Page 1,931«..1020..1,9301,9311,9321,933..1,9401,950..»

iMessage encryption was one reason why Secret Service lost January 6 texts, may prevent employees from using iMessage in future – 9to5Mac

In the aftermath of the January 6, 2021 Capitol riots, the Secret Service has been blasted for losing text messages sent around that time about the attack, potentially violating federal record preservation laws.

Via Politico, the Secret Service says one reason why this happened was that the automatic backup systems the Secret Service used could not access iMessages, as they are stored encrypted on the phone.

What appears to have happened is the Secret Service was transitioning to a new mobile device management and deployment system. This system would automatically store and backup data in a centralized location, such as emails and photos.

However, iMessage is stored on device in an encrypted fashion in a manner that the centralized system cannot access.

Instead, individuals would have to remember to manually backup their devices before their phones were reset, in order for iMessages to be saved. Evidently, many agents failed to do this and when their phones were wiped, all of their iMessage communications were deleted. (The political irony of course is the agency in charge of running complex forensive cybercrime investigations cannot be trusted to keep its own records complete).

The agency is now considering disabling iMessage entirely on agents devices to prevent this from happening in future (for context, iMessage is already banned in the White House). The agency is also weighing other options.

We want to make sure whatever policy action we take does not adversely impact our protective or investigative missions, Guglielmi said. He added that the Secret Service is looking at other technological solutions. He did not provide further details.

via Politico

It is unclear how much agents used iMessage for relevant work communications about the January 6 riots. However, it is also worth noting that iMessage is not the only factor at play. Standard SMS text messages may also have been lost, due to technical and organisational failures.

FTC: We use income earning auto affiliate links. More.

Check out 9to5Mac on YouTube for more Apple news:

See the rest here:
iMessage encryption was one reason why Secret Service lost January 6 texts, may prevent employees from using iMessage in future - 9to5Mac

Read More..

Enjoy End-To-End Encryption and Cutting-Edge Protocols with this VPN – Black Enterprise

Now that there are more and more people recognizing theimportance of digital privacy, the VPN space is increasingly becoming a crowded field. But the truth is these days, most websites and apps are making an extra effort to encrypt their traffic (see the lock logo next to the link on your address bar?), make hiding from your ISPs, and in turn, VPNs, less necessary. The key word here, of course, ismost, as there are still sites you may visit that can take a peek into your online activity.

Its also worth noting that a VPN can prove to be useful when youre connected to a public network, or if youre in a place whereyour digital footprint is closely monitored, like your school or office. Subscribing to a VPN is still worth it, but you have to be mindful of services that tend to over-promise. One service that may be worthy of your trust isClearVPN, which boasts a 4.7 out of 5-star rating on Trustpilot. For a limited time, you can grab a 1-year subscription for 80 percent off.

ClearVPN prides itself as one of the first VPN services to offer a personalized approach to security and privacy. Focused on meeting your online needs, it packs a slick design, crystal clear and secure online interactions, improved privacy and anonymity features, and dynamic flow technology. In terms of privacy, it keeps your data safe with AES-256 encryption and cutting-edge protocols, including a strict no-logging policy. This means that they minimize the data collected from users, so they cant sell them or have them stolen, or worse, give them to the government.

This VPN service also lets you geo-shift, or unblock a specific website or piece of content only available overseas. Its also compatible with iOS, macOS, Android, and Windows, and ensures that you have the fastest connection possible. You can connect up to 6 devices per account, too, so your entire tech collection can benefit from the service.

Usually retailing for $155, you cangrab a 1-year subscription to ClearVPN for only $29.99.

Prices subject to change.

Continue reading here:
Enjoy End-To-End Encryption and Cutting-Edge Protocols with this VPN - Black Enterprise

Read More..

EU Commission plans to end encryption and make Big Tech the gatekeeper – Andreas Vou – DiEM25

The European Commission is dressing up its latest attempt to end encryption under the guise of protection against child sexual abuse material.

The European Commission has proposed legislation that would essentially spell the end of personal privacy online and end-to-end encryption.

While dressed as a method to combat the proliferation of child sexual abuse material online, the proposal would hand tech giants like Meta and Apple access to users images and messages, opening the door for far wider reaching surveillance system.

Under the proposal, the Commission has outlined the requirement for private companies to scour their servers for abusive material and report them to relevant authorities. Not only would this leave massive room for error due to the magnitude of data that companies would have to sieve through, but also for wider abuses of privacy with access to all forms of communication.

Allowing any authority access to private communications should be deemed unacceptable but handing that ability to notoriously untrustworthy Big Tech companies is like letting the fox guard the henhouse.

Yet as preposterous as such an idea sounds, it can come as no surprise when looking at just how much influence Big Tech wields inside European institutions. Lobbying is legalised bribery and when it comes to this particular tactic, no sector does it quite like the tech giants.

Europes once proudly strong safeguards on data protection have been gradually eroded precisely by these companies, who have lobbied relentlessly to intrude further and further into the publics digital space.

This has resulted in a shift of power that now sees these tech giants sway the laws and regulations into their favour, prising power from EU states.

Apple, which will play a prominent role in assisting the EU in this latest proposal, being one of the two global mobile operating systems, has increased its lobbying expenditure by 900 percent in less than a decade. From 700,000 euros spent in 2013 on lobbying EU institutions, that figure reached 7 million in 2021. And from having zero lobbyists with European Parliament accreditation working on the companys causes in 2013, it now employs eight on a full-time basis.

It is no mere coincidence that this proposal eerily resembles the very plan that Apple sought to implement less than a year ago, before it was struck down due to privacy concerns.

Now it is back, rebranded, and with the support of the European Commission.

The desire from certain sections of European institutions to bring an end to encryption is nothing new. The blocs most powerful and influential states, France and Germany, jointly pushed for this under the guise of terrorism prevention in 2016, while an internal draft document from the Council of the European Union outlined plans to do the same on the back of the 2020 Vienna terrorist attack.

Before, it was due to counter-terrorism efforts, today it is to prevent child abuse, tomorrow it will be to combat Russian disinformation or COVID-19 sceptics. But no matter how it is dressed, it will always be to strip citizens of their right to digital privacy, as has long been the objective.

Like many of the Commissions proposals, what sounds like a well-intended plan on the surface is yet another ruse to further intrude on individual privacy.

Do you want to be informed of DiEM25's actions? Sign up here

Read the rest here:
EU Commission plans to end encryption and make Big Tech the gatekeeper - Andreas Vou - DiEM25

Read More..

Introducing the Anonymous Internet Phone Booth, a Free Encrypted Video Calling Service by The Birdcalls Group. – PR Web

While we enjoy the sophistications that modern technology holds for us, The Birdcalls Group's Anonymous Internet Phone Booth reminds us that digital landscapes were meant for play as well.

MIDDLETOWN, Del. (PRWEB) July 30, 2022

Several months ago, the last phone booth in New York City was officially removed, as bystanders and nostalgia hunters looked on sadly. It was the end of an era for a city that, at one point, boasted over 22,000 of them over its five boroughs. And while many of us have cellphones; making it easy to connect with almost anyone in the world with the push of a couple of buttons, there is a certain sense of adventure and potential that will be sorely missed from stepping into a booth to make a private call.

However, The Birdcalls Group is helping restore some intrigue of these booths with the help of their digital offering; the Anonymous Internet Phone Booth. Like a step back in time (and into an eponymous booth) this digital portal combines old-world sentimentality with cutting-edge technology to allow users to make encrypted video calls to anyone in the world whenever they want, for free. Webcam-upgrading your call with a rigorous minimal knowledge architecture and peer-to-peer, end-to-end encryption means that users can enjoy the anonymity and privacy of an iconic phone booth in the comfort of their home, office, or even the palm of their hand. Its even got anti-screenshot technology, so you can rest assured that whatever happens in your booth, stays in your booth.

While we enjoy the sophistications that modern technology holds for us, The Birdcalls Group's Anonymous Internet Phone Booth reminds us that digital landscapes were meant for play as well. Whimsy, creativity, nostalgia, and gaiety are all essential parts of the creative online world, and by adapting the ways in which we communicate to hold both old traits and new, we don't run the risk of bulldozing history to make room for modernity. The internet, which is full of infinite possibilities, should be able to hold both at the same time.

Combining a classic red phone booth motif with green digital text and the familiar tones of a dial-up modem, the Anonymous Internet Phone Booth reminds us of the infinite possibilities that the internet holds for us, the countless connections we can make. All we have to do is pick up the phone and dial.

Share article on social media or email:

The rest is here:
Introducing the Anonymous Internet Phone Booth, a Free Encrypted Video Calling Service by The Birdcalls Group. - PR Web

Read More..

Email Encryption Tool Market Analysis by Industry Perspective, Comprehensive Analysis, Growth and Forecast 2022-2028 – Digital Journal

Email Encryption Tool Market research involves the study of various factors affecting the industry, including market environment, competitive landscape, historical data, present trends in the market, technological innovation, upcoming technologies and the technical progress in related industry, and market risks, opportunities, market barriers, and challenges.

Email encryption refers to the authentication mechanism of encoding and disguising the contents of an email to protect it from unauthorized access. Email is an extremely vulnerable mode of communication that can be hacked over unsecured or public networks. Encryption is one of the primary data security solutions in the present times. It secures the contents of the email by making them unreadable as they get transferred over networks. The methodology primarily depends on cryptography wherein the user publishes a key to decrypt the message. Email encryption tool is essential for both organizations and individuals as it prevents the access of important and confidential data by unintended users.

Sample PDF showcases the content structure and the nature of the information included in the report which presents a qualitative and quantitative analysis https://www.theinsightpartners.com/sample/TIPRE00023699

Competitive Overview:

A few leading players in the Email Encryption Tool domain have also been profiled in the report. The profiling of the market players acquaints the reader with their financial information about revenues as well as segment revenues, a competitive SWOT analysis for each player and the recent developments by the player in the Email Encryption Tool domain. The key developments are related to the mergers and acquisitions by the players in the recent past.

Players Mentioned are

Broadcom, Inc.

Cisco Systems, Inc.

CyberRe (Micro Focus)

Egress Software Technologies Ltd.

Entrust Corporation

Mimecast Services limited

Proofpoint, Inc.

Sophos Ltd.

Trend Micro Incorporated

Zix Corporation

Scope of the Report

The research on the Email Encryption Tool market focuses on mining out valuable data on investment pockets, growth opportunities, and major market vendors to help clients understand their competitors methodologies. The research also segments the Email Encryption Tool market on the basis of end user, product type, application, and demography for the forecast period 20212028. Comprehensive analysis of critical aspects such as impacting factors and competitive landscape are showcased with the help of vital resources, such as charts, tables, and infographics.

The report provides a detailed overview of the industry including both qualitative and quantitative information. It provides overview and forecast of the global Email Encryption Tool market based on various segments. It also provides market size and forecast estimates from year 2017 to 2028 with respect to five major regions, namely; North America, Europe, Asia-Pacific (APAC), Middle East and Africa (MEA) and South America. The Email Encryption Tool market by each region is later sub-segmented by respective countries and segments. The report covers analysis and forecast of 18 countries globally along with current trend and opportunities prevailing in the region.

Click here to avail lucrative discounts on our latest reports. We offer student, enterprise, and special periodic discounts to our clientele. Please fill the inquiry form below to know more https://www.theinsightpartners.com/discount/TIPRE00023699

The Insight Partners Email Encryption Tool Market Research Report Scenario includes:

The report provides qualitative and quantitative trends of global Email Encryption Tool Market across type, type of products, service, and geography.

The report starts with the key takeaways (Chapter Two), highlighting the key trends and outlook of the global Email Encryption Tool Market.

Chapter Three provides the research methodology of the study.

Chapter Four further provides PEST analysis for each region.

Chapter Five highlights the key industry dynamics in the Email Encryption Tool Market, including factors that are driving the market, prevailing deterrent, potential opportunities as well as future trends. Impact analysis of these drivers and restraints is also covered in this section.

Chapter Six discusses the global Email Encryption Tool Market scenario, in terms of historical market revenues, and forecast till the year 2028.

Chapter Seven to ten discuss Email Encryption Tool Market segments by type, type of application, service, and geography across North America, Europe, Asia-Pacific, Middle East and Africa, South and Central America. They cover market revenue forecast, and factors driving and governing growth.

Chapter Eleven describes the industry landscape analysis. It provides detailed description of various business activities such as market initiatives, new developments, mergers and joint ventures globally along with a competitive landscape.

Chapter Twelve provides the detailed profiles of the key companies operating in the global Email Encryption Tool Market. The companies have been profiled on the basis of their key facts, business description, products and services, financial overview, SWOT analysis, and key developments.

Chapter Thirteen, i.e. the appendix is inclusive of a brief overview of the company, glossary of terms, contact information, and the disclaimer section.

Immediate delivery of our off-the-shelf reports and prebooking of upcoming studies, through flexible and convenient payment methods https://www.theinsightpartners.com/buy/TIPRE00023699

About Us:

The Insight Partners is a one stop industry research provider of actionable intelligence. We help our clients in getting solutions to their research requirements through our syndicated and consulting research services. We specialize in industries such as Semiconductor and Electronics, Aerospace and Defense, Automotive and Transportation, Biotechnology, Healthcare IT, Manufacturing and Construction, Medical Device, Technology, Media and Telecommunications, Chemicals and Materials.

Contact Us:

If you have any queries about this report or if you would like further information, please contact us:

Contact Person: Sameer Joshi

E-mail: [emailprotected]

Phone: +1-646-491-9876

See original here:
Email Encryption Tool Market Analysis by Industry Perspective, Comprehensive Analysis, Growth and Forecast 2022-2028 - Digital Journal

Read More..

Optical Encryption Market Size, Scope, Growth Opportunities, Trends by Manufacturers And Forecast to 2029 This Is Ardee – This Is Ardee

New Jersey, United States This Optical Encryption Market research works as the best evaluation tool to track the progress of the industry and keep an eye on the competitors growth strategies. It further helps to keep you ahead of your business competitors. This report depicts a few potential problems and gives solutions to them by doing comprehensive research on the market scenario. Valuable information is provided here about a particular market segment according to product type, application, region type, and end user. By referring to this comprehensive Optical Encryption market analysis report, it becomes possible for organizations to monitor the efficiency of sales, determine the quality of services offered by competitors, estimate the competition level in the market and understand the communication channels followed by competitors in the market.

This Optical Encryption Market research report covers career outlooks, regional marketplaces, and an overview of the expectations of a number of end-use sectors. With the help of relevant market data, key organizations are able to obtain a competitive benefit over the competitors in the market and attain the best results for business growth. Furthermore, this Optical Encryption market analysis report emphasizes doing a comparison between several various geographical markets in key regions such as North America, Europe, Middle East, Africa, Latin America, and Asia Pacific. It aims at covering complex structures to classifications to an easy-to-follow overview of different business sectors.

Get Full PDF Sample Copy of Report: (Including Full TOC, List of Tables & Figures, Chart) @https://www.verifiedmarketresearch.com/download-sample/?rid=27147

Key Players Mentioned in the Optical Encryption Market Research Report:

ADVA Optical Networking SE, Ciena Corporation, ECI Telecom Ltd., Nokia Corporation, Huawei Technologies CO, Infinera Corporation, Microsemi Corporation, Acacia Communications, Arista Networks, Cisco System, Inc.

A massive amount of information presented in this Optical Encryption Market report helps business players to make beneficial decisions. Some of the major key aspects covered in this market analysis are key performance indicators, customer acquisition, and manufacturers list. Performance results of the marketing plan are also covered in this market analysis report. This market study report enables to bring the improvements required in the business. It further talks about how COVID-19 caused huge trauma in several major sectors. Key marketing channels, market growth opportunities, core marketing strategy, and current scope of the business are some of the major factors discussed in this report. It further briefs on the current position of the market. It depicts the effect of metrics on market trends, revenue, and leads.

Optical EncryptionMarket Segmentation:

Optical Encryption Market, By Encryption Layer

OTN-Layer 1 MACsec-Layer 2 IPsec-Layer 3

Optical Encryption Market, By Data Rate

Less than 10G Greater than 10G and less than 40G Greater than 40G and less than 100G Greater than 100G

Optical Encryption Market, By Vertical

Banking, financial services, and insurance (BFSI) Government Healthcare Data center and cloud Energy and utilities Others

Inquire for a Discount on this Premium Report@ https://www.verifiedmarketresearch.com/ask-for-discount/?rid=27147

For Prepare TOC Our Analyst deep Researched the Following Things:

Report Overview:It includes major players of the Optical Encryption market covered in the research study, research scope, market segments by type, market segments by application, years considered for the research study, and objectives of the report.

Global Growth Trends:This section focuses on industry trends where market drivers and top market trends are shed light upon. It also provides growth rates of key producers operating in the Optical Encryption market. Furthermore, it offers production and capacity analysis where marketing pricing trends, capacity, production, and production value of the Optical Encryption market are discussed.

Market Share by Manufacturers:Here, the report provides details about revenue by manufacturers, production and capacity by manufacturers, price by manufacturers, expansion plans, mergers and acquisitions, and products, market entry dates, distribution, and market areas of key manufacturers.

Market Size by Type:This section concentrates on product type segments where production value market share, price, and production market share by product type are discussed.

Market Size by Application:Besides an overview of the Optical Encryption market by application, it gives a study on the consumption in the Optical Encryption market by application.

Production by Region:Here, the production value growth rate, production growth rate, import and export, and key players of each regional market are provided.

Consumption by Region:This section provides information on the consumption in each regional market studied in the report. The consumption is discussed on the basis of country, application, and product type.

Company Profiles:Almost all leading players of the Optical Encryption market are profiled in this section. The analysts have provided information about their recent developments in the Optical Encryption market, products, revenue, production, business, and company.

Market Forecast by Production:The production and production value forecasts included in this section are for the Optical Encryption market as well as for key regional markets.

Market Forecast by Consumption:The consumption and consumption value forecasts included in this section are for the Optical Encryption market as well as for key regional markets.

Value Chain and Sales Analysis:It deeply analyzes customers, distributors, sales channels, and value chain of the Optical Encryption market.

Key Findings:This section gives a quick look at the important findings of the research study.

For More Information or Query or Customization Before Buying, Visit @ https://www.verifiedmarketresearch.com/product/optical-encryption-market/

About Us: Verified Market Research

Verified Market Research is a leading Global Research and Consulting firm that has been providing advanced analytical research solutions, custom consulting and in-depth data analysis for 10+ years to individuals and companies alike that are looking for accurate, reliable and up to date research data and technical consulting. We offer insights into strategic and growth analyses, Data necessary to achieve corporate goals and help make critical revenue decisions.

Our research studies help our clients make superior data-driven decisions, understand market forecast, capitalize on future opportunities and optimize efficiency by working as their partner to deliver accurate and valuable information. The industries we cover span over a large spectrum including Technology, Chemicals, Manufacturing, Energy, Food and Beverages, Automotive, Robotics, Packaging, Construction, Mining & Gas. Etc.

We, at Verified Market Research, assist in understanding holistic market indicating factors and most current and future market trends. Our analysts, with their high expertise in data gathering and governance, utilize industry techniques to collate and examine data at all stages. They are trained to combine modern data collection techniques, superior research methodology, subject expertise and years of collective experience to produce informative and accurate research.

Having serviced over 5000+ clients, we have provided reliable market research services to more than 100 Global Fortune 500 companies such as Amazon, Dell, IBM, Shell, Exxon Mobil, General Electric, Siemens, Microsoft, Sony and Hitachi. We have co-consulted with some of the worlds leading consulting firms like McKinsey & Company, Boston Consulting Group, Bain and Company for custom research and consulting projects for businesses worldwide.

Contact us:

Mr. Edwyne Fernandes

Verified Market Research

US: +1 (650)-781-4080UK: +44 (753)-715-0008APAC: +61 (488)-85-9400US Toll-Free: +1 (800)-782-1768

Email: sales@verifiedmarketresearch.com

Website:- https://www.verifiedmarketresearch.com/

Original post:
Optical Encryption Market Size, Scope, Growth Opportunities, Trends by Manufacturers And Forecast to 2029 This Is Ardee - This Is Ardee

Read More..

As map apps add more features, this startup aims to make navigation simpler – CNBCTV18

Google recently annnounced that it is adding more interactive features for Indian users. Earlier in the year, Google had announced Immersive View using which users can completely explore a landmark in select cities around the world. Apple too is constantly adding features to its native maps application to make it a more attractive prospect.

Against such a backdrop, a plucky startup is aiming to cut all the complications out of navigations to make it simpler for one to find their way around. If the app, Pataa, gains a large userbase, then gone will be the days when you have to explain directions to befuddled delivery executives despite having dropped a pin on your precise location.

Pataa Navigations is an Indore-based startup founded by Rajat and Mohit Jain. In November 2021, the startup claims to have raised seed funding to the tune of $2.1 million dollars from investors based in Dubai, the United States and India. So far, the app claims to have clocked 7 million active users

Also read:

How does it work?

The app available on Android, iOS and web browsers divides the the world into 3 square metre blocks, each with an unique code. All you have to do is drop a pin on your exact location, and you will be given a unique ID that has your complete address replete with navigation guidance.

Other features

Voice directions: Pataa claims to gives users the option of recording precixe directions to your address.

Landmark selection: Users can also select the nearest landmark from which they can select the best route to their address.

While these may not seem like revolutionary features, Kratika Jain, Pataa's Chief Operating Officer, says the app, in fact, cuts out at least five steps in one navigating to a location. Further, staring July, Jain says the company has opened up its Application Programming Interface (API) to e-commerce websites and other delivery platforms, wherein you would just need to enter your Pataa unique ID.

"We will give our clients, with the short code, access to your information, address, your geo-tagged location, so that when you place the order, a QR code can be added to the label. The delivery guy can just scan the code to get the benefit of the app's navigation system," she explains.

The directions then open on a browser and Bob's your uncle.

Jain makes sure to make the distinction between Pataa, and Google Maps and Apple Maps. "We are an addressing application, and not a navigation service. We only augment the maps apps," she says.

Each 3x3 block has unique GPS coordinates and the world is divided into 3 billion blocks. which means many truckloads of potentially uniquely identifiable data, which is stored with Pataa.

That brings up the very pertinent question how safe is my data? "We use 356-bit encryption," says Jain.

This is one of the most secure encryption methods after 128- and 192-bit encryption, and is used in most modern encryption algorithms, protocols and technologies. Hackers will need to make 2 to the power of 256 attempts to break this encryption, which is a number running into 77 digits virtually impossible, simply put.

For an startup that is just over two-years-old, the goal to disrupt the whole navigation ecosystem might be quite ambitious, but it has a long way to go, and the company knows it.

First Published:Jul 29, 2022, 04:29 PM IST

See more here:
As map apps add more features, this startup aims to make navigation simpler - CNBCTV18

Read More..

The 5 Best Cloud Storage Services of 2022 – How-To Geek

sdx15/Shutterstock.comWhat to Look For With Cloud Storage in 2022

In little more than 10 years, cloud storage has gone from something only used by businesses and the tech-savvy to something that millions of us rely on every day. As such, the number of available cloud storage services has increased exponentially while their prices have gone down.

Even so, finding the best value-for-money service is important. That isnt always about how much space you get, but that is often where we start when looking at storage plans. Unfortunately, it is difficult to know exactly how much storage space you might need until you actually start storing all of your files.

Most providers have a free storage plan to get you started, but it is still worth looking at how much the premium plans will cost if you ever need to upgrade. The average market price for 2 terabytes of cloud storage is around ten dollars a month, which is more than enough storage for almost everyone.

Almost all cloud storage services offerend-to-end encryption. This means that your files are encrypted during transfer as well as when they are in the cloud storage. Anyone intercepting them will only see scrambled data unless they have the encryption key.

In standard end-to-end storage, it is usually only you and the storage provider who has the key. Zero-knowledge encryption takes this a step further by taking the encryption key away from the provider so that only you can read your files. If you want the best possible data security, zero-knowledge storage is the way to go.

Microsoft, Apple, and Google all have their own cloud storage services, both free and premium. Only Google Drive has made it onto our list, mainly because it is less OS-dependent than the other two. However, if you use Windows and work in Microsoft Office, choosing OneDrive for your cloud storage is a viable option. Equally, if you use one or more Apple devices, upgrading to a premium plan with iCloud is a great option.

Both Box and Dropbox, two other huge names in cloud storage, are also missing from our list of the best. Both services are very good but are geared more toward businesses rather than individual usersas such, theyre worth considering if you need cloud storage for a company rather than for yourself.

All of our picks are, of course, solid cloud storage services. But each also offers something unique that makes it worth the recommendation.

Pros

Cons

IDrive is somewhat unique because it offers a mix of cloud storage and online backup, which are usually sold as separate services. It manages to do this at a price that is lower than many stand-alone cloud storage services without compromising too much on features.

IDrive offers a free plan that gives you 10GB of basic cloud storage space for those who want to try out the service. Beyond that, the premium plans are some of the cheapest around for the capacity they offer. The lowest-priced plan is IDrive Personal, which gives you a huge 5TB for less than $5/month for the first year.The only downside is that there isnt the option to pay monthly, so you need to foot the annual bill upfront.

File storage can be easily managed through the browser interface or in the desktop and mobile apps. When you install the desktop app, it creates a single folder called Sync. Everything you place in this folder is backed up to the cloud storage and is accessible from your other devices, making it easy to access important files from anywhere.

One of the most interesting features of IDrive is how it handles versioning. Most cloud storage will retain versions of your files for a set period of time, so you can recover or revert changes to files. IDrive does things differently, keeping up to 30 previous versions of edited files for an unlimited time. Those 30 previous file versions also dont count towards your storage quota, so you dont need to worry about filling up your space with multiple versions of the same file.

Your cloud-stored files and backed-up data are protected by end-to-end, 256-bit AES encryption. By default, the service isnt zero-knowledge, but you can choose to create a private key during setup. Doing this makes it zero-knowledge, but you sacrifice the option to easily share files. If you dont think you will need to share files, this wont be a problem.

Aside from the general file storage features, IDrive also gives you the tools to create and save a backup or a clone of your computers hard disk. If your drive fails, a clone allows you to quickly restore everything, including the operating system, onto a new drive.

It could be argued that IDrive is more about backups than it is about file storage, but we think the split between the two services is pretty even. It does lack the sharing and collaboration tools that most pure cloud storage services give you, but for data backup and storage, IDrive is brilliant.

Pros

Cons

Google Drive makes it onto this list over other well-known cloud storage providers for several reasons, starting with just how many people already have a Google account.The 15GB of free storage and excellent collaboration tools, especially for those who also useGoogle Workspace, are also compelling arguments for using it.

If 15GB of free storage isnt enough, there are several premium plans to upgrade to. They start with Basic, which gives you 100GB for just $2 a month and goes up to 30TB for $150 a month. In the middle, you have the 2TB plan, and while this isnt the best value at $8.33/month, it is comparable to similar storage plans from other providers.

One of the best features of Google Drive is the number of available add-ons. There are dozens of completely free tools that you can add, from file organization tools to collaboration and productivity aids.

If the people you collaborate with use Google Workspace tools such as Docs and Sheets, Google Drive becomes even more useful. You can easily share a document with someone, grant them editing permissions, and even work on the same document at the same time as someone else.

As you might expect, it also works well with all other Google products. If you have an Android phone, Drive is completely integrated and can be easily used to store backups of your phone system and data. There are also apps available for Windows, iOS, iPadOS, andMac, all of which are well designed and easy to use.

Where Google Drive fails slightly is in security and privacy. Although it features end-to-end encryption, there isnt zero-knowledge encryption. That means, at least from a technical standpoint, Google can access your data whenever it wants. And as Google doesnt have the very best reputation for respecting its users privacy, youll want to keep this in mind when using Drive.

Pros

Cons

Icedrive is the newest cloud storage service on this list, having only been around since 2019. In a market dominated by some very big and well-established names, it is all too easy to overlook the new players. That would be a mistake, though, as this innovative UK-based company has a brilliant cloud storage offering.

To start, Icedrive offers a free plan for personal use. This free plan gives you a respectable 10GB of cloud storage, with a 3GB daily bandwidth limit. You dont get the same client-side encryption that the premium plans have, but for less sensitive data, this free service is good. The three premium storage plans start at just $1.67 a month for 150GB, with the biggest 5TB plan running to $15/month.

One of the best features of Icedrive is how it gives you access to your stored files. As well as the easy-to-use apps for Android and iOSand the web application, it also offers some rather clever Windows desktop software.

This software lets you access your cloud-stored files as if they were in a drive mounted in your computer, so your cloud storage looks and behaves just as all the other storage does. Moving files to and from this virtual drive is as quick and smooth as it would be to move files from one folder to another on your PC.

Another unique selling point of Icedrive is how it encrypts your files. Rather than using the standard and widely-used AES encryption algorithm, it uses something called Twofish. Twofish is considered by many security experts to be as or more secure than AES encryption, and because it is not as widely used, is less likely to be targeted by hackers.

In addition, the encryption is zero-knowledge and end-to-end, so the encryption keys that are generated are only available to younot even Icedrive can access them.

Where Icedrives cloud storage is slightly lacking is in its sharing and collaboration features. There are a few, such as the ability to password-protect sharing links and set an expiration date. You can also create upload-only links to folders if you dont want someone to have full control over the contents. But one glaring omission is the lack of permissions for other users. That means you cant allow collaborators to edit files or folders in your storage.

If sharing and collaboration arent important to you, however, and you want secure and hassle-free cloud storage, Icedrive is a perfect choice.

Pros

Cons

Sync may not be as well known as some of the other names in cloud storage, but over the last few years, it has become increasingly popular. This is due to its extremely attractive mix of great value, strong security, and an impressive suite of features. As a pure cloud storage service, Sync is top-tier.

As with every cloud storage service in this list, Sync offers a free plan for anyone who needs a bit of basic storage or who wants to try out the service. For free, you get 5GB of storage space, 30 days of file versioning and recovery, and some limited sharing options such as the ability to create a few password-protected links. The premium solo plans start at $8/month for 2TB of storage and go up to $20/month for 6TB.

Sync has data security covered thanks to its use of zero-knowledge, end-to-end encryption. The strong security features continue over into the sharing options. You can create unlimited password-protected links, set download limits on shared files, and set expiration dates for shared links.

Along with the secure sharing features already mentioned, you can create centralized folders and set access permission by the user or folder. If a device that has access to the storage is lost or stolen, you have the option to remotely lock out connected devices. It also lets you remotely delete files that you have shared.

Sync does file syncing very well, with easy-to-use apps for iOS and Androidand a well-designed web interface. Most cloud storage works by storing files on your computer and in the cloud. Sync is no different, but if physical storage space on your computer is a concern, you can choose folders that only sync to certain devices. And unlike several other cloud storage services, there are no limits on file size and data transfer, making it a great choice if you regularly need to store large files.

In our testing, which involved uploading the same 1GB folder to all of the cloud storage services on this list, it wasnt the fastest at transferring data, but it certainly wasnt prohibitively slow. If you want a secure, useable, and good-value cloud storage service that doesnt try to be anything else, Sync ticks all the boxes.

Pros

Cons

MEGA makes the list for several reasons, but the main selling point is that it offers the largest amount of free storage space of any current cloud storage service. MEGAs free plan offers 20GB of storage before you need to upgrade, double the amount many services on this list give you.

MEGA also allows you to add more free storage space by completing certain actions such as installing themobile app for iOS or Androidor inviting friends to sign up. This bonus storage is only valid for a year, but if you have filled it up for the entire year, upgrading to a premium plan was in the cards anyway.

On that note, there are several premium plans to choose from. For individuals, these start at $5 a month for 400GB and go up to a huge 16TB for under $30 a month. You do have monthly data transfer limits on all of the premium plans, but they are fairly generous and are equal to the total size of the storage.

MEGA is another cloud storage service that uses end-to-end, zero-knowledge encryption. As long as you are careful with your account password, this is about as secure as consumer cloud storage can get. For added security, you can also enable Two-Factor Authentication (2FA) and save a recovery key that can be used to regain access if you forget your account password.

One of the most unique features of MEGA is the secure chat client it provides. In either the desktop, mobile, or web app, you can create a chat link. Only someone with that link can join, and all of the chat content is secure and encrypted, so it is completely private.

There is also a good selection of sharing options. Shared links are encrypted, and encryption keys can be sent separately for added security. You can also set passwords and expiration dates on links, or revoke access by changing the permissions after the link is sent.

MEGA does have a slightly troubled past, having been created by Kim Dotcom. He left the company in 2015, however, and no longer has any dealings with it. There are also some privacy concerns with the privacy policy stating that third parties can use your data. This is not really different from the sort of data companies like Google or Microsoft collect and use, but it is worth keeping in mind.

MEGA offers a very secure, fast, and good value service, and if you are looking for a large chunk of free cloud storage, it cant be beat.

Read more from the original source:
The 5 Best Cloud Storage Services of 2022 - How-To Geek

Read More..

Journal Article: Why It Takes a Village to Manage and Share Data – LJ INFOdocket

The article linked below was recently published by Harvard Data Science Review (HDSR).

Title

Why It Takes a Village to Manage and Share Data

Authors

Christine L. BorgmanUCLA

Philip E. Bourne

Source

Harvard Data Science Review (4)3

DOI: 10.1162/99608f92.42eec111

Abstract

Implementation plans for the National Institutes of Health policy for data management and sharing, which takes effect in 2023, provide an opportunity to reflect on the stakeholders, infrastructures, practice, economics, and sustainability of data sharing. Responsibility for fulfilling data-sharing requirements tends to fall on principal investigators, whereas it takes a village of stakeholders to construct, manage, and sustain the necessary knowledge infrastructure for disseminating data products. Individual scientists have mixed incentives and many disincentives to share data, all of which vary by research domain, methods, resources, and other factors.

Motivations and investments for data sharing also vary widely among academic institutional stakeholders such as university leadership, research computing, libraries, and individual schools and departments. Stakeholder concerns are interdependent along many dimensions, seven of which are explored: what data to share; context and credit; discovery; methods and training; intellectual property; data science programs; and international tensions. Data sharing is not a simple matter of individual practice, but one of infrastructure, institutions, and economics. Governments, funding agencies, and international science organizations all will need to invest in commons approaches for data sharing to develop into a sustainable international ecosystem.

Direct to Full Text Article

Direct to Table of Contents HSDR 4(3)

Filed under: Associations and Organizations, Data Files, Funding, Libraries, Management and Leadership, News

Go here to read the rest:

Journal Article: Why It Takes a Village to Manage and Share Data - LJ INFOdocket

Read More..

‘Communication and collaboration are everything in data science’ – Siliconrepublic.com

Daniel Moore explains why honesty is the best policy in data science and why the best models and most sophisticated techniques are not what matters most.

Daniel Moore is a lead data scientist at Liberty IT with a decade of experience in the analytics and data science field.

He has a background in biophysics and has worked in diverse fields such as cancer research, drug design, the mobility sector and insurance.

Moore told SiliconRepublic.com that his love for maths and physics were what started him on his STEM career. By the time it came to choosing what to study in university, it was between computer science and human biology. But the latter won out.

I know there was a turning point in my education and one person that shaped how I got here. In your final year of most university degrees, you undertake a research project. Essentially you work with a professor to explore your thoughts on how to solve a novel problem. Mine was Frank, he said.

As part of this, I worked with a new group of people who were all really friendly and devoted time to helping me learn. No question was too stupid. This was my first time programming. I remember how amazing it felt to solve mathematical problems automatically and with incredible speed. I didnt know such a field existed where I could work in biology and explore my love for technology and computers.

This experience made him change his career plans. He did a masters degree in computational biology, now known as bioinformatics, and went to complete a PhD in biophysics and drug design.

I was exposed to the real tangible impact of data science on humans, he said. How we can leverage data to screen for cancer automatically, to design and develop new drugs in a move toward a disease-free world preventing unnecessary suffering and death. I may have got here by chance, but I stayed because the impact and use case were just incredible.

The models you produce as a data scientist are useless if you cannot explain how they work DANIEL MOORE

When you finish your PhD or your degree, one question always gets asked, should I continue in academia or move to industry? However, a good work-life balance was important to me so I decided against studying medicine and chose to explore a career in industry.

It wasnt an obvious choice. I applied to be a lecturer before submitting my CV to a small local start-up company to work as something called a data scientist. It was the first time I heard that term, and with a fear of interviews, I almost didnt go. Looking back, Im so glad I took that opportunity for multiple reasons to experience a career in industry, within a start-up and as a data scientist.

For two years I was fortunate enough to work within the mobility sector on cutting-edge tech such as self-driving cars, biometric wearables and how we can use such sensors to improve driver safety. I got to work with some amazing tech and OEM car brands such as Bentley and Volvo, and experience that start-up culture even working in Silicon Valley for a brief time. However, start-up life is difficult, your input directly shapes the future of the company, and you feel a tremendous amount of responsibility.

I decided to make a change and joined Liberty IT as a senior data scientist. What drew me to this job was the diversity of projects and the impact they could have. Like many, I would hear the word insurance and practically fall asleep with boredom. However, this is certainly not the case here and the projects I get to work on would put this stereotype to shame.

I never realised just how much insurance impacts our everyday lives, making things right when something unfortunate happens. The projects I get to work on impact the everyday person. Moreover, I have always enjoyed learning. The sheer diversity of projects within computer vision, natural language processing, predictive modelling and MLOps provide enough learning for a lifetime.

No one wants to do the same thing day in, day out, and thats the beauty of data science in general its an emerging discipline and that means you need to constantly learn and adapt. It was one of the great aspects of research and now is part of my career as a data scientist. I love it.

As a data scientist, you tend to work on solving various problems by developing statistical models and learning from historical data. However, you often need to explain some insights and your methodology to solve a given problem in the manner that you did.

The difficulty is that you need to explain this to a non-technical individual, the stakeholder. Its all too easy to pull the wool over someones eyes and razzle-dazzle them with fancy terminology and buzzwords. Data science is a disciple where you need to be honest, show in a non-biased way your insights and recognise there are a plethora of methods to solve any given problem.

No matter how experienced you are, sometimes you will not be able to solve that problem, your approach might be incorrect, and youll often be the bearer of bad news: Sorry Mr Stakeholder, its unrealistic to train a model to be 100pc accurate.

Its incredibly challenging to be so honest with your insights. In fact, to progress your career in data science it often feels like you need to develop the best performing model and use the most sophisticated techniques. There have been times in my career when I have chosen to have the easier conversations, to be passive rather than debate why a problem might not be possible to solve with data science.

My advice is always be honest, always have those difficult conversations, push back when you need to and have the confidence to speak openly to your stakeholders regardless of their seniority. Ultimately, people will have more respect and trust for you if you do.

I would say there was a combination of people that influenced my career. My university professor Frank helped give me the confidence to ask the stupidest of questions and sparked my initial interest in research. Irina, my PhD supervisor, showed me what it takes to strive for perfection, and my first boss Gawain helped show me the reality of the commercial world.

On another side, some individuals have explained complex topics in ways that really helped me understand them. Josh Starmer for example, the individual behind StatQuest videos on YouTube. He helped me appreciate that everyone can understand the most complex topics.

The most obvious trait is the logical part of me loves the methodical nature of data science. If you are new to the field, it may feel like there are a million and one ways to analyse data or create a predictive model. However, there is method to the madness and as you gain experience you realise that most projects follow a similar lifecycle.

I think there are a few other areas which are well suited to a career in analytics. I am the type of person who needs to understand fully how something works. This inquisitive nature drives me to ask questions and get to the root of a problem. It helps to be inquisitive and understand how your solution will solve the actual problem.

Lastly, communication and collaboration are everything in data science. You can be the most technically proficient individual, however, the models you produce as a data scientist are useless if you cannot explain how they work and can then collaborate with your team to move your model into production, to consume real-world data and make actionable insights.

Data science is one of the most diverse fields imaginable. Frankly, its overwhelming. The norm for progressing to a more senior role is to deepen your knowledge in one of the three big areas of data science computer vision, NLP or predictive modelling before branching out into another area.

Try to ignore the feeling that you need to be knowledgeable across all of these areas. If you are reading a job description that is asking for knowledge across all three disciplines, they dont need a single data scientist, they need a full team of specialists.

At Liberty IT, one of the questions we ask all new starts is what area excites you the most in data science? Ultimately, if you have never worked on a computer vision project but are eager to explore this side of data science, they will pair you with an experienced individual to help you learn and progress in that area.

I feel like there is a real emphasis on training and development at Liberty IT that makes it much easier to progress your career. Everyone in our team is given the opportunity to take on board other responsibilities that help develop their career, such as interviewing, supervising more junior employees and teaching others within the data science community. Its honestly a really nice place to work.

Lastly, I think there is a misconception about career progression in the tech industry. Many think that a promotion simply means more money. As you progress in your career your responsibility changes. I think its worthwhile reflecting on what type of work you enjoy the most, the technical aspect or the management and strategy side.

Its my opinion that the most interesting careers are the ones that you find difficult to describe to your parents, what exactly it is you do, and where you define the language of your discipline.

Data science and the general field of analytics have been exactly this for me. Its changing rapidly and theres a lot to learn.

If youre starting your career in analytics or data science, imposter syndrome is something you need to be mindful of. Dont panic about not knowing everything. Ask questions and be open to learning new things.

10 things you need to know direct to your inbox every weekday. Sign up for theDaily Brief, Silicon Republics digest of essential sci-tech news.

Visit link:

'Communication and collaboration are everything in data science' - Siliconrepublic.com

Read More..