Page 3,466«..1020..3,4653,4663,4673,468..3,4803,490..»

Commvault integrates Hedvig with HyperScale X appliance Blocks and Files – Blocks and Files

Commvault has rejigged its product lines to better match market needs. The company has separated components for data protection, disaster recovery and data management tasks, and has integrated Hedvig software into HyperScale backup appliances.

Commvault announced the portfolio reshuffle yesterday at its Future Ready customer conference. The company has also rolled out subscription pricing to more products, while confirming ongoing support for perpetual licensing options.

Commvault chief product officer Rajiv Kottomtharayil provided an announcement quote: Customers need to be increasingly agile, flexible, and scalable. This new portfolio addresses data management risks that exist today and that may exist tomorrow, intelligently. From a natural disaster, to human error, to ransomware, our customers are covered.

Coming out of 2019, Commvault had six product lines: Commvault Complete Backup & Recovery, Commvault HyperScale, Commvault Orchestrate, Commvault Activate, Hedvigs Distributed Storage Platform (DSP) and Metallic (SaaS backup and recovery service).

The new line-up is:

Commvault launched HyperScale appliances in 2017 to provide scale-out backup and recovery for containers, virtual and database workloads. The appliances supports on-premises deployments and multiple public clouds, with data movement between these locations.

HyperScale provides up to 5PB of capacity, automatic load balancing across nodes, data caching, cataloguing, automatic rebalancing of stored data across nodes, and integrated copy data management.

The new HyperScale X, available today, brings Hedvigs DSP file system software to the appliance for the first time, adding higher performance backup and recovery as the system scales. Concurrent hardware failures are managed to maintain availability.

Commvaults standalone Backup & Recovery protects containers, cloud-native, and virtual server workloads across cloud and on-premises environments. A separate Disaster Recovery product supports on-premises and cloud environments with automated DR orchestration, replication, and verified recovery readiness.

A Complete Data Protection offering combines Backup & Recovery and Disaster Recovery.

Commvault announced Activate in July 2018, in a product simplification exercise prompted by prodding from activist investor Elliott Management. The software is now disaggregated into separate data Governance, eDiscovery and compliance, and file storage optimisation products.

Hedvigs DSP software, acquired last year, gets more container support. Hedvig introduced Kubernetes Container Storage Interface (CSI) support in October 2019 and with Hedvig for Containers has added:

Avinash Lakshman, chief storage strategist for Commvault, said in a statement: Cloud native applications are critical to the enterprise, and Hedvig for Containers hits that sweet spot of software-defined storage coupled with protection for containerised applications.

Hedvig for Containers is available today.

Commvault is in a data protection and storage marathon. The company competes intensely with Actifio, Cohesity, Dell, IBM, Rubrik, Veeam and Veritas for enterprise data protection and management accounts. Also, ambitious backup-as-a-service startups such as Clumio and Druva are muscling in to this territory.

Commvault has rearranged its shop window to better show its wares. Its also moved to take advantage of its Hedvig software-defined software by adding it to the HyperScale appliance line. Hedvigs latest updates should enhance the softwares appeal to enterprise DevOps cloud native users.

Commvault is claiming a stake in the general storage market with Hedvig Distributed Storage Platform providing file, block and object storage at cloud scale. This general storage market also features intense competition from new and established suppliers and the idea of a combined file, block and object storage product is not universally adopted.

Commvault can use Hedvig software in its own appliances, but it will be quite the challenge to gain wide traction in the general storage market. There are good growth prospects for the emerging stateful container market and Commvault is building a strong story here. However, the mainstream storage suppliers are not so far behind.

More here:
Commvault integrates Hedvig with HyperScale X appliance Blocks and Files - Blocks and Files

Read More..

IPVanish July sale: three months of VPN cover for the price of one with this deal – Tom’s Guide UK

US-based VPN stalwart IPVanish is well-known as one of the go-to providers for those who want to maintain true internet privacy. And now its offering a cracking deal on a short-term plan three months for the price of one, which works out at just $3.99 a month.

This comes not long after IPVanish also announced that it had lifted its ten-device limit to allow unlimited connections, meaning that for less than $4 a month you can cover pretty much every device in your household whether they belong to you or not.

However, if you want to bag this deal youll have to grab it soon, as the July sale ends exactly when youd expect it to at the end of July. So, for just seven days, youve got the chance to save 67% on a low-commitment, great-value VPN deal.

IPVanish VPN & SugarSync cloud storage | three months for the price of one | $11.99Save 67% New subscribers to IPVanish can bag a great deal this July by claiming three months for the price of one. That's just $3.99 a month the VPN's cheapest option. If you're not satisfied with the service you're covered by a 30-day money-back guarantee, and all you need to do is head over to the site to save big on a short contract.View Deal

A staple of our best VPN guide and regularly featuring in our other VPN countdowns, IPVanish is a tried and trusted VPN provider. It has apps for a huge range of devices, from Windows PCs and Macs to Android devices and iPhones, right down to you Amazon Fire TV or your router.

Also, IPVanish has long been partnered with secure cloud storage provider SygarSync, and every plan comes with a complementary 250Gb of storage. In fact, paying for IPVanish is actually cheaper than signing up to SugarSync on its own, so if youre looking for a safe repository for your sensitive files, you can kill two birds with one stone here.

If youre looking for the very best service on the market, wed recommend ExpressVPN. While its more expensive at $6.67 a month, the whole experience is a little more polished and its an excellent way to access blocked streaming services. If saving money is more important to you, Surfshark is an up-and-comer which offers a two-year plan for less than $2 a month.

However, if youre after a short plan whether youre going on holiday or just hate being tied to a provider for years this IPVanish deal offers serious value for money and a ton of flexibility. But remember, the sale ends July 31, so you might have to act quickly.

Compare the best overall VPN services spec-by-spec:

Everything - the #1 best VPN

Balance of options and ease of use

Torrenting and P2P traffic

Read more:
IPVanish July sale: three months of VPN cover for the price of one with this deal - Tom's Guide UK

Read More..

Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc – Security Boulevard

Cloud migration, obviously, is here to stay.

Related: Threat actors add human touch to hacks

To be sure, enterprises continue to rely heavily on their legacy, on-premises datacenters. But theres no doubt that the exodus to a much greater dependency on hybrid cloud and multi-cloud resources Infrastructure-as-a-Service (IaaS) and Platforms-as-a-Service (PaaS) is in full swing.

Now comes an extensive global survey from Sophos, a leader in next generation cybersecurity, that vividly illustrates how cybercriminals are taking full advantage. For its State of Cloud Security 2020 survey, Sophos commissioned the polling of some 3,500 IT managers across 26 countries in Europe, the Americas, Asia Pacific, the Middle East, and Africa. The respondents were from organizations that currently host data and workloads in the public cloud.

Sophos found that fully 70% of organizations experienced a public cloud security incident in the last year. Furthermore, 50% encountered ransomware and other malware; 29% reported incidents of data getting exposed; 25% had accounts compromised; and 17% dealt with incidents of crypto-jacking. The poll also showed that organizations running multi-cloud environments were 50% more likely to suffer a cloud security incident than those running a single cloud.

Those findings were eye-opening, yes. But they were not at all surprising. Digital commerce from day one has revolved around companies bulling forward to take full advantage of wondrous decentralized, anonymous characteristics of the Internet, which began a military-academic experiment.

Corporations became obsessed with squeezing productivity out of an intrinsically insecure construct and threat actors became expert at quickly pouncing on fresh attack vectors opened up by this obsession. And now we have that same pattern playing out, once more, with cloud migration.

Deeper implications

Last Watchdog had the chance to drill down on the deeper implications of Sophos cloud security findings, as well as its recent report The State of Ransomware 2020

with two of its top experts, Paul Murray, senior director of product management in Sophos Public Cloud Security Group, and John Shier, senior security advisor. Here are excerpts of our discussion, edited for clarity and length:

LW: Can you frame how threat actors view the current trajectory of cloud migration?

Murray: In the eyes of the adversary, cloud migration brings their targets one step closer, introducing the potential for them to search for and target a larger and more dispersed attack surface area over the Internet. Organizations are typically very aware of physical security measures. However, in the transition to the cloud, the management plane itself is now accessible from anywhere, and organizations need to ensure their configurations are implemented securely in order to prevent discovery by attackers.

LW: So what are cyber criminals focusing on at the moment?

Murray: Attackers are going after the low hanging fruit. New cloud PaaS services, such as shared storage, containers, database services and serverless functions etc. typically cannot have a security agent running on them, so its left up to the organization to securely configure these services.

You wont have to look far to find stories of Amazon S3-related data breaches caused by misconfiguration, where S3 security settings were set to Public. AWS has even released an update to help customers from running afoul of this, one of the biggest causes of cloud data breaches. And shared storage breaches are by no means limited to Amazon customers.

LW: Isnt it more than just taking advantage of low hanging fruit?

Murray: Yes, attackers are moving to more sophisticated attacks, as well. As part of Living off the Land (LOTL) attacks, attackers are automating searches to exploit vulnerabilities in virtual machines. They can exploit cloud provider metadata services, for instance, to access temporary identity and access management (IAM)credentials. This enables them to footprint the customer environment. From there they can gain access to central storage, amongst other things, and finally proceeded to exfiltrate data.

We recently released an article about a malware we dubbed Cloud Snooper. This is a rootkit that establishes an APT-like command-and-control client on a machine . . . In essence it makes the command-and-control traffic look like benign traffic.

LW: Your cloud security report shows how misconfigurations can translate into a major exposure. How so?

Murray: Reading about the thousands of cases out there, youd be forgiven for thinking that attackers are only after an organizations sensitive data in these attacks. In addition to financial data and personal information, one of the main uses of cloud storage accounts like Amazon S3 buckets is to host static website content like HTML files, JavaScript and Cascading Style Sheets (CSS.) Attacks targeting these resources arent targeting exposed data. Instead, they look to maliciously modify website files; this is being done in order to steal the website visitors financial information.

Murray

Both attack chains look the same at the start, with attackers scanning the Internet for misconfigured S3 buckets, using automated S3 scanners. But this is where the attack paths diverge. In your typical S3 data breach, attackers will list and sync the valuable contents to a local disk and then access all the data that was misconfigured in public mode.

In the case of a data modification attack, once access is gained, attackers look for JavaScript content and modify it to include malicious code. Now, when a user visits the infected website, the malicious JavaScript code loads, logging all credit and debit card details entered onto payment forms. This data is then sent to the criminals server.

LW: How much of these new attack vectors stem from high-velocity software development involving microservices assembled in containers?

Murray: DevOps is the great enabler. The challenge for many organizations is that the DevOps process will be employed to automate the build of this infrastructure. Security teams must therefore enable developers to secure their automated process with tools this way security enables digital transformation, rather than holding it back, or, worse still, cause security measures to be worked around in order to maintain agility.

LW: Whats a concrete example of a pervasive exposure opened up by cloud migration?

Murray: We used our cloud security posture management tool, called Sophos Cloud Optix, to learn that two of the most widespread exposure points come from organizations exposing Remote Desk Protocol (RDP) and Secure Shell protocol (SSH.) Cybercriminals are actively searching for these entry points through automated searches. These protocols need to be accounted for.

Organizations need to secure virtual private cloud (VPC) traffic, as well. We all want a simple, sure-fire route to ensure we dont accidentally make a private subnet public. The challenge its been all too easy to do just that, with route tables in a VPC that can only be associated with subnets, and no simple way to specify routing rules to direct traffic to subnets through a firewall when entering VPCs.

LW: Your cloud security report shows a high level of awareness of these exposures 96% concerned yet an apparent low level of corporate will to do something about low staffing levels. How do you explain that?

Murray: Almost half of survey respondents didnt fully understand their responsibilities for securing cloud environments. The problem is in all of the gray areas, where the responsibility is quite literally shared. The platform vendors want to communicate that while they will provide the tools, such as security groups and IAM tools, the subscriber is responsible for implementing them correctly.

Its the same thing as buying a firewall and only adding any-to-any rules. That sounds good in theory, but in practice it means that for a lot of the security provided by the platform, the ultimate responsibility is still with the customer. But just enabling something doesnt make it secure. In order to properly secure a cloud environment, you need a good design and clear use case so you can wield the platform tools effectively and extend them with third party services where needed.

LW: Shifting gears a bit, whats going on with ransomware? Your recent white paper shows its still at as high a level as in 2017? Why so?

Shier: The most significant shift in the ransomware landscape is the switch from a strictly opportunistic model to a more targeted one, and from individuals to businesses. While individuals are still being victimized, the most active ransomware gangs are laser-focused on breaching organizations.

Shier

Less skilled attackers, those focused on infecting individuals, have largely been pushed out of the market, driven by better protection and higher awareness, in favor of more capable professional gangs. This has meant a lower overall incidence of ransomware infections but with increased impact to victims.

LW: What do ransomware attack pattern across the globe look like today?

Shier: Attackers are choosing their targets more deliberately. These gangs still employ some opportunistic methods for target discovery. This includes using scanners to discover unpatched machines or exposed services (i.e. Remote Desktop Services) and the use of automated tools to gain brute-force access to said services. But once inside a network, the humans take over.

Some gangs have also resorted to shaming companies on social media in an effort to increase the likelihood of payment, leaking sensitive information if the victims dont pay, or even urging the employees of victim organizations to put pressure on their IT departments to pay the ransom. Weve also seen the higher end attackers continue to develop and improve their payloads in order to evade detection and increase the rate of successful infections.

LW: GDPR has been in effect for two years now, and your reports show that Europes tougher data protection laws appear to be contributing to a reduced rate of ransomware in the EU? How so?

Shier: Compliance with GDPR has provided an incentive for some companies to do the bare minimum. For example, this could be adding protection to servers where it might have been absent in the past, or implementing multi-factor authentication for all your externally facing accounts and services.

In other cases, encrypting your backups, a good practice from a data protection perspective, has also meant they were useless to criminals as additional extortion pressure. When companies build better security foundations it puts much of the proverbial low hanging fruit out of reach to cybercriminals.

GDPR compliance also requires better visibility into your assets and data. Today, more often than not, ransomware is the last stage acting as a distraction in an attack whose main motivation is data theft. This added visibility provides companies with a chance to spot the initial stages of any attack much sooner.

LW: Your reports show that the U.S. has done well, too. What impact has rising regulation played? Im referring to the New York Department of Financial Services certification rules; and also Californias Consumer Privacy Act and the Department of Defenses Cybersecurity Maturity Model Certification.

Shier: The increased adoption of next-gen security technologies, as well as, regulatory pressure has contributed to better resilience against ransomware attacks. This is true of the U.S. and other regions as well. This is offset, however, by widespread abuse of stolen credentials, lack of ubiquitous multi-factor authentication, too many exposed and vulnerable services, and careless user behavior.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.

(LW provides consulting services to the vendors we cover.)

Recent Articles By Author

*** This is a Security Bloggers Network syndicated blog from The Last Watchdog authored by bacohido. Read the original post at: https://www.lastwatchdog.com/qa-sophos-poll-shows-how-attackers-are-taking-advantage-of-cloud-migration-to-wreak-havoc/

See the original post:
Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc - Security Boulevard

Read More..

Life After COVID 19: E-Discovery Considerations for Attorneys and Clients – JD Supra

Life around the world has significantly changed in the last three months. From job losses, homeschooling, and working from home, daily life is not the same as it was in February. The world of E-Discovery has not been immune. Law firms and service providers have been forced to adapt to a quickly changing environment. Here in North Carolina, our governor issued a statewide stay at home order effective on March 30. However, most of the people heeded the advice of firm management and began working from home several weeks earlier.

Since that time we have seen a flood of articles and news reports about how people are adjusting to using video conferencing and collaboration tools such as WebEx, Zoom, Skype, and Google Docs. These tools enable us to maintain invaluable connections with our colleagues and clients, but they also have an effect on discovery we might not have previously considered. From an E-Discovery perspective, the use of these remote working tools creates new data sources for preservation and collection. Diligent attorneys and clients would be wise to consider and discuss how these tools might impact the phases of E-Discovery moving forward. Below is a list of considerations to help get the conversation started.

Most workplaces probably have some type of work from home or telework policy. However, even the savviest employers likely did not foresee the world as we knew it coming to a screeching halt. I presume that these policies most likely pertain only to requests to work remotely versus in the office. As counsel, we should engage our clients in a discussion about whether their current policies sufficiently address the use of technology while working from home. For example, employers should consider which technology platforms are currently authorized and which are being utilized by the employees, such videoconferencing tools. Employers should consider whether to limit (or eliminate altogether) the use of unauthorized platforms. If an employer decides to limit the use of certain platforms for safety, privacy or other reasons, that message should be effectively communicated to the employees.

As stated above, an employer should inquire of its employees what tools they use and then consider the privacy and security implications of each. A work from home policy should identify which tools may be used for work purposes and which may not (since work inevitably includes handling private and protected information). While some employees may have already had access to their entire work environments on mobile devices or home computers, other employees may not. Employers may now be paying for or subsidizing mobile devices for employees that were solely personal prior to the pandemic. Employers will need to closely examine their BYOD policies and consider whether revisions to the policies are warranted. Enforcement of policies related to mobile device usage is more straightforward with employer-provided devices, but more difficult if employees use their own devices for remote work. For more information on BYOD policies, clickherefor an extremely informative article from my colleague Russ Beets on the advantages and drawbacks of a BYOD policy.

The remote work policy should reiterate that employees should continue to save all documents and information to a centralized, secure location, whether that location is on the organizations network or other centralized document management system. If employees regularly and consistently save documents to a centralized location, this lessens the need for the preservation and collection of data from employees' devices. While working remotely, employees should regularly be reminded to save documents to centralized, secure locations.

Employers may also need to remind employees that communication via a direct messaging platform utilized by the employer may be a more favorable means of communication over other nonstandard or non-enterprise communications such as text messages, etc. These direct messages are likely already addressed in an organizations data retention policy and, depending on an organizations storage capabilities, may be stored and preserved in a central location.

I suspect that most policies are broad enough to cover these tools, but organizations should review their data retention policies and determine whether the data generated by these remote working tools is adequately addressed. If it is not, the policy will likely need to be updated. In some cases, an organization may need to provide additional training to its internal IT team to ensure they will be able to preserve and collect the data generated should the need arise. The IT team should consider how the tool generates, organizes, indexes and saves data.

When it comes time to identify, preserve and collect data that might be relevant in a dispute, most litigation attorneys and E-Discovery professionals already have a few items in their toolbox to navigate this new world of remote work. The most important tool is the custodian questionnaire. You will need to know how the custodian was communicating and collaborating while working remotely. An existing custodian questionnaire may need to be revised to take into account the use of remote working tools, such as video conferencing and collaboration platforms that may have been utilized by the custodian. The custodian questionnaire should also consider whether the custodian generated any paper documents and the location of those paper documents to ensure they are also properly preserved.

In-person data collections are seemingly a thing of the past. Before COVID, while we conducted remote collections when it was necessary to do so, we preferred in-person collections because we found sitting face to face with an often anxious custodian to be the most effective means of garnering their trust and successfully drilling down to the heart of where relevant data is stored. In todays climate, however, almost all data collections are conducted remotely by accessing an individual employees computer, mobile device or cloud storage location, or an organizations network. Conducting collections from a distance comes with its own challenges, such as scheduling time to meet with custodians who are also trying to work from home, accessing various data sources, loading collection software and keeping a custodians attention. Thankfully, the remote collection tools and workflows we have used in the past are still ripe for todays new world and people are learning how to manage their time and space. With employer and state travel restrictions in place, as well as restrictive stay at home orders, we are actually learning how to successfully connect with our clients and custodians from afar. I believe that this is a lasting change and the majority of collections after the pandemic ends will be performed remotely.

Clients will almost inevitably have questions and concerns about safeguarding their private and confidential data during a remote document review. Truthfully, a remote document review comes with security challenges, simply because we cannot know with 100% certainty where the review is performed or who may have access to view an attorneys computer screen or who may have access to review protocols and case memos. However, a remote document review can be performed safely if certain precautions are taken.

The most secure means of performing a remote document review is to require contract reviewers to use a VPN tunnel or other type of secure portal when accessing the review platform. If a VPN tunnel or secure portal is not an option, two-factor authentication should be implemented for any person remotely accessing the review platform that is not connected via a VPN or secure portal. In addition, document review contract attorneys should be required to follow any remote document review policy in place by the law firm or vendor, such as:

Because contractors are remote, it is even more important that they attend regularly scheduled (even daily) meetings about ongoing reviews to discuss any issues that arise. Similarly, contractors should provide daily reports that provide an overview of the documents they reviewed and any hot documents they encountered. It will also be important to track review rates, including documents viewed and edited per hour, and then discuss how to address outliers.

When daily life has reached some type of stability and we have all adjusted to the new normal, companies will need to determine if their work environment has substantially changed, how long the change may last, and whether their internal policies need to be adjusted. Hopefully, this time comes soon and without additional disruption. Who knows maybe this will lead to more telework, more time with families, and a better quality of life.

Read more here:
Life After COVID 19: E-Discovery Considerations for Attorneys and Clients - JD Supra

Read More..

Alisa Melekhina on her Chess Origins and A Capablanca Gem [VIDEO] – uschess.org

In our latest edition of "Class is In Session", FM and Reality Check Author Alisa Melekhina gave a stirring lecture to over 90 girls on her origin story, from learning chess as a young girl to balancing chess with dance and academics. She also showed a Capablanca gem, his 1919 win over William Winter.

Alisa also showed some bonus photos during our live class, which she provided for CLO too.

Image

Image

Next up for our Girls Club Zoom is WGM Katerina Nemcova, who will talk about Forcing Moves. Sign up here.The class is geared toward girls rated approximately 1000-1700, but girls outside that range often enjoy the content too. It is free to US Chess members.

Image

Find our full class in session playlist here and contact jshahade@uschess.org to get on the Girls Club list, and/or our teen section. Listen to Alisa on Ladies Knight here.

Go here to read the rest:
Alisa Melekhina on her Chess Origins and A Capablanca Gem [VIDEO] - uschess.org

Read More..

19 science-backed ways to reduce your risk of Alzheimer’s disease, from reading to playing chess – Insider – INSIDER

Alzheimer's disease is one of the most mysterious and tragic diseases, and scientists are still grappling to understand what causes it, and how to avoid it.

But a new review of Alzheimer's research has identified 10 suggestions backed by "strong evidence" that could reduce your risk for the disease, including reading, and avoiding stress and trauma.

The paper,published today in the Journal of Neurology, Neurosurgery & Psychiatry, listed another nine tips backed by "weaker" evidence, including getting sufficient sleep and working out.

In the most comprehensive meta-analysis of Alzheimer's research to date, the researchers in China analyzed 395 previous studies, including randomized controlled trials (the gold standard of scientific research) and observational studies.

"Over time, there will be more evidence," Lei Feng, a co-author of the study, told Insider. "This is the best evidence we have now for prevention. We cannot wait until we have the perfect solutions."

Here is a run-down of the preventative measures Feng and the team identified, and why they could be effective:

Exercising your brain is one strong strategy for reducing your risk of developing Alzheimer's.

Mentally stimulating activities such as reading, playing chess and doing puzzles help preserve brain structures and cognitive functions that are implicated in dementia.

Additionally, the review found that people who received a strong formal education early in life had a lower risk of developing Alzheimer's. Although your own early education is out of your control, parents can consider their children's schooling as an investment for their brain health later in life.

The review recommends physical activity and healthy eating behaviors in order to achieve a BMI in the 18.5 to 24.9 range, which is considered normal weight. You can calculate your BMI here.

Adults aged 65 and over should make sure they are not underweight and closely monitor any unhealthy weight loss, which can be an early predictor of Alzheimer's disease.

While some supplements and diets have been advertised to promote brain health, these claims are not necessarily backed by scientific evidence.

The review considered studies of vitamin C, and found it might help reduce your risk of Alzheimer's but is not as strong as other interventions.

More important are your homocysteine levels. High homocysteine is a risk factor for both Alzheimer's and heart disease, and it can be treated with vitamin B and folic acid supplements.

You've heard this advice before, but getting sleep and not smoking can seriously improve the overall quality of your health.

Getting sufficient, high quality sleep was found to decrease the risk of Alzheimer's disease, while smoking tobacco increases that risk.

Yielding these common public health recommendations is also helpful for decreasing your risk of other preventable diseases that could further harm your brain health.

Head trauma was among the 10 strongest suggestions to reduce Alzheimer's risk.

That means taking seriously concussions, head collisions in contact sport, and falling or slipping.

Staying physically healthy can affect your brain health, so it's no surprise that preventable health conditions such as diabetes and cardiovascular disease were associated with high Alzheimer's risk.

Blood pressure is also considered a risk factor depending on age. Adults younger than 65 should avoid high blood pressure. Older adults with orthostatic hypotension (or, low blood pressure), or who have suffered a stroke, should be monitored for cognitive decline.

"The brain health behaviors and heart health behaviors that reduce the risk of getting high blood pressure or obesity in the first place are behaviors that people should do earlier in life in order to reduce these comorbidities," Seth Gale, a behavioral neurologist at Brigham and Women's Hospital in Boston, who was not involved in the study, told Insider.

Stress and depression were both found to be strong risk factors for Alzheimer's.

They point to the importance of understand the impact your mental health can have on your physical health.

Whether you experience stress and depression may be out of your control, but you can try to mitigate their effects with mindfulness practices such as guided meditation or by seeking professional help.

Read more:

15 common misconceptions and surprising realities about dementia and Alzheimer's disease

Alzheimer's could be caused by bad oral hygiene, according to new research

Read this article:
19 science-backed ways to reduce your risk of Alzheimer's disease, from reading to playing chess - Insider - INSIDER

Read More..

Nepal The Latest Pawn In the India-China Territorial Chess Game – The Taiwan Times

New Delhi: There are no commas or full-stops in Chinas march to become the third-world Messiah.

It is now forcing compliance to its wicked diktat on its economically weak neighbour Nepal and is inciting it against India as part of its vengeance.

Nepal has very little courage or even the ability to defend itself against China, and for a long time the cordial relations between India and Nepal has been an open-sore for China as it looks for opportunities to hammer a crack in the bedrock of said relationship.

Recent remarks by Nepalese Prime Minister K.P. Sharma Oli (16th July), however, did the trick with the prime minister saying that the holy city of Ayodhya was actually a part of Birgunj in Nepal (and not in the Indian state of Uttar Pradesh).

This soon after led to tonsuring of a (yet to be identified) male, reported to have been of Nepalese origin and a protest note lodged by New Delhi.

A video of the tonsured individual in the Indian city of Varanasi in the State of Uttar Pradesh, had gone viral on the Internet.

The Varanasi police spurred the investigations after Nepals envoy in New Delhi, Nilambar Acharya, in a telephone conversation with Uttar Pradesh Chief Minister Yogi Adityanath called for a thorough probe into the tonsuring incident ,and expressed concern over the safety of Nepalese living in India.

Talking to The Taiwan Times, a police superintendent in Varanasi, Vikas Chandra Tripathi, said the tonsured person had not been traced as yet, although four people including a videographer are already in police custody.

When asked if there was any threat to Nepalese staying in the city, he said, no, not at all and by July 21st, we expect to net the person who brought the man for tonsuring.

China was reportedly anticipating a significant rift between India against Nepal over the incident, but it did not happen.

India, meanwhile adopted a wait and watch policy, as it had already reacted strongly when Nepal put out its map placing the three territories of Limpiyadhura, Kalapani and the Lipulekh Pass under its own flag.

Particularly so vis-a-vis the role of China, as a potential behind the scenes operator in Nepal.

Nepal has been on its knees after it accepted Chinas proposal to make the Mandarin language compulsory in schools in exchange for payment of salaries to teachers.

Political analysts see the move as a ploy to push a hidden Chinese agenda of manipulating the Himalayan kingdom against India in the long term, while pushing the Xi Jinping thought doctrine.

It is interesting to note that India is funding over 100 million Nepalese Rupees for three new school buildings at present, with a Memorandum of Understanding to this effect signed in March between the Embassy of India, and Nepals Ministry of Federal Affairs and General Administration.

Nepal is thus in a Catch-22 situation.

It cannot wriggle out from the clutches of the overbearing dragon in the neighborhood, and any confrontation or protest will immediately remind Kathmandu of the result of the 1989 Tiananmen square massacre.

While most Nepalese are content with condemning the administration of Prime Minister Oli, others are already in the mood to stage a sit-in against him.

South of the border, Indians have unleashed their anger against the Nepalese PM on social media, calling him names and creating memes for him but at the same time refraining from taking to the streets in the knowledge that this would be playing directly into the hands of China.

Excerpt from:
Nepal The Latest Pawn In the India-China Territorial Chess Game - The Taiwan Times

Read More..

The $4m Chess Set with 513 carats of Diamonds, Pearls and Sapphire – IDEX Online

July 21, 20by John Jeffay

(IDEX Online) - An Australian goldsmith has crafted the world's most expensive chess set, costing $4m.

The pieces are made of 18k white gold, adorned with a total of 513 carats of fine white diamonds, South Sea pearls and AAA Ceylon Blue sapphires.

Colin Burn's Pearl Royale chess pieces replicate those from the standard 1849 Staunton set found in millions of homes, made originally from boxwood and ebony.

But his dazzling take on their classic design comes as a limited edition of just three.

The kings, for example, are made of 162 grams of solid white 18k gold and include 33.974 carats of diamonds and 2.775 carats of sapphire (full specification below).

Colin has one set on permanent display, by appointment only, at the ACCA Gallery, in Beverly Hills, California, USA.

"I wanted to create the most beautiful chess set" he said. "With the world's most beautiful diamonds and rich blue sapphires fit for a king and queen.

"My dream was to create the world's finest chess set for the world's greatest players to do battle."

Specifications (Single Piece) Kings

Gold: Approximately 162 Grams 18k Solid White Gold - Rhodium Coated.

South Sea Pearls: 1 x 16 mm Round, Australian Silver White, Excellent, Clean. 1 x 16 mm Round, Tahitian Peacock Black, Excellent, Clean.

Ceylon Blue Sapphires: 40 x 2 mm Princess Cut AAA, 8 x 1.5 mm Brilliant Cut AAA, 1 x 6x4 mm Pear Cut AAA.

Fine White Diamonds: 20 x 4x2 Baguette Cut IF/D, 1 x 5 mm Princess Cut IF/D, 22 x 3.5 mm Princess Cut IF/D, 20 x 4 mm Brilliant Cut IF/D, 1 x 3 mm Brilliant Cut IF/D, 4 x 2.5 mm Brilliant Cut IF/D, 8 x 2.25 mm Brilliant Cut VVS1/F-G, 92 x 2 mm Brilliant Cut VVS1/F-G, 126 x 1.9 mm Brilliant Cut VVS1/F-G, 42 x 1.8 mm Brilliant Cut VVS1/F-G, 115 x 1.75 mm Brilliant Cut VVS1/F-G, 109 x 1.7 mm Brilliant Cut VVS1/F-G, 84 x 1.6 mm Brilliant Cut VVS1/F-G, 123 x 1.5 mm Brilliant Cut VVS1/F-G, 84 x 1.4 mm Brilliant Cut VVS1/F-G, 84 x 1.3 mm Brilliant Cut VVS1/F-G, 46 x 1.25 mm Brilliant Cut VVS1/F-G, 84 x 1.2 mm Brilliant Cut VVS1/F-G, 168 x 1.1 mm Brilliant Cut VVS1/F-G, 76 x 1 mm Brilliant Cut VVS1/F-G.

Total Carats Single Piece: Diamonds 33.974ct Sapphires 2.775ct.

Follow this link:
The $4m Chess Set with 513 carats of Diamonds, Pearls and Sapphire - IDEX Online

Read More..

New Atomtronic Device to Probe Weird Boundary Between Quantum and Everyday Worlds – SciTechDaily

Clouds of supercooled atoms offer highly sensitive rotation sensors and tests of quantum mechanics.

A new device that relies on flowing clouds of ultracold atoms promises potential tests of the intersection between the weirdness of the quantum world and the familiarity of the macroscopic world we experience every day. The atomtronic Superconducting QUantum Interference Device (SQUID) is also potentially useful for ultrasensitive rotation measurements and as a component in quantum computers.

In a conventional SQUID, the quantum interference in electron currents can be used to make one of the most sensitive magnetic field detectors, said Changhyun Ryu, a physicist with the Material Physics and Applications Quantum group at Los Alamos National Laboratory. We use neutral atoms rather than charged electrons. Instead of responding to magnetic fields, the atomtronic version of a SQUID is sensitive to mechanical rotation.

A schematic of an atomtronic SQUID shows semicircular traps that separate clouds of atoms, which quantum mechanically interfere when the device is rotated. Credit: Los Alamos National Laboratory

Although small, at only about ten millionths of a meter across, the atomtronic SQUID is thousands of times larger than the molecules and atoms that are typically governed by the laws of quantum mechanics. The relatively large scale of the device lets it test theories of macroscopic realism, which could help explain how the world we are familiar with is compatible with the quantum weirdness that rules the universe on very small scales. On a more pragmatic level, atomtronic SQUIDs could offer highly sensitive rotation sensors or perform calculations as part of quantum computers.

The researchers created the device by trapping cold atoms in a sheet of laser light. A second laser intersecting the sheet painted patterns that guided the atoms into two semicircles separated by small gaps known as Josephson Junctions.

When the SQUID is rotated and the Josephson Junctions are moved toward each other, the populations of atoms in the semicircles change as a result of quantum mechanical interference of currents through Josephson Junctions. By counting the atoms in each section of the semicircle, the researchers can very precisely determine the rate the system is rotating.

As the first prototype atomtronic SQUID, the device has a long way to go before it can lead to new guidance systems or insights into the connection between the quantum and classical worlds. The researchers expect that scaling the device up to produce larger diameter atomtronic SQUIDs could open the door to practical applications and new quantum mechanical insights.

###

Reference: Quantum interference of currents in an atomtronic SQUID by C. Ryu, E. C. Samson and M. G. Boshier, 3 July 2020, Nature Communications.DOI: 10.1038/s41467-020-17185-6

Los Alamos National Laboratorys Laboratory Directed Research and Development program provided funding.

Originally posted here:

New Atomtronic Device to Probe Weird Boundary Between Quantum and Everyday Worlds - SciTechDaily

Read More..

New Process Simplifies the Transmission of Quantum Data – AZoQuantum

Written by AZoQuantumJul 17 2020

Everyone knows that the quantum world can transform communication technology. Quantum technology offers the potential of impenetrable security and unparalleled performance, and is taking its initial steps towards the decisive goal of applications such asextremely encrypted yet virtually fast-as-light financial transactions.

But the potential for quantum computers to interact with each other has been restricted by the resources needed for such kinds of exchanges. This has consequently limited the proportion of data that can be traded, and also the amount of time it can be preserved.

Now, Japan-based researchers have taken a significant step toward dealing with such limitations in resources. The team has published its findings in the Physical Review Letters journal on May 27th, 2020.

To connect remote quantum computers together, we need the capacity to perform quantum mechanical operations between them over very long distances, all while maintaining their important quantum coherence.

Kae Nemoto, Study Author, Professor and Director, Global Research Center for Quantum Information Science, National Institute of Informatics

Nemoto continued, However, interestingly, while quantum computers have emerged at the small scale, quantum communication technology is still at the device level and has not been integrated together to realize communication systems. In this work, we show a route forward.

Quantum data needs to be protected from the considerable level of noise surrounding it, and data is also likely to be lost from the preliminary message. Such a protection process is referred to as quantum error correction, which intertwines a single piece of data over several qubits. Qubits happen to be the most fundamental unit of quantum data.

Individuals can envision a letter shredded into nine pieces, with each piece placed inside an envelope and each envelope delivered to the same kind of destination to be again organized and read.

Similarly, in the quantum realm, the envelopes are sent through photons and each envelope contains a sufficient amount of data to reproduce the whole letter if any of the delivered envelopes are damaged or lost.

The overhead to protect quantum information from noise and loss will be large, and the size of the required devices to realize this will cause serious problems, as we have started to see in today's quantum computer development. As the efforts to realize the quantum internet are occurring worldwide, it is important to think of it as a system, and not simple devices.

Kae Nemoto, Study Author, Professor and Director, Global Research Center for Quantum Information Science, National Institute of Informatics

Along with her research team, Nemoto tackled this problem by employing a procedure known as quantum multiplexing, where they decreased the noise and also the number of resources required to relay the data.

In multiplexing, the data stored inside a pair of individual photons is integrated into a single photon, similar to a couple of envelopes being delivered in a portfolio, and therefore, the data is still protected individually but only a single stamp is required to transmit the information.

In this system, quantum error correction will play an essential role, not only of protecting the quantum information transmitted, but also for significantly reducing the necessary resources to achieve whatever tasks one needs. Quantum multiplexing enables significant resource reduction without requiring new technology to be developed for such quantum communication devices.

William J. Munro, Study Co-Author and Researcher, Basic Research Laboratories, NTT

At present, the scientists are extending their study to large-scale quantum complex network situations.

The quantum revolution has allowed us to design and create new technologies previously thought impossible in our classical world, added Nemoto. Small-scale quantum computers have already shown computing performance better than todays largest supercomputers.

However, many other forms of quantum technology are emerging and one of the most profound could be the quantum internet a quantum-enabled version of todays internetwhich will allow us to network devices together, including quantum computers, Nemoto further stated.

The scientists will next build on the initial steps that they have already adopted to boost the amount of data as well as the storage time.

The study was partly funded by the Japan Society for the Promotion of Science and the John Templeton Foundation.

Others who contributed to the study are Nicol Lo Piparo, Michael Hanks, Claude Gravel, and William J. Munro, all affiliated with the National Institute of Informatics. In addition, Munro is affiliated with the NTT Basic Research Laboratories as well as the NTT Research Center for Theoretical Quantum Physics.

Lo Piparo, N., et al. (2020) Resource Reduction for Distributed Quantum Information Processing Using Quantum Multiplexed Photons. Physical Review Letters. doi.org/10.1103/PhysRevLett.124.210503.

Source: https://www.rois.ac.jp/en/

Originally posted here:

New Process Simplifies the Transmission of Quantum Data - AZoQuantum

Read More..