Page 3,501«..1020..3,5003,5013,5023,503..3,5103,520..»

Cloud Infrastructure Market Size and Growth Analysis and Forecast To 2025 – Daily Research Chronicles

Cloud Infrastructure MarketReport aims to provide an overview of the market through detailed market segmentation. The report offers thorough information about the overview and scope of the market along with its drivers, restraints and trends. This report is designed to include both qualitative and quantitative aspects of the industry in each region and country participating in the study.

Some of the players in Cloud Infrastructure Market Hewlett Packard Enterprise Co (US),Dell Inc. (US),Cisco SystemsInc. (US),EMC Corporation (US),IBM Corporation (US),Amazon Web Services (US),com (US),Alphabet Inc. (US),(US),Intel Corporation (US),Lenovo group Limited (China),AT&TInc. (US),Oracle Corporation (US),Quanta Computer Inc. (Taiwan),Foxconn Technology Group (Taiwan),Rackspace HostingInc. (US).

Request sample copy of this report athttps://www.precisionbusinessinsights.com/request-sample?product_id=37414&utm_source=cole&utm_medium=24

The scope of this research report extends from the basic outline of the Cloud Infrastructure Market to tricky structures, classifications and applications. This research report also provides a clear picture of the global market by presenting data through effective information graphics. It also provides a detailed list of factors that affect market growth.

A detailed study of the competitive landscape of the Global Cloud Infrastructure Market has been given along with the insights of the companies, financial status, trending developments, mergers & acquisitions and SWOT analysis. This research will give a clear and precise idea about the overall market to the readers to take beneficial decisions.

Cloud Infrastructure Market Report provides future growth drivers and competitive landscape. This will be beneficial for buyers of the market report to gain a clear view of the important growth and subsequent market strategy. The granular information in the market will help monitor future profitability and make important decisions for growth.

Request Customization athttps://www.precisionbusinessinsights.com/request-customisation?product_id=37414&utm_source=cole&utm_medium=24

By Type

By End User

Key Features of the Report:

There are 10 Chapters to deeply display the Cloud Infrastructure Market.Chapter 1 to analyze the top manufacturers of Cloud Infrastructure, with sales, revenue and price of Cloud Infrastructure in 2019-2025.

Chapter 2, to display the competitive situation among the top manufacturers, with sales, revenue and market share in 2019-2025.

Chapter 3, to show the global market by regions, with sales, revenue and market share of Cloud Infrastructure, for each region, from 2019-2025.

Chapter 4, 5, 6 and 7 to analyze the key regions, with sales, revenue and market share by key countries in these regions.

Chapter 8 and 9, to show the market by type and application, with sales market share and growth rate by type, application, from 2019-2025.

Chapter 10 Cloud Infrastructure Market forecast, by regions, type and application, with sales and revenue, from 2019-2025.

About Us:

Precision Business Insights is one of the leading market research and management consulting firm, run by a group of seasoned and highly dynamic market research professionals with a strong zeal to offer high-quality insights. We at Precision Business Insights are passionate about market research and love to do the things in an innovative way. Our team is a big asset for us and great differentiating factor. Our company motto is to address client requirements in the best possible way and want to be a part of our client success. We have a large pool of industry experts and consultants served a wide array of clients across different verticals. Relentless quest and continuous endeavor enable us to make new strides in market research and business consulting arena.

Contact Us:

[emailprotected]

PH +1-866-598-1553

See the original post here:
Cloud Infrastructure Market Size and Growth Analysis and Forecast To 2025 - Daily Research Chronicles

Read More..

AIOps and the evolution of IT infrastructure monitoring – IT Brief New Zealand

Article by LogicMonitor regional manager for APAC Harry Guy.

AIOps seems to be the latest in a rather long chain of IT acronyms and phrases. Like so many buzzwords in IT, AIOps encompasses so much territory that no singular definition of the term is universally accepted.

Artificial Intelligence (AI), at its core, applies advanced analysis and logic-based techniques to automate repetitive learning and discovery of pertinent data, in order to perform a multitude of tasks. Ultimately the high-level benefits of AI in the workplace are numerous, from gaining insight into data and helping to automate technology-based processes efficiently.

Modern organisations have experienced an influx of data in recent times, which they need to rationalise and cope with. However, this influx of data does not often come with a corresponding influx of technology and data science skills. As companies adapt to ongoing digital transformation, they will soon realise that they need more than just a dedicated IT team to view and manage the companys IT infrastructure.

Thats where AIOps comes in.

AIOps is the combination of AI with IT operations and can be used to systematise and automate much of the mundane work of IT operatives, freeing them up to do more innovative projects. However,even morevalue can be added by combining IT infrastructure monitoring with AIOps to maximise visibility into infrastructure performance, and to predict and detect IT issues before they escalate into emergencies.

IT infrastructure monitoring is a critical part of keeping companies up and running in the digital age. Monitoring tools provide unprecedented visibility into the full IT stack, including networks, cloud, servers and more.

This ability to look deeply into IT infrastructure functionality and gather data is of tremendous value to IT administration and management. AIOps can essentially enhance these abilities by applying historical data and a machine learning model to support a predictive and real-time IT infrastructure monitoring platform.

AIOps function within an IT infrastructure monitoring platform also supports end-users by creating efficiency and alleviating some of the workload of an IT operative.

There are times when IT issues trigger a range of alerts - not just at the point where the issue lies, but often downstream as well. By reducing alert storms with AIOps, you not only maintain amore effective organisation in the immediate sense, but also the flow-on effect of reducing alert fatigue where tasks pile up on one another, false alerts are so frequent that actual issues are left unmonitored, and the whole range of issues this can cause.

AIOps provides IT monitoring teams with the means to identify and isolate issues, perform root-cause analysis (RCA), and mitigate potential impacts on adjacent devices or software tools. There are many benefits to this capability, such as helping IT professionals efficiently triage clusters of issues, minimising unnecessary alerts to decongest process pipelines, and providing visibility into the IT infrastructure through topology mapping to represent either the physical or logical elements.

AIOps tools also support anomaly detection and allow engineers to focus on one single problem at a time by breaking down rigid systems and processes. IT engineers can set parameters around anything within the infrastructure pertaining to individual components to correct and track issues before they escalate.

Furthermore, AI tools help engineers map out a much broader understanding of their IT environment. Once an anomaly is surfaced, is there a subsequent spike in activity elsewhere in the infrastructure that coincides with this anomaly? Is a particular machine running hot only at certain times of the day, or is performance lagging when a certain amount of users open a particular application?

AIOps is about moving beyond simple creation and storage of data to truly understanding the data and making it work dynamically for the organisation.

The key function of AI is like peeling away the layers of an onion: there are always more layers beneath the surface. Just as one level of functionality is discovered, more surface.

AIOps will continue to evolve, and the industry is only a very short way down the evolutionary path. However, there is no denying that AIOps is already having a profound effect on IT infrastructure monitoring, and helping organisations to increase operational efficiency.

Today, the IT infrastructure, tomorrow the world!

Read more:
AIOps and the evolution of IT infrastructure monitoring - IT Brief New Zealand

Read More..

The Global Virtualization in Industrial Automation Market is expected to grow by $ 216.39 mn during 2020-2024 progressing at a CAGR of 4% during the…

Global Virtualization In Industrial Automation Market 2020-2024 The analyst has been monitoring the virtualization in industrial automation market and it is poised to grow by $ 216.

New York, July 01, 2020 (GLOBE NEWSWIRE) -- Reportlinker.com announces the release of the report "Global Virtualization in Industrial Automation Market 2020-2024" - https://www.reportlinker.com/p05381451/?utm_source=GNW 39 mn during 2020-2024 progressing at a CAGR of 4% during the forecast period. Our reports on virtualization in industrial automation market provides a holistic analysis, market size and forecast, trends, growth drivers, and challenges, as well as vendor analysis covering around 25 vendors. The report offers an up-to-date analysis regarding the current global market scenario, the latest trends and drivers, and the overall market environment. The market is driven by high flexibility in operating an industrial automation system and reduced replacement and upgrading of legacy systems and software. In addition, the ability to run multiple operating systems on a single physical server is anticipated to boost the growth of the market as well. The virtualization in industrial automation market analysis includes end-user segment and geographical landscape.

The virtualization in industrial automation market is segmented as below: By End-user Process industry Discrete industry

By Geography landscapes APAC North America Europe South America MEA

This study identifies the improvement in NFV technology as one of the prime reasons driving the virtualization in industrial automation market growth during the next few years. Also, the shift from on-premise servers to cloud servers and SDS aiding the setting up of hybrid cloud will lead to sizable demand in the market.

The analyst presents a detailed picture of the market by the way of study, synthesis, and summation of data from multiple sources by an analysis of key parameters. Our virtualization in the industrial automation market covers the following areas: Virtualization in industrial automation market sizing Virtualization in industrial automation market forecast Virtualization in industrial automation market industry analysis

Read the full report: https://www.reportlinker.com/p05381451/?utm_source=GNW

About ReportlinkerReportLinker is an award-winning market research solution. Reportlinker finds and organizes the latest industry data so you get all the market research you need - instantly, in one place.

__________________________

More here:
The Global Virtualization in Industrial Automation Market is expected to grow by $ 216.39 mn during 2020-2024 progressing at a CAGR of 4% during the...

Read More..

Boeing 737 MAX certification flight tests to begin – Arab News

DUBAI: The Iranian rial fell to a new low against the US dollar on the unofficial market on Saturday, as the economy comes under pressure from the coronavirus pandemic and US sanctions.The dollar was offered for as much as 215,500 rials, softening from 208,200 on Friday, according to foreign exchange site Bonbast.com. The economic daily Donya-e-Eqtesads website gave the dollar rate as 215,250, compared with 207,500 on Friday.In May 2018, President Donald Trump withdrew the United States from a multilateral deal aimed at curbing Irans nuclear program and reimposed sanctions that have since battered the economy.A drop in oil prices and a slump in the global economy have deepened the economic crisis in the country, which also has the highest death toll in the Middle East from the pandemic.The rials decline has continued despite assurances from Iranian Central Bank Governor Abdolnaser Hemmati last week that the bank had injected hundreds of millions of dollars to stabilize the currency market.The rial lost about 70% of its value in the months after May 2018 as Iranians snapped up dollars, fearing Washingtons withdrawal from the nuclear deal and sanctions could shrink vital oil exports and severely impact the economy.The official exchange rate is 42,000 rials per dollar and is used mostly for imports of state-subsidised food and medicine.

See the original post:
Boeing 737 MAX certification flight tests to begin - Arab News

Read More..

Six things you need to learn about quantum computing in finance – eFinancialCareers

This willcome as bad news if you're only just getting to grips with Python, but you should probably be thinking of adding quantum computing to your repertoire if you want to maintain your long term employability in finance. Both Goldman Sachs and JPMorgan have been investigating the application of quantum computers to their businesses, and many say it's less a question of if than whenquantum computing is more widely applied.

Both Google and IBM are competing for quantum leadership. Google declared that it had achieved 'quantum supremacy' last October,a claimpromptly disputed by IBM, which said that Google's assertion was misleading. IBM itself now has 18 quantum computersthatcan be accessed via the cloud and that are already used by JPMorgan to set derivatives prices. In a new report*, IBM researchers includingDaniel Egger, Claudio Gambella,Jakub Marecek,Scott McFaddin, and Martin Mevissenargue that this is just the start.

Over time, the researchers say banks will use quantum computers for everything from creating value at risk and liquidity coverage ratios to running simulations to enable more accurate calculations of net stable funding ratios and pricing financial instruments. In preparation for this future they suggest you familiarize yourself with the following six quantum algorithms.

1. The Variational Quantum Eigensolver

The Variational Quantum Eigensolver (VQE) is used for optimization applications. It harnesses energy states to calculate the function of the variables it needs to optimize and is good whenstandard computers struggle due to the intensity of the computing required. In financial services, IBM says the VQE can be used in portfolio optimization. The only problem is that the number of qubits you need increases signficantly withproblem size.

2. The Quantum Approximate Optimization

TheQuantum Approximate Optimization is used to optimize combined problems and tond solutions to problems with complex constraints. IBM says it can be combined with VQE forportfolio optimization.

3. TheQuantum Amplitude Estimator

TheQuantum Amplitude Estimator(QAE) is used in simulations, optimizations and machine learning. It allows users to create simulation scenarios by estimating an unknown property in the style of the Monte Carlo method. Instead of simple samplying random distributions, the QAE can handle them directly and this dramatically speeds up simulation time. In finance, it can be used for option pricing, portfolio risk calculations,issuance auctions, anti-money laundering operations and identifying fraud.

4.Quantum Support Vector Machines

Quantum support vector machines (QSVM) applysupervised machine learning to high dimensional problem sets. Used for financial forecasting, they map data into a 'quantum-enhanced feature space' that enables the separation of data points and improvedforecastaccuracy.

5. Harrow, Hassidim, and Lloyd

Harrow, Hassidim, and Lloyd (HHL) is used for optimization and machine learning and enables better measurement of large linear systems by exponentially speeding up calculations. It can be used for credit scoring.

6.Quantum Semidenite Programming

Quantum Semidefinite Programming (QDSP) is used to optimize a linear objective over a set of positive semi-denite matrices. It can be used for portfolio diversification and "exponentially" speeds-up calculations when there are particular constraints.

As the financial services industry is subject to the combined demands of, "sophisticated risk analysis, dynamic client management, constant updates to market volatility, and faster transaction speeds," IBM's researchers predict quantum algorithms are primed for take-off. Now might be a good time to start familiarizing yourself with how they work.

*Quantum computing for Finance: state of the art and future prospects

Have a confidential story, tip, or comment youd like to share? Contact: sbutcher@efinancialcareers.com in the first instance. Whatsapp/Signal/Telegram also available. Bear with us if you leave a comment at the bottom of this article: all our comments are moderated by human beings. Sometimes these humans might be asleep, or away from their desks, so it may take a while for your comment to appear. Eventually it will unless its offensive or libelous (in which case it wont.)

Photo by Michael Dziedzic on Unsplash

Original post:
Six things you need to learn about quantum computing in finance - eFinancialCareers

Read More..

Cybersecurity in the quantum era – ETCIO.com

By Tirthankar Dutta

On October 23rd, 2019, Google claimed that they had achieved Quantum supremacy by solving a particularly difficult problem in 200 seconds by using their quantum computer, which is also known as "sycamore." This performance was compared with a Supercomputer known as 'Summit" and built by IBM. According to Google, this classical computer would have taken 10,000 years to solve the same problem.

The advancement of large quantum computers, along with the more computational power it will bring, could have dire consequences for cybersecurity. It is well known that important problems such as factoring, whose considered hardness ensures the security of many widely used protocols (RSA, DSA, ECDSA), can be solved efficiently, if a quantum computer that is sufficiently large, "fault-tolerant" and universal, is developed. However, addressing the imminent risk that adversaries equipped with quantum technologies pose is not the only issue in cybersecurity where quantum technologies are bound to play a role.

Because quantum computing speeds up prime number factorization, computers enabled with that technology can easily break cryptographic keys by quickly calculating or exhaustively searching secret keys. A task considered computationally infeasible by a conventional computer becomes painfully easy, compromising existing cryptographic algorithms used across the board. In the future, even robust cryptographic algorithms will be substantially weakened by quantum computing, while others will no longer be secure at all:

There would be many disconnects on the necessity to change the current cryptographic protocols and infrastructure to counter quantum technologies in a negative way, but we can't deny the fact that future adversaries might use this kind of technology to their benefit. As it allows them to work on millions of computations in parallel, exponentially speeding up the time it takes to process a task.

According to the National, Academies Study notes, "the current quantum computers have very little processing power and are too error-prone to crack today's strong codes. The future code-breaking quantum computers would need 100,000 times more processing power and an error rate 100 times better than today's best quantum computers have achieved. The study does not predict how long these advances might takebut it did not expect them to happen within a decade."

But does this mean that we should wait and watch the evolution of quantum computing, or should we go back to our drawing board to create quantum-resistant cryptography? Thankfully, researchers have been working on a public-key cryptography algorithm that can counter code-breaking efforts by quantum computers. US National Institute of Standards and Technology (NIST) evaluating 69 potential new methods for what it calls "post-quantum cryptography." The institution expects to have a draft standard by 2024, which would then be added to web browsers and other internet applications and systems

No matter when dominant quantum computing arrives, it poses a large security threat. Because the process of adopting new standards can take years, it is wise to begin planning for quantum-resistant cryptography now.

The author is SVP and Head of Information Security at Infoedge.

DISCLAIMER: The views expressed are solely of the author and ETCIO.com does not necessarily subscribe to it. ETCIO.com shall not be responsible for any damage caused to any person/organisation directly or indirectly.

Continue reading here:
Cybersecurity in the quantum era - ETCIO.com

Read More..

There’s a Hidden Economic Trendline That Is Shattering the Global Trade System – IDN InDepthNews | Analysis That Matters

Viewpoint by Marshall Auerback and Jan Ritch-Frel

Marshall Auerback is a market analyst and commentator and Jan Ritch-Frel the executive director of the Independent Media Institute. This article was produced by Economy for All, a project of the Independent Media Institute.

NEW YORK (IDN) Former U.S. Treasury Secretary Lawrence Summers has recently conceded: "In general, economic thinking has privileged efficiency over resilience, and it has been insufficiently concerned with the big downsides of efficiency." Policy across the globe is therefore moving in a more overtly nationalistic direction to rectify this shortcoming.

COVID-19 has accelerated a process that was well underway before it, spreading beyond U.S.-China-EU trade negotiations and into the world's 50 largest economies. As much as many defenders of the old order lament this trend, it is as significant a shift as the dawn of the World Trade Organization (WTO) global trade era.

Economists, politicians, and leading pundits are often tempted to see new economic patterns through the prisms of the past; we are therefore likely to hear that we're back in an era of 19th-century mercantilism, or 1970s-style stagflation. But that misses the momentthe motives are different, and so are the outcomes.

What we are experiencing is the realization by state planners of developed countries that new technologies enable a rapid ability to expand or initiate new and profitable production capacity closer to or inside their own markets. The cost savings in transport, packaging and security and benefits to regional neighbors and these countries' domestic workforces will increasingly compete with the price of goods produced through the current internationalized trade system. U.S. national politicians from President Trump to Senator Elizabeth Warren will be joined by a growing chorus who see the long-term domestic political benefit of supporting this transition.

The combination of high-speed communication, advances in automated manufacturing and computing combined with widespread access to the blueprints and information necessary to kick-start new production capacity increasingly makes the current international network of supply chains resemble a Rube Goldberg contraption, and it lightens the currency outflow challenge that many economies have had to deal with for the past seven decades.

Growing political will to restore manufacturing capacity in the national interest will have a shattering effect on countries that built up their economies through a labor price advantage over the past 40 years. No amount of currency depreciation or product dumping can overcome the reality of a country's foreign customer base suddenly opting to produce and buy their own goods at competitive prices.

Taken in sum, the transformation underway isn't just Donald Trump demanding less dependency on China's production capacityit's a global process. It's also India signaling it's going to try to strike its own technological path away from China.

New Patterns of Production

There's a lot of froth in moments like these, where old patterns continue at the same time new ones emerge. Factories are still closing in the United States on the NAFTA continuumno punishment for leaving and good incentives to leave; in many respects, it's because the corporations are part of the same old regime.

But look at sectors of the more advanced economy, and the green shoots and stalks of a new era are quite visible.

There is a cascade of new production in the United Statesnot the familiar announcements of new data centers, warehousing and logistics centers, but rather the production of high-tech goods and essential restoration of hard infrastructure that one might expect of a more self-reliant economy.

The news website Area Development is as good a radar screen for this process as any. There one can find a running spigot of news items like a new "500,000-square-foot research, development and production center [in Texas] to create electric motors for industries as diverse as electric vehicles, robotics, HVAC, and last-mile micromobility," or a restoration and upgrade of Newport News, Virginia's dockyards.

The rationales provided by governments to escape the strictures of the existing trade arrangements and into the new era are fairly easy: a mix of opportunism and need tied to the exigencies of the moment, such as the current pandemic, and long-term national security, which of course can ultimately amount to any economic activity of scope.

Senator Elizabeth Warren's introduction in July of her sweeping Pharmaceutical Supply Chain Defense and Enhancement Act demonstrates that the U.S. power establishment is beginning to reach a consensus on this issueno longer the sole province of Trump-era nationalist. "To defeat the current COVID-19 crisis and better equip the United States against future pandemics, we must boost our country's manufacturing capacity," Warren said, recasting the consequences of decades of policy to offshore our economic production as an "overreliance on foreign countries."

The government of Japan's newly defined restrictions on foreign investment as reported by the Financial Times of around a dozen sectors including "power generation, military equipment, [computer] software [and technology]" in effect prioritize the claims of domestic manufacturers on national security grounds.

Of course, the Japanese authorities have crafted these restrictions on the vague grounds of "national security," which is likely to take on a substantially different meaning in the wake of the coronavirus pandemic. Hence, the country is unlikely to face any serious challenge from other WTO members. And it is through that rather simple justification that we can expect a general reshaping of international trade relations and the array of supply chains.

The government of Australia has likewise outlined new powers to scrutinize new overseas investment, as well as forcing foreign companies to sell their assets if they pose a national security threat. The proposals come in the wake of an intensifying trade war between the governments of Beijing and Canberra, alongside "a dramatic increase in the number of foreign investment bids probed by Australia's spy agency ASIO, over fears that China was spying on sensitive health data," according to news.com.au.

This is happening at the same time that there has been an overhaul of thought with regard to manufacturing, something Australia hasn't typically done much of. The headlines from Australia are beginning to look a lot like the Area Development stories in the United States.

The Canadian government has also announced plans to enhance foreign investment scrutiny "related to public health or critical supply chains during the pandemic, as well as any investment by state-owned companies or by investors with close ties to foreign governments," according to the Globe and Mail.

This attempt to disaggregate beneficial foreign investment flows from those deemed contrary to the national interest used to be a common feature of government policy in the post-World War II period. Canada established the Foreign Investment Review Agency in 1973 as a result of mounting concerns about rising overseas investment, notably the domination of U.S. multinationals, in the Canadian economy. Its provisions were repeatedly downgraded as globalization pressures intensified, but its value is now being reassessed for compatibility with national health policy and resiliency in manufacturing chains. Predictably, pharmaceutical independence is high on the list.

Taiwan, "a net importer of surgical masks before the pandemic, [has] created an onshore mask-manufacturing industry in just a month after registering its first infections in January," reports the Financial Times. "Taiwan's President Tsai Ing-wen said Taipei would repeat that approach to foster other new industries." And world economists have noted that Taiwan and Vietnam lead the world in growth of global market share in exports, at the expense of larger economies like China.

In Europe, the EU leadership is publicly indicating a policy of subsidy and state investment in companies to prevent Chinese buyouts or "undercutting prices." This was supposed to represent a cross-European effort, but the coronavirus policy response is increasingly driven at the national level. Consequently, it is starting to fracture the EU's single market, which has long been constructed on an intricate network of cross-border supply chains and strict rules preventing state subsidies to national champions.

The French government under President Emmanuel Macron has increasingly invoked the spirit of Charles De Gaulle in lieu of French industrialist Jean Monnet, considered as one of the founding fathers of today's European Union. Corporate France has taken heed: In response to French Finance Minister Bruno Le Maire's rallying cry to the nation's supermarkets this past March to "Stock French products," according to France 24, "French supermarket chain Carrefour has already moved to source 95 percent of its fruits and vegetables from within" the country, which by the way is a fundamental logic of any serious environmental agenda. According to Coalition for a Prosperous America, "Le Maire [also] cited pharmaceuticals, the automotive sector, and aerospace as three economic sectors where France needs to reassert sovereignty, i.e., make more products in France.

Going further in a national TV interview, the finance minister said "that it was unacceptable for France to rely on China and South Korea for 80 percent of its electric battery supply, praising a new France-based battery-making facility that would come onstream in 2022. He praised French drugmaker Sanofi for saying recently that it intends to re-localize' some of its production back to France."

President Macron himself has likewise reaffirmed a goal for France to ensure the nation's "health sovereignty" after the coronavirus exposed the reliance of his country on imported medical supplies. According to a recent Reuters report, France's "Agriculture Minister, Didier Guillaume, told political news channel Public Senat that while France could not be self-sufficient in all food products, it would look at being more autonomous in areas such as plant protein."

Even Germany, with a vibrant export sector that has long made it a beneficiary of globalization, has also signaled a move toward greater economic nationalism. In a recent interview with Der Spiegel (cited in Reuters), the country's economy minister, Peter Altmaier, "said he wanted to support pharmaceuticals companies that are dependent for key reagents on imports from Asia to rebuild their production sites in Europe."

In broader terms, part of the government's overall response to the COVID-19 pandemic has featured 400 billion in state guarantees to underwrite the debts of companies affected by the turmoil. A goal of this package is to prevent a "bargain sale of German economic and industrial interests," Altmaier was quoted in MarketWatch.

Economic nationalist considerations are also driving a shift in Britain's negotiating stance in the current Brexit trade negotiations with the EU, with the UK clearly prioritizing national sovereignty over frictionless free trade with its former single-market partners, even if that means a so-called "Hard Brexit."

The EU's single-market rules specifically preclude state aid to specific industries if it undermines the operation of the single market. But the UK's chief negotiating officer, David Frost, has made it clear that the ability to break free from the EU's rulebook was essential to the purpose of Brexit, even if that meant reverting to the less favorable WTO trade relationship that exists for other non-EU countries.

In the words of columnist James Forsyth of the Spectator, EU laws on the single market "[deny] to member states what one cabinet minister refers to as the geostrategic premium' of encouraging domestic production of personal protective equipment. In the single market, the NHS cannot buy solely from British suppliers to try to build up a domestic manufacturing base; it has to accept bids from any company based in the EU."

Economic Nationalism and the New Geopolitics

Over the past 40 years, this kind of overt economic nationalism, especially as it has pertained to domestic manufacturing capabilities, has generally been eschewed by the United States, at least until the ascension of Donald Trump to the White House. In part, this is a product of the fact that as global hegemon, the United States used to be able to dominate global institutions (such as the International Monetary Fund and the WTO) and shape them toward U.S. national interests. But when necessary, national security considerations have intervened.

Sematech, a government-industry consortium, was created in the 1980s to successfully revitalize the American semiconductor industry, after the Pentagon deemed this to be a strategically key industry that should not leave the United States exposed to the vagaries of foreign manufacturers. The Sematech consortium has represented a great success in national industrial planning, as it enabled the United States to re-establish its global dominance in high-end semiconductor production and design.

More recently, national security considerations in the semiconductor industry have again revived in the wake of the Trump administration's growing dispute with Chinese 5G telecommunications equipment maker Huawei. The U.S. Commerce Department has now mandated that all semiconductor chip manufacturers using U.S. equipment, IP, or design software will require a license before shipping to Huawei.

This decision has forced the world's biggest chipmakerTaiwan Semiconductor Manufacturing Company (TSMC) to stop taking fresh orders from Huawei, as it uses U.S. equipment in its own manufacturing processes. Paradoxically, then, the Trump administration has exploited pre-existing global supply linkages in the furtherance of a more robust form of economic nationalism. The same policy attitude is now visible with regard to pharmaceuticals (as it is in other parts of the world, to the likely detriment of China and India).

A shift like this will have a knock-on effect that will reverberate to the other parts of the world that for centuries have been forcibly limitedby arms and financeto being sources of raw material export, refined if they were lucky. They will watch closely what happens with Australia, which for the majority of the past 150 years has been an exporter of food and minerals, but is now jumping on the project to establish a national manufacturing base.

As dozens of countries build their own manufacturing basesomething only a handful of countries controlled for most of modern historybig questions will emerge about geopolitical stabilization and the classical tools of foreign influence. The world today in some respects resembles the 19th century's balance-of-power politics, even as the majority of countries understand that some minimal level of state collaboration is essential to combat shared challenges.

China is party to a growing number of global disputes, as emerging great powers typically experience: the U.S. vs. China, China vs. India, Japan vs. China, China vs. Australia, and the EU vs. China. But hot wars are unlikely to feature as prominently as they did two centuries ago.

Expect to see Cold War-style conflict intensify, however, albeit in new forms. Instead of the old geopolitical arenas including access to vital commodities or stable petroleum markets, the new forms of the competition will put greater weight on access to advanced research and technologies, such as the collection, transfer and storage of data and the quantum computing power to process it.

The speed at which global supply chains can potentially shift to accommodate the rise in economic nationalism is considerable. The success with which we manage the transition will largely settle the debate as to whether it is in fact the better path to greater prosperity and global stability. [IDN-InDepthNews 04 July 2020]

Image credit: Caribbean News Global (CGN)

IDN is flagship agency of the Non-profit International Press Syndicate.

Visit us on Facebook and Twitter.

See the article here:
There's a Hidden Economic Trendline That Is Shattering the Global Trade System - IDN InDepthNews | Analysis That Matters

Read More..

How Will The World Look Like In 2025 And The Future Of Cybersecurity – Entrepreneur

Here's how the technology landscape will transform over the next five years, and with it, how cybersecurity advancements will take place to protect the confidentiality, integrity, and availability of information

Stay informed and join our daily newsletter now!

July3, 20205 min read

Opinions expressed by Entrepreneur contributors are their own.

You're reading Entrepreneur India, an international franchise of Entrepreneur Media.

The world has been witnessing increased connectivity every year, driven by the ongoing technological revolution. Along with the increasing connectivity, critical information infrastructures are also facing a rising number of cyberattacks, which is a cause of concern for both individual and enterprise users. Malicious actors carry out these attacks with different motivessome for financial gains and others for undermining the governments and information systems. With a massive increase in humans accessing the Internet every year, the fear of such attacks cannot be overlooked. By 2025, there will be explosive growth in Internet penetration, and its effects will be highly visible. This scenario demands the cybersecurity laws to keep pace with the overwhelming developments. The following are the trends to witness in the cybersecurity landscape by 2025.

Experts predict that by 2025, the information that people share over the Internet will get interwoven into their daily life activities, so much so thatinformation flow will become invisible, like electricity. An analogy is that Internet usage will become akin to breathing. An expert from Media Psychology Research Center,Pamela Rutledge,argues that today, universal access is the term associated with phone lines. However, by 2025, access to the Internet will become a basic right. The greater access and capabilities will help bridge the digital divide and allow universal access to quality tools and digital participation skills.

There will be an exponential explosion of data volume and typical use cases. Thus, the line separating the responsibilities of IT security teams and the regulatory frameworks will blur by 2025. GDPR (General Data Protection Regulation) is a robust regulatory framework that advocates for consumer rights, accountability obligations, and restrictions on the international flow of data. The rapid advancement in the use of AI and ML technologies will make the process trickier. Some key pointers which the GDPR policies will need to address are:

Legal rights for capturing and processing data.

Fixing responsibility for data manipulation.

Fixing accountability for breaches in AI-driven systems.

Determining the culprit country of manufacture or country of use?

GDPR is currently introducing rules which take into account all these concerns, and which are future-proof and technologically neutral. The AI systems may keep the data unilaterally, for further evolving its service capabilities. However, inevitably, the GDPR rules will always favor the data subject, and organizations will have to bring their AI designs in-line with the regulations.

Quantum Computing is currently in its infancy stage, but by 2025, the world will witness commercial devices that use technology for meaningful solutions to real-world problems. It has the potential to come up as a boon for numerous sectors. It will help scientists in the healthcare sector to simulate complex chemical reactions, which will guide drug development research. The discovery of novel materials will also occur, which can become catalysts to reduce carbon emissions from vehicles and help curb the effects of global warming. Quantum computers will also help in reducing the costs of research and development. In a nutshell, tech firms will see significant growth, and they will help uplift other sectors as well. It is evident from the graph given below. On X-axis is the percentage of organizations currently adopting AI, and on Y-axis, the average percentage change required in AI spending for the next three years.

Digital Rights Management (DRM) technologies are crucial tools that help organizations secure their digital content. Experts predict that the DRM market size will expand to a whopping $4.35 billion by 2025, with a 15.12 per cent CAGR during 2020-2025. There will be a rise in web-based data. It will enhance the necessity of streamlining the process of secure data access and management, ensuring its foolproof confidentiality and integrity. The Internet will become an integral part of people's lives, and governments will use it to measure, monitor, and alter critical socio-economic and political policies. Organizations will change the processes and goals of the workforce. There is an inherent threat to these data collection techniques from malicious actors. However, with an open internet, they can become crowd-controlled and supplemented by traditional information sources to prevent such breaches.

Today, there is an increase in the volume of the regulatory environment. However, it is just the tip of the iceberg. After five years, privacy and data-centric security will reach commodity status. Giving the users the ability to control and protect their sensitive data assets will become a norm rather than an exception. The awareness and understanding of the need to upgrade the cybersecurity policies will increase, and thus, the adoption ofprivacy-enhancing technologies (PET)will also rise. PET will go on to become a mainstream technology category by 2025. It will become a key element in the organizations privacy and security strategy to meet the minimum compliance threshold.

Digital transformation and technological advancements have witnessed great potential to help solve the world's most pressing problems, ranging from providing quality healthcare to ensuring universal educational access. However, it has also resulted in never-seen-before cybersecurity threats and cyberattacks in the last few years. The next five years are going to be critical in deciding the fate of digital technologies and cybersecurity as well. The data security sphere will also undergo drastic transformations that could well be something beyond the magnitudes and sophistication that could be conceived based on currently available knowledge. Cybersecurity is going to be paramount as organizations will have to adopt innovative security strategies, security solutions, and techniques. They will have to innovate at an unprecedented pace to outpace cyber adversaries.

Here is the original post:
How Will The World Look Like In 2025 And The Future Of Cybersecurity - Entrepreneur

Read More..

Backstory: Emergency by Any Other Name Cuts as Deep – The Wire

Its the death of irony when todays jailors condemn yesterdays jailors in the strongest possible terms; when those who are taking state repression to a whole new level, passionately condemn state repression during the Emergency; when people who have reduced the media into a state of servitude, loudly lament the treatment of the press under the Indira Gandhi regime.

This was Union home minister Amit Shahs tweet of June 25: On this day, 45 years ago one familys greed for power led to the imposition of the Emergency. Overnight the nation was turned into a prison. The press, courts, free speechall were trampled over. Atrocities were committed on the poor and downtrodden.

One cannot grudge the Union home minister and his party the moral capital handed over to the Sangh parivar by Indira Gandhi, when her police herded thousands of RSS cadres and opposition leaders into jails in the early hours of June 26, 1975. It was like handing them a blank cheque and many of them successfully cashed this cheque repeatedly over the next four decades and more.

One can, however, question the alacrity with which the Union home minister and his government have replicated many aspects of Indiras Gandhis Emergency prison model, and in the process trampled over the press, courts, free speech.

To better understand the parallels when it comes to the pacification of the media, it would be useful to go through The Wire commentary published on June 25, on the eve of the 45th anniversary of the Emergency, Indias Free Press Is Still Tormented by the Laws Brought by the Emergency, which refers to the legal (but illegitimate) measures undertaken to emaciate the press. Gripping it is to read how the Defence of India Rules, 1971, were dressed up adequately to become the Defence of Internal Security of India Rules (DISIR); how censorship loomed large through a combination of external surveillance and journalistic subservience; how the Supreme Court more or less fell in line when it came to issues like passing the new censorship guidelines; how newspapers that displayed a streak of independence were punished by being deprived of government advertisements. The manner in which the ministry of information and broadcasting spearheaded this demolition of newspaper autonomy is particularly elucidative. A chart emerged that carefully classified newspapers according to whether they were friendly, hostile, neutral and then, further, whether they were positively friendly, continuously hostile, capable of shifting from neutral positive towards positive side or vice versa. It was on the basis of this calibrated calculation that the government of the day took decisions on whether to assist a particular newspaper financially or not.

Keeping this template in mind let us consider some moves that Amit Shahs government has recently made. A censor in the newsroom is so 20th century! Now we have policies tuned to censor everything, including the use of tech through the use of tech. The Wire analysis, From India to US, Forcing Proactive Policing of Online Content Is Censorship by Proxy (July 1), notes that Indian tech policy has changed rapidly and arbitrarily in its attempt to serve two conflicting goals: that of encouraging innovation and complete control of public discourse.

So if you, as a mediaperson, have a tendency to criticise the prime minister online or offline, it may not be long before the police is at your door (UP Police Books 4 for Objectionable WhatsApp Posts on PM Modi, Amit Shah, June 24; Sedition Case Filed Against Man Over Objectionable Remarks Against UP CM Adityanath, May 29; Scroll Editors Move Allahabad HC to Quash FIR Against Supriya Sharma, June 27).

Prime Minister Narendra Modi, BJP president Amit Shah, chief minister of Uttar Pradesh Adityanath and ministers .Credit: PTI/Nand Kumar/Files

Meanwhile, laws are being designed to control the public narrative, much as they were during the days of the Emergency. The draft Press Registration Bill, now in a process of stakeholder consultation, has a new provision which could make registration of news on digital media mandatory (Draft Press Registration Bill Is Nothing But a New Collar on an Old Leash, July 1).

The chilling effect on media content during the period the Emergency, which lasted from June 1975 to May 1977, is today very much in evidence, although in a more amorphous way since there is no formal declaration of emergency. With the sledgehammer of draconian laws being used against journalists and even a pandemic being weaponised to ensure conformity (55 Indian Journalists Arrested, Booked, Threatened For Reporting on COVID-19: Report, June 15), it could be argued that the carceral threat is far more expansive today than at any time earlier. If we were to bring the Kashmir media into the frame, the full extent of Shahs trampling comes into view (Use of UAPA Against Journalists is Last Nail in Coffin for Press Freedom in Kashmir, April 26).

Coming to the fine gradations of media behaviour made during the Emergency, the Shah government has no use for such finesse. It classifies all media roughly into two categories: For Us and Against Us. Prasar Bharati was recently tasked with the responsibility of bringing the Press Trust of India (PTI) to heel (Irked by China Interviews, Govt Gets Prasar Bharati to Turn Heat on Anti-National PTI, June 27) for having the temerity to quote a statement of the Indian ambassador in Beijing that appeared to contradict Prime Minister Narendra Modis claim that no one has intruded into India in the Galwan Valley. It was intriguing indeed to come across Arvind Gunasekars tweet of June 28 alerting us to the fact that the last time this happened was during the Emergency in 1976, when All India Radio (AIR) served notice on PTI and UNI on the imminent withdrawal of subscription. Prasar Bharti, unlike AIR, is supposedly autonomous, but what of that?

We dont have an Emergency today? Re-examining this proposition may be worth our while.

Personal is political

Came across an interesting article the other day which recalled an iteration of the phrase the personal is political during second-wave feminism. An influential essay written by Carol Hanisch in 1970 by the same title, had argued that understanding how grim the situation was for women was as important as protesting it. The political here referred to any power relationship. This would necessarily include those invisibilised as domestic such as marital violence. Her argument came back to me while I was reading a recent piece on The Wire (15-20 Men in an Upscale Jaipur Restaurant Saw My Long Beard and Almost Lynched Me, July 1), a personal experience told in mind-numbing detail: It took virtually no time for friends gathered for a convivial evening, to become a lynch mob Recalling the personal illuminated the political and illuminated the deeper power-dynamics at work which is mirrored in the act of lynching.

Question of language?

Apropos Devirupa Mitras report, Modis No Intrusion by China Claim Contradicts Indias Stand, Raises Multiple Questions (June 20), reader Kumud Boruah had some complex observations to offer. Excerpts from the mail:

Although from the structure of language point of view, it is believed that interpretation of language is key to understanding of ourselves and the world, you cannot deny the humanist perspective of both the speaker and the language as a whole. In other words, ever since its emergence, consciousness has existed in the material integument of language. Language is as old as consciousness and in reality the two categories cannot exist in isolation from each other

Moreover, in the postmodernist discourses post-structuralism claims that language can be extremely slippery and deceptive. I think PMO has a right to raise its concern in this postmodernist line of argument. But responding to such a puzzle, a distinguished literary critic was taken aback to think of famous classical paradoxes such as the Cretan paradox and its Albany solution. In the paradox the Cretan says that all Cretans lie and in this case, if this Cretans statement is true, then a question arises: does he himself simultaneously not prove that his statement is untrue? If we accept the Cretans statement as true, we must also agree at the same time that the Cretan has at least for once not lied. Interestingly, for the speaker from Albany, New York, as an outsider, the same claim would be simply true or false. Now in the case of our PMs No intrusion by China claim and PMOs clarification later, if all the speakers are Cretans, does it not require that a man from Albanys claim would also be taken into confidence to break the impasse? But in such a paradoxical situation what we really need is at least one kind of statement from a speaker from outside, that is, a man from Albany, for a possible solution.

Let us now see what the literary critic has to finally say in this regard: So if we want to say something about language, we ideally want a perspective outside language to say it. With language, however, there is no outside perspective. We can only speak about language with the use of language. No matter what we say, we are always inside. I think the critic is absolutely correct in apprehending that language and consciousness of the speaker are not only socially conditioned but are also integrally and dialectically interwoven. My own point of view is that we must find out the truth of language used from the perspective inevitably located inside where consciousness reflects reality and language designates it What we understood from the PMs speech in the first place was a perceptible material experience from language and consciousness combined; we cannot dismiss the same as an illusion of presence at a later stage. Apart from this, PMs speech was in the form of a direct statement which is quoted clearly in the third paragraph of the report by Devirupa Mitra, and we cannot treat the same as poetry for which there is hardly any room for reading in favour of complexity of meaning or aesthetic pleasure following the criteria of Practical Criticism and New Criticism.

Satellite image of the Galwan Valley from its point of confluence with the Shyok up to the 1960 Chinese claim line. Source: The Wire/Google Earth

Galwan and 3 colossal failures

Parthasarathi Majumdar, a visiting professor, School of Physical Sciences, Indian Association for the Cultivation of Science, Kolkata, responded to The Wires coverage of the Galwan Valley incursion, which he believes represents a triplet of colossal failures, on the diplomatic, military and technical fronts, on the part of the government:

Months of diplomatic manoeuvres with their Chinese counterparts have not yielded any fruitThe culmination of these failed missions is of course the Galwan tragedy. The military failure is a repeat of the 1962 story a reconnaissance team of jawans led by a Commanding Officer, trying to destroy an apparently unmanned Chinese military camp, being ambushed by a technically and numerically superior enemyThe only way to avoid armed conflict is to wear the enemy down diplomatically, and here we have failed miserably. Jingoist rhetoric cannot win the day, we need leverage with the Chinese. Do we have any? The huge trade imbalance with China means that the balance cannot be tilted in our favour merely by cancelling a few contracts to Chinese companies. Our manufacturing and technological lacunae underlines our inherent weakness and absence of atmanirbharata on the ground. This is the price to be paid when science, technology, democracy and freedom are made institutionally subservient to pseudo-science, superstition and authoritarian dogma.

COVID-19 and distress

Several first-year medical student-readers of The Wire wrote in recently to express their anxiety over the decision of the authorities to open medical colleges in UP for classes from July 13 (only for first year students). Among the points of concern they flagged was the fact that many students are presently in confinement zones. Besides this, students living outside UP have travel-related problems as trains services have been curtailed till August.They also point to the fact that the mess, local shops, hostel rooms/washrooms are crowded and pose major health risks. Colleges have also made it clear that they will not take responsibility for students getting infected, nor will they support treatment. Opening of colleges just to rush through the syllabus will only mean a heavy stress on young people at a time of high anxiety. They request that the order be rescinded.

The piece, After COVID-19, Open Book Exam Emerges as the Latest Challenge for the Blind (July 3), looked at the dilemmas that Delhi Universitys decision to conduct an online Open Book Examination posed for visually challenged students.

Ramjatan Yadav, from the Sri Venkateswara College of Delhi University, had also written in on the issue: This pandemic has also affected visually impaired students of Delhi University in several ways, given the digital divide between visually impaired students and others. Some of them also do not have smart phone and laptop, along with good internet connectivity, as they may be living in rural areas. Even if they have these devices, they may not know how to access and operate these devices and online services. There are other challenges too like intermittent power supply. Some of these students have not been able to benefit from online classes and online materials. All the study materials are not available in accessible forms like e-text books or audio books. The other major problem is the difficulty these students have in finding scribes (to write down their answers) during this lockdown, especially in rural areas.

Social distancing is a useful strategy against the virus but it is very hard for visually impaired students to maintain social distancing, as they need support and assistance because of lack of infrastructure and mobility. Given these constraints, the University should consider promoting these students without examinations, on the basis of internal assessment and performance in the previous five semesters. If this is not possible then they should be entitled to sit for the conventional mode of examination with adequate safety measures.

Illustration: Pariplab Chakraborty

John Howard, founder of an online platform, Coupon Lawn, responded to the piece, Bengali Migrant Dies By Suicide in Kerala After Train Ticket Cancelled (May 13): Very nice work! You covered some useful information about money saving and personal finance, so I strongly believe that youd also be interested in one of my studies. Recently, I had conducted a survey of 1094 Americans to research how the coronavirus outbreak has impacted their financial situation and their perspective towards saving money. You can find the link to the study here if you are interested. If you find it useful, I hope an honourable mention as a credit for my work wouldnt be too much to ask for.

The Wires coverage inadequate

Faithlina P., a reader of The Wire, writes in on police torture in Thoothikudi: Ive been following The Wire for a long time andappreciate what you do in bringing out a mighty lot of uglytruths especially at a time when media and journalists are being controlled orthreatened. But the death of the father and son sexually tortured and killed at Sattankulam, Tuticorin, Tamil Nadu, has not yet been covered by The Wire. While Indians have joined all of America in its fight for Justice for George Floyd, theres so much more injustice that happens in India which stays hidden. Even when it comes to the light, it isnt acknowledged enough, which leads to abusers gaining the confidence to repeat their abuse. While regional channels have covered this in painstaking detail, not much has made it into the national media, due to which this case hasnt got the attention it deserves.

I cannot but agree with the sentiments expressed in this mail. The national media, in general, was sluggish in its response to the heinous police brutality evident in this case although they were later goading into paying more attention to the case. The accusation that media based in the north are indifferent to vitally important human rights stories breaking in the south cannot be disputed.

On June 23, the family of Jayaraj and Bennix, were informed of both father and son having succumbed to police torture, yet it took three more days for the story to break into the news cycle in the rest of the country. The Wire was no exception to this. Its first report (put together by the desk) came out only on June 26 (Tamil Nadu: Social Media Outrage, Protests Over Brutal Thoothukudi Custodial Deaths) and follow-up reports were also sparse (Every Custodial Death a Reminder of Why India Must Ratify the Convention Against Torture, June 27).

Write to publiceditor@thewire.in

More here:
Backstory: Emergency by Any Other Name Cuts as Deep - The Wire

Read More..

FAMILY MATTERS: Open eyes and mind to teen’s ascent to adulthood – Eagle-Tribune

Dear Doctor,

I know teenagers are supposed to be going through a lot, but our son has changed into a different person. He argues with us over just about everything we ask him to do. He is always out with his friends. He has told us he will be glad when he goes away to college and is away from us. Is this normal, and what should we do?

Puzzled

Dear Puzzled,

Sit down, take a few deep breaths and admit he is indeed changing. He is slowly, but definitely morphing into an adult. The journey will take time and, frankly, you will also be very happy when he goes away to school.

Let me review what I see as the major tasks of the mid- to late-teen years.

First, teens work on achieving independence. This is the eventual separation from parents. The process is unconscious and often stormy, but it will happen. You and your son will develop a new relationship.

Second, teens work on developing a moral compass. They approach moral choices with strong opinions. Over time, they come to see moral choices in their complexity, not so much black and white as gray.

Third, identity of sexual roles and behavior is very complex, often nurtured in silence and guilt. What is it like to be a man? What is the role of a woman? What if ones sexual partners differ from the norm?

Fourth, identification of life roles is a journey. What is my vocation? How do I make a meaningful path in my life? Do I want to be a father or mother? Do I wish to have a family?

This will give you a rough idea of what your son is experiencing. Be there for him. Do not hesitate to let him know how much you love him and care. He is becoming a man before your very eyes.

Dr. Larry Larsen is an Andover psychologist. If you would like to ask a question, or respond to one, email him at lrryllrsn@CS.com.

We are making critical coverage of the coronavirus available for free. Please consider subscribing so we can continue to bring you the latest news and information on this developing story.

See original here:
FAMILY MATTERS: Open eyes and mind to teen's ascent to adulthood - Eagle-Tribune

Read More..