Page 1,870«..1020..1,8691,8701,8711,872..1,8801,890..»

It’s game on for esports in Cincinnati – University of Cincinnati

The 5,500-square-foot space for the lab is located on the first floor of the Hub. It includes 45 computers, equipped with high-end peripherals and monitors, as well as a broadcasting and production studio designed for livestreaming.

This is not some glorified computer lab; this is a community space, said Chris Postell, senior manager of strategic initiatives in UCs Office of Innovation. The entire concept of this lab is to bring people together and celebrate a community.

Chris Vu, the president of the UC Esports Club, said having a dedicated space will open up many more opportunities for the club and make it much easier for the group to gather for events. There are more than 2,000 members of the UC Discord, an instant messaging and digital distribution platform, with hundreds of them actively involved in the club.

To me, the esports community has acted almost like a second family. Ive always come to it as my home away from home, Vu, a junior who is majoring in computer science, said. It makes me so happy to see that were finally getting a space to physically call home.

Go here to see the original:

It's game on for esports in Cincinnati - University of Cincinnati

Read More..

St. Cloud TEDx 2022 speakers announced – SC Times

Times staff report| St. Cloud Times

ST. CLOUD St. Cloud's sixth annual TEDx event on Oct. 13 will feature seven local speakers sharing "ideas worth spreading."

This year's theme is "Rattle." The independently-organized local event, licensed by TED, is scheduled for 5-9 p.m.Thursday, Oct.13at The Paramount Center for the Arts in downtown St. Cloud.

The seven speakers include:

Santo Cruz grew up in rural Stearns County before embarking on his legal career. He currently serves CentraCare as senior vice president and chief legal officer after previously being associate general counsel and vice president of community and government relations.

Prior to joining CentraCare, he was a prosecutor for Hennepin County, assistant commissioner and general counsel for the Minnesota Department of Agriculture, attorney for the Minnesota Department of Commerce and deputy commissioner of the Minnesota Department of Human Services.

Kari-ShaneDavis Zimmerman (nicknamed KSDZ by her students) is an associate professor of theology at the College of Saint Benedict and Saint Johns University.She has served as the co-director of the First Year Experience and implemented the roll out of the College Success Course for all first-year students.

East-coast by background and temperament, KSDZ never fails to ask probingquestions and does not accept soulless answers. She asks all her students to engage their moral compass and stand up for what is true and just.

Ettien Koffi earned a bachelors degree in linguistics from the University of Abidjan, Cte dIvoire and a Ph.D. in linguistics from Indiana University, Bloomington. He is a professor of linguistics at St. Cloud State University, the author of five books, and author/co-author of several dozen articles.

He is working with Mark Petzold, an engineering and computer science professor at SCSU, to develop a text-to-speech synthesis to help document and revitalize Betine, a critically endangered language spoken in Cte dIvoire, West Africa. In 1999, there were only 200 elderly speakers of Betine left. They hope the technology they are developing will help document and revitalize some of the 2,923 languages out of 7,111 languages worldwide that are on the brink of extinction.

Grace Leapaldtis starting her junior year at the University of Minnesota - Twin Cities. She is majoring in both communications and Chinese studies. Grace plans to work for a company that does business with China and serve on the communications side between American and Chinese departments. Her dream would be to work for the embassy in China.

Leapaldtwas born and raised in St. Cloud. She attended the Guang Ming Academy Chinese Immersion Program, grades 1-12 through the St. Cloud Area School District. As a result, she is fluent in writing, reading, and speaking Chinese.

Mato Mackbee owns Krewe Restaurant, Flour & Flower Bakery and The Land by Model Citizen. He describes his cooking philosophy as creating technically driven, elevated comfort food using great ingredients with minimal manipulation.

Mackbee and his partner, Erin Lucas, leverage their restaurant, bakery, and farm to provide opportunities for urban youth to learn about growing food and potential food and hospitality careers all while promoting diversity and racial justice in Central Minnesota.While raised in Minnesota, Mackbees childhood summers always included several hot, steamy weeks in his mothers hometown of New Orleans visiting relatives and experiencing Creole and New Orleans-style food while learning to love its local foods, culture, music and sense of community.

Mark Petzold is a professor of computer science at St. Cloud State University, teaching in computer science and cybersecurity programs. He also is part of the leadership team for Huskies Invent, a hackathon-style event that allows students to solve problems for local industry, as well as co-principle investigator for the ACCESS STEM scholarship program, a $5 million grant from the National Science Foundation intended to increase enrollment in STEM programs.

His current research includes student retention in STEM courses as well as computer applications for language research and preservation. He is originally from Idaho.

Heather Weemswas born and raised an Iowa Child (see poem of the same name by Sarah Hall Maney), and grew up in the farm fields and small-town spotlight of rural communities. She observed and learned compassion and wisdom from her English-teacher Mom, work ethic and doggedness from her agrarian Dad, and toughness, resiliency, and humor from her five brothers.Weems spread her wings at the University of Iowa, majoring in psychology while competing as a Hawkeye rower. It was as a resident hall assistant that she developed an affection for the campus environment, inspiring her completion of a masters degree in higher education administration.

Combining her love of athletics and competition with a passion for college student development, she is entering her 23rdyear as an intercollegiate athletics administrator. Weems is transitioning from ten years as director of athletics at St. Cloud State University to her new position as commissioner of the National Collegiate Hockey Conference.

How to get tickets to TEDx

Tickets are availablethrough the Paramount Box Office atparamountarts.org. For more information visitwww.TEDxStCloud.com.

The event is from 5-9 p.m.Thursday, Oct.13at The Paramount Center for the Arts in downtown St. Cloud.

Go here to read the rest:

St. Cloud TEDx 2022 speakers announced - SC Times

Read More..

What the genomes of ancient humans can teach us about modern health | Penn Today – Penn Today

For nearly 40 years, geneticists have looked to ancient DNA to find answers about our modern condition. And, beyond just ancient DNA, research institutionsincluding Penn Medicinehave sought to sequence current human DNA to better understand how genetic variations affect health and disease.

What Iain Mathieson wants to do is compare the past and present to understand how certain genes have evolved, in the process shining new light on some of today and yesterdays diseases.

What were interested in is, Can we say anything about the phenotypes of these ancient individuals? explains Mathieson, an assistant professor of genetics in the Perelman School of Medicine. A lot of people are trying to use present-day genomes to discover genetic variants in people today that are related to specific diseases. [We want to see if] we can take that information and use it to say anything about the ancient people and their diseases. What were doing is combining ancient genomes with information about genetic variants and diseases from present day people to learn about disease in ancient people.

This summer, Mathieson and postdoctoral researcher Samantha Cox are working with two rising second-year students to collate and analyze existing data from scientific literature conducted around the world. Carson Shin, of Herndon, Virginia, who is an anthropology major in the School of Arts & Sciences, conducts anthropological and archaeological literature reviews to find new archaeological and DNA data. Kaeli Kaymak-Loveless, a computer science major in the School of Engineering and Applied Science, then takes that data and tries to analyze it using the statistical computing program R. The students work is funded by the Center for Undergraduate Research and Fellowships.

While Mathieson is ultimately interested in answering big questions, like how the rise of agriculture influenced the genome, hes first looking to see if his method for comparison works. He and his team of CURF interns are collating DNA data, tracking down information on skeletons, and determining height. Theyre examining height in particular, Mathieson says, because theres already a lot known about genetic variants and their relationship to height in present-day people. If they can accurately predict the height of ancient people through genetics, then, the next question becomes, What else can we say?

What wed like is to be able to say things we cant measure in the skeletons, Mathieson says. One of the big technology changes in the last 10,000 years is the development of agriculture; before that, people lived by hunting and gathering, and in the last 6,000 to 8,000 years many transitioned to an agricultural diet. You might wonder if variants of diseases todayobesity, diabetes, or even some autoimmune diseasesmight have a genetic basis in that diet.

Shin began his first year at Penn as a global health major before switching to anthropology, concentrating in archaeology. Heading into the summer, he knew he wanted to work on a project thats hands-on and interdisciplinary; Mathiesons project felt like a perfect fit.

As an anthropology major, its fascinating to me that even though were so separated from our ancestors by time, so little has actually changed about us as humans, Shin muses. Biologically, were pretty much the same. If I met someone from 3,000 years ago, I wouldnt be looking down on them or looking uptheyd be almost the same height as me, eye to eye.

As hes worked, he says, hes realized that he needs more coding experience and plans to take a half-credit course on R in the Wharton School once he meets prerequisitesthe sort of flexibility he says brought him to Penn in the first place. He says he never expected to take a computer science course, coming to Penn, but has relented.

Ive got to know how to code, he says.

Kaymak-Loveless, meanwhile, began as a bioengineering major before switching to computer science. Shes been weighing what to concentrate in but says the internship has allowed her to settle on computational biology, with an aim to take more biostatistics courses.

Most freshmen struggle to find something meaningful to do in their first summer, and I honestly wasnt really expecting to be doing anything meaningful this summer, says Kaymak-Loveless. But I feel like Im applying myself and learningthis has been a great experience.

Mathieson says he usually works with fourth-year students, but has been really impressed with how quickly Kaymak-Loveless and Shin have learned. In the short-term, Mathieson plans to develop the project into a paper.

But once we establish this technique and the ability to do this [successfully], wed like to use this to learn about traits you cant see in skeletons, related to diet and disease, Mathieson says. Thats the end goal.

The rest is here:

What the genomes of ancient humans can teach us about modern health | Penn Today - Penn Today

Read More..

What Is Cybersecurity? Everything You Need To Know – Forbes

Editorial Note: We earn a commission from partner links on Forbes Advisor. Commissions do not affect our editors' opinions or evaluations.

Are you interested in a fulfilling, well-paying career protecting sensitive data and communications from hackers? Consider pursuing cybersecurity. Tech-savvy thinkers who demonstrate close attention to detail can thrive as cybersecurity professionals.

But what is cybersecurity? This guide covers all the basics, including career paths, common courses and business sectors where these workers are needed.

Cybersecurity involves the protection of information and data on computers, networks and electronic devices. Within the cybersecurity field, professionals anticipate, prevent and respond to attacks.

Nearly every industry takes cybersecurity measures to protect itself from leaks and breaches. Cybersecurity professionals may work with government organizations to safeguard military communications or with businesses to keep malicious actors from accessing financial records. Healthcare companies also use cybersecurity workers to protect their sensitive patient data. Large retailers shield customers credit card data with cybersecurity measures as well.

Cybersecurity intrusions have become a major problem, and cybersecurity professionals are needed to step up the defense. Demand reflects this. For example, the Bureau of Labor Statistics projects employment for information security analysts to grow by 33% from 2020 to 2030, far outpacing the 8% projected growth for all U.S. occupations.

As humans have become more reliant on technology, the prevalence and severity of cybercrimes have grown. For example, ransomware is a type of cyberattack that locks an individuals or organizations information until certain demands are met, including extorted payments. These attacks have affected financial, healthcare and education organizations, causing significant delays and leaks of information.

Cybersecurity remains important for anticipating, reacting and assessing cyberattacks. Professionals in this field study breaches and malicious actors to safeguard our most sensitive information and communications.

Cybersecurity professionals can work in many different sectors to protect sensitive data from bad actors. After gaining industry experience, they can pursue management-level roles to oversee departments and craft organizational security efforts.

The following section explores common cybersecurity careers.

Average Annual Salary: Around $171,000

Required Education: Bachelors degree in computer and information technology, masters degree often preferred

Job Description: CISOs prepare for, manage and assess cyberthreats. These senior, executive-level professionals oversee and implement organizations cybersecurity and information security efforts. CISOs, which may also carry the title of chief security officer, typically collaborate with other executives to reduce damages related to breaches and ensure that security programs meet organizational goals.

Larger employers may require CISOs to hold seven to 10 years of experience in information security and/or cybersecurity. Many hiring managers seek candidates with masters degrees, but more professional experience can often stand in for formal education.

Though certification is not required for the role, CISOs can pursue relevant credentials like certified information systems security professional (CISSP) and certified chief information security officer to increase their earning power and career opportunities.

Median Annual Salary: $102,600

Required Education: High school diploma and experience, bachelors degree in computer science preferred

Job Description: Information security analysts assist organizations by scanning computer systems and networks for potential breaches. They use data encryption software and firewalls to safeguard data and communications. These professionals set companies security standards and apply security best practices while remaining current on changes and trends in the field.

Information security analysts primarily work in computer systems design and other related professions, along with the finance and insurance sectors. They often work alongside computer systems analysts and network administrators, requiring strong collaboration skills.

Most employers look to hire applicants with certifications in the field, like CISSP. These professionals can also pursue certified information systems auditor (CISA), certified ethical hacker (CEH) and CISSP credentials.

Average Annual Salary: Around $130,000

Required Education: Bachelors degree in computer science or related field, MBA in information systems cyber threats

Job Description: Security architects plan and construct safe networks for businesses and organizations. These systems may include traditional local area and wide area networks, along with modern technologies like cloud computing. Their work also includes researching emerging networking technologies and presenting their findings to stakeholders to suggest upgrades and improvements.

These professionals use network penetration tests, or ethical hacks, to perform intrusions in good faith to test the effectiveness of safeguards in place. Security architects, like other cybersecurity workers, also assess cyberattacks and breaches to study damages and plan for data recovery efforts.

While security architects do not need certification, they can pursue credentials like systems security certified practitioner, certified cloud security professional and CISSP to demonstrate their knowledge of and commitment to the field.

Average Annual Salary: Around $97,000

Required Education: Bachelors degree in cybersecurity or related field and experience

Job Description: Security engineers craft and oversee networks for organizations to protect sensitive information and data. They may perform vulnerability tests to find areas for improvement and implement network upgrades to protect against breaches.

These engineers set organizational best practices, training coworkers on security measures and ensuring timely updates for network-connected devices. They also investigate cyberattacks to identify the intruder and avoid future breaches. After an intrusion, a security engineer may collect information on the attack and implement efforts to mitigate data loss and future attacks.

Like other professionals in information security and cybersecurity, security engineers can boost their earning potential and competitiveness in the job market by earning certifications. Typical credentials include CISA, CEH and CISSP.

A bachelors degree in cybersecurity typically takes four years to complete, though some schools offer accelerated pathways with shorter degree timelines. Most employers require candidates to have bachelors degrees, making this a common starting place for aspiring cybersecurity professionals.

Typical coursework for a bachelors degree in cybersecurity covers computer forensics, information technology and security ethics, network security design and computer science. Some programs tailor concentrations to career aspirations, allowing enrollees to focus on aspects of the field such as business, management and digital forensics.

Cybersecurity professionals and individuals looking to increase their knowledge of the field can pursue masters degrees, which generally take two years to earn. These programs allow learners to focus on specific elements of cybersecurity, like cybercrime or management, while developing their leadership skills to pursue more advanced roles.

Courses for cybersecurity masters programs build on bachelors curricula through classes in information security strategy and policy, cryptography and cloud architecture security. Many masters degrees in cybersecurity offer management-focused courses as well.

Masters-level cybersecurity programs often feature thesis or capstone requirements in their final year. Enrollees can demonstrate their skills through these courses by researching and exploring real-world issues in cybersecurity and providing relevant solutions. Capstone projects typically require a presentation at the end of the semester. A thesis includes an oral defense in front of faculty members.

Cybersecurity bootcamps offer shorter, more intensive timelines than traditional degrees. Bootcamp length can vary based on the provider and enrollment type. Part-time bootcamps may stretch on for 25 or more weeks, while full-time programs may only require 12 weeks.

Bootcamps allow enrollees to learn new skills or sharpen their existing abilities on an accelerated timeline. Employers seeking entry-level cybersecurity professionals may hire bootcamp graduates. Candidates with unrelated degrees can also complete bootcamps to demonstrate their skills and commitment to potential employers.

Cybersecurity bootcamps like those provided by Flatiron School, Coding Dojo and the University of Pennsylvania offer career-planning assistance for graduates. Some bootcamps also offer job guarantees or income-share agreements, which allow learners to hold off on making payments until they find relevant employment.

Cybersecurity professionals can earn industry certifications to illustrate their abilities and engagement with the field to hiring managers. The following list is not exhaustive, and cybersecurity professionals should research available credentials relating to their specific professions and aspirations.

CISSP: A CISSP certification, offered by (ISC), indicates that its holder can successfully plan, deliver and oversee effective cybersecurity programs. This credential typically suits experienced professionals rather than entry-level cybersecurity workers.

CISA: This credential indicates mastery of auditing and monitoring companies business and IT systems. Entry-level and mid-career professionals can earn this certification, delivered by ISACA, to improve their IT knowledge and increase their salaries. ISACA reports an average salary of $149,000 for individuals with CISA certification.

CISM: The certified information security manager credential demonstrates high-level knowledge relating to risk assessment, incident management and security governance. Professionals looking to advance into management roles can pursue this certification, which requires continuing professional education credits to renew.

View original post here:

What Is Cybersecurity? Everything You Need To Know - Forbes

Read More..

Singing, speech production, and the brain | Penn Today – Penn Today

In the Penn Phonetics Lab in early August, rising second-year Nicholas Eiffert places a metal contraption over the head of Maggie Compton, a high school friend of his who has agreed to participate in the study hes helping facilitate.

Weve affectionately named this the cage, he says as he checks the alignment of the ultrasound probe on Comptons chin. Thats your tongue, he says, pointing to a moving image on the facing computer screen. This all looks pretty good, confirms Audrey Keener, another Penn rising second-year working in the lab.

During the next 20 or so minutes, Compton reads then sings a series of words, each one recorded by the computer. The ultrasound captures images of her tongue placement in the mouth, and an electroglottograph (EGG) strapped around her neck measures vocal fold vibrations.

The experiment is part of work led by Penn linguist Jianjing Kuang aimed at understanding how people create vowel sounds when they sing. This summer, through thePenn Undergraduate Research Mentoring(PURM) program offered by theCenter for Undergraduate Research and Fellowships, Keener and Eiffert recruited participants for the study, ran sessions, and compiled recordings of famous singers to analyze the same auditory components they were measuring in person.

Music has a privilege in auditory processing, and singing is a special case of speech production and perception, Kuang says. Speaking uses minimal effort, in terms of articulation and processing. But people have to train to be good singers. In this project, we want to push the limit, to look at what happens when human beings maximize their effort and try to achieve the best acoustic effects.

This summers project expands on a small sample of local singers that third-year linguistics doctoral student May Chan had previously recruited to study vowel articulation in singing.

She and Kuang are still working through that analysis, but they did notice some patterns early on. For sopranos its obvious. When they sing very high notes, the only vowel they can produce is aaaaahhh, Kuang explains. For the lower vocal range, there has to be greater modification. Because vowels vary in what the mouth does to produce them, singers of different vocal ranges must employ different strategies to sing them.

Getting a clearer picture of such tactics would require analyzing the interaction between tongue placement and pitch in more people. Inspired by the enthusiasm of students in a class she taught this past spring called The Phonetics of Singing, Kuang decided to broaden the study and offer two PURM internship spots this summer.

For Keener and Eiffert, the opportunity sat at the intersection of their interests. Keener, a computer science major from Bethel, Connecticut, plays piano and flute; Eiffert, a double major in math and computer science from Bordentown, New Jersey, used to play saxophone and took music theory classes in high school.

Kuang invited the two Penn undergrads to join her lab, then divided the project into two major components, one focused on lab work, another on compiling a corpus of famous singers. The students began their 10-week internship on June 7.

With oversight from Kuang and Chan, Keener and Eiffert spent much of their time running the experiments, which took place in a soundproof room on the third floor of a Walnut Street building. The pandemic had left the equipment mostly dormant for several years, so getting it up and running again required some trial and error.

Setting up the lab to run articulatory experiments felt like a big task, Chan says. Yet the trio was up for the challenge, taking turns as faux participants and testing the equipment with run-throughs of songs and sounds, like Twinkle, Twinkle Little Star and aaahhhh or helllllooooo.

With the set-up squared, they began bringing in participantsminimal singing skills necessarywho would get connected to the computer via a headset that held an ultrasound probe snugly under the chin. A Velcro strap held an EGG loosely around the neck.

Music has a privilege in auditory processing, and singing is a special case of speech production and perception.Penn linguist Jianjing Kuang

Each person would start by speaking a set of words, then move into singing scales, not the do-re-mi kind, but word sets Chan had developed. Starting at the bottom of their vocal range, participants would go through one seriesbot, boot, bat, beat, bet, bought, for examplemove up a note, then repeat until they could go no higher. They completed the exercise five times, with different word sets each time. We took turns having somebody outfit the participant and run recordings, while the other person was at the piano playing the pitches, Keener says.

Eiffert also led a secondary aspect of the work, compiling classical recordings the team could use to study the same vowel articulation in singing. Ive been going through this huge database to find songs that are vocal-only or vocal and piano or guitar, he says. Those can be used to see how vowels change as someones voice pitch changes.

This summer, the Penn Phonetics Lab team ran the in-person experiment with 17 people. To date, the corpus Eiffert is building has some 500 recordings from around 25 singers.

The point of all this research is to get at what happens when someone makes vowel sounds, which are the most discernible part of speech, according to Kuang. When we speak, we have consonants and vowels, she says. Consonants are mostly just noise. The most mechanical or vocalic part of speech is the vowel. We focus on vowels to get a rich acoustic analysis.

Chan sees implications for both linguistics and music research. On the linguistic end, work on singing helps us understand the full potential of the human voice and its relationship with linguistic structure, she says. On the music side, experimental techniques for studying singing will allow for a more systematic way of describing musical genres and techniques across cultures, capturing the unique ways our vocal tracts are used.

Beyond that, more insight into this type of speech production could reveal information about how the human brain functions. Its connected to the theoretical understanding of how the human vocal tract works, Kuang says. The brain and auditory system work together to perceive sound. Better understanding this will allow us to potentially help people with hearing loss, too.

Though the research continues, Keener and Eiffert have now finished their summer work in the lab. It remains to be seen whether theyll rejoin the lab this fallKuang has extended an invitationbut they both express gratitude for the experience. It was great going through the process of figuring out a project, getting it to work smoothly, Eiffert says.

That ease is on display back in the lab in early August. Eiffert reassures Compton, his friend and that days participant, that many people need multiple tries for the scales. He checks that shes comfortable. Keener looks on from the piano, offering input and gently pinging each key. At sessions end, theyve generated more data to add to the larger set, moving one step closer to unlocking the connection between singing, speech production, and the brain.

May Pik Yu Chan is a third-year doctoral student in the Linguistics Departmentin the School of Arts & Sciences.

Nicholas Eiffert is a rising second-year from Bordentown, New Jersey, double majoring in math and computer science in the School of Arts & Sciences.

Audrey Keener is a rising second-year from Bethel, Connecticut, majoring in computer science in the School of Engineering and Applied Science.

Jianjing Kuang is an associate professor in theLinguistics Departmentin the School of Arts & Sciences. She co-directs thePenn Phonetics Laboratory, and is faculty of MindCORE and the Center for East Asian Studies.

See original here:

Singing, speech production, and the brain | Penn Today - Penn Today

Read More..

Science Cafs Return In Person This Fall | Clarkson University – Clarkson University News

After two years of virtual events, Clarkson University Science Cafes will return in person this fall on Tuesday, September 20 in Canton, and Wednesday, September 21 in Potsdam with Dinosaurs, Asteroids and Climate Change.

The dinosaur-killing asteroid hit the surface of the Earth about 66 million years ago and resulted in a cascade of natural disasters, including widespread wildfires, tsunami, an impact winter and a hypothesized period of sustained global warming. Using stable isotopic signatures preserved in microscopic fish fossils, we were able to test the global warming hypothesis and provide the first empirical evidence of warming following the asteroid impact. Join Associate Professor Page Quinton (Earth and Environmental Sciences, SUNY Potsdam) to learn about how geologists study past climates and how this information can be used to understand the causes and consequences of modern climate change.

Next up, is The Green Rush: The Business of Cannabis in Canton on Tuesday, October 4, and Wednesday, October 5 in Potsdam.

One would think that there would be nothing left to discuss regarding a plant first cultivated 12,000 years ago in Central Asia. Despite being consumed in practically every culture, cannabis has a long and harrowed history with health-related issues, abuse and racial injustice, and now it offers us a new business model ... CannaBusiness. Navigating the laws (federal and state), sociopolitical conversations and twists and turns of moving from the black to the grey market, the cannabis industry is predicted to generate $1.25 billion in tax revenues over the next six years in the state of New York alone. Join Associate Professor Christa Haifley (Business Administration, SUNY Potsdam) for an engaging evening of discussion on this budding new industry.

On Tuesday, October 18 and Wednesday, October 19, is Protecting Drones From Themselves and Others.

Autonomous drones and rovers perform critical tasks for government agencies and emergency services that range from fighting forest fires to exploring distant planets. Computer hacks and software bugs can disrupt vehicle operation by causing crashes or hindering successful completion of missions (e.g., a sample is not collected or a camera is misaligned). How can an autonomous vehicle fend for itself when such malfunctions occur? Join Assistant Professor Kevin Angstadt (Computer Science, St. Lawrence) as he discusses drone technology and explores automatic techniques to help them recover from hacks and malfunctions.

Sustainability and Policy: An Economists Perspective is the topic on Tuesday, Nov. 1 and Wednesday, Nov. 2.

Led by the urge for private economic gains (the invisible hand), human activities have been a central cause of local and global environmental changes. Environmental policies are the visible hand that directs human activities in a way that minimizes social economic losses while promoting the equitable distribution of these losses. Join Assistant Professor Qingran Li (Economics and Financial Studies, Clarkson) as she talks about an economists perspective of sustainability and how economic research can inform the design of environmental policy.

The final Science Cafe of the season, Cutting-Edge Investigations, will be held on Tuesday, Nov. 15 and Wednesday, Nov. 16.

In 1930, a legal precedent was set for the use of toolmarks in U.S. courts, declaring that the edge on one blade differs as greatly from the edge of another as the lines on one human hand differ from the lines on another (Washington, 1930). But how unique are these features when interpreted from toolmark evidence in bone? Saws are one of the most common tools encountered in forensic anthropological investigations, particularly in cases involving dismemberment. Investigators must understand how saws create marks, determine what these marks relay about a blades characteristics and then assess how accurate these features are in identifying a saw or group of saws.

Join Assistant Professor Alicia Grosso (Physical Therapy, Clarkson) as she reviews how microscopic saw mark analysis helps forensic anthropologists identify potential saw blades in forensic investigations.

Traditionally, Science Cafs have brought together local university and college professors and townspeople in relaxed, informal settings, such as coffeehouses and pubs. The speaker will make a presentation about a topic in their field and, as always, there will be plenty of time for questions and discussion.

The Canton events will be held Tuesdays at 7:15 p.m. in The Rushton Conference Room in the Best Western University Inn at 90 E. Main Street, Canton. The Potsdam events are held on Wednesdays at 7:15 p.m. in the Potsdam Civic Center Community Room at 2 Park St.

Would you like to be added to our email list and receive regular information and reminders? Just email sciencecafe@clarkson.edu and ask us to add you to the list.

The Science Caf is sponsored by Clarkson University School of Arts & Sciences, Potsdam NY.

Read the original here:

Science Cafs Return In Person This Fall | Clarkson University - Clarkson University News

Read More..

All Bitcoin private keys and Altcoin private keys.

Private and Public Keys

A bitcoin wallet contains a collection of key pairs, each consisting of a private key and a public key. The private key (k) is a number, usually picked at random. From the private key, we use elliptic curve multiplication, a one-way cryptographic function, to generate a public key (K). From the public key (K), we use a one-way cryptographic hash function to generate a bitcoin address (A). In this section we will start with generating the private key, look at the elliptic curve math that is used to turn that into a public key, and finally, generate a bitcoin address from the public key.

A private key is simply a number, picked at random. Ownership and control over the private key is the root of user control over all funds associated with the corresponding bitcoin address. The private key is used to create signatures that are required to spend bitcoins by proving ownership of funds used in a transaction. The private key must remain secret at all times, as revealing it to a third party is equivalent to giving them control over the bitcoins secured by that key.

The private key must also be backed up and protected from accidental loss, since if lost it cannot be recovered and the funds secured by it are forever lost too.

The first and most important step in generating keys is to find a secure source of entropy, or randomness. Creating a bitcoin key is essentially the same as Pick a number between 1 and 2^256. The exact method you use to pick that number does not matter as long as it Is not predictable or repeatable.

Bitcoin software uses the underlying operating systems random number generators to produce 256 bits of entropy (randomness). Usually, the OS random number generator is initialized by a human source of randomness, which is why you may be asked to wiggle your mouse around for a few seconds. For the truly paranoid, nothing beats dice, pencil and paper.

All Bitcoin private keys is simply an integer between number 1 and 115792089237316195423570985008687907852837564279074904382605163141518161494337 or HEX: from 1 to 0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141. The integer range of valid private keys is governed by thesecp256k1ECDSA standard used by Bitcoin.

We just generate a range of these integers in sequence, divide into pages and show on each page. We can't store it and we have not saved database, because it should be biggest base on the world.

You can find Private key in WIF (Wallet Import/Export Format) and compressed key. Bitcoin addresses in compressed/ uncompressed formats, SegWit (P2SH-P2WPKH) and native Segwit (P2WPKH) addesses start bc1, Pay to script hash(P2SH) starting with 3; legacy Bitcoin Cash addresses and new format.

View post:
All Bitcoin private keys and Altcoin private keys.

Read More..

Cardano investors should know this reason behind ADAs 14% freefall – AMBCrypto News

Cardano [ADA] developer Adam Dean recently took to Twitter to voice his grievances related to certain development issues that the altcoin is facing.

As per his tweet dated 18 August, the developer blames a bug that catastrophically broke the Cardano network.

The network version that was supposed to be tested and ready for the hard fork was affected.

Adam further pointed out developers rushing to upgrade on the mainnet as one of the reasons for the network crash.

The testnet remains dysfunctional despite the detection of the issue in the chain. And the chain is dysfunctional since most operators updated to v1.35.2 in order to mimic the Vasil hardfork combinator (HFC) event.

Furthermore, the current version (v1.35.3) is now incompatible and incapable of syncing with the chain. This issue could result in another delay in the Vasil hardfork announcement.

However, this may not be the only major red flag for the Cardano community as metrics too paint a gloomy picture for the altcoin.

In addition to the aforementioned information, ADAs market cap seems to be a major red flag at the moment. As of 18 August, ADAs market cap stood at $18.3 billion.

However, in the last 24 hours, its market cap dropped significantly and stood at $15.73 billion at press time.

Furthermore, at the time of writing, ADA stood at $0.46 and was approximately 14% down in the last 24 hours.

The Relative Strength Index (RSI) too appeared to be in freefall. And, it stood near the 40 mark indicating a movement towards the oversold zone. The Awesome Oscillator (AO), although above the zero line, flashed red bars at the time of writing.

The information presented in the Tweet could be one to damage the hype around Cardano.

Despite past assurances from Charles Hoskinson surrounding the Vasil Fork, things seem far from reversal for the altcoin in the near future.

The already-existing confusion around the hardfork has reached new heights in light of the recent events leaving investors and traders in a position of uncertainty.

Continue reading here:
Cardano investors should know this reason behind ADAs 14% freefall - AMBCrypto News

Read More..

FIL Price Analysis: Correction Sentiment Threatens Filecoin Price To Hit $5 – CoinGape

Published 1 day ago

The FIL price resonated within the symmetrical triangle portion of the pennant pattern for the past three weeks. The sellers triggered a bearish breakdown from this pattern in response to the recent sell-off in the crypto market. The resulting downfall plunged to $6.3 support, which has temporarily halted the current correction.

Source-Tradingview

Amid the last months recovery, the FIL/USDT technical chart formed a pennant pattern in the daily time frame. This bullish continuation pattern was supposed to accelerate the buying momentum to extend the recovery rally higher.

However, the recent news that the US Fed may increase the interest rate by 0.75% in September has caused quite an impact on the crypto market. As a result, similar to some other major cryptocurrencies, the FIL price witnessed a sudden sell-off.

This selling pressure triggered an unusual activity of bearish breakdown from the pennant pattern. The post-breakdown fall tumbled the FIL price 17.6% down. The altcoin currently trades at $6.64 and has recently breached an in-between resistance of $7.62 support.

The FIL price is likely to revert higher to retest the pierced support. Thus, if the sellers sustain the price below the $6.64 flipped resistance, the altcoin may challenge the $6.28 support.

A candle closing below this level will undermine the July-end recovery and sink the prices back to the $5 bottom support.

EMAs:with the currency downfall, the coin price dropped below the 20-and-50-day EMA, offering an extra edge for short sellers. These slopes may flip to viable resistance and resume ongoing correction.

RSI Indicator:the daily-RSI slope has nosedived into bearish territory, indicating market sentiment has turned bearish.

ADX:the downsloping ADX slope indicates a loss of bullish momentum.

From the past 5 years I working in Journalism. I follow the Blockchain & Cryptocurrency from last 3 years. I have written on a variety of different topics including fashion, beauty, entertainment, and finance. raech out to me at brian (at) coingape.com

The presented content may include the personal opinion of the author and is subject to market condition. Do your market research before investing in cryptocurrencies. The author or the publication does not hold any responsibility for your personal financial loss.

Here is the original post:
FIL Price Analysis: Correction Sentiment Threatens Filecoin Price To Hit $5 - CoinGape

Read More..

VeChain (VET) Price Prediction 2025-2030: Can the alt hit $1.75 by 2030? – AMBCrypto News

Disclaimer:The datasets shared in the following article have been compiled from a set of online resources and do not reflect AMBCryptos own research on the subject

Since the beginning of 2022, VET has been on a steady downtrend. This decline can be attributed to the crypto-winter. According to data, the altcoin, at press time, was trading at $0.029, down 6% over the last 24 hours. In fact, the market capitalization stood at $2.3 billion with $98 million traded over the aforementioned period.

The idea of buying into a crypto because it costs a fraction of a dollar is tempting, but not smart. In this article, we will analyze what drives the price of VET and factors that have affected said price. Also, what might influence it in the future so that investors can make an informed decision.

In 2015, Sunny Lu, the Chief Information Officer of Louis Vuitton China, founded VeChain. It was founded with an aim to disrupt conventional business models and revolutionize the way companies around the world manage their supply chains.

The company boasts partnerships with luxury brands like Louis Vuitton, BMW, big-four auditing firm PriceWaterhouseCoopers (PwC) and Walmart. Most recently, VeChain entered a multi-year deal with the UFC. The deal is valued at $100 million.

VeChain works on a consensus protocol that is different from the traditional proof-of-work and proof-of-stake protocols. VeChain uses a proof-of-authority consensus model. This protocol requires relatively low computational power and is more about integrity and quality. This consensus model is rather centralized, when compared to traditional ones.

Although VeChain is based out of Singapore, a significant portion of its team and connections are based in China. Almost half of VeChains partners are Chinese companies. Such is the customer concentration in China that more than half of the demand for VTHO is coming from a single customer Walmart China. This so-called Chinese label may not be in their best interest, however, given the Chinese governments crackdown on cryptocurrencies and frequent trade wars with the west. These factors cast a shadow on the projects overall sustainability.

Following its rebranding as VeChain Thor and the subsequent launch of its own mainnet in 2018, VeChain pivoted to retail-facing products like decentralized applications (dApps) and e-NFTs. This move may not have been in their best interest. Data from DappRadar shows negligible activity on VeChain dApps, despite the company waiving off gas fees for dApps. These ventures could serve as a distraction, especially amid increased competition from industry giants like IBM and SAP who have started offering enterprise-facing blockchain products.

In fact, data from VeChain Stats revealed a troubling decline in its mainnet activity. Additionally, data procured by SeeVeChain suggested that VeChain Thor transactions have been on a steady decline too. The daily burn rate of VETHO, the token required for facilitating VET transactions, can be seen consistently falling A sign of diminishing VET transactions.

VeChain was in the news back in May 2022, when it offered Terra LUNA developers grants of upto $30,000 to migrate their layer 1 chains to VeChain following the collapse of terra.

There was a brief rebound in VETs price towards the end of the first quarter of 2022. The token surged all the way to $0.089 following the announcement of VeChains partnership with Draper University which entailed a fellowship and a Web3 accelerator program. However, Mays market-wide crash sent VETs price tumbling down to $0.024. The price failed to recover from the bearish trend, despite news of a new partnership with Amazon Web Services and the Q1 financial report from the VeChain Foundation which showed a healthy balance sheet.

In 2020, PwC estimated that blockchain technologies could boost the global GDP by $1.76 trillion by 2030 through improved tracking and tracing. PwCs economic analysis and industry research showed that tracking and tracing of products and services has an economic potential of $962 billion. Investors will be eager to see how PwCs blockchain partner VeChain benefits from this.

Global market intelligence firm IDC released a report in 2020. According to the same, 10% of the supply chain transactions in Chinese markets will use blockchain by 2025. This could work out in favor of VeChain, with it being the leading blockchain firm catering to supply chain solutions and given its significant presence in China. James Wester, research director at Worldwide Blockchain Strategies IDC noted,

This is an important time in the blockchain market as enterprises across markets and industries continue to increase their investment in the technology. The pandemic highlighted the need for more resilient, more transparent supply chains

According to a report published by ResearchandMarkets.com, the global supply chain management market size is projected to hit $42.46 billion by 2027, with a Compound Annual Growth Rate (CAGR) of 10.4% from 2021 to 2027. Experts have indicated major opportunities for integration of blockchain technology in supply chain management software in the projected period. As the leading blockchain firm catering to supply chain management, VeChain could stand to gain from this.

VeChain Tokenomics

Token minting predates VeChains rebranding, thus, figures have been converted from VEN to VET.

VeChain initially minted 100 billion VET which was distributed in the following manner

Crypto-experts at Changelly have projected VET to be worth at least $0.10 in 2025. They believe the maximum it could go to is $0.12.

Data gathered by Nasdaq suggests that the average projection for VET in 2025 is $0.22.

According to data published on Medium, however, the average projection for VET in 2025 is $0.09.

Changellys crypto experts have concluded from their analysis that VET should be worth at least $0.64 in 2030. The projection included a maximum price of $0.79.

Data gathered by Currency.com suggests that the average price of VET in 2030 should be $0.38.

The experts at Medium predict VET to be worth an ambitious $1.79 by the end of the decade. Considering the current price, that would amount to a whopping 6200% profit.

It is important to note that increased adoption of VeChain doesnt necessarily translate to increased demand for VET since the token is primarily used for staking and governance.

VeChain is arguably the only blockchain in the supply chain vertical that has survived the test of time. Rival tokens like Waltonchain and Wabi have seen their market capitalization and volume dramatically diminish over the past few months.

The ongoing supply chain crisis would have been a very good opportunity for VeChain to demonstrate its capabilities but companies all over the world have been resorting to conventional systems rather than exploring an innovative blockchain solution like VeChain. That being said, the supply chain tracking industry is ripe for disruption and VeChain is in a position to dominate the space in the near future.

Critics have speculated that while VeChains blockchain may prove useful, the specific nature of its native tokens utility i.e. pertaining to the business world, may become a hindrance in its growth.

VeChain needs to focus on what its good at Enterprise-facing blockchain solutions for logistics and supply chains.

The major factors that will influence VETs price in the coming years are

In other news, the Fear and Greed Index improved significantly yesterday, but has since slumped back.

Read the original:
VeChain (VET) Price Prediction 2025-2030: Can the alt hit $1.75 by 2030? - AMBCrypto News

Read More..