Page 2,088«..1020..2,0872,0882,0892,090..2,1002,110..»

One year after Biden executive order, cyber officials defend progress – The Record by Recorded Future

A year after President Joe Biden signed a sweeping executive order to better secure federal networks from hackers, senior cyber officials insisted progress has been made even though compliance with key portions of the directive remains uneven.

Biden issued the order in response to the SolarWinds digital espionage campaign carried out by the Russian government, which infiltrated at least nine federal agencies and about 100 companies.

The president set deadlines for more than 50 different reports and actions including mandating agencies encrypt their data, enable multi-factor authentication to back up passwords and update plans for safely using cloud hosting services in an attempt to overhaul the way the government defends itself against cyberattacks.

The security of our nation will be drastically improved when the goals of the EO have been met, and we feel weve made tremendous progress over this first year, Federal Chief Information Security Officer Chris DeRusha told the House Homeland Security Cybersecurity Subcommittee on Tuesday.

Eric Goldstein, the head of the Cybersecurity and Infrastructure Security Agencys cyber division, said the order took important steps toward changing how the government handles cybersecurity. But we have a tremendous amount of more work to do on digital investment and modernization within the executive branch, he added.

Lawmakers on both sides of the aisle expressed concern that agencies are falling short of the orders benchmarks.

Rep. Andrew Garbarino (N.Y.), the subpanels top Republican, asked what less cyber mature agencies could do to catch up.

David Shive, the General Services Administrations chief information officer, advised entities to make sure cybersecurity is part of every business plan and to ingratiate themselves in the larger cyber community in order to gain additional know-how.

Rep. Ritchie Torres (D-N.Y.), the Homeland Security Committees vice chair, noted that Bidens order required all agencies to either implement multi-factor authentication by November or provide a reason for failing to do so.

Torres said he and Rep. Yvette Clarke (D-N.Y.), the subcommittee chair, sent a letter toCISA Director Jen Easterly earlier this year about compliance and that she promised most agencies would be compliant by mid-March.

I would say every agency with the capacity to deploy MFA and encryption has done so in almost all cases, Goldstein replied after being pressed by the New York Democrat.

Do you have a number? Torres asked.

I dont, sir, Goldstein replied.

Martin is a senior cybersecurity reporter for The Record. He spent the last five years at Politico, where he covered Congress, the Pentagon and the U.S. intelligence community and was a driving force behind the publication's cybersecurity newsletter.

Read the original:
One year after Biden executive order, cyber officials defend progress - The Record by Recorded Future

Read More..

NICE Wins 2022 Best Practices Award for WFM Product Leadership in the Indian Market – Business Wire

HOBOKEN, N.J.--(BUSINESS WIRE)--NICE (Nasdaq: NICE) today announced that it has received Frost & Sullivans 2022 Product Leadership Award for its strong overall performance in the Indian workforce management software industry. The award, one of Frost & Sullivans Best Practices Awards, recognizes the company delivering a product or solution of the highest quality, reliability and performance in its sector.

Frost & Sullivan evaluated NICEs workforce management (WFM) software solutions, which include automation, customer experience and cloud services, for both product attributes and business impact. Their analysts noted that the NICE WFM suite of solutions combines cutting-edge artificial intelligence and cloud technology, promoting greater automation and efficiency. NICE was specifically praised for its innovation, flexibility, design, best-in-class consulting services and customer-focused growth strategy.

According to Frost & Sullivan, NICE has crafted a solution where businesses continue meeting their service goals while helping the agent population, which drives down [a] contact centers incredibly high attrition costs. NICEs purpose-built solution suite sets it apart from its competitors.... Regarding the Indian market, the Product Leadership Award write-up noted a growing pressure on contact centers in India to bring down operational costs through effective workforce management solutions and praised NICE for maintaining its Indian presence while meeting customer-specific needs. Frost & Sullivan also noted that, the company is well-positioned in the market, with an industry-leading product that provides tremendous value in high-demand sectors.

In 2021, Frost & Sullivan recognized NICE for its positioning, design, reliability, and quality, and remains impressed with the companys continuing innovation and sustained leadership, said Kristin Portela, Best Practices Research Analyst, Frost & Sullivan. NICE is at the forefront of incorporating cutting-edge artificial intelligence (AI) capabilities into its solutions, enabling its customers to automate their scheduling processes, which helps increase contact center agent productivity. Moreover, NICEs consultants have years of experience running contact centers and providing accurate guidance on how to leverage technology to help drive the customers business goals. Having the right technology with the right consulting team at a competitive price successfully retains and attracts new customers.

The companys product leadership in WFM is exemplified by the transformation of Firstsource Solutions Ltd., a global business process solutions provider based in India and NICE customer of ten years. Firstsource recently transitioned its workforce management operations to the cloud with NICEs WFM suite, as part of its Digital First, Digital Now strategy. The shift to NICEs cloud-hosted environment creates a long-term workforce management strategy for Firstsource, reducing costs, increasing efficiency and improving services as the company accelerates its digital transformation journey.

Our WFM suite was designed to provide a high degree of accuracy for the business and agility for the agent. Accuracy to ensure the right number of agents are scheduled to provide exceptional service to customers and agility for maximum agent work/life balance, said Darren Rushworth, President, NICE International. We are pleased to be recognized by Frost & Sullivan as the leader in providing WFM solutions that meet the needs of the Indian market, and we see a great opportunity for growth in that region as more and more organizations seek the dynamic and responsive cloud environment for its WFM activities.

About NICEWith NICE (Nasdaq: NICE), its never been easier for organizations of all sizes around the globe to create extraordinary customer experiences while meeting key business metrics. Featuring the worlds #1 cloud native customer experience platform, CXone, NICE is a worldwide leader in AI-powered self-service and agent-assisted CX software for the contact center and beyond. Over 25,000 organizations in more than 150 countries, including over 85 of the Fortune 100 companies, partner with NICE to transform - and elevate - every customer interaction. http://www.nice.com

Trademark Note: NICE and the NICE logo are trademarks or registered trademarks of NICE Ltd. All other marks are trademarks of their respective owners. For a full list of NICEs marks, please see: http://www.nice.com/nice-trademarks.

Forward-Looking StatementsThis press release contains forward-looking statements as that term is defined in the Private Securities Litigation Reform Act of 1995. Such forward-looking statements, including the statements by Mr. Rushworth, are based on the current beliefs, expectations and assumptions of the management of NICE Ltd. (the Company). In some cases, such forward-looking statements can be identified by terms such as believe, expect, seek, may, will, intend, should, project, anticipate, plan, estimate, or similar words. Forward-looking statements are subject to a number of risks and uncertainties that could cause the actual results or performance of the Company to differ materially from those described herein, including but not limited to the impact of changes in economic and business conditions, including as a result of the COVID-19 pandemic; competition; successful execution of the Companys growth strategy; success and growth of the Companys cloud Software-as-a-Service business; changes in technology and market requirements; decline in demand for the Company's products; inability to timely develop and introduce new technologies, products and applications; difficulties or delays in absorbing and integrating acquired operations, products, technologies and personnel; loss of market share; an inability to maintain certain marketing and distribution arrangements; the Companys dependency on third-party cloud computing platform providers, hosting facilities and service partners;, cyber security attacks or other security breaches against the Company; the effect of newly enacted or modified laws, regulation or standards on the Company and our products and various other factors and uncertainties discussed in our filings with the U.S. Securities and Exchange Commission (the SEC). For a more detailed description of the risk factors and uncertainties affecting the company, refer to the Company's reports filed from time to time with the SEC, including the Companys Annual Report on Form 20-F. The forward-looking statements contained in this press release are made as of the date of this press release, and the Company undertakes no obligation to update or revise them, except as required by law.

Continued here:
NICE Wins 2022 Best Practices Award for WFM Product Leadership in the Indian Market - Business Wire

Read More..

The new generation of CentOS replacements plus the daddy of them all: RHEL 8.6 – The Register

Red Hat Enterprise Linux 8.6, Alma Linux 8.6 and Rocky Linux 8.6 are all out now, for various platforms.

RHEL version 8.6 codenamed "Ootpa" arrived on May 11, and is the latest update to 2019's RHEL 8. RHEL point releases are relatively neat affairs compared to, say, Ubuntu's short-term support releases.

8.6 is a step up from last November's RHEL 8.5. It's still based on Fedora 28 and still uses the same kernel version. In this version, you get kernel 4.18-372, which has another six months' worth of bugfixes, security updates and so on.

Subcomponents include PHP 8.0, Perl 5.32, GCC 11, LLVM 13.0.1, Rust 1.58.1, Go 1.17.76, and your choice of OpenJDK 1.8, 11 or 17. It also supports Log4J 2, which should be safe. If you decide to install a desktop, GNOME is now on version 3.32.

Red Hat supports AMD and Intel x86-64 processors, 64-bit ARM, IBM POWER systems in little-endian mode, and 64-bit IBM z Series mainframes.

AlmaLinux sports a funky coloured wallpaper and lock screen

Close on its heels followed AlmaLinux 8.6, codenamed "Sky Tiger", on May 12. As we described when it launched its first version, AlmaLinux is built from the RHEL source code that Red Hat makes available, so although it has its own codename, logo, wallpapers and so on, it is the same OS, with the same versions of the same components.

For version 8.6, the AlmaLinux OS Foundation offers versions for x86-64, AArch64 and ppc64le. Support is via its online community, which hang out on most online forums you could hope for. There are groups on Mattermost, Discourse, Reddit, Twitter, Facebook, LinkedIn and IRC (ircs://irc.libera.chat:6697/almalinux).

Rocky Linux 8.6 sports a subdued theme and wallpaper

Rocky Linux 8.6, codenamed "Green Obsidian" like the other 8.x releases, followed a few days later on May 16. Its name is a tribute to a CentOS co-founder, and at present, the distro offers x86-64 and AArch64 versions. Rocky has a chat channel on Mattermost, on Twitter, LinkedIn, on Twitch, a YouTube channel, its own forums, and a subreddit.

Its "Social" page also mentions an IRC to Mattermost bridge. The project's gemstones page looks like an interesting place to share hints and tips.

At the technical level, all of these are the same operating system. That was the point of CentOS Linux and the other rebuilds. Red Hat changed direction and said in December 2020 that CentOS would become CentOS stream, based on a development branch of RHEL and not suitable for productiuon environments. RHEL is for paying customers who want the value-added services and support that Red Hat offers.

If you don't want to be a Red Hat customer and some CentOS Linux users still feel sore then whether you choose AlmaLinux or Rocky Linux may depend on which community you prefer.

For instance, as CloudLinux sponsors AlmaLinux, then CloudLinux customers and people running shared cloud hosting servers might find that other Alma users have issues like theirs.

As high-performance computing specialist CIQ sponsors Rocky Linux, then those running CIQ products or HPC clusters might find that the Rocky Linux community understands their needs.

See more here:
The new generation of CentOS replacements plus the daddy of them all: RHEL 8.6 - The Register

Read More..

Are you prepared to defend your business from Ransomware Attacks? – JD Supra

Data breach and ransomware attacks are at the forefront of the digital and technological corporation world. Circulating the news recently was a vulnerability named Log4Shell. First detected in December and known as a zero-day vulnerability, it is found in the popular Apache Log4j open source logging library which is used in nearly every enterprise app and service from vendors including Microsoft, Twitter, VMware, Apple and Amazon. This vulnerability enables a remote attacker to take control of the device on the internet if it is running certain versions of log4j. Attackers can easily feed Log4j with malicious commands from the outside and make it download and execute dangerous code from malicious sources, putting organisations around the world at a huge risk.

Most recently, a fake update allegedly for Windows 10 is instead hijacking computers with ransomware. Known as the Magniber ransomware, it appears as a normal Windows security update, however once a computer has been infected, users are served a warning saying that all their personal files have been encrypted. The Magniber ransomware drops a README.html document in each folder it encrypts which point users towards the hackers Tor payment site. The website will provide victims with one free file that is decrypted without a charge but forces them to pay in cryptocurrency to unlock the rest.

With an increase of these types of attacks, organisations must look to safeguard themselves from what could be a catastrophic consequence for their IT environment if not protected.

How Ransomware Attacks Happen

Ransomware hackers seek to exploit security vulnerabilities to gain access to a computer. Once inside a networked computer, the hacker will navigate their way through the network to gain access to more sensitive targets and lock them down via complex encryption. Such targets may include critical databases, source code repositories and entire applications. During this process, the hackers will delete snapshots or backups of the servers and systems they have locked down.

There are a number of ways that hackers use to gain access to a computer. One of the most common methods is phishing emails. A victim is sent an email including an attachment masquerading as a file they should trust. Once the file has been downloaded and opened, this will allow for the hacker to take over the victims computer. Some other methods used by hackers exploit security vulnerabilities to infect computers without interacting with a user.

The hacker then demands a ransom from the victim to restore access to the files, system or data upon payment. Users are invited to negotiate with the hackers and the costs range from thousands to millions of dollars paid in cryptocurrency.

Defend your business with a technology escrow vendor

With the current boom in ransomware attacks, recovery and backup hidden away from your network are critical to overcoming an attack.

Organisations of all sizes should do what they can to protect their network against attack. But in the real world, even with the best intentions of educating your workforce and patching servers, hackers are still able to get through and exploit vulnerabilities with the ultimate aim of locking down a server, system or database and deleting any cloud backup snapshots in their sight.

However, although this all sounds very daunting, there are ransomware escrow solutions available to organisations today to ensure the upmost protection from these hackers.

Ransomware Recovery Live - Efficient Recovery in the Event of a Ransomware Attack

Ensure efficient continuity in the event of an attack on your live and DR environments. A technology escrow vendor will maintain a complete replica of your production environment which will be hosted independently and maintained in a dormant state that can be spun up in the event of an attack. The system data may be backed up on an automated and scheduled basis using Backup as a Service (BaaS). The replica environment will be tested on either a monthly or quarterly basis to ensure it will be available if ever needed. Weekly integrity testing is included to provide assurance that files have not been unknowingly compromised by hackers in the background. You should choose a technology escrow vendor who supports all leading cloud hosting vendors including AWS, Microsoft Azure, Google Cloud and private data centres.

Ransomware Database Backup & Recovery (BaaS)

Databases are the most common targets for ransomware hackers. From the hackers perspective, encrypting databases are an easy way to inflict maximum damage. For a business, the loss of access to data will cause severe damage both operationally and financially. A daily backup of your encrypted database backups to your chosen technology escrow vendors cloud vaults via a pull Backup as a Service (BaaS) process will keep your database backup out of the reach of hackers. These services should include a weekly integrity test to provide assurance that files have not been unknowingly compromised by hackers in the background.

Ransomware Source Code & Infrastructure as Code Sync - Keep a Copy of Your Git Repos Out of Reach of Hackers

Protect your development source code and deployment scripts such as Terraform and CloudFormation from ransomware hackers. Synchronize your Git repos with a technology escrow vendors Git Collector servers and securely backup your code repos on a daily basis with their Backup as a Service (BaaS) solution. Choose a technology escrow vendor who can support all leading Git repos including GitHub, Bitbucket, GitLab, AzureDevops and more. Their services should also include a weekly integrity test to provide assurance that files have not been unknowingly compromised by hackers in the background.

By choosing the right technology escrow vendor and selecting the right solution for your organisation, the ransomware hackers will not have visibility of this process or access to the vendors backup servers and therefore will be unable to delete these backups or snapshots.

Seek out potential vulnerabilities with Penetration and Vulnerability Testing

There are a comprehensive range of cyber-security services available to identify and evaluate potential vulnerabilities, root cause analysis and mitigation control. These in-depth assessments help improve the business security position and prioritises the implementation of security controls based on a simulated attack.

Penetration testing is the process of conducting a simulated attack on IT infrastructure to determine any weaknesses using the methodologies, techniques and tools that provide the best representation of what a real-world malicious attacker would do.

More:
Are you prepared to defend your business from Ransomware Attacks? - JD Supra

Read More..

Acronym Solutions Inc. announces innovative partnership with First Nations Cable, Net-Neutral Inc. and AANAKWAD Inc. to enable broadband connectivity…

We are now prepared to deliver reliable broadband services to all Six Nations territories for today and the future.

"We are proud to be part of this innovative project," said John Papadakis, President and CEO of Acronym Solutions Inc., "We are committed to helping our customers reach their full potential by providing creative solutions to complex technical challenges. This project gives us the opportunity to work in close partnership with FNC, Net-Neutral Inc. and AANAKWAD Inc. to enable further economic development within Six Nations and beyond. The success of this partnership demonstrates how much is possible when all parties work towards a common goal. We look forward to building on this long-term partnership to help bring broadband connectivity to many currently underserved communities across Ontario."

"We're proud of our community and we are dedicated to providing high quality service at fair and competitive rates," said Jeff Thomas, President of First Nations Cable. "Today, we would like all parties to be recognized as we are now prepared to deliver reliable broadband services to all Six Nations territories for today and the future."

This partnership creates a repeatable model for partnerships with other Indigenous communities in Ontario to enable community and economic growth.

Media Advisory

Media are invited to attend an event to announce this partnership on Wednesday, May 18, 2022 from 1:00PM to 3:00PM at The Gathering Place by The Grand, 2593 Chiefswood Rd. Ohsweken, ON, N0A 1M0. Scheduled speakers include representatives from First Nations Cable, Net-Neutral Inc., AANAKWAD Inc., Six Nations Elected and Hereditary Band Council, Acronym Solutions Inc., local MPs and municipal officials.

About Acronym Solutions

Acronym Solutions Inc. (formerly Hydro One Telecom) is a full-service Information and Communications Technology (ICT) company that provides a range of scalable and secure network connectivity, cloud, cybersecurity and operational solutions. We support Ontario-based businesses, large enterprises, service providers, healthcare providers, public sector organizations and agencies, utilities and school boards. We leverage our extensive expertise to design and build customized, fully scalable solutions to help our customers grow their business and realize their full potential. With more than 20 years' experience managing the communications network that enables Ontario's electrical grid, Acronym is uniquely positioned to understand the mission critical needs of any business and deliver the innovative and reliable services that respond to the changing demands of a post-pandemic business environment and support rapid growth and digital transformation initiatives.

About First Nations Cable Inc.

First Nations Cablehas been serving the Six Nations of the Grand River since 1989 and has been licensed by the CRTC since 1992.We feel that supporting local business, local industry, local employers, and the local workforce should be a top priority to ensure our future growth as a community. First Nations CableandSix Nations Internethave been pioneers of broadband connectivity in our community. Recent times have shown us just how important Internet service is, not just for entertainment but as a crucial part of business and education. Over the years, we have continually invested in our infrastructure to improve service for our customers. We make strides in performance and reliability every day.

About Net-Neutral Inc.

Net-Neutral Inc. is a carrier neutral, high-performance internet, computing and cloud service provider. Net-Neutral Inc. built and then upgraded the CKRZ transmitter from 250 watts to 5000 watts and is proud of creating a network access point of presence that enables Indigenous communities to become their own independent Internet Service Providers (ISP). Net-Neutral is helping create the vital infrastructure, terrestrial fibre and satellite network for Indigenous digital economies that will be a global portal for Indigenous languages and dialects, a multi-media cloud for film and video, and cloud content storage platform for North America (Canada & USA).

ABOUT AANAKWAD Inc. (Ojibwe meaning "The Cloud")

AANAKWAD Inc. is a wholly Indigenous licensed internet service provider from the Mississauga's of the Credit Frist Nation. Through Net-Neutral and Neutral Skies, fibre and satellite networks, AANAKWAD Inc. will provide Indigenous cloud to remote communities where mass high speed storage is not available. AANAKWAD Inc. together with Net-Neutral Inc. will provide multi-media cloud hosting that will be MAC and PC centric. Principles of AANAKWAD Inc. have vast political and corporate experience from the Eastern Artic to Alaska. AANAKWAD Inc. is able to act as the Indigenous Point of Presence for all Indigenous Nations.

SOURCE Acronym Solutions Inc.

For further information: contact Acronym Solutions Media Relations at 1.877.506.7584 (toll-free in Ontario) or 416.345.6868. Or visit our website at https://acronymsolutions.com/.

More:
Acronym Solutions Inc. announces innovative partnership with First Nations Cable, Net-Neutral Inc. and AANAKWAD Inc. to enable broadband connectivity...

Read More..

Pan African Digital Initiative Conference to Tackle Security Threats – THISDAY Newspapers

Nosa Alekhuogie

The Pan African Digital Initiatives Summit and Exhibition (PADISE),is set to hold in Julyat the Oriental Hotels, Victoria Island, Lagos.

The event seeks to explore the potential and ways to tackle insecurity and terrorism both digital and territorial using existing and emerging technologies. It has the theme: Leveraging Right Policies & Technologies in Taming Insecurity & Cyber-Threats.

Project Coordinator of the initiative,Don Pedro Aganbi,whilespeaking to newsmen in Lagos, explained that PADISE was established as a platform where the most influential players in the African information communications technology (ICT) markets can come together to exchange ideas and positively influence and promote ICT agenda for optimal good.

According to him, The theme provides an opportunity to explore how emerging technologies, such as 5G, AI, IoT and Blockchain, can help the country push back its current security challenges including cyber-threats and cyber terrorism. It will equally focus on digital protection for Cloud Hosting, Critical Infrastructure protection, and enabling digital and financial inclusion in the quest to build a more inclusive and sustainable society.

Aganbi reiterated that over the years security experts have hammered on the potential of technology to curb and possibly eliminate terrorism threats both cyber and physical. This conference provides a platform to bring the issues and working solutions to the fore. It would bring together key stakeholders in the technology and security sectors to help broaden engagement.

PADISE will equally provide a platform for organisations to showcase emerging innovative products and solutions; actively engage the government and other relevant agencies in the widespread deployment of digital technologies innovations across the continent, expose the abundant Investment Opportunities in the tech sector to attract more investors in the sector and create opportunities for establishing strategic alliances and partnerships amongst local and foreign investors to expand ICT networks in Nigeria and Africa and bring together ICT stakeholders to x-ray and chart a new course for the future of Africas digital economy.

The two-day Pan African Digital Initiative Summit and Expo (PADISE), will close with the 18th annual Titans of Tech Awards and HeroesNight on Friday, July 22, 2022.

Like Loading...

See the article here:
Pan African Digital Initiative Conference to Tackle Security Threats - THISDAY Newspapers

Read More..

If you run a Fast-Casual or QSR and want to improve efficiency, Redcat is on hand – Hospitality Magazine

Whether youre a restaurant, cafe, franchise or any other type of hospitality business, Redcat is the specialist hospitality platform that can solve your IT needs and help you grow your business.

Redcat improves QSR efficiency and connects you to your customers through online ordering, loyalty, iPhone and Android apps, integration with delivery partners (likeUber Eats) right through to self-service kiosks, QR code ordering, and the technology that helps QSRs run the kitchen.

Providing end-to-end integrated POS, Accounting & Business Management software solutions, Redcat allows you to run your business more efficiently.

So you can spend less time on laborious administrative tasks and more time focusing on your customers, providing them with a seamless experience across all of your touchpoints.

Our solution, Redcat Polygon, provides real time reporting and full visibility of every aspect of your business. And with reliable and scalable AWS cloud hosting, you dont need to be tech-savvy to work with Polygon (although if you do need our help, round-the-clock support designed with the hospitality industry in mind is available.)

To make things even simpler, we have only one number to call and when you do, youll speak to local people who themselves have worked in hospitality, so theyll know where youre coming from.

Our systems covers everything from ordering systems to deliveries, loyalty & marketing through to operations & reporting. And our 3rd party integration lets you manage rostering, inventory control and and payments.

Our key functionalities for Hospitality include:

Loyalty & Marketing With iOS and Android apps, your customers can use vouchers, buy and receive gift cards, use their digital wallets, view digital menu boards and more

Ordering incorporating contactless table and mobile app ordering, along with Redcat online ordering, Google ordering and virtual brands

Delivery integrating with a range of delivery partners including UberEats,Menulog, Deliveroo, Doordash and others

3rd Party Integration seamlessly integrating with partners like Tyro, eliminating the need for double entry which speeds up transaction workflows and reduces keying errors

Operations & Reporting whether youre using POS terminals, tablets, kiosks or a paperless kitchen, real-time reporting is at the ready

To make things even better, youll only pay for what you need right now and you can simply add additional functionality as your business grows.

Call 1300 473 322 or visit redcat.com.au/contact to request and demo and find out how you can take control of your business.

Related Stories

Read the original here:
If you run a Fast-Casual or QSR and want to improve efficiency, Redcat is on hand - Hospitality Magazine

Read More..

ShapeShift AG Forms FOX Foundation to Support the Decentralization and Success of ShapeShift DAO – PR Newswire

The majority of DAOs form from the ground up, as DAOs from the outset. ShapeShift made history as the first company to announce it would fully decentralize all corporate structure and open source all code in July of 2021. Venturing into uncharted waters, the establishment of the FOX Foundation was a solution that offered some degree of neutralitythe Foundation isn't led by either ShapeShift AG or the ShapeShift DAO, and instead has the singular charter of decentralizing assets and infrastructure as efficiently as possible, using decentralized solutions as are currently and soon-to-be available. Once its mission is complete, the foundation will dissolve and distribute all remaining funds to the ShapeShift DAO treasury.

"ShapeShift has made strong progress in decentralizing already, such as launching the DAO, releasing the new open-source platform and implementing solutions such as SafeSnap, which give FOX Token holders autonomous control of the treasury," said Willy Ogorzaly, head of decentralization for the FOX Foundation. "While the necessary tooling and infrastructure are maturing rapidly, it will take time for the DAO to achieve its final, fully autonomous form. The FOX Foundation exists as a stepping stone in this journey, fulfilling the legacy centralized responsibilities while supporting the DAO in implementing sustainable, decentralized alternatives. I'm super excited about the stellar team we have at the foundation to take this over the finish line."

The FOX Foundation team includes:

About ShapeShift

Since 2014, ShapeShift has been pioneering self-custody for digital asset trading. Today's ShapeShift DAO is an engaged community of builders working to advance the state of crypto trading, investing and access to open, decentralized financial systems. Our web and mobile platforms empower users to safely buy, hold, trade, invest and interact with digital assets such as Bitcoin, Ethereum and Cosmos.

All Chains, All protocols, All Wallets. Share Our Vision at app.shapeshift.com.

Learn more at ShapeShift.com

Media Contact:Lindsay Smith[emailprotected]

SOURCE ShapeShift DAO

Read more from the original source:
ShapeShift AG Forms FOX Foundation to Support the Decentralization and Success of ShapeShift DAO - PR Newswire

Read More..

IBMs Newest Quantum Computing Roadmap Unveils Four New Quantum Processors And Future Plans For A Quantum Supercomputer – Forbes

IBM 2022 Roadmap ... [+]

Last week IBM updated its quantum computing roadmap for the third time since the first one was published in 2020. In this roadmap, IBM has effectively introduced new and essential technologies at every layer of the stack. It has also provided new tools for kernel developers, algorithm developers, and model developers. These developments all require new hardware, software, and new architecture.

This roadmap suggests that IBM will accelerate quantum's expected trajectory by developing quantum processors that have the potential to scale to hundreds of thousands of qubits several years earlier than expected.

If IBMs roadmap is implemented, it will change the paradigm of quantum computing. A decade ago, CPU-centric supercomputing was the exclusive domain of government and researchers for solving large and complex scientific problems. Since then, it has been democratized and transformed into various types of AI-centric supercomputing used in almost every industry today.

This roadmap is IBM's plan to create a new family of quantum processors, software, and services that will lead to the realization of the next generation of supercomputers, a quantum-centric supercomputer. The combined resources of quantum processors, CPUs, and GPUs are expected to solve some of the world's most challenging problems.

The big picture

I had the opportunity to discuss IBMs new roadmap and its long-term impact on quantum computing with Dr. Blake Johnson, IBM Quantum Platform Lead. Dr. Johnson has an extensive quantum background. Before his current role at IBM, Dr. Johnson was Vice President of Quantum Engineering at Rigetti Computing, and preceding Rigetti, he was Senior Scientist at Raytheons BBN Technologies. Dr. Johnson received his undergraduate degree in physics from Harvard University and his PhD in physics from Yale University.

Dr. Johnson explained that IBM Research is developing four new quantum processors scheduled for release in 2023, 2024, and 2025. IBM Quantum System Two will provide the infrastructure needed to support its new processor architecture. IBM is planning for a prototype of System 2 to be running in 2023.

Even though IBM has scheduled the release of its new quantum processors, it still plans to release the single-chip QPUs shown on the previous roadmap. These include Osprey 433-qubit processor, scheduled for release later this year, and Condor 1121-qubit processor, expected to release in 2023.

On the previous roadmap, IBM launched Qiskit Runtime, a runtime environment of co-located classical systems and quantum systems built to support containerized execution of quantum circuits at speed and scale. Earlier this month, IBM announced updates to Qiskit Runtime, equipping it with two new primitives. Primitives are predefined programs that make it easy to create quantum-classical workloads needed to build and customize applications.

The new primitives - Sampler and Estimator - optimize how code is sent to a quantum computer. Sampler generates outputs that help determine a solution to the computation by sampling quantum circuits. Estimator is a program interface that estimates the expected values of quantum operators so that users can calculate and interpret the anticipated quantum operator values needed by many algorithms.

In 2023, IBM will provide additional primitives that run on parallelized quantum processors to obtain application speedup. At a high level, Quantum Serverless allows for flexible combinations of elastic classical computing with quantum, while Primitives serve as the quantum-classical interface.

A new modular architecture

IBMs latest roadmap introduces an entirely new modular architecture much different than the architecture used by its existing family of quantum processors. The new architecture connects quantum processors to a common control infrastructure so that data can flow classically and in real-time between the QPU and other chips in a multi-chip environment.

In addition, it also employs an entirely new multi-qubit gate scheme that is both faster and higher-fidelity.

Heron quantum processors connected to controllers

In 2023, a new 133-qubit QPU called Heron will be the first IBM processor to use the new architecture. The above graphic illustrates how multiple Heron processors can be linked together using classical couplers to permit classical parallelization.

Dr. Johnson said that the multi-chip Heron configuration would be extensible based on demand and application requirements. He said, We believe this is an extensible architecture that is scalable to whatever size we want by using classical parallelization of quantum hardware."

Modular design, classical coupling, and parallelization of quantum hardware are all essential elements in designing a quantum-centric supercomputer.

Scaling with quantum couplers

In 2023, IBMs roadmap begins building the foundation needed for its long-term goals by introducing short and long-range quantum coupling technologies. Couplers allow qubits to be logically scaled without fabricating larger chips. This accommodates increased input-output density that would otherwise be needed to get more signals in and out of the system.

The coupling scheme requires the same number of wires per qubit, but the couplers stretch out the footprint so that more wires are not crammed into the same physical space.

Transitioning from single-chip QPUs to multiple chip QPUs

Existing IBM quantum processors are single-chip devices. In 2024, IBM will introduce its first multiple chip processor called Crossbill, a 408 qubit processor that demonstrates the first application of short-range coupling.

Concurrent with Crossbills development in 2024, IBM will also develop a 1386+ qubit quantum processor called Flamingo, the first QPU to use long-range coupling. IBM will also demonstrate parallel quantum processors using three link-connected Flamingos.

Quantum technologies developed in 2024 will pave the way for the next generation of quantum processors and enable them to scale to hundreds of thousands of qubits using multiple chips.

2025 Kookaburra, the big bird

Quantum Parallelization of Multi-Chip Quantum Processors

In 2025, IBM will use technologies developed in prior years to create a 4158+ qubit quantum processor called Kookaburra. It will be the first processor to use a combination of the chip-to-chip short-range and long-range couplers.

Looking past 2025, coupling technologies will begin to solve most near-term scaling problems. As shown with Heron, systems can be linked together with classical parallelism using chip-to-chip links for multiple modules or extend the size of individual units with long range coupling.

Dynamic circuits

IBM Dynamic Circuits

Like previous roadmaps, this years roadmap also shows software layers associated with respective hardware targets. Although dynamic circuits were first announced in 2021, after further development, IBM will selectively deploy the technology on exploratory systems later this year.

Dynamic circuits are a powerful and important technology that can:

The use of dynamic circuits has essentially created a much broader family of circuits that take advantage of measurement and computation and management to allow future states to be changed or controlled by the outcome of mid-circuit measurements made during circuit execution.

Quantum Serverless

IBM Orchestration

In 2023, IBM will begin developing more enhanced applications of elastic computing and parallelization of Qiskit Runtime.

It is much easier for algorithm developers to create and run many small quantum and classical programs than one large program. IBM is integrating Quantum Serverless into its core software stack to enable circuit knitting, allowing large quantum circuits to be solved by splitting them into smaller circuits and distributing them across quantum resources. Knitted circuits can be recombined by using an orchestrated solution of classical CPUs and GPUs.

The necessary hardware and software should be in place by 2023 that allows model developers to begin prototyping software applications for specific use cases. According to the roadmap, machine learning will be the first case. Jumping forward to 2025, IBM plans to expand applications to include optimization, natural sciences, and others.

Roadmap challenges

There are several challenges IBM must address in its roadmap if it is to reach its end goal of building a quantum-centric supercomputer:

Wrapping it up

IBM 2022 Roadmap ... [+]

IBMs future efforts will continue to focus on scaling qubits, increasing quality and maximizing speed of quantum circuits. Each block of technology in its roadmap is a measured and critical step in an overall orchestrated evolution that, if properly executed, will allow IBM to achieve its end goal of building quantum processors with hundreds of thousands of qubits. Qiskit Runtime and Runtime primitives will continue to play an essential role in IBMs future plans and it is expected to increase speedup from todays 120x to 200,000x sometime in the future.

In 2023, IBM will deploy the last of its single-chip quantum processors, the 1121-qubit Condor. That year will also see the deployment of three key technologies that form the foundation of its overall plan. These consist of a completely new quantum computing architecture and two key scaling elements: a short-range chip-to-chip coupler and a long-range coupler.

The first multiple chip processor, called Crossbill with 408 qubits, will be introduced in 2024. This step explores the path to increase the size of quantum processors beyond the area limits of a single chip.

A year later, in 2025, almost every part of IBMs technology plan comes together in the form of a 4158+ qubit quantum processor called Kookaburra (a plus sign behind the qubit count means IBM believes it can scale this processor to any number of qubits it feels is necessary for the application). While each new quantum processor is important to the overall roadmap, Kookaburra appears to be the cornerstone of IBMs future generations of quantum processors. In previous roadmaps, it seemed that Condor would be the future architecture.

By 2026, quantum computers with large numbers of qubits should finally be able to solve a select number of useful problems far beyond classical computers' capability.

Analyst notes:

Note: Moor Insights & Strategy writers and editors may have contributed to this article.

Moor Insights & Strategy, like all research and tech industry analyst firms, provides or has provided paid services to technology companies. These services include research, analysis, advising, consulting, benchmarking, acquisition matchmaking, or speaking sponsorships. The company has had or currently has paid business relationships with 88, A10 Networks, Advanced Micro Devices, Amazon, Ambient Scientific, Anuta Networks, Applied Micro, Apstra, Arm, Aruba Networks (now HPE), AT&T, AWS, A-10 Strategies, Bitfusion, Blaize, Box, Broadcom, Calix, Cisco Systems, Clear Software, Cloudera, Clumio, Cognitive Systems, CompuCom, CyberArk, Dell, Dell EMC, Dell Technologies, Diablo Technologies, Dialogue Group, Digital Optics, Dreamium Labs, Echelon, Ericsson, Extreme Networks, Flex, Foxconn, Frame (now VMware), Fujitsu, Gen Z Consortium, Glue Networks, GlobalFoundries, Revolve (now Google), Google Cloud, Graphcore, Groq, Hiregenics, HP Inc., Hewlett Packard Enterprise, Honeywell, Huawei Technologies, IBM, IonVR, Inseego, Infosys, Infiot, Intel, Interdigital, Jabil Circuit, Konica Minolta, Lattice Semiconductor, Lenovo, Linux Foundation, Luminar, MapBox, Marvell Technology, Mavenir, Marseille Inc, Mayfair Equity, Meraki (Cisco), Mesophere, Microsoft, Mojo Networks, National Instruments, NetApp, Nightwatch, NOKIA (Alcatel-Lucent), Nortek, Novumind, NVIDIA, Nutanix, Nuvia (now Qualcomm), ON Semiconductor, ONUG, OpenStack Foundation, Oracle, Panasas, Peraso, Pexip, Pixelworks, Plume Design, Poly (formerly Plantronics), Portworx, Pure Storage, Qualcomm, Rackspace, Rambus, Rayvolt E-Bikes, Red Hat, Residio, Samsung Electronics, SAP, SAS, Scale Computing, Schneider Electric, Silver Peak (now Aruba-HPE), SONY Optical Storage, Springpath (now Cisco), Spirent, Splunk, Sprint (now T-Mobile), Stratus Technologies, Symantec, Synaptics, Syniverse, Synopsys, Tanium, TE Connectivity, TensTorrent, Tobii Technology, T-Mobile, Twitter, Unity Technologies, UiPath, Verizon Communications, Vidyo, VMware, Wave Computing, Wellsmith, Xilinx, Zayo, Zebra, Zededa, Zoho, and Zscaler. Moor Insights & Strategy founder, CEO, and Chief Analyst Patrick Moorhead is a personal investor in technology companies dMY Technology Group Inc. VI and Dreamium Labs.

See the original post here:
IBMs Newest Quantum Computing Roadmap Unveils Four New Quantum Processors And Future Plans For A Quantum Supercomputer - Forbes

Read More..

The Animated Map of Quantum Computing: A Visual Introduction to the Future of Computing – Open Culture

If you listen to the hype surrounding quantum computing, you might think the near future shown in Alex Garlands sci-fi seriesDevs is upon us that we have computers complex enough to recreate time and space and reconstruct the human mind. Far from it. At this still-early stage, quantum computers promise much more than they can deliver, but the technology is poised, writes IBM to transform the way you work in research. The company does have as do most other other big makers of what are now called classical computers a roadmap for implementing quantum computing and a lot of cool new technology (such as the quantum runtime environment Quiskit) built around the qubit, the quantum computer version of the classical bit.

The computer bit, as we know, is a binary entity: either 1 or 0 and nothing in-between. The qubit, on the other hand, mimics quantum phenomena by remaining in a state of superposition of all possible states between 1 and 0 until users interact with it, like a spinning coin that only lands on one face if its physically engaged. And like quantum particles, qubits can become entangled with each other. Thus, Quantum computers work exceptionally well for modeling other quantum systems, writes Microsoft, because they use quantum phenomena in their computation. The possibilities are thrilling, and a little unsettling, but no ones modeling the universe, or even a part of it, just quite yet.

Use cases are largely experimental and hypothetical at this early stage, McKinsey Digital writes in a report for businesses, while also noting that usable quantum systems may be on the market as early as 2030. If the roadmaps serve, thats just around the corner, especially given how quickly quantum computers have evolved in relation to their (exponentially slower) classical forebears. From the first idea of a quantum computer in 1980 [an idea attributed to Nobel prize-winning physicist Richard Feynman] to today, there has been a huge growth in the quantum computing industry, especially in the last ten years, says Dominic Walliman in the video above, with dozens of companies and startups spending hundreds of millions of dollars in a race to build the worlds best quantum computers.

Walliman offers not only a (non-hyped) map of the possible future, but also a map of quantum computings past. He promises to clear up misconceptions we might have about the different kinds of quantum computing, how they work, and why so many people are investing in the quantum computing industry. Weve previously seen Wallimans Domain of Science channel do the same for such huge fields of scientific study as physics, chemistry, math, and classical computer science. Here, he presents cutting-edge science on the cusp of realization, explaining three essential ideas superposition, entanglement, and interference that govern quantum computing. The primary difference between quantum and classical computing from the point of view of non-specialists is algorithmic speed: while classical computers could theoretically perform the same complex functions as their quantum cousins, they would take ages to do so, or would halt and fizzle out in the attempt.

Will quantum computers be able to simulate nature down to the subatomic level in the future? McKinsey cautions, experts are still debating the most foundational topics for the field. Despite the industrys rapid growth, its not yet clear, Walliman says, which approach among the many he surveys will win out in the long run. But if the roadmaps serve, we may not have to wait long to find out.

Related Content:

The Map of Computer Science: New Animation Presents a Survey of Computer Science, from Alan Turing to Augmented Reality

The Map of Physics: Animation Shows How All the Different Fields in Physics Fit Together

The Map of Chemistry: New Animation Summarizes the Entire Field of Chemistry in 12 Minutes

The Map of Mathematics: Animation Shows How All the Different Fields in Math Fit Together

Josh Jonesis a writer and musician based in Durham, NC. Follow him at@jdmagness

Follow this link:
The Animated Map of Quantum Computing: A Visual Introduction to the Future of Computing - Open Culture

Read More..