Apricorn Releases the First Hardware-Encrypted USB Flash Key with C-Type Connector – PRNewswire

POWAY, Calif., July 23, 2020 /PRNewswire/ --Apricorn, the leading manufacturer of software-free, 256-bit AES XTS hardware-encrypted USB 3.2 storage devices, has launched the Aegis Secure Key 3NXC the first device of its kind with a USB-C connector. This makes it the only hardware-encrypted flashkey that is compatible with the next generation of laptops, smartphones, tablets and hubs, without the need for a separate A-to-C adapter.

Designed with the USB 3.2 ports of the next generation of computers, tablets, smartphones and hubs, the Secure Key 3NXC is Apricorn's--and the market's--first hardware-encrypted flash key to be compatible with USB 3.2 C-ports without the aid of a separate A-to C adapter. Like its predecessor, the Secure Key 3NX, the Secure Key 3NXC line is priced to economically and efficiently protect the data of the expanding global remote workforce while delivering all of the advanced security features found in the Aegis family of secure drives. By offering a range of 6 storage capacities from 4GB to 128GB, the Secure Key 3NXC allows the IT admin to closely align the device capacity with the storage needs of each individual employee, reducing overall cost of deployment. Prices range from $59 to 179.

Kurt Markley, Apricorn's Director of Sales, says, "Even before the COVID-19 pandemic, remote and mobile working was on the rise. As the global workforce shifted from office to home practically overnight, the demand for our encrypted secure keys skyrocketed, as did the demand for our A-to-C adapters. We accelerated the release of the Aegis Secure Key 3NXC to provide an efficient way of ensuring that employees using MacBooks, iPads and Android devices can securely store and move sensitive data, wherever they're working."

The Aegis Secure Key 3NXC completes the Secure Key 3NX family, which Apricorn updates constantly to address evolving security threats and business needs for highly regulated sectors such as defense, finance, government, manufacturing and healthcare. The 3NXC was created in response to a market that's moving towards smaller and thinner laptops and tablets that can't accommodate a USB-A port.

"While most computers and laptops still offer both A and C connector ports, the number of those who exclusively committing to type C continues to grow year over year," says Markley. "USB isn't just there for peripherals or charging phones anymore, but to power up these machines on that same port. We are developing with this next generation of computers in mind, and at the same time, continuing to manufacture type A devices for those who need them for the foreseeable future."

Standard features shared with the Aegis family include onboard keypad authentication, 256-bit AES XTS hardware encryption, complete cross-platform compatibility, read-only options, separate admin and user access, data recovery PINs, programmable PIN lengths, and Aegis Configurator compatibility.

The 3NX family offers one unique feature that is not available on any other hardware encrypted device: the ability to toggle between Fixed Disk and Removable Media (U.S. Pat. No 10,338,840). FIPS 140-2 Level 3 validation which is expected later this year.

The security advantages of Apricorn's hardware encrypted USB storage devices include:

About Apricorn Headquartered in Poway, California, Apricorn provides secure storage innovations to the most prominent companies in the categories of finance, healthcare, education, and government throughout North America, Canada and EMEA. Apricorn products have become the trusted standard for a myriad of data security strategies worldwide. Founded in 1983, numerous award-winning products have been developed under the Apricorn brand as well as for a number of leading computer manufacturers on an OEM basis.

Media contactWalter Fiorentini858.513.4480[emailprotected]

SOURCE Apricorn

http://www.apricorn.com

Read the original:
Apricorn Releases the First Hardware-Encrypted USB Flash Key with C-Type Connector - PRNewswire

COVID-19 Impacts: E-mail Encryption Market will Accelerate at a CAGR of about 12% through 2020-2024 | High Adoption Of Cloud-based Services to Boost…

LONDON--(BUSINESS WIRE)--Technavio has been monitoring the e-mail encryption market and it is poised to grow by USD 2.19 bn during 2020-2024, progressing at a CAGR of about 12% during the forecast period. The report offers an up-to-date analysis regarding the current market scenario, latest trends and drivers, and the overall market environment.

Technavio suggests three forecast scenarios (optimistic, probable, and pessimistic) considering the impact of COVID-19. Please Request Latest Free Sample Report on COVID-19 Impact

The market is fragmented, and the degree of fragmentation will accelerate during the forecast period. Cisco Systems Inc., Hewlett Packard Enterprise Co., Microsoft Corp., Mimecast Ltd., Proofpoint Inc., Sophos Ltd., Symantec Corp., Trend Micro Inc., Virtru Corp., and Zix Corp. are some of the major market participants. To make the most of the opportunities, market vendors should focus more on the growth prospects in the fast-growing segments, while maintaining their positions in the slow-growing segments.

The high adoption of cloud-based services has been instrumental in driving the growth of the market.

E-mail Encryption Market 2020-2024 : Segmentation

E-mail Encryption Market is segmented as below:

To learn more about the global trends impacting the future of market research, download a free sample: https://www.technavio.com/talk-to-us?report=IRTNTR41465

E-mail Encryption Market 2020-2024 : Scope

Technavio presents a detailed picture of the market by the way of study, synthesis, and summation of data from multiple sources. Our e-mail encryption market report covers the following areas:

This study identifies the extensive use of e-mails for communication as one of the prime reasons driving the e-mail encryption market growth during the next few years.

E-mail Encryption Market 2020-2024 : Vendor Analysis

We provide a detailed analysis of around 25 vendors operating in the e-mail encryption market, including some of the vendors such as Cisco Systems Inc., Hewlett Packard Enterprise Co., Microsoft Corp., Mimecast Ltd., Proofpoint Inc., Sophos Ltd., Symantec Corp., Trend Micro Inc., Virtru Corp., and Zix Corp. Backed with competitive intelligence and benchmarking, our research reports on the e-mail encryption market are designed to provide entry support, customer profile and M&As as well as go-to-market strategy support.

Register for a free trial today and gain instant access to 17,000+ market research reports.

Technavio's SUBSCRIPTION platform

E-mail Encryption Market 2020-2024 : Key Highlights

Table Of Contents :

Executive Summary

Market Landscape

Market Sizing

Five Forces Analysis

Market Segmentation by End user

Market Segmentation by Solution

Customer Landscape

Geographic Landscape

Volume Driver - Demand led growth

Market Challenges

Market Trends

Vendor Landscape

Vendor Analysis

Appendix

About Us

Technavio is a leading global technology research and advisory company. Their research and analysis focuses on emerging market trends and provides actionable insights to help businesses identify market opportunities and develop effective strategies to optimize their market positions. With over 500 specialized analysts, Technavios report library consists of more than 17,000 reports and counting, covering 800 technologies, spanning across 50 countries. Their client base consists of enterprises of all sizes, including more than 100 Fortune 500 companies. This growing client base relies on Technavios comprehensive coverage, extensive research, and actionable market insights to identify opportunities in existing and potential markets and assess their competitive positions within changing market scenarios.

See the original post here:
COVID-19 Impacts: E-mail Encryption Market will Accelerate at a CAGR of about 12% through 2020-2024 | High Adoption Of Cloud-based Services to Boost...

Beyond Anonymous: Where Hacktivism is going in 2020 – The Parallax

Hacktivism is alive and well, if a bit weird, in 2020, says Gabriella Coleman, a cultural anthropologist specializing in hacker culture at McGill University.

At the end of June,Twitter banned the accountof the hacker collective Distributed Denial of Secrets (DDoSecrets) and blocked links to BlueLeaks, the groups data trove of 270 gigabytes of data containing internal records from more than 200 police departments.

The hacktivist collective Anonymous also returned to prominence, as its members took actions to support Black Lives Matter protesters, including getting legions of Korean pop-music super fans to participate in social-media disruptions.

Whats Anonymous up to in 2020?Is doxing ever appropriate?When hackers target a conference code of conductA hackers fall fashion line features faux license plates. Heres why

BlueLeaks shows that theres still a lot of interest in activist hacking, Coleman says. In the context of the English-speaking world, DDoSecrets is the hinge between the WikiLeaks and Anonymous era, and the contemporary movement. They created a platform to keep leaking alive. If it wasnt for them, it would be much dimmer. Its still dim because its such a high-risk behavior.

High-Risk BehaviorWhile high-risk technical hacks arent currently dominating headlines, the Twitter hijack and BlueLeaks episodes reveal that hackers are still looking to access secure data and their reasons remain varied.

One thing that might temper planned hacktivist actions could be the hammer of the state, in the form of aggressive law enforcement, says Coleman, author of Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous.

DDoSecrets has said theyre prepared for the U.S. government to come after them, but Coleman isnt so sure. The question is whether BlueLeaks will be stamped out in the next few months. But the blocking and censorship makes them more visible, she says.

This story was originally commissioned by Dark Reading. Read thefull story here.

Related

Read the original:
Beyond Anonymous: Where Hacktivism is going in 2020 - The Parallax

Self-contained, ready, and secured – Enhancing Red Hat OpenShift with hardware cryptography – Security Boulevard

Self-contained, ready, and secured Enhancing Red Hat OpenShift with hardware cryptography

The purpose of the blog is to introduce you to incorporating high assurance cryptographic security with hardware security modules (HSMs) into your Red Hat OpenShift projects. Since this might be new territory for some in the developer community, Ill take a moment to explain what an HSM is.

An HSM is a specialized hardware device that is designed for the purpose of protecting encryption keys and conducting cryptographic processes such as creating digital signatures. Keys are generated according to strict security standards and based on an internal high-quality entropy source. HSMs are robust, tamper-resistant devices that incorporate innovative security features to ensure the protection of sensitive key material.

The alternative to using an HSM is to store encryption keys in software which can be risky since skilled attackers can identify critical key material based on its unique, random characteristics. High value keys should be protected to the best achievable standards, since their loss might cause considerable financial and reputational damage as well as a compliance violation. HSMs provide this protection and many are certified to internationally-recognized standards like FIPS 140-2 and Common Criteria, while also being recognized by security auditors as an effective tool to mitigate cyber risk.

Applications in a containerized architecture are built, deployed and operated with contemporary methods including orchestration and dynamic scalability. These advancements bring challenges when it comes to including integration with HSMs, in a way that is compatible with this type of modern workflow. This is because applications that rely on HSMs historically require installation of special supporting software and libraries, plus manual configuration of both the server and the HSM to enable secure connections to be made between them.

Now, thanks to the integration of nCipher nShield HSMs with OpenShift, it is possible to easily incorporate highly scalable crypto operations into your containerized application architecture.

Before discussing how to integrate nShield HSMs with OpenShift, it may be instructive to consider visually where the HSM fits in the context of the OpenShift platform:

As depicted in the diagram above, the nShield HSM is an external component accessed over the network. It provides highly available and scalable certified crypto offload for protecting valuable key material so that it is never exposed within the containerized architecture or platform (where it might be observed or captured by systems administrators).

Implementing cryptographic operations to enhance application security can be complex. Developers benefit from tools which make this task easier, and that provide an approved reference architecture to follow. Therefore, nCipher provides a set of standard scripts that enable supported integration with and connection to certified nShield HSMs in a streamlined and repeatable way. This reduces development times while using a tested process for delivering high assurance application security.

With these scripts, application developers can easily include the necessary nShield libraries for use with their PKCS11 or Java programs inside container images. Alternatively, off-the-shelf container images provided by third parties can be extended to include such libraries to enable their use with nShield HSMs. Typically this would form part of a CI/CD (continuous integration, delivery and deployment) pipeline so as to allow new versions or iterations of applications to be created with the same capabilities integrated.

Another container image is built with the nShield hardserver to enable and manage the connection to one or more nShield HSMs. These standardized images are stored in the normal enterprise container registry, and can be launched into any compatible container runtime.

One or more application containers are deployed into a pod alongside an instance of the hardserver container. The latter is supplied with details of the nShield HSM(s) to connect to (which can be in private or co-located hosting, or nShield as a service); while the application containers mount the corresponding Security World files from suitable persistent volume storage.

Different applications and/or versions of the same application can share HSMs in the same Security World, making use of the same or their own application keys which can be permanent or temporary depending on the volume/storage mapping configured.

nShield HSMs can support OpenShift development at any scale and with flexible or dynamic provisioning. Rather than upgrading servers or virtual machines, new application versions are deployed typically alongside and then instead of older versions with traffic distributed using included or external load balancers.

Using the nShield container option pack with Red Hat OpenShift, developers and operations teams can easily integrate their new or existing applications with nShield HSMs in a way that is straightforwardly accessible from contemporary containerized deployments. There is no need to install or configure software and appliances, meaning a much faster time-to-security. Instead of leaving potentially valuable application keys vulnerable, they are safely generated and used only within the HSMs protected and certified boundary.

nShield HSMs are also highly scalable, which make them a good companion for use with large or dynamically deployed containerised application architectures and allows developers to increase capacity with confidence. For implementations leveraging the subscription-based nShield-as-a-Service, the maintenance and management of the HSM itself is offloaded from the IT team.

The integration of the nCipher nShield with Red Hat OpenShift enables projects to be implemented with a new level of security that delivers the scale and flexibility needed for todays enterprise applications.

To learn more about nCipher nShield HSMs and the integration with Red Hat OpenShift, download our solution brief here. If youd like to learn more about nCiphers unique Security World key management architecture click here [HYPERLINK TO CONTAINER/KUBERNETES LANDING PAGE WHERE SECURITY WORLD WHITEPAPER IS GOING TO BE].

Read the rest here:
Self-contained, ready, and secured - Enhancing Red Hat OpenShift with hardware cryptography - Security Boulevard

Return of the transatlantic privacy war – Atlantic Council

A stop sign is in front of the sign of the Court of Justice of the European Union. (REUTERS)

In a sweeping judgment on July 16, the Court of Justice of the European Union (CJEU) summarily demolished the fragile legal peace that has prevailed for the last four years on the subject of transatlantic data transfers. The ruling has major geopolitical implications not only for the EUs commercial relations with the United States, but also for unrestricted European data flows to other countries with serious surveillance capacities, from the United Kingdom and Israel in the European neighborhood to authoritarian states farther afield such as Russia and China.

The case, known as Schrems II, marks the second time in five years that the CJEU has effectively invalidated a major US-EU agreement used by thousands of companiesEuropean as well as American, small as well as largefor transferring personal data in the commercial context from the European Union to the United States. The Court did so after finding a series of deficiencies in privacy protections for non-Americans under US surveillance law.

The European Union and the United States had agreed upon the Privacy Shield in 2016, and the European Commission duly found that it provided an adequate level of protection for data transferred from Europe to participating companies in the United States. But the CJEU, which insists that foreign privacy safeguards be essentially equivalent to those provided under the EU Charter of Fundamental Rights and the General Data Protection Regulation (GDPR), saw otherwise.

The Court concentrated its attention on the two main US legal authorities for conducting surveillance of foreign personsSection 702 of the Foreign Intelligence Surveillance Act (FISA) and Executive Order 12333. Neither of these offer surveilled foreign persons a mechanism to seek judicial redress or review in US courts, the CJEU pointed out. A substitute mechanism included in the Privacy Shield to provide administrative redress (the Ombudsperson) also failed to pass muster with the Court because it was not independent of the US executive and had not been granted the power to order the intelligence community to remedy a foreigners complaint.

The Courts unstated message to the United States was readily apparent: any future agreement to replace Privacy Shield must provide actionable rights of redress for Europeans, or it will be similarly struck down. In the meantime, companies participating in the Privacy Shield must scurry to find alternative legal means for their transatlantic data flows.

Oddly, the Schrems II case was not even supposed to be about the Privacy Shield. Max Schrems, the young Austrian privacy activist who brought the action against Facebook, had asked the CJEU only to determine whether standard contract clauses, the other principal transfer mechanism for commercial data, were consistent with EU privacy law. Another privacy activist, La Quadrature du Net, separately had filed a challenge to Privacy Shield that was pending at the CJEUs lower instance, the General Court. The CJEU decided to decide the two matters together, however, because of the shared underlying questions relating to US surveillance.

Standard clauses, which are widely used on a global basis, oblige companies embarking on an international transfer to accord the data in question privacy protections that have been deemed sufficient by European privacy authorities. But, like Privacy Shield, these contractual protections do not prevent the receiving state from demanding access to transferred data for national security reasons.

The only good news to emerge for companies from Schrems II was that the CJEU did not simultaneously invalidate the use of standard contract clauses in transatlantic commerce. Instead, it heldrather improbablythat individual companies are in a position to impose additional safeguards to ensure adequate protection against surveillance for data they transfer. European national data protection authorities (DPAs), who have jurisdiction over the implementation of standard clauses, are to exercise their powers to suspend or prohibit specific data transfers not meeting this standard.

This theoretical prospect runs squarely into the Courts holding on Privacy Shield, however: US surveillance laws were conclusively found in that context not to afford judicial remedies for Europeans who believe they may have been surveilled by the National Security Agency (NSA). We now can expect to see a steady stream of challenges by European DPAs to standard clauses, beginning in Ireland with Facebooks data transfers to the United States that Max Schrems had challenged. The results will be piecemeal and take some time to arrive, but the ultimate conclusion is already obviousmany transfers pursuant to standard clauses will be blocked because of US surveillance law.

The GDPRs architecture for international data transfers do not offer companies good alternatives to standard clauses. The Court suggests they obtain consent from individuals for every data transfer, but that plainly is unworkable for big companies like cloud service providers that engage in systematic transfers to the United States. Many companies may decide simply to keep European-origin data in Europe; cloud providers, for example, already have invested enormous sums in building server farms on the Continent. At a minimum, data localization will add costs and technical complexity. Max Schrems himself has already suggested that localization is the answer, and the European cloud industry doubtless will trumpet the same message.

Companies now will have to rapidly assess how vulnerable data they send across the Atlantic under standard clauses is to US surveillance. Some categories, such as human resources data, are probably inherently not of much interest to the NSA, but communications records are presumably in a different category. Encrypting data also could frustrate the NSA, at least in certain circumstances.

For the time being, data transfers from Europe to the United States likely will continue unaffected under standard clauses. The EUs Data Protection Supervisor (EDPS) has pledged to quickly develop guidance for companies on the changed legal environment. National DPAs could launch investigations against prominent US companies, but, if past practice holds, may forbear from definitive enforcement action until the US government and the EU can jointly figure out a way forward. US companies will need steady nerves during this uncertain interim period, since DPAs possess the eye-popping power to impose fines of up to 4 percent of a companys global revenue for violations of the GDPR.

Its not the first time that companies find themselves in this spot: something similar occurred in 2015 after the CJEU overturned the US-EU Safe Harbor Framework, the predecessor to Privacy Shield. Being caught between expansive US surveillance laws and expansive EU privacy norms is, in any event, not a comfortable spot for companies. They also have reason to feel aggrieved that the CJEU essentially has commanded them to undertake private reconciliation of these conflicting legal requirements.

The US government and the European Union face a hard road ahead in responding to the Schrems II judgment. Transatlantic commerce, already reeling from the pandemic, now faces another potential severe challenge. US industry and Congress will press the administration hard to seek yet another negotiated solution, but the COVID-19 pandemic will impede face-to-face discussions with Brussels. More fundamentally, the administration may balk at complying with what amounts to a foreign judicial demand to change US surveillance law. National security hawks may see an opportunity, in an election season, to call for an aggressive US response. The domestic timing could hardly be worse.

The view from other states with robust surveillance apparatus is also ominous. The United Kingdom urgently needs a data transfer deal with the EU before the Brexit transition period expires at the end of the year. Its surveillance authorities surpass those of the United States in some respects, andunlike in most of continental Europethey are transparently written into law. EU negotiators now have additional ammunition to demand that the UK change its law to improve redress possibilities for surveilled EU citizens.

Israel already enjoys an EU adequacy finding, conferred at a time when the European Commission did not look closely into foreign surveillance laws. At some point, the Commission will have to revisit that decision in light of Schrems II. Data transfers to Israel under standard clauses could be challenged before DPAs at any time.

The hardest case for the EU will be China. Commercial data flows from the EU to China are already large, with annual exports of more than 200 billion. Chinese cloud providers and social media are deepening their European presence, and European manufacturers are constantly exchanging data with their Chinese facilities. Yet Chinas privacy protections are not at Western level, and its surveillance authorities enjoy wide-ranging powers. Can a German car manufacturer really be expected to assess Chinas surveillance laws and interrupt data flowing there under standard contract clauses? Is a German state data protection authority any better placed to make that decision? Clearly, Brussels ultimately will have to balance the CJEUs strict privacy jurisprudence against the economic and diplomatic costs.

If there is a silver lining, it is that the European Union eventually will have to refashion an accommodation between privacy and surveillance that does not impede commerceand do so on a global basis. In 2013, Edward Snowden turned the spotlight on US surveillance, and Washington and Brussels since have struggled to find a privacy equilibrium. Chinas economic dominance, together with its newly-assertive foreign policy, means that the EU cannot any longer consider data transfers to be just a transatlantic quarrel. The global geopolitical consequences of the Schrems II judgment are just beginning.

Kenneth Propp is a nonresident senior fellow in the Atlantic Councils Future Europe Initiative.

Read the original post:
Return of the transatlantic privacy war - Atlantic Council

Royal Bank of Canada and Borealis AI announce new AI private cloud platform, developed with Red Hat and NVIDIA – Canada NewsWire

RBC's AI private cloud platform is the first-of-its-kind in Canada to deliver intelligent software applications and boost operational efficiency.

TORONTO, July 23, 2020 /CNW/ - Royal Bank of Canada (RBC) and its AI research institute Borealis AI have partnered with Red Hat and NVIDIA to develop a new AI computing platform designed to transform the customer banking experience and help keep pace with rapid technology changes and evolving customer expectations.

As AI models become more efficient and accurate, so do the computational complexities associated with them. RBC and Borealis AI set out to build an in-house AI infrastructure that would allow transformative intelligent applications to be brought to market faster and deliver an enhanced experience for clients. Red Hat OpenShift and NVIDIA's DGX AI computing systems power this private cloud system that delivers intelligent software applications and boosts operational efficiency for RBC and its customers.

RBC's AI private cloud has the ability to run thousands of simulations and analyze millions of data points in a fraction of the time than it could before. The flexible and highly reliable self-service infrastructure will allow RBC to build, deploy and maintain next-generation AI-powered banking applications.

The platform has already improved trading execution and insights, helped reduce client calls and has resulted in faster delivery of new applications for RBC clients, and has the potential to benefit the AI industry in Canada, beyond RBC and financial services.

RBC is proud to have collaborated with Red Hat and NVIDIA to develop a platform that supports RBC customers while providing the flexibility for AI-powered client interactions.

Supporting Quotes

Mike Tardif, Senior Vice President, Tech Infrastructure, Royal Bank of Canada"In today's ever changing marketplace, we must always be at the forefront of innovation for our clients. We are proud to have delivered a unique AI Private Cloud capability in-house, leveraging our strong collaboration with Red Hat and NVIDIA. This cloud offers GPU acceleration and containerized platform benefits, and we are well positioned to provide the best experience possible for our customers going forward."

Chris Wright, Senior Vice President and Chief Technology Officer, Red Hat"It is always humbling to see Red Hat technologies in action, and we are honored to see how it contributed to the leading AI computing platform that RBC now has. Together with NVIDIA, OpenShift is helping to power the future of not just positive customer experience and overall operational excellence, but is enabling the bank to embark on research projects that have the potential to make a lasting impact on the world."

Charlie Boyle, Vice President and General Manager, DGX Systems, NVIDIA"Before AI can enable transformative business opportunities, it must first be integrated as a strategic IT platform. RBC is leading the way in accelerating AI development through high-performance infrastructure from NVIDIA and Red Hat. By combining innovative technology with their expert knowledge in financial services, the RBC team has created one of the most sophisticated and dynamic AI development infrastructures in Canada."

Foteini Agrafioti, Chief Science Officer, RBC and head of Borealis AI"Modern AI cannot exist without access to high performance computing. This collaboration means that we can conduct research at scale, and deploy machine learning applications in production with improved efficiency and speed to market."

About RBCRoyal Bank of Canada is a global financial institution with a purpose-driven, principles-led approach to delivering leading performance. Our success comes from the 84,000+ employees who bring our vision, values and strategy to life so we can help our clients thrive and communities prosper. As Canada's biggest bank, and one of the largest in the world based on market capitalization, we have a diversified business model with a focus on innovation and providing exceptional experiences to our 17 million clients in Canada, the U.S. and 34 other countries. Learn more atrbc.com.

We are proud to support a broad range of community initiatives through donations, community investments and employee volunteer activities. See how at rbc.com/community-social-impact.

About Borealis AIBorealis AI is a world-class AI Research center backed by RBC. Recognized for scientific excellence, Borealis AI uses the latest in machine learning capabilities to solve challenging problems in the financial industry. Led by award-winning inventor and entrepreneur Foteini Agrafioti, and with top North American scientists and engineers, Borealis AI is at the core of the bank's innovation strategy and benefits from RBC's scale, data and trusted brand. With a focus on responsible AI, natural language processing and reinforcement learning, Borealis AI is committed to building solutions using machine learning and artificial intelligence that will transform the way individuals manage their finances and their futures. For more information please see: http://www.borealisai.com.

About Red Hat, Inc.Red Hatis the world's leading provider of enterprise open source software solutions, using a community-powered approach to deliver reliable and high-performing Linux, hybrid cloud, container, and Kubernetes technologies. Red Hat helps customers integrate new and existing IT applications, develop cloud-native applications, standardize on our industry-leading operating system, and automate, secure, and manage complex environments. Award-winning support, training, and consulting services make Red Hat a trusted adviser to the Fortune 500. As a strategic partner to cloud providers, system integrators, application vendors, customers, and open source communities, Red Hat can help organizations prepare for the digital future.

Connect with Red Hat

Red Hat, the Red Hat logo and OpenShift are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the U.S. and other countries.

SOURCE RBC

For further information: Stephanie Bannan, RBC, [emailprotected], 416-524-1827

http://www.rbc.com

Original post:
Royal Bank of Canada and Borealis AI announce new AI private cloud platform, developed with Red Hat and NVIDIA - Canada NewsWire

Judge orders Michael Cohen released from prison, cites retaliation over book about Trump – STLtoday.com

Cohen, 53, sued federal prison officials and Attorney General William Barr on Monday, saying he was ordered back to prison because he was writing a book to be released before the November presidential election.

He has been in isolation at an Otisville, New York, prison camp, quarantined while prison authorities ensure he does not have the coronavirus.

His attorney, Danya Perry, said in a statement that the order was "a victory for the First Amendment" and showed that the government cannot block a book critical of the president as a condition of release to home confinement. "This principle transcends politics and we are gratified that the rule of law prevails," she said.

The book will address "Trump's personality and proclivities, his private and professional affairs, and his personal and business ethics," according to the lawsuit. It further stated that the government's demand that Cohen agree not to speak to or through any media, including by publishing a book, violated his constitutional rights.

Cohen had been furloughed in May along with other prisoners as authorities tried to slow the spread of the COVID-19 in federal prisons.

He was one year into a three-year prison sentence after pleading guilty to campaign finance charges and lying to Congress, among other crimes.

Campaign finance charges related to his efforts to arrange payouts during the 2016 presidential race to keep the porn actress Stormy Daniels and model Karen McDougal from making public claims of extramarital affairs with Trump. Trump has denied the affairs.

Get local news delivered to your inbox!

Link:

Judge orders Michael Cohen released from prison, cites retaliation over book about Trump - STLtoday.com

Why Its Time to Start Using Artificial Intelligence in Your Greenhouse – Greenhouse Grower

Luna by iUNU is a greenhouse AI platform using aerial robots on tracks that scan the entire production area several times a day using computer vision.Photo courtesy of Sunrise Greenhouses

With todays automated climate-control systems, managing the greenhouse environment and its systems has never been easier. The management of all equipment under one system, including heating, venting, and irrigation, provides optimal efficiency and precision in terms of systems management and data collection.

The development of these technologies allows growers to be more focused on their crops and provides control at their fingertips. Digital parameters are defined by crop level observations, which represent the modern-day dynamic between plants, the grower, and technology.

Increasing development of artificial intelligence (AI) has allowed the greenhouse sector to further improve efficiency and precision, thereby changing that dynamic. Thanks to the work of researchers and private companies, AI is allowing plants to communicate directly with climate-control systems, as well as the grower. It notifies them when there are issues within the crop relating to growth rate, pests, and disease. AI is not only helping growers identify when there is a problem, it is also predicting long-term effects of the issue via harvest forecasting.

Who Is Developing AI for the Greenhouse?

Wageningen University and Research (WUR) is one of the academic institutions leading the way in the development of AI-controlled cultivation. In 2018, WUR hosted an autonomous growing competition where Microsoft took first place over several other teams, including a team of Dutch growers.

A host of private companies including Motorleaf, LetsGrow.com, and Illumitex already have commercially available platforms. Sunrise Greenhouses has been an early adopter of the technology, integrating AI in two areas of its production. The decision to start using AI was driven by the desire for improved efficiency and to help manage skilled labor shortages by expanding employee capacity.

The first system, Luna by iUNU, is a greenhouse AI platform using aerial robots on tracks that scan the entire production area several times a day using computer vision. Images are uploaded for analysis using algorithms customized to production requirements and translated for access on any device. Historical data is used to identify anomalies within the crop, alerting the grower or the climate-control system and providing an unprecedented level of oversight.

The second technology, Watchdog by Bold Robotic Solutions, is a production line AI system developed to monitor equipment for production issues and efficiency. Watchdog is currently installed on our potting line, monitoring pots moving from the potting machine to the tagger, transplanter, and placing robots. The system provides visual and audible alarms for issues such as an empty pot dispenser or pots that have fallen over. A series of sensors also allows the system to observe patterns and make timing corrections by controlling the equipment, thus removing repetitive corrective burdens from the operator.

What Are the Challenges?

In the upcoming years, there is no doubt the role AI will play in the evolution of the greenhouse industry. That being said, these game-changing technologies will not come without challenges, specifically during the early years of technology adoption.

While both solutions have different functions, they are based on the same self-learning technology that uses neural networks and machine learning. Like us, it takes time for the systems to learn patterns and crop cycles. As a seasonal grower with product cycles of up to two years in duration, patience is necessary. It takes time to collect the data for these systems to work and learn.

Greenhouse environments are also challenging for technology implementation due to broad temperature and humidity ranges, which influence both the electronic and mechanical components that contribute to their ongoing development. This can be a frustration for staff trying to complete their weekly plans.

AI solutions for greenhouse growers are still in their initial phases of development and have been mostly implemented by early adopters. As more players in the industry move toward the latest greenhouse technologies, we can expect the number of out-of-the-box AI solutions on the market to increase. For now, AI adopters will likely require some patience as the product learns the intricacies specific to their growing environment before it produces state-of-the-art results.

How Are Staff Trained?

The integration of these systems requires changes to processes, which can be disruptive to production, so flexibility and managing expectations is important among staff. When identifying new equipment, we involve staff in the process. When staff understand what we are trying to accomplish and can provide input, the transition is generally much smoother. People are more willing to adapt when they understand how the technology will make their lives easier. That said, providing people with training and, more importantly, ongoing support is key to the successful integration of these new technologies into your business.

The high level of granularity in digital crop surveillance can save money through early identification of problems related to pests, disease, moisture management, and climate. Photo courtesy of Sunrise Greenhouses

What Are the Benefits?

Having systems that continuously monitor equipment and cultivation allows staff to focus on less redundant tasks, which improves efficiency and the experience and quality of work. The high level of granularity in terms of crop surveillance has saved money due to the early identification of problems related to pests, disease, moisture management, and climate. This allows issues to be dealt with before they proliferate.

Working with iUNU, both our Production Manager and Sales Manager can access inventory in real-time, which has uncoupled departments in our facility that were previously dependent on one another for decision making. This is just one example of the increase in efficiency we are seeing as a result of these technologies.

Facilities that are focused on crop yields, such as vegetable growers, can benefit from AI developed by companies like Motorleaf, who offer yield-predicting products. They consider variables such as historical weather forecasts, nutrient ratios, daily temperatures, and humidity levels. These products train themselves to predict harvest yields with accuracies that are far superior to what is achieved by traditional forecasting methods.

Lee Fisher is the Innovations Manager at Sunrise Greenhouses Ltd., a 250,000 square-foot ornamentals operation in Vineland Station, Ontario, Canada. His background is in computer software engineering, as well as integrated pest management. See all author stories here.

Read the original:
Why Its Time to Start Using Artificial Intelligence in Your Greenhouse - Greenhouse Grower

Nagarro launches machine vision-based artificial intelligence solutions that mitigate COVID-19 risks and enhance workplace safety – PRNewswire

SAN JOSE, Calif., July 23, 2020 /PRNewswire/ --Nagarro, a global leader in digital engineering and technology solutions, announced the launch of AI-powered solutions to help organizations kick-start work and life amid the COVID-19 crisis. Based on machine vision technology, these solutions provide powerful workplace interventions quickly and effectively, and have the potential to transform how we work and interact by ensuring better health and safety of employees and visitors.

Nagarro's COVID-AI suite of solutions is designed to leverage state-of-the-art AI models running on low-cost edge devices and can be deployed at scale in a matter of weeks, with very little overhead. It has mechanisms to ensure social distancing behaviour, encourage PPE practices such as wearing masks, and monitor as well as mitigate high risk scenarios such as large collections of people.

Nagarro's COVID-AI suite of solutions includes:

"As the world grapples with COVID-19, every ounce of technological innovation and ingenuity harnessed to fight this pandemic brings us one step closer to overcoming it. AI and ML are playing a key role in better understanding and addressing the COVID-19 crisis, " said Anurag Sahay, VP & Global Head - AI & Data Sciences, Nagarro. "Organizations, businesses and establishments are finding new ways to operate effectively. At Nagarro, we are using AI powerfully to help bring some of these interventions in place. We believe that machine vision-based AI platforms have significant potential to transform how we work and live during the new normal."

Nagarro recently conducted a webinar highlighting how the COVID-AI suite of solutions can help organizations accelerate the adaptation to the new normal. To view the webinar recording, click here https://www.nagarro.com/webinar/ai-to-the-rescue-during-covid

Write to [emailprotected] for more information about Nagarro COVID-AI solutions.

About Nagarro

Nagarro drives technology-led business breakthroughs for industry leaders and challengers. When our clients want to move fast and make things, they turn to us. Today, we are more than 7,000 experts across 22 countries. Together we form Nagarro, the global services division of Munich-based Allgeier SE.

Contact:

Megha Jha [emailprotected]

SOURCE Nagarro

See the original post:
Nagarro launches machine vision-based artificial intelligence solutions that mitigate COVID-19 risks and enhance workplace safety - PRNewswire

The Global Artificial Intelligence Chipset Market is expected to grow from USD 7,895.13 Million in 2019 to USD 47,965.34 Million by the end of 2025 at…

New York, July 23, 2020 (GLOBE NEWSWIRE) -- Reportlinker.com announces the release of the report "Artificial Intelligence Chipset Market Research Report by Technology, by Hardware, by Industry - Global Forecast to 2025 - Cumulative Impact of COVID-19" - https://www.reportlinker.com/p05913256/?utm_source=GNW

On the basis of Technology, the Artificial Intelligence Chipset Market is studied across Computer Vision, Context-Aware Computing, Machine Learning, and Natural Language Processing.

On the basis of Hardware, the Artificial Intelligence Chipset Market is studied across Memory, Network, and Processor.

On the basis of Industry, the Artificial Intelligence Chipset Market is studied across Agriculture, Automotive, Fintech, Healthcare, Human Resources, Law, Manufacturing, Marketing, Retail, and Security. The Agriculture further studied across Agricultural Robots, Drone Analytics, Livestock Monitoring, and Precision Farming. The Automotive further studied across Autonomous Driving, HumanMachine Interface, and Semiautonomous Driving. The Fintech further studied across Business Analytics and Reporting, Customer Behavior Analytics, and Virtual Assistant. The Healthcare further studied across Drug Discovery, Inpatient Care & Hospital Management, Lifestyle Management & Monitoring, Medical Imaging & Diagnostics, Patient Data & Risk Analysis, Precision Medicine, Research, Virtual Assistant, and Wearables. The Human Resources further studied across Applicant Tracking & Assessment, Employee Engagement, Personalized Learning and Development, Resume Analysis, Scheduling Group Meetings and Interviews, Sentiment Analysis, and Virtual Assistant. The Law further studied across Case Prediction, Compliance, Contract Analysis, Ediscovery, and Legal Research. The Manufacturing further studied across Field Services, Material Movement, Predictive Maintenance and Machinery Inspection, Production Planning, Quality Control, and Reclamation. The Marketing further studied across Analytics Platform, Content Curation, Dynamic Pricing, Sales & Marketing Automation, Search Advertising, Social Media Advertising, and Virtual Assistant. The Retail further studied across Customer Relationship Management, Payment Services Management, Price Optimization, Product Recommendation and Planning, Supply Chain Management and Demand Planning, Virtual Assistant, and Visual Search. The Security further studied across Antivirus or Antimalware, Data Loss Prevention, Encryption, Identity and Access Management, Intrusion Detection or Prevention Systems, Risk and Compliance Management, and Unified Threat Management.

On the basis of Geography, the Artificial Intelligence Chipset Market is studied across Americas, Asia-Pacific, and Europe, Middle East & Africa. The Americas region is studied across Argentina, Brazil, Canada, Mexico, and United States. The Asia-Pacific region is studied across Australia, China, India, Indonesia, Japan, Malaysia, Philippines, South Korea, and Thailand. The Europe, Middle East & Africa region is studied across France, Germany, Italy, Netherlands, Qatar, Russia, Saudi Arabia, South Africa, Spain, United Arab Emirates, and United Kingdom.

Company Usability Profiles:The report deeply explores the recent significant developments by the leading vendors and innovation profiles in the Global Artificial Intelligence Chipset Market including 11.1.2 Intel, 11.1.3 Xilinx, Advanced Micro Devices, Inc., Amazon Web Services, Fujitsu Ltd., General Vision, Google LLC, Graphcore, Huawei Technologies, IBM Corporation, Mellanox Technologies, Micron Technology, Microsoft Corporation, Nvidia Corporation, Qualcomm Technologies, and Samsung Electronics.

FPNV Positioning Matrix:The FPNV Positioning Matrix evaluates and categorizes the vendors in the Artificial Intelligence Chipset Market on the basis of Business Strategy (Business Growth, Industry Coverage, Financial Viability, and Channel Support) and Product Satisfaction (Value for Money, Ease of Use, Product Features, and Customer Support) that aids businesses in better decision making and understanding the competitive landscape.

Competitive Strategic Window:The Competitive Strategic Window analyses the competitive landscape in terms of markets, applications, and geographies. The Competitive Strategic Window helps the vendor define an alignment or fit between their capabilities and opportunities for future growth prospects. During a forecast period, it defines the optimal or favorable fit for the vendors to adopt successive merger and acquisition strategies, geography expansion, research & development, and new product introduction strategies to execute further business expansion and growth.

Cumulative Impact of COVID-19:COVID-19 is an incomparable global public health emergency that has affected almost every industry, so for and, the long-term effects projected to impact the industry growth during the forecast period. Our ongoing research amplifies our research framework to ensure the inclusion of underlaying COVID-19 issues and potential paths forward. The report is delivering insights on COVID-19 considering the changes in consumer behavior and demand, purchasing patterns, re-routing of the supply chain, dynamics of current market forces, and the significant interventions of governments. The updated study provides insights, analysis, estimations, and forecast, considering the COVID-19 impact on the market.

The report provides insights on the following pointers:1. Market Penetration: Provides comprehensive information on sulfuric acid offered by the key players2. Market Development: Provides in-depth information about lucrative emerging markets and analyzes the markets3. Market Diversification: Provides detailed information about new product launches, untapped geographies, recent developments, and investments4. Competitive Assessment & Intelligence: Provides an exhaustive assessment of market shares, strategies, products, and manufacturing capabilities of the leading players5. Product Development & Innovation: Provides intelligent insights on future technologies, R&D activities, and new product developments

The report answers questions such as:1. What is the market size and forecast of the Global Artificial Intelligence Chipset Market?2. What are the inhibiting factors and impact of COVID-19 shaping the Global Artificial Intelligence Chipset Market during the forecast period?3. Which are the products/segments/applications/areas to invest in over the forecast period in the Global Artificial Intelligence Chipset Market?4. What is the competitive strategic window for opportunities in the Global Artificial Intelligence Chipset Market?5. What are the technology trends and regulatory frameworks in the Global Artificial Intelligence Chipset Market?6. What are the modes and strategic moves considered suitable for entering the Global Artificial Intelligence Chipset Market?Read the full report: https://www.reportlinker.com/p05913256/?utm_source=GNW

About ReportlinkerReportLinker is an award-winning market research solution. Reportlinker finds and organizes the latest industry data so you get all the market research you need - instantly, in one place.

__________________________

Go here to read the rest:
The Global Artificial Intelligence Chipset Market is expected to grow from USD 7,895.13 Million in 2019 to USD 47,965.34 Million by the end of 2025 at...