Page 2,302«..1020..2,3012,3022,3032,304..2,3102,320..»

Google One VPN Arrives on iPhone, But Wheres the Windows App? – Review Geek

Sorry for making you see this meme. Prostock-Studio/Shutterstock.com

Back in 2020, Google launched a free VPN service for all Google One customers on a 2TB+ cloud storage plan. Its a killer bonus, especially if you (like me) sprang for a top-shelf Google One membership after Google Photos killed its free unlimited storage offering. Now, the Google One VPN works on iPhone but what about Windows?

Offering a free VPN that only works on mobile devices (and Chromebooks) defeats the purpose of giving away a free VPN in the first place. Why would I use Google One VPN on my phone when I have no option but to pay for Tunnelbear, ExpressVPN, or another great VPN service that supports PCs?

Well, if you happen to own a Chromebook, an iPhone, and a 2TB Google One plan, then I guess youre in luck. Although I have a feeling that most people paying for that much Google One storage own an Android smartphone and Windows device.

On the bright side, the Android version of Google One VPN has some new features. A new safe disconnect setting shuts off internet access if you suddenly disconnect from the VPN service, which will prevent websites from seeing your real IP address or location. Additionally, Android users can now program select apps to bypass the VPN.

Huh, so you still cant spoof your location to look like youre in another country with Google One VPN. Thats a shame, I heard the European Netflix has some cool stuff.

Source: Google

Follow this link:
Google One VPN Arrives on iPhone, But Wheres the Windows App? - Review Geek

Read More..

Samsung Galaxy S22 Ultra storage options could depend on where you live – TechRadar

We're only days away from seeing the Samsung Galaxy S22 series get its official unveiling, but the leaks continue to drip in including some new information about the internal storage options we can expect on the Galaxy S22 Ultra model.

Well-known tipster Roland Quandt says that the S22 Ultra model will indeed come with the option of 1TB of internal storage, as previously rumored, but there's a catch: this variant is only going to be available in certain markets.

What those markets are, Quandt doesn't specify. Earlier leaks mentioning a 1TB storage bump didn't make any mention of it being available in some markets and not in others, so we'll have to wait and see how Samsung decides to split it.

The last time we saw a Samsung phone with 1TB of internal storage was the Galaxy S10 Plus back in 2019. More storage costs more money of course, and Samsung may feel that consumers prefer cheaper prices rather than more on-board storage space.

Last year's Samsung Galaxy S21 Ultra offered the most internal storage out of the S21 range, with the option to pack 512GB of storage in. However, the phones didn't come with a memory card slot, so you couldn't add extra if you wanted to.

With streaming services like Spotify and Netflix now the norm, and cloud storage apps such as Google Photos and Dropbox on the market, it could be argued that internal storage isn't as important as it once was but it's still something certain phone buyers look for.

Samsung is of course no stranger to putting out different versions of its phones in different markets: in recent years the flagship Galaxy S series has featured both Qualcomm and Exynos processors, with the available configurations depending on the country that the phones are being sold in.

We've already seen plenty of speculation about which markets might get an Exynos S22 series and which might get a Qualcomm S22 series at the moment, it looks as though Samsung will stick to its usual plan and make the phones with the Qualcomm Snapdragon 8 Gen 1 chipset exclusive to the US.

It would seem this strategy makes sense from Samsung's perspective in terms of costs and production line efficiency and the global pandemic has shown how fragile some supply chains can be but it's frustrating for consumers if they're not able to buy phone configurations that are available elsewhere.

Now it looks as though the 1TB Samsung Galaxy S22 Ultra phone is only going to be available in certain places, so some buyers will be missing out. While importing handsets from other countries remains an option, it's often an expensive and not entirely safe route to take for picking up a new smartphone.

Originally posted here:
Samsung Galaxy S22 Ultra storage options could depend on where you live - TechRadar

Read More..

Personal and Entry Level storage (PELS) Market Outlook to 2028 : Toshiba Corporation, Dell Inc., Seagate Technology, and Western Digital Corporation….

The recent Personal and Entry Level storage (PELS) market study covers the global market value, segmentation, sales, share, and expansion. This study research looks at historical evidence as well as current technology to assess the primary driving forces impacting the global Personal and Entry Level storage (PELS) markets growth. The study also covers expert advice to help consumers in reflecting on their growth objectives and building smarter decisions. The opportunities and restrictions that will virtually surely affect demand development are frequently considered in Personal and Entry Level storage (PELS) business research.

Request a sample report : https://www.orbisresearch.com/contacts/request-sample/5830618?utm_source=PoojaA2

The research also includes a cross-sectional assessment of the global Personal and Entry Level storage (PELS) field, which includes demand estimates and predictions for all industries across various geographic areas. The study examines new technologies as well as recent breakthroughs that are projected to promote market growth in the next years. The studys purpose is to give detailed market segmentation by products, end-user, application, and regions, and a thorough study of the global Personal and Entry Level storage (PELS) market. In the following years, the global Personal and Entry Level storage (PELS) industry is predicted to explode.

Key Players in the Personal and Entry Level storage (PELS) market:

Toshiba Corporation, Dell Inc., Seagate Technology, and Western Digital Corporation. The market players are focusing on strategic collaborations to innovate and launch new products to meet the increasing needs and requirements of consumers. Insights

Accessing official documents, blogs, and press releases of businesses participating in the Personal and Entry Level storage (PELS) business, as well as interviewing business executives and authorities, are all important sources. This market research report gives actionable insight into important players. According to the study, the market and industry are characterized by a variety of in-depth, influential, and stimulating effects. The Personal and Entry Level storage (PELS) industry analysis goes into great length about industry definitions, classifications, requirements, and market overviews, as well as product features, manufacturing processes, cost structures, and raw materials. The report is designed to understand key manufacturers to examine the value, sales, market share, and future development plans. It also defines, analyzes, and characterizes the market competitive landscape, Personal and Entry Level storage (PELS) market trends, growth factors, and SWOT analysis.

Personal and Entry Level storage (PELS) Market Types:

By Product Type (Recordable Discs, Flash Drives, Hard Disk Drives (HDDs), Solid State Drives (SSDs) and Cloud Based Storage), by Technology (SAS, DAS, NAS, Cloud Storage Technology and Others (IP based stora

Personal and Entry Level storage (PELS) Market Applications:

Application I,Application II,Application III

This market report provides detailed information to help in the interpretation, scope, and applicability of this analysis. It contains a market overview for Personal and Entry Level storage (PELS) as well as growth analysis and projected and historical cost, demand, revenue, and supply data. A thorough review and assessment were carried out during the reports development. Customers will benefit from the reports extensive insights into the sector. This research also examines a variety of market prospects, including benefit, productivity, product pricing, capacity, supply, demand, growth rate, and forecasting, among other things. PESTEL and SWOT analysis of a new proposal, as well as an investment return analysis, were included in the reports conclusion. The global Personal and Entry Level storage (PELS) Market document provides a variety of financial words such as shares; expense, sales, and profit margin to help you better comprehend the many economic aspects of the firms.

Read complete report along with TOC @ https://www.orbisresearch.com/reports/index/personal-and-entry-level-storage-pels-market-outlook-to-2028-key-trends-covid-19-impact-growth-opportunities-and-segment-analysis?utm_source=PoojaA2

Why Invest In the Report?

This report elaborates the collected data, statistical analysis, strategies on development and sustainability, planning, and investment.

The key stakeholders that have played an important role in mobilizing the Personal and Entry Level storage (PELS) industrys economic growth are intensively studied in this report.

The activities pertinent to the trade of goods and services, and investment and exchange experiences in the market are summarized.

The report focuses on the nature of work in the segments of the Personal and Entry Level storage (PELS) market, employability, financial inclusion, climate change impact, and more.

The report has also touched upon the legal and policy frameworks in the Personal and Entry Level storage (PELS) market.

The investment opportunities for the market players in near term and in future are given in the report.

Do Inquiry before Accessing Report at: https://www.orbisresearch.com/contacts/enquiry-before-buying/5830618?utm_source=PoojaA2

About Us:

Orbis Research (orbisresearch.com) is a single point aid for all your market research requirements. We have a vast database of reports from leading publishers and authors across the globe. We specialize in delivering customized reports as per the requirements of our clients. We have complete information about our publishers and hence are sure about the accuracy of the industries and verticals of their specialization. This helps our clients to map their needs and we produce the perfect required market research study for our clients.

Contact Us:

Hector CostelloSenior Manager Client Engagements4144N Central Expressway,Suite 600, Dallas,Texas 75204, U.S.A.Phone No.: USA: +1 (972)-362-8199 | IND: +91 895 659 5155Email ID: [emailprotected]

More here:
Personal and Entry Level storage (PELS) Market Outlook to 2028 : Toshiba Corporation, Dell Inc., Seagate Technology, and Western Digital Corporation....

Read More..

Soham businesses react angrily to claims of being run down – Ely Standard

Awarding 325,000 to Viva Arts for a business hub with the promise of 50 jobs has caused a backlash in Soham where a sports centre is crowd funding for 100,000 to repair its roof.

Cambridgeshire and Peterborough Combined Authority (CAPCA) signed off on the conditional loan from their 13m market towns initiative after East Cambridgeshire District Council successfully applied for the grant.

Viva narrowly won through the application process when its bid secured 75.8 per cent on an appraisal matrix (the pass rate is 75 per cent).

But it was comments made by Cllr Joshua Schumann, deputy leader at East Cambs Council, at the CAPCA board meeting that has enraged some residents.

Cllr Schumann said the location of the proposed new hub at Spencer Mill and next to the rail station was ideal.

"Very close to Spencer Mill is a small cluster of industrial units, which have become in state of disrepair and become unviable, he said.

Photo of Ross Peers sports centre roof being used in 100,000 crowdfunding repair plea- Credit: Ross Peers

Viva would develop that area, he said, and it would be helped enormously by the improved connectivity the station offered.

Mayor Dr Nik Johnson told him: You sound very passionate about it.

But one businessman wants to know Did you engage with any of the existing businesses prior to putting in the grant application with regard to how they could benefit or assist in your proposal?

Could you also address the issue raised around the parking and access to the mill?

Like most I would agree that money invested in Soham is beneficial.

Visualisation of Spencer Mill fully completed- Credit: Viva

But also like most I can't understand why existing facilities such as Ross Peers are having to crowd fund to repair their roof whilst money's invested elsewhere.

Would it not make sense for local council to invest in improving already existing community facilities?

Another resident felt that if the units had been empty for years how about repairing them and giving them to new businesses or businesses that are looking for new big units to rent?

And one other resident questioned why more help could not be found for the Ross Peers.

Our only multi sports facility and possible established community hub, Ross Peers is crowd funding for a new roof, said the resident.

Spencer Mill before its acquisition by Viva Arts- Credit: CCC

Isn't that where our district councillors should be directing their passion for grants?

Ross Sports has launched its crowdfunding bid for 100,000 and says it is looking at different ways of finding this sum.

So far, the fund has raised 145.

You can donate here

Cllr Schumann told one post on a Soham Facebook page that Im sure you have seen and appreciate that we have sadly lost a number of employment and industrial units around Mereside and many of these have been empty for some time.

I did not aim my comments directly at yours or any business and Im delighted that you and your business are doing well - long may that continue,

The more local employment the better, that is something which I will always welcome and support.

He added: Grant funding to support employment is available to a wide range of businesses and business people and Im sure youll join me in being pleased to see money being spent in Soham and the surrounding areas.

New look to Soham with opening day of Soham station last December- Credit: Archant

CAPCA says its 13m market towns fund is to ensure our towns remain vibrant and thriving places.

Hewdon Consulting Ltd of London drew up the appraisal report that recommended the Viva award.

If successful they are proposing to build a 3-floor extension to create flexible office space and enhance the functionality and facilities of all three floors, said their report.

This office space will be let to various groups from theatre goers, training providers, to business organisations and will help to secure a daytime income stream as opposed to solely an evening one, for the charity.

However, the 325,000 is conditional and Viva has been told to submit a suitable business case showing the rational for the project.

Viva will also be tasked with demonstrating how the 50 jobs are expected to be delivered by the project and where demand for the space is expected to come from.

Mayor Dr Nik Johnson at re-opening of Soham station. It was paid for by more than 20m provided by the combined authority (CAPCA)- Credit: Archant

They will also have to submit evidence of subsidy control (state aid) compliance and a detailed cost break down with details of a tender process and at least three quotations sought.

CAPCA says it also wants confirmation that all project revenue costs and any capital cost overrun will be met by Viva Arts and Community Group.

Viva told CAPCA it hopes to have been the project completed by December this year although Hewdon pointed out that planning has not yet been secured and contractors are still to be appointed.

The project is expected to be completed by December 2022.

The application was not submitted with a business plan showing how it will operate; source tenants from; and what its operating costs / charges are, says Hewdon.

And referencing risks, it adds that without the benefit of a business plan it is not clear how a community arts charity proposes to run a commercial operation providing business space with all the VAT and landlord and tenant obligations that accompany this.

Hewdon says the building extension is modest and should be relatively straight forward to deliver but it is still in the early stages of development.

The project is said to align strongly with CAPCAS opening up our town through better connectivity' theme following the opening of the new rail station.

The Town Plan aspires to use this an opportunity to attract businesses to base themselves here and develop the area around the station which this project will support, says Hewdon.

It says Viva Arts and Community Group have provided a list of grants received from March 2019 totalling 1.9m.

The new subsidy control bill has not yet received Royal ascent but has had its 1st reading in the Lords, says Hewdon.

The current bill permits 'services of public economic interest' at varying levels up to 15m.

If supported, an appropriate state aid (subsidy control) report is needed from the Arts group showing its compliance.

Viva says they do not propose match funding for this phase of the Mill redevelopment.

East Cambs Council leader Anna Bailey tweeted over the weekend that her party has a proposal coming to full council this month.

It will, if agreed, make capital funds available to support leisure centres in the district.

The rest is here:
Soham businesses react angrily to claims of being run down - Ely Standard

Read More..

Forecasting asylum-related migration flows with machine learning and data at scale – World – ReliefWeb

EUAA and European Commission scientists unveil forecasting model for asylum-related migration, based on Big Data

On 27 January 2022, researchers working for the European Union Agency for Asylum (EUAA), the European Commission (Joint Research Centre) and University of Catania published a new methodology for forecasting asylum claims lodged in the EU, based on machine learning and big data.

Published in Nature Scientific Reports, the 6th most-cited journal in the world, the aim of the model is to increase the preparedness of EU Member States for sudden increases in asylum applications in order to process them quickly and fairly; while also foreseeing proper reception conditions in line with EU law.

By integrating traditional migration and asylum administrative data, such as detections of illegal border-crossing and recognition rates in countries of destination, with big data on negative and conflict events, as well as internet searches in countries of origin; this new machine-learning system, known as DynENet, can forecast asylum applications lodged in the EU up to four weeks in advance.

The approach draws on migration theory and modelling, international protection, and data science to deliver the first comprehensive system for forecasting asylum applications based on adaptive models and data at scale. Importantly, the approach can be extended to forecast other social processes.

Since 2011 the EU, initially through the European Asylum Support Office (EASO) and since January 2022 with its new European Union Agency on Asylum (EUAA), has supported its Member States in building the worlds only multinational asylum system. Paired with an enhanced mandate to deliver operational support to Member States under pressure, the data that this new forecasting tool provides could not only help Member States increase their internal preparedness, but also inform where first-line operational assistance from the Agency to national authorities in the EU might be needed.

The research paper can be found at: Forecasting asylum-related migration flows with machine learning and data at scale (nature.com)

See original here:
Forecasting asylum-related migration flows with machine learning and data at scale - World - ReliefWeb

Read More..

Azure Machine Learning Webinar recap: A sneak peek at the process and possibilities of AML – YourStory

Todays organisations are witnessing an accelerated pace in building Machine Learning-fuelled solutions, so much so that ML has quickly become the most acquired skill in India on online learning platforms. An implicit requirement for the teams involved in an organisation is working collaboratively while constantly building and managing a large number of models.

To that end, Microsoft India hosted a webinar titled Machine Learning lifecycle management and possibilities with Azure Machine Learning, featuring Aruna Chakkirala, Senior Cloud Solutions Architect, Microsoft India, in order to show the benefits of Azure Machine Learning and how it enables data science and IT teams to collaborate and increase the pace of model development and deployment via monitoring, validation, and governance of machine learning models.

The webinar came with some amazing insights about Azure Machine Learning (AML) and its properties, along with a quick demo.

Heres what the webinar covered:

The idea is to make machine learning available to data scientists and developers of all skill levels, as well as provide an end-to-end lifecycle management for machine learning through MLOps. It also enables responsible and trustworthy development of machine learning solutions through responsible AI/ML capabilities which provides transparency and explainability for the models, said Aruna.

Azure Machine Learning is comprehensive, giving users end-to-end capabilities, extensive ML platform abilities in Azure, which empowers data scientists and developers with a wide range of predictive experiences for building, training, and deploying ML models both securely and at scale.

Aruna next explained the ML lifecycle. When it comes to creating ML platforms, the process begins with data scientists and data engineers working in tandem, figuring out what part of the data is interesting. The data scientist will then take the insights to build a model from it. That is followed by the registry of the model. And finally, users can go ahead and release this model into production. The model will need to be monitored periodically. Because once the model is monitored, youll get insights about how it fares in the real world scenario.

AML is a set of cloud services combined with an AML studio interface and also an SDK which brings together the power of what you need to build services and take them into production. It enables users to prepare the data, build, train, manage, track, and deploy models, Aruna said.

The AutoML option in AML studio is a quick and easy way to build models, primarily aimed at the citizen data scientist. All it requires is a dataset, and using the wizard to set up a few configurations, AutoML does all the work in building multiple models, identifying the best model based on the metrics and providing a view of the multiple runs. All this is possible in just a few clicks.

AML Designer is an UI interface that enables users to build machine learning pipelines with drag-n-drop experience and simplify the publishing and deployment of pipelines.

It helps users connect to their own data with ease, hundreds of pre-built components help build and train models without writing code, it helps automate model validation, evaluation and interpretation in their pipeline and enables deployment of models and publishment of endpoints with a few clicks.

Azure ML Service workspace comes with a lot of components such as models, experiments, pipelines, compute target, environments, deployment, datastores and data labeling.

Aruna then conducted a quick demo, showing the components of AML. The ML service has a number of components within it, such as values, resource group, storage, studio web url, registry, application insights and ML flow.

Coming to AML studio, it too has various core components. It has the option to provide compute, where users are creating the training resources. The studio also comes with curated environments, data store, date labeling, and link services. This demo was followed by a quick guided demo of AutoML as well.

Aruna added that AML can implement an end-to-end ML lifecycle. It ties down the entire ML lifecycle for us. Every stage of the ML lifecycle has been tied together within the whole spectrum of components, she said.

Workflow steps:

1. Develop machine learning training scripts in Python, using autoML, Designer, Notebooks, etc.

2. Create and configure a compute target.

3. Submit the scripts to the configured compute target to run in that environment. During training, the compute target stores run records to a datastore. There, the records are saved to an experiment.

4. Review the experiment for logged metrics from the current and past runs.

5. Once a satisfactory run is found, register the persisted model in the registry.

6. Develop a scoring script.

7. Create an image and register it in the image registry.

8. Deploy the image as a web service in Azure.

9. Monitor the model in production and identify when further improvements are required.

There are three ways to deploy your model in Azure ML - Through real-time interference such as HTTP endpoints, batch interference, and through managed endpoints.

Monitoring on AML has 23 metrics that you can choose from, across various categories like model, resource, run and quota. Users can look at monitoring from two different perspectives:

1. Monitoring as an administrator, which means monitoring the health of the resource, monitoring compute quota, etc.

2. Monitoring as a data scientist or developer, which means monitoring training runs, tracking experiments and visualising runs.

You don't want to be repeating the same steps again and thats where MLOps comes into play. It removes the drudgery of repeated processes, said Aruna. It brings DevOps principles into the ML world. It brings together people, processes, and platforms to automate ML-infused software delivery and provide continuous value to users.

MLOps comes with multiple benefits such as automation and observability, validation and reproducibility.

Aruna noted that model interpretability and fairness are the cornerstones of Azure Machine Learnings AI/ML offerings. As machine learning becomes ubiquitous in decision making, it becomes extremely necessary to provide tools which can bring out model transparency, she said.

Read the original:
Azure Machine Learning Webinar recap: A sneak peek at the process and possibilities of AML - YourStory

Read More..

Top 10 Interesting AutoML Software to Look Out For in 2022 – Analytics Insight

AutoML software helps in automating manual tasks to boost the productivity of ML models

There has been a huge growth in machine learning owing to the high demand for automated machine learning software (AutoML). Global tech companies have started using multiple AutoML software for creating different machine learning models or applications without any professional knowledge. The main aim is to efficiently automate all regular, manual, and tedious workloads. Multiple AutoML software or AutoML tools are available on the internet to make it more accessible to aspiring AI developers and other professionals. The global automated machine learning market size is expected to hit US$14,830 million in 2030 with a CAGR of 45.6%. Thus, lets explore some of the top ten interesting AutoML software to look out for in 2022.

Google Cloud AutoML is one of the top AutoML software to train custom machine learning models with limited machine learning expertise as per the business needs. It offers simple, secure, and flexible products with an easy-to-use graphical interface.

JADBio AutoML is a leading AutoML tool to avail user-friendly machine learning without coding. Aspiring or beginners in data science, researchers, and more can use this software of AutoML to start with machine learning and interact with the machine learning models efficiently. There are only five steps to use AutoML prepare the data for analysis, perform predictive analysis, discover knowledge, interpret the result, and apply the trained machine learning model.

BigML is one of the popular software of AutoML to make machine learning simple and easy to transform a business into the next level with multiple machine learning models and platforms. This automated machine learning software provides a comprehensive platform, immediate access, interpretable and exportable models, collaborations, automation, flexible deployments, and many more features.

Azure Machine Learning is one of the top AutoML software to build and deploy machine learning models with Microsoft Azure. Automated machine learning software helps to identify suitable algorithms as well as hyper-parameters faster. It empowers multiple professional as well as non-professional data scientists by automating time-consuming as well as mundane tasks of model development. This AutoML tool helps to boost machine learning model creation with the automated machine learning no-code UI or SDK.

PyCaret is known as an open-source and low-code machine learning library in Python to help automate machine learning models. It is popular as an end-to-end machine learning as well as a model management tool to boost productivity efficiently and effectively. The features of this automated machine learning software include data preparation, model training, hyperparameter tuning, analysis and interpretability, and many more.

MLJAR is one of the top AutoML software to share Python Notebooks with Mercury while receiving the best results with MLJAR AutoML. It is the state-of-the-art automated machine learning software for tabular data. It helps to build a complete machine learning pipeline with advanced feature engineering, algorithms selection, and tuning, automatic documentation, as well as ML explanation. It is known for providing four built-in modes in the MLJAR AutoML framework.

Tazi.ai is a well-known AutoML tool for understandable continuous machine learning from real-time data and humans. It helps to allow business domain experts while use machine learning to gain predictions. The software of AutoML uses machine learning models with three algorithms such as supervised, unsupervised, and semi-supervised.

Auto-Keras is a leading AutoML software based on Keras to make machine learning accessible to everyone without any prior knowledge of machine learning models and applications. It is only compatible with Python>=3.7 and TensorFlow>=2.8.0.

H2OAutoML caters to the demand for machine learning experts with the development of user-friendly machine learning software. This AutoML tool is focused on simplifying machine learning while developing simple and unified interfaces to multiple machine learning algorithms. It helps to automatically train and tune machine learning models within a user-specified time limit.

MLBox is one of the top automated machine learning software and Python library with multiple useful features such as fast reading and distributed data pre-processing, cleaning, and formatting, accurate hyper-parameter optimization in high-dimensional space, prediction with models interpretation, as well as state-of-the-art predictive models for classification and regression.

Share This ArticleDo the sharing thingy

See original here:
Top 10 Interesting AutoML Software to Look Out For in 2022 - Analytics Insight

Read More..

Google Maps review moderation detailed as Yelp reports thousands of violations – The Verge

Google explains how it keeps user-created reviews on Google Maps free of fraud and abuse in a new blog post and accompanying video. Like many platforms dealing with moderation at scale, Google says it uses a mix of automated machine learning systems as well as human operators.

The details come amidst growing scrutiny of user reviews on sites like Google Maps and Yelp, where businesses have been hit with bad reviews for implementing COVID-related health and safety measures (including mask and vaccine requirements) often beyond their control. Other reviews have criticized businesses for supposedly leading them to contract COVID-19 or for not keeping to usual business hours during a global pandemic.

Earlier today, Yelp reported that it removed over 15,500 reviews between April and December last year for violating its COVID-19 content guidelines, a 161 percent increase over the same period in 2020. In total, Yelp says it removed over 70,200 reviews across nearly 1,300 pages in 2021, with many resulting from so-called review bombing incidents where coordinated reviews are submitted from users who havent actually patronized a business.

Google explains that every review posted on Google Maps is checked by its machine learning system, which has been trained on the companys content policies to weed out abusive or misleading reviews. This system is trained to check both the contents of individual reviews, but itll also look for wider patterns like sudden spikes in one- or five-star reviews both from the account itself, as well as other reviews on the business.

Google says that human moderation comes into play for content thats been flagged by end users and businesses themselves. Offending reviews can be removed, and in more severe cases, user accounts can be suspended and litigation pursued. Weve found that we need both the nuanced understanding that humans offer and the scale that machines provide to help us moderate contributed content, Googles product lead for user-generated content, Ian Leader, writes.

Its an interesting look at the steps Google takes to keep Maps reviews usable. You can read more in the full blog post.

Link:
Google Maps review moderation detailed as Yelp reports thousands of violations - The Verge

Read More..

Hashing vs. Encryption: What’s The Difference? – FedTech Magazine

What Is Encryption in Federal Agencies?

According tothe National Institute of Standards and Technology, encryption refers to the cryptographic transformation of data (called plaintext) into a form (called ciphertext) that conceals the datas original meaning to prevent it from being known or used.

In laymans terms, asOktanotes ina blog post, encryption basically scrambles data that can be decoded with a key. The goal of encryption is to send along encrypted data to a third party, who will then decrypt that information into a usable form with a decryption key.

The method used to conduct the scrambling (encryption) and unscrambling (decryption) is known as a cryptographic algorithm, and the security of the ciphertext does not depend on the secrecy of the algorithm,a CDW white paper notes. In fact, the most trusted algorithms are those that have been publicly vetted to find weaknesses.

According to Okta, there are at least three fundamental elements to modern encryption tools:

RELATED:How will agencies tackle zero trust in 2022?

Hashing is a concept related to encryption, but it focuses on a different set of priorities.

According to Okta, hashing involves scrambling data at rest to ensure its not stolen or tampered with. Protection is the goal, but the technique isnt built with decoding in mind.

AsSentinelOnenotes ina blog post, hashes are the output of a hashing algorithm like MD5 (Message Digest 5) or SHA (Secure Hash Algorithm), which aim to produce a unique, fixed-length string the hash value, or message digest for any given piece of data or message.

Organizations with vast numbers of usernames and passwords on file, such as federal agencies, are rightly very concerned with those usernames and passwords becoming compromised, increasing the risk that sensitive data will be exposed or exfiltrated. A password hash system could protect all of those passwords from hackers while ensuring those points arent tampered with before theyre used again, Okta notes. Hash encryption like this doesnt anonymize data, although plenty of people believe that it does. Instead, its used to protect this data from those who might misuse or alter it.

Importantly, according to Okta, a typical hashing protocol doesnt come with an automatic translation key. Instead, the process is used to determine alterations, and the data is stored in a scrambled state.

MORE FROM FEDTECH:How should agencies rethink data protection?

Because encryption and hashing serve different purposes for federal IT security teams, its important to know the key differences.

While encryption is primarily used to protect data in transit, hashing is used for protecting data in storage. Encryption can be used to protect passwords in transit while hashing is used to protect passwords in storage.

Data that has been decrypted can be decoded, but data that has been hashed cannot.

In neither case is data anonymized. Encryption relies on both public and private decryption keys while hashing relies only on private keys.

Each approach has its vulnerabilities, Okta notes. Breaking a hash means running a computer algorithm through the codes and developing theories about the key. It should be impossible, but experts say some programs can churn through 450 billion hashes per second, and that means hacking takes mere minutes, the company notes. Meanwhile, encrypted files can be easily decrypted if attackers are skillful enough.

Its important to note that agencies can combine hashing and encryption techniques. You might use hashing to protect password data on your server, but then you lean on encryption to protect files users download once they have gained access, Okta notes.

DIVE DEEPER:How do granular identity and access management controls enable zero trust?

Since hashing can be defeated, there are other ways agencies can use the technique to secure data. This is known as salting the hash.

Salting is the act of adding a series of random characters to a password before going through the hashing function,Okta notes in a separate blog post.

By adding a series of random numbers and letters to the original password, agencies can achieve a different hash function each time, according to Okta. This way, we protect against the flaw of the hash function by having a different hashed password each time, the post notes.

Salt encryption must be stored in a database along with the user password, according to Okta, and it is recommended that salts be random and unique per login to mitigate attacks using rainbow tables of pre-computed hashes.

While an attacker could still re-compute hashes of common password lists using a given salt for a password, a way to provide additional defense in depth is to encrypt password storage at rest, preferably backed by a hardware security module or cloud key management service like Amazon Web Services Key Management Service, Okta notes.

EXPLORE:Create a zero-trust environment among users and on your network.

See the original post here:
Hashing vs. Encryption: What's The Difference? - FedTech Magazine

Read More..

Which Types Of Encryption Will Remain Secure As Quantum Computing Develops – And Which Popular Ones Will Not – Joseph Steinberg

As I discussed last month, unless we take actions soon, a tremendous amount of data that is today protected through the use of encryption will become vulnerable to exposure.

The reason that such a major threat exists is simple much of todays data relies on the security of what are known as asymmetric encryption algorithms, and such algorithms rely for their security on the fact that the mathematics that they use to encrypt cannot easily be reversed in order to decrypt. (For those interested in the details: the most common difficult-to-reverse mathematics employed by asymmetric encryption systems are integer factorization, discrete logarithms, and elliptic-curve discrete logarithms).

While todays computers cannot efficiently crack asymmetric encryption through the use of brute force trying all possible values in order to discover a correct key could literally take centuries, and there are no shortcuts to doing so we have already seen the dawn of so-called quantum computers devices that leverage advanced physics to perform computing functions on large sets of data in super-efficient ways that are completely unachievable with classic computers. While it has long been believed that quantum computers could potentially undermine the integrity of various forms of encryption, in 1994, an American mathematician by the name of Peter Shor showed how a quantum algorithm could quickly solve integer factorization problems transforming a theoretical risk into a time bomb. It became clear then that a powerful quantum computer utilizing Shors Algorithm could both make mincemeat out of modern encryption systems, as well as trivialize the performance of various other forms of complex math and, since then, we have already seen this happen. Just a few years ago, Googles early-generation quantum computer, Sycamore, for example, performed a calculation in 200 seconds that many experts believe would have taken the worlds then-most-powerful-classic-supercomputer, IBM Summit, somewhere between multiple days and multiple millennia to complete. Yes, 200 seconds for a de facto prototype vs multiple millennia for a mature super computer.

To protect data in the quantum computing era, therefore, we must change how we encrypt. To help the world achieve such an objective, the US National Institute of Standards and Technology (NIST) has been running a competition since 2016 to develop new quantum-proof standards for cryptography winners are expected to be announced sometime in the next year, and multiple approaches are expected to be endorsed.

Some quantum-safe encryption methods that appear to be among the likely candidates to be selected by NIST employ what are known as lattice approaches employing math that, at least as of today, we do not know how to undermine with quantum algorithms. While lattice approaches are likely to prove popular methods of addressing quantum supremacy in the near term, there is concern that some of their security might stem from their newness, and, that over time, mathematicians may discover quantum algorithms that render them potentially crackable.

Other candidates for NISTs approval utilize what is known as code-based encryption a time-tested method introduced in 1978 by Caltech Professor of Engineering, Robert McEliece; code-based encryption employs an error-correcting code, keys modified with linear transformations, and random junk data; while it is simple for parties with the decryption keys to remove the junk and decrypt, unauthorized parties seeking to decrypt face a huge challenge that remains effectively unsolvable by quantum algorithms, even after decades of analysis.

NISTs candidates also utilize various other encryption approaches that, at least as of now, appear to be quantum safe.

Of course, security is not the only factor when it comes to deciding how to encrypt practicality plays a big role as well. Any quantum-safe encryption approach that is going to be successful must be usable by the masses; especially as the world experiences the proliferation of smart devices constrained by minimal processing power, memory, and bandwidth, mathematical complexity and/or large minimum key sizes can render useless otherwise great encryption options.

In short, many of todays popular asymmetric encryption methods (RSA, ECC, etc.) will be easily crackable by quantum computers in the not-so-distant future. (Modern asymmetric systems typically use asymmetric encryption to exchange keys that are then used for symmetric encryption if the asymmetric part is not secure, the symmetric part is not either.) To address such risks we have quantum-safe encryption, a term that refers to encryption algorithms and systems, many of which already exist, that are believed to be resilient to cracking attempts performed by quantum computers.

While NIST is working on establishing preferred methods of quantum-safe encryption, sensitive data is already, now, being put at risk by quantum supremacy; as such, for many organizations, waiting for NIST may turn out to be a costly mistake. Additionally, the likely rush to retrofit existing systems with new encryption methods once NIST does produce recommendations may drive up the costs of related projects in terms of both time and money. With quantum-safe encryption solutions that leverage approaches submitted to NIST already available and running on todays computers, the time to start thinking about quantum risks is not somewhere down the road, but now.

This post is sponsored byIronCAP. Please click the link to learn more about IronCAPs patent protected methods of keeping data safe against not only against todays cyberattacks, but also against future attacks from quantum computers.

See original here:
Which Types Of Encryption Will Remain Secure As Quantum Computing Develops - And Which Popular Ones Will Not - Joseph Steinberg

Read More..