Michael Caselli impressed by innovation of Bitcoin SV platform – CalvinAyre.com

Bitcoin was always designed to be a perfect match for the gambling industry, with its ability to conduct cost efficient and fast payments, while also providing an immutable audit trail that regulators love, and data networking opportunities for enterprising developers. CG London was a great exhibition of this, and it brought out non-executive chairman ofClarion Events Michael Caselli, who reflected on gamblings history with Bitcoin.

Our very own Rebecca Liggero Fontana bumped into Caselli at the event and asked what brought him out. Its right down the road, its the ideal location for me, he said. Gaming industrys here, its a huge global hub and I thought I better come down because I know a lot of other guys from the industry wanted to come down, and are coming down. And whats interesting, anything blockchain is exciting, theres got to be an application that were looking for now. A lot of companies are innovating and trying to find their applications for anything blockchain, and Bitcoin SV is just a really great platform with good throughput, good transaction volumes, the ability to do quite a lot of stuff on the application layers that you cant do on some of the coins, and it just makes a lot of sense that the gaming industry is coming down and Im here to support.

Bitcoin SV, having finally unleashed the power of unlimited scaling on the blockchain, was impressing plenty of visitors at the conference, and Liggero Fontana asked what potential Caselli saw in it. Decentralized solutions are good for a number of different things like exchanges, he said. Trust is an issue, so where theres ever a trust issue for any application, then theres a good solution for that. Trust issues may exist in countries which are yet to regulate, which dont have a regulator thats overseeing whats going on, and then players could really self-regulate whats happening by using an immutable blockchain.

But while Bitcoin SV has only recently started unleashing the true potential of blockchain technology, the concept itself has been around a number of years, and Caselli reflected on how the gambling industry has approached it. We were at fever pitch maybe six, seven years ago whenever things started to kick off, when Bitcoin got to its, you know, $100 value and then climbed to a thousand dollars, he said. And that was exciting and everyones looking at, saying Where does this work, where does this work? And I think there was a lot of adaptation at that time to kind of move the systems over on the payment side of things. And then when smart contracts came out, there was a whole bunch of people launching tokens and launching projects so they can go and they could fund themselves, create some applications in gaming.

Caselli still feels that excitement, and with the ability to store both value and data, he sees big things coming. With the ability to create applications, who knows where were going to go in the future.

Weve interviewed Caselli recently about how the pandemic has affected the gambling industry. You can catch that chat, and all of our future videos, by subscribing to our CalvinAyre.com YouTube channel.

See the original post:
Michael Caselli impressed by innovation of Bitcoin SV platform - CalvinAyre.com

Legacy Acquisition Corp. Terminates its Amended and Restated Share Exchange Agreement with Blue Valor Limited and Seeks a New Target – Business Wire

NEW YORK--(BUSINESS WIRE)--Legacy Acquisition Corp. (NYSE: LGC) (Legacy), a publicly-traded Special Purpose Acquisition Company, today announced that as of July 20, 2020, Legacy terminated the Amended and Restated Share Exchange Agreement, dated December 2, 2019, between Blue Valor Limited, a company incorporated in Hong Kong (Blue Valor), and Legacy, as amended by that First Amendment to the Amended and Restated Share Exchange Agreement, dated March 13, 2020 (the Share Exchange Agreement), and is proceeding to evaluate alternative business combinations.

The termination is in response to the increasing impact on the global advertising sector, and global markets broadly, resulting from the COVID-19 pandemic, which has negatively affected the market valuations.

Pursuant to their respective terms, each of (i) the Sponsor Support Agreement, dated March 13, 2020, by and among Legacy Acquisition I LLC, a Delaware limited liability company (the Sponsor), Legacy and Blue Valor, (ii) the Waiver Agreement, dated March 13, 2020, by and between the Sponsor and Legacy, and (iii) the Warrant Holder Support Agreements, dated March 13, 2020, by and between Legacy and the holders of approximately 19,765,000 (or approximately 65.9%) of Legacys public warrants, are terminated concurrently with the termination of the Share Exchange Agreement. Additionally, the Warrant Amendments described in the Consent Solicitation Statement filed with the Securities and Exchange Commission (the SEC) on May 15, 2020, and subsequently approved by the public warrant holders will not take effect and there will be no redemption rights or liquidating distribution with respect to Legacys warrants. The warrants will expire worthless if Legacy does not complete an alternative business combination.

The Legacy SPAC remains active, and is looking for targets across a broad spectrum of industries and welcomes interested parties to contact: Gary McCullough (garymccullough@legacyacquisition.com), Darryl McCall (darrylmccall@legacyacquisition.com), or Ed Rigaud (edrigaud@legacyacquisition.com).

Forward-Looking Statements:

This Press Release includes forward-looking statements within the meaning of the safe harbor provisions of the Private Securities Litigation Reform Act of 1995. Legacys and the Blue Impact business actual results may differ from their expectations, estimates and projections and consequently, you should not rely on these forward-looking statements as predictions of future events. Words such as expect, estimate, project, budget, forecast, anticipate, intend, propose, plan, contemplate, may, will, shall, would, could, should, believes, predicts, potential, continue, positioned, goal, conditional and similar expressions are intended to identify such forward-looking statements. These forward-looking statements include, without limitation, the anticipated evaluation of alternative business combinations, as well as the impact of termination of the Share Exchange Agreement on the Warrant Amendments.

Legacy cautions readers not to place undue reliance upon any forward-looking statements, which speak only as of the date made. Legacy does not undertake or accept any obligation or undertaking to release publicly any updates or revisions to any forward-looking statements to reflect any change in its expectations or any change in events, conditions or circumstances on which any such statement is based.

Read more here:

Legacy Acquisition Corp. Terminates its Amended and Restated Share Exchange Agreement with Blue Valor Limited and Seeks a New Target - Business Wire

Vivienne Westwood dressed as a canary in Wikileaks protest – Dazed

In a sentence you probably never thought youd be reading circa 9am on a Tuesday morning, Vivienne Westwoodhas been suspended ten feet in the air in a giant bird cage dressed as a canary outside Londons Old Bailey, in protest against Julian Assanges extradition to the United States.

When shed returned to the ground and emerged from the cage, Westwood, in an all-yellow suit, told reporters: Julien Assange is the canary in the cage, he has been trapped by a big net, taken out of the sun and shoved in a cage, and called his arrest a stitch-up. For the rest of his life he will become a symbol of what happens to you if you dare to expose the truth. Telling the truth is not a crime, the designer and activist, who has long been a vocal supporter of Assange, added.

Currently held on remand in Belmarsh Prison in London, the Wikileaks founder is set to appear at an extradition hearing in early September, with the US government pushing for him to be brought back to America to stand trial for allegedly conspiring to hack into military databases and publishing information about the Iraq and Afghanistan wars. Westwood'sstunt comes the day before his lawyers are set to make a bail application at Westminster Magistrates Court.

Of course, Westwood is no stranger to putting her money where her mouth is when it comes to taking action for the causes she believes in. Away from the runway, where she has long made her ideology known, in 2018 the legendary British designer headed to a proposed fracking site in Lancashire to protest against the practice, making headlines as she danced to Abbas Dancing Queenalongside hundreds of others who had also turned out. More recently, shes been backing Greta Thunbergin her fight against climate change, telling The Big Issue she would make a great world leader.

Read more from the original source:

Vivienne Westwood dressed as a canary in Wikileaks protest - Dazed

IOSCO’s proposed guidance for regulation on the use of artificial intelligence and machine learning – Lexology

The International Organization of Securities Commissions (IOSCO) has recently issued a consultation report to propose guidance for members in regulating the use of artificial intelligence (AI) and machine learning (ML) by market intermediaries and asset managers (collectively, Firms). The consultation period will end on 26 October 2020. IOSCO will issue final guidance to its members based on the consultation conclusions. It is likely that IOSCO members, including the Hong Kong Securities and Futures Commission, will follow the guidance and in due course adopt IOSCOs suggested measures into their regulatory framework. The consultation report also includes a discussion of the existing regulatory framework for the use of technologies in different financial markets for reference purposes.

The consultation report describes AI as a combination of mass data, sufficient computing resources and machine learning, and describes ML as a method of designing a sequence of actions to solve a problem, which optimise automatically through experience, with or without human intervention. IOSCO noted the increasing use of AI and ML by market intermediaries in the provision of advisory and support services, risk management, client identification and monitoring, selection of trading algorithms and asset management/ portfolio management. For asset managers, AI and ML techniques may be deployed to optimise portfolio management, complement human investment decision-making processes by suggesting investment recommendations and improve internal research capabilities, as well as for back office functions.

Through its engagement with financial markets, IOSCO identified several risk areas involving the use of AI and ML and proposed six measures to regulate Firms use of AI and ML. For Hong Kong licensed corporations, these measures will be familiar from the electronic trading rules in Chapter 18 and Schedule 7 to the Code of Conduct for Persons Licensed By or Registered with the Securities and Futures Commission. However, the IOSCO proposals are much broader than purely electronic trading, as they relate to the use of AI and ML generally throughout a Firms business.

1.

Governance and oversight

Firms should designate senior management responsible for the oversight of the development, testing, deployment, monitoring and controls of AI and ML. They should also document their internal governance framework, with clear lines of accountability. Senior management should designate an appropriately senior individual (or groups of individuals), with the relevant skill set and knowledge to sign off on initial deployment and substantial updates of the technology.

2.

Algorithm development, testing and ongoing monitoring

Firms should adequately test and monitor the algorithms they use to validate the results of AI and ML techniques used on a continuous basis. The testing should be conducted in an environment that is segregated from the live environment prior to deployment to ensure that AI and ML behave as expected in stressed and unstressed market conditions and operate in a way that complies with regulatory obligations.

3.

Data quality and bias

Firms should have appropriate controls in place to ensure that the data on which the performance of AI and ML is dependent is of sufficient quality to prevent biases and is sufficiently broad for a well-founded application of AI and ML.

4.

Transparency and explainability

Firms should disclose meaningful information to customers and clients around their use of AI and ML that impact client outcomes.

5.

Outsourcing

Firms should understand their reliance upon and manage their relationship with third party service providers, including ongoing oversight and monitoring of the performance of the service providers. To ensure adequate accountability, Firms should have a service level agreement and contract in place with each service provider clarifying the scope of the outsourced functions and the responsibilities of the service provider. This agreement should contain clear performance indicators and should also clearly determine sanctions for poor performance.

6.

Ethical concerns

Firms should have adequate skills, expertise and experience to develop, test, deploy, monitor and oversee the controls over the AI and ML that they utilise. Compliance and risk management functions should be able to understand and challenge the algorithms that are produced and conduct due diligence on any third party service provider, including on the level of knowledge, expertise and experience of the service provider. This measure sets a high standard for compliance and risk management functions that may be hard to achieve, particularly where an algorithm develops organically in ways that may not have been originally anticipated.

What does this mean for financial intermediaries?

Subject to the consultation conclusions, the six suggested measures will become fundamental principles for IOSCOs members to use in formulating their AI and ML regulations in the future. When designing or developing businesses involving the use of AI and ML, financial intermediaries are encouraged to use the suggested measures as a guide for their compliance infrastructure, in addition to compliance with local regulatory requirements.

Read this article:
IOSCO's proposed guidance for regulation on the use of artificial intelligence and machine learning - Lexology

Brave New Coin signs multi-year deal to power cryptocurrency options trading on tFOSE – HedgeWeek

Digital asset trading, research and data company Brave New Coin has agreed a multi-year partnership with Toronto Futures Options Swaps Exchange tFOSE, a new Canadian-based derivatives exchange and clearinghouse currently seeking regulatory approval in Canada. Brave New Coin will design, calculate and administer a suite of cryptocurrency indices to power cash-settled options trading on tFOSE.

Canada has not yet made significant progress in bringing institutional-grade cryptocurrency products to the market. Brave New Coins indices will enable tFOSEs clients both in Canada and globally to trade crypto derivatives on a fully-regulated Canadian exchange. This allows traders to diversify their portfolios and exposure, hedge risk, and access an emerging asset class without having to directly hold the underlying cryptocurrency as they are cash-settled products.

After extensive research and due diligence, tFOSE selected Brave New Coin for its deep expertise in generating insightful crypto market data and indices, said James Beattie, President and CEO at tFOSE. Brave New Coin meets all of our needs, taking a unique approach to index design, methodology, and governance that will help tFOSe meet the specific, exacting needs of both our retail and institutional investors.

The crypto ecosystem is maturing and demand for regulated investment products from institutional markets is growing, says Fran Strajnar, CEO and Founder of Brave New Coin. Our partnership with tFOSE furthers our role as a leader in market data, indices, and benchmarking for crypto assets. Weve dedicated our company to building products that bring institutional-grade services to this emerging asset class.

Brave New Coin provides data and index solutions for several partners including NASDAQ, Amazon Alexa, BTSE.com, TPICAP and Dow Jones Factiva. When you ask Amazons Alexa for the price of any cryptocurrency, her answer comes from Brave New Coins data engine. Its partnership with tFOSE will see BNC providing unique, specialised indices to tFOSE.

BNC and tFOSE are already in the process of designing, developing, and testing the indices. The indices will be available for production in Q3 2020, beginning with the tFOSE BNC Litecoin Index. Cryptocurrency cash-settled options trading is expected to launch on tFOSE in 2021, subject to regulatory approval.

More:
Brave New Coin signs multi-year deal to power cryptocurrency options trading on tFOSE - HedgeWeek

The Business Case for Protecting the Keys to the Kingdom – Security Today

The Business Case for Protecting the Keys to the Kingdom

An enterprise key management system can prevent data breaches, produce efficiency savings, simplify compliance, and enable digital transformation.

In the battle for security budget funding, enterprise key management isnt nearly as sexy as technologies such as threat hunting or blockchain cybersecurity. Nevertheless, a key management system (KMS) is a behind-the-scenes workhorse that manages and protects the very keys that can open the kingdom. While a KMS is likely already a line item in the annual security budget, an investment to modernize a KMS to extend data security to the cloud will certainly pay dividends by reducing the risk of a data breach.

What is key management, and why is it necessary? Key management is the practice of administering the lifecycle of cryptographic keys in accordance with best practices such as those defined by the National Institute of Standards and Technology (NIST). In its Recommendation for Key Management, NIST states:

The proper management of cryptographic keys is essential to the effective use of cryptography for security. Ultimately, the security of information protected by cryptography directly depends on the strength of the keys, the effectiveness of mechanisms and protocols associated with the keys, and the protection afforded to the keys.

The fundamental requirements of key management are to generate cryptographically strong keys, protect the keys against disclosure or alteration, and provide effective controls for managing and using keys.

What is a Key Management System?While encryption is built into many products today, the capabilities for generating and storing keys are often rather rudimentary and generally fall short of standards such as NIST SP 800-57. Electronic key management systems are commonly used to consolidate and centralize the management of keys across the enterprise in accordance with industry standards and best practices for data security.

A central capability of any KMS is systematic management of keys over their entire lifecycle, including generation, import/export, distribution, usage, update, backup, revocation, and deletion. A KMS should also provide controls to ensure that keys can be accessed only by authorized individuals and systems and used only for their intended purposes. All key operations should be logged for audit and compliance purposes.

View original post here:
The Business Case for Protecting the Keys to the Kingdom - Security Today

Microsoft will disable insecure TLS in Office 365 on Oct 15 – BleepingComputer

Microsoft has set the official retirement date for the insecure Transport Layer Security (TLS) 1.0 and 1.1 protocols in Office 365 starting with October 15, 2020, after temporarily halting deprecation enforcement for commercial customers due to COVID-19.

"As companies have pivoted their supply chains and countries have started to re-open we have re-established a retirement date for TLS 1.0 and 1.1 in Office 365 to be October 15, 2020," the company said in the MC218794 Microsoft 365 admin center announcement on Friday.

"As previously communicated [..], we are moving all of our online services to Transport Layer Security (TLS) 1.2+ to provide best-in-class encryption, and to ensure our service is more secure by default."

The TLS 1.0/1.1 retirement was first announced in December 2017 and, as explained by Microsoft, the effect of this change for end-users is expected to be minimal.

IT administrators can use the official KB4057306 documentation to prepare for TLS 1.2 in Office 365 and Office 365 GCC.

They can also download this Office 365 TLS deprecation report to quickly identify the users and devices that connect to Exchange servers via TLS 1.0/1.1.

At the moment, users of the following clients are advised to update to the latest versions as they are known to be unable to use TLS 1.2:

Android 4.3 and earlier versions Firefox version 5.0 and earlier versions Internet Explorer 8-10 on Windows 7 and earlier versions Internet Explorer 10 on Windows Phone 8 Safari 6.0.4/OS X10.8.4 and earlier versions

Microsoft also provides a whitepaper with guidance on how to identify and remove TLS 1.0 dependencies in software built on top of Microsoft operating systems as a starting point for a migration plan to a TLS 1.2+ environment.

As part of any TLS 1.0/1.1 deprecation plan, Microsoft recommends including the following:

Application code analysis to find/fix hardcoded instances of TLS 1.0/1.1. Network endpoint scanning and traffic analysis to identify operating systems using TLS 1.0/1.1 or older protocols. Full regression testing through your entire application stack with TLS 1.0/1.1 and all older security protocols disabled. Migration of legacy operating systems and development libraries/frameworks to versions capable of negotiating TLS 1.2. Compatibility testing across operating systems used by your business to identify any TLS 1.2 support issues. Coordination with your own business partners and customers to notify them of your move to deprecate TLS 1.0/1.1. Understanding which clients may be broken by disabling TLS 1.0/1.1.

Microsoft has already begun deprecating insecure TLS for any clients, devices, or services connecting to Office 365 through TLS 1.0 or 1.1 DoD or GCC High instances as of January 2020.

The two protocols will also become unsupported for commercial Office 365 customers, with the company recommending "that all client-server and browser-server combinations use TLS 1.2 (or a later version) in order to maintain connection to Office 365 services."

In September 2019, Microsoft announced that Windows Server 2019 enables admins to block weak TLS versions from being used with individual certificates via a new "Disable Legacy TLS" feature to make it easier to migrate to TLS 1.2+.

The company also said in March that the TLS 1.0/1.1 retirement in Microsoft browsers would be postponed until July for Chromium-based Edge and September 8 for supported versions of Internet Explorer 11 and Microsoft Edge Legacy.

The retirement of these insecure TLS protocols was announced by all major browser makers including Microsoft, Google, Apple, and Mozilla back in October 2018.

Although users will still be able to re-enable TLS 1.0/1.1 in their browsers after being disabled by default, Microsoft advises against it as newer TLS versions come with more modern cryptography and are more broadly supported by modern web browsers.

With over 97,5% of all sites surveyed by Qualys SSL Labs featuring TLS 1.2 or TLS 1.3 support, the browser vendors' decision to disable TLS 1.0/1.1 in favor of newer protocols is a rational move as they can provide a more secure path going forward.

Netcraft also said in March that the insecure TLS 1.0/1.1 protocols are still in use on over 850,000 websites, exposing their visitors to a wide range of cryptographic attacks (1, 2) that could allow threat actors to decrypt their web traffic.

See the original post:
Microsoft will disable insecure TLS in Office 365 on Oct 15 - BleepingComputer

Setting up passwordless login from Amazon EC2 Windows and Linux instances to Amazon RDS Oracle database instances – idk.dev

In todays world, every organization uses a centralized location to store and manage user credentials. The most commonly used service for this is Microsoft Active Directory (AD). Organizations use LDAP protocol to authenticate users to their peripheral devices, but fewer companies use this centralized credential store to allow users to log in to their databases. If you dont use a centralized Active Directory for database authentication, the database administrator has to maintain separate key chain for every database a user needs access to. And implementing security measures such as changing passwords periodically becomes a nightmare.

Kerberos is a network authentication protocol that functions by implementing secret key cryptography. This system is used to verify the identity of a user or a host. System administrators can use AWS Directory Service for Microsoft Active Directory to manage the Active Directory. You can use the same AD credentials to log in to an Amazon Elastic Compute Cloud (Amazon EC2) instance and further authenticate into an Amazon Relational Database Service (Amazon RDS) Oracle database instance. This is all done by using tokens. With Kerberos, after the first authentication, the client holds a ticket so that additional authentication attempts dont overload the AWS Managed Microsoft AD authentication server. In addition, Kerberos facilitates a strong and secure authentication without transmitting passwords. As an additional benefit, you get access to a centralized place to store and manage credentials for multiple database instances.

The purpose of this post is to assist you in setting up Kerberos authentication for Amazon RDS using Oracle database instances from scratch. It delineates specific steps for creating an AWS Managed Microsoft AD, AD users, setting up an Amazon EC2 Linux or Windows instance to connect to an AWS Managed Microsoft AD, and using Kerberos authentication to log in to a database instance from an EC2 instance.

The steps in this walkthrough are structured to complete the setup with minimum configuration changes. For this post, you use Windows Server 2019 AMI for Amazon EC2 Windows, an Amazon Linux 2 AMI for Amazon EC2 Linux, and Oracle Enterprise Edition 12.2.0.1 for Amazon RDS Oracle instance.

After the solution is implemented, users can use the same AD credentials to log in to an EC2 instance and log in to the database with the same credentials. A database administrator still has to create a user account at the database level with the same name as in Active Directory. You also still manage the required grants and privileges of the user at the database level as you would for any other database level user. The only difference is that you dont manage the user credentials. This provides two-layer security protection. When the user no longer needs database access, you can simply revoke access at the database level. If the user is no longer needed and is removed from Active Directory, the database access is removed automatically.

The following diagram illustrates the solution architecture.

The workflow includes the following steps:

This Oracle feature has been tested with Oracle Client (SQL*Plus) and Oracle SQL Developer with a JDBC thin client. For other clients, refer to vendor support or the documentation for Kerberos support.

The following are the high-level steps to configure an Amazon EC2 Linux or Windows machine that connects to an AWS Managed Microsoft AD and uses Kerberos authentication to log in to an Amazon RDS Oracle database instance:

After you complete these steps, you can log in to an Amazon RDS Oracle database instances using passwordless login.

These steps include setting up an AWS Managed Microsoft AD and launching an EC2 instance as part of the AD domain. If your environment already has an EC2 instance set up that is part of the AD domain, you can jump to Step 5: Installing Oracle Client. These steps work using an AWS Managed Microsoft AD.

To set up Kerberos authentication using an on-premises or self-hosted Microsoft AD, create a forest trust or external trust. The trust can be one-way or two-way. For more information about setting up forest trusts using AWS Directory Service, see When to Create a Trust Relationship.

To create a new directory, perform the following steps. Before starting this procedure, make sure that you have completed the prerequisites identified in AWS Managed Microsoft AD Prerequisites.

For more information, see Create Your AWS Managed Microsoft AD directory.

To manage the Active Directory from an EC2 Windows instance, complete the following steps.

Complete the following steps to create additional users as necessary. By default, all users get access to log in to any Amazon EC2 Linux instance. To get RDP access to connect to the Amazon EC2 Windows instance, the users need to be added to the appropriate AWS delegated groups in the AD.

The following steps add an EC2 instance to be part of the AWS Managed Microsoft AD. This post shows how to use an Amazon Linux 2 AMI and Windows Server 2019. After you add the instance, log in using an AD user and verify the connectivity between Amazon EC2 and Amazon RDS instance with a utility like telnet.

To use Linux, complete the following steps:

For instructions on joining an Amazon EC2 Windows instance to an AWS Managed Microsoft AD, see Seamlessly Join an Amazon EC2 Windows instance.

In this step, you install the appropriate Oracle client software on the Amazon EC2 Linux or Windows instance, which is a part of AWS Managed Microsoft AD. For this post, we tested the solution on an Oracle 12.2.0.1 client version.

On Windows, it also works with SQL Developer (without the need to install Oracle client with it).

In this step, you modify the Amazon RDS Oracle instance from the console to enable Kerberos authentication.

Alternatively, enter the following code:

The following steps set up the Kerberos configuration files and configure sqlnet.ora to enable Kerberos authentication service. This post presents the steps for both Linux and Windows.

To use Linux, complete the following steps.

For example, see the modified code:

Oracle doesnt understand the KEYRING cache format. Therefore, we changed it to FILE format.

To use Windows, first download and install MIT Kerberos for Windows 4.1. For more information about Kerberos and downloading links for the installer, see Kerberos: The Network Authentication Protocol.

krb5cache is a file (not a directory) managed by the Kerberos software, and it should not be created by the user. If you receive a permission error when you first use Kerberos, make sure that the krb5cache file doesnt already exist as a file or a directory.The following example code is of the krb5.ini file contents:

Its preferable to set the cache location via configuration file using the %{uid} file name format. This ensures that the file names are unique for every user. Dont set the KRB5CCNAME system variable when the default cache name is defined in the configuration file. Additionally, you cant use %{uid} as a file name format when passed as a system variable.

If Oracle Client is installed, edit sqlnet.ora to add the following parameters:

If youre using SQL Developer, no additional configuration changes are required (you can also skip the step to install MIT Kerberos software).

In the connection string properties, for Authentication Type, choose Kerberos and enter the credentials.

To connect to the database, complete the following steps:

For Windows, enter the following code:

For Windows, no additional environment variables are required.

For Windows, enter the following code:

The following troubleshooting steps are the same for both Linux and Windows (in Windows, Oracle Client must be installed).

This post described how to set up Kerberos authentication for Amazon RDS Oracle database instances. For more information, see Using Kerberos authentication with Amazon RDS for Oracle and Configuring Kerberos Authentication.

If you have any questions, concerns, or comments, please leave your thoughts in the comments section.

Tirthadeep Roy is a Cloud Support Engineer with Amazon Web Services.

See more here:
Setting up passwordless login from Amazon EC2 Windows and Linux instances to Amazon RDS Oracle database instances - idk.dev

Naver newly invests in 2 data-related startups – The Korea Herald

(Naver Inc.-Yonhap)

Naver's D2 Startup Factory, also known as D2SF, said it has selected the two startups that have expertise in developing solutions that are essential in data processing.

"The amount of data processing is increasing 61 percent every year globally," said Yang Sang-whan, an official in charge of D2SF, adding that the two startups have potential to become frontrunners in the field.

A team of seven engineers at Cloa aims to pioneer the next generation of data infrastructure for cloud and edge computing.

"What Cloa aims to do is to provide a solution to support data processing pipelines in real time," CEO Morgan Lim said. "The core point is to process data rapidly in the midst of floods of data."

The entrepreneur said the company plans to enroll the solution by the end of this year for the cloud computing market and further make inroads into the edge computing market as even edge devices need real-time data processing.

Desilo Inc. is currently in the process of developing a homomorphically encrypted machine learning solution amid the rising concerns over privacy invasion.

Homomorphic encryption is a form of encryption that differs from typical encryption methods by allowing computation to be performed directly on encrypted data, minimizing possible data leakage and security breaches.

"Our vision is to create the data-centered world without sacrificing privacy," said CEO Lee Seung-myung, adding that the technology can be applied in many fields, such as genome analysis and remote monitoring systems.

Given the rise of machine learning applications using sensitive private data, implementing the algorithm will provide security to many companies in various industries, the entrepreneur said. (Yonhap)

Visit link:
Naver newly invests in 2 data-related startups - The Korea Herald

Heres how connected health and artificial intelligence is transforming healthcare industry – YourStory

As the world grapples with a new way of life and the COVID-19 crisis peaks, its impact on everyones mental and physical health is indescribable.

The pandemic is not only creating a major impact on the global economy, it is also helping to accelerate the development and commercialisation of several emerging technologies that previously received lukewarm consumer response. This is predominantly accurate for innovations that reduce human-to-human contact, automate processes, and increase productivity amid social distancing.

With Artificial intelligence (AI) and Internet of Things (IoT) rapidly gaining ground in varying forms and degrees, the use of these innovation has begun to appear in a wide spectrum of technologies - from the phones we use to communicate to the supply chains that bring goods to market. It is modifying the way we interact, consume information, and obtain goods and services.

Healthcare is no exception to this new disruption. In the medical industry, the impact of AI, IoT, and other technologies through natural language processing (NLP) and machine learning (ML), is transforming care delivery.

Data suggests that AI simplifies the lives of patients, doctors, and hospital administrators by performing tasks that are typically done by humans, but in less time and at a fraction of the cost.

A major trend in medicine, when it comes to AI, is using deep learning in medical diagnosis to detect cancer. A recent study published in the Journal of the National Cancer Institute shows that the AI system has achieved a breast cancer detection accuracy comparable to an average breast radiologist.

With the ability of AI networks to train radiologists, there are chances that their performance will be significantly improved in the nearest future.

Another promising implementation is the use of AI and the Internet of Medical Things in consumer health applications, which allows them to gather healthcare data and process the information and offer adjustments to the current lifestyle of a patient.

When it comes to medical diagnosis, doctors have seen that applying AI & IoT to medical diagnosis provides numerous benefits to the healthcare industry. AI and IoT based software can tell whether a patient has a certain disease even before evident symptoms appear.

But what AI is extensively helping doctors in is the ease that it is providing in classifying diseases. With deep learning technologies that analyse images and recognise patterns, it is creating a huge potential in generating algorithms that are helping healthcare officials in diagnosing diseases faster.

Moreover, research suggests that AI-driven software can be programmed to accurately spot signs of a certain disease in medical images such as MRIs, X-rays, and CT scans. Existing similar solutions already use AI for cancer diagnosis by processing photos of skin lesions.

By using such tools, doctors are able to diagnose patients more accurately and prescribe the most suitable treatment for them at an earlier stage, resulting in increasing the chances of cancer prevention.

Henceforth, we can say that from patient and self-service to chatbots, computer-aided detection (CAD) systems for diagnosis, and image data analysis to identify candidate molecules in drug discovery, AI, IoT and other technologies are already at work.

They are swiftly helping in increasing convenience and efficiency, reducing costs and errors, and generally making it easier for more patients to receive the healthcare they need. While each technology can contribute significant value alone, the larger potential lies in the synergies generated by using them together across the entire patient journey, from diagnoses to treatment, to ongoing health maintenance.

It can easily be said that AI and IoT solutions can lead to better care outcomes and improve the productivity and efficiency of care delivery. They can also improve the day-to-day life of healthcare practitioners, letting them spend more time looking after patients, and in doing so, raise staff morale and improve retention.

It can even offer life-saving treatments to markets faster. With the increased use of AI and IoT in healthcare, it will certainly influence the types of new entrants into the healthcare industry as well as influence how providers, clinicians, and other staff will work in the future.

In India, the last five years have seen consumer-facing health tech being talked about and embraced by investors, government, and gradually by the public. Among educated consumers in urban areas, technology is largely gaining traction through online health service aggregators, telemedicine, e-pharmacies, and a few fitness apps. Existing methods are also being used to reinvent healthcare delivery in the form of online consults or chat-based basic healthcare service apps, especially during these unprecedented times.

For our country, we can conclude that these advanced technologies in healthcare are helping expand the human capacity rather than replacing human labour altogether. Putting us in a unique position to be the driver for AI and IoT technologies in healthcare space for national and international companies.

With large amounts of data and a burgeoning startup community, India has the opportunity to address many healthcare-related problems by using them. With new disruptions in healthcare innovations, we will soon be in a position to realise the benefits of these technologies on health outcomes.

Irrespective of a patients location or condition, an evolution of the AI, IoT, IoMT ecosystem will become progressively impactful. And even the most remote locations will benefit from better access to care as connected medical devices continue to find their way into the hands of both patients and clinicians.

Connected health and Artificial intelligence in healthcare is no more a thing of the future, it is slowly transforming the now that we are living in.

(Disclaimer: The views and opinions expressed in this article are those of the author and do not necessarily reflect the views of YourStory.)

Want to make your startup journey smooth? YS Education brings a comprehensive Funding Course, where you also get a chance to pitch your business plan to top investors. Click here to know more.

More here:
Heres how connected health and artificial intelligence is transforming healthcare industry - YourStory