Page 3,671«..1020..3,6703,6713,6723,673..3,6803,690..»

Keeping Your Off-Campus Video Collaborations Safe and Stress-Free – University of Arkansas Newswire

FAYETTEVILLE, Ark. As most college campuses including the University of Arkansas continue to conduct classes and operations remotely for the time being, there are simple ways to keep your off-campus collaborations safe and stress free.

With much of our campus community shifting to video conferencing as a simple way to stay in touch with fellow classmates or co-workers, there are many free resources already available for all U of A students, faculty and staff.

While there are other brands and apps that can be utilized for video conferencing, like Zoom, the two programs most recommended by the university's IT Services office are Microsoft Teams and Skype for Business.

Outside programs likeZoommay be susceptible to hackers or outside parties that could crash your video conference, causing a distraction or even playing inappropriate videos. Programs like Teams and Skype for Business allow for secure connection to make sure there are no disruptions during important meetings.

If you prefer to use Zoom or a similar platform that isn't Teams or Skype, check out these10 tips for security and privacy.

Boxis apowerfulcloud storage and collaboration tool available to all.Box users can upload, download, share and edit files via the web and mobile devices.One Driveis also available to save and collaborate on files.

For assistance accessing campus resources from off campus or setting up any of the resources provided below, please contact us at the IT Help Desk, open 7 days a week.

By phone: 479-575-2905Online:Chat with Tech Support|IT Help PortalMonday toThursday 7 a.m. to midnightFridays 7 a.m. to 5 p.m.Saturdays 11 a.m. to 4 p.m.Sundays 3 p.m. to midnight

There are many other services available free of charge for the entire U of A community through theIT Services website. There you can find more helpful tips on how to most effectively use programs like Teams and Skype as well as how IT Services can help you stay connected no matter where you are.

About the University of Arkansas:The University of Arkansas provides an internationally competitive education for undergraduate and graduate students in more than 200 academic programs. The university contributes new knowledge, economic development, basic and applied research, and creative activity while also providing service to academic and professional disciplines. The Carnegie Foundation classifies the University of Arkansas among fewer than 3 percent of colleges and universities in America that have the highest level of research activity.U.S. News & World Reportranks the University of Arkansas among its top American public research universities. Founded in 1871, the University of Arkansas comprises 10 colleges and schools and maintains a low student-to-faculty ratio that promotes personal attention and close mentoring.

See original here:
Keeping Your Off-Campus Video Collaborations Safe and Stress-Free - University of Arkansas Newswire

Read More..

Retrospect 17 Solo review: Backup software that gives you everything – PCWorld

Retrospect 17,one of the most comprehensive backup programs you can find, is the latest incarnation of a venerable, capable, and reliable program that PCWorld has actually used to back up its content in the past. The Solo version I tested offers the same file backup and disaster recovery and vast media type support I became used to, but adds modern niceties such as online storage, storage pool support, and more. It served us well once, and will serve you well if you need its advanced feature set.

The flip side of that is that the program would be overkill for many users. Also, the interface, while efficient, involves a learning curve, especially because of the jargon-heavy terminology used.

This review is part of our ongoing roundup of the best Windows backup software. Go there for information on competing products and how we tested them.

Retrospect 17 is available for a single computer for $49 (Solo), and $119 for five computers (Desktop). Subscriptions are available starting from $4 a month. Thats the end-user/SOHO stuff. There are a host of enterprise solutions for servers, as well as a management console and VM (Virtual Machine) support for the IT staff. The enterprise is really Retrospects bread-and-butter market, but having used the program extensively myself, I can attest that its good stuff for the average user as wellonce you know it.

Though the language is odd, Retrospect is easy to use once you know it and supports multiple destinations.

I was a bit surprised, not having looked at Retrospect for over 10 years, that the interface had not changed much, if at all. In the backup world, however, steady connotes reliabilty, so thats not a knock in the least. Its very efficient.

Theres still the highly-efficient collapsible function tree to the left, wizard-like script (job) creation, and logical but not immediately intuitive workflow, with jargon-heavy nomenclature. For instance, while Sources is obvious enough, clicking on Destination gives you the option to select a Backup Set." Thats the same as a destination, but it can give you pause initially. Where most backup programs let you filter the files that will be backed up (whitelisting, blacklisting) files, Retrospect puts this under Select. Instead of Jobs, you have Scripts, etc.

As its likely not what youre used to, I do recommend reading the well-written and comprehensive help guide before you get down to business. Note that with some types of backups, such as those made to tape, the catalog file may be stored on the machine from which the backup was made rather than with the data. Thats just one of the things the manual will tell you.

Retrospect is packed to the rafters with features. You can monitor backups, schedule and automate them, and run programs before and afterward. You can choose between progressive (basically a combination of incremental and differential) and full backups, select compression or encryption, create disaster recovery media, and much more. Destinations can include tape, optical, hard drives, storage groups, and just about anything else thats ever been designed to store data. Take a look at the screenshot below, which shows just the categories of options that are available once youve defined the basics.

Retrospects options dialog box contains virtually every option ever conceived for backup programs. The now out-of-fashion collapsible tree works very efficiently to show all the possibilities.

The shot above also points out that Retrospect supports Windows, macOS, and Linux, which covers a fair chunk of the computers on the planet. (The exception is Chromebooks, but Google designed those to store in the cloud for the most part.)

I cant think of one feature Ive seen in another backup program that isnt implemented in some way in Retrospect. If you want complete control over your backups, it provides it. Theres even more esoteric stuff such as ProactivAI, which is a very fancy name (and another misuse of the term AI), that simply means the program will try to keep track of your sources and destinations and will prioritize backups according to need. This is obviously more useful when youre backing up a larger number of PCs, but it illustrates where Retrospects strengths are.

Probably the most salient omission froms Solo is restore to dissimilar hardware for the disaster recovery media. This is not the issue it once was, as Windows now has standard drivers that will work with just about any hardware, but if you need it, its a $99 add-on. Note that to create recovery media, you must download the Microsoft Assessment and Deployment Kit. Thats a bit of a pain, as is being forced to get vendor connection tokens manually to use online storage. Thats about it for complaints.

There are lot of other add-ons such for enterprise, such as open file backup and the management console, but those wont be of much interest to the average user.

Retrospect, PCWorld, and I go a long way back. The backups of the magazine were performed using the program and 8mm tape for a very long time. Said backups were were extremely reliable. Extremely, as in we never had an issue that wasnt tape-related. Being largely a Mac product, Apples Time Machine hurt sales significantly with the average user, and though Retrospect never disappeared, it faded from consumer-level awareness.

Retrospect supports all types of media, including online services.

I tested Retrospect to local media (external hard drives and SSDs) and my main NAS box using a 250GB data set. I had zero issues backing and restoring, and speed was on a par with, or better than, the competition. With computers as fast as they are these days, performance is almost never an issue, even with heavy compression. Creating the recovery disk required the aforementioned download, but worked as advertised.

Most everyday users will be fine with one of the free backup software options such as those available from your operating system or from Easeus or Aomei and others. On the other hand, anyone who desires ultra-fine control over their backups and support for every type of media in existence will appreciate Retrospect. For those, the $50 will be money well spent. Theres a 45-day free trial available if youd like to kick the tires yourself.

See original here:
Retrospect 17 Solo review: Backup software that gives you everything - PCWorld

Read More..

Microsoft Office For Android: Is it Any Good? – groovyPost

Share

Share

Share

Email

Earlier in 2020, Microsoft rolled out an Android version of whats called a unified Office mobile app. The app includes Word, Excel, and Powerpoint all in one mobile application.

Previous to this rollout, you needed to install individual mobile apps for Word, Excel, and Powerpoint. Now you can get all three in one Microsoft Office app for Android or for iOS.

If youre curious about installing Microsoft Office Mobile, the following review should help you decide whether or not its right for you.

The moment you install and launch the Microsoft Office app, youll notice how quickly it runs. The app launches in seconds, and tapping items changes the window almost immediately.

Beyond the small footprint of the app, youll also notice that its intuitive. Finding your way is simple.

In the home screen, youll see any previous documents you were working on, as well as a list of any older files in your OneDrive account.

To get started using either Word, Excel, or Powerpoint, you just have to tap the + icon at the bottom of the screen. This brings up three icons.

The folder icon at the upper right of the home screen takes you to the Browse window. This is where you can see files in your OneDrive account, Google Drive, or items stored locally on your mobile device. You can also see any documents other users have shared with you, or add a new cloud storage account that you want to use with Microsoft Office mobile.

If you tap the personal OneDrive account, youll notice that it may look familiar if youre a Google Drive user. Navigating OneDrive directories and files inside this app is very similar to navigating Google Drive using the Google Drive app.

You tap folders to drill into them, and tap files to open them. Three dots to the right of file names provide options to share or see the file properties.

When you tap Documents from the main screen, youll see the option to open Word, Excel, or Powerpoint. Youll notice an icon to Scan text for opening Word.

If you tap Scan text, itll switch to the camera. As the app attempts to recognize text on the page, youll notice a red box around the outside of the text block.

Once its in-focus, press the white button at the bottom of the window. The Office mobile app will use optical character recognition (OCR) to convert the printed text document into a Word document.

OCR in the Office mobile app is surprisingly accurate. Its an excellent way to capture documents that you can edit later.

Using the mobile Word app is surprisingly easy, even on a small mobile screen. Youll see all of the common Word functions that are normally in the ribbon by tapping the up arrow at the bottom of the window.

These include the things youd expect, like:

The free version of Microsoft Office mobile has far fewer features than if you have an Office 365 subscription. However, even the free version is useful for all of your standard document needs.

Excel inside this Office mobile app is just as intuitive. All of the features youd expect to find in Excel is available. Its also easy to navigate and edit spreadsheets with just your fingers and the on-screen keyboard.

Tap in any cell and type = to start using functions. As you type, youll see a list of functions that start with those letters. If youre not sure what function you want, tap fx at the upper left corner of the screen and search through the functions directory.

Microsoft has made doing certain tasks youd think would be difficult, very easy. For example, the resize multiple cells, just drag your finger to highlight them and use the circles on each side to resize the cells.

Word, Excel, and PowerPoint all come with useful templates you can use to save time when creating new documents. Excel includes the most useful ones like budgets, task management, and organizers.

Functions from the desktop app that youll find in this mobile version of Excel include:

You wont find advanced VBA or macros in this online version, but for most Excel users itll have everything you need.

You can also add multiple tabs to your spreadsheets by tapping the tabbed folder icon at the lower-left corner. Then, tap the + icon on the right of the tabs.

Tap the tab and select Rename to rename the tab. You can also change its color, duplicate it, hide, move, and delete tabs.

You can easily share your spreadsheets with others by tapping the three connected dots share icon at the upper right of the window. This will bring up a Share window.

You can share the file as a link or as an attachment via email. Or, simply type email addresses into the Invite people to this file field. Those people will need to use their Office 365 account (free or paid) to access your shared file.

Again, this looks very similar to how Google handles file sharing in Google Drive. It seems that Microsoft is taking a few pages from Googles playbook.

If creating a PowerPoint presentation inside a mobile app scares you, rest assured that inside the Office Mobile app its not hard at all.

When you first launch PowerPoint, you can choose a theme to start with (highly recommended). Then, just type the text into each slide, add notes, and add any pictures you like as well.

To add another slide, just tap the + icon to the right of the slide deck.

Youll see tools on the bottom of the screen to add pictures, shapes, or text to your slides. Most of the simple text and shape formatting options youd expect are available.

The real power behind this app comes from its casting feature. If you tap the presentation icon (a picture of a TV on a stand) in the menu bar, the presentation launches in full-screen mode. Tap the screen and youll see a cast icon at the top. Tap this to view available Chromecast devices on your network.

When you select that device it will play the presentation slides in full-screen on that television. Meanwhile, on your mobile device, youll see the slide along with the notes underneath it.

This makes giving presentations much more enjoyable. You can use your phone to glance at your notes for the slide, while your audience can only see the slide presentation.

Even if you dont use the PowerPoint mobile app to create your presentations, it would be worthwhile to save your desktop created presentations to your OneDrive account. Then, you can open it with your mobile device to give your presentation.

One major issue with Android is that there has never been a very good note-taking app available for the platform. Microsoft Notes in the Mobile Office app changes all of that.

Note-taking is fast and easy with Notes. It also lets you change the background, edit and format the text, make quick bullet lists, and more.

Its also very easy to share those notes with other users by using the same sharing feature as the other apps.

From the main screen, if you tap the Actions icon at the bottom, youll see a list of other useful features.

These features include:

As you can see, the Microsoft Office mobile app is like six or seven apps all built into one. For a Microsoft product, its surprisingly intuitive and easy to learn.

If you havent tried the Office mobile app yet, give it a try. Who knows, you might find yourself using it more than you use Google Drive apps!

Read this article:
Microsoft Office For Android: Is it Any Good? - groovyPost

Read More..

IoT news of the week for April 24, 2020 – Stacey on IoT

This is one of the connected tools in the ABB Power Grid plant. Image courtesy of Ericsson.

Spectrum for 6GHz Wi-Fi gets OKd: The world of Wi-Fi is about to get a super fast lane for new devices thanks to the FCC voting on Thursday to approve 1,200 megahertz of spectrum in the 6GHz band. This will add to the existing 5GHz and 2.4 GHz bands already in use for Wi-Fi. The new spectrum will be used for Wi-Fi 6E, with the Estanding for enhanced. Like the new Wi-Fi 6 standard, it will use a different modulation scheme to improve the way packets flow on Wi-Fi networks, reducing latency. But because theres so much more room in the 6GHz band, it will also allow for much faster data rates. The caveat is that older, non-WiFi 6 devices cant hop into this fast lane, which will keep data flowing quickly but also means older devices wont get the benefit. So dont rush out and get your Wi-Fi 6E routers anytime soon unless you plan on running Wi-Fi 6 devices on the network. (FCC) Stacey Higginbotham

This is big news in the world of autonomous vehicles: The dirty little secret in the world of autonomous vehicles is that in most cases, youstill need a human operator. For companies seriously building in this space, the question is how many human operators. This month, Einride, which makes autonomous, electric commercial trucks, showed off one operator remotely controlling two autonomous trucks at the same time. Einride says it plans to expand that number to 10 trucks per operator. (InsideEVs) Stacey Higginbotham

I think this is a 5G screwdriver, yall: Telecom giant Ericsson and ABB Power Grid, which makes power transformers and distribution equipment,put out a press release this week touting the 5G factory environment that Ericsson has built for ABB Power Grid. The release says ABB Power Grids factory inLudvika is attaching essential tools, such as cordless screwdrivers, to the network as part of a factory optimization effort. So, it sounds like somewhere in Sweden theres a 5G industrial cordless screwdriver. I have to wonder about that battery life. (Ericsson) Stacey Higginbotham

Google opens its Healthcare API: After more than a decade of hope, the coronavirus is helping to push a variety of changes into the healthcare system that could make it much easier to deliver telemedicine and get access to your medical records in a standard format. This is a good thing. Googles contribution is an open API that will take medical records from different providers and organize them in Googles Cloud. Of course, if they want to store those records, they will need to pay for Googles cloud storage.(CNBC) Stacey Higginbotham

Want to understand the difference between MQTT and LwM2M messaging protocols?Ifyou do, then check out the white paper published by IoT testing house MachNation, which looks at the trade-offs associated with each protocol. Both are used in the IoT, although MQTT is far more common. Lightweight M2M, meanwhile, is popular in cellular networks, and while one of the papers sponsors is AT&T, its worth a look if youre wondering which messaging protocol works for your job. Note as well that MQTT is getting a lot of support from organizations building open-source add-ons to improve some of its shortcomings.(MachNation) Stacey Higginbotham

Scary robots help hospitals with COVID-19:Youve probably seen videos of Boston DynamicsSpot, its somewhat terrifying line of dog-like robots. It turns out theyre doing good work at hospitals. The company said this week that health care facilitiesreached out in March to see if the four-legged robots could be used fora mobile telemedicine platform. The first facility Spot was deployed to wasBrigham and Womens Hospital in Boston; hes been there for the past two weeks, equipped with an iPad on its back. His presence allows doctors and nurses to have two-way video chats with patients without any risk of virus spread. Good dog! But I still think theyre scary. In the future, the company hopes to equip Spot with sensors to measure a patients temperature, pulse, and oxygen saturation levels.(Boston Dynamics) Kevin Tofel

Raspberry Pi lookalike device has a powerful AI chip inside: Nvidia is widely known among consumers for its graphical processing units and cards for gaming, but those who follow IoT know Nvidias chips can power AI and ML applications, too. And if youre into artificial intelligence development, you might want oneof thesecompact computers with Nvidias Jetson chips packed inside. Based on its appearance, I first thought these small devices were a cheap Raspberry Pi. Nope. These are similar on the outside but have enough compute power to provide 32 TOPS (32 trillion operations per second). Of course, that kind of performance will cost you between $450 and $1,100, to be exact, depending on the model.(AAEON) Kevin Tofel

Are we one step closer to a universalbrain-computer interface?I admit Ive watched The Matrixone too many times and want to see a brain-computer interface (BCI). Just the idea of thinking about something and tapping the vast knowledge of the internet to get more information in milliseconds sounds amazing. Were not there yet, of course, and most research on BCIs is currently aimed at people wearing prosthetics or battling a disability. For those people, there may be an improvement on the horizon. Carnegie Mellon and the University of Pittsburgh have published research that could remove the current requirement to recalibrate devices that use a BCI. This article is an interesting look into what could be next, which is me hopefully jacking into the web from my noggin. Oh, and for you other Matrix fans, there is no spoon.(TNW) Kevin Tofel

Home Assistantautomations can supercharge your smart home:Ive spent the last few weeks digging into the automation functions of Home Assistant and Im completely impressed. They are easy to set up now that the software is moving away from text file configurations to a card system based on triggers, events, and actions. And they even use an open-source natural language processing system to better understand what youre trying to automate. Folks who have been telling me that Home Assistant makes store-bought hubs look like toys, you were right! (StaceyOnIoT) Kevin Tofel

Related

More:
IoT news of the week for April 24, 2020 - Stacey on IoT

Read More..

More than just chat using Teams as a SharePoint front end to manage your small business documents – OnMSFT

With more and more users of Microsofts products working from home, small businesses and their users are looking to find the right tool(s) to manage their business documents. Should the business use SharePoint, Teams, or something like OneDrive for Business?

Earlier today, Reddit user JuIT03 asked a very good question on the Office 365 subreddit:

I was wondering for smaller businesses (around 50 employees) who dont require SharePoint sites for each area (i.e. Sales) we could use One Drive for Business from the main account (director or someone) and then set up the folders out from there to treat it more as a file server?

Well, one easy answer to that question would be to use Microsoft Teams to manage your documents as it provides the functionality of SharePoint, the storage capabilities of OneDrive, and the usability of a collaboration of tool like Slack all rolled into one.

Since the launch of Microsoft Teams, Microsoft bundled many of its Microsoft 365 applications into one super-charged platform that is designed from the ground up to be a web-based collaboration space including document management and storage. In fact, Microsoft Teams gives users the best of SharePoint, but with an entirely new front-end experience. Teams uses SharePoint to create Teams Sites, which are document libraries for all things shared and can be referenced easily within any Teams conversation. Teams can also be used to show OneDrive and SharePoint document libraries, new items, and even show content as a website. This graphic shows you how SharePoint and OneDrive have been integrated into the Teams ecosystems:

Unlike SharePoint and OneDrive, Teams is designed from the group up for collaboration, giving users the ability to share any document or file inside the chat window or conversation. SharePoint and OneDrive both require additional steps if someone wants to share a document or file with another team member, whereas Teams can give anyone the ability to easily share a file inside any conversation. There are several easy options inside of Teams to manage, store, and share documents and files.

For example, inside any chat window, you will see a dialogue box to attach a file to a chat conversation.

Share any file with OneDrive in Microsoft Teams

Microsoft Teams also has another unique feature to quickly add access to files and apps in Teams. Users can simply select the + symbol.

use the + symbol to add files and apps.

Once the pop-up window opens, you can then select the app or file tab that you want to add to your chat windows. For this writing, I do a lot of note-taking in OneNote so this makes it very easy to quickly share my cloud-based notes with other team members.

Easily add apps and files to Microsoft Teams.

Users can also attach additional cloud storage options, as well as review recent files and downloads inside Microsoft Teams using the Files dialogue box on the left-hand side.

add cloud storage and review files in Teams.

Teams is an entirely new Microsoft experience. It takes the best of SharePoint and OneDrive, and makes those services usable with Microsoft Teams user-friendly front-end. Reddit user /r/PeterH9572 summarized it well.

Microsoft Teams lets a few people be owners, manage the files, and membership as they see fit, and we encourage people to move away from it is a shared file, but instead use collaboration! Why share a file then email or phone about it when you can have a team and all the chat, meetings, updates and the file itself are in one place and can be seen by everyone in the team without having to keep clicking the share button or referring back to your email or a half-remembered IM chat?

Microsoft is continuing to add new features to Teams like new custom backgrounds and multi-chat windows to make it more user-friendly. Tell us what you think, do you prefer Teams to SharePoint? Sound off in the comments below!

Feature image credit: Tracy Van der Schyff

Go here to read the rest:
More than just chat using Teams as a SharePoint front end to manage your small business documents - OnMSFT

Read More..

The digital spring clean: how to sort out your passwords, privacy and bulging photo folder – The Guardian

There are, as always, two kinds of people in the world: those who are wondering what to do with all their free time, and those who are wondering what happened to it. The split seems to be closely correlated with the number of children who live with you.

If you are in the former group, you, like me, may have exhausted a significant quantity of procrastination cleaning. I have vacuumed under the sofa, changed the filter on my cooker hood, and even started painting the kitchen.

So why not introduce a digital component to the great tidy-up? Your laptops downloads folder might not literally collect dust, but whether physical or digital, the longer you leave things to fester, the harder they become to eventually deal with.

We all do it: its the honeymoon period with a new app, freshly downloaded, full of possibility. It asks for notification access and you grant it. Then nine months go by, and suddenly it is flashing up a push alert for a 10% off code for an annual subscription if you refer three friends. You dismiss the notification and get on with your day, but the app keeps showing up never enough to prompt you to action, but frustrating all the same.

So head to your notification settings, and search for the apps you actually want to hear from. A good rule of thumb is, only give notification access to apps that will send you real messages from real people. Oh, and maybe your favourite news app.

Its easier than ever to take photos, and have more of them than ever are stored on our devices. So its harder than ever to find the pictures that we want to look at.

AI helps a bit: Apple is moderately good at letting you search for pictures by who is in them, what they are of, or where they were taken; Google does the same job better, with a privacy trade-off. But if you want a photo library that serves a purpose beyond hoarding, you will have to delete some pictures.

Screenshots are a good target, as is clearing out all but one of every image of which you took 15 versions. And why not trim your selfie folder to just the greatest thirst traps, chucking those sunsets that dont quite match the reality of being there. You could save yourself money how many of us are paying for extra cloud storage to avoid tackling this mess head-on? And you would be reducing your carbon footprint too.

If you dont use a password manager, your digital life is insecure. I have heard it all, from people who insist that they have an uncrackable system (putting amaz0n at the end of one password and faceb00k at the end of the other is less secure than you think) to people who swear blind that they have memorised a unique password for every site they visit (until they are pushed, when they admit that yes, they have one password they reuse for unimportant sites).

The truth is, most hacks I hear about are due to credential stuffing using stolen login-password combinations from one site to breach another, thanks to the fact that people just cant stop reusing passwords. So download a password manager, such as 1Password or Dashlane they tend to be easier to use and more flexible than the built-in options from Apple and Google, although those work in a pinch and devote some time to switching your bad passwords to good random ones.

Then, turn on two-factor authentication everywhere you can. This requires you to type in a code, as well as your password, every time you log in, and offers some protection against phishing attacks. Try to avoid text message-based systems if you can, though: instead, get an app such as Authy, or use the built-in two factor tools in services such as 1Password, to store the codes you generate.

At the very least, you should do this for Amazon, Twitter, Facebook and Google, and if you want to get serious about it, a YubiKey (a small physical dongle that plugs in to your phone or computer) can do the same thing even faster.

Just like phone notifications, unwanted email is an efficiency nightmare. It is quicker to hit delete and move on, but over time, it would be quicker to unsubscribe from all those emails you never read. So do it! Trawl through your deleted emails, and click on unsubscribe on those you no longer want to receive.

Automated services will do this for you, but these are a privacy nightmare one of the most famous, unroll.me, apologised in 2017 after it emerged that its business model involved selling user data gathered from the inboxes it monitored.

This one is easy: go to haveIbeenpwned.com, and type in every email address you have. Then, when the site inevitably tells you that your personal information has been stolen by hackers numerous times, get a password manager.

I cant tell you to delete Facebook. The site remains pivotal to the social lives of many, and its hooks into other services mean that even if you rarely go to Facebook.com, deleting your account might be a difficult choice. But I can suggest that you strongly consider it: Facebook is the ground zero for many of the disordered digital habits that a spring clean is supposed to help, from receiving manipulative notifications to endless scrolling.

If you cant bring yourself to delete your account, then deleting the app is a good step towards it: doing so will help heighten your sense of whether or not you really enjoy using Facebook, or just click on it because its there.

Google is admirably open about all the ways it keeps track of your every move and utterance. The site stores its surveillance history in public, for you to check, at myactivity.google.com. A visit there will reveal everything Google has been monitoring, from your web searches, to the YouTube videos you watch, to where you go and what you say to your phone.

The good news is, its easy to delete it all, to set up automatic deletions going forward, or even just to prevent the company tracking you at all. I did the latter, and havent looked back since.

Neat file systems are alike; each messy one is messy in its own way and an awful lot of them involve storing everything on the desktop. Still, without knowing what horrors you have inflicted on your poor hard drive, I cant tell you how to fix them. But I can suggest one area you have probably let slide: your downloads folder.

If you are anything like me, the downloads folder is a mixture of things you never meant to download, things that you have already copied over elsewhere, installed, or added to a library, and things that you needed once then forgot about. So clear them out but be careful, because everyone also has one file in their downloads folder that is irreplaceable, essential, and named something like Dwnld124067395. Make sure you move that one somewhere safer, and rename it.

Ross Sleight, of the digital consultancy Somo, suggests this: Regularly check and clear the third-party sites and apps that are using your Facebook or Google ID as login information. Sharing this info makes it faster for you to create accounts, but its worth reviewing and revoking the access for sites and apps youve not used for a while.

Facebooks cybersecurity is pretty good, but if you gave access to your profile to what Hollywood celebrity are you dot tv in 2009, and that gets hacked, there isnt much Facebook can do to stop criminals wreaking havoc on your digital life. Block outdated integrations now, before you regret it later.

Go here to read the rest:
The digital spring clean: how to sort out your passwords, privacy and bulging photo folder - The Guardian

Read More..

Will Quantum Computing Really Change The World? Facts And Myths – Analytics India Magazine

In recent years, some big tech companies like IBM, Microsoft, Intel, or Google have been working in relative silence on something that sounds great: quantum computing. The main problem with this is that it is difficult to know what exactly it is and what it can be useful for.

There are some questions that can be easily solved. For example, quantum computing is not going to help you have more FPS on your graphics card at the moment. Nor will it be as easy as changing the CPU of your computer for a quantum to make it hyperfast. Quantum computing is fundamentally different from the computing we are used to, but how?

At the beginning of the 20th century, Planck and Einstein proposed that light is not a continuous wave (like the waves in a pond) but that it is divided into small packages or quanta. This apparently simple idea served to solve a problem called the ultraviolet catastrophe. But over the years other physicists developed it and came to surprising conclusions about the matter, of which we will be interested in two: the superposition of states and entanglement.

To understand why we are interested, lets take a short break and think about how a classic computer works. The basic unit of information is the bit, which can have two possible states (1 or 0) and with which we can perform various logical operations (AND, NOT, OR). Putting together n bits we can represent numbers and operate on those numbers, but with limitations: we can only represent up to 2 different states, and if we want to change x bits we have to perform at least x operations on them: there is no way to magically change them without touching them.

Well, superposition and entanglement allow us to reduce these limitations: with superposition, we can store many more than just 2 ^ n states with n quantum bits (qubits), and entanglement maintains certain relations between qubits in such a way that the operations in one qubit they forcefully affect the rest.

Overlapping, while looking like a blessing at first glance, is also a problem. As Alexander Holevo showed in 1973, even though we have many more states than we can save in n qubits, in practice we can only read 2 ^ n different ones. As we saw in an article in Genbeta about the foundations of quantum computing: a qubit is not only worth 1 or 0 as a normal bit, but it can be 1 in 80% and 0 in 20%. The problem is that when we read it we can only obtain either 1 or 0, and the probabilities that each value had of leaving are lost because when we measured it we modified it.

This discrepancy between the information kept by the qubits and what we can read led Benioff and Feynman to demonstrate that a classical computer would not be able to simulate a quantum system without a disproportionate amount of resources, and to propose models for a quantum computer that did. was able to do that simulation.

Those quantum computers would probably be nothing more than a scientific curiosity without the second concept, entanglement, which allows two quite relevant algorithms to be developed: quantum tempering in 1989 and Shors algorithm in 1994. The first allows finding minimum values of functions, which So said, it does not sound very interesting but it has applications in artificial intelligence and machine learning, as we discussed in another article. For example, if we manage to code the error rate of a neural network as a function to which we can apply quantum quenching, that minimum value will tell us how to configure the neural network to be as efficient as possible.

The second algorithm, the Shor algorithm, helps us to decompose a number into its prime factors much more efficiently than we can achieve on a normal computer. So said, again, it doesnt sound at all interesting. But if I tell you that RSA, one of the most used algorithms to protect and encrypt data on the Internet, is based on the fact that factoring numbers are exponentially slow (adding a bit to the key implies doubling the time it takes to do an attack by force) then the thing changes. A quantum computer with enough qubits would render many encryption systems completely obsolete.

Until now, quantum computing is a field that hasnt been applied much in the real world. To give us an idea, with the twenty qubits of the commercial quantum computer announced by IBM, we could apply Shors factorization algorithm only to numbers less than 1048576, which as you can imagine is not very impressive.

Still, the field has a promising evolution. In 1998 the first ord quantum drive (only two qubits, and needed a nuclear magnetic resonance machine to solve a toy problem (the so-called Deutsch-Jozsa problem). In 2001 Shors algorithm was run for the first time. Only 6 years later, in 2007, D-Wave presented its first computer capable of executing quantum quenching with 16 qubits. This year, the same company announced a 2000 qubit quantum quenching computer. On the other hand, the new IBM computers, although with fewer qubits, they are able to implement generic algorithms and not only that of quantum quenching. In short, it seems that the push is strong and that quantum computing will be increasingly applicable to real problems.

What can those applications be? As we mentioned before, the quantum tempering algorithm is very appropriate for machine learning problems, which makes the computers that implement it extremely useful, although the only thing they can do is run that single algorithm. If systems can be developed that, for example, are capable of transcribing conversations or identifying objects in images and can be translated to train them in quantum computers, the results could be orders of magnitude better than those that already exist. The same algorithm could also be used to find solutions to problems in medicine or chemistry, such as finding the optimal treatment methods for a patient or studying the possible structures of complex molecules.

Generic quantum computers, which have fewer qubits right now, could run more algorithms. For example, they could be used to break much of the crypto used right now as we discussed earlier (which explains why the NSA wanted to have a quantum computer). They would also serve as super-fast search engines if Grovers search algorithm can be implemented, and for physics and chemistry, they can be very useful as efficient simulators of quantum systems.

Unfortunately, algorithms and codes for classic computers couldnt be used on quantum computers and magically get an improvement in speed: you need to develop a quantum algorithm (not a trivial thing) and implement it in order to get that improvement. That, at first, greatly restricts the applications of quantum computers and will be a problem to overcome when those systems are more developed.

However, the main problem facing quantum computing is building computers. Compared to a normal computer, a quantum computer is an extremely complex machine: they operate at a temperature close to absolute zero (-273 C), the qubits support are superconducting and the components to be able to read and manipulate the qubits are not simple either.

What can a non-quantum quantum computer be like? As we have explained before, the two relevant concepts of a quantum computer are superposition and entanglement, and without them, there cannot be the speed improvements that quantum algorithms promise. If computer disturbances modify overlapping qubits and bring them to classical states quickly, or if they break the interweaving between several qubits, what we have is not a quantum computer but only an extremely expensive computer that only serves to run a handful of algorithms. equivalent to a normal computer (and will probably give erroneous results).

Of the two properties, entanglement is the most difficult to maintain and prove to exist. The more qubits there are, the easier it is for one of them to deinterlace (which explains why increasing the number of qubits is not a trivial task). And it is not enough to build the computer and see that correct results come out to say that there are intertwined qubits: looking for evidence of entanglement is a task in itself and in fact, the lack of evidence was one of the main criticisms of D-systems. Wave in its beginnings.

A priori and with the materials that quantum computers are being built with, it does not seem that miniaturization is too feasible. But there is already research on new materials that could be used to create more accessible quantum computers. Who knows if fifty years from now we will be able to buy quantum CPUs to improve the speed of our computers.

comments

View original post here:
Will Quantum Computing Really Change The World? Facts And Myths - Analytics India Magazine

Read More..

Google’s top quantum computing brain may or may not have quit – Fudzilla

We will know when someone opens his office door

John Martinis, who had established Googles quantum hardware group in 2014, has cleaned out his office, put the cats out and left the building.

Martinis says a few months after he got Googles now legendary quantum computing experiment to go he was reassigned from a leadership position to an advisory one.

Martinis told Wired that the change led to disagreements with Hartmut Neven, the longtime leader of Googles quantum project.

Martinis said he had to go because his professional goal is for someone to build a quantum computer.

Google has not disputed this account, and says that the company is grateful for Martinis contributions and that Neven continues to head the companys quantum project.

Martinis retains his position as a professor at the UC Santa Barbara, which he held throughout his tenure at Google, and says he will continue to work on quantum computing.

To be fair, Googles quantum computing project was founded by Neven, who pioneered Googles image search technology, and got enough cats together.

The project took on greater scale and ambition when Martinis joined in 2014 to establish Googles quantum hardware lab in Santa Barbara, bringing along several members of his university research group. His nearby lab at UC Santa Barbara had produced some of the most prominent work in the field over the past 20 years, helping to demonstrate the potential of using superconducting circuits to build qubits, the building blocks of quantum computers.

Googles ground-breaking supremacy experiment used 53 qubits working together. They took minutes to crunch through a carefully chosen math problem the company calculated would take a supercomputer 10,000 years to work out. It still does not have a practical use, and the cats were said to be bored with the whole thing.

Continue reading here:
Google's top quantum computing brain may or may not have quit - Fudzilla

Read More..

On the Heels of a Light Beam – Scientific American

As a 16-year-old boy, Albert Einstein imagined chasing after a beam of light in the vacuum of space. He mused on that vision for years, turning it over in his mind, asking questions about the relation between himself and the beam. Those mental investigations eventually led him to his special theory of relativity. Such thought experiments, which Einstein referred to by the German term gedankenexperiment, continue to nourish the heart of physics today, especially in the field of quantum mechanics, which he helped to establish.

In quantum mechanics, things don't happen, theoretical physicist Stephen L. Adler tells our reporter Tim Folger, referring to the probabilistic nature of quantum reality.

Philosophically, this may be true, but it hasn't stopped researchers from testing quantum concepts. Using lasers to excite electrons into emitting photons, a group at Delft University of Technology in the Netherlands ruled out the existence of hidden variables, which Einstein believed were controlling so-called entangled particlesone of the main tenets of quantum theory. Without these mysterious forces, bizarre dynamics could indeed be at work in the quantum world, defying our notions of space and time. Physicist Lee Smolin argues that the fabric of the cosmos is a vast collection of atomic interactions within an evolving network of relations where causality among events is complex and irrespective of distance.

Despite the theoretical mysteries of quantum theory, its real-world applications are growing. Researchers are cooling atomic systems to near absolute zero for use as quantum simulators to study applications in superconductors and superfluids. Others are using tabletop experiments to monitor the gravitational fields around entangled objectsminuscule gold or diamond spheres, for examplelooking for signs that gravity itself is quantized into discrete bits. At a larger scale, tools such as the Event Horizon Telescope, which recently took the first picture of a black hole, and gravitational-wave detectors could help resolve long-standing, vexing contradictions between quantum mechanics and general relativity.

These quantum insights are fueling tremendous innovation. A team of researchers in China successfully tested superposition over a distance of 1,200 kilometers, paving the way for an unhackable quantum-communications network. Computer scientists are using quantum algorithms to enhance traditional systems, ratcheting up progress toward the heralded quantum computing era. Such applications are still immature, as Elizabeth Gibney reports, yet it's not stopping investors from pouring money into quantum start-ups.

Science historians have argued about whether Einstein accepted the elements of quantum theory that conflicted with his own theories. Who knows whether he could have imagined the applications his ideas engendered. In any case, the thought experiment continues.

See original here:
On the Heels of a Light Beam - Scientific American

Read More..

Advanced Encryption Standard (AES): What It Is and How It Works – Hashed Out by The SSL Store – Hashed Out by The SSL Store

Understanding advanced encryption standard on basic level doesnt require a higher degree in computer science or Matrix-level consciousness lets break AES encryption down into laymans terms

Hey, all. We know of security of information to be a hot topic since, well, forever. We entrust our personal and sensitive information to lots of major entities and still have problems with data breaches, data leaks, etc. Some of this happens because of security protocols in networking, or bad practices of authentication management but, really, there are many ways that data breaches can occur. However, the actual process of decrypting a ciphertext without a key is far more difficult. For that, we can thank the encrypting algorithms like the popular advanced encryption standard and the secure keys that scramble our data into indecipherable gibberish.

Lets look into how AES works and different applications for it. Well be getting a little into some Matrix-based math so, grab your red pills and see how far this rabbit hole goes.

Lets hash it out.

You may have heard of advanced encryption standard, or AES for short but may not know the answer to the question what is AES? Here are four things you need to know about AES:

The National Institute of Standards and Technology (NIST) established AES as an encryption standard nearly 20 years ago to replace the aging data encryption standard (DES). After all, AES encryption keys can go up to 256 bits, whereas DES stopped at just 56 bits. NIST could have chosen a cipher that offered greater security, but the tradeoff would have required greater overhead that wouldnt be practical. So, they went with one that had great all-around performance and security.

AESs results are so successful that many entities and agencies have approved it and utilize it for encrypting sensitive information. The National Security Agency (NSA), as well as other governmental bodies, utilize AES encryption and keys to protect classified or other sensitive information. Furthermore, AES is often included in commercial based products, including but limited to:

Although it wouldnt literally take forever, it would take far longer than any of our lifetimes to crack an AES 256-bit encryption key using modern computing technology. This is from a brute force standpoint, as in trying every combination until we hear the click/unlocking sound. Certain protections are put in place to prevent stuff from like this happening quickly, such as a limit on password attempts before a lockdown, which may or may not include a time lapse, to occur before trying again. When we are dealing with computation in milliseconds, waiting 20 minutes to try another five times would seriously add to the time taken to crack a key.

Just how long would it take? We are venturing into a thousand monkeys working on a thousand typewriters to write A Tale of Two Cities territory. The possible combinations for AES 256-bit encryption is 2256. Even if a computer can do multiple quadrillions of instructions per second, then we are still in that eagles-wings-eroding-Mount-Everest time frame.

Needless to say, its waaaaaaaaaaaaaaaaaaay (theres not enough memory on our computers to support the number of a letters that I want to convey) longer than our current universe has been in existence. And thats just for a 16-byte block of data. So, as you can see, brute forcing AES even if it is 128 bits AES is futile.

That would likely change, though, once quantum computing becomes a little more mainstream, available, and effective. Quantum computing is expected to break AES encryption and require other methods to protect our data but thats still a ways down the road.

Manage Digital Certificates like a Boss

14 Certificate Management Best Practices to keep your organization running, secure and fully-compliant.

To better understand what AES is, you need to understand how it works. But in order to see how the advanced encryption standard actually works, however, we first need to look at how this is set up and the rules concerning the process based on the users selection of encryption strength. Typically, when we discuss using higher bit levels of security, were looking at things that are more secure and more difficult to break or hack. While the data blocks are broken up into 128 bits, the key size have a few varying lengths: 128 bits, 196 bits, and 256 bits. What does this mean? Lets back it up for a second here.

We know that encryption typically deals in the scrambling of information into something unreadable and an associated key to decrypt the scramble. AES scramble procedures use four scrambling operations in rounds, meaning that it will perform the operations, and then repeat the process based off of the previous rounds results X number of times. Simplistically, if we put in X and get out Y, that would be one round. We would then put Y through the paces and get out Z for round 2. Rinse and repeat until we have completed the specified number of rounds.

The AES key size, specified above, will determine the number of rounds that the procedure will execute. For example:

As mentioned, each round has four operations.

So, youve arrived this far. Now, you may be asking: why, oh why, didnt I take the blue pill?

Before we get to the operational parts of advanced encryption standard, lets look at how the data is structured. What we mean is that the data that the operations are performed upon is not left-to-right sequential as we normally think of it. Its stacked in a 44 matrix of 128 bits (16 bytes) per block in an array thats known as a state. A state looks something like this:

So, if your message was blue pill or red, it would look something like this:

So, just to be clear, this is just a 16-byte block so, this means that every group of 16 bytes in a file are arranged in such a fashion. At this point, the systematic scramble begins through the application of each AES encryption operation.

As mentioned earlier, once we have our data arrangement, there are certain linked operations that will perform the scramble on each state. The purpose here is to convert the plaintext data into ciphertext through the use of a secret key.

The four types of AES operations as follows (note: well get into the order of the operations in the next section):

As mentioned earlier, the key size determines the number of rounds of scrambling that will be performed. AES encryption uses the Rjindael Key Schedule, which derives the subkeys from the main key to perform the Key Expansion.

The AddRoundKey operation takes the current state of the data and executes the XOR Boolean operation against the current round subkey. XOR means Exclusively Or, which will yield a result of true if the inputs differ (e.g. one input must be 1 and the other input must be 0 to be true). There will be a unique subkey per round, plus one more (which will run at the end).

The SubBytes operation, which stands for substitute bytes, will take the 16-byte block and run it through an S-Box (substitution box) to produce an alternate value. Simply put, the operation will take a value and then replace it by spitting out another value.

The actual S-Box operation is a complicated process, but just know that its nearly impossible to decipher with conventional computing. Coupled with the rest of AES operations, it will do its job to effectively scramble and obfuscate the source data. The S in the white box in the image above represents the complex lookup table for the S-Box.

The ShiftRows operation is a little more straightforward and is easier to understand. Based off the arrangement of the data, the idea of ShiftRows is to move the positions of the data in their respective rows with wrapping. Remember, the data is arranged in a stacked arrangement and not left to right like most of us are used to reading. The image provided helps to visualize this operation.

The first row goes unchanged. The second row shifts the bytes to the left by one position with row wrap around. The third row shifts the bytes one position beyond that, moving the byte to the left by a total of two positions with row wrap around. Likewise, this means that the fourth row shifts the bytes to the left by a total of three positions with row wrap around.

The MixColumns operation, in a nutshell, is a linear transformation of the columns of the dataset. It uses matrix multiplication and bitwise XOR addition to output the results. The column data, which can be represented as a 41 matrix, will be multiplied against a 44 matrix in a format called the Gallois field, and set as an inverse of input and output. That will look something like the following:

As you can see, there are four bytes in that are ran against a 44 matrix. In this case, matrix multiplication has each input byte affecting each output byte and, obviously, yields the same size.

Now that we have a decent understanding of the different operations utilized to scramble our data via AES encryption, we can look at the order in which these operations execute. It will be as such:

Note: The MixColumns operation is not in the final round. Without getting into the actual math of this, theres no additional benefit to performing this operation. In fact, doing so would simply make the decryption process a bit more taxing in terms of overhead.

If we consider the number of rounds and the operations per round that are involved, by the end of it, you should have a nice scrambled block. And that is only a 16-byte block. Consider how much information that equates to in the big picture. Its miniscule when compared to todays file/packet sizes! So, if each 16-byte block has seemingly no discernable pattern at least, any pattern that can be deciphered in a timely manner Id say AES has done its job.

We know the advanced encryption standard algorithm itself is quite effective, but its level of effectiveness depends on how its implemented. Unlike the brute force attacks mentioned above, effective attacks are typically launched on the implementation and not on the algorithm itself. This can be equated to attacking users as in phishing attacks versus attacking the technology behind the service/function that may be hard to breach. These can be considered side-channel attacks where the attacks are being carried out on other aspects of the entire process and not the focal point of the security implementation.

While I always advocate going with a reasonable/effective security option, a lot of AES encryption is happening without you even knowing it. Its locking down spots of the computing world that would otherwise be wide open. In other words, there would be many more opportunities for hackers to capture data if advanced encryption standard wasnt implemented at all. We just need to know how to identify the open holes and figure out how to plug them. Some may be able to use AES and others may need another protocol or process.

Appreciate the encryption implementations we have, use the best ones when needed, and happy scrutinizing!

Read more:
Advanced Encryption Standard (AES): What It Is and How It Works - Hashed Out by The SSL Store - Hashed Out by The SSL Store

Read More..