Page 1,817«..1020..1,8161,8171,8181,819..1,8301,840..»

Democratic EU Standards and the Global View on Safe Web Browsing – EURACTIV

The revision of the eIDAS Regulation initiated a discussion about who sets standards for safe web browsing via Qualified Website Authentication Certificates. Dr. Kim Nguyen, Managing Director of D-Trust (a company of the Bundesdruckerei Group), explains why European digital sovereignty is the better option.

Dr. Kim Nguyen is the Managing Director of D-Trust GmbH, a company of the Bundesdruckerei Group.

With Making Europe Fit for the Digital Age, the von der Leyen Commission has set us on the road to a new, digital era for the European Union. Digital technology has a profound impact on our lives, and if the EU aims to take its values and principles seriously Europe needs this change to work for citizens and businesses alike.

Real EU-sovereignty requires a sincere well-meant protection of its citizens. In this effort, two aspects are given a key role: The ability to verify digital content, URLs, and identities as well as the ability to set sovereign European standards.

Why are standards and their certification so important? Standards are representing quality, ensuring security, and building up trust. When you currently visit a website, your browser will display a lock icon. This indicates that you have established an encrypted connection to the digital destination you have accessed. This connection is secured via digital certificates.

However, only so-called Qualified Website Authentication Certificates (QWAC) provide transparency and confirm and provide the website providers secured identity for the user. They are in a way your defence against fraudulent sites and ill-intentioned actors. They establish the level of trust in a website, which is necessary for you to browse safely and securely because they guarantee that your personal information including sensitive data like credit card information is not only protected while being transmitted but does not fall into the wrong hands.

According to a 2018 study, the websites of the twenty largest online sellers in Germany alone have been illegally replicated more than 7.000 times. This example impressively demonstrates the threats for internet users as well as the necessity for website authentication mechanisms.

The question of who is responsible for setting standards for websites and who is supervising them has become a topic of heated debates. Given the experience in other sectors, like transport, pharmaceutical or finance, it should be quite obvious that standards are set and checked by neutral external supervisory bodies.

However, today, the browsers themselves set and check the security standards and are able to arbitrarily decide whether to display QWACs or not.

The EU Commission now intends to shift this decision-making power from the hands of international Big Tech companies to the democratically elected European regulators as well as to a governance system which consists of certification and audit bodies as well as national supervisory bodies including means and processes to deal with possible critical issues. Certain web service providers argue that they are defending consumer protection and offer safer solutions under their own responsibility.

While it is true that certain digital companies excel in their sectors and that it is easier for them to create certification schemes for their own browsers, this line of argument serves to conceal an important aspect: Such an approach would leave the question of standards and accountability entirely in their hands. These companies aim to essentially usurp the role of trust service providers and take on crucial internet security responsibilities on behalf of the European Union.

In a world of big tech companies and increasingly powerful authoritarian regimes outside of Europe, the question of who to trust in setting and controlling standards for the digital world becomes ever-more important. Why would we trust the largely intransparent internal processes of global companies without any external check more than our own democratic institutions? As European citizens, we should choose to be the ones to decide on who sets up and supervises these standards.

By setting standards on a European level, we can even avoid becoming dependent on a single government. European solutions might not be perfect, but EU-governance has been very well established over the years and can be further developed. The Commissions proposal for a revision of the eIDAS Regulation is in line with the European Unions ambition to strengthen its commitment to its values such as sovereignty, accountability, and transparency.

Contrary to what recent anti-QWACs campaigning has suggested, the standard setting of liberal democratic institutions is well established, has served Europe well for decades, and cannot at all be compared to the government overreach of non-democratic states like Kazakhstan. In line with democratic principles, the European standards should be developed in cooperation with technical experts from businesses, civil society, and government.

For a website verification to be trustworthy in Europe, European standards are needed. EU standards strengthen EU-sovereignty, and from EU-sovereignty follows that the spirit of EU-laws is upheld. EU-standards entail that we as European citizens, governments, and companies develop the basic rules for the digital world together. Joint events, that bring policy makers, business and civil society together such as the European Digital Identity Roundtable, can make important contributions in this process.

Besides, it means that other companies and institutions will need to follow standards developed by and for Europeans, thus giving us a competitive advantage. It also entails that online verification will rely on European actors. Relinquishing control over website certification will not aid the EU to become more sovereign or more democratic. Therefore, the EU should make use of its right for democratically legitimized representatives and civil servants to set standards that are in the interest of European citizens.

See the rest here:
Democratic EU Standards and the Global View on Safe Web Browsing - EURACTIV

Read More..

ISPA Starts Hunt for UK Internet Hero and Villain in 2022 Awards – ISPreview.co.uk

The UK Internet Service Providers Association (ISPA) has today begun inviting feedback to help them choose the shortlist for this years Internet Hero and Internet Villain category as part of their 2022 internet industry awards event, which is due to take place on the 24th November 2022 at the Landmark Hotel in London.

Last years event saw Helen Milner (OBE) of the Good Things Foundation being named as the ISPAs Internet Hero for the groups efforts to tackle digital inclusion. Meanwhile, the Internet Villain category is returning this year after a long absence, which seemed to start after the ISPA suffered a backlash following their decision to nominate Mozilla for the 2019 award this related to the browser firms DNS-over-HTTPS (DoH) push (here).

As usual, the ISPA are now seeking nominations from members of the public by 28th October 2022. Readers can submit their nominations for either the Internet Hero or Villain categories please submit the name of the individual / organisation to awards@ispa.org.uk, or on social media using the hashtag #internethero or #internetvillain .

New ISPA Chair, Steve Leighton, said:

The annual ISPA awards is a fantastic opportunity to celebrate all things internet over the past 12 months. As part of this, the Internet Hero & Villain awards provide a great opportunity to celebrate those who have contributed to our sector in the past year, whilst also reflecting on some of the serious issues we have faced. We look forward to the sector and the public nominations.

No doubt people will have their own ideas about who or what to nominate for both categories, although the Governments new Online Safety Bill (OSB) and Telecoms Security Laws could potentially fit into both depending upon your perspective.

Go here to read the rest:
ISPA Starts Hunt for UK Internet Hero and Villain in 2022 Awards - ISPreview.co.uk

Read More..

Five things South Africa must do to combat cybercrime – The Conversation

Cyber-attacks are on the rise globally, with seriously negative implications for countries strategic, national, economic and social well-being.

A cyber-attack can be defined as an unauthorised attempt successful or not to infiltrate a computer or computer system for malicious purposes. Reasons for such attacks vary from financial gain to espionage, gathering strategic and national information and intelligence about an adversary. Such an adversary can be a nation state, a corporate entity or a private individual.

The authoritative international Cybercrime Magazine expects global cybercrime costs to grow by 15% a year over the next five years, reaching $10.5 trillion a year by 2025, reporting:

This represents the greatest transfer of economic wealth in history, risks the incentives for innovation and investment, is exponentially larger than the damage inflicted from natural disasters in a year, and will be more profitable than the global trade of all major illegal drugs combined.

A 2022 report by Surfshark, the Netherlands-based virtual private network (VPN) service company, lists the top 10 countries in the world in terms of cybercrime density. Cybercrime density is defined as the percentage of cyber victims per one million internet users. South Africa is number six on the list, with the UK, the US, Canada, Australia and Greece taking places one to five. The UK, therefore, has the highest cybercrime density. That means it has the most cybercrime. One reason for South Africas poor showing may lie in the fact that a 2020 Accenture report found the countrys internet users were inexperienced and less technically alert.

In May, a data leak at Transunion, a credit management company, reportedly compromised the personal information of 54 million South Africans. President Cyril Ramaphosa was among the victims.

In 2021 a successful cyber-attack on Transnet, the transport parastatal, brought container terminals to a standstill, disrupting imports and exports. This had massive strategic and economic implications.

Cybercriminals are increasingly moving from targeting enterprise systems to the end users the employees who operate computers and have access to the enterprises corporate data and network systems.

Poor cybersecurity awareness and training of end users is one reason cyber-attacks succeed in South Africa. In both the Transunion and Transnet attacks, unauthorised access was gained via end users.

Cyber-attacks are expected to grow in sophistication as criminals exploit such technologies as artificial intelligence. I am a cybersecurity expert and academic who has watched the growing problem of cyber-attacks in South Africa and internationally over the last 30 years. In my experience, five key ingredients need to be in place in the cybersecurity ecosystem to fight cybercrime in South Africa:

recognition of cybercrime as a governance issue

skilled practitioners and advisors

savvy citizens

public-private partnership

a dedicated national director of cybersecurity.

1. Fighting cybercrimes must be a governance issue

This is a core principle in all national and international good corporate governance practices. In private companies that role falls on the boards of directors and executive management. Its part of the oversight and code of conduct of top management.

For the government it means that the president and cabinet should be responsible for ensuring that the country is resilient against cyber-attacks.

2. Skilled cyber practitioners and advisors are vital

There is a dire need for cybersecurity capacity globally. South Africa is no exception.

This shortage is experienced both in government and in the private sector. South Africa needs a large number of cybersecurity practitioners and advisers to help users to identify and prevent cyber-attacks. These should ideally be available in all government institutions, including every municipality, hospital and school.

The skills shortage is being addressed by universities and private colleges, but this is but a drop in the ocean because the output is limited and takes several years to produce. The fact is that such cybersecurity practitioners do not necessarily all have to have university degrees. In the UK, for example, the governments National Cybersecurity Centre has a programme called CyberFirst, directed towards schools.

Such a programme could have significant benefits for South Africa, including providing jobs for talented young people who do not have the money or interest to pursue tertiary studies.

3. Citizens must be cybercrime savvy

All computer end users must be empowered to be cybercrime fighters to make the country, companies and other institutions more resilient.

Security is everyones job. Everyone from the entry-level to top management should know how to identify and report breaches so they can defend the enterprise.

New, more effective approaches must be found to make end users more aware of cyber risks and integrate them better into the enterprises cyber defences. One example of such a new approach can be modelled on the idea of a human firewall, where every end user understands that he or she is part of the cyber defence of the country or company, and acts in that way.

4. Public-private partnership is imperative

The government cannot fight cybercapture on its own. Most of the present cyber expertise lies in the private sector. The private sector is basically running a major part of South Africas critical information infrastructures such as for banks, internet service providers and cellphone service companies.

Public-private partnerships must be established as soon as possible to combat cybercrimes. This idea is already provided for in the original National Cybersecurity Policy Framework of 2013. But the political will from government to make it work seems missing and no such partnerships have really developed.

5. Have a dedicated national cybersecurity director

Cybersecurity experts and functionaries in the government and the private sector often operate in independent silos. Nobody has the required helicopter view and oversight of the status of cybercrime in the country.Not sharing scarce cybersecurity expertise between role players ends up in expensive duplication of expensive software systems and training, which could be more widely available.

South Africa needs a national bureaucrat, or national cybersecurity director to play an oversight role. The office must act as a single point of contact for all cyber-related matters in the country. The incumbent must be technically skilled in cyber matters, and have the trust of both government and private sector role players.

He or she must report directly to parliament something like Chapter 9 institutions, which strengthen the countrys democracy as provided under the constitution.The US, the UK and Rwanda have all created such a position or agency.

Read the rest here:
Five things South Africa must do to combat cybercrime - The Conversation

Read More..

CCNY to expand blockchain and crypto research and teaching – The City College of New York News

Rosario Gennaro, professor of computer science in The City College of New Yorks Grove School of Engineering, is the recipient of a five-year $850,000 grant to further CCNYs contributions to the advancement of blockchain systems. The funding is part of a five-year, $5.75 million grant by the Algorand Foundation to a Yale University-led consortium. The Foundation is the charitable arm of blockchain company Algorand, founded in 2017 by Silvio Micali of the Massachusetts Institute of Technology.

The main focus of the CCNY grant, which is eligible for renewal at the end of the five-year period, is on education. It will be used to provide more opportunities for students to study and participate in this burgeoning field.

The cornerstone of the program will be a six-week summer institute for undergraduates to learn about blockchain and cryptocurrencies, through a combination of lectures, projects and exposure to cutting-edge research. Modeled after the National Science Foundation's Research Opportunities for Undergraduates program, the summer institute will provide scholarships to the participating students.

This will allow our students to really get their hands on what working in blockchain and crypto areas is like through an intense summer experience, said Gennaro, who also directs City Colleges Center for Algorithms and Interactive Scientific Software. There are many good jobs in this area, and this will help students get a foot in the door.

Gennaro added that the evolution of the World Wide Web and the emergence of blockchain technology which can be described simply as a public ledger portends a greater demand for software engineers.

Web1 was limited to data users, he said. We are now in Web2, in which users are active participants in large centralized systems such as Google and Facebook -- which own the data. The dream of Web3 is that of a fully decentralized architecture, one in which you own and control the data that you put on the web.

Blockchain is the main component of that dream, as it permits that access.

There is a great demand for Web3 engineers, he said.

Gennaro has also moved to hire professionals to fill the ranks of the faculty. He recently lured computer scientist Allison Bishop from Columbia University to teach courses in artificial intelligence. He has also bolstered the graduate program in cybersecurity by increasing financial and logistical support.

Yale, meanwhile, will use its grant to establish a Center for Privacy, Accountability, Verification and Economics of Blockchain Systems, to be led by Charalampos Papamanthou, a Yale computer scientist. Gennaro and other CCNY computer scientists will also be faculty members of the Center.

About the City College of New YorkSince 1847, The City College of New York has provided a high-quality and affordable education to generations of New Yorkers in a wide variety of disciplines. CCNY embraces its position at the forefront of social change. It is ranked #1 by the Harvard-based Opportunity Insights out of 369 selective public colleges in the United States on the overall mobility index. This measure reflects both access and outcomes, representing the likelihood that a student at CCNY can move up two or more income quintiles. In addition, the Center for World University Rankings places CCNY in the top 1.8% of universities worldwide in terms of academic excellence. Labor analytics firm Emsi puts at $1.9 billion CCNYs annual economic impact on the regional economy (5 boroughs and 5 adjacent counties) and quantifies the for dollar return on investment to students, taxpayers and society. At City College, more than 16,000 students pursue undergraduate and graduate degrees in eight schools and divisions, driven by significant funded research, creativity and scholarship. CCNY is as diverse, dynamic and visionary as New York City itself. View CCNY Media Kit.

See more here:

CCNY to expand blockchain and crypto research and teaching - The City College of New York News

Read More..

Research Shows That Artificial Sweeteners Can Have Unexpected Effects on the Body – SciTechDaily

The study demonstrates that non-nutritive sweeteners have an effect on the human body.

According to a controlled experiment, these sugar substitutes have a variety of impacts on peoples gut microbes and glucose metabolism.

Artificial sweeteners and sugar replacements, also referred to as non-nutritive sweeteners, claim to provide all the sweetness of sugar without the calories. However, contrary to popular assumption, such sweeteners are not inert: They do have an impact on the human body, according to a controlled trial conducted by Weizmann Institute of Science researchers and published in the journal Cell.

In fact, some can influence the trillions of microorganisms that reside in our guts and regulate our blood sugar levels by altering the microbiomes of human consumers. Furthermore, different individuals respond to sweeteners in very different ways.

A Weizmann Institute study on mice conducted in 2014 revealed that certain non-nutritive sweeteners could be causing the alterations in sugar metabolism that they are meant to prevent. A team of researchers led by Professor Eran Elinav of Weizmanns Systems Immunology Department screened roughly 1,400 prospective volunteers in the new experiment, choosing 120 who carefully avoided any artificially sweetened foods or beverages.

Six groups were then formed out of the volunteers. Participants in four of the groups received sachets containing one of the following sweeteners: saccharin, sucralose, aspartame, or stevia, each in quantities that were below the recommended daily consumption. The two other groups acted as controls.

The research was led by Dr. Jotham Suez, a former graduate student of Elinavs who is now a principal investigator at the John Hopkins University School of Medicine, and Yotam Cohen, a graduate student in Elinavs lab. It was carried out in partnership with Professor Eran Segal of Weizmanns Computer Science and Applied Mathematics and Molecular Cell Biology Departments.

The researchers found that two weeks of consuming all four sweeteners changed the composition and function of the microbiome and of the small molecules the gut microbes secrete into peoples blood each sweetener in its own way. They also found that two of the sweeteners, saccharin, and sucralose, strongly altered glucose tolerance that is, proper glucose metabolism in the recipients. Such alterations, in turn, could contribute to metabolic disease. In contrast, no changes in either the microbiome or glucose tolerance were found in either of the two control groups.

The changes in gut microbes caused by sweeteners were strongly associated with changes in glucose tolerance. These findings reinforce the view of the microbiome as a hub that integrates the signals coming from the human bodys own systems and from external factors such as the food we eat, the medications we take, our lifestyle and physical surroundings, Elinav says.

To check whether changes in the microbiome were indeed responsible for impaired glucose tolerance, the researchers transplanted gut microbes from more than 40 trial participants into groups of germ-free mice that had never consumed non-nutritive sweeteners. In each trial group, the transplants had been collected from several top responders (trial participants featuring the biggest changes in glucose tolerance) and several bottom responders (those featuring the least changes in glucose tolerance).

Strikingly, recipient mice showed patterns of glucose tolerance that largely reflected those of the human donors. Mice that received microbiomes from the top responders had the most pronounced alterations in glucose tolerance, compared to mouse recipients of microbiomes from bottom responders and from human controls. In follow-up experiments, the researchers determined how the different sweeteners affected the abundance of specific species of gut bacteria, their function, and the small molecules they secrete into the bloodstream.

Our trial has shown that non-nutritive sweeteners may impair glucose responses by altering our microbiome, and they do so in a highly personalized manner, that is, by affecting each person in a unique way, Elinav says. In fact, this variability was to be expected, because of the unique composition of each persons microbiome.

Elinav continues: The health implications of the changes that non-nutritive sweeteners may elicit in humans remain to be determined, and they merit new, long-term studies. In the meantime, its important to stress that our findings do not imply in any way that sugar consumption, shown to be deleterious to human health in many studies, is superior to non-nutritive sweeteners.

Reference: Personalized microbiome-driven effects of non-nutritive sweeteners on human glucose tolerance by Jotham Suez, Yotam Cohen, Rafael Valds-Mas, Uria Mor, Mally Dori-Bachash, Sara Federici, Niv Zmora, Avner Leshem, Melina Heinemann, Raquel Linevsky, Maya Zur, Rotem Ben-Zeev Brik, Aurelie Bukimer, Shimrit Eliyahu-Miller, Alona Metz, Ruthy Fischbein, Olga Sharov, Sergey Malitsky, Maxim Itkin, Noa Stettner, Alon Harmelin, Hagit Shapiro, Christoph K. Stein-Thoeringer, Eran Segal and Eran Elinav, 19 August 2022, Cell.DOI: 10.1016/j.cell.2022.07.016

The study was funded by the Jeanne and Joseph Nissim Center for Life Sciences Research, the Swiss Society Institute for Cancer Prevention Research, the Sagol Institute for Longevity Research, the Sagol Weizmann-MIT Bridge Program, the Norman E Alexander Family M Foundation Coronavirus Research Fund, the Leona M. and Harry B. Helmsley Charitable Trust, the Rising Tide Foundation, Mike and Valeria Rosenbloom Foundation, the Adelis Foundation, the Ben B. and Joyce E. Eisenberg Foundation, the Isidore and Penny Myers Foundation, Miel de Botton, the Vainboim Family, and Charles S. Rothschild.

Read more:

Research Shows That Artificial Sweeteners Can Have Unexpected Effects on the Body - SciTechDaily

Read More..

The AI Researcher Giving Her Field Its Bitter Medicine – Quanta Magazine

Anima Anandkumar, Bren Professor of computing at the California Institute of Technology and senior director of machine learning research at Nvidia, has a bone to pick with the matrix. Her misgivings are not about the sci-fi movies, but about mathematical matrices grids of numbers or variables used throughout computer science. While researchers typically use matrices to study the relationships and patterns hiding within large sets of data, these tools are best suited for two-way relationships. Complicated processes like social dynamics, on the other hand, involve higher-order interactions.

Luckily, Anandkumar has long savored such challenges. When she recalls Ugadi, a new years festival she celebrated as a child in Mysore (now Mysuru), India, two flavors stand out: jaggery, an unrefined sugar representing lifes sweetness, and neem, bitter blossoms representing lifes setbacks and difficulties. Its one of the most bitter things you can think about, she said.

Shed typically load up on the neem, she said. I want challenges.

This appetite for effort propelled her to study electrical engineering at the Indian Institute of Technology in Madras. She earned her doctorate at Cornell University and was a postdoc at the Massachusetts Institute of Technology. She then started her own group as an assistant professor at the University of California, Irvine, focusing on machine learning, a subset of artificial intelligence in which a computer can gain knowledge without explicit programming. At Irvine, Anandkumar dived into the world of topic modeling, a type of machine learning where a computer tries to glean important topics from data; one example would be an algorithm on Twitter that identifies hidden trends. But the connection between words is one of those higher-order interactions too subtle for matrix relationships: Words can have multiple meanings, multiple words can refer to the same topic, and language evolves so quickly that nothing stays settled for long.

This led Anandkumar to challenge AIs reliance on matrix methods. She deduced that to keep an algorithm observant enough to learn amid such chaos, researchers must design it to grasp the algebra of higher dimensions. So she turned to what had long been an underutilized tool in algebra called the tensor. Tensors are like matrices, but they can extend to any dimension, going beyond a matrixs two dimensions of rows and columns. As a result, tensors are more general tools, making them less susceptible to overfitting when models match training data closely but cant accommodate new data. For example, if you enjoy many music genres but only stream jazz songs, your streaming platforms AI could learn to predict which jazz songs youd enjoy, but its R&B predictions would be baseless. Anandkumar believes tensors make machine learning more adaptable.

Its not the only challenge shes embraced. Anandkumar is a mentor and an advocate for changes to the systems that push marginalized groups out of the field. In 2018, she organized a petition to change the name of her fields annual Neural Information Processing Systems conference from a direct acronym to NeurIPS. The conference board rejected the petition that October. But Anandkumar and her peers refused to let up, and weeks later the board reversed course.

Quanta spoke with Anandkumar at her office in Pasadena about her upbringing, tensors and the ethical challenges facing AI. The interview has been condensed and edited for clarity.

In the early 1990s they were among the first to bring programmable manufacturing machines into Mysore. At that time it was seen as something odd: We can hire human operators to do this, so what is the need for automation? My parents saw that there can be huge efficiencies, and they can do it a lot faster compared to human-operated machines.

Yeah. And programming. I would see the green screen where my dad would write the program, and that would move the turret and the tools. It was just really fascinating to see understanding geometry, understanding how the tool should move. You see the engineering side of how such a massive machine can do this.

My mom was a pioneer in a sense. She was one of the first in her community and family background to take up engineering. Many other relatives advised my grandfather not to send her, saying she may not get married easily. My grandfather hesitated. Thats when my mom went on a hunger strike for three days.

As a result, I never saw it as something weird for women to be interested in engineering. My mother inculcated in us that appreciation of math and sciences early on. Having that be just a natural part of who I am from early childhood went a long way. If my mom ever saw sexism, she would point it out and say, No, dont accept this. That really helped.

Original post:

The AI Researcher Giving Her Field Its Bitter Medicine - Quanta Magazine

Read More..

The CIEF 2022 opens, and nearly 9,000 projects from all over the world participate online – PR Newswire

GUANGZHOU, China, Sept. 2, 2022 /PRNewswire/ -- The China Innovation and Entrepreneurship Fair 2022 (CIEF 2022) with the theme of "Science and Technology Innovation for Smart Future" kicked off in Guangzhou on September 2. This year's CIEF will last three days from September 2 to 4.

The CIEF 2022 is co-hosted by China Association for Science and Technology, the National Development and Reform Commission, the Chinese Academy of Sciences, the Chinese Academy of Engineering, the Central Committee of Jiusan Society, the People's Government of Guangdong Province, and the People's Government of Guangzhou Municipality, and co-organized by the People's Government of Guangzhou Municipality and Asia Digital Group. Held both online and offline, the CIEF 2022 has set up more than 20 exhibition areas for new-generation information technology, biomedicine and health, etc. It has established a high-quality and efficient digital display matchmaking platform through technical means such as AI, metaverse and immersive interaction to achieve data sharing, information exchange and accurate matchmaking.

Nearly 9,000 projects from all over the world participate in the CIEF 2022. During the CIEF 2022, more than 100 events such as innovation competition and achievement auction will be held offline to promote the commercialization and trading in scientific and technological achievements.

The value of projects for commercialization this year is expected to be no less than 12 billion yuan

"We must improve the mechanism for the transfer and commercialization of scientific and technological achievements, and pursue a path that integrates the innovation chain, industrial chain, talent chain, policy chain and capital chain," stressed General Secretary Xi Jinping.

As a brand event for showcasing the achievements of the widespread innovation and entrepreneurship strategy and a key service platform for the commercialization of scientific and technological achievements, the CIEF is committed to covering the "last mile" in the commercialization of scientific and technological achievements, providing services for innovation and entrepreneurship, promoting the agglomeration of factors of innovation, and facilitating the integration of government, enterprises, university, research institutes, financial support, intermediary service and users.

Since 2015, the CIEF has exhibited over 16,000 pieces of innovation and entrepreneurship achievements, and over 23,000 projects have been released on the achievement trading platform. The value of commercialized projects exceeds 60 billion yuan.

The CIEF 2022 focuses on the fields such as new-generation IT, intelligent and new energy vehicles, biomedicine and health, AI and digital economy. Livestreaming studios on online exhibition hall have been launched. Special events such as auction of achievements, technology transfer, project roadshow, and forum summit will be held to assist in the commercialization of more innovation and entrepreneurship achievements in Guangzhou and even China as a whole.

During the CIEF 2022, more than 2,700 exhibitors will participate in the online exhibition, and nearly 9,000 pieces of achievements will be involved in online display and matchmaking. It is expected that the value of commercialized achievements for the year will be no less than 12 billion yuan.

The functions of the online platform increase

This year's CIEF has extensively upgraded the online platform to create a higher-level "online" CIEF. The new platform highlights the new model and new experience for digital exhibition. It builds exclusive 3D booths and livestreaming studios for exhibitors through new technology use scenarios, virtual metaverse and immersive interaction at the online exhibition halls. It also fulfils functions such as online analysis of enterprise demands, intelligent matching, evaluation of achievements, signing of contract for intended cooperation, and service tracking.

The online platform of the CIEF will be connected with "Innovation China" platform. It provides services such as "expert pool", "project pool" and "demand pool" to bring together innovative resources such as enterprises, talents, services and finance. The CIEF will carry out more than 100 online and offline roadshows and matchmakings every year as a CIEF that "stays open throughout the year".

The increase in the functions of the online platform promotes the integration of online and offline CIEF. "Online" and offline functions will further complement each other, so that achievements will be used in more areas in a targeted manner, and more scientific and technological achievements will be commercialized, generate benefits in a market-oriented manner, and empower economic and social development.

Give full play to unique advantages and implement Nansha Plan

In June this year, the State Council issued the Master Plan of Guangzhou Nansha on Deepening Comprehensive Cooperation between Guangdong, Hong Kong and Macao with Global Perspective (hereinafter referred to as the "Nansha Plan"), which is another major decision and plan made by the central government on the building of the Greater Bay Area from an overall and strategic perspective. According to the Nansha Plan, active efforts will be made to undertake the transfer and commercialization of innovation achievements in the fields such as electronic engineering, computer science, marine science, AI and smart cities in Hong Kong, and build a high ground for the transfer and commercialization of scientific and technological achievements in South China.

In order to promote the implementation of the Nansha Plan, the CIEF will leverage its unique advantages to help Nansha accelerate the building of an industry cooperation base for scientific and technological innovation, build a major strategic platform that keeps its foothold in the Bay Area and is oriented to Hong Kong and Macao with a global vision, and help Guangdong build a strategic fulcrum for a new development pattern.

The CIEF 2022 has set up the Nansha District Achievements Exhibition Area, an online platform for the CIEF, to introduce Nansha District policy on science and technology innovation, industrial policies as well as technological achievements, promote the gathering of national technological innovation resources in Nansha, and promote the establishment of a routine liaison mechanism for collaborative technological innovation with Hong Kong and Macao.

Exhibition area for popular science products and technologies set up for the first time

In a speech delivered at the National Science and Technology Innovation Conference, the Conference of the Academicians of Chinese Academy of Sciences and Chinese Academy of Engineering and the Ninth National Congress of China Association for Science and Technology, General Secretary Xi Jinping stressed that "technological innovation and scientific popularization are important for pursuing innovative development. Equal importance should be attached to science popularization and technological innovation."

Without a general improvement in scientific literacy, it will be difficult to cultivate innovation personnel of a higher caliber and rapidly commercialize scientific and technological achievements. The CIEF 2022 set up an exhibition area for popular science products and technologies for the first time in order to aid the commercialization of scientific and technological achievements.

At exhibition area, nearly 200 exhibitors showcase a wide range of popular science projects. A "close" contact with popular science resources and knowledge can stimulate the general public's interest and enthusiasm in science and technology, and then help them develop scientific quality and embrace scientific thinking.

The CIEF 2022 is committed to the domestic commercialization of scientific and technological achievements, and also works to expose more people to science and technology, so as to lay the foundation for innovative development, and maintain the country's innovation capacity.

SOURCE Asia Digital Group

Link:

The CIEF 2022 opens, and nearly 9,000 projects from all over the world participate online - PR Newswire

Read More..

Cybersecurity in the Energy Industry – CleanTechnica

Leadership from the DOE Solar Energy Technologies Office met with cybersecurity researchers at NREL in July 2022. Saleem (center), along with Jordan Peterson, Ryan Cryar, and William Hupp, helped bring together diverse energy sector stakeholders to evaluate research priorities for improving cybersecurity of distributed generation on the grid.

In July 2022, Danish Saleem paced an NREL conference room encouraging debate on project priorities and moderating an Idea Fest of 5-minute pitches on new research frontiers.

Danish is a senior cybersecurity researcher who supports multiple efforts to develop novel cyber-technology solutions, next-generation networking concepts, and to standardize the cybersecurity requirements for systems of renewable energy technologies through consensus building. Convened by the U.S. Department of Energy (DOE), the July workshop assembled diverse energy sector stakeholders to discuss the state of energy system cybersecurity, its present challenges, and potential solutions.

He spoke with us about how standards bridge energy system stakeholders and the need for continuous attention and improvement in cybersecurity for critical infrastructure.

When did you notice there was a research gap around cybersecurity standards and modern energy systems?

When I began engaging with clean energy sector stakeholders in 2017 and 2018, I heard a disconnect in their perspectives on how to secure distributed energy resources (DERs). For example, an electric utility may look to vendors and manufacturers, though there is no cybersecurity certification program guiding what security features manufacturers should incorporate in their designs. Meanwhile, a device vendor may view the electric utility as responsible for the system-level cybersecurity of grid-connected assets. State energy officials and public utility commissioners rely on the IEEE 1547-2018 standard for connecting distributed generation to the bulk power system, but cybersecurity is outside its scope.

How is NREL addressing that disconnect between the different parties?

The DOE Solar Energy Technologies Office (SETO) was interested to hear what I had learned and to sponsor cybersecurity research and consensus-building around the device, network, application, and system level of distributed energy resources and inverter-based resources. There are now six national laboratories and a network of external partners contributing to the program, called Securing Solar for the Grid. The meeting in July was the first time we could meet together to measure our progress and collaborate.

Through funding from SETO,NREL started collaborating with ULin 2021 to develop a cybersecurity certification standard through engagement with clean energy industry stakeholders. With a well-tested and industry-approved cybersecurity certification program, all parties can be assured that certified devices were designed around baseline requirements.

In parallel, we have formed an IEEE working group to develop recommendations for implementing end-to-end security for DER interconnections with the grid.

What is the role of the industry advisory board in the development of new cyber requirements?

Cybersecurity is a continuous improvement process. The industry advisory board was formed to help evaluate current trends, gaps, challenges to improving security for the grid, and to guide the research priorities for the national laboratories. The board includes a diverse set of stakeholders from electric utilities, DER manufacturers and vendors, general contractors, academic universities, national associations, state energy officials, public utility commissions, and standard development organizations.

Can you share more on your background and how you came to NREL?

I applied in 2016 as an intern! I had a bachelors degree from NED university of engineering and technology in Pakistan and was in the U.S. studying for a masters in electrical engineering from Florida International University.

When I was hired, NREL wanted someone with an electrical engineering background for the new cybersecurity research group. It seemed like an odd combination at that time, but having knowledge of electrical systems and devices was very valuable for developing appropriate cybersecurity concepts. It is not required, but it makes it little easier.

I didnt know much about renewable energy at that time, but I quickly found that I was in the right place. I attribute it to NRELs positive culture, leaderships willingness to hear employee concerns, and the mission-driven environment.

What was a challenging moment in your career?

Being a foreign national comes with certain default pressures. Following graduation, international students have a few months to find employment and failure means saying goodbye to your dreams, investment, and wishes.

Moving to another country is always challenging as you learn the new language, culture, and norms but I have also felt welcomed. I am proud to now be a resource for others as one of the founders of the Global Employees Resource Group. The group is a safe place where NRELians from all countries, nationalities, and backgrounds help each other find commonalities, navigate American culture, and ask those questions they may not feel comfortable asking peers or managers.

What other projects or initiatives that you are proud of?

Module-OT is one of my greatest accomplishments. Many power systems rely on unencrypted communication networks, so we set out to design a low-cost, low-lift solution that can protect both legacy and new electric grid devices against common cyberattacks. Invented at NREL and field-tested on utility scale PV system, Module-OTis vendor agnostic and requires minimal changes to operational technology.

I am also excited to begin work onCyManII, a national project that will use theNREL cyber range to support the cybersecurity of American-made technologies.

What would your job be if you werent in engineering?

My family members are all business owners; I am the odd one out. If I wasnt in engineering, I would probably be running a small business.

And what do you do when you arent working?

Living in Colorado means you get to enjoy year-round activities. In the summertime, I love barbequing or taking long scenic drives with the bass turned up. I also cherish quality time with my kids I have a 4-year-old daughter and two-year-old son.

Learn more NRELs efforts todevelop cybersecurity standards and consensus for distributed energy resources.

Read more: Cybersecurity Certification Standard for Distributed Energy & Inverter-Based Resources

Courtesy of NREL.

Read the original:
Cybersecurity in the Energy Industry - CleanTechnica

Read More..

Whats up with Olivia Wilde, Harry Styles and Florence Pugh? The worry over Dont Worry Darling – The Guardian

Michael, I cant open a tab without being assaulted by one or a variety of the following names: Florence Pugh. Olivia Wilde. Shia LaBeouf. Harry Styles. I dont know where to start with this story. Whats going on?Steph, welcome to your crash course in the film they are (or were) all starring in, which, for a movie called Dont Worry Darling, has actually involved a significant quantity of worrying.

Directed by Olivia Wilde (of Booksmart and breaking-up-with-her-fiance-to-date-Harry-Styles fame), it has courted a great deal of controversy over the past few months, but lets begin with the most recent turn of events: Dont Worry Darling has its world premiere on Monday at the Venice film festival, but Florence Pugh, who co-stars alongside Styles, will not be appearing at a prescreening press conference.

This is because Pughs flight from Budapest (where she is filming the Dune sequel) doesnt land until the conference is over though of course it could also (hypothetically) be an elaborate way to avoid spending time talking about a film you (hypothetically) did not enjoy working on and do not wish to promote.

OK. This is ringing some bells. Say more.So lets whip back to 2020, the early stages of the films production. Shia LaBeouf was initially cast in Styles role a company man living with his wife (Pugh) in a Stepford-y town, whose world begins to unravel when shady stuff goes down at work.

The relationship between LaBeouf and Wilde quickly soured, and he was replaced in the role. In an interview last month with Variety, Wilde says: His process was not conducive to the ethos that I demand in my productions. He has a process that, in some ways, seems to require a combative energy my responsibility is to the production and to the cast, to protect them.

But then, the plot thickened: LaBeouf fired back his own receipts, claiming he was the one who chose to quit.

Amid the he said/she said, Pugh was caught in the crossfire in one video LaBeouf shared with Variety, Wilde hints at on-set tensions with her. This might be a bit of a wake-up call for Miss Flo, she says. If she really commits, if she really puts her mind and heart into it at this point and if you guys can make peace what do you think? Is there hope?

How does Harry Styles fit in?Well, the whole sordid affair is exacerbated by the other affair happening on set. The timeline of it all is a little murky, but most agree that after Wilde split from her fiance Jason Sudeikis in November 2020, she met Styles while shooting Dont Worry Darling and the pair were seen holding hands two months later (the most middle-school way of confirming a relationship possible).

Fast forward to July of this year: a source tells Page Six that Flo seeing Olivia and Harry all over each other on set did not go down well. As we all know, a source told Page Six is not a line that holds much credibility and indeed other sources have denied that Wilde and Styles burgeoning relationship was ever an issue.

There was also another again, unconfirmed rumour too: around pay disparity between Styles and Pugh. Wilde has vehemently denied these claims as merely invented clickbait.

Perhaps the biggest issue is Styles acting? For a film set in the suburbs of 1950s America, this man is sounding very British Australian Irish unplaceable. Its um avant garde.

I also seem to be hearing a lot about the sex scenes in this film?Yes although on this, youd be forgiven for confusing Dont Worry Darling with the other Harry Styles film thats caused some recent sex scene controversy.

In Wildes film, the trailer features a sex scene between Styles and Pugh that sent the internet into extremely horny mania before Pugh distanced herself from the discourse in one of the only pieces of promo shes done. When its reduced to your sex scenes, or to watch the most famous man in the world go down on someone, its not why we do it, she said in a Harpers Bazaar interview. Its not why Im in the industry.

Fair enough but this doesnt seem to gel with Wildes take: that there should have been more sex in the trailer, as she recently told Associated Press.

For a film whose star isnt giving any press, this film does seem to be getting a lot of press. Did I read something about Jordan Peterson too?Im so sorry you had to see that. Unfortunately (as if it wasnt messy enough already), there is a character inspired by Peterson, played by Chris Pine.

Right. Has Pine said weighed in on all this?No. Unbothered king!

Read the original:
Whats up with Olivia Wilde, Harry Styles and Florence Pugh? The worry over Dont Worry Darling - The Guardian

Read More..

TERRY MATTINGLY: There’s that ancient question again where is heaven? – Longview News-Journal

When cosmonaut Yuri Gagarin returned to Earth in 1961, after the first manned spaceflight, Soviet leaders claimed he said: I went up to space, but I didnt encounter God.

Venturing into similar territory, superstar atheist Sam Harris rocked cyberspace during a recent Triggernometry YouTube appearance in which he discussed Donald Trump, faith elements in wokeness and the flocks of Americans who insist on believing in heaven.

Political Twitter screamed when he said there was a left-wing conspiracy to deny the presidency to Donald Trump. ... Absolutely, but I think it was warranted.

But comedians Konstantin Kisin and Francis Foster pushed back, asking if Harris was justifying moral relativism. Perhaps todays truth wars, the Triggernometry team suggested, were linked to a famous G.K. Chesterton quip: When men choose not to believe in God, they do not thereafter believe in nothing, they then become capable of believing in anything.

During the ensuing discussion, Harris offered another viral sound bite: Where is heaven, exactly, given that we have multiple telescopes up there beaming back tens of billions of years worth of information? Yet millions of Americans still embrace the supernatural claims of an ancient faith, including that Jesus will return to raise the living and the dead.

Youd be surprised at the number of percent of sober, non-Bible-thumping people who would say yes to that question, he said. They might be Christian, they might be, listen, I love the Bible. It gives me a great moral framework. It gives my kids a great moral framework. This is the tradition Im identified with. This is all super important to me but thats kind of as far as it goes. Right? Like, Im not going to make magical claims about flying saviors who are literally going to come down from ... heaven.

While the Twitter masses raged, the French-Canadian iconographer and writer Jonathan Pageau recorded a video essay on his YouTube channel about why materialists and religious believers keep debating the meaning of terms such as heaven and earth.

This is a core biblical topic, since the first verse of Genesis states: In the beginning God created the heavens and the earth. Thus, the Harris heaven sound bite led Pageau to tweet: Whoa, this is one of the most embarrassing things that I have heard in a while.

After all, even the most fervent materialist can learn to step back into an ancient cosmology and grasp that these categories heaven and earth are universal, they are in every culture, said Pageau, who is best known for his online dialogues with author Jordan Peterson, professor emeritus of psychology at the University of Toronto.

Concepts of the visible and invisible are central to religious discussions of light, wind, breath, spirit, purpose, beauty, art and speech, as well as images of believers making spiritual quests via ladders, trees or mountains. Humans experience the world with their senses, and these perceptions lead to spiritual questions, insights and truths, said Pageau.

Consider, for example, Dantes use of planets in The Divine Comedy as a symbolic pathway to encountering God. You can think: Oh, my goodness. What a silly way of thinking. Right? To take Sams position, did the satellites up there did they get in the way of Dante? Did he knock himself on the satellites while he was going up the spheres?

The Bible describes angels with wings, and God is often depicted in physical terms having feet, arms and hands, as well as a heart and mind. But no one is claiming that God is a big physical being in the sky that has these attributes, said Pageau.

I will admit that in a world of satellites and a world of spaceships, quasars and whatever, this can be difficult. ... Jesus is not hanging up there in the atmosphere. Hes not having to watch out for the satellites that are coming by you know maybe chatting with people at the space station, the iconographer explained.

God is, obviously, not a king sitting on a throne in the atmosphere throwing lightning bolts. But understanding what a king is might be one of the best ways ... to understand how the authority of God works. ... Understanding what heaven is is the best way to understand the manner in which the invisible moves the visible.

Read more:
TERRY MATTINGLY: There's that ancient question again where is heaven? - Longview News-Journal

Read More..