Page 3,457«..1020..3,4563,4573,4583,459..3,4703,480..»

This simple explainer tackles the complexity of quantum computing – Boing Boing

Many videos describing quantum computers try to distill and oversimplify everything. Thoughty's takes its time and gives more historical and theoretical context than most.

Because it does take a while to get into the subject, here's a shorter explainer by MIT:

Today's computers use bitsa stream of electrical or optical pulses representing1s or0s. Everything from your tweets and e-mails to your iTunes songs and YouTube videos are essentially long strings of these binary digits.

Quantum computers, on the other hand, usequbits, whichare typically subatomic particles such as electrons or photons. Generating and managing qubits is a scientific and engineering challenge. Some companies, such as IBM, Google, and Rigetti Computing, use superconducting circuits cooled to temperatures colder than deep space. Others, like IonQ, trap individual atoms in electromagnetic fields on a silicon chip in ultra-high-vacuum chambers. In both cases, the goal is to isolate the qubits in a controlled quantum state.

The processing power possible through these controlled qubits will make today's fastest computers look positively archaic.

Image: YouTube / Thoughty2

Intelligence is a surprisingly difficult thing to define. Kurzgesagt jumps into the debate with an interesting overview of where intelligence begins. Is a slime mold intelligent? Are plants intelligent?

Wildfires are a natural part of many ecosystems, though more and more are human-caused. Wendover Productions takes a look at how firefighters work to minimize the spread of wildfires in grueling and dangerous conditions.

Because of its ubiquity, the landscape is littered with proposed etymologies of the term OK. This nice explainer clarifies the murky origins of one of the most widely spoken words in the world.

Back in the old days of the 20th century, practicality was the biggest reason most people wore a watch. If you didnt have a clock face right on your wrist, how else would you know the time? Of course, in the age of smartphones and even smartwatches, the time is available virtually everywhere at any []

Its bad enough when regular food stuff gets stale after a couple days sitting on your kitchen counter. But when infused edibles start losing their freshnesswell, heck, edibles arent cheap! If youre going to do edibles, you may as well do them right, which means having the equipment to make sure your product remains both []

CBD-infused coffee almost sounds like the premise for a bad sitcom episode. But seriouslyisnt it almost comical to consider what happens when the go-go kick of high-octane caffeine slams headlong into the calming, tranquil effects of CBD? The reality is, it actually can be the best of both worlds situation for many CBD coffee fans. []

Here is the original post:
This simple explainer tackles the complexity of quantum computing - Boing Boing

Read More..

UK firm reaches final stages of the NIST quest for quantum-proof encryption algorithms – www.computing.co.uk

Post Quantum CEO Andersen Cheng

London-based encryption specialist Post Quantum has reached the final stage of the NIST competition to find practical encryption standards capable of withstanding attacks by a quantum computer.

The US National Institute of Standards and Technology (NIST) launched its competition for Public-Key Post-Quantum Cryptographic Algorithms, in 2016 with the aim of arriving at quantum-safe standards by 2024. Successful candidates will enhance or replace the three paradigms considered most vulnerable to quantum attack: the digital signature standard FIPS 186-4 and the public key cryptography standards NIST SP 800-56AandNIST SP 800-56B.

Many of the current encryption algorithms use one-way functions to derive encryption/decryption key pairs, for example factorising very large integers into primes. This method is used by the general purpose RSA algorithms that form the basis of the secure internet protocols SSL and TLS. Elliptic curve cryptography, often preferred in IoT and mobile devices, also uses a one-way mathematical function. Unfortunately both are vulnerable to attack by quantum computers.

Last year NIST whittled down the original 69 candidates to 26, and in a third round announced last week reduced this number to 15: seven finalists "most likely to be ready for standardisation soon after the end of the third round", and eight alternate candidates' "regarded as potential candidates for future standardisation". Candidates fall into three functional categories: Code-based, multivariate and lattice-based cryptography, which cover the variety of different use cases for which post quantum (PQ) encryption will be required. In addition, some candidates are suitable for public key exchange while others are better suited to digital signatures.

The only remaining candidate in the code-based category is Classic McEliece, which is a merger of Post Quantum's Never-The-Same Key Encapsulation Mechanism (NTS-KEM) and work done in the same area by a team led by Professor Daniel Bernstein of University of Illinois at Chicago. The joint candidate, known as Classic McEliece', is based on the McEliece cryptosystem first proposed in the 1970s.

It works by injecting random error codes into the cyphertext. The error correction codes allow the recipient of the encrypted message to cut out the random noise added to the message when decrypting it, a facility not available to any eavesdropper intercepting the message.

"Classic McEliece has a somewhat unusual performance profileit has a very large public key but the smallest ciphertexts of all competing KEMs [key-encapsulation mechanisms]. This is not a good fit for general use in internet protocols as they are currently specified, but in some applications, the very small ciphertext size could make Classic McEliece an appealing choice," NIST says, offering a possible use case as protecting VPNs.

Cheng said he was pleased to join forces with Bernstein's team, adding that the need for viable PQ encryption is urgent.

"The entire world needs to upgrade its encryption, and we last did that in 1978, when RSA came in. The stakes couldn't be higher with record levels of cyber-attack and heightened nation state activity - if China or Russia is the first to crack RSA then cyber Armageddon will begin," Cheng said.

"This isn't an academic exercise for us, we are already several years down the commercialisation path with real-world quantum-safe products for identity authentication and VPN. If you work for an organisation with intellectual property or critical data with a long shelf life, and you're working from home during lockdown, you should already be using a quantum-safe VPN."

Follow this link:
UK firm reaches final stages of the NIST quest for quantum-proof encryption algorithms - http://www.computing.co.uk

Read More..

Quantum reckoning: The day when computers will break cryptography – ITWeb

Roger Grimes

An age of unbelievably fast quantum computers is only a stones throw away, promising machines that will forever transform the way we solve problems, communicate and compute.

However, such powerful machines in the wrong hands could spell major trouble for the cyber security community, as many experts fear that quantum computers could also effectively break even the strongest encryption we have today.

So when can we expect to see these quantum machines in action? Theres a chance that it has already happened, by either the US NSA (National Security Agency) or China, but we dont publicly know about it yet," says Roger Grimes, Data-Driven Defence evangelist at KnowBe4, who will be speaking on Quantum reckoning: The coming day when quantum computers break cryptography at ITWeb Security Summit 2020, to be held as a virtual event from 25 to 28 August this year.

According to Grimes, if it hasnt happened already, many people believe it will happen within the next two years.

Speaking of how this quantum reckoning could impact information security, Grimes says any secret protected by traditional asymmetric ciphers will no longer be protected. This includes RSA, Diffie-Hellman, Elliptic Curve Cryptography which is used in HTTPS, TLS, WiFi, FIDO keys, PKI, digital certificates, digital signatures and banking networks. Essentially, it would impact about 95% of our digital world.

Its not all bad news, though. He says along with the dangers, quantum computing will bring us many wonderful inventions we cannot even begin to imagine right now, much as the Internet did, but on an even greater scale.

There is a glimmer of hope in that post-quantum cryptography, or cryptographic algorithms that are believed to be secure against an attack by a quantum computer, might save the day.

Grimes says its a race, but that dozens of good quantum-resistant cryptography standards are being tested right now and there are likely to be some good standards in place by the time the quantum reckoning becomes public and widespread.

But once the new cryptography standards are in place, how long will it take every person and company and the world to switch over to the new quantum-resistant standards? That is the real problem, he adds.

Delegates attending Grimes talk will learn exactly what it is they need to start doing now in order to prepare for the quantum reckoning.

See original here:
Quantum reckoning: The day when computers will break cryptography - ITWeb

Read More..

Looking Back on The First-Ever Photo of Quantum Entanglement – ScienceAlert

This stunning image captured last year by physicists at the University of Glasgow in Scotland is the first-ever photo of quantum entanglement - a phenomenon so strange, physicist Albert Einstein famously described it as 'spooky action at a distance'.

It might not look like much, but just stop and think about it for a second: this fuzzy grey image was the first time we'd seen the particle interaction that underpins the strange science of quantum mechanics and forms the basis of quantum computing.

Quantum entanglement occurs when two particles become inextricably linked, and whatever happens to one immediately affects the other, regardless of how far apart they are. Hence the 'spooky action at a distance' description.

This particular photo shows entanglement between two photons - two light particles. They're interacting and - for a brief moment - sharing physical states.

Paul-Antoine Moreau, first author of the paper wherein the image was unveiled back in July 2019, told the BBC the image was "an elegant demonstration of a fundamental property of nature".

To capture the incredible photo, Moreau and a team of physicists created a system that blasted out streams of entangled photons at what they described as 'non-conventional objects'.

The experiment actually involved capturing four images of the photons under four different phase transitions. You can see the full image below:

(Moreau et al., Science Advances, 2019)

What you're looking at here is actually a composite of multiple images of the photons as they go through a series of four phase transitions.

The physicists split the entangled photons up and ran one beam through a liquid crystal material known as -barium borate, triggering four phase transitions.

At the same time they captured photos of the entangled pair going through the same phase transitions, even though it hadn't passed through the liquid crystal.

You can see the setup below: The entangled beam of photons comes from the bottom left, one half of the entangled pair splits to the left and passes through the four phase filters. The others that go straight ahead didn't go through the filters, but underwent the same phase changes.

(Moreau et al., Science Advances, 2019)

The camera was able to capture images of these at the same time, showing that they'd both shifted the same way despite being split. In other words, they were entangled.

While Einstein made quantum entanglement famous, the late physicist John Stewart Bell helped define quantum entanglement and established a test known as 'Bell inequality'. Basically, if you can break Bell inequality, you can confirm true quantum entanglement.

"Here, we report an experiment demonstrating the violation of a Bell inequality within observed images," the team wrote in Science Advances.

"This result both opens the way to new quantum imaging schemes ... and suggests promise for quantum information schemes based on spatial variables."

The research was published in Science Advances.

A version of this article was first published in July 2019.

Read the original here:
Looking Back on The First-Ever Photo of Quantum Entanglement - ScienceAlert

Read More..

Ripple CTO: Quantum computers will be a threat to Bitcoin and XRP – Crypto News Flash

In a chapter of the Modern CTO podcast, Ripples CTO, David Schwartz, expressed concerns about the development of quantum computers. Ripples CTO believes this technology is a threat to the security of Bitcoin, XRP, and cryptocurrencies. This is primarily because the consensus algorithms behind cryptocurrencies rely on conventional cryptography, as Schwartz stated:

From the point of view of someone who is building systems based on conventional cryptography, quantum computing is a risk. We are not solving problems that need powerful computing like payments and liquidity the work that the computers do is not that incredibly complicated, but because it relies on conventional cryptography, very fast computers present a risk to the security model that we use inside the ledger.

Algorithms like SHA-2 and ECDSA (elliptic curve cryptography) are sort of esoteric things deep in the plumbing but if they were to fail, the whole system would collapse. The systems ability to say who owns Bitcoin or who owns XRP or whether or not a particular transaction is authorized would be compromised().

Ripples CTO said that Ripple is trying to prepare for the emergence of quantum computers. Therefore, they are determining when the algorithms mentioned will no longer be reliable. Ripples CTO estimates that in the next 8-10 years, quantum computers will begin to pose a threat, as Schwartz further stated:

I think we have at least eight years. I have very high confidence that its at least a decade before quantum computing presents a threat, but you never know when there could be a breakthrough. Im a cautious and concerned observer, I would say.

The other fear would be if some bad actor, some foreign government, secretly had quantum computing way ahead of whats known to the public. Depending on your threat model, you could also say what if the NSA has quantum computing. Are you worried about the NSA breaking your payment system?

Despite the above, Ripples CTO made an optimistic conclusion and stated that even if there is a malicious actor with this technology, he will not use it against the average person. Therefore, Schwartz believes that most users have nothing to worry about:

While some people might really be concerned it depends on your threat model, if youre just an average person or an average company, youre probably not going to be a victim of this lets say hypothetically some bad actor had quantum computing that was powerful enough to break things, theyre probably not going to go after you unless you are a target of that type of actor.

As soon as its clear that theres a problem, these systems will probably be frozen until they can be fixed or improved. So, most people dont have to worry about it.

View post:
Ripple CTO: Quantum computers will be a threat to Bitcoin and XRP - Crypto News Flash

Read More..

The 6 Biggest Technology Trends In Accounting And Finance – Forbes

The explosion in data that has launched the Fourth Industrial Revolution, an era when business will be transformed by cyber-physical systems, has enabled several technology trends to develop. Every business can leverage these important trends and should pay attention to how best to use them, but accountants should really evaluate how these six technologies can be used strategically to achieve the companys business strategy.

The 6 Biggest Technology Trends In Accounting and Finance

1.Big Data

Data is crucial to make business financial decisions. Today, data isn't just numbers and spreadsheets that accountants have been familiar with for years; it also includes unstructured data that can be analyzed through natural language processing. This can allow for real-time status monitoring of financial matters. Data is the fuel that powers other technology trends that are transforming finance and accounting in the Fourth Industrial Revolution. Even the audit process has been digitalized. In the financial realm, data produces valuable insights, drives results and creates a better experience for clients. Since everything leaves a digital footprint, the unprecedented digitalization of our world is creating opportunities to glean new insights from data that wasnt possible before. These insights help improve internal operations and build revenue.

2.Increased Computing Power

Just as it is for other companies, all the data created by our digitalized world would be useless or at least less powerful if it weren't for the advances in computing power. These changes allow accounting and finance departments and firms to store and use the data effectively. First, there are the cloud services from providers such as Amazon, Google, and Microsoft that provide scalable systems and software to leverage that can be accessed wherever and whenever it's needed. Edge computing has also grown. This is where the computing happens not in the cloud, but right where the data is collected. The adoption of 5G (fifth generation) cellular network technology will be the backbone of a smarter world. When quantum computing is fully adopted, it will be transformative in a way that cannot even be predicted at this point since it

will catapult our computing power exponentially. Quantum computers will be able to provide services and solve problems that werent possible with traditional computers. There will be tremendous value in the financial world for this capability.

3.Artificial Intelligence (AI)

Artificial intelligence can help accounting and finance professionals be more productive. AI algorithms allow machines to take over time-consuming, repetitive, and redundant tasks. Rather than just crunch numbers, with the support of AI, financial professionals will be able to spend more time delivering actionable insight. Machines can help reduce costs and errors by streamlining operations. The more finance professionals rely on AI to do what it does bestanalyze and process a tremendous amount of data and take care of monotonous tasksthe more time humans will recover to do what they do best. New technology has changed the expectations clients have when working with companies, and it's the same for accounting. AI helps accountants be more efficient.

4.Intelligence of Things

When the internet of things, the system of interconnected devices and machines, combines with artificial intelligence, the result is the intelligence of things. These items can communicate and operate without human intervention and offer many advantages for accounting systems and finance professionals. The intelligence of things helps finance professionals track ledgers, transactions, and other records in real-time. With the support of artificial intelligence, patterns can be identified, or issues can be resolved quickly. This continuous monitoring makes accounting activities such as audits much more streamlined and stress-free. In addition, the intelligence of things improves inventory tracking and management.

5.Autonomous Robots

Robots don't have to be physical entities. In accounting and finance, robotic process automation (RPA) can handle repetitive and time-consuming tasks such as document analysis and processing, which is abundant in any accounting department. Freed up from these mundane tasks, accountants are able to spend time on strategy and advisory work. Intelligent automation (IA) is capable of mimicking human interaction and can even understand inferred meaning in client communication and adapt to an activity based on historical data. In addition, drones and unmanned aerial vehicles can even be deployed on appraisals and the like.

6. Blockchain

The final tech trend that has significant implications for accounting and finance professionals that I wish to cover is blockchain. A distributed ledger or blockchain is a highly secure database. It's a way to securely store and accurately record data, which has broad applications in accounting and financial records. Blockchain enables smart contracts, protecting and transferring ownership of assets, verifying people's identities and credentials, and more. Once blockchain is widely adopted, and challenges around industry regulation are overcome, it will benefit businesses by reducing costs, increasing traceability, and enhancing security.

To learn more about these technology trends as well as other key trends that are shaping the 4th industrial revolution, you can take a look at my new book, Tech Trends in Practice: The 25 Technologies That Are Driving The 4th Industrial Revolution

Read more:
The 6 Biggest Technology Trends In Accounting And Finance - Forbes

Read More..

Could this software help users trust machine learning decisions? – C4ISRNet

WASHINGTON - New software developed by BAE Systems could help the Department of Defense build confidence in decisions and intelligence produced by machine learning algorithms, the company claims.

BAE Systems said it recently delivered its new MindfuL software program to the Defense Advanced Research Projects Agency in a July 14 announcement. Developed in collaboration with the Massachusetts Institute of Technologys Computer Science and Artificial Intelligence Laboratory, the software is designed to increase transparency in machine learning systemsartificial intelligence algorithms that learn and change over time as they are fed ever more databy auditing them to provide insights about how it reached its decisions.

The technology that underpins machine learning and artificial intelligence applications is rapidly advancing, and now its time to ensure these systems can be integrated, utilized, and ultimately trusted in the field, said Chris Eisenbies, product line director of the cmpanys Autonomy, Control, and Estimation group. The MindfuL system stores relevant data in order to compare the current environment to past experiences and deliver findings that are easy to understand.

While machine learning algorithms show promise for DoD systems, determining how much users can trust their output remains a challenge. Intelligence officials have repeatedly noted that analysts cannot rely on black box artificial intelligence systems that simply produce a decision or piece of intelligencethey need to understand how the system came to that decision and what unseen biases (in the training data or otherwise) might be influencing that decision.

MindfuL is designed to help address that gap by providing more context around those outputs. For instance, the company says its program will issue statements such as The machine learning system has navigated obstacles in sunny, dry environments 1,000 times and completed the task with greater than 99 percent accuracy under similar conditions; or The machine learning system has only navigated obstacles in rain 100 times with 80 percent accuracy in similar conditions; manual override recommended. Those types of statements can help users evaluate how much confidence they should place in any individual decision produced by the system.

This is the first release of the MindfuL software as part of a $5 million, three-year contract under DARPAs Competency-Aware Machine Learning (CAML) program. BAE Systems plans to demonstrate their software in both simulation and in prototype hardware later this year.

Continue reading here:
Could this software help users trust machine learning decisions? - C4ISRNet

Read More..

Top Five Data Privacy Issues that Artificial Intelligence and Machine Learning Startups Need to Know – insideBIGDATA

In this special guest feature, Joseph E. Mutschelknaus, a director in Sterne Kesslers Electronics Practice Group, addresses some of the top data privacy compliance issues that startups dealing with AI and ML applications face. Joseph prosecutes post-issuance proceedings and patent applications before the United States Patent & Trademark Office. He also assists with district court litigation and licensing issues. Based in Washington, D.C. and renown for more than four decades for dedication to the protection, transfer, and enforcement of intellectual property rights, Sterne, Kessler, Goldstein & Fox is one of the most highly regarded intellectual property specialty law firms in the world.

Last year, the Federal Trade Commission (FTC) hit both Facebook and Google with record fines relating to their handling of personal data. The California Consumer Privacy Act (CCPA), which is widely viewed the toughest privacy law in the U.S., came online this year. Nearly every U.S. state has its own data breach notification law. And the limits of the EUs General Data Protection Regulation (GDPR), which impacts companies around the world, are being tested in European courts.

For artificial intelligence (AI) startups, data is king. Data is needed to train machine learning algorithms, and in many cases is the key differentiator from competitors. Yet, personal data, that is, data relating to an individual, is also subject an increasing array of regulations.

As last years $5 billion fine on Facebook demonstrates, the penalties for noncompliance with privacy laws can be severe. In this article, I review the top five privacy compliance issues that every AI or machine learning startup needs to be aware of and have a plan to address.

1. Consider how and when data can be anonymized

Privacy laws are concerned with regulating personally identifiable information. If an individuals data can be anonymized, most of the privacy issues evaporate. That said, often the usefulness of data is premised on being able to identify the individual that it is associated with, or at least being able to correlate different data sets that are about the same individual.

Computer scientists may recognize a technique called a one-way hash as a way to anonymize data used to train machine learning algorithms. Hash operations work by converting data into a number in a manner such that the original data cannot be derived from the number alone. For example, if a data record has the name John Smith associated with it, a hash operation may to convert the name John Smith into a numerical form which is mathematically difficult or impossible to derive the individuals name. This anonymization technique is widely used, but is not foolproof. The European data protection authorities have released detailed guidance on how hashes can and cannot be used to anonymize data.

Another factor to consider is that many of these privacy regulations, including the GDPR, cover not just data where an individual is identified, but also data where an individual is identifiable. There is an inherent conflict here. Data scientists want a data set that is as rich as possible. Yet, the richer the data set is, the more likely an individual can be identified from it.

For example, The New York Times wrote an investigative piece on location data. Although the data was anonymized, the Times was able to identify the data record describing the movements of New York City Mayor Bill de Blasio, by simply cross-referencing the data with his known whereabouts at Gracie Mansion. This example illustrates the inherent limits to anonymization in dealing with privacy compliance.

2. What is needed in a compliant privacy policy

Realizing that anonymization may not be possible in the context of your business, the next step has to be in obtaining the consent of the data subjects. This can be tricky, particularly in cases where the underlying data is surreptitiously gathered.

Many companies rely on privacy policies as a way of getting data subjects consent to collect and process personal information. For this to be effective, the privacy policy must explicitly and particularly state how the data is to be used. Generally stating that the data may be used to train algorithms is usually insufficient. If your data scientists find a new use for the data youve collected, you must return to the data subjects and get them to agree to an updated privacy policy. The FTC regards a companys noncompliance with its own privacy policy as an unreasonable trade practice subject to investigation and possible penalty. This sort of noncompliance was the basis for the $5 billion fine assessed against Facebook last year.

3. How to provide a right to be forgotten

To comply with many of these regulations, including the GDPR and CCPA, you must provide not only a way for a data subject to refuse consent, but also a way to for a data subject to withdraw consent already given. This is sometimes called a right to erase or a right to be forgotten. In some cases, a company must provide a way for subjects to restrict uses of data, offering data subjects a menu of ways the company can and cannot use collected data.

In the context of machine learning, this can be very tricky. Some algorithms, once trained, are difficult to untrain. The ability to remove personal information has to be baked into the system design at the outset.

4. What processes and safeguards need to be in place to properly handle personal data

Privacy compliance attorneys need to be directly involved in the product design effort. In even big sophisticated companies, compliance issues usually arise when those responsible for privacy compliance arent aware of or dont understand the underlying technology.

The GDPR requires certain companies to designate data protection officers that are responsible for compliance. There also record-keeping and auditing obligations in many of these regulations.

5. How to ensure that data security practices are legally adequate

Having collected personal data, you are under an obligation to keep it secure. The FTC regularly brings enforcement actions against companies with unreasonably bad security practices and has detailed guidelines on what practices it considers appropriate.

In the event of a data breach does occur, you should immediately contact a lawyer. Every U.S. state has its own laws governing data breach notification and imposes different requirements in terms of notification and possibly remuneration.

Collecting personal data is essential part of many machine learning startups. Lack of a well-constructed compliance program can be an Achilles heel to any business plan. It is a recipe for an expensive lawsuit or government investigation that could be fatal to a young startup business. So, a comprehensive compliance program has to be an essential part of any AI/ML startups business plan.

Sign up for the free insideBIGDATAnewsletter.

Read the original post:
Top Five Data Privacy Issues that Artificial Intelligence and Machine Learning Startups Need to Know - insideBIGDATA

Read More..

COVID-19 Impacts: Machine Learning Market will Accelerate at a CAGR of about 39% through 2020-2024 | The Increasing Adoption of Cloud-based Offerings…

LONDON--(BUSINESS WIRE)--Technavio has been monitoring the machine learning market and it is poised to grow by $ 11.16 bn during 2020-2024, progressing at a CAGR of about 39% during the forecast period. The report offers an up-to-date analysis regarding the current market scenario, latest trends and drivers, and the overall market environment.

Technavio suggests three forecast scenarios (optimistic, probable, and pessimistic) considering the impact of COVID-19. Please Request Latest Free Sample Report on COVID-19 Impact

The market is fragmented, and the degree of fragmentation will accelerate during the forecast period. Alibaba Group Holding Ltd., Alphabet Inc., Amazon.com Inc., Cisco Systems Inc., Hewlett Packard Enterprise Development LP, International Business Machines Corp., Microsoft Corp., Salesforce.com Inc., SAP SE, and SAS Institute Inc. are some of the major market participants. To make the most of the opportunities, market vendors should focus more on the growth prospects in the fast-growing segments, while maintaining their positions in the slow-growing segments.

The increasing adoption of cloud-based offerings has been instrumental in driving the growth of the market. However, the shortage of skilled personnel might hamper market growth.

Machine learning market 2020-2024 : Segmentation

Machine learning market is segmented as below:

To learn more about the global trends impacting the future of market research, download a free sample: https://www.technavio.com/talk-to-us?report=IRTNTR40918

Machine learning market 2020-2024 : Scope

Technavio presents a detailed picture of the market by the way of study, synthesis, and summation of data from multiple sources. Our machine learning market report covers the following areas:

This study identifies the increasing use of machine learning in customer experience management as one of the prime reasons driving the machine learning market growth during the next few years.

Machine learning market 2020-2024 : Vendor Analysis

We provide a detailed analysis of around 25 vendors operating in the machine learning market, including some of the vendors such as Alibaba Group Holding Ltd., Alphabet Inc., Amazon.com Inc., Cisco Systems Inc., Hewlett Packard Enterprise Development LP, International Business Machines Corp., Microsoft Corp., Salesforce.com Inc., SAP SE, and SAS Institute Inc. Backed with competitive intelligence and benchmarking, our research reports on the machine learning market are designed to provide entry support, customer profile and M&As as well as go-to-market strategy support.

Register for a free trial today and gain instant access to 17,000+ market research reports.

Technavio's SUBSCRIPTION platform

Machine learning market 2020-2024 : Key Highlights

Table Of Contents :

Executive Summary

Market Landscape

Market Sizing

Five Forces Analysis

Market Segmentation by End-user

Customer Landscape

Geographic Landscape

Drivers, Challenges, and Trends

Vendor Landscape

Vendor Analysis

Appendix

About Us

Technavio is a leading global technology research and advisory company. Their research and analysis focuses on emerging market trends and provides actionable insights to help businesses identify market opportunities and develop effective strategies to optimize their market positions. With over 500 specialized analysts, Technavios report library consists of more than 17,000 reports and counting, covering 800 technologies, spanning across 50 countries. Their client base consists of enterprises of all sizes, including more than 100 Fortune 500 companies. This growing client base relies on Technavios comprehensive coverage, extensive research, and actionable market insights to identify opportunities in existing and potential markets and assess their competitive positions within changing market scenarios.

Link:
COVID-19 Impacts: Machine Learning Market will Accelerate at a CAGR of about 39% through 2020-2024 | The Increasing Adoption of Cloud-based Offerings...

Read More..

What the Tech? Check Your Internet Security When Working from Home – Alabama News Network

Posted: Jul 23, 2020 12:41 PM CDT

by Alabama News Network Staff

Twitter is now explaining what happened last week when dozens of high profile Twitter users were hacked, sending tweets asking for money.

In a blog post Twitter said it believes the attackers used a social engineering scheme to trick some of its employees to divulgeconfidential information.

The Twitter accounts of Barack Obama, Joe Biden, Warren Buffett, Elon Musk and several others suddenly sent out a tweet, announcing they would be doubling the amount of money followers submitted to a Bitcoin locker. The tweets read the offer was good for only 30 minutes.

The hackers managed to scam followers out of more than $120,000.

As you may know, Twitter announced it is allowing employees to work from home for the rest of the year. It is not known if the employees who were tricked into giving out the information were working from home at the time but some cyber-security experts believe this type of scam is more likely to be successful if employees are not in the office.

Because people are working from home, they have their work laptops at home, especially for people working at companies where there isnt this remote work culture, said Alex Guirakhoo, the leader on the research team at Digital Shadows.

They dont typically allow for remote work and have had to adapt to this new culture of everyone being available to work from home. So people may not have that security culture awareness and they might be accessing personal accounts on their work machines, which they probably shouldnt be, he said.

Email phishing attacks are on the upswing. From the end of February through March, the tech security firm Barracuda Network showed phishing attacks jumped by 667% (according to TechRepublic).

Email phishing typically involves emails to people, in this case employees, with a link that installs malware on the computer. Another frequent method is to pose as a coworker or supervisor and simply ask someone to provide information or access to data.

What can you do as an employee to protect your company? Ask. It isnt as simple as when you were in the office and you could lean over to the person at the next desk and ask about an upcoming meeting, or check with a supervisor face-to-face before divulging information or access. If you are working from home and you get a suspicious email you didnt expect was coming, call the office to double-check.

If you are working from your companys laptop at home or remotely, refrain from conducting any personal business, web browsing, email or social media and do that from a personal computer or mobile device.

Read more here:
What the Tech? Check Your Internet Security When Working from Home - Alabama News Network

Read More..