Page 1,744«..1020..1,7431,7441,7451,746..1,7501,760..»

Virtru Named ‘Best Overall Encryption Solution’ in the 2022 – GlobeNewswire

WASHINGTON, Oct. 06, 2022 (GLOBE NEWSWIRE) -- Virtru, a global leader in data protection, has been selected as the winner of the Overall Encryption Solution of the Year'' award in the 2022 CyberSecurity Breakthrough Awards. The CyberSecurity Breakthrough Awards aim to perform the most comprehensive evaluation of cybersecurity companies and solutions on the market today.

Virtrus end-to-end encryption solutions span across Google Workspace, Google Cloud, Microsoft 365, and data flowing through SaaS apps like Salesforce and Zendesk. Virtrus easy-to-use data protection enables secure, compliant information sharing to unlock digital workflows and protect organizations most sensitive data at all times, even after it leaves their network. Virtru encryption holistically protects data of all kinds, wherever its stored and shared, with granular access controls, self-hosted key management options, data loss prevention, audit, and more.

The Virtru team is thrilled to be recognized for our versatile encryption solutions that help businesses work smarter and faster every day, said Virtru CEO John Ackerly. "Our end-to-end encryption technology safeguards essential data for more than 7,000 global organizations. By securing that vital data, we equip our customers to securely collaborate, innovate, and grow.

Judges for the CyberSecurity Breakthrough Awards are senior-level, experienced cybersecurity professionals, including journalists, analysts, and technology executives. Judges evaluated entrants based on product innovation, performance, ease of use and manageability, functionality, value, and impact.

About VirtruAt Virtru, we empower organizations to easily unlock the power of data while maintaining control everywhere its stored and shared. More than 7,000 global customers trust Virtru to power their Zero Trust strategies and safeguard their most sensitive data in accordance with the worlds strictest security standards. Creators of TDF (Trusted Data Format), the open industry standard for persistent data protection, Virtru provides encryption technology for data shared through email, collaboration tools, cloud environments, and enterprise SaaS applications. For more information, visit https://www.virtru.com or follow us on Twitter at @virtruprivacy.

Contact

Phil TortoraREQ on behalf of Virtruptortora@req.co

A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/28da3ffd-2b2f-4a28-a9e3-3c2a2d4e12a5

Go here to read the rest:
Virtru Named 'Best Overall Encryption Solution' in the 2022 - GlobeNewswire

Read More..

Loads of PostgreSQL systems are sitting on the internet without SSL encryption – The Register

Only a third of PostgreSQL databases connected to the internet use SSL for encrypted messaging, according to a cloud database provider.

Bit.io, which offers a drag-and-drop database as a service based on PostgreSQL, searched shodan.io to create a sample of 820,000 PostgreSQL servers connected to the internet over September 1-29. Of this sample, more than 523,000 PostgreSQL servers did not use SSL (64 percent).

The company said this left open the possibility for outsiders to snoop on the data transmitted to and from the server. It also noted 41 online PostgreSQL servers did not even require a password.

"When you connect to a website through your web browser, data you send and receive is probably encrypted," bit.io CTO Jonathan Mortensen said in a blog post. "It's amazing, then, that data sent to and from Internet-connected PostgreSQL servers is very likely unencrypted. It's a problem."

The company also conducted an informal survey of 22 popular SQL clients. It found only two require encrypted connections by default, while six will ask for encryption but silently accept an unencrypted connection. The rest are unencrypted by default, and require opt-in to using SSL.

Also discovered was that more than 43 percent of those with SSL certificates were self-signed. This means that while they are encrypted, the certificates often do not confer trust as they may not be issued or validated by a certificate authority, the company said. Meanwhile, 4 percent of the certificates had expired.

EDB, a consultancy specialized in building and supporting PostgreSQL systems, pointed out that it was the minority of PostgreSQL databases that were connected to the internet, and that the open source system does not accept connections from the internet by default.

Marc Linster, EDB CTO, told The Register: "It seems that some database hosting providers are doing their customers a disservice by not giving them the ability to provide a restricted network access list."

The recommended approach was to give customers the option of an allow list to restrict network access, he said.

Linster pointed out that PostgreSQL has a built-in firewall of sorts called the pg_hba.conf. Since external connections are disallowed by default, if developers need to open up PostgreSQL to the internet, they should do it via an app server that sits within a corporate firewall.

He also said that production databases should have valid SSL certificates. The pg_hba.conf allows you to restrict traffic to only SSL connections by simply changing host to hostssl, as mentioned in the blog.

DBAs who manage PostgreSQL should review the firewall settings to ensure that connections are restricted to application servers and that the connection is hostssl, so only SSL connections can be made, Linster said.

For database-as-a-service (DBaaS), DBAs and developers (or any decision maker) should ensure the hosting provider allows the customer to provide an allow list and supports Bring Your Own Certificates (BYOC).

Read more from the original source:
Loads of PostgreSQL systems are sitting on the internet without SSL encryption - The Register

Read More..

Encrypted messaging app Signal might be next to have Stories-like feature – 9to5Mac

Snapchat certainly made photos and videos that disappear after 24 hours a popular feature. Instagram, TikTok, and many other platforms followed suit, and nowadays, Stories are everywhere. Now it seems that the popular encrypted messaging app Signal might be next to have a Stories-like feature.

The latest beta version of the Signal app, which was released this week, comes with Stories and they work the way you probably imagine. Stories let you create and share images, videos, and texts with your friends on Signal that will automatically disappear after 24 hours, said one of Signals developers in a blog post (via Engadget).

Reinforcing Signals commitment to end-to-end encryption, the developer says that the Stories feature also has the same technology in order to ensure users privacy. The app will provide options to let users decide who can see their Stories. It will also be possible to share Stories with a custom list of friends or with specific groups. Other people can see, react, and reply to a Story.

Stories are, of course, end-to-end encrypted, giving you a new way to communicate on Signal without compromising privacy. You are always fully in control of who you share your stories with.

You can share your stories with all of your Signal connections (Signal connections = your contacts + anyone youve had a 1:1 chat with), or with a custom list of friends, or with any of your Signal groups. When you share stories to groups, anyone else in that group can view, share, react, and reply to that group story.

But unlike platforms like Instagram, Signal will let users turn off Stories completely if theyre not a fan of the feature. Its worth noting that since this is a beta feature, only other users using the beta app will see Stories. There are no details on when the update will become available to the public.

Other social networks like Twitter have also tried to push their own Stories solution. However, in this case, Twitter later discontinued Fleets after confirming that the feature never had appeal among its users.

Read also:

FTC: We use income earning auto affiliate links. More.

Check out 9to5Mac on YouTube for more Apple news:

Read more from the original source:
Encrypted messaging app Signal might be next to have Stories-like feature - 9to5Mac

Read More..

Hardening data security in the cloud – The Register

Sponsored Feature As enterprises continue to migrate applications into the cloud, security concerns about the data those workloads store and process are inevitable. But how can IT departments be certain that sensitive information covered by stringent data protection laws hosted in public, private and hybrid cloud environments spanning multiple servers and locations is adequately protected from both internal and external threats?

One potential answer is Confidential Computing, which isolates data within a encrypted portion of a server's memory to make sure it cannot be accessed or tampered with. Predictions from the Everest Group published last year indicate that demand for confidential computing solutions will grow at a compound annual growth rate (CAGR) of 90-95 percent over the next five years to be worth US$54bn by 2026.

That momentum is partly down to the Confidential Computing Consortium, a community of suppliers at the Linux Foundation focussed on projects securing data in use and accelerating the adoption of confidential computing through open collaboration.

Intel is a key memory of the Consortium, and provides its own approach to Confidential Computing through the IntelSoftware Guard Extensions embedded within its latest generation Intel Xeon server chips. These establish isolated enclaves, or a Trusted Executive Environment (TEE), within the memory. Inside an enclave, designated application code and sensitive data are protected and out of view of both internal and external threats. That includes preventing access from other applications running on the system that might be corrupted by malware particularly useful in maintaining data integrity and security in multi-tenanted cloud environments that could be susceptible to insider threats as well as external cyber attacks.

"By isolating data within a CPU during processing, those CPU resources are only accessible to authorized programming code they are isolated from everything and anyone else", explains Paul O'Neill, Intel director of strategic business development and confidential computing.

"As a result the data is not readable by human admins as well as the cloud providers' hypervisors, other tenants or the operating system. So you no longer have to trust the cloud provider's security even if they were corrupted and intentionally malicious."

Sensitive code and data outside the enclave is encrypted, and only decrypted once inside the enclave. Results or data created by the application running within the TEE is encrypted again when it leaves the enclave to make sure it remains confidential at all times.

Intel SGX offers an additional layer of beyond data and application isolation inside the TEE. The remote attestation function verifies that a cloud user's SGX-enabled application can be trusted. Attestation provides cryptographic assurance that the enclave is running on a genuine Intel SGX-enabled platform, the processor's microcode security patches are up-to-date, and the application software is exactly what the user authorized. With this assurance, confidential data can be released into the enclave. Pre-examining the security status of a remote server is a necessary precaution that every device and application and process should take when seeking to connect, and the Intel SGX remote attestation feature provides a hardware protected method for this important step.

Financial services to the fore

Any guarantee of trust and data integrity is an attractive option for public and private sector organisations which routinely share and process sensitive, personally identifiable information (PII) tightly regulated by national and regional data protection regulations including those in financial services, healthcare and retail.

"The early adopters of Confidential Computing, and Intel SGX , are financial services and healthcare organizations ready for complex computing. The reason for that is twofold," says O'Neill.

"One is that they are dealing with the most sensitive datasets, and the second is that they need to harness the economics of the cloud".

Confidential Computing is starting to allow banks, insurance companies and other financial institutions to take sensitive datasets into the cloud, once an unthinkable prospect for such sensitive data. Once there, they can safely harness the scale of the cloud's massive compute resources and apply artificial intelligence and machine learning (AI/ML) analytics to workloads like Anti Money Laundering (AML), credit qualification, market rate calculations, credit scores, loan fulfilments and Know Your Customer (KYC) all workloads which they have previously struggled to migrate due to the privacy regulation and security concerns involved.

A global reinsurance provider uses data analytics to pull more meaningful insight from the large volumes of data it collects to build more accurate risk profiles for its global customer base. It recently built a Trusted Execution Environment based on Intel SGX to protect the data being processed by the machine learning algorithms that form the basis of its calculation models.

Collecting constantly updated information from other companies in its supply chain - in this case shipping firms, logistics suppliers and port authorities makes it hard for the firm to share and access data securely. But encrypting it in hardware-based memory provided the assurance it needed to process new, more sensitive data sets.

A UK bank also used Intel SGX to improve its KYC processes. KYC is used to verify the identity of banking customers, typically performed via credit agencies which broker PII to limit the risk of fraud and comply with AML and Counter Terrorism Financing rules and regulations. But this can be an expensive, time consuming and ineffective approach overly reliant on manual processes.

The bank digitised its KYC with Intel SGX, applying ML to sensitive data protected in the Confidential Computing enclave to help it detect and reduce AML fraud. The project also allowed it to build more accurate customer profiles that could help it pursue new streams of revenue through targeted promotions.

Perhaps more importantly, the pilot showed how Intel SGX has the potentially to fundamentally alter the way that financial services companies access shared information without negatively impacting the customer experience and simultaneously meeting compliance obligations.

The economics of cloud ML

Most financial services organizations are moving increasing larger volumes of data, applications and services into the cloud as they seek to streamline their Open Banking operations and compete with more nimble Fintech start-ups. Getting access to the vast amounts of powerful compute resources available off-prem can help significantly scale up their data analytics activity.

A case in point is homomorphic encryption, long used to enable complex financial transactions to be performed using encrypted data, meaning operations could be shifted off prem into the cloud. The trouble is, explains O'Neill, is that it struggles to scale on existing architectures which makes for an expensive IT overhead that Confidential Computing and Intel SGX can help to bring down.

"At the end of the day it comes down to economics, because scalability is super important, Confidential Computing and Intel SGX offers scalable data protection across a wide range of use cases" he points out.

Without scalability, banks can struggle to process enough secure data quickly to give them the insight that underpins the use cases they require. This was initially a problem for the UK bank. The smaller enclave size on previous generations of Intel Xeon E3 CPUs limited the volume of encrypted data which could be stored and processed in protected memory. But the latest 3rd Generation Intel Xeon Scalable components offer much greater scalability, which offers the potential to open up some exciting new financial services use cases.

The other advantage of performing secure ML operations in the cloud stems from the shift to an opex rather than capex investment. That brings secure, cloud-based data analytics and processing within reach of smaller organizations that would otherwise struggle to find the budget to build out their own compute infrastructure.

Cloud computing is already a mainstay in the enterprise, with adoption of public and hybrid clouds continuing to increase. Confidential Computing today leans toward the public cloud, but the volume and diversity of cloud platforms and services available public, hybrid and private for example mean that solutions like Intel SGX must be adaptable to suite different architectures and processes to meet customer preferences in a broader range of industries and use cases.

Supporting data sovereignty

Other interesting AI/ML workloads which can benefit from Confidential Computing include the training of sensitive video footage collected from cars to enable autonomous driving algorithms.

"Think of a camera on a car driving around, and it's capturing people's faces, registration plates, addresses on doors etc. Because autonomous driving is safety critical, obfuscating that data is not the best idea," says O'Neill.

"So encrypting that data and taking it into the cloud, and AI training on encrypted data is a massive step forward and that is where SGX can play a key role."

In that example the organization doesn't need the permission of the individual to use their private data, but it does still have to protect it while being simultaneously liable to regulatory fines in the event of data leaks or breaches.

Another deployment comes from the German government which recently moved to build Confidential Computing-enabled services for centralized healthcare, a project that also impacts data sovereignty and shows how Intel SGX can protect citizens' private data when its stored in the cloud.

"Confidential Computing enables three things. The first is obviously data privacy. Because the data is encrypted it is secure by design and meets the principles of the GDPR," says O'Neill, which gives enterprises using Intel SGX a significant advantage as they seek to demonstrate compliance.

"It's also provides privacy since that it creates an environment that is confidential, even in a multi-tenant cloud scenario. And the third key piece is integrity the concept of knowing that the compute environment is defended by the latest Intel approved security updates and patches, and that certain algorithms are only allowed to do certain things."

Recruiting more software developers

There is already a large ecosystem of Intel partners building what O'Neill calls privacy enhancing applications on top of SGX, each of which either uses the Intel SGX software development kit (SDK) or a library OS. Intel is a major contributor to Gramine, an open source project that enables developers to run unmodified Linux applications in SGX enclaves first outlined by Intel CTO Greg Lavender in May this year. Gramine is important because it provides a 'push button' method for developers to protect applications and data using SGX more easily without having to modify their code.

Intel hopes this will help to expand the number of developers building applications for SGX, particularly when it comes to embedding encryption/decryption and other security functions.

"Between the many ready-to-deploy Confidential Computing solutions from the ecosystem and availability of Gramine and other Library OSs, organizations don't need to develop new applications from scratch using the Intel SGX SDK," concludes O'Neill. "With the software solutions available today, Confidential Computing is not only for the security architects but also the data scientists and other service and solution developers that want to add confidentiality, privacy and compliance to their favourite AI/ML frameworks and utilise AI/ML with the protection of confidential computing more easily."

Sponsored by Intel.

View post:
Hardening data security in the cloud - The Register

Read More..

Nobel-winning quantum weirdness undergirds an emerging high-tech industry, promising better ways of encrypting communications and imaging your body -…

Unhackable communications devices, high-precision GPS and high-resolution medical imaging all have something in common. These technologies some under development and some already on the market all rely on the non-intuitive quantum phenomenon of entanglement.

Two quantum particles, like pairs of atoms or photons, can become entangled. That means a property of one particle is linked to a property of the other, and a change to one particle instantly affects the other particle, regardless of how far apart they are. This correlation is a key resource in quantum information technologies.

For the most part, quantum entanglement is still a subject of physics research, but its also a component of commercially available technologies, and it plays a starring role in the emerging quantum information processing industry.

The 2022 Nobel Prize in Physics recognized the profound legacy of Alain Aspect of France, John F. Clauser of the U.S. and Austrian Anton Zeilingers experimental work with quantum entanglement, which has personally touched me since the start of my graduate school career as a physicist. Anton Zeilinger was a mentor of my Ph.D. mentor, Paul Kwiat, which heavily influenced my dissertation on experimentally understanding decoherence in photonic entanglement.

Decoherence occurs when the environment interacts with a quantum object in this case a photon to knock it out of the quantum state of superposition. In superposition, a quantum object is isolated from the environment and exists in a strange blend of two opposite states at the same time, like a coin toss landing as both heads and tails. Superposition is necessary for two or more quantum objects to become entangled.

Quantum entanglement is a critical element of quantum information processing, and photonic entanglement of the type pioneered by the Nobel laureates is crucial for transmitting quantum information. Quantum entanglement can be used to build large-scale quantum communications networks.

Story continues

On a path toward long-distance quantum networks, Jian-Wei Pan, one of Zeilingers former students, and colleagues demonstrated entanglement distribution to two locations separated by 764 miles (1,203 km) on Earth via satellite transmission. However, direct transmission rates of quantum information are limited due to loss, meaning too many photons get absorbed by matter in transit so not enough reach the destination.

Entanglement is critical for solving this roadblock, through the nascent technology of quantum repeaters. An important milestone for early quantum repeaters, called entanglement swapping, was demonstrated by Zeilinger and colleagues in 1998. Entanglement swapping links one each of two pairs of entangled photons, thereby entangling the two initially independent photons, which can be far apart from each other.

Perhaps the most well known quantum communications application is Quantum Key Distribution (QKD), which allows someone to securely distribute encryption keys. If those keys are stored properly, they will be secure, even from future powerful, code-breaking quantum computers.

View post:
Nobel-winning quantum weirdness undergirds an emerging high-tech industry, promising better ways of encrypting communications and imaging your body -...

Read More..

One of the First Quantum Computers Produced in Europe To Be Launched in Poland – HPCwire

The new systems based on European technology will be available for R&D purposes to a wide range of European users, the scientific communities, industry and the public sector. The selected proposals ensure diversity in the quantum technologies and architectures to give European users an opportunity to test several different practical implementations of quantum computing systems connected with classical supercomputers and provided by dark fibers owned by PIONIER Polish Optical Internet.

Pozna Supercomputing and Networking Center (PSNC) affiliated to theInstitute of Bioorganic Chemistry, Polish Academy of Sciences (PAS)in Pozna, is the coordinator and initiator of the Polish project as well as the installation site. The project consortium also includes the Center for Theoretical Physics PAS and a Polish company:Creotech Instruments S.A.

The major factor that determined our decision to apply in the EuroQCS call was the fact that we would be able to install a quantum computer whose key components are provided by a Polish company: Creotech Instruments S.A. Our talks with dedicated radio astronomers and physicists resulted in a quick and unanimous decision that Poland has a chance to take an active position on the quantum map of Europe, explains Cezary Mazurek, PhD Eng., Director of PSNC.

The leading Polish provider of specialized electronics for the quantum market, Creotech Instruments has been selected as one of the organizations to develop a quantum computer in Poland. Parallel to this project, the Creotech team also is currently involved in the development of the first large quantum computer for the European Commission. The implementation of this project is proceeding according to plan. A few days ago, the company concluded a 4-year framework agreement with the European Commission giving it access to financing tools to achieve the latter projects goals.

I am proud to see that once again the expertise of our Creotech experts has been recognized by the international community, setting us apart from other companies from the domestic Deep Tech market. Our team will be tasked with delivering specialized control and measurement electronics in the infrastructure of the Polish quantum computer integrated with the infrastructure of the PSNC supercomputer located in Pozna, Poland. There are many important computing tasks that classical supercomputers have been struggling with for years in scientific communities. Quantum computers, including those developed as part of the current project, will address this very issue. The infrastructures deployment in Poland will translate into the long-term industrial, scientific and even social development of our country, says Grzegorz Brona, PhD, President of the Management Board of Creotech Instruments S.A.

The key partner in the project is theCenter for Theoretical Physics which brings together researchers from various fields that are essential for the development and application of quantum computations, including experts in theoretical physics, astrophysics and natural sciences: classical and quantum field theory, quantum optics, basics of quantum mechanics and quantum information theory. Quantum technologies are also a significant area of R&D work performed by theUniversity of Latviawhich boasts several highly ranked research groups in quantum physics. International expert teams in collaboration with PSNC will be responsible for developing hybrid classical-quantum algorithms and mechanisms to allow users throughout Europe to access and use the resources of the new quantum computer.

Quantum computations leveraging the support of PSNCs supercomputing infrastructure and HPC technology will facilitate a range of scientific research and open up new opportunities for industrial innovation. It is worth noting that the selection of the six European sites to host a quantum computer coincided with the announcement of the winners of this years Nobel Prize in Physics, Alain Aspect, John F. Clauser and Anton Zeilinger for their work in quantum mechanics and quantum information science.

Choosing Poland and our center as one of the six European locations for this breakthrough classical-quantum supercomputer architecture shows that we have met all the entry criteria and have the relevant experience to build such a hybrid. For many years, PSNC has been Polands representative in the PRACE (Partnership in Advanced Computing in Europe) initiative and has been implementing strategic projects from the Polish Roadmap for Research Infrastructures, including the PRACE-LABandPRACE-LAB2national supercomputing systems. We are very pleased to have managed to not only build a strong project consortium in partnership with the Polish scientific community and our business partner, Creotech Instruments, but also to involve experts specializing in quantum technologies from the Central and Eastern Europe region, including Latvia, Lithuania, Slovenia, Hungary and Austria, says Krzysztof Kurowski, PhD Eng. from PSNC.

It is also important to mention that another project submitted as part of the EuroHPC call to develop a quantum computer LUMI-Q in Czechia features other two Polish entities:Academic Computer Centre Cyfronet AGHandNicolaus Copernicus Astronomical Center PAS, making it a total of five Polish institutions engaged in EuroQCS.

At the moment, the realization and financing plans regarding all six projects are being formally discussed. A total of 17 UE states will contribute to the quantum initiative.

Source: PSNC

View post:
One of the First Quantum Computers Produced in Europe To Be Launched in Poland - HPCwire

Read More..

Jordan Peterson Cries Responding to Olivia Wilde’s Critique – The Cut

Photo-Illustration: by The Cut; Photos: Getty Images

Jordan Peterson is apparently very sad that Olivia Wilde based the Dont Worry Darling villain on him. So sad, in fact, that he was brought to tears during a recent interview on Piers Morgan Uncensored.

Earlier this month, while speaking about basing Chris Pines character, Frank, on Peterson, Wilde told Interview magazine, We based that character on this insane man, Jordan Peterson, who is this pseudo-intellectual hero to the incel community. Wilde defined incels to Interview as disenfranchised, mostly white men, who believe they are entitled to sex from women.

At the time of Wildes interview, Peterson responded with a statement in the National Post, joking that Pine has a reputation as quite an attractive man, noting that it could be worse. He also called the film the latest bit of propaganda disseminated by the woke, self-righteous bores and bullies who now dominate Hollywood. But when Morgan read the quote to Peterson this week, it seemed to hit a nerve.

People have been after me for a long time because Ive been speaking to disaffected young men, Peterson, who once threatened to sue a woman who called him a misogynist, said. Now, what a terrible thing to do that is, talk to marginalized [people] who are supposed to have a voice. He then got emotional and began to tear up. Its very difficult to understand how demoralized people are. And certainly many young men are in that category, he continued. And you get these casual insults. These incels. Well, what does this mean?

For the record, incel is a term that originated from the phrase involuntary celibacy. It was, according to the Guardian, coined by a woman before it was co-opted by men online who used the term to create a violent movement. In 2014, Elliot Rodger killed six people in the UCSB college town of Isla Vista. He identified with the term, calling himself an incel in his manifesto. Four years later, in 2018, Alek Minassian drove a van into a crowd of pedestrians in Toronto, killing ten people. In a social-media post minutes before the attack, he reportedly praised Rodger and celebrated the start of the Incel Rebellion. And in that time, incel became a proud identity for men online, some of whom worshipped Rodger and Minassian.

Incel communities are often linked to misogyny online and sometimes acts of violence. But Peterson doesnt see it that way. These men, they dont know how to make themselves attractive to women who are very picky, and good for them, he told Morgan. But all these men who are alienated, its like theyre lonesome, and they dont know what to do, and everyone piles abuse on them.

Its not the first time Peterson has appeared more concerned with the supposed abuse directed at alienated men than the violence they instigate. At the time of Minassians attack, Peterson seemed to sympathize with the killer, telling the New York Times, He was angry at God because women were rejecting him. The cure for that is enforced monogamy. Thats actually why monogamy emerges. Doesnt seem far off from Wildes definition of incel, if you ask me.

Get the Cut newsletter delivered daily

By submitting your email, you agree to our Terms and Privacy Notice and to receive email correspondence from us.

Read the rest here:
Jordan Peterson Cries Responding to Olivia Wilde's Critique - The Cut

Read More..

Who is Jordan Peterson and what is his net worth? – AS USA

If you have heard the name Jordan Peterson then it is likely you have either seen him on YouTube, in a book, or hanging with some celebrities. He has a number of bestsellers including 12 Rules for Life self-help book, selling millions of copies. The Canadian professor recently took a snap alongside Manchester United and Portugal frontman Cristiano Ronaldo.

Peterson gained public attention due to a number of YouTube videos he featured in back in 2016. He criticised political correctness in his opposition to a Canadian government bill aimed at protecting peoples gender identity. Following this up he had a round of media appearances butting heads with presenters, only enhancing his popualrity. Back in 2016-2018 the YouTube algorithm meant these videos were endlessly sent around teenage boys feeds. Titles include Jordan Peterson calmly dismantles feminism infront of two feminists with more than 21 million views.

Peterson reguritates anti-feminist tropes but with a layer of academic language, giving some legitimacy to otherwise nonsense beliefs. He joins a chorus of red-pilled incel (involuntary celibate) influencers in discussing female hypergamy, the belief that if there was no such thing as monogamy that a small number of men would be mating with a large number of women, keeping the rest of men in sexless lives. This is a core incel belief. It takes into no account of what a womans choice may be in the matter, however.

In one video, titled Evolutionary Psychologist Explains Why Women Fall For Bad Boys, he talks about dark triad traits and why mainly younger women tend to be attracted to so-called bad boys. There is absolutely no evidence for thinking like this but the fact that a qualified professor talks about it means people may believe it.

Tabatha Southey, a columnist for the Canadian magazine Macleans, described him asthe stupid mans smart person.

Petersons secret sauce is to provide an academic veneer to a lot of old-school rightwing cant, including the notion that most academia is corrupt and evil, and banal self-help patter, says Southey. Hes very much a cult thing, in every regard. I think hes a goof, which does not mean hes not dangerous.

Celebritynetworth.com estimates his wealth to be upwards of $8 million. This is due to information he gave in a 2019 interview where he discussed money from his book releases and patreon, which he has now shutdown.

Read this article:
Who is Jordan Peterson and what is his net worth? - AS USA

Read More..

THE WEEK AHEAD: Jews mark the holiest day of the year, Yom Kippur; Jordan Peterson and Ben Shapiro speak in Jerusalem; and ‘The Rosenberg Report’…

Jewish men pray on the light rail train tracks in Jerusalem on Yom Kippur, the Day of Atonement, Sept. 28, 2020. (Photo: Yonatan Sindel/Flash90)

Heightened security alert continues

Jordan Peterson and Ben Shapiro speak in Jerusalem

The Rosenberg Report on TBN

Israel-Lebanon maritime-border dispute

Bank of Israel to raise interest rate

New title could shield MBS from lawsuit

THE DAY OF ATONEMENT YOM KIPPUR

The most important holiday in the Jewish faithbegins at sundown on Tuesday, Oct. 4, and ends at nightfall on Wednesday. On Yom Kippur, or the Day of Atonement, Jews around the world fast for 25 hours, as they repent and seek forgiveness for the sins of the past year. The day marks the culmination of the Ten Days of Repentance that begin on Rosh Hashanah, the Jewish new year. According to tradition, God opens the Book of Life on Rosh Hashanah and closes it on Yom Kippur, when He has decided each persons fate.

As a country, Israel halts for the entire day; businesses shut down and roads empty of vehicles. Many attend synagogue services and refrain from any kind of work. Although state law does not prohibit driving on Yom Kippur, almost all citizens refrain from it, religious and secular alike. Israeli children enjoy the holiday to its fullest, rollerblading or riding their bicycles in the middle of the road throughout the country.

HEIGHTENED SECURITY ALERT CONTINUES

Israeli security forces will remain on high alert this week, following tensions between Palestinian visitors and Jewish worshippers on the Temple Mount in Jerusalem. Footage thatcirculatedon social media last week showed a group of Palestinian Arabs attacking Jews from the al-Aqsa mosque, throwing Molotov cocktails and rocks at them despite the heavy IDF presence in the area. The uptick in violence follows an explicit warning from the terrorist group Hamas that the attacks will escalate in the coming days.

JORDAN PETERSON, BEN SHAPIRO SPEAK IN JERUSALEM

Conservative thought-leaders Jordan Peterson and Ben Shapiro will hold an on-stage conversation about The Future of Freedom in Jerusalem on Thursday, Oct. 6.

The highly anticipated event is already sold-out and is drawing much attention, as it is expected to be Petersons first visit to the Holy Land. Shapiro delivered an address in front of 2,500 Israelis in July as keynote speaker at CPAC Israel, where he defended biblical morality.

According to the organizers of Thursdays event, The Tikvah Fund and Sella Meir Publishing, the two prominent intellectuals from The Daily Wire will discuss questions like:

Which virtues are most under attack, and how can they be protected and restored?

How can Israel, in particular, help confront the challenges facing the free world?

THE ROSENBERG REPORT ON TBN

Mark your calendars: Thursday, Oct. 6, at 9 p.m. EDT, is the debut of ALL ISRAEL NEWS Editor-in-Chief Joel Rosenberg's prime-time weekly program on TBN. Produced in Jerusalem, The Rosenberg Report will offer a close-up of current events and issues in Israel and the Muslim/Arab world. It also will cover major geopolitical, economic and spiritual events and trends in the U.S. and around the world, from a biblical perspective.

Im excited and deeply honored to join forces with TBN, the Trinity Broadcasting Network the worlds most-watched Christian TV network to take our reporting and analysis to vastly larger new audiences, Rosenberg said. Watch the Rosenberg Report trailerhere.

ISRAEL-LEBANON MARITIME-BORDER DISPUTE

Israels security cabinet is expected to convene on Thursday to discuss a draft agreement which aims to settle a maritime-border dispute with Lebanon over the position of an Israeli gas field. Indirect negotiations between the two countries, led by U.S. mediator Amos Hochstein, have been ongoing for months. Haaretzreportsthat the sides seem to have reached some mutual understanding and that a deal is being finalized.

The Israeli opposition, led by former Prime Minister Benjamin Netanyahu, has slammed Prime Minister Yair Lapids government for heading into a deal they say will transfer Israeli territories worth billions of dollars to an enemy state, without allowing any discussion of the issue at the Knesset.

Lapid addressed the potential deal at the weekly Cabinet, confirming that they are discussing the final details. He noted that as we have demanded from the start, the proposal safeguards Israel's full security-diplomatic interests, as well as our economic interests.

For over a decade, Israel has been trying to reach this deal. The security of the north will be strengthened. The Karish field will operate and produce natural gas. Money will flow into the states coffers and our energy independence will be secured. This deal strengthens Israels security and Israels economy, he continued.

BANK OF ISRAEL TO RAISE INTEREST RATE

Mirroring the Federal Reserves move last week, the Bank of Israel is expected to raise the interest rate on Monday in an attempt to fight inflation. According to certain estimates, a hike of 0.5% is likely. The increase will be the fifth time that Israels central bank has raised the interest rate since April. Israels annual consumer price index (CPI) for inflation dipped from 5.2% in July to a 4.6% rate in August. It is considerably lower than U.S. inflation, which stands at 8.3%.

NEW TITLE COULD SHIELD MBS FROM LAWSUIT

A U.S. court case against Saudi Crown Prince Mohammed bin Salman, who was named Saudi Arabias prime minister last week, will face a crucial deadline on Monday. The case involves bin Salmans alleged connection to the murder of journalist Jamal Khashoggi and was initiated by Khashoggis fiance.

As ordered by the court, the Biden administration will have to weigh in on whether the prince should be protected by sovereign immunity, which usually is granted to a world leader, such as a prime minister or king. The timing of bin Salman receiving his new title has been seen as an attempt to evade the lawsuits potential implications, and is also a major step of ascension to the helmof Saudi leadership.

This week we are also keeping an eye on these developing stories:

... Where does Italys new prime minister standon Israel?

... Is Jerusalem at the heart of the battlefor Brazil?

... What is driving the mass protests in Iran and why are Iranian womencutting their hair?

... What exactly is The Rapture and what happens to those who are left behind?

... Why do some Christians believe The Rapturewill happen on or around Rosh Hashanah?

Originally posted here:
THE WEEK AHEAD: Jews mark the holiest day of the year, Yom Kippur; Jordan Peterson and Ben Shapiro speak in Jerusalem; and 'The Rosenberg Report'...

Read More..

IBM Unveils Breakthrough 127-Qubit Quantum Processor

- Delivers 127 qubits on a single IBM quantum processor for the first time with breakthrough packaging technology

- New processor furthers IBM's industry-leading roadmaps for advancing the performance of its quantum systems

- Previews design for IBM Quantum System Two, a next generation quantum system to house future quantum processors

Nov 16, 2021

ARMONK, N.Y., Nov. 16, 2021 /PRNewswire/ --IBM (NYSE: IBM) today announced its new 127-quantum bit (qubit) 'Eagle' processor at the IBM Quantum Summit 2021, its annual event to showcase milestones in quantum hardware, software, and the growth of the quantum ecosystem. The 'Eagle' processor is a breakthrough in tapping into the massive computing potential of devices based on quantum physics. It heralds the point in hardware development where quantum circuits cannot be reliably simulated exactly on a classical computer. IBM also previewed plans for IBM Quantum System Two, the next generation of quantum systems.

Quantum computing taps into the fundamental quantum nature of matter at subatomic levels to offer the possibility of vastly increased computing power. The fundamental computational unit of quantum computing is the quantum circuit, an arrangement of qubits into quantum gates and measurements. The more qubits a quantum processor possesses, the more complex and valuable the quantum circuits that it can run.

IBM recently debuted detailed roadmaps for quantum computing, including a path for scaling quantum hardwareto enable complex quantum circuits to reach Quantum Advantage, the point at which quantum systems can meaningfully outperform their classical counterpoints. Eagle is the latest step along this scaling path.

IBM measures progress in quantum computing hardware through three performance attributes: Scale, Quality and Speed. Scale is measured in the number of qubits on a quantum processor and determines how large of a quantum circuit can be run. Quality is measured by Quantum Volume and describes how accurately quantum circuits run on a real quantum device. Speed is measured by CLOPS(Circuit Layer Operations Per Second), a metric IBM introduced in November 2021, and captures the feasibility of running real calculations composed of a large number of quantum circuits.

127-qubit Eagle processor

'Eagle' is IBM's first quantum processor developed and deployed to contain more than 100 operational and connected qubits. It follows IBM's 65-qubit 'Hummingbird' processor unveiled in 2020 and the 27-qubit 'Falcon' processor unveiled in 2019. To achieve this breakthrough, IBM researchers built on innovations pioneered within its existing quantum processors, such as a qubit arrangement design to reduce errors and an architecture to reduce the number of necessary components. The new techniques leveraged within Eagle place control wiring on multiple physical levels within the processor while keeping the qubits on a single layer, which enables a significant increase in qubits.

The increased qubit count will allow users to explore problems at a new level of complexity when undertaking experiments and running applications, such as optimizing machine learning or modeling new molecules and materials for use in areas spanning from the energy industry to the drug discovery process. 'Eagle' is the first IBM quantum processor whose scale makes it impossible for a classical computer to reliably simulate. In fact, the number of classical bits necessary to represent a state on the 127-qubit processor exceeds the total number of atoms in the more than 7.5 billion people alive today.

"The arrival of the 'Eagle' processor is a major step towards the day when quantum computers can outperform classical computers for useful applications," said Dr. Daro Gil, Senior Vice President, IBM and Director of Research. "Quantum computing has the power to transform nearly every sector and help us tackle the biggest problems of our time. This is why IBM continues to rapidly innovate quantum hardware and software design, building ways for quantum and classical workloads to empower each other, and create a global ecosystem that is imperative to the growth of a quantum industry."

The first 'Eagle' processor is available as an exploratory device on the IBM Cloud to select members of the IBM Quantum Network.

For a more technical description of the 'Eagle' processor, read this blog.

IBM Quantum System Two

In 2019, IBM unveiled IBM Quantum System One, the world's first integrated quantum computing system. Since then, IBM has deployed these systems as the foundation of its cloud-based IBM Quantum services in the United States, as well as in Germany for Fraunhofer-Gesellschaft, Germany's leading scientific research institution, in Japan for the University of Tokyo, and a forthcoming system in the U.S. at Cleveland Clinic. In addition, we announced today a new partnership with Yonsei University in Seoul, South Korea, to deploy the first IBM quantum system in the country. For more details, click here.

As IBM continues scaling its processors, they are expected to mature beyond the infrastructure of IBM Quantum System One. Therefore, we're excited to unveil a concept for the future of quantum computing systems: IBM Quantum System Two. IBM Quantum System Two is designed to work with IBM's future 433-qubit and 1,121 qubit processors.

"IBM Quantum System Two offers a glimpse into the future quantum computing datacenter, where modularity and flexibility of system infrastructure will be key towards continued scaling," said Dr. Jay Gambetta, IBM Fellow and VP of Quantum Computing. "System Two draws on IBM's long heritage in both quantum and classical computing, bringing in new innovations at every level of the technology stack."

Central to IBM Quantum System Two is the concept of modularity. As IBM progresses along its hardware roadmap and builds processors with larger qubit counts, it is vital that the control hardware has the flexibility and resources necessary to scale. These resources include control electronics, which allow users to manipulate the qubits, and cryogenic cooling, which keeps the qubits at a temperature low enough for their quantum properties to manifest.

IBM Quantum System Two's design will incorporate a new generation of scalable qubit control electronics together with higher-density cryogenic components and cabling. Furthermore, IBM Quantum System Two introduces a new cryogenic platform, designed in conjunction with Bluefors, featuring a novel, innovative structural design to maximize space for the support hardware required by larger processors while ensuring that engineers can easily access and service the hardware.

In addition, the new design brings the possibility to provide a larger shared cryogenic work-space ultimately leading to the potential linking of multiple quantum processors. The prototype IBM Quantum System Two is expected to be up and running in 2023.

Statements regarding IBM's future direction and intent are subject to change or withdrawal without notice and represent goals and objectives only.

About IBMFor more information, visit: https://research.ibm.com/quantum-computing.

ContactHugh CollinsIBM Research CommunicationsHughdcollins@ibm.com

Kortney EasterlyIBM Research CommunicationsKortney.Easterly@ibm.com

SOURCE IBM

View original post here:
IBM Unveils Breakthrough 127-Qubit Quantum Processor

Read More..