Global Artificial Intelligence (AI) in Agriculture Market 2020: by Top-Vendors, Products, Applications, Growth Strategies and Forecast 2025 – Cole of…

The new research report is entitled Global Artificial Intelligence (AI) in Agriculture Market Growth (Status and Outlook) 2020-2025 assists players in strengthening their overall growth and establishes a strong position. The report showcases a comprehensive study of the overall industry along with key industry drivers and restraints. The report in-depth analysis of critical subjects of the global Artificial Intelligence (AI) in Agriculture industry involving consumption, revenue, sales, production, trends, opportunities, geographic expansion, competition, segmentation, and challenges. The report is divided into product types, applications, and regions. These segments provide accurate calculations and forecasts for sales in terms of volume and value. This analysis can help customers increase their business and make calculated decisions.

NOTE:Our report highlights the major issues and hazards that companies might come across due to the unprecedented outbreak of COVID-19.

Global Artificial Intelligence (AI) in Agriculture Market Overview:

Market Historic Data (2015-2019): Industry trends, global revenue and outlook, competitive landscape, manufacturers and development trends, market segment, types, applications, and regions, sales revenue: market share, growth rate, and current market analysis.

DOWNLOAD FREE SAMPLE REPORT: https://www.marketsandresearch.biz/sample-request/62317

Market Size Forecast (2020-2025): Overall global Artificial Intelligence (AI) in Agriculture market size, segment by types, applications, and regions, key data (revenue), market size, market share, growth rate, growth, and product sales price, top players, market share, overview strategies, and products/services offered.

The report also presents the market competition landscape and a corresponding detailed analysis of the major vendors/manufacturers in the market. The key manufacturers covered in this report: IBM, Granular, Intel, SAP, Agribotix, Microsoft, aWhere, The Climate Corporation, Precision Hawk, Taranis, CropX, Gamaya, John Deere, Prospera Technologies, Vision Robotics, Resson, Harvest Croo Robotics, DTN, Cainthus,

Segment by type, the market is segmented into: Machine Learning, Computer Vision, Predictive Analytics,

Segment by application, the market is segmented into: Precision Farming, Livestock Monitoring, Drone Analytics, Agriculture Robots, Other

The global Artificial Intelligence (AI) in Agriculture industry report allows industry experts to generate confident capital expenditures and create tactics, enhance their business outlook, implement successfully, and operate sustainably. The report presents a full graphical representation of the information, recommendations, and results of the analysis tool to provide a sophisticated landscape and highlight key market players. The given regional evaluation will help the industry players to describe undiscovered geological markets.

ACCESS FULL REPORT: https://www.marketsandresearch.biz/report/62317/global-artificial-intelligence-ai-in-agriculture-market-growth-status-and-outlook-2020-2025

The Regional Landscape of The Market:

We have also covered all important regions and countries involved in the global Artificial Intelligence (AI) in Agriculture market report. The research offers an analysis of the geographical landscape of the global market, which is divided into regions such as Americas (United States, Canada, Mexico, Brazil), APAC (China, Japan, Korea, Southeast Asia, India, Australia), Europe (Germany, France, UK, Italy, Russia), Middle East & Africa (Egypt, South Africa, Israel, Turkey, GCC Countries). It includes data about several parameters related to the regional contribution. The study provides information regarding the sales generated through each region and the registered market share. Information related to the growth rate during the forecast period is included in the report. According to the report, the industry is projected to generate significant revenue during the forecast period.

Customization of the Report:

This report can be customized to meet the clients requirements. Please connect with our sales team ([emailprotected]), who will ensure that you get a report that suits your needs. You can also get in touch with our executives on +1-201-465-4211 to share your research requirements.

About Us

Marketsandresearch.biz is a leading global Market Research agency providing expert research solutions, trusted by the best. We understand the importance of knowing what global consumers watch and buy, further using the same to document our distinguished research reports. Marketsandresearch.biz has worldwide presence to facilitate real market intelligence using latest methodology, best-in-class research techniques and cost-effective measures for worlds leading research professionals and agencies. We study consumers in more than 100 countries to give you the most complete view of trends and habits worldwide. Marketsandresearch.biz is a leading provider of Full-Service Research, Global Project Management, Market Research Operations and Online Panel Services.

Contact UsMark StoneHead of Business DevelopmentPhone: +1-201-465-4211Email: [emailprotected]Web: http://www.marketsandresearch.biz

Read the original post:
Global Artificial Intelligence (AI) in Agriculture Market 2020: by Top-Vendors, Products, Applications, Growth Strategies and Forecast 2025 - Cole of...

Wavicle Data Solutions to Participate in Databricks and AWS Dev Day Machine Learning Workshop on July 30 – PR Web

From customer 360 initiatives to supply chain analytics, (our customers) want to get better customer intelligence, improve their products, reduce costs and risks, and much more, but one of their biggest obstacles is skills.

CHICAGO (PRWEB) July 21, 2020

Wavicle Data Solutions, a leading provider of cloud engineering services, data management consulting, and data science and visualization services, today announced it will be participating with Databricks in an AWS Partner Dev Day virtual Machine Learning Workshop.

The free webinar will be live via Zoom on Thursday, July 30, from 9:00 am until 12:00 pm CDT. Participants will learn how unified data analytics can bring data science, business analytics, and engineering together to accelerate data and machine learning efforts. Wavicle data scientist, Calvin Westrick, will speak about text analytics, natural language processing, and machine learning.

While many companies wish to deploy artificial intelligence and machine learning capabilities to improve their businesses, one of the biggest challenges to adoption is a lack of skills, according to a survey by Gartner, a leading research and advisory company. With this virtual workshop, Databricks and Wavicle will provide practical training to address the challenges of preparing large data sets for analytics, managing the proliferation of data and machine learning frameworks, and moving models from development to production.

Specifically, the workshop will explore:

We see our clients in all industries looking for ways to improve their business through artificial intelligence and machine learning, stated Naveen Venkatapathi, president of Wavicle Data Solutions. From customer 360 initiatives to supply chain analytics, they want to get better customer intelligence, improve their products, reduce costs and risks, and much more, but one of their biggest obstacles is skills. Im happy to work with Databricks on this workshop to help bridge that gap.

Enterprises today want to accelerate innovation by building data and machine learning directly into their business, said Michael Hoff, SVP of business development and partners at Databricks. The Databricks and AWS Machine Learning Dev Day with Wavicle is an interactive workshop, which teaches enterprises best practices to build and scale machine learning.

Registration for this complimentary webinar is open now. Reserve your spot at:https://events.databricks.com/awsdatabricksmldevday730?utm_medium=partner&utm_source=databricks&utm_campaign=7013f000000Tt8mAAC

ABOUT WAVICLE DATA SOLUTIONSWavicles team of consultants, data architects, and cloud engineers work with global organizations to build a roadmap to success with unmatched technology expertise, creative innovation, and superior customer service. Our toolkit of proprietary accelerators helps clients deliver world-class data analytics solutions in record time. From data management services and cloud migration consulting to dashboard development and data analytics consulting, our professionals enable and empower data-driven enterprises. For more information, please visit https://www.wavicledata.com.

Share article on social media or email:

Read more from the original source:
Wavicle Data Solutions to Participate in Databricks and AWS Dev Day Machine Learning Workshop on July 30 - PR Web

To make ML at the edge work, make it more accessible – Stacey on IoT

Its becoming increasingly obvious that one solution to companies gathering too much data about you is to ensure the data stays on the device youre using and that any related machine learning takes place there. But the world of machine learning at the edge is still nascent and focused primarily on a few use cases, such as object detection and wake word recognition.

Zach Shelby, the CEO of Edge Impulse, believes there is a lot more opportunity to provide compelling features using edge-based machine learning, and hes built his company to help make building those features easier for developers. Shelby is the former founder of Sensinode, an IoT company that sold to Arm in 2013.

This week, Edge Impulseannounced additional fundingand launched computer vision models designed for edge devices that developers can use.

Edge Impulse launched earlier this year with a plan to make it easy for people who arent data scientists to take in machine data and build a machine learning model that will run on constrained hardware. Shelby explains that most data scientists and people building machine learning models are used to high-powered graphics processors and having access to thousands of compute nodes on which to train their models and run inferences.

A world of value awaits companies if they can just make models work on the tiny computers that sit inside sensors, smart home devices like outlets or light bulbs even wearables. But getting a traditional ML expert to focus on the edge and constrained devices is difficult. Its like bringing in a celebrity interior designer to redecorate your two-car garage.

Shelby wants to make it easier for traditional developers working at the edge to take in data and apply it to Edge Impulses existing models, which are designed for edge computing, or to take data and train new models without requiring GPUs and a data scientist. It reminds me a bit of Qeexo, the simple-to-train ML platformI covered a few months ago.

In addition to having models, the Edge Impulse platform helps developers trying to apply machine learning at the edge to share their work with colleagues, manage data collection, and track the changes made to the algorithm. This is part of an emerging process calledmachine learning ops (like DevOps, but for ML). Customers can use the Edge Impulse platform for free, paying only for commercial use that allows for those sharing and tracking features.

Shelbys mission now is to convince embedded systems engineers that they can easily try out and use machine learning models at the edge so Edge Impulse can encourage businesses in the industrial world to start playing with the technology. The startup has pre-populated its platform with models that can analyze vibration data from machines, audio data that can track machine health (Augury also does something similar), and even audio data designed to track the health of workers. And this week it added computer vision models.

The embedded world is already familiar with using limited processing power for anomaly detection, but by running sophisticated machine learning models, it can move beyond simply detecting something strange to identifying what, exactly, that strange thing is.

For example, the ML model that analyzes coughs can process a 2-to-5-second audio clip in real time to listen for and track coughing. But it doesnt just recognize a cough; it can determine the type of cough and classify it as something that needs further attention.Edge Impulse has made it easy to build the machine learning model to run on an Arm-based microcontroller, as shown in thisrough prototype. Companies can put a chip running the model inside a wearable for workers, inside a device thats used in hospital rooms to monitor patients, or include it as part of a sensor for an organization thats trying to detect illness among its staff.

By making it easy to grab a model, put it in a device, and then deploy it, Edge Impulse could open up the world of machine learning at the edge.Shelby has signed deals with Eta Compute, STMicroelectronics, and Arduino to link its platform to existing microcontrollers used by developers and product companies, which makes it easy to put the model on hardware. And paying customers get to use the cloud-based tracking and sharing features to further adjust models for specific use cases.

Im genuinely excited by the opportunities a platform like this brings to engineers who understand problems in their field and who want to apply machine learning to them. Just like graphical user interfaces brought computing to more people or services like WordPress allowed more people to blog, a platform like Edge Impulse will let embedded engineers and traditional developers harness the power of machine learning.

Related

More here:
To make ML at the edge work, make it more accessible - Stacey on IoT

Thoughts on encryption legislation – and the real ‘link’ between 5G and coronavirus – Cloud Tech

Opinion Conspiracy theories are nothing new, but the recent one that blamed the rollout of 5G networks for the spread of Covid-19 is one of the more bizarre examples in recent memory. Not only is it very obviously untrue to anyone that understands either the technology or virology, but there is also little real correlation. New Zealand which was one of the first countries to declare itself virus-free is accelerating its current 5G rollout while Brazil and the USA which have seen the highest death rates are not among the leaders in 5G adoption.

However, there are other parallels and lessons that could be learned here. Firstly, around following the science rather than political agendas and secondly around protection not only from radiation, but also from malware and snooping.

Many political leaders across the globe have claimed that their response to the pandemic has been led by the science. Unfortunately, there are many different ways of interpreting the science and also still many unknowns. Consequently, politicians have used the science to back their own agendas, at times arguing either in favour or against the use of face masks, lockdowns and testing depending on how well prepared they were or how much they were willing to admit to earlier mistakes. Populist leaders in particular have not fared well during the pandemic, being more prone to grandstanding than accepting the best scientific advice.

Similarly, with 5G, there are undeniable technological and economic advantages from having collaboration in the market to drive innovation and interoperability, as well as from having a level competitive playing field to ensure choice and value for money. Unfortunately, a populist agenda in the US to scapegoat certain Chinese players as part of a trade war has had a massively negative impact on the entire 5G rollout. The irony is that while nobody has yet found any backdoors in the Chinese equipment, the US Congress is currently seeking to pass a bill that would force companies to include backdoors in all encryption, showing that the US is actually doing what it want us to believe that the Chinese might be doing. The US arsonist is too busy shouting at the Chinese to stop playing with matches to spot the irony here.

The issue of PPE (masks, gowns, gloves) during the pandemic has shown us how important protection is. Firstly, it can be shown beyond doubt that in radiation terms 5G is far safer than previous generations of mobile communications, just as 4G was safer than 3G. Our ability to communicate more efficiently, increasing performance as we reducing power consumption, has been as effective for mobile communications as it has been for microprocessors (see Moores Law) and many other areas of technology.

Secondly, if encryption can be maintained then 5G is also more secure than previous generations of mobile technology. 5G uses encryption to provide anti-tracking and spoofing features that make it harder to track and manipulate individual device connections. 5G is also a much more software and cloud-based than previous wireless network technologies, which will allow for better monitoring to spot potential threats. It also allows operators to use network slicing to segment the system in numerous virtual networks, each of which can be managed and customized separately. This means that different slices can have different protections set up for specific types of devices.

At a time when the variety and sophistication of cyber threats is not only at an all-time high, but is also on the increase, we cannot afford either to drop our level of vigilance or to create any unnecessary vulnerabilities.

Patching vulnerabilities is a fulltime job for all technology vendors, the race to find and patch flaws is one that we need to win every time, while the cybercriminals only need to win occasionally. Independent scrutiny can be of benefit here. Many vendors offer bug bounties and Huawei has put its equipment forward for additional testing by labs based in the UK and elsewhere.

Almost all the 5G security is built on encryption. The problem about creating backdoors in this encryption is that you create additional associated vulnerabilities as well as governance issues. It is a bit like having a particularly virulent strain of smallpox held in a secure lab that if it escaped would instantly infect everyone. You would want to be sure that the lab was really secure and that those that held it were trustworthy.

Unfortunately, the proposed congressional bill would put the keys to the encryption backdoors in the hands of an administration that is unashamedly America First and does not feel obliged either to abide by international treaties or to cooperate with global institutions (such as the WHO) and an intelligence community that has already allowed its own hacking tools to be stolen and that has also already shown that it is neither open or honest about its use of encryption backdoors. Not only would governance issues be of concern to almost all other nations, but it would also be probably only a matter of time before criminals obtained access to the backdoors, thereby undermining everyones security.

The congressional encryption bill, while a well-intentioned initiative by politicians who do not understand the technological consequences, is a far greater threat to our collective security (over 5G and all other technologies) than the vendor that the US administration is currently seeking to scapegoat.

We need to be focusing on bug bounties and enhanced testing of equipment from all vendors, as well as global collaboration to patch vulnerabilities and counter the real threats, rather than creating back doors that would open up what could be calamitous new vulnerabilities.

After all, if you are not confident in the security of Huawei equipment then in a competitive market you have alternative vendors to choose from. However, if the back doors mandated by congress are universal then you may not have another choice and you certainly dont have any choice in terms governance keys to the backdoors are controlled by the US government and its intelligence services alone (not the UN or your own government), until that is they fall into the hands of cybercriminals.

Given the mess that the current US administration has made over coronavirus, are we confident that they can be trusted with the keys to encryption backdoors for all our data either to use them responsibly or to keep them safe?

I am not in favour of backdoors at all, as they create new vulnerabilities. If, however, they are a political necessity, then maybe every member of the UN should nominate a country CTO and this group should be collectively responsible not only for holding the encryption keys, but also for collaborating on an international basis to address the growing cyber threat (especially from rogue nations).

Editors note: Bill works with a number of global vendors and accepts paid commissions from them, including Huawei; however, he has requested for us to point out that he is paid for his time and not his opinions therefore the opinions expressed in this and other articles are entirely his own.

Interested in hearing industry leaders discuss subjects like this and sharing their experiences and use-cases? Attend theCyber Security & Cloud Expo World Serieswith upcoming events in Silicon Valley, London and Amsterdam to learn more.

Original post:
Thoughts on encryption legislation - and the real 'link' between 5G and coronavirus - Cloud Tech

Scanner shutdown: Local law enforcement to take dispatches off the air – SW News Media

Police scanners in Scott County are set to go silent under a radio replacement plan currently being rolled outcountywide.

Local law enforcement dispatch communications will be aired over anencrypted channel oncethe new radios are in use, local officials confirmed.

The switch to encryption, expected to take place in spring 2021, means the general public will no longer be able to hear police incidents unfold through handheld scanners, scanner applications and websites such as Broadcastify.

Scott County Sheriff Luke Hennen said the change is being made in the interest of publicsafety and victim privacy.

"Calls we go to and people's struggles don't need to be broadcast," Hennensaid.

Scott County Sheriff's Office Capt. Scott Haas said listening to police radio traffic is increasingly popular, and changes in technology have made it easy for anyone including individuals engaged in criminal activity to tune in.

"We have an obligation to protect people having a bad day, and to protect people's private information," Haas said.

Law enforcement agencies in Dakota County have also been purchasing radioswithencryptioncapabilities in recent years, but officials said they don't have a plan for how or if they'll use the encryption feature.

"There's arguments on both sides," said Dakota County Sheriff's Office Deputy Chief Joe Leko. "Officer safety and transparency."

Mark Anfinson, a Minnesota attorney specializing in information law and data practices, said both sides represent a strong, legitimate public policy issue. Anfinson represents the Minnesota Newspaper Association, which includes this newspaper.

"You dont want law enforcement operating in the dark anymore than you have to," he said. "And to some degree, secrecy of law enforcement is totally legitimate."

But to thinkencryptionalways falls on the side of protecting victims ofcrime ignores thevalue of publicaccountability, Afinson continued.

Thats what public accountability is all about helping the victims," he said.

Critics of encryption, which include many news organizations throughout the country, say the change weakens transparency and ends a longstanding, essential news-gathering practice of responding to an incident, such as a crash or shooting.

Last year, the Minnesota Chapter of the Society of Professional Journalists called on Hennepin County Sheriff Dave Hutchinson to reverse a decision to encrypt the police communications from all departments using the county's dispatch services.

"Particularly with incidents that involve a police response, this transparency helps hold authorities accountable if something should go wrong an essential part of building trust between law enforcement and the communities they serve," Chris Snowbeck, the journalist organization's president, wrote last year. "It also can help readers and viewers better understand the actions of law enforcement."

Under the current radio system, not all 911 communications are publicly available. State law protects the public from hearing 911 callers, and Scott County's current equipment keeps tactical operations off the air.

Officers involved with SWAT or drug task for operations already use encrypted radios, for example, but moving routine police calls to an encrypted channel is an "all or nothing" decision, Hennen said.

In recent years, each police department in Scott County has been replacingold radio equipment with equipment that offers encryptioncapability, but the switch to an encrypted channel won't occuruntil every officer is ready.

Hennen said that's expected to happen sometime next year.

After the switch, fire department calls throughout the county will remain accessible to the public on an open channel.

Hennen and Haas both said continuing to offer access to fire department communications provides a point of balance to residents wanting information about major public safety incidents.

"The fire channel captures that, yet itdoesn't downplay our safety," Hennen said.

Burnsville Police Capt. Don Stenger said Burnsville officers all have encryption technology on their radios these days, but the department doesn't yet use it.

Tom Folie, executive director of the Dakota County Communications Center where the county's emergency calls are dispatched, said he thinks encryption is desired in the long-term, but it's probably two to three years away.

Read the original:
Scanner shutdown: Local law enforcement to take dispatches off the air - SW News Media

Bill That Mandates Cyber Backdoors Will Leave Front Doors Wide Open – CPO Magazine

A few weeks ago a group of U.S. Republican senators introduced the Lawful Access to Encrypted Data Act, a bill that would compel American tech companies to put backdoors in their products to give law enforcement access to customers data with a warrant.

If passed, the Act will put everyones data at risk, while reversing decades of work to make encryption stronger and personal data more secure.

Even for purposes of lawful access, no company wants government pressure to insert vulnerabilities in their products. Adding any sort of hidden backdoor access or decryption capability potentially jeopardizes a companys reputation and its business prospects.

Yet such pressure is reality in the tech industry. In 2016, for example, Apple famously refused an FBI request to unlock an iPhone linked to a shooting in California.

But its not just the U.S. government pushing companies to install backdoors. In 2018, a letter was issued by the Five Eyes intelligence-sharing alliance, consisting of the U.S., U.K., Canada, Australia and New Zealand. The letter warned that if private companies refused to help authorities de-code encrypted emails, text messages, and voice communications, the Five Eyes governments might pursue technological, enforcement, legislative or other measures to achieve lawful access solutions.

Tech companies have faced such pressure to compromise privacy for decades. In the 1990s, the FBI floated the concept of key escrow, whereby software developers would copy the keys to every algorithm and give them to authorities upon request. In 2017, thenU.S. Deputy Attorney General Rod Rosenstein claimed that encrypted apps were protecting criminals like terrorists and drug dealers. Rosenstein acknowledged that the approach taken in the recent past negotiating with technology companies and hoping that they eventually will assist law enforcement out of a sense of civic duty is unlikely to work.

Why would that be? Do technology companies lack a sense of civic duty? A more likely explanation is that they know vulnerabilities are inevitably discovered and exploited. This turns their products into the cyber-equivalent of a suitcase lock made for the Transportation Security Administration. TSA authorities have master keys that can open any TSA-approved lock, allowing the agency to open your luggage without breaking the lock and damaging your suitcase.

As many people predicted when the program was rolled out, this vulnerability was soon exploited by hackers, allowing anyone with a 3D printer copy of the master keys and sell them on the black market. The same thing could easily happen with data networks.

As the Internet of Things ushers in an era of cyber-physical systems, network security is becoming a matter of life and death: instead of just disclosing your credit card information, a system breach could highjack the car youre driving or stop the pacemaker that controls your heart.

Think about the legal liability, reputational damage, and potential loss of life. What company wants any part of that?

Its sponsors in Congress will argue that the Lawful Access to Encrypted Data Act will keep Americas networks safe. Sadly, the effect will be the exact opposite. And tech companies know it.

Just as no organization wants to get hacked, no company in the world wants to install backdoors in their technology. Its just bad for business, as products are compromised, customers angered, and corporate reputations tarnished or destroyed.

Building a backdoor access that may be exploited by #hackers is a risk that no technology company is willing to take. #cybersecurity #respectdata Click to Tweet

Any backdoor makes us all less secure. As cyber security expert Bruce Schneier points out, you cant build a backdoor that only works with proper legal authorization, or only for people with a particular citizenship or the proper morality. If a backdoor exists, it can be exploited. Thats a risk no company is willing to take.

Read more from the original source:
Bill That Mandates Cyber Backdoors Will Leave Front Doors Wide Open - CPO Magazine

Virtual and face-to-face connect to coexist: Zoom COO – Fortune India

What do you think of competition? What sets you apart? What do you have to say about competition from India, more specifically JioMeet?

We have been dealing with competition since 2011, when the company was founded. We have had to deal with very large incumbents in the marketplace from an early timeframe. We view competition as a good thing. It only spurs us to focus on what we can controlour innovation and our ability to deliver happiness to our customers.

It takes a lot for us to deliver Zoom in the way it is: a very easy to use, high quality, video collaboration service. And as I mentioned, the architecture is very important. The know-how around the globally distributed network that we have, even the user interface, the simplicity, the feature set, etc. These are all things that we agonise over and have agonised over in our development. And really take feedback from our customers to heartboth our free customers all the way to our paid customers.

I would say there is no one thing that makes Zoom special. I think it is a combination of all of that and an intensely focussed and driven employee base that really cares for its customer and its community. And I think that has helped us up to this point address competitive threats, and it will help us going forward.

About JioMeet, to be honest, I havent looked at the product. But I will say the factors that help us compete, you know, historically are going to be the factors that help us compete going forward, we are focussed on delivering a very secure, very reliable, and very easy to use product. And that we are going to focus on what we can control.

Having said that competition just makes you more hungry. There should be no difference to how that impacts Zoom today as it has impacted Zoom years before as well and all along.

There is speculation about Zoom being a Chinese company. Could you tell us something about its origins?

I will just say that Zoom is not a Chinese company. We are listed on the Nasdaq and our headquarters are here in San Jose. Our founder [Yuan] may be ethnically Chinese, but hes an American citizen. He's been in this country since 1997. His three kids go to the local schools. His life has largely been American by choice.

We were set up with the intention to provide workplace collaboration services, for businesses, and with the view that, if we can provide video conferencing or video collaboration services to enterprises. That would be sort of the holy grail for us. At the end of December, we had around 10 million daily meeting participants. And by the end of April we had 300 million daily meeting participants, and that has been the significant shift during the pandemic.

A lot of it are schools. Education has always had a big value for our company. Erics core passion in education, but it's also our employees core passion. We did a ground-up survey of our employees and education was one of the top three initiatives. So, it made sense when the pandemic hit, to offer countries across the world, the opportunity to have free service for schools.

I think I noticed the difference when we offered K through 12 services for free in the U.S. Suddenly everybody knew about Zoom. We started to get a lot of different use-cases that we had probably not anticipated, because largely we are focussed on enterprises. And the challenge we face going forward is how do we embrace and continue to allow to flourish these various use-cases.

Zoom was made for the enterprise, but individuals took to it in droves. Did problems such as Zoombombing and the like crop up because it wasnt being used the way it was envisaged to be?

Zoom was originally developed for enterprise use and has been confidently selected for complete deployment by a large number of institutions globally, following security reviews of our user, network, and datacentre layers. However, we saw more participation from standalone users, who have been using the platform to connect to their family, friends, and colleagues; increased usage by schools to continue the education processes, etc. A lot of such users are unaware of various security measures one should adopt while on a virtual platform, leading to issues like meeting bombing.

Zoom has recently launched the latest version, Zoom 5.0, that delivers one of our most advanced security enhancements to date with support for AES 256-bit GCM encryption, which provides added protection for meeting data and greater resistance to tampering. The version provides users with features like reporting a user, new encryption icon, and enhanced data centre information which allows more flexibility and security to users.

Let us talk about end-to-end encryption (E2EE) and endless speculation about whether it would be offered to free users. How do you end the speculation?

Well, let me end it right now. We are in the development process for end-to-end encryption. We have already announced that were going to have a limited beta. And then we are going to continue working on rolling out this product through the end of the year. It will be the first end-to-end encryption feature available on video collaboration. Its very hard to do and then it will be the first. What were trying to accomplish is to have in Zoom formats or Zoom scale I want to be very clear that it will be available for all customers across the platform, both paid and free. Were still working out the details, but we will probably deploy some sort of a one-time risk-based authentication for free users that use E2EE.

But at the end of the day, it is extremely important that we provide an opportunity for our customers to have communications that they believe are private and secure. I want to just make sure that youre aware that today even without E2EE, when our customers are using the application and are on the parts of the application that are controlled by Zoom, they have AES 256-bit GCM encryption, which is industry leading today.

All Zoom users will continue to use AES 256 GCM transport encryption as the default encryption, while E2EE will be an optional feature. This is because it limits some meeting functionality, such as the ability to include traditional PSTN phone lines or SIP/H.323 hardware conference room systems. Hosts will toggle E2EE on or off on a per-meeting basis. And account administrators can enable and disable E2EE at the account and group level.

Read the original:
Virtual and face-to-face connect to coexist: Zoom COO - Fortune India

Telegrams TON Blockchain Project and GRAM Cryptocurrency Shelved – the blockchain land

Many experts have regarded cryptocurrency as the future of money and finances around the world. These days, there are a lot of cryptocurrencies available online and more people are getting vested into these types of virtual currencies. Early this year, cryptocurrency has already earned over $155 billion market capitalization.

However, as more people invest their hard-earned money to this relatively new digital investment, cyber threats begin to arise in numbers as well. Bitcoin, the first cryptocurrency, and other virtual money are now susceptible to many cyber threats. In 2014, hackers ran off with about $487 million in bitcoins from Tokyos Mt. Gov exchange while the most prominent cryptocurrency hack that happened in 2018 costs around $534 million.

The risk lies in losing your crypto to a cyber theft that leaves no traces. Thats because governmental entities and central banks do not yet protect cryptocurrencies. Due to their decentralized nature, theres no centralized control over them, as is usually the case for fiat currencies. Cryptos cant be regulated like stock exchanges, which is one of the reasons governments have been skeptical towards them.

Therefore, if you own cryptocurrencies, its crucial to be aware of the risks of cyber-attacks. This is an extremely valid point for all our private data thats out on the internet. As a result of the growing number of people using the internet and the number of frauds and thefts that followed, there has also been a rise in the protection of privacy and data. If its to connect to your e-mail account, social media networks or even your favorite online streaming platform, there are authentication systems at work to protect you. So when it comes to cryptos, a form currency that is slowly growing in terms of adoption, there are already many ways you can protect yourself.

As you invest in cryptocurrency, you need to be on constant move and lookout of possible cyber-attacks and other cyber threats you might encounter. Here are some ways you can do to protect your cryptocurrency investment.

If you are starting to immerse yourself in the crypto world, do not invest everything at once. Doing this can draw attention to your end and have cybercriminals tagging behind you. Start making smaller trades instead to avoid cyber threats. This strategy will avoid putting yourself in the radar of hackers who are on the constant lookout for rich targets. This tactic can also be an excellent way to test yourself so you wont overextend yourself in your investment and exhaust your resources.

This method is probably similar to a piece of advice that you often hear when you make any standard investment. Experts always remind that you should not keep all of your eggs in one basket. As you begin to test the crypto waters, diversify your wallets and distribute your funds among them. You can always start with the most popular ones, such as Coinbase and Binance.

Cryptocurrency wallets are software programs that act as a digital wallet that store your virtual currencies. You can use it to send and receive cryptos and monitor their balance. When you put your money in different wallets, it would be safe to say that if one of them got stolen, you could still recover. It will not mean the end of the crypto adventure for you since the rest of your investment is safely allocated in different places.

Wallets are a much-needed tool in your cryptocurrency investment, so you need to make sure that you only use wallets from known sources. Crypto wallets come in two forms, hot wallets which can connect to the internet and cold wallets that are kept offline and come in types of hardware devices.

It is best also to learn the different types of crypto wallets, which include:

As cryptocurrency starts to be widely ventured by investors, the market has seen a growing number of wallets coming from less reputable companies. These wallets offer compelling features that are sometimes malware in disguise.

Most cybersecurity experts these days always remind people to use two-factor-authentication or 2FA to any of your online accounts. Using 2FA in your cryptocurrency investment accounts adds another second layer of security that helps protect your digital money. It should not only be done on your crypto wallet but also all your online accounts associated with your crypto investment.

When you enable 2FA, it will provide you with a 6-digit code or password through your e-mail or your mobile phone. These codes change within 30 seconds, which makes it hard for hackers and cybercriminals to crack.

Most cybercriminals get creative these days to steal online investment like cryptocurrency. Hackers can often use tempting ads that get users to click on them. Clicking on these ads would then signal a malware to install in your system.

To avoid this, you can install an ad blocker in your browser. This ad blocker extension will help you distinguish between safe ads from a malware-infested ad that hackers use. However, to be completely secure, it is better to avoid and refrain from clicking any advertisement you see on your browser.

It is a must to update your wallet and have it in the latest software. Should you fail to update it, theres a possibility that you expose your funds and investment. When this happens, hackers and cybercriminals can easily take advantage of it.

Closely monitor your mobile and desktop wallets for any updates. However, it would be best if when an update is available, do not rush to download it immediately. At least wait for 2-3 days before updating your wallet because some updates contain bugs when released. Developers can only get to know about it and clear it off when users give in their comments after utilizing the update.

Whenever you deal with money, its best to avoid doing it while connected to a public Wi-Fi. These public Wi-Fi-s may redirect your browser to a phishing version of a wallet or cryptocurrency exchange. Connecting to the unsecured networks can give hackers and cybercriminals a chance to access your mobile devices or laptop. They can collect your data, including your login credentials as well as your other confidential information.

As much as possible, do your online cryptocurrency business on your dedicated devices connected on a secured network. This can be your home Wi-Fi or your phones mobile data. This way, you can avoid any cyber threat that you may encounter on a public connection which can put your investment at risk.

Starting a cryptocurrency investment can be exciting and overwhelming; however keeping it safe from any cyber threats can be tricky, especially if you are new to it. Learn to turn these safety practices into daily habits, so you can be sure that your investment is well kept.

READ:

How Can Cryptocurrenty Impact eCommerce

See original here:
Telegrams TON Blockchain Project and GRAM Cryptocurrency Shelved - the blockchain land

Our View: We should demand that they stop – Daily Astorian

George Floyds death at the hands of Minneapolis police in May forced all of us to examine our attitudes toward institutional racism.

Protests around the country, from big cities like Portland to small towns like Astoria, are a potential turning point. White people who live in communities with very few Black, Hispanic or other people of color are confronting issues that for generations have been convenient to ignore.

One of the most difficult is that the police act on our behalf, using force derived from the governments we elect.

We have been fortunate on the North Coast that protests have been mostly peaceful.

In Portland, protests over the past several weeks have often spiraled into violence. Scenes of vandalism and looting, along with police overreach in attacking journalists and legal observers, have been shared across the United States.

The First Amendment of the U.S. Constitution gives people the right to peaceably assemble, but in nightly clashes downtown near the Multnomah County Justice Center and the Mark O. Hatfield U.S. Courthouse, demonstrators and police have struggled to find the line between protest and riot.

We trust Portland the people who live there, the police, the mayor and other city leaders can find that line.

Unfortunately, the Trump administrations misguided decision to deploy militarized federal agents has dragged the entire country into the streets of Portland.

Last week, a federal agent acting on our behalf, using force derived from the government we elected fired a less-lethal round at a protesters head, causing critical injuries. Oregon Public Broadcasting and other news media have reported that federal agents are patrolling in unmarked vans, snatching protesters who do not appear to be immediate threats to federal property.

The New York Times reported that federal agents on the ground in Portland were not specifically trained in riot control or mass demonstrations.

Oregon Attorney General Ellen Rosenblum filed a federal lawsuit to try to prevent federal agents from detaining protesters in Portland without identifying themselves or without probable cause or warrants. The lawsuit names the U.S. Department of Homeland Security, U.S. Customs and Border Protection, the U.S. Marshals Service and the Federal Protective Service.

The lawsuit alleges their tactics violate the First Amendment right to peacefully gather, the Fourth Amendment right against unreasonable seizures and the Fifth Amendment right to due process.

Citizens who are reasonably afraid of being picked up and shoved into unmarked vans possibly by federal officers, possibly by individuals opposed to the protests will feel compelled to stay away, for their own personal safety, and will therefore be unable to express themselves in the way that they have the right to do, the lawsuit states.

Portland Mayor Ted Wheeler and Gov. Kate Brown have made it clear the federal agents are not welcome. The federal elected officials who represent us U.S. Sen. Ron Wyden, U.S. Sen. Jeff Merkley and U.S. Rep. Suzanne Bonamici demanded the Trump administration remove the forces.

Wyden, in an op-ed for NBC News, faulted President Donald Trump. Not content with simply dropping squads of federal agents into my hometown to clash with peaceful protesters, as he first did in early July after signing an executive order to supposedly protect monuments from protesters, Trump and his acting secretary of Homeland Security, Chad Wolf, have now unleashed these agents like an occupying army complete with fatigues, military-style equipment and tactics that are utterly unacceptable in an American city.

These invaders are mounting this assault against my city on the flimsiest of justifications: While Acting Secretary Wolf rants about law and order, most of the incidents of violent anarchists he cites are actually graffiti, or low-level vandalism.

Portland was chosen as a stage for the Trump administration to make a political statement in an election year. But it would be a mistake to view what has been happening on the streets only through a partisan political lens.

Just like nearly everyone familiar with Floyds death saw the injustice, anyone looking at what federal agents have done in Portland should see the assault on our civil liberties.

They are acting on our behalf, using force derived from the government we elected. We should all demand that they stop.

See the rest here:

Our View: We should demand that they stop - Daily Astorian

Trumps Legal Justification for the Abduction of Portland Protesters Is Absurd – Slate

President Donald Trump talks to reporters on Monday in the White House about expanding his secret police force.Doug Mills/Pool/Getty Images

Over the weekend, a group of Portland, Oregon, moms confronted federal officers who had fired tear gas at them and other peaceful protesters on Saturday outside of a federal courthouse. The escalation of the Portland protests came as unidentified federal officers in paramilitary uniforms were caught on tape abducting protesters and as President Donald Trump announced on Monday that he might send more federal law enforcement to cities run by liberal Democrats to replicate the Portland tactics against protesters, including efforts to grab them, a lot of people in jail. On Monday, it was reported that the Department of Homeland Security would be sending 150 federal agents to Chicago this week with an unspecified mandate. The apparent legal justification for the abduction of protesters is weak, and it should be vigorously challenged in the courts before Trump can export these tactics to other cities for use against citizens exercising their First Amendment rights.

Last week, people wearing combat fatigues were seen pulling apparently peaceful protesters off the streets of Portland, Oregon, and hustling them into unmarked vehicles. Their uniforms carried no identifying insignia, but they were clearly military uniforms.Based on the video evidence so far, the people being arrested were not engaged in crime. So we are faced with two questions.First, are these people military personnel, or are they police officers dressed up like soldiers? Second, do these people have the authority to sweep people off the street like this?

According to the Department of Homeland Security, the answer to the first question is that the force patrolling the streets of Portland consists of the FederalProtective Service, whose job it is to protect federal property. Personnel from other federal agenciesprincipally the Border Patrolhave also reportedly been deputized to assist in that mission.So these uniformed personnel are a militarized police force, which is always a dangerous thing. The answer to the second question is that, under the Fourth Amendment, this force does not have the authority to detain people like this. But government lawyers will rely on expansive theories of police power that cripple Fourth Amendment protection against unlawful seizures.This would not be the first time the federal government has tried this, though it appears to be one of the first targeting people exercising their First Amendment right to protest.

The Federal Protective Service has the authority to make arrests if the officer or agent has reasonable grounds to believe that the person to be arrested has committed or is committing a felony.If that doesnt sound right to you, it shouldnt. People cant be arrested unless the arresting officer has probable causenot merely reasonable groundsto believe a crime has been committed or is underway. Thats required by the Fourth Amendment to the Constitution, which presumptively prohibits seizures without probable cause.

The problem is that this presumption has been overwhelmed by constitutional semantics.When the Supreme Court decided that the stop-and-frisk tactic was permissible under the Fourth Amendment, it created a category of detention short of an arrest and authorized it where a police officer has reasonable suspicion of a crime, instead of probable cause.Over time, the court has set aside the probable cause requirement for every seizure that doesnt count as the direct enforcement of criminal law. When Border Patrol agents arrest someone for sneaking across the border, for example, they dont need probable cause.They dont even need a reasonable suspicion. They only need to detain the person in a reasonable mannerbecause patrolling the border is not criminal law enforcement.So both of the federal agencies involved here have been told they dont need probable cause to make arrests. And the legal theory behind these dangerous rules is the same: that these federal agents are engaged in protecting national security instead of criminal law enforcement.

But where the arrests in Portland are concerned, there are two reasons to believe that this wont stand up.First, there is the word felony in the law authorizing the Federal Protective Service to arrest without probable cause. An arrest for a felony is the direct enforcement of criminal law by definition. Nothing in the semantic campaign to drag as many seizures as possible into the national security category can change that definition. And an arrest for a felony requires probable cause.

Second, when government agents claim they have made a seizure for some purpose other than criminal law enforcementsuch as national securitythe Supreme Court has allowed the target of that seizure to argue that this purported purpose is an unlawful pretext. In the arrests captured on video so far, no imminent threat to federal property can be seen. More importantly, while Trump occasionally mentions protecting property, he has insisted again and again that city officials have failed to get control over antifa, anarchists, and agitators, and that he will do the job if they cant.If we take the president at his word, then the defense of property is a pretext, and the law allowing arrests on a reasonable basis for that purpose doesnt apply.

The uniforms these government agents are wearing are a deliberate attempt to evade accountability. But ultimately, it doesnt matter which federal agency is committing these unlawful seizures.Constitutional search and seizure questions turn on what government officials do, not which agency they work for.The important thing is that federal agents are lawless actors here. Their uniforms are nothing more or less than part of the national security pretext for their actions.

It is important to understand the full implications of the governments legal theory as it is playing out in Portland. It is the equivalent of declaring martial law for purposes of national security, based on the lie that military force is needed to keep the peace. Imposing martial law for national security is a tool of dictators, and Donald Trump has been a dictator in waiting for years. We can only hope that the wait isnt over.

Readers like you make our work possible. Help us continue to provide the reporting, commentary, and criticism you wont find anywhere else.

Read more here:

Trumps Legal Justification for the Abduction of Portland Protesters Is Absurd - Slate