Dont Ban TikTok. Make an Example of It. – The New York Times

For a while, it seemed that TikTok might dodge the techlash. After all, what could be problematic about a short-form video app featuring a bunch of teenagers and 20-somethings doing choreographed dances, roller skating, hanging out in influencer mansions and cutting into photorealistic cakes?

The answer turns out to be: Plenty.

In the past year, as it has become one of the most popular apps in the world, TikTok has accumulated many of the same problems that other large-scale social networks have. In addition to all the harmless Gen Z fun, there are TikTok conspiracy theories, TikTok misinformation and TikTok extremism. There are even activists using TikTok to influence our elections, including a network of teenagers and K-pop fans who claimed they used the app to sabotage President Trumps rally in Tulsa, Okla., last month by registering for tickets under false identities.

All of this might have been overlooked or forgiven, except for one fact. TikTok is owned by ByteDance, one of the largest tech companies in China.

TikToks Chinese ownership has become a subject of intense scrutiny by lawmakers, regulators and privacy activists in recent weeks. Mr. Trump is considering taking steps to ban the app in the United States. Companies including Wells Fargo, and government agencies including the Transportation Security Administration, have instructed their employees to delete TikTok from their work phones because of concerns that it could be used for surveillance or espionage.

In response to the mounting pressures, TikTok is wrapping itself in the American flag. The company has hired a small army of lobbyists in Washington, has brought in an American chief executive (the former Disney executive Kevin Mayer) and is reportedly exploring selling a majority stake in the company to American investors.

Jamie Favazza, a TikTok spokeswoman, said in a statement that in addition to the chief executive, the social network had an American as its chief information security officer and another as its head of safety.

Weve tripled the number of employees in the U.S. since the start of 2020, she said, with plans to hire 10,000 more people over the next three years in places like Texas, New York and Florida.

There are legitimate concerns about a Chinese-owned company capturing the attention and data of millions of Americans especially one like ByteDance, which has a history of bending the knee to the countrys ruling regime. Like all Chinese tech companies, ByteDance is required to abide by Chinese censorship laws, and it could be forced to give user data to the Chinese government under the countrys national security law. Lawmakers have also raised concerns that TikTok could be used to promote pro-China propaganda to young Americans, or censor politically sensitive content.

Ms. Favazza said TikTok stored American user data in Virginia and Singapore. She added that the companys content moderation efforts were led by U.S.-based teams and not influenced by any foreign government, and that TikTok had not and would not give data to the Chinese government.

There are also reasons to be skeptical of the motives of TikToks biggest critics. Many conservative politicians, including Mr. Trump, appear to care more about appearing tough on China than preventing potential harm to TikTok users. And Silicon Valley tech companies like Facebook, whose executives have warned of the dangers of a Chinese tech takeover, would surely like to see regulators kneecap one of their major competitors.

Ill be honest: I dont buy the argument that TikTok is an urgent threat to Americas national security. Or, to put it more precisely, I am not convinced that TikTok is inherently more threatening to Americans than any other Chinese-owned app that collects data from Americans. If TikTok is a threat, so are WeChat, Alibaba and League of Legends, the popular video game, whose maker, Riot Games, is owned by Chinas Tencent.

And since banning every Chinese-owned tech company from operating in America wouldnt be possible without erecting our own version of Chinas Great Wall a drastic step that would raise concerns about censorship and authoritarian control we need to figure out a way for Chinese apps and American democracy to coexist.

Heres an idea: Instead of banning TikTok, or forcing ByteDance to sell it to Americans, why not make an example of it by turning it into the most transparent, privacy-protecting, ethically governed tech platform in existence?

As a foreign-owned app, TikTok is, in some ways, easier to regulate than an American tech platform would be. (One way of regulating it, a national security review by the Committee on Foreign Investment in the United States of ByteDances 2017 acquisition of Musical.ly, TikToks predecessor app, is already reportedly underway.) And there is plenty more the U.S. government could do to ensure that TikTok plays a responsible role in our information ecosystem without getting rid of it altogether. It could require the company to open-source key parts of its software, including the machine-learning algorithms that determine which posts users are shown. It could pressure TikTok to submit to regular audits of its data-collection practices, and open up its internal content moderation guidelines for public comment. As Kevin Xu, the author of Interconnected, a blog about United States-China relations, points out, ByteDance could impose strict internal controls to prevent its Chinese employees from accessing any of TikToks systems, and open-source those controls so that outsiders could verify the separation.

Samm Sacks, a cyberpolicy fellow at the centrist think tank New America, told me that some of the solutions being proposed for TikTok such as selling itself to American investors wouldnt address the core problems. An American-owned TikTok could still legally sell data to third-party data brokers, for example, which could then feed it back to the Chinese authorities.

Instead, Ms. Sacks said, the American government should enact a strong federal privacy law that could protect TikTok users data without banning the app altogether.

Lets solve for the problems at hand, she said. If the concern is data security, the best way to secure the data is to put TikTok under the microscope, and put in place really robust and enforceable rules about how theyre using and retaining data.

Forcing TikTok to operate in a radically transparent way would go a long way toward assuaging Americans fears. And it could become a test case for a new model of tech regulation that could improve the accountability and responsibility of not just Chinese-owned tech companies but American ones, too.

At its core, a lot of the TikTok fear factor comes down to a lack of information. In March, TikTok announced that it would open transparency centers where independent auditors could examine its content moderation practices. The company has also begun releasing transparency reports, similar to those issued by Facebook and Twitter, outlining the various takedown requests it gets from governments around the world.

But we still dont know how TikToks algorithms are programmed, or why theyre showing which videos to which users. We dont know how its using the data its collecting, or how it makes and enforces its rules. We should know these things not just about TikTok, but about American social media apps, too.

After all, Facebook, Instagram, YouTube, Twitter and Snapchat are playing a huge role in the lives of millions of Americans, and for years, they have operated with a degree of secrecy that few other companies of their importance have been allowed. What little we understand about these platforms inner workings is often learned years after the fact, gleaned from insider leaks or repentant former employees.

Some experts see TikToks current predicament as a chance to change that.

I think TikTok is a bit of a red herring, Alex Stamos, Facebooks former chief security officer and a professor at Stanford University, told me in an interview. Ultimately, Mr. Stamos said, the question of what to do about TikTok is secondary to the question of how multinational tech giants in general should be treated.

This is a chance to come up with a thoughtful model of how to regulate companies that operate in both the U.S. and China, no matter their ownership, he said.

The debate over TikToks fate, in other words, should really be a debate about how all of the big tech companies that entertain, inform and influence billions of people should operate, and what should be required of them, whether theyre based in China or Copenhagen or California.

If we can figure out how to handle TikTok an app with a genuinely creative culture, and millions of American young people who love it well have done a lot more than preserving a world-class time-waster. Well have figured out a model for getting big tech platforms under control, after years of letting them run amok.

See original here:

Dont Ban TikTok. Make an Example of It. - The New York Times

Are you data assets ready to power transformational technology like AI and automation? – Which-50

Businesses that have put their data house in order, or made significant progress to that end find themselves in the enviable position of being able to apply their data assets to transformational technologies like AI and machine learning, and automation. The laggards risk getting left behind.

Even as analytics emerged over the last few years as a core capability for businesses with a data-driven decision making culture, companies often found themselves struggling to get the information they need out of disparate data silos.

Those that have done so, or made significant progress to that end now find themselves in the envious position of being able to apply their data assets to transformational technologies like AI and machine learning, and automation. The laggards risk getting left behind

Whether that is for mass personalisation, asset intelligence, or internet of things implementations, all of these functions require data and integrations that need to form part of the AI and automation roadmap.

According to Darren Cockerells, Head of Solutions Consulting ANZ, Blue Prism, When it comes to being able to harness AI technologies, the ability to manage data is everything. Digital disruption relies on the ability to ingest from, and disseminate to, legacy operations.

Cockerell says there are already many impressive cognitive technologies available today, including those for marketers designed to gather insights to better understand and redefine the customer journeys But every single one of these solutions follows the same paradigm; you have to get data in and then find a way to act upon what the solution delivers.

Getting access to the cognitive service is the easy part since so many exist as cloud-based SaaS applications, says Cockerell. However, he cautions that corralling the data to feed to that service is the difficult part.

The biggest barrier tends to be the volume of disparate legacy systems, spreadsheets and PDF documents across siloed departments. The data required is often voluminous and dispersed, he says.

Impediments

The impediments organisations face getting their data story straight are myriad, says Simon Belousoff, executive director of Beta Evolution, an independent digital, data analytics, and customer experience consultancy, and who was previously Head of Personalisation/ Customer Decisioning (Customer Transformation) at Bupa.

He says organisations often adopt a mindset and approach for data, CX and AI that is based on their legacy approaches to reporting. What they really need is a different and evolved perspective and approach. This mistake often results in the data not being available in a timely way where it needs to be used.

Unlike in previous processes, humans are often not directly involved

Furthermore, he says, Data available for AI is consumed machine-to-machine at scale and needs to be consumable like this.

He also cautions that operational silos are as corrosive as technical ones,

Data is not seen as an enterprise asset, that is usable for the collective benefit of customers and the business. Instead it is seen as a discrete channel or function, or a business asset that is not for sharing with others in the organisation. You need to democratise the data.

According to Belousoff, Internal organisation data benefits from being progressively augmented with many forms of external data to deliver use case and experience outcomes and that this needs to be done in an integrated, timely and governed manner.

Belousoff nominates the CBAs Customer Engagement Engine which is powered by Pega and which saw 200 machine learning models created by Pegas AI based on the CBAs data scientist developed predictive models.

This article was produced for ADMA by the Which-50 Digital Intelligence unity. For the complete version of this story please visit ADMA.

Continue reading here:
Are you data assets ready to power transformational technology like AI and automation? - Which-50

AWS Contact Lens for Connect set to arrive in A/NZ – IT Brief Australia

Amazon Web Services (AWS), has announced the general availability of Contact Lens, a set of machine learning-driven capabilities for Amazon Connect that provides customer interaction analytics for contact centres.

Amazon Connect is a fully managed cloud contact centre service.

With Contact Lens, contact centre supervisors can discover themes and trends from customer conversations, conduct a full-text search on call transcripts to troubleshoot customer issues, and improve contact centre agents performance with call analytics from within the Amazon Connect console.

Coming late-2020, Contact Lens also provides the ability for supervisors to be alerted to issues during in-progress calls, giving them the ability to intervene earlier when a customer is having a poor experience.

Contact Lens requires no technical expertise and can be activated through Amazon Connect.

It uses machine learning to transcribe calls and automatically indexes call transcripts so they can be searched from the Amazon Connect console.

Machine learning is also used to make it easier for supervisors to search voice interactions based on call content (e.g. customers asking to cancel a subscription or return an item), customer sentiment (e.g. calls that ended with a negative customer sentiment score), and conversation characteristics (e.g. talk speed, long pauses, or customers and agents talking over one another).

By clicking on search results, supervisors can view a contact detail page to see the call transcript, customer and agent sentiment, a visual illustration of conversation characteristics, and use this information to share feedback with their agents to improve customer interactions.

Contact Lens also uses natural language processing to help supervisors uncover new issues (e.g. a price discrepancy between a website and an email promotion) on the contact detail page by visually identifying words and phrases in call transcripts that indicate reasons for customer outreach.

Supervisors can automatically monitor all of their agents interactions for customer experience, regulatory compliance, and adherence to script guidelines by defining custom categories on a new page in Amazon Connect that allows them to organise customer contacts based on words or phrases said by the customer or agent (e.g. a customer mentioning a competitor, membership in a customer loyalty program, certain regulatory disclosures, etc.).

The machine learning capabilities can automatically detect and redact sensitive personally identifiable information (PII) like names, addresses, and social security numbers from call recordings and transcripts to help customers more easily protect customer data.

Later this year, Contact Lens will introduce new features that provide supervisors with real-time assistance by offering a dashboard that shows the sentiment progression of live calls in a contact centre.

This dashboard continuously updates as interactions progress and allows supervisors to look across live calls to spot opportunities to help their customers. Real-time alerting gives supervisors the ability to engage and de-escalate situations earlier.

Contact Lens capabilities are built into Amazon Connect to provide metadata (such as transcriptions, sentiment, and categorisation tags) in customers' Amazon Simple Storage Service (Amazon S3) buckets in a well-defined schema.

Businesses can export this information and use additional tools like Amazon QuickSight or Tableau to do further analysis and combine it with data from other sources.

The rest is here:
AWS Contact Lens for Connect set to arrive in A/NZ - IT Brief Australia

Artificial Intelligence Is the Hope 2020 Needs – Bloomberg

Tyler Cowen is a Bloomberg Opinion columnist. He is a professor of economics at George Mason University and writes for the blog Marginal Revolution. His books include The Complacent Class: The Self-Defeating Quest for the American Dream.

Your AI bartender will serve you now.

Photographer: Leon Neal/Getty Images Europe

Photographer: Leon Neal/Getty Images Europe

This year is likely to be remembered for the Covid-19 pandemic and for a significant presidential election, but there is a new contender for the most spectacularly newsworthy happening of 2020: the unveiling of GPT-3. As a very rough description, think of GPT-3 as giving computers a facility with words that they have had with numbers for a long time, and with images since about 2012.

The core of GPT-3, which is a creation of OpenAI, an artificial intelligence company based in San Francisco, is a general language model designed to perform autofill. It is trained on uncategorized internet writings, and basically guesses what text ought to come next from any starting point. That may sound unglamorous, but a language model built for guessing with 175 billion parameters 10 times more than previous competitors is surprisingly powerful.

The eventual uses of GPT-3 are hard to predict, but it is easy to see the potential. GPT-3 can converse at a conceptual level, translate language, answer email, perform (some) programming tasks, help with medical diagnoses and, perhaps someday, serve as a therapist. It can write poetry, dialogue and stories with a surprising degree of sophistication, and it is generally good at common sense a typical failing for many automated response systems. You can even ask it questions about God.

Imagine a Siri-like voice-activated assistant that actually did your intended bidding. It also has the potential to outperform Google for many search queries, which could give rise to a highly profitable company.

More from

GPT-3 does not try to pass the Turing test by being indistinguishable from a human in its responses. Rather, it is built for generality and depth, even though that means it will serve up bad answers to many queries, at least in its current state. As a general philosophical principle, it accepts that being weird sometimes is a necessary part of being smart. In any case, like so many other technologies, GPT-3 has the potential to rapidly improve.

It is not difficult to imagine a wide variety of GPT-3 spinoffs, or companies built around auxiliary services, or industry task forces to improve the less accurate aspects of GPT-3. Unlike some innovations, it could conceivably generate an entire ecosystem.

There is a notable buzz about GPT-3 in the tech community. One user in the U.K. tweeted: I just got access to gpt-3 and I can't stop smiling, i am so excited. Venture capitalist Paul Graham noted coyly: Hackers are fascinated by GPT-3. To everyone else it seems a toy. Pattern seem familiar to anyone? Venture capitalist and AI expert Daniel Gross referred to GPT-3 as a landmark moment in the field of AI.

I am not a tech person, so there is plenty about GPT-3 I do not understand. Still, reading even a bit about it fills me with thoughts of the many possible uses.

It is noteworthy that GPT-3 came from OpenAI rather than from one of the more dominant tech companies, such as Alphabet/Google, Facebook or Amazon. It is sometimes suggested that the very largest companies have too much market power but in this case, a relatively young and less capitalized upstart is leading the way. (OpenAI was founded only in late 2015 and is run by Sam Altman).

GPT-3 is also a sign of the underlying health and dynamism of the Bay Area tech world, and thus of the U.S. economy. The innovation came to the U.S. before China and reflects the power of decentralized institutions.

Like all innovations, GPT-3 involves some dangers. For instance, if prompted by descriptive ethnic or racial words, it can come up with unappetizing responses. One can also imagine that a more advanced version of GPT-3 would be a powerful surveillance engine for written text and transcribed conversations. Furthermore, it is not an obvious plus if you can train your software to impersonate you over email. Imagine a world where you never know who you are really talking to Is this a verified email conversation? Still, the hope is that protective mechanisms can at least limit some of these problems.

We have not quite entered the era where Skynet goes live, to cite the famous movie phrase about an AI taking over (and destroying) the world. But artificial intelligence does seem to have taken a major leap forward. In an otherwise grim year, this is a welcome and hopeful development. Oh, and if you would like to read more, here is an article about GPT-3 written by GPT-3.

This column does not necessarily reflect the opinion of the editorial board or Bloomberg LP and its owners.

To contact the author of this story:Tyler Cowen at tcowen2@bloomberg.net

To contact the editor responsible for this story:Michael Newman at mnewman43@bloomberg.net

Before it's here, it's on the Bloomberg Terminal.

Tyler Cowen is a Bloomberg Opinion columnist. He is a professor of economics at George Mason University and writes for the blog Marginal Revolution. His books include The Complacent Class: The Self-Defeating Quest for the American Dream.

Continued here:
Artificial Intelligence Is the Hope 2020 Needs - Bloomberg

Encryption Software Market history, overview and future developments by 2025 analysis and forecast – WhaTech Technology and Markets News

The report titled Encryption Software Market sheds a concentrated focus on the Encryption Software industry in terms of market driver, opportunities, restraints of global segmentation. Further data on the reports also includes demographic conditions, over-turning changing business cycles and analyzing country-to-market.

Need a Free Sample Report? Visit: http://www.reportsnreports.com/contactame=330841

The Global Encryption Software Market size to grow from USD 9.8 Billion in 2020 to USD 20.1 Billion by 2025, at a CAGR of 15.5% during 20202025.

Top Companies Profiled in the Encryption Software Market:

The encryption software market is segmented on the basis of component (software and services).The services segment is expected to grow at a faster pace during the forecast period. There is a strong requirement for encryptio3en software related services to tackle specific needs.

The encryption services enhance the security portfolio of enterprises and safeguard their system from unauthorized access, exploitation, and data loss.

The encryption software market by applicationhas subsegmentsof disk encryption, file/folder encryption, database encryption, communication encryption, and cloud encryption.The cloud encryption segment to grow at the highest CAGR during the forecast period, owing to the increasing number of organizations moving toward the cloud for achieving cost savings, agility, and flexibility, although this is also making their critical data more vulnerable to cyberattacks.

Access full report with all information @ http://www.reportsnreports.com/purchasame=330841

1 Introduction To Covid-19 Scenario

1.1 Covid-19 Health Assessment

1.2 Covid-19 Economic Assessment

1.2.1 Covid-19 Economic ImpactScenario Assessment

2 Introduction To The Encryption Software Market

2.1 Objectives Of The Study

2.2 Market Definition

2.3 Market Scope

2.3.1 Market Segmentation

2.3.2 Regions Covered

2.4 Years Considered For The Study

2.5 Currency Considered

2.6 Stakeholders

3 Research Methodology

3.1 Research Data

3.1.1 Secondary Data

3.1.2 Primary Data

3.1.2.1 Breakup Of Primaries

3.1.2.2 Key Industry Insights

3.2 Market Breakup And Data Triangulation

3.3 Market Size Estimation

3.3.1 Top-Down Approach

3.3.2 Bottom-Up Approach

3.4 Market Forecast

3.5 Assumptions For The Study

3.6 Limitations Of The Study

4 Executive Summary

5 Premium Insights

5.1 Attractive Market Opportunities In The Market

5.2 Market: Market Share Of Top Three Verticals And Regions, 2020

5.3 Market Investment Scenario

6 Market Overview And Industry Trends

6.1 Introduction

6.2 Market Dynamics

6.2.1 Drivers

6.2.1.1 Stringent Regulatory Standards And Data Privacy Compliances

6.2.1.2 Rising Concerns Pertaining To Loss Of Critical Data

6.2.1.3 Exponential Increase In The Adoption Of Cloud And Virtualization Technologies

6.2.2 Restraints

6.2.2.1 Budgetary Constraints

6.2.2.2 Availability Of Free, Open Source, And Pirated Encryption Software

6.2.3 Opportunities

6.2.3.1 Rise In Demand For Integrated Data Protection Solutions And Eaas Among Smes

6.2.3.2 Increased Adoption Of Encryption Software Across Verticals

6.2.4 Challenges

6.2.4.1 Difficulties In Effective Management And Usage Of The Encryption Key

6.2.4.2 Lack Of Skilled Workforce Among Enterprises

6.3 Covid-19 Pandemic-Driven Market Dynamics And Factor Analysis

6.3.1 Drivers And Opportunities

6.3.2 Restraints And Challenges

6.4 Regulatory Compliances

6.4.1 General Data Protection Regulation

6.4.2 Health Insurance Portability And Accountability Act

6.4.3 Federal Information Security Management Act

6.4.4 SarbanesOxley Act

6.4.5 GrammLeachBliley Act

6.4.6 Payment Card Industry Data Security Standard

6.4.7 Federal Information Processing Standards

6.5 Use Cases

6.5.1 Use Case: Scenario 1

6.5.2 Use Case: Scenario 2

6.5.3 Use Case: Scenario 3

6.5.4 Use Case: Scenario 4

..And More

Ask Question @ http://www.reportsnreports.com/contactame=330841

This email address is being protected from spambots. You need JavaScript enabled to view it.

Read the rest here:
Encryption Software Market history, overview and future developments by 2025 analysis and forecast - WhaTech Technology and Markets News

Cryptocurrency Mining Hardware Market by Technology Innovations and Growth 2020 to 2027 – Bulletin Line

New Jersey, United States,- The research report on Cryptocurrency Mining Hardware market comprises of insights in terms of pivotal parameters such as production as well as the consumption patterns alongside revenue estimations for the projected timeframe. Speaking of production aspects, the study offers an in-depth analysis regarding the manufacturing processes along with the gross revenue amassed by the leading producers operating in this business arena. The unit cost deployed by these producers in various regions during the estimated timeframe is also mentioned in the report.

Significant information pertaining to the product volume and consumption value is enlisted in the document. Additionally, the report contains details regarding the consumption graphs, Individual sale prices, and import & export activities. Additional information concerning the production and consumption patterns are presented in the report.

In a word, the Cryptocurrency Mining Hardware Market report provides major statistics on the state of the Cryptocurrency Mining Hardware industry with a valuable source of guidance and direction for companies and individuals interested in the market. In the end, Cryptocurrency Mining Hardware Market report delivers a conclusion which includes Research Findings, Market Size Evaluation, Global Market Share, Consumer Needs along with Customer Preference Change, Data Source. These factors will raise the growth of the business overall.

Regions Covered in the Global Cryptocurrency Mining Hardware Market:

The Middle East and Africa (GCC Countries and Egypt)

North America (the United States, Mexico, and Canada)

South America (Brazil etc.)

Europe (Turkey, Germany, Russia UK, Italy, France, etc.)

Asia-Pacific (Vietnam, China, Malaysia, Japan, Philippines, Korea, Thailand, India, Indonesia, and Australia)

Highlights of the Report:

Accurate market size and CAGR forecasts for the period 2020-2026

Identification and in-depth assessment of growth opportunities in key segments and regions

Detailed company profiling of top players of the global Cryptocurrency Mining Hardware market

Exhaustive research on innovation and other trends of the global Cryptocurrency Mining Hardware market

Reliable industry value chain and supply chain analysis

Comprehensive analysis of important growth drivers, restraints, challenges, and growth prospects

The scope of the Report:

The report offers a complete company profiling of leading players competing in the global Cryptocurrency Mining Hardware marketwith a high focus on the share, gross margin, net profit, sales, product portfolio, new applications, recent developments, and several other factors. It also throws light on the vendor landscape to help players become aware of future competitive changes in the global Cryptocurrency Mining Hardware market.

Reasons to Buy the Report:

About Us:

Market Research Intellect provides syndicated and customized research reports to clients from various industries and organizations with the aim of delivering functional expertise. We provide reports for all industries including Energy, Technology, Manufacturing and Construction, Chemicals and Materials, Food and Beverage, and more. These reports deliver an in-depth study of the market with industry analysis, the market value for regions and countries, and trends that are pertinent to the industry.

Contact Us:

Mr. Steven Fernandes

Market Research Intellect

New Jersey ( USA )

Tel: +1-650-781-4080

Read more from the original source:
Cryptocurrency Mining Hardware Market by Technology Innovations and Growth 2020 to 2027 - Bulletin Line

DigiCert IoT Device Manager: New features and capabilities to drive 5G transformation – Help Net Security

DigiCert has announced a robust set of features and capabilities in DigiCert IoT Device Manager that enable telecommunications providers to deploy 5G network services to cloud environments while maintaining security, compliance and performance.

Hosted on the DigiCert ONE platform, IoT Device Manager provides support for strong authentication in dynamic, cloud-native environments, as well as scalability and operational integrity.

Todays telecommunication organizations face a variety of similar transformation challenges as they migrate to 5G using cloud data centers. Many are moving from primarily physical environments with primitive authentication techniques, minimal use of cryptography and pre-shared keys.

These traditional infrastructures are capital-intensive to scale, inefficient and inflexible, slowing delivery of new services and time to market. Increasingly, they are moving toward more dynamic business models built around a DevOps mindset.

These 5G and cloud environments are virtualized, dynamically scalable and enable unparalleled business agility and smooth scalability.

To support their transformation and enable more rapid time-to-market for products, telecommunication providers require a platform designed for todays highly dynamic, cloud-native, modern business models.

The platform must provide strong authentication across on-premises and cloud environments, and the ability to perform at scale on the worlds largest networks. It needs to ensure operational integrity to help organizations meet compliance requirements and legal mandates.

IoT Device Manager on DigiCert ONE is built from the ground up to support transformative new models. It delivers:

As telecommunications, manufacturers and other organizations move to increasingly dynamic models, the IoT Device Manager provides the flexibility and rapid scalability they need to support 5G and cloud migration, said DigiCert Senior Vice President of Product Brian Trzupek.

DigiCert ONE delivers the features, compatibility and performance our customers need to accelerate their digital transformation and take advantage of compelling new business models.

IoT Device Manager uses a container-based, cloud-agnostic implementation and allows organizations to provision and embed device identity at any stage of the device lifecycle, from the factory to device deployment in a variety of environments.

It lets customers simplify device identity, authentication, encryption and integrity with a single click, and marry device data visualization with cryptographic, manufacturing and factory process data. IoT Device Manager supports standards-based interoperability with many third-party manufacturing and provisioning systems.

IoT Device Manager is built on DigiCert ONE, a PKI management platform architected and released in 2020 to be the PKI infrastructure service for todays modern cloud-native challenges.

DigiCert ONE offers multiple management solutions and is designed for all forms of PKI. It is flexible enough to be deployed on-premises, in-country or in the cloud to meet stringent requirements, custom integrations and airgap needs.

It also deploys extremely high volumes of certificates quickly using robust and highly scalable infrastructure. DigiCert ONE delivers end-to-end centralized user and device certificate management, a modern approach to PKI.

More here:
DigiCert IoT Device Manager: New features and capabilities to drive 5G transformation - Help Net Security

Global Artificial Intelligence for Automotive Market 2020 Size, Share, Trends, Growth and Outlook with Company Analysis and Forecast to 2026 – Express…

The latest report on Artificial Intelligence for Automotive market is fabricated to provide details pertaining to companies operating in the industry space with competitive edge by scrutinizing the historic market dynamics while elaborating on major developments over this period. The study further enables the leaders to frame vital business expansion strategies by highlighting growth opportunities and ongoing trends in the market.

Information pertaining to growth parameters and prospects which influence the market growth graph over the forecast duration is entailed in the report. It also contains thorough investigation of challenges and restraints prevailing in the market sphere and how to overcome them.

The study extensively compares the past and present trends to evaluate the growth rate of the market over the analysis timeframe. It also elucidates the impact of COVID-19 pandemic on global as well as regional markets and outlines the tactics to help the industry players minimize the damage.

Request Sample Copy of this Report @ https://www.express-journal.com/request-sample/154652

Important Pointers from Table of Contents:

Product Scope:

Application Terrain:

Regional Spectrum:

Competitive Hierarchy:

Conclusively, the report examines Artificial Intelligence for Automotive market segmentations while focusing on other important aspects such as supply chain and sales channel which specifies data about upstream suppliers, raw materials, vendors, and downstream buyers existing in the industry.

Key Highlights from Artificial Intelligence for Automotive Market Study:

Income and Sales Estimation

Historical Revenue and deals volume is displayed and supports information is triangulated with best down and base up ways to deal with figure finish market measure and to estimate conjecture numbers for key areas shrouded in the Artificial Intelligence for Automotive report alongside arranged and very much perceived Types and end-utilize industry. Moreover, macroeconomic factors and administrative procedures are discovered explanations in Artificial Intelligence for Automotive industry advancement and perceptive examination.

Assembling Analysis

The Artificial Intelligence for Automotive report is presently broken down concerning different types and applications. The Artificial Intelligence for Automotive market gives a section featuring the assembling procedure examination approved utilizing essential data gathered through Industry specialists and Key authorities of profiled organizations.

Demand and Supply and Effectiveness

Artificial Intelligence for Automotive report moreover gives support, Production, Consumption, and (Export and Import).

Major Points Covered in Table of Contents:

In a word, the Artificial Intelligence for Automotive Market report provides major statistics on the state of the Artificial Intelligence for Automotive industry with a valuable source of guidance and direction for companies and individuals interested in the market. In the end, Artificial Intelligence for Automotive Market report delivers a conclusion which includes Research Findings, Market Size Evaluation, Global Market Share, Consumer Needs along with Customer Preference Change, Data Source. These factors will raise the growth of the business overall.

Request Customization on This Report @ https://www.express-journal.com/request-for-customization/154652

See more here:
Global Artificial Intelligence for Automotive Market 2020 Size, Share, Trends, Growth and Outlook with Company Analysis and Forecast to 2026 - Express...

Garrett Foster Brought His Gun to Austin Protests. Then He Was Shot Dead. – The New York Times

AUSTIN, Texas It was not unusual for Garrett Foster to be at a protest against police brutality on a Saturday night. And it was not out of character for him to be armed as he marched.

Mr. Foster was carrying an AK-47 rifle as he joined a Black Lives Matter demonstration blocks from the State Capitol in Austin, Texas. Gun-rights supporters on both the left and the right often carry rifles at protests in Texas, a state whose liberal gun laws allow it.

Mr. Foster, wearing a black bandanna and a baseball cap, bumped into an independent journalist at the march on Saturday, and he spoke matter-of-factly about the weapon that was draped on a strap in front of him.

They dont let us march in the streets anymore, so I got to practice some of our rights, Mr. Foster told the journalist, Hiram Gilberto Garcia, who was broadcasting the interview live on Periscope. If I use it against the cops, Im dead, he conceded.

Later that night, Mr. Foster was fatally shot, but not by the police. The authorities said he was killed by a motorist who had a confrontation with protesters.

The police and witnesses said the man in the car turned it aggressively toward the marchers, and Mr. Foster then approached it. The driver opened fire, shooting Mr. Foster three times. He was rushed to a hospital and was later pronounced dead.

Austins police chief, Brian Manley, told reporters on Sunday that as the motorist turned, a crowd of protesters surrounded the vehicle, and some struck the car. The driver, whose name has not been released, then opened fire from inside the car as Mr. Foster approached. Another person in the crowd pulled out a handgun and shot at the vehicle as it sped away.

Minutes after the shooting, the driver called 911 and said he had been involved in a shooting and had driven away from the scene, Chief Manley said. The caller told dispatchers he had shot someone who had approached the drivers window and pointed a rifle at him.

His account is that Mr. Foster pointed the weapon directly at him and he fired his handgun at Mr. Foster, the chief said of the driver.

Both the driver and the other person who fired a weapon were detained and interviewed by detectives. Both had state-issued handgun licenses and have been released as the investigation continues, Chief Manley said.

The shooting stunned a capital city where demonstrations and marches are a proud and commonplace tradition. A GoFundMe page to help Mr. Fosters relatives with his funeral expenses had already raised nearly $100,000 by Sunday evening.

And while Mayor Steve Adler and other officials expressed their condolences on Sunday, at least one police leader criticized Mr. Foster.

On Twitter, Kenneth Casaday, the president of the Austin police officers union, retweeted a video clip of Mr. Foster explaining to Mr. Garcia, the independent journalist, why he brought his rifle. In the clip, Mr. Foster is heard using curse words to talk about all the people that hate us, but are too afraid to stop and actually do anything about it.

In his tweet, Mr. Casaday wrote: This is the guy that lost his life last night. He was looking for confrontation and he found it.

Mr. Garcia, who has filmed numerous Austin demonstrations in recent weeks, captured the chaotic moments of the shooting live on video. Protesters are seen marching through an intersection when a car blares its horn. Marchers appear to converge around the car as a man calls out, Everybody back up. At that instant, five shots ring out, followed shortly by several more loud bangs that echo through the downtown streets.

Mr. Foster, who had served in the military, was armed, but he was not seeking out trouble at the march, relatives and witnesses told reporters. At the time of the shooting, Mr. Foster was pushing his fiance through the intersection in her wheelchair.

Mr. Foster and his fiance, Whitney Mitchell, had been taking part in protests against police brutality in Austin daily since the killing of George Floyd in Minneapolis. Mr. Foster is white, and Ms. Mitchell, who is a quadruple amputee, is African-American. She was not injured in the shooting.

He was doing it because he feels really strongly about justice and hes very heavily against police brutality, and he wanted to support his fiance, Mr. Fosters mother, Sheila Foster, said in an interview with Good Morning America, adding that she was not surprised he was armed while at the march.

He does have a license to carry, and he wouldve felt the need to protect himself, Ms. Foster said.

In Texas, it is lawful to carry rifles, shotguns and other so-called long guns on the street without a permit, as long as the weapons are not brandished in a threatening manner; state-issued licenses are required only to carry handguns.

The presence of Mr. Fosters weapon could play a key role in the case if the driver claims that he shot Mr. Foster out of fear for his life, a defense allowed under the so-called stand your ground law in the state.

The shooting reignited a long-running debate in Texas about the open carry movement, in which many men and women carry their rifles and other weapons in public places.

Gun-control supporters say the movement that encourages such displays seeks to intimidate the police and the public, while gun-rights activists defend it as a celebration of their Second Amendment rights.

In a 2016 attack on police officers at a downtown Dallas demonstration, several marchers carried AR-15s and other military-style rifles, and local officials said their presence created confusion for police officers. A single gunman, Micah Johnson, a former Army reservist, killed five officers.

There are multiple layers to this tragedy, but adding guns to any emotional and potentially volatile situation can, and too often does, lead to deadly violence, Ed Scruggs, the board president of Texas Gun Sense, a gun legislation reform group, said in a statement about the Austin shooting.

C.J. Grisham, founder and president of the gun-rights organization Open Carry Texas, defended the practice of bringing rifles to rallies and marches, particularly after numerous attacks around the country in which motorists have driven their cars into demonstrations and injured or killed protesters.

Protesters are under attack from a wide variety of people, Mr. Grisham said. Its unfortunate these days that if youre going to exercise your First Amendment rights, you probably need to be exercising your Second Amendment rights as well.

The shooting occurred shortly before 10 p.m. James Sasinowski, 24, a witness, said it seemed the driver was trying to turn a corner and did not want to wait for marchers to pass.

The driver intentionally and aggressively accelerated into a crowd of people, Mr. Sasinowski said. We were not aggravating him at all. He incited the violence.

Michael Capochiano, another witness, had a slightly different account of what happened. He said he was marching with other demonstrators when he saw a motorist honk his horn and turn toward the crowd, forcing people to scatter.

You could hear the wheels squealing from hitting the accelerator so fast, said Mr. Capochiano, 53, a restaurant accountant. Im a little surprised that nobody got hit.

The car came to a stop after turning from Fourth Street onto Congress Avenue and appeared to strike a traffic pylon. As people shouted angrily at the driver, Mr. Foster walked toward the car, with the muzzle of his rifle pointed downward, he said.

He was not aiming the gun or doing anything aggressive with the gun, Mr. Capochiano said. Im not sure if there was much of an exchange of words. It wasnt like there was any sort of verbal altercations. He wasnt charging at the car.

David Montgomery reported from Austin and Manny Fernandez from Houston. Bryan Pietsch contributed reporting from Andover, Minn.

See the article here:

Garrett Foster Brought His Gun to Austin Protests. Then He Was Shot Dead. - The New York Times

The Unprecedented Bravery of Olivia de Havilland – The Atlantic

There really wasnt any doubt about the right decision for me to take, de Havilland would recall. One of the nice things I thought was, If I do win, other actors, feeling frustration such as I feel, will not have to endure that. Theyll take the suspension, without pay, of course, but knowing they will not have to serve that time again. In fact, prominent stars like Jimmy Stewart and Clark Gable, whose contracts had been extended because of service in World War II, promptly took advantage of the de Havilland rule, as it came to be known, to forge lucrative freelance careers. In the decades since, entertainers as diverse as Johnny Carson, Courtney Love, Melissa Manchester, and Jared Leto have also invoked the ruling, in contexts from television-talk-show obligations to multimillion-dollar recording contracts.

As for de Havilland, after two years without work, she struck out for Paramount Pictures and 20th Century Fox and soon enough won her two Oscars, for To Each His Own (1946) and The Heiress (1949), while also making a harrowing impression as the victim of a nervous breakdown confined to an asylum in The Snake Pit (1948). But as the 1950s dawned, de Havilland never quite regained her former stardom, and in 1952, she forsook Hollywood for Paris and a marriage to Pierre Galante, the editor of Paris Match magazine. She continued to make occasional appearances in both film and television until 1988, when she played her last role, in The Woman He Loved, a TV movie about the abdication of King Edward VIII.

In later years, de Havilland recounted her adventures with the same kind of sly wit that had impelled her to tell Hal Kern, Gone With the Winds film editor, that she could do a better job of retching in the climactic first-act finale than Vivien Leigh, who played Scarlett OHara and didnt think vomiting was ladylike. (Kern agreed, and its de Havillands desperate sounds that appear on the finished soundtrack). A postWorld War II teatime encounter in her home with a smitten Kennedy, just back from naval service in the Pacific, came to an amusing end. He was quite silent, she would say in a British newspaper interview many years later. His friend did most of the talking. He just sat there, those great big eyes staring. Then when it was time for them to leave, we walked into the hallway and he very decisively opened the doorand it was the closet, and all my old boxes of summer hats and tennis rackets fell on his head. Later, she declined a dinner invitation from Kennedy, claiming she had to study her lines, and when Kennedy spotted her dining that night at Romanoffs with the much older author Ludwig Bemelmans, he was dumbfounded. Do you think it was me walking into the closet? he asked a friend. Do you think thats what really did it?

Near the end of her life, beginning in 2017, de Havilland waged one last legal battle, this time a losing one, as she sued FX and the producer Ryan Murphy over her portrayal by Catherine Zeta-Jones in Feud: Bette and Joan, a miniseries about the rivalry between Bette Davis and Joan Crawford, in which the de Havilland character is seen reminiscing about Davis. De Havilland claimed the portrayal was an unauthorized use of her name and likeness. But a California appeals court dismissed the case on First Amendment grounds and the California and United States Supreme Courts declined to review the decision.

To the end, de Havilland remained wryly proud of her role as a champion of working actors. I suppose youd like to know how actresses of my day differ from actresses of today, she said to the American Academy of Achievement interviewer in 2006. Well, she went on, cocking an eyebrow as the hint of a smile crept into her twinkling eyes, the actresses of today are richer.

Thanks in no small part to Olivia de Havilland, they are.

We want to hear what you think about this article. Submit a letter to the editor or write to letters@theatlantic.com.

Here is the original post:

The Unprecedented Bravery of Olivia de Havilland - The Atlantic