Page 2,829«..1020..2,8282,8292,8302,831..2,8402,850..»

Quantum computers take up a lot of space. Researchers decided to shrink this one down – ZDNet

The compact quantum computer fits into two 19-inch server racks.

Quantum computers still require large, dedicated rooms and complex installations, but now, in a new step towards bringing the technology out of the lab, researchers have designed a prototype quantum computer that is compact enough to fit in ordinary data center racks.

As part of an EU-funded project called AQTION, a group of scientists from the University of Innsbruck in Austria successfully set up a fully functional ion trap quantum computer into two 19-inch server racks, as typically found in data centers around the world. The device only requires a single wall-mounted power plug and is otherwise self-contained.

The prototype is an exciting development in an industry that relies mostly on lab-based implementations, where quantum computers can only be controlled thanks to purpose-built infrastructure. Developing a set-up that is more accessible is therefore key to expanding the reach of the technology.

This is why the EU recently launchedAQTION, a 10 million project that aims to create a compact ion-trap quantum computer that meets industry standards without needing an ultra-stable lab environment for operation.

"Our quantum computing experiments usually fill 30- to 50-square-meter laboratories," says Thomas Monz, AQTION project coordinator. "We were now looking to fit the technologies developed here in Innsbruck into the smallest possible space while meeting standards commonly used in industry."

The new device, said the research team, shows that quantum computers will soon be ready for use in data centers.

The researchers used ions, which are single-charged atoms, as qubits. Quantum information is encoded in the electronic state of ions, and operations are performed with laser pulses that modify and control the state of the particles.

While the approach differs from the well-known superconducting qubits used by IBM and Google in their quantum computers, ion trap devices are gaining attention in the industry. Honeywell, for instance,made its quantum debut last year with trapped-ion technology.

To fit in a couple of 19-inch racks, every individual building block of AQTION's quantum computer had to be downsized, from the ion trap processor to the vacuum chamber. The biggest challenge, therefore, was to ensure that the device did not compromise on performance but the researchers are confident that their prototype is already delivering promising results.

Even outside of the controlled environment that can be achieved in a lab, the device was stable enough to operate without interruption from external disturbances, and the physicists were able to individually control and entangle up to 24 ions. Measurements showed that the system's performance and error rate were on par with lab-based implementations.

"We were able to show that compactness does not have to come at the expense of functionality," said Christian Marciniak, researcher at the University of Innsbruck.

By next year, the team is expecting to create a device with up to 50 individually controllable qubits.

For now, however, the prototype's hardware and software capabilities will be further upgraded before it is made available online. Researchers will access the device over the cloud to test quantum algorithms on a hardware-agnostic quantum computing language.

Here is the original post:
Quantum computers take up a lot of space. Researchers decided to shrink this one down - ZDNet

Read More..

New discoveries of rare superconductors may be essential for the future of quantum computing – Illinoisnewstoday.com

Research led by the University of Kent and the STFC Rutherford Appleton Laboratory has discovered a new and rare topological superconductor, LaPt3P. This discovery can be very important for the future operation of quantum computers.

Superconductors are important materials that can conduct electricity without resistance when cooled below a certain temperature, making them highly desirable in societies where energy consumption needs to be reduced.

Superconductors show quantum properties on the scale of everyday objects, are very attractive candidates for building computers that use quantum physics to store data and perform computing operations, and are specific. Much better than the best supercomputers on the task. As a result, leading high-tech companies such as Google, IBM, and Microsoft are in increasing demand for industrial-scale quantum computers using superconductors.

However, the basic unit (qubit) of a quantum computer is extremely sensitive, and quantum properties are lost due to collisions with electromagnetic fields, heat, and air molecules. Protection from these can be achieved by using a special class of superconductors called topological superconductors to create more elastic qubits.

Topological superconductors such as LaPt3P, newly discovered by muon spin relaxation experiments and extensive theoretical analysis, are extremely rare and of great value to the quantum computing industry of the future.

Two different sample sets were prepared at the University of Warwick and ETH Zurich to ensure that their properties are sample- and instrument-independent. Next, muon experiments were performed at two different types of muon facilities. ISIS Pulse Neutron and Muon Source from STFC Rutherford Appleton Laboratory, and PSI from Switzerland.

Dr. Sudeep Kumar Ghosh, Principal Investigator and Lever Hume Early Career Fellow in Kent, said: This discovery of the topological superconductor LaPt3P has great potential in the field of quantum computing. The discovery of such rare and desirable ingredients demonstrates the importance of muon research to the everyday world around us.

###

The paper Chiral singlet superconductivity of weakly correlated metal LaPt3P Nature Communications (University of Kent: Dr. Sudeep K. Ghosh, STFC Rutherford Appleton Laboratory: Dr. Pabitra K. Biswas, Dr. Adrian D. Hillier, University of Warwick-Dr. Geetha Balakrishnan, Dr. Martin R. Lees, Dr. Daniel A. Mayoh; Paul Scherrer Institute : Dr. Charles Baines; Zhejiang University of Technology: Dr. Xiaofeng Xu; ETH Zurich: Dr. Nikolai D. Zhigadlo; Southwest University of Science and Technology: Dr. Jianzhou Zhao).

URL: URL: https: //www.Nature.com /article/s41467-021-22807-8

DOI: https: //Doi.org /10.10.1038 /s41467-021-22807-8

Disclaimer: AAAS and Eurek Alert! We are not responsible for the accuracy of news releases posted to EurekAlert! To contribute to the institution or use the information through the Eurek Alert system.

New discoveries of rare superconductors may be essential for the future of quantum computing

Source link New discoveries of rare superconductors may be essential for the future of quantum computing

Continue reading here:
New discoveries of rare superconductors may be essential for the future of quantum computing - Illinoisnewstoday.com

Read More..

Williams F1 drives digital transformation in racing with AI, quantum – VentureBeat

Elevate your enterprise data technology and strategy at Transform 2021.

The thing that really attracted me to Formula 1 is that its always been about data and technology, says Graeme Hackland, Williams Group IT director and chief information officer of Williams Racing.

Since joining the motorsport racing team in 2014, Hackland has been putting that theory into practice. He is pursuing what he refers to as a data-led digital transformation agenda that helps the organizations designers and engineers create a potential competitive advantage for the teams drivers on race day.

Hackland explains to VentureBeat how Williams F1 is looking to exploit data to make further advances up the grid and how emerging technologies, such as artificial intelligence (AI) and quantum computing, might help in that process.

This interview has been edited for clarity.

VentureBeat: Whats the aim of your data-led transformation process?

Graeme Hackland: Ten years ago, we might have been putting four major package upgrades on the car a year. Were now able to do that much more quickly, and we dont have to wait for big packages of changes. Our digital transformation has been focused on shortening that life cycle. Thats about getting something from a designers brain onto the car as quickly as possible. Test it on a Friday; if its good, it stays. If its not, we refine it, and just keep doing that through the season. And that process has gone really well.

VentureBeat: What kind of data technology are you using to support that process?

Hackland: Some of it is what you would in some industries consider standard data warehousing and business intelligence tools. Some of that is written in-house. At the moment, I dont have a piece of middleware that lies across the whole layer. But thats where we want to head to, so that absolutely everything is feeding into that.

VentureBeat: What would that piece of middleware look like?

Hackland: We originally thought of three main domains: design, manufacturing, and race engineering. And you would have these three bubbles that would all talk to each other. But what weve realized is trying to create data lakes just hasnt worked. It hasnt given us the actual intelligence that we wanted, so we often refer to data puddles. Its much better to have many of these puddles that are well-structured and the data is well understood. And then, through a middleware layer, we can get to the graphical user interfaces.

VentureBeat: What does that layer of information mean for the Williams F1 teams engineers?

Hackland: Were covering everything, from what they look at through to the data structure. And the data structure has been one of our biggest challenges. We relied heavily on Microsoft Excel, and pulling data from all these other sources into Excel was very manual it took too long. So thats the piece of work that weve been doing. Weve not made it public who were working with in that area. Talking publicly about some of the stuff were doing around data and computation, were just not ready yet.

VentureBeat: How do you work out the build vs. buy question?

Hackland: When I got to Williams, we were largely buy-only. We built an in-house capability across three groups: manufacturing, aerodynamics, and race engineering. So they have embedded development groups, and I think thats really important. We considered whether we were going to create a centralized development function. But actually, we feel having them in those three groups is really important. And then as you build those groups, the pendulum swings from buy-only because youve got the capability in-house. The default now is that we will always develop our own if we can. Where theres a genuine competitive advantage, wed develop it ourselves.

VentureBeat: Where might you choose to buy data technologies?

Hackland: Some of the tools that we use trackside are off-the-shelf. Its not all in-house-written, because it doesnt make sense to write your own in some areas. But if you dont write your own applications, youre also accepting that these applications are used by multiple teams. If its a race-engineering application, its probably used across Formula 1 and maybe in other formulas as well. So then you cant customize it and you cant get competitive advantage out of it because everyone else has access to it too. So sometimes well use those as maybe a front end and then well be doing other things in the background. When you start to combine that data with other information, thats when theres a real competitive advantage, and thats where weve put our internal resources.

VentureBeat: What about AI? Is that a technology youre investigating?

Hackland: None of the teams are talking about AI except in passing; theyre just mentioning that AI is being used. None of us want to talk about it yet, and where were applying it. But what weve said publicly is that there are some really interesting challenges that AI can logically be applied to and you get benefits straightaway. So pit stops, the rulebook there are roles that AI can play.

VentureBeat: Can you give me a sense of how AI might be applied in F1?

Hackland: Initially, to augment humans to give engineers more accurate data to work with, or to shortcut their decision-making process so that they can make the right decision more frequently. I felt, even five years ago, that it would be possible that AI could make a pit stop decision without any human intervention. So that is possible, but I dont believe any of the teams will be doing it this year, and we wont. The engineers are not ready, and the humans are not ready to be replaced by AI. So that might take a little bit of time to show them that we can. I think theres still that reluctance to completely hand over the decision-making process, and I can understand that.

VentureBeat: What about other areas of emerging technology?

Hackland: From my perspective, quantum computing is a really exciting opportunity to take computation to a whole new level. And if we can get in there early before the other teams, I think well have a real advantage. There are interesting things happening with some [racing] organizations around that. Once again, were not talking about it publicly, but quantum is completely awesome. I think quantum will take a while. I dont want to be sitting here saying that in the next two years that were going to be developing, designing, and running the car and doing the race analytics on a quantum computer. But a hybrid computer that has quantum elements to it? Absolutely, and within a couple of years. Im really excited about what were doing already.

Read more from the original source:
Williams F1 drives digital transformation in racing with AI, quantum - VentureBeat

Read More..

The best internet security suites and software for 2021 …

If you're looking for an antivirus download that goes above and beyond simply protecting your computer from malware, then full-on internet security suites may be a better choice.

They offer a comprehensive range of protection for your online devices. While basic virus protection is the always the base feature, others that these packages might offer include ransomware protection, a VPN, and even a password manager. These really are all-singing all-dancing online security downloads for those wanting the best possible protection.

And it's not just desktops and laptops that can benefit from internet security suites as there are also versions for Android and iPhone smartphones. Because they cover multiple devices (usually five or more), you can protect all the gadgets of you and your family on one easy plan - Windows and Macs both included.

Some providers also offer a rescue disk feature to rollback any existing attack, and encryption software for added security protection is also commonly included. Many now also come with additional privacy features, and a firewall as standard.

While internet security suites and antivirus packages are commonly aimed at domestic consumers, also note services that are specifically aimed at businesses, such as cloud antivirus and endpoint protection to offer business grade protection. There are also online cyber security courses available to help improve staff awareness.

Which ever internet security suite you're looking for, and for whatever device, you'll end up with more than just basic software with our selection of the best. Here are the ones we think are currently best on the market.

Beefy protection across all fronts with great protection and features

Operating system: Windows and Mac, Android and iOS

Maximum devices covered: 10

Stand out features: Safepay online banking protection, high-quality ransomware defenses, web protection module

TODAY'S BEST DEALS

+Huge range of features+Excellent web surfing protection+30-day trial (no card details needed)

-PC maintenance tools are basic

Bitdefender Total Security is the well-respected security firms top-of-the-range package and tops the lot when it comes to all-singing all-dancing internet security suites.

Total Security comes positively bristling with features. You get deep breath standard antivirus tools plus impressively capable ransomware protection, a firewall, Wi-Fi security advisor, a secure browser (Safepay) for online banking, file shredder, vulnerability scanner (which has been improved for 2021), password manager, email spam filter, parental controls, webcam and microphone defenses, and more besides including a superb web protection module for blocking malicious URLs.

As well as security features, Total Security provides various PC maintenance and optimization tools. These are somewhat useful in themselves, for cleaning out superfluous files and streamlining boot times but more importantly, Bitdefenders flagship package also covers more than just Windows devices, providing apps for Macs, along with Android and iOS mobiles.

As its only a bit more expensive than Bitdefender Internet Security the firms mid-tier security suite its certainly worthwhile upgrading to Total Security if you have multiple devices across various platforms to protect. (You can see what we think of the range in our full Bitdefender review).

There is further good news in that Bitdefender has a minimal impact on system performance, going by independent and our own testing (some rivals do a touch better in this department, but its not a difference youll ever notice in real-world use).

Finally, its worth noting that theres a 30-day trial of this suite, with no payment details needed; you just have to supply an email address. That means you can try out Bitdefender for a full month before committing to buying.

Today's best Bitdefender Total Security deals

Offers an integrated VPN, and helps keep the whole family safe

Operating system: Windows and Mac, Android and iOS

Maximum devices covered: 5

Stand out features: Parental controls, VPN, online backup, dark web monitoring (US)

TODAY'S BEST DEALS

+Fully integrated VPN+Superb parental controls+Intelligent firewall

-More performance impact than most

When we evaluated all of NortonLifeLocks security suite options, we picked out Norton 360 Deluxe as the best value all-round choice for anyone whos looking to protect more than a single device which is likely the majority of folks.

Norton delivers good antivirus protection although some of the independent test lab results have been a little mixed alongside a wealth of features, including webcam protection and dark web monitoring (the latter is for US users only, mind), an impressively smart firewall, plus a system of parental controls.

The parental controls are top-notch, by the way, including in-depth monitoring systems to keep an eye on what your kids are doing online, and even GPS tracking for their mobile devices. Nortons very strong in this department.

There are some truly worthwhile extras included here, too, like a fully integrated Norton VPN (which could be a big money-saver in itself) and 50GB of online backup storage (ditto).

As for negative points, a flaw worth bearing in mind is that Norton 360 Deluxe has more of a drag on system performance than most security suites though its not too far removed from average performers, and you likely wont even notice in everyday usage.

Norton 360 Deluxe covers up to five devices (and that means you can use the VPN with those five bits of hardware as well), either Windows or Mac PCs, plus there are mobile apps for Android and iOS. Pricing is highly competitive compared to rivals, so you should definitely consider this Norton package (compare it to the company's other offerings with our guide to choosing your Norton plan) particularly for family usage given the very thorough parental controls.

Today's best Norton 360 Deluxe deals

A seriously impressive security suite with a light system footprint

Operating system: Windows and Mac, Android and iOS

Maximum devices covered: 10

Stand out features: Safe Money secure web browser, firewall, Safe Kids parental controls

TODAY'S BEST DEALS

+Excellent virus engine+Top-notch parental controls+Wont trouble your PCs resources

-Some features are only so-so quality

Kaspersky Total Security is another veteran of the security world and, as you might expect, it delivers top-quality antivirus defenses plus a very light touch in terms of using hardly any system resources. New for 2021 are performance options to minimize any battery drain for laptop users as well.

One of the issues with the entry-level Kaspersky Anti-Virus package is that its rather thin on extra features, sticking mostly to the core basics and what it does deliver in terms of additional bits and pieces is pretty weak.

Which is why it makes good sense to go for Kaspersky Total Security, mainly because it provides far more functionality, and doesnt cost all that much more than Kaspersky Anti-Virus (at least not if you want to protect multiple devices and sometimes with Kasperskys deals, both these products can be pitched at around the same price, anyway).

You get plenty more with Total Security, including an intelligent firewall (it doesnt plague you with pop-up messages asking what to do), a secure web browser, protection from webcam hijacking, and a software updater (which is more useful than most such efforts), and a file backup tool, along with a solid password manager, plus the full version of Kasperskys Safe Kids module.

The latter is an excellent parental controls system with some smart social media monitoring tools. While not all the features are up to this standard some extras, like the troubleshooting wizards and spam filter, are wobbly around the edges overall, youre getting a lot for your money here.

Today's best Kaspersky Total Security deals

Sterling malware and ransomware protection in a beginner-friendly package

Operating system: Windows and Mac, Android and iOS

Maximum devices covered: 10

Stand out features: Folder Shield anti-ransomware, high-quality URL filter, social networking protection

TODAY'S BEST DEALS

+Very highly rated antivirus engine+Streamlined user-friendly interface+Impressive range of features

-Experts may want more configuration options

Theres a lot to like about Trend Micros flagship security suite Trend Micro Maximum Security not the least of which is its polished and user-friendly interface, backed up by superb virus protection. Trend Micro is highly ranked by the independent testing labs, and it offers sterling multi-layered anti-ransomware defenses, too.

The package also gives you first-class URL filtering for safer web browsing, and this system is smartly configurable. That said, one slight weak point with Trend Micros offering is that there isnt a huge amount of low-level control such as virus scan options so more demanding users may find it lacking here.

Maximum Security provides parental controls, social network protection, and PC maintenance tools, although the latter isnt a strong suit. It also boasts data theft prevention countermeasures, a secure vault for storing sensitive files, and a decent integrated password manager.

Less tech-savvy types will appreciate the ease of use here, which also goes for the capable mobile apps. Theres a 30-day trial as well, so you can thoroughly check all this out for yourself before buying.

Today's best Trend Micro Maximum Security deals

A quality all-rounder security solution

Operating system: Windows and Mac, Android and iOS

Maximum devices covered: 10

Stand out features: Ransomware Shield, Wi-Fi Inspector, SecureLine VPN

TODAY'S BEST DEALS

+Well-featured suite+Bundled VPN+Plentiful configuration options

-Some impact on PC performance-Upselling of other products is unwelcome

Avast is best known for its excellent free antivirus product, but the firm also provides an impressive all-round security solution in the form of Avast Ultimate. This is another offering which bundles a full VPN, giving you far more protection online than a typical antivirus suite, and making Avast Ultimate a value-packed buy for those who are also thinking of picking up a cheap VPN.

Avasts SecureLine VPN may not compete with the best providers out there, but it delivers a solid enough and importantly speedy enough service. Avast Ultimate also sports a decent password manager, a secure browser, and some excellent network protection measures.

This suite has plenty of options for experts to play with in terms of configuration, and has good enough antivirus defenses, backed up by a commendable Ransomware Shield for extra protection on that front.

There are some minor irritations here, notably some of Avasts unwelcome attempts to flog its other products in a paid-for suite, and we observed a little system slowdown in our review. But these niggles aside, if you need a VPN as well as antivirus, Avast Ultimate is a great choice.

Streamlined and fast-performing security suite

Operating system: Windows and Mac, Android and iOS

Maximum devices covered: 5

Stand out features: Password manager, identity protection, 70-day money-back offer

TODAY'S BEST DEALS

+Unbelievably lightweight app+Really quick scan times+LastPass account bundled

-Question marks over antivirus engine-iOS app is limited

Webroot majors in being incredibly lightweight and fast-performing. Indeed, it has a minuscule memory footprint, and takes up next to no space on your system drive, as the products virus definitions are all stored in the cloud.

Yet despite this minimal impact on your machine, Webroot Internet Security Plus comes with plenty of features. Theres online banking and identity theft protection, ransomware defenses, an accurate anti-phishing system, a smart firewall, plus a password manager (you get a LastPass subscription bundled, basically, so thats great news in terms of the quality on offer here).

Downsides? Well, you might get lightning quick malware scans, but Webroots antivirus engine hasnt been evaluated by the big-name independent testing labs in recent times. Thats not necessarily bad, but from what weve seen ourselves and what ratings are out there theres something of a mixed picture of its antivirus accuracy. Also bear in mind that the iOS app doesnt offer malware scanning - it consists of a secure browser, backup facility, and password manager.

Still, Internet Security Plus is a well-rounded package, and a 70-day no questions asked money-back guarantee shows Webroots confidence in its suite.

Today's best Webroot Internet Security Plus deals

Demanding users will really appreciate ESETs configurability

Operating system: Windows, Mac, Linux, Android

Maximum devices covered: 10

Stand out features: Network protection, password manager, anti-theft feature

TODAY'S BEST DEALS

+Highly configurable+Very light on system resources

-Some features are underpowered-Independent lab test results arent the best

ESET Smart Security Premium packs in a lot of features. That includes parental controls, webcam protection, network monitoring, additional network protection, and an anti-theft feature for Windows devices (allowing for location tracking, and more) is an interesting bonus. Furthermore, Linux systems are covered here, as well as Windows and Mac computers.

However, while ESET delivers lots of features, their quality can be variable. For example, the system of parental controls is very barebones, but the password manager is well fleshed-out. ESET also offers plenty of configuration options, which will please experts, although computing novices may find it tricky to get to grips with in some respects.

ESETs core antivirus protection seems solid, albeit with some mixed evaluations from independent testing labs. Smart Security Premium does provide some interesting extras, including the aforementioned password manager, and a secure file vault to protect any sensitive data on your PC, which some folks will doubtless find very useful additions.

Read the original post:
The best internet security suites and software for 2021 ...

Read More..

The ISRG wants to make the Linux kernel memory-safe with Rust – Ars Technica

Enlarge / No, not that kind of Rust.

The Internet Security Research Groupparent organization of the better-known Let's Encrypt projecthas provided prominent developer Miguel Ojeda with a one-year contract to work on Rust in Linux and other security efforts on a full-time basis.

Efforts to make Rust a viable language for Linux kernel development began at the 2020 Linux Plumbers conference, with acceptance for the idea coming from Linus Torvalds himself. Torvalds specifically requested Rust compiler availability in the default kernel build environment, to support such effortsnot to replace the entire source code of the Linux kernel with Rust-developed equivalents, but to make it possible for new development to work properly.

Using Rust for new code in the kernelwhich might mean new hardware drivers or even replacement of GNU Coreutilspotentially decreases the number of bugs lurking in the kernel. Rust simply won't allow a developer to leak memory or create the potential for buffer overflowssignificant sources of performance and security issues in complex C-language code.

The new contract from the Internet Security Research Group (ISRG) gives Ojeda a full-time paycheck to continue memory safety work he was already doing on a part-time basis. ISRG Executive Director Josh Aas notes that the group has worked closely with Google engineer Dan Lorenc and that financial support from Google itself is critical to sponsoring Ojeda's ongoing work.

"Large efforts to eliminate entire classes of security issues are the best investments at scale," Lorenc said, adding that Google is "thrilled to [help] the ISRG support Miguel Ojeda's work dedicated to improving the memory safety of the kernel for everyone."

Ojeda's work is the first project to be sponsored under the ISRG's Prossimo banner, but it's not the first step the organization has taken for greater memory safety. Previous initiatives include a memory-safe TLS module for the Apache web server, a memory-safe version of the curldata transfer utility, and rustlsa memory-safe alternative to the ubiquitous OpenSSL network encryption library.

The Prossimo initiatives can be found at memorysafety.org, along with donation linksthe ISRG and its Prossimo projects are 100 percent supported by charitable donations, from both individuals and community-minded companies. If you'd like to get involved, the ISRG accepts direct currencydonationsvia PayPal or Donorbox, various cryptocurrencies, and even securities or shares in mutual funds.

Here is the original post:
The ISRG wants to make the Linux kernel memory-safe with Rust - Ars Technica

Read More..

A State Department for the Digital Age – War on the Rocks

Carl Sagan was right. The renowned American scientist once warned that we have arranged a society based on science and technology, in which nobody understands anything about science and technology. A case in point: the State Departments ongoing review of whether to keep cyber security and emerging technology policy in the hands of the undersecretary for arms control and international security, where former Secretary of State Mike Pompeo put both portfolios in January 2021.

It makes some sense for arms controllers to lead on security threats in cyberspace. Deterrence is an important element of cyber security, and those who work on arms control would be familiar with deterrence. But developing and executing emerging technology policy requires a different set of skills. AI, the Internet of Things, and 5G, to name only a few emerging technologies, hold vast economic, military, and political potential. Their impact goes far beyond security, the traditional focus of arms control. It is multidimensional and so policy approaches should be too. These technologies lie at the heart of Sino-American rivalry, U.S. innovation and economic leadership, and the future of the global order. They are driving tectonic shifts that will test American diplomacy in ways unseen since the Cold War.

Congress agrees that a security-dominated approach to technology issues is insufficient. However, its proposals to improve Foggy Bottoms policymaking apparatus do not go far enough. The State Department could address both problems where to put emerging technologies and how to fix technology policymaking overall by consolidating technology issues under a new undersecretary position. Doing so would ensure equal attention to economic, security, and political interests, improve coordination and integration of policy, and elevate the stature of cyber diplomacy and technology issues. This move would be consistent with the recommendations of the National Security Commission on Artificial Intelligence. Ultimately, consolidating technology policy at the State Department would also help to build the skills and expertise that the department needs to lead foreign policy in the digital age.

Geopolitical and Geoeconomic Implications of Emerging Technologies

Emerging technologies are redefining what it means to be prosperous, secure, and powerful. Every country wants to acquire them and use them to expand or project power and influence, causing friction among nations and provoking anxiety, jealousy, fear, and rage. To lead at this new frontier is to gain a geostrategic advantage for the next century. China is devoting massive resources to that race. Emerging technologies are effectively driving two big shifts: the technological revolution and the rise of China as a strategic competitor to the United States.

But this is no rerun of the era of U.S.-Soviet rivalry. It is more complex. The unprecedented speed and scope of technological advances today are disrupting the pecking order within and among nations and hastening the decline of the existing global order. Cyberspace is now as critical an arena for diplomacy and conflict as the physical world. China, furthermore, is not the Soviet Union. The worlds second largest economy is an engine of global growth and has integrated into the international economic order while playing by its own rules. The U.S. and Chinese economies are also deeply interdependent, raising the costs of conflict and complacency. For all the foregoing reasons, competition with China should be a key consideration in deciding where to place emerging technology policy. This competition is not primarily a weapons race but a race for economic and technological supremacy, and a political contest between two dueling systems.

State Department Responses to the Emerging Technology Challenge

Until Pompeo established the bureau for cyberspace security and emerging technologies in January 2021, no single office or bureau was in charge of emerging technology policy at the State Department. The bureau has not been stood up, awaiting the outcome of an internal review. Pompeo sought to merge two offices with responsibilities for coordinating diplomatic responses to the security aspects of emerging technologies and effectively create a stronger, more unified, security voice. One office was already under the undersecretary for arms control and international security, the other was not. Pompeos predecessor, Rex Tillerson, took the opposite approach: He wanted to place the latter office under the undersecretary for economic affairs in 2017, part of his effort to eliminate special envoy positions, but critics argued that security issues would get short shrift.

Pompeos arrangement has operated informally since 2018. He notified Congress of his intent to formalize it in June 2019. But then-House Foreign Affairs Committee Chairman Eliot Engel blocked the formation of the bureau because it would focus too narrowly on cyber security and fail to elevate economic and political interests. However, that was Pompeos point to address the security challenges presented by rapid developments in emerging technologies.

Emerging technology policy was thus not really a stand-alone effort after all, but an adjunct of cyberspace security. Two General Accountability Office investigations during Pompeos tenure confirmed that arms control specialists were focusing solely on security to the detriment of economic and political interests. While State Department officials maintained that coordination with other parts of the bureaucracy was taking place, and there is no reason to doubt that assertion, the General Accountability Office was unable to confirm it. Furthermore, in public statements at the time U.S. officials made clear that their focus was on security challenges.

But emerging technology policy requires equal consideration of the economic and political challenges that these technologies present in the hands of competitors and adversaries. AI, for instance, could give autocrats greater capacity to manipulate public opinion, destabilize democracies, and monitor their citizens. It makes as much sense for arms control specialists to formulate and drive the required policy responses as it does to ask democracy experts to address the strategic stability questions raised by hypersonic missiles (another emerging technology).

Economic interests fare no better. The last administration reached into its security policy toolkit to regulate the availability of things in response to Chinas unfair practices in the technology race with United States, risking American innovation leadership and economic competitiveness. While some may argue that the administration was responding to the perceived loss of U.S. competitiveness resulting from Chinas predatory trade practices, U.S. industry, at the center of the storm, certainly did not see it that way. American technology companies pushed back hard against the worst of these policies on the grounds that they would not only harm their interests but also the U.S. economy, and so undercut the very goals that the administration was trying to achieve.

The strategic risks of a security-dominated approach are even broader. Restrictive U.S. policies and Chinas responses to them also turned the dial of Sino-American relations decisively towards confrontation. A warier, more critical approach to Beijing is warranted, but Washington has to walk a fine line to keep the complicated mix of rivalry and mutual interests in the relationship from spilling over or prompting hedging by other states.

A security-dominated approach to emerging technologies is simply too blunt and too narrow. Arms control specialists, with their focus on security, unquestionably have a critical role to play on such issues as seeking a global prohibition against AI-enabled systems deciding when to deploy nuclear weapons. But leading the State Department on emerging technology policy requires perspective on a diversity of vital U.S. interests that go well beyond security.

Technology Policy at the State Department: Too Many Cooks

Moving oversight of the emerging technologies portfolio to the deputy secretary of state for management and resources, who has broad responsibilities for policy and management, would be a good start. But it would still not address the bigger organizational challenges that rightly concern Congress. Lawmakers want the department to fix the coordination problems that limit its effectiveness on technology issues, elevate cyber diplomacy as a foreign policy priority, and ensure equal focus on economic, security, and political concerns. Congress also seeks a separate China strategy, given the decisive role of technology competition in Sino-American rivalry.

Yet, for all that lawmakers get right about what ails the State Department organizationally, not a single congressional proposal tackles the fundamental problem: the departments balkanizedtechnology policy landscape, which stretches across more than a dozenregional and functionalbureaus. Five undersecretaries divide oversight of this policy sprawl: political affairs, arms control, economic affairs, civilian security, and public affairs. None are technology experts. Each has a mandate, a budget, and bureaucratic turf to protect. Lawmakers are merely tinkering at the margins, proposing the consolidation of some functions or adding new layers of bureaucracy to solve a coordination and integration problem that starts on the ground floor, not inside the boardroom.

Without changes at the State Department, a security-focused approach will dominate emerging technology policy. This critical area of foreign policy will resemble an arms control agreement: a maze of constraints, hurdles, and walls. U.S. economic competitiveness will also be at risk because traditional arms control thinking tends to be prohibitory and regulatory, so in interagency policy deliberations the State Department will be inclined to support burdensome and expensive new layers of restrictions on business in the interest of security. Of course, it will be important to take security considerations into account when thinking about economic and technology policy toward China. But it should not be the only consideration. Absent important bureaucratic changes, other priorities like promoting internet freedom and international cyber stability will suffer from the absence of high-level attention. Furthermore, while counterpart agencies like the Departments of Defense and Homeland Security build the deep bench of expertise necessary to adapt to an era of geostrategic competition rooted in technology, the State Department will fall further behind in this area where its leadership is essential to Americas well-being and success.

Consolidate Technology Policy Functions

Solutions are not simple, but they are obvious. First, the State Department should create a new undersecretary position and bring all technology issues under it, as the congressionally established National Security Commission on Artificial Intelligence recommends. The undersecretary should have broad expertise in technology and its applications. Consolidation will improve coordination and rapid decision-making when trade-offs are required, while developing a cadre of tech-savvy cyber diplomats. The departments large country desks provide proof of concept. They build deep and practical country expertise because they are multidisciplinary. Information is routinely shared among desk officers handling diverse portfolios political, economic, and security. Political and economic considerations factor seamlessly into security policy, and vice versa. This integrated, coordinated approach makes country desks formidable policy players. They are well-rounded and respected for their knowledge and advocacy of reliably well-coordinated initiatives and positions, road-tested across competing U.S. interests. That is the model to emulate.

Second, the State Department should discuss its organizational plans with counterpart agencies including the Departments of Defense, Homeland Security, Commerce, Treasury, Justice, and Energy something the last administration, according to the Government Accountability Office, did not do. The National Security Council should lead this discussion and specifically address whether federal agencies are handling emerging technology policy with the kind of comprehensive focus it requires, and not merely as an adjunct of cyber security.

Third, the new undersecretary should report to the third-ranking official in the department, the deputy secretary for management and resources, a position Congress should mandate that every administration fill. Undersecretaries usually report to the secretary of state, but the reality is that they do not all get equal attention. This alternative structure would ensure consistent, high-level involvement. It would give cyber diplomats the stature to go toe-to-toe with counterparts, both in the U.S. policymaking process and in foreign governments, who would see them as influential representatives of a powerful part of the State Department.

Organize for the Present, With a Clear View of the Future

America faces a tidal wave of challenges wrought by unprecedented and ubiquitous advances in emerging technologies and the rise of China as an anti-democratic economic superpower. The State Department has a leading role to play in addressing both challenges. Consolidating all technology issues under a single undersecretary would significantly strengthen the departments hand in the interagency policymaking process. The department is better positioned than its interagency counterparts to articulate a national emerging technology policy that accounts for the full range of U.S. national interests, not just those related to security. Multidimensionality is the State Departments core comparative advantage. Consolidation would reinforce it. No other agency has the mandate, the expertise, and the credibility to compel consideration of that vital perspective. Without it, the United States risks undermining its complex geostrategic interests with over-securitized responses to rivalry with China and the related, evolving challenges presented by the most rapid technological change ever experienced in human history.

The State Departments technology policy apparatus was built for an era that no longer exists. This moment calls urgently for a bold reorganization. The past is never a good place to live.

Ferial Ara Saeed is CEO of Telegraph Strategies LLC, a risk management firm providing clients strategic guidance and analysis of political and economic trends. A former senior American diplomat with expertise on North Asia and the Middle East, she served as deputy U.S. coordinator for information and communications technology policy at the State Department, on the country desks for China, Japan, and Korea, and she advised both the undersecretary of state for economic and business affairs and the undersecretary of state for arms control and international security.

Image: State Department (Photo by Ron Przysucha)

See the original post:
A State Department for the Digital Age - War on the Rocks

Read More..

Do you still need an antivirus software in 2021? – The Kathmandu Post

We have come a long way from glitching Windows screens to adware and just plain annoyance viruses. Windows 10 today doesnt feel as unsafe as the operating system in its earlier days. Viruses are mostly controlled by Microsofts in-built Windows Defender and with proper digital hygiene, tech-savvy people can identify phishing attempts and viruses manually. Considering how Windows automatically protects you from digital threats, do you need an antivirus software in 2021?

While yes, viruses have been controlled to some extent in modern operating systems, we have also seen some malicious applications plague digital users in the recent past. WannaCry was the infamous ransomware cyptoworm that encrypted around 200,000 computers across 150 countries. Mydoom, a worm, is considered one of the fastest spreading email worms with computers getting affected even today since its inception in 2004. As security has changed, so have the many viruses that infect your computer. While in the past, viruses were mainly designed to annoy or display unwanted information, the current landscape of the digital world has also given rise to more complex viruses with a specific purpose. Malware, like Stuxnet, have even been used to disable and disrupt nuclear power plants and engage in cyber warfare.

Antivirus software like Windows Defender is good in detecting known threats, blocking unwanted applications and network attacks but newer and newer viruses are developed which might not be identified in virus databases. These new variants can easily pass through antivirus scans and by the time they are detected, they might already have wreaked havoc on your computer. And even more than direct network attacks, social engineering infections are also one of the most common ways that computers are infected. If you dont know what to look for, an exact copy of Facebooks login page might be a phishing site.

While known threats are easy to protect against, it is the newer ones that use unknown vulnerabilities within a system that internet users need to be more worried about. The power of your computer to be used as a botnet and access to your personal data can be disastrous these days. Third-party antivirus softwares, while providing all the services of Windows Defender, also offer some great tools to keep you that extra bit safe on the internet.

Antivirus softwares like Kaspersky Internet Security, ESET Internet Security, Avast Antivirus, McAfee and BitDefender are all available in Nepal through eSewa or Khalti. All of these antivirus softwares have free versions as well but if you want to pay for the service, there are local dealers for them. For a free service, however, we recommend staying with Windows Defender since the integrated software works really well with Windows and is very light on resources. Free versions of any of these third-party services would add a few new features but for the most part, Windows Defender should work fine.

Paid versions of these services are where their value truly resides. Almost all of the third-party antivirus softwares come equipped with machine learning and artificial intelligence-based threat detection. Some, like Kaspersky and McAfee, also offer Password Managers to help complicate your passwords and keep them safe. Further features like Ransomware remediation help you protect your files even after your computer has already been infected by a ransomware. Threat detection for all of the aforementioned antivirus software are impeccable, helped by the fact that threat detections are now shared across all antivirus softwares. But for added protection to privacy, some also offer VPN services and software webcam kill switches.

Extra security is all well and good, but it doesnt help very much if they hog all of your system resources. And in the past, antivirus softwares have been notorious resource hogs, completely freezing your computer while an active scan is running. With how invisible Windows Defender is, this doesnt seem to be a problem with Microsofts in-house offering, but what about the third-party ones? Installing any new antivirus is definitely going to take up some of your system resources but its not as bad today as it was in the past. This is also because hardware has continued to evolve over the past decade, and what felt like heavy programs in the past, now run easily on one core of your CPU, leaving you with plenty of parallel processors to work off of. Kaspersky, ESET, and McAfee all raise system resources by a couple of percent while idle, but these are minimal increases that dont necessarily affect system processes unless theyre running active scans. Norton was the heaviest and still, system performance was only slightly affected.

Considering everything, would I recommend installing an antivirus on your modern 2021 computer? Absolutely. The added protection offered by any of these security solutions will help not only protect your computer from infections but rather act reactively to malicious software as well. Additional services like Password Managers and VPNs are a must use today, and even if you dont end up shelling out money for any of these antiviruses, free Password Managers (BitWarden) should be an essential program for any internet denizen to keep their online accounts safe. Getting one of these paid antivirus software is definitely going to help protect your data better, but they also come at a cost. Which is why, we recommend the default Windows Defender too, for those looking for a free solution. Viruses arent what they used to be, theyre used more nefariously today than ever before which is why thinking about cyber security should be a must to keep yourself safe in the digital world.

View post:
Do you still need an antivirus software in 2021? - The Kathmandu Post

Read More..

Hacked: Cyber-safety in the digital era – Dhaka Tribune

File photo: A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. REUTERS

The most common hacking techniques and how to protect yourself from them

Cybercrime costs over $10 million every minute. It is projected to set the world back some $10.5 trillion annually by 2025. Data has become the gold of the digital economy revolution considering there will be 200 zettabytes of it by 2025.

And so, cyber-security has emerged as a critical issue affecting anyone with a digital presence. Massive data leaks, identity theft and extortion are just a few of the many problems plaguing the digital space.

Victims range from the often innocent and vulnerable to banks, multinational corporations, and powerful elites. Bangladesh is no stranger to cybercrime either.

That is why it is important to understand ones digital presence now more than ever. The first step is familiarizing oneself with the hacking methods of cyber-criminals. Here are some of the most common hacking techniques to be careful of, what can be done to protect against such threats, and the measures Bangladesh is taking to securely ensure the digital dream.

Most common hacking techniques to be careful of and how to stay protected

Before getting into the most common hacking techniques, it is important to keep in mind that not all hackers are bad. While there are many malicious minds creating havoc, there are just as many digital guardians working tirelessly to help humanity for the best. The easiest way to tell between the good and bad is to differentiate between white hat and black hat hackers.

White hat hackers are the good guys; they are ethical computer security experts specialized in finding faults in systems that may expose your valuable data. Penetration testing is one of several ways white hat hackers can test and ensure the safety of a company or individuals information system. They can be found employed among the ranks of Google, Microsoft, and Apple with the mission of keeping the digital space safe for everyone.

Black hat hackers are the bad guys; they are the ones stealing money and identities, leaking sensitive personal data, and facilitating illegal activities -- a few crimes topping the startlingly long list. Black hat hackers break into information networks using an arsenal of attacks, with malicious intentions. They can destroy businesses and ruin lives; according to IBM, the average cost of a data breach was $3.86 million in 2020.

Remaining anonymous while committing crimes is their specialty, and they can be found all around the world.

While the list for hacking methods is a long one, heres a look at some of the most common hacking techniques used by black hat hackers to better understand how to stay alert and protected:

The hackers will have access to and use authenticated login information, passwords and mannerisms of their victims. Although many websites must now ask permission to accept cookies from users,businessescan take actionslike ensuring web developers use the newest and most updated development techniques, as well as to update encryption protection on a regular basis.

Similarly to bait and switch, to stay safe, practice caution when downloading files or opening unfamiliar email attachments. Updated anti-malware software or applications can also help prevent these types of attacks.

It should be noted that nearly 80% of all keyloggers are not detectable by antivirus software or firewalls. The best measure against this is often seen in banking and e-commerce through virtual (on-screen) keyboards. These encrypt text or keys inputted so it becomes difficult for keyloggers to make sense of the stolen data.

The US has seen an increase in ransomware attacks and recently had to pay hackers to regain access to a critical US pipeline. In 2019, the healthcare industry lost nearly $25 billion to ransomware attacks. Having reliable and updated anti-virus software or applications from trusted industry experts is the best protection once again in this scenario.

Using quality VPN services is a smart choice in case you find yourself having to use or access free Wi-Fi. Try to ensure using a variety of unique but memorable passwords for all digital profiles.

Instead of outright stealing, hackers exercise a variety of techniques like using fear, trust, sympathy, greed, laziness and ego to get victims to willingly provide their information. This scenario can trick even the best into falling prey. Digital hygiene and appropriate education will be the most effective tools for combating such abstract challenges moving forward.

Bangladesh and its cyber-presence

As of January 2021, Bangladesh has registered over 47 million internet users. Among that figure, 45 million out of the 47 million users were on social media, as reported by Data Reportal. The number of mobile connections also saw an increase of 1.7 million (+1.1%) since last January.

These figures point towards one thing- growth. Bangladesh has been making strong economic progress despite the global pandemic. According to the IMF: Bangladesh economy will grow 5.0% in 2021 and 7.5% in 2022.

This growth will come opportunities and challenges alike, mainly addressing cyber-security. Bangladesh is still developing in many aspects and has a long road ahead.

About 95% of cyber-security data breaches are caused by human error. This is how Bangladesh became a victim of losing $81 million in a matter of hours. According to WIRED, in February 2016, a simple malware attack was used to initiate the Bangladesh Bank heist.

Unknown hackers used SWIFT credentials of Bangladesh Central Bank employees and sent more than three dozen fraudulent money transfer requests to the Federal Reserve Bank of New York. They asked the bank to transfer millions of Bangladesh Banks funds to bank accounts in the Philippines, Sri Lanka and a few other parts of Asia.

The hackers initial targeted amount was a whopping $1 billion. Thanks to a printer error, Bangladesh Bank was able to halt the heist of another $850 million. Although they were never able to recover the $81 million lost during the early stages of the heist, they were able to prevent potentially the biggest cyber heist in history.

This was a jarring wake-up call for Bangladesh and its cyber-presence. Since then, a number of cyber-security companies have been further developed alongside efforts being made by many students as well. We will bring brief focus to a few of such companies playing their part in building safer cyber-security.

This is a similar approach used in mobile data. Bontons machine learning models can be applied to moderating the applications USPs. They are currently in the start-up stage, however similar concepts and proactivity are growing amongst the youth.

Takeaway

Staying safe in the digital age is more important than ever. Technology will only continue to become an increasingly integral part of human life, so being fluent with its uses and dangers will be essential.Education, training and transparency will be the most influential in effectively navigating these unexplored waters.

A few tips to remember: avoid using free Wi-Fi hotspots, avoid using apps from untrusted sources and ignore unexpected communication. Consulting friends or professionals in the field of cyber-security is also a great way to step out of the cyber shadows and into the digital light.

Bangladesh, albeit having to learn the hard way, will now be paving the path for a far more secure and digitally enhanced future. And considering that in 2021, there will be four million unfilled cybersecurity jobs globally, now would be a good time to polish off those cyber cobwebs.

See the original post:
Hacked: Cyber-safety in the digital era - Dhaka Tribune

Read More..

China claims it’s leading the way in 6G mobile tech research, but the reality is still years away – ABC News

Lena Li had high hopes when she arrived in Australia from China to study telecommunications engineering.

Her impression was that Australia, where wi-fi was invented,was an "advanced" countryat the cutting edge of technology.

But it wasn't what she expected.

"When I video call my parents on WeChat, it would say that the quality of the internet is not good on the screen, and then on my mum's end, it would say the other party's internet connection is poor," the 25-year-old graduate told the ABC's China Tonight.

"In our Chinese international student circle, we often joke about the internet in Australiawe sayit's'turtle' speed."

While Australia's 5G mobile network rollout is still in its infancy, China has announcedits 6G will be readyfor commercial usein nine years, according to an industry white paper released earlierthis month.

Ms Li wanted to work for Chinese telecommunication giant Huawei in Australia,but itwasbanned from supplying Australia's 5G equipment over national security concerns.

Now the company is reportedly sendingtwo satellites next monthto test its potential6G technology.

Buttraditional technological superpowers, like the United States, arereclaiming lost ground by passing newlaws and pouring record money into scientific research to try and stave off China's tech challenge.

While 6G is still largely theoretical and at least a decade away the race fornext-genwireless technology dominance is heating up.

6G refers to the sixth generation ofwireless mobile connectivity.

Chinese telecommunications company Huawei begins research into 6G technology in Canada but what does this actually mean?

Mobile network standards work in roughly decade cycles from 1G in 1980 to 5G in 2020 so 6G is expected to be deployed in the 2030s, promising up to 100 times faster internet speeds than its predecessor.

Communications expert Professor Branka Vucetic, director of the Centre for IoT (Internet of Things)and Telecommunications at the University of Sydney,has been at the forefront of Australia's 5G and 6G research and development.

She told the ABC that 6G would deliver some of the unfulfilled promises of 5G, with higherreliability and low cost.

"It's going tobe like [living] in a science fiction world," she said.

"6G would be the main enabler of some new services, for example, integration of human brains with computers robots helping us at home, looking after the sick people or ageing population.

ABC News: Samuel Yang

"Self-driving cars will be common by the 2030s and they will be connected by 6G networks."

China began its 6G research back in 2018, the same year as the US, and 6G has been included as a priority in China's latest five-year plan.

The government says 6G technology will be used for smart city construction, disaster prevention and environmental protection.

Professor Greg Austin is the head of the Cyber, Space and Future Warfare Program at the International Institute for Strategic Studies in Singapore and an academic at the UNSW Institute for Cyber Security.

Supplied: Greg Austin

He told the ABC that although there's little information about what stage China is up to in its6G development, there are potential uses in military and intelligence.

"China's public domain discussions of 6G are really around the potential benefit to society in general, to general human advance and human progress," he said.

"It's a bit too soon to be identifying, in a sense, the specific military-related or intelligence-related applications of 6G."

In April, the state-run tabloid Global Times reported that the Chinese telco giant Huawei is set to launch two satellites in July "with aims including the verification of the 6G network technologies".

Huawei did not respond to the ABC's request for comment.

China's most high-profile diplomat asks how Australian intelligence and security services have "the guts" to say Huawei technology poses a threat as he rampsup criticism of the call to ban the company from Australia's 5G networks.

In November last year, Chinese media falsely reported that China has successfully launched "the world's first 6G satellite" into orbit, which raised a few eyebrows even within the country.

Professor Austin saidreports like these are "typical Chinese propaganda", and that according to the specialists he's consulted, "there is no such thing as a 6G satellite right now".

Rather,China has launched experimental satellites which can conduct tests related to the possible evolution of 6G, he said.

"[They] blur the truth and make it seem like China is advancing in technology much faster than it really is," he said.

"But to say that China leads in 6G technology today would be a gross exaggeration.

"What China is all about, is to convince its own citizens and the rest of the worldthat it's actually doing very well in the technology competition with the United States and its allies."

Huawei has been banned by the US and its allies, including Australia, over cyber security concerns such as espionage activities for the Chinese government and stealing intellectual property from foreign technology companies.

Huawei has repeatedly denied the allegations.

What exactly is Huawei and why does it seem like it's continually being targeted by foreign governments?

According to the Nine newspapers, earlier this year Huawei urged the Australian government to engage in 6G talks with the company to avoid a repeat of the ban on its equipment in 5G mobile networks.

John Lee, a senior analyst from Mercator Institute for China Studies in Berlin, said while theUS's efforts to undermine Huawei's market dominance have been effective, it'd still be hard to untangle a global telco industry that has been integrated with Chinese firms overthe past two decades.

"In my opinion, it's unlikely that the world will split cleanly into US-led and China-led technology spheres, since most countries don't see their interests best served by aligning decisively with either Washington or Beijing," he said.

Supplied: Mercator Institute for China Studies

But the suspicionof Chinese cyber influence is likely to linger on with 6G, triggered bya track record of "penetrating Western systems to steal information" and repressionin Hong Kong and Xinjiang, according to Professor Austin.

The position taken by some international intelligence agencies was, if we can't keep them out of even these basic systems, let's not take the risk with 5G,because it's going to be quite sensitive for certain national infrastructure and security purposes," he said.

"So the insecurity on the cyber front was exacerbated by the new insecurities in geopolitics."

Professor Austin said whiletech tensions between China and the US were intensifying, with theBiden administrationlikely to continuepolicies to sanction Chinese tech companies, there is room fora more nuanced approach.

"Especially in respect of Huawei, there are many aspects of the way that policy was implemented which were really driven more by hysteria than by the actual risk," he said.

ABC News: Jarrod Fankhauser

According to the National Intellectual Property Administration, China accounted for 35 per cent of the global 6G-related patent applications, followed by the US with 18 per cent.

Earlier this month, the US Senate passeda sweeping new bill for more research and innovation funding of$US250 billion ($323 billion).

In April, the US and Japan announced a joint investment ofUS$4.5 billion ($5.8 billion)for the research, development and testing of 6G.

Stan Grant and Yvonne Yong take a fresh look at news from inside China.

"The Chinese government is locked in a battle for technological supremacy with the United States for all sorts of strategic political and military purposes," Professor Austin said.

"So we really can't separate Chinese interest in 6G as being any different from Chinese interest in artificial intelligence or space travel or even undersea exploration."

Professor Vucetic said China wascurrently leading the way in 5G, and there was significant investment from smartphone manufacturers, telcos and the Chinese government in 6G.

"The strategic importance of 5G has been overlooked in the past by the Western countries," she said.

"Now many other countries started to invest in 6G, because I think they realised that they were lagging behind China in 5G."

The Next G Alliance, a US-ledcoalition including tech giants like Apple, Google and AT&T, was formed in October last yearto "advance North American leadership in 6G".

Wireless network and smartphone manufacturers in South Korea and Europe have also joined the 6G race by launching large-scale research and developmentprojects.

"If China is prepared to invest at levels that the United States and other countries do not invest, then we might see China take quite a lead in 6Gtechnologies by the time we get to 2025 or 2030," Professor Austinsaid.

"But more importantly, humanity will win from 6Gtechnology, there will be important new breakthroughs."

Read the story in Chinese:

Watch the story on China Tonight, Tuesdaysat 8:00pm AEST on ABC NewsChannel and 10:30pm AEST on ABC TV, or stream on ABC iview.

Original post:
China claims it's leading the way in 6G mobile tech research, but the reality is still years away - ABC News

Read More..

Opinion | Conflicts Within the A.C.L.U. Over Free Speech and Racial Justice – The New York Times

To the Editor:

As a former staff lawyer for the New York Civil Liberties Union who, as a civil rights lawyer since then, has concentrated on First Amendment cases, I do not take threats to free speech lightly. But restrictions on speech raise issues that are more complicated than your article implies.

Yes, hate speech is generally protected by the Constitution, but so is equality, and hate speech can often make a mockery of equal rights. What the critics call an abandonment of A.C.L.U.s principles reflects, in fact, a growing awareness of many within the A.C.L.U. that speech and equality are sometimes in conflict, and that context matters.

The point is illustrated by the recent controversy over attempts by college students to block Ann Coulter, Milo Yiannopolis and Charles Murray from speaking on their campuses. While the administrators who ran the college bemoaned threats to academic freedom, and liberal critics charged the students with censorship of views they didnt like, the students recognized what it meant to vulnerable students whose lives on predominantly white, elite campuses were often a daily struggle to be targeted by such unrestrained bigotry. They understood as well that even in a place devoted to the free exchange of ideas, little was lost by not hearing Ann Coulter once again say of Muslims, We should invade their countries, kill their leaders and convert them to Christianity.

What students and, now, many within the A.C.L.U. have recognized is that, whether or not speech is protected by the First Amendment, there are some times and some places where it should not be heard.

Alan LevineMiami Beach

To the Editor:

The conflicts within the A.C.L.U. may help us clarify what free speech requires in the 21st century. The A.C.L.U. has supported the First Amendment rights of some very bad people for years, but it is a guardian of free speech, not a law enforcement agency. It fought for the right of far-right groups to parade in downtown Charlottesville, Va., but deserves no blame for the failure of the F.B.I. and the local Virginia authorities to stop the violence.

Still, the A.C.L.U. is and was far from perfect. Neither your news story nor Michelle Goldbergs column (The A.C.L.U. Must Defend Awful Speech, June 8) mention the organizations most egregious failures. In the name of national security, it hesitated to defend Japanese Americans during World War II and all too often refused to take cases of Communists and other controversial figures during the McCarthy era. Did its delinquency contribute to the most serious episodes of political repression in American history? Perhaps.

Its current confusion simply illustrates how complicated protecting our freedom can be. This is all the more the case in a Twitter-sphere, where nuanced arguments cannot be made. I plan to renew my membership right now.

Go here to read the rest:
Opinion | Conflicts Within the A.C.L.U. Over Free Speech and Racial Justice - The New York Times

Read More..