grant to NumFOCUS to promote the development of the open-source software for scientific research based on the PALISADE library.

"We are excited to launch this new collaboration with the remarkable people at NumFOCUS and the University of Michigan's IRIS research group, one of the leading institutions in its field," said Dr. Kurt Rohloff, Co-Founder and CTO of Duality Technologies. "Together, we are enabling academic teams to leverage sensitive data held by a variety of public agencies. Highly sensitive personal data must be protected, and now research teams can collaborate with public agencies on such rich data in order to glean important insights without compromising on data privacy."

The framework utilizes Homomorphic Encryption (HE), an advanced encryption method that protects data during computation, allowing multiple parties to run privacy-preserving analytics on encrypted data. Already deployed and proven in the financial industry, this will enable academic institutions and public agencies for the first time to comprehensively measure the impact of their grant-making and to maximize the impact of such support for students.

"Homomorphic Encryption is a secure and standardized method which is being used more and more frequently to conduct privacy-preserving data analytics in a wide variety of disciplines," said Leah Silen, Executive Director of NumFOCUS. "The framework under development by Duality represents a real breakthrough in research on social data, and we are proud to make the open-source PALISADE library widely available to the research community. Our heartfelt appreciation to the Sloan Foundation for its grant, which will allow more academic teams to engage in collaborative analytics on such sensitive data."

The PALISADE open-source HE library, which forms the basis for the new framework, was co-founded by Dr. Kurt Rohloff with Dr. Yuriy Polyakov and Dr. Dave Cousins, both Principal Scientists at Duality Technologies, with initial funding from DARPA and additional sponsorship by NumFOCUS.

"The privacy-preserving framework being developed by Duality will include interfaces and tools that integrate seamlessly with our current research environments," said Prof. Jason Owen-Smith, Executive Director of the Institute for Research on Innovation and Science (IRIS) at the University of Michigan. "It will enable our teams to utilize proven methods while facilitating access to sensitive data, which will translate into greater efficiency and deeper insights, all while preserving individual privacy. This project fits perfectly into our mission to understand, explain and improve the public value of research and higher education."

About Duality Technologies

Founded by world-renowned data scientists and cryptographers, Duality Technologies is at the forefront of Privacy Enhancing Technologies (PETs), setting a new standard for privacy-preserving data collaborations. Duality SecurePlus, a leading PET platform, uniquely combines advanced Homomorphic Encryption and data science, enabling organizations to derive insights without exposing their sensitive data. Duality's products are used by companies across regulated industries including financial services, healthcare, telecommunications and more. Duality was recently listed on Fast Company's 2020 Most Innovative Companies List in the Data Science category. Duality has also been recognized as a Gartner "Cool Vendor" for Privacy Preservation in Analytics. For more information, please visit dualitytech.com.

About NumFocus

NumFOCUS is a 501(c)3 public charity in the United States. The mission of NumFOCUS is to promote sustainable high-level programming languages, open code development, and reproducible scientific research. We accomplish this mission through our educational programs and events as well as through fiscal sponsorship of open source scientific computing projects.

NumFOCUS envisions an inclusive scientific and research community that utilizes actively supported open source software to make impactful discoveries for a better world.

Duality Technologies Media Contact: Brandon Weinstock Headline Media +1 (914) 336-4878 brandon@headline.media

View original content:http://www.prnewswire.com/news-releases/duality-technologies-and-numfocus-partner-to-develop-platform-for-privacy-preserving-analysis-of-the-real-impact-of-academic-scholarships-301104743.html

SOURCE Duality Technologies

Continue reading here:
Duality Technologies and NumFOCUS Partner to Develop Platform for Privacy-Preserving Analysis of the Real Impact of Academic Scholarships - Stockhouse

Duality Technologies and NumFOCUS Partner to Develop Platform for Privacy-Preserving Analysis of the Real Impact of Academic Scholarships – PRNewswire

NEWARK, N.J., Aug. 3, 2020 /PRNewswire/ --Duality Technologies, a leading provider of Privacy-Enhancing Technologies (PETs) enabling collaboration between organizations on sensitive data, announced today a new partnership with NumFOCUS, a non-profit organization which sponsors the use of open-source software in research, data science and scientific computing. The partnership between Duality and NumFOCUS is aimed at creating a privacy-preserving collaboration platform enabling academic institutions and public agencies to evaluate the effects of grant-making, scholarships and other financial support on students' performance, future occupations and contributions to academic research.

In cooperation with the Institute for Research on Innovation and Science (IRIS) at the University of Michigan, Duality will develop a privacy-preserving data science framework based on the PALISADE open-source Homomorphic Encryption (HE) library in order to carry out secure analysis of sensitive student data while keeping Personally Identifiable Information (PII) private.

The new framework offers academic institutions and public agencies tools to conduct privacy-preserving research on the impact and the societal benefit of financial support for students. Previously, researchers had not been able to comprehensively analyze relevant data held by different public agencies due to data privacy regulations and agencies' reluctance to share such sensitive information. Socio-economic data indicative of scholarship recipients' lifestyles and occupations are inherently sensitive and until now, researchers had to undertake cumbersome anonymization processes with available data, limiting the studies' scope and reliability.

The development of the framework is also supported by the Albert P. Sloan Foundation, which issued a grant to NumFOCUS to promote the development of the open-source software for scientific research based on the PALISADE library.

"We are excited to launch this new collaboration with the remarkable people at NumFOCUS and the University of Michigan's IRIS research group, one of the leading institutions in its field," said Dr. Kurt Rohloff, Co-Founder and CTO of Duality Technologies. "Together, we are enabling academic teams to leverage sensitive data held by a variety of public agencies. Highly sensitive personal data must be protected, and now research teams can collaborate with public agencies on such rich data in order to glean important insights without compromising on data privacy."

The framework utilizes Homomorphic Encryption (HE), an advanced encryption method that protects data during computation, allowing multiple parties to run privacy-preserving analytics on encrypted data. Already deployed and proven in the financial industry, this will enable academic institutions and public agencies for the first time to comprehensively measure the impact of their grant-making and to maximize the impact of such support for students.

"Homomorphic Encryption is a secure and standardized method which is being used more and more frequently to conduct privacy-preserving data analytics in a wide variety of disciplines," said Leah Silen, Executive Director of NumFOCUS. "The framework under development by Duality represents a real breakthrough in research on social data, and we are proud to make the open-source PALISADE library widely available to the research community. Our heartfelt appreciation to the Sloan Foundation for its grant, which will allow more academic teams to engage in collaborative analytics on such sensitive data."

The PALISADE open-source HE library, which forms the basis for the new framework, was co-founded by Dr. Kurt Rohloff with Dr. Yuriy Polyakov and Dr. Dave Cousins, both Principal Scientists at Duality Technologies, with initial funding from DARPA and additional sponsorship by NumFOCUS.

"The privacy-preserving framework being developed by Duality will include interfaces and tools that integrate seamlessly with our current research environments," said Prof. Jason Owen-Smith, Executive Director of the Institute for Research on Innovation and Science (IRIS) at the University of Michigan. "It will enable our teams to utilize proven methods while facilitating access to sensitive data, which will translate into greater efficiency and deeper insights, all while preserving individual privacy. This projectfits perfectly into our mission to understand, explain and improve the public value of research and higher education."

About Duality Technologies

Founded by world-renowned data scientists and cryptographers, Duality Technologies is at the forefront of Privacy Enhancing Technologies (PETs), setting a new standard for privacy-preserving data collaborations. Duality SecurePlus, a leading PET platform, uniquely combines advanced Homomorphic Encryption and data science, enabling organizations to derive insights without exposing their sensitivedata. Duality's products are used by companies across regulated industries including financial services, healthcare, telecommunications and more. Duality was recently listed on Fast Company's 2020 Most Innovative Companies List in the Data Science category. Duality has also been recognizedas a Gartner "Cool Vendor" for Privacy Preservation in Analytics.For more information, please visit dualitytech.com.

About NumFocus

NumFOCUS is a 501(c)3 public charity in the United States. The mission of NumFOCUS is to promote sustainable high-level programming languages, open code development, and reproducible scientific research. We accomplish this mission through our educational programs and events as well as through fiscal sponsorship of open source scientific computing projects.

NumFOCUS envisions an inclusive scientific and research community that utilizes actively supported open source software to make impactful discoveries for a better world.

Duality Technologies Media Contact: Brandon Weinstock Headline Media +1 (914) 336-4878 [emailprotected]

SOURCE Duality Technologies

Homepage

Read more here:
Duality Technologies and NumFOCUS Partner to Develop Platform for Privacy-Preserving Analysis of the Real Impact of Academic Scholarships - PRNewswire

Nominations open for 2021 Red Hat Innovation Awards – Business Wire

RALEIGH, N.C.--(BUSINESS WIRE)--Red Hat, Inc., the world's leading provider of open source solutions, today announced that it is accepting nominations for the 2021 Red Hat Innovation Awards.

Since 2007, the Red Hat Innovation Awards have recognized organizations from around the world and across industries for the transformative projects and outstanding results they have experienced with Red Hat's open source solutions. Open source has helped transform technology from the datacenter to the cloud and the Red Hat Innovation Awards showcase its transformative impact in organizations around the world.

Nominations should showcase successful IT implementation and projects that made a difference in organizations using open source. Entries for the Innovation Awards will be judged in five areas:

Submissions will be accepted until Sept. 13, 2020, and will be evaluated by a panel of business and open source technology experts including Ashesh Badani, senior vice president, Cloud Platforms, Red Hat; Caroline Chappell, research director and industry analyst, Analysys Mason; Stefanie Chiras, vice president and general manager, Red Hat Enterprise Linux business unit, Red Hat; Leigh Day, vice president, Marketing Communications, Red Hat; Alberto Iglesias Fraga, deputy director, INNOVADORES Supplement, La Razon; Sean Michael Kerner, freelance technology journalist; and Chris Wright, vice president and chief technology officer, Red Hat.

A total of five winners will be chosen. From those five winners, the 2021 Red Hat Innovator of the Year will be selected by the community through online voting, and will be announced during Red Hat Summit 2021 taking place in April of 2021. In addition, up to five honorable mention submissions may be recognized by the judges.

Additional Resources

Connect with Red Hat

About Red Hat, Inc.

Red Hat is the worlds leading provider of enterprise open source software solutions, using a community-powered approach to deliver reliable and high-performing Linux, hybrid cloud, container, and Kubernetes technologies. Red Hat helps customers integrate new and existing IT applications, develop cloud-native applications, standardize on our industry-leading operating system, and automate, secure, and manage complex environments. Award-winning support, training, and consulting services make Red Hat a trusted adviser to the Fortune 500. As a strategic partner to cloud providers, system integrators, application vendors, customers, and open source communities, Red Hat can help organizations prepare for the digital future.

Forward-Looking Statements

Certain statements contained in this press release may constitute "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995. Forward-looking statements provide current expectations of future events based on certain assumptions and include any statement that does not directly relate to any historical or current fact. Actual results may differ materially from those indicated by such forward-looking statements. The forward-looking statements included in this press release represent the Company's views as of the date of this press release and these views could change. However, while the Company or its parent International Business Machines Corporation (NYSE:IBM) may elect to update these forward-looking statements at some point in the future, the Company specifically disclaims any obligation to do so. These forward-looking statements should not be relied upon as representing the Company's views as of any date subsequent to the date of this press release.

Red Hat and the Red Hat logo are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the U.S. and other countries. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries.

Read more here:
Nominations open for 2021 Red Hat Innovation Awards - Business Wire

IBM deal to provide the NHS with quicker to access cloud services – Healthcare IT News

Tech giant IBM has signed a three-year public cloud agreement with Crown Commercial Services and the UK Cabinet Office, allowing preferential commercial terms for public sector organisations, including the NHS.

Under the Memorandum of Understanding, the public sector will be enabled to embark on a secure public cloud journey and innovate with digital solutions and services to help evolve essential services for UK citizens, according to an IBM press release.

Eligible organisations will have access to a suite of solutions including IBM Multicloud Manager, IBM Cloud Paks, Red Hat OpenShift, Cloud Garages, Power Virtual Servers on Cloud, VMware and Cloud Migration Services.

HIMSS20 Digital

WHY IT MATTERS

IBMs public cloud is built on a foundation of open source software with more than 190 cloud-native APIs, such as AI, blockchain, Internet of Things, serverless and DevOps.

The deal aims to break down barriers to public cloud adoption by enabling public sector organisations to access services without vendor lock in and capitalise on the speed and agility of the public cloud.

THE LARGER CONTEXT

The move follows a UK government deal with Google Cloud in June, which enabled public bodies, including the NHS, to benefit from discounts on products.Google Cloud said the deal would make it easier and more affordable for public sector agencies to leverage its services in order to increase innovation and deliver digital transformation.

Meanwhile, UK leading cancer centre, The Royal Marsden, recently launched its first AI virtual agent using IBM Watson, delivered via the IBM public cloud.It aims to enable hospitals to manage its workforce efficiently while alleviating additional stress key workers may be experiencing during the COVID-19 crisis.

ON THE RECORD

Simon Tse, chief executive of Crown Commercial Service (CCS), said: This agreement with IBM provides great value for public sector organisations as they continue to innovate and improve essential services for citizens throughout the UK.

Janine Cook, vice president for public sector at IBM UK and Ireland, said: As the public sector continues its rapid digital transformation, government organisations crossing many industries need a reliable, resilient and secure technology environment to meet the needs of citizens and address complex security and regulatory requirements.

An open hybrid cloud platform, built and managed with IBMs deep industry expertise, can allow the public sector to accelerate its innovation and offer a more agile way to develop new digital services and take the next step along their cloud journeys.

Read this article:
IBM deal to provide the NHS with quicker to access cloud services - Healthcare IT News

First amendment | Definition of First amendment at …

The First Amendment is the first amendment to the Bill of Rights, which includes the original 10 amendments drafted immediately after the Constitution of the United States was ratified in 1788. Here, amendments are changes or additions to the Constitution that arent part of the original document.

In 1787, members of the Constitutional Convention gathered in Philadelphia to revise the founding document of the country, the Articles of Confederation. They decided to create a new one instead, and by September, theyd drafted the Constitution. Getting the new document approved, however, was another story. Many opposed this new Constitution because it didnt specify the rights of the people. The Constitution was only passed after Congress promised to add a list of rights afterwards.

Its this proposed list of rightsthe Bill of Rights, ratified in 1791that yielded the First Amendment. Compared to some other amendments, its quite short. The full text reads:

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.

The freedoms this amendment protectsreligion, speech and the press, assembly, and petitionare called the First Amendment freedoms or rights, both officially and colloquially invoked in the US.

Due to its brevity and ambiguity, issues regarding the interpretation of the First Amendment have been perennial points of debate throughout American history. The specific application of these rights, like other rights, has been a matter often judged by the Supreme Court. For instance, cases have determined that the First Amendments free speech clause doesnt protect fighting words, which is defined as speech intended to cause injury or breach of the peace, and that school libraries cant remove books because school officials disagree with their content.

Visit link:

First amendment | Definition of First amendment at ...