Page 3,966«..1020..3,9653,9663,9673,968..3,9803,990..»

Apple made a rare appearance at tech’s biggest conference and defended encryption on the iPhone – Business Insider

Apple's top privacy executive has defended the firm's use of encryption despite its recent clashes with the FBI on the issue.

According to Bloomberg's Mark Gurman, iPhone privacy chief Jane Horvath who was peaking on a panel at this year's CES tech conference in Las Vegas said that iPhones' susceptibility to being stolen means they must be encrypted to protect personal information such as financial and health data.

"Our phones are relatively small and they get lost and stolen," Horvath said, according to CNBC. "If we're going to be able to rely on our health data and finance data on our devices, we need to make sure that if you misplace that device, you're not losing your sensitive data."

It was a rare move for Apple, which normally shuns public appearances at industry conferences. At the 2019 CES, its only visible presence was a massive billboard extolling its privacy practices.

Horvath added that she doesn't support the creation of backdoors to give law enforcement easier access to encrypted phones.

The FBI has clashed with Apple on multiple occasions over access to locked iPhones. Gaston De Cardenas/Reuters

Horvath's remarks came as Apple was sent a letter by the FBI on Monday asking it to help unlock two iPhones belonging to the man suspected of carrying out last month's shooting in Pensacola, Florida, in which three people were killed.

It isn't clear yet to what extent Apple will help, and in the past the firm has refused to help officials access phones belonging to suspected criminals.

In 2015, Apple refused to help when government officials sought access to an iPhone from a terrorist who killed 14 people in San Bernardino, California, in 2015. The FBI persisted regardless, and was eventually able to hack into the device with the help of an unknown third party.

In the aftermath of the San Bernardino case, Apple CEOTim Cook said that creating a so-called "backdoor to the iPhone" was not the answer words echoed at CES by Horvath, who said that "building back doors into encryption is not the way we are going to solve those issues."

Business Insider has approached Apple for comment.

Continued here:
Apple made a rare appearance at tech's biggest conference and defended encryption on the iPhone - Business Insider

Read More..

Encryption Software Market to cross USD 20 Bn by 2026: Global Market Insights, Inc. – Yahoo Finance

The email encryption software market segment is expected to cover more than 25% industry share in 2026 due to the rising uptake of security software to protect data from malware, identity thefts and phishing.

Selbyville, Delaware, Jan. 08, 2020 (GLOBE NEWSWIRE) --

Global Market Insights, Inc. has recently added a new report on encryption software market which estimates the global market valuation for encryption software will cross US$ 20 billion by 2026. The industry growth is attributed to supportive government initiatives to combat cybercrimes and the rising instances of data breaches globally. The growing implementation of disk, email, and mobile encryption capabilities in security suites provided by the cybersecurity vendors to address the evolving threats will augment market growth.

The email encryption software market is expected to hold a share of over 25% in 2026 due to the rising uptake of security software to protect data from malware, identity thefts, and phishing. As email is one of the widely used communication methods used by enterprises, the demand for email data protection software to secure various aspects of email systems including content, media attachments or email access increases. The software encrypts data in transit and at rest and also supports multi-factor authentication for additional security, ensuring that sensitive information is always protected in line with regulatory compliance.

Request for a sample of this research report @ https://www.gminsights.com/request-sample/detail/4484

The on-premise deployment model segment held over 70% of the market share in 2019 and is projected to maintain a dominant position over the forecast timeline. The enterprises prefer an on-premise deployment model approach due to the high security associated with managing sensitive data in-house and gain access to cryptography keys for enhanced security. However, with the growing popularity of cloud platforms to store enterprise data due to high scalability and cost benefits, the demand for cloud-based encryption software is expected to accelerate over the forecast timeline.

Story continues

The retail sector will also observe the heavy uptake of encryption over the projected timeframe owing to the need to protect customer data throughout a retailers operations. The sector is witnessing a huge usage of third-party services to support online transactions, optimizing customer experience on their websites. This has led to a rise in the number of data breaches, exploiting sensitive customer information such as credit card & bank account details and personal credentials. According to a report published by Thales eSecurity, a cybersecurity provider, around 75% of the U.S. retailers have experienced a breach in 2018 as compared to 52% in 2017, exceeding the global average. The demand for cybersecurity solutions will rise significantly from 2020 to 2026, preventing theft & customer information compromise.

Browse key industry insights spread across 260 pages with 269 market data tables and 26 figures & charts from the report, Encryption Software Market Size, By Component (Software [Endpoint Encryption, Email Encryption, Cloud Encryption], Service [Training & Consulting, Integration & Maintenance, Managed Service]), By Deployment Model (On-Premise, Cloud), By Application (IT & Telecom, BFSI, Healthcare, Retail, Government & Public Sector, Manufacturing), Industry Analysis Report, Regional Outlook, Growth Potential, Competitive Market Share & Forecast, 2020 2026 in detail along with the table of contents:

https://www.gminsights.com/industry-analysis/encryption-software-market

Latin America encryption software market is expected to grow at a CAGR of over 18% from 2020 to 2026 due to the rising number of cyberattacks on the business-critical infrastructure, growing usage of digital platforms among enterprises to conduct business transactions, and supportive government initiatives to promote cybersecurity. The rapidly evolving threat landscape has compelled public & private enterprises to promote digital security to safeguard sensitive business information. The government agencies in the countries including Mexico, Brazil, and Argentina are introducing cybersecurity strategies to respond to a wide array of cyberattacks.

Some major findings of the encryption software market report include:

The industrial verticals including healthcare, retail, and BFSI witnessed the heavy adoption of data protection solutions to protect sensitive/non-sensitive data and applications.

According to the HIPPA Journal, globally, the healthcare sector witnessed the highest breach costs, accounting for an average mitigation cost of USD 6.45 million.

The cloud-based encryption software is gaining immense popularity as enterprises are migrating toward cloud platforms to store massively growing enterprise data and to leverage benefits in the form of on-demand scalability and reduced operational expenses.

Various small cybersecurity vendors and emerging startups are emerging in the market, offering a wide range of solutions to cater to the security needs of enterprises, expanding their customer base.

The emerging startups, including Enveil (U.S.), Cosmian (Paris), Duality (U.S.), PreVeil LLC (U.S.) are focusing on fund-raising activities to develop new offerings and support business expansion.

The competition in the encryption software market is characterized by strategic partnerships, new product launches, and geographic expansion. For instance, in November 2019, Sophos partnered with Telefonica UK (O2) to provide its products & services to Telefonicas customers in the UK. The partnership enables the customers to gain access to Sophos Central cloud-based security platform to secure their organizations. The companys products & services also enable customers to minimize cybersecurity risks by using behavioral analytics and machine learning to identify known & unknown threats. In August 2018, Kapalya, a Hawaii-based cybersecurity startup, introduced a data protection solution to secure data at rest and data in transit on private & public clouds and mobiles. The platform allows users to work on any device, ensuring end-to-end encrypted file sharing.

Make an inquiry for purchasing this report @ https://www.gminsights.com/inquiry-before-buying/4484

Partial chapters of report table of contents (TOC):

Chapter 3. Encryption Software Industry Insights

3.1. Introduction

3.2. Industry segmentation

3.3. Industry landscape, 2015 2026

3.4. Evolution of encryption software

3.5. Encryption software industry architecture

3.6. Encryption software industry ecosystem analysis

3.7. Technology & innovation landscape

3.7.1. Quantum cryptography

3.7.2. Honey encryption

3.7.3. Lattice based cryptography

3.8. Regulatory landscape

3.8.1. North America

3.8.1.1. ENCRYPT Act of 2019 (U.S.)

3.8.1.2. Gramm-Leach-Bliley Act of 1999 (U.S.)

3.8.1.3. Personal Information Protection and Electronic Documents Act [(PIPEDA) Canada]

3.8.2. Europe

3.8.2.1. General Data Protection Regulation (EU)

3.8.2.2. Data Protection Authority (DPA) regulations on the transmission of personal data by e-mail (Denmark)

3.8.3. APAC

3.8.3.1. National Law on Cryptography (China)

3.8.3.2. Guide to securing personal data in electronic medium (Singapore)

3.8.4. Latin America

3.8.4.1. Law No. 9,296 of July 24, 1996 (Government Access to Encrypted Communications, Brazil)

3.8.4.2. National Directorate of Personal Data Protection (Argentina)

3.8.5. MEA

3.8.5.1. Policy of Control and Licensing of Commercial Encryption Items (Israel)

3.8.5.2. Regulation of Interception of Communications and Provision of Communication-related Information Act, 2002 (RICA- South Africa)

3.9. Industry impact forces

3.9.1. Growth drivers

3.9.1.1. Stringent regulations on cybersecurity and data privacy compliances

3.9.1.2. Rising concerns over securing enterprise Intellectual Property (IP) assets

3.9.1.3. Increasing proliferation of cloud and virtualization technologies

3.9.1.4. Growing trend of Bring Your Own Devices (BYOD) among enterprises

3.9.2. Industry pitfalls & challenges

3.9.2.1. Complexities in encryption key management

3.9.2.2. Easy availability of pirated and free-to-use encryption software

3.9.2.3. Regulatory restrictions on cryptography and encryption

3.10. Growth potential analysis

3.11. Porters analysis

3.12. PESTEL analysis

Browse complete report table of contents @ https://www.gminsights.com/toc/detail/encryption-software-market

About Global Market Insights

Global Market Insights, Inc., headquartered in Delaware, U.S., is a global market research and consulting service provider; offering syndicated and custom research reports along with growth consulting services. Our business intelligence and industry research reports offer clients with penetrative insights and actionable market data specially designed and presented to aid strategic decision making. These exhaustive reports are designed via a proprietary research methodology and are available for key industries such as chemicals, advanced materials, technology, renewable energy and biotechnology.

Contact Us:Arun HegdeCorporate Sales, USAGlobal Market Insights, Inc.Phone: 1-302-846-7766Toll Free: 1-888-689-0688Email: sales@gminsights.com

Link:
Encryption Software Market to cross USD 20 Bn by 2026: Global Market Insights, Inc. - Yahoo Finance

Read More..

Data Encryption Software Market Size by Top Leading Key Players, Growth Opportunities, Incremental Revenue , Trends, Outlook and Forecasts to 2025 -…

The GlobalData Encryption Software Market2020 report implement in-depth research of the industry with a focus on the current market trends future prospects. The GlobalData Encryption Software Marketreport aims to provide an overview ofData Encryption Software Marketplayers with detailed market segmentation by product, application and geographical region. It also provides market share and size, revenue forecast, growth opportunity. The most recent trending report WorldwideData Encryption Software MarketEconomy by Manufacturers, Regions, kind and application, forecast to 2025 provided byReports and Reportsis an educational study covering the marketplace with detailed analysis.

Data Encryption Software Market analysis and forecast report says that it is all set to exhibit a growth by the end of 2025, at a convincing CAGR from 2018-2025. The report portrays the present condition and the growth prospects of the global Data Encryption Software Market. To derive the future market size and status, the report studies historical data of sales volume and revenue from 2018. Analyzed based on the market segments such as key market players, regions, product type and application, this research report proves to be a comprehensive guideline for every vertical of the Data Encryption Software Market industry.

GetFree Sample Copy of Data Encryption Software Market:https://www.reportsnreports.com/contacts/requestsample.aspx?name=2806439

The GlobalData Encryption Software MarketReport provides database which pertains to the current and contemporary discovery and the new technology which has been induced in theData Encryption Software Market, thereby helping the investors to understand the impact of these on the market future development. Also, the Report comprises of an extensive study on the GlobalData Encryption Software Marketstatus, future forecast, growth opportunity, proportion, demand, key market and key players which helps the retailers and participants to be aware of the shortcomings, market threats and the plausible profitable opportunities which market can offer. Furthermore, the inculcation of industrys size, revenue, consumption helps in educating oneself of the political situations and hence, on the basis of that, one can control over a large number of the market share.

Other than the aforementioned parameters whichData Encryption Software Marketreport focuses on, another imperative objective of the report is to present theData Encryption Software Marketdevelopment across the globe especially in North America, Europe, China, Japan, Southeast Asia, India and Central and South America. In the report, the market has been categorized into manufacturers, type, application and regions.

Description

Scope of the Report:The global Data Encryption Software market is valued at xx million USD in 2018 and is expected to reach xx million USD by the end of 2024, growing at a CAGR of xx% between 2019 and 2024.The Asia-Pacific will occupy for more market share in following years, especially in China, also fast growing India and Southeast Asia regions.North America, especially The United States, will still play an important role which cannot be ignored. Any changes from United States might affect the development trend of Data Encryption Software.Europe also play important roles in global market, with market size of xx million USD in 2019 and will be xx million USD in 2024, with a CAGR of xx%.This report studies the Data Encryption Software market status and outlook of Global and major regions, from angles of players, countries, product types and end industries; this report analyzes the top players in global market, and splits the Data Encryption Software market by product type and applications/end industries.

Market Segment by Companies, this report coversDellSophosIBMEsetPkwareGemaltoThales E-SecurityMicrosoftMcafeeSymantecTrend MicroCryptomathicStormshield

Market Segment by Regions, regional analysis coversNorth America (United States, Canada and Mexico)Europe (Germany, France, UK, Russia and Italy)Asia-Pacific (China, Japan, Korea, India and Southeast Asia)South America (Brazil, Argentina, Colombia)Middle East and Africa (Saudi Arabia, UAE, Egypt, Nigeria and South Africa)

Market Segment by Type, coversOn-premisesCloud

Market Segment by Applications, can be divided intoDisk encryptionFile/folder encryptionDatabase encryptionCommunication encryptionCloud encryption

Enquire on Data Encryption Software Market:https://www.reportsnreports.com/contacts/discount.aspx?name=2806439

The regional classification considered for Data Encryption Software Market industry report are North America (U.S., Canada, Mexico, etc.), Asia Pacific (China, Japan, Korea, India, South East Asia etc.), Europe (Germany, UK, France, Italy, Russia, etc.) South America (Brazil, Argentina, Colombia), and Middle East and Africa (Saudi Arabia, UAE, Egypt, Nigeria and South Africa). This report forecasts that Asia-Pacific will occupy more market share in coming years. However, North America, especially The United States, will contribute a major role in market growth followed by Europe with an estimated growth with effective CAGR till 2025.

This report studies the Data Encryption Software Marketstatus and outlook of Global and major regions, from angles of players, countries, product types and end industries; this report analyzes the top players in global market, and splits the Data Encryption Software Marketby product type and applications/end industries.

These details further contain a basic summary of the company, merchant profile, and the product range of the company in question. The report analyzes data regarding the proceeds accrued, product sales, gross margins, price patterns, and news updates relating to the company.

Through this report, the industrial stakeholders will get an insight of the competitive environment of the major manufacturers, the demand of the product type and their application verticals. It will also help in analyzing the future growth opportunities of Data Encryption Software Market industry.

About Us: ReportsnReports.com is your single source for all market research needs. Our database includes 500,000+ market research reports from over 95 leading global publishers & in-depth market research studies of over 5000 micro markets.

We provide 24/7 online and offline support to our customers.

E-mail: [emailprotected]

Phone: +1 888 391 5441

Visit link:
Data Encryption Software Market Size by Top Leading Key Players, Growth Opportunities, Incremental Revenue , Trends, Outlook and Forecasts to 2025 -...

Read More..

Encryption Software Market 2020 Size, Growth By Top Companies, Forecast Analysis To 2027 – Citi Blog News

Verified Market Research has recently published a research report titled, [Global Encryption Software Market Research Report 2020] assessing various factors impacting its trajectory. Analysts have used primary and secondary research methodologies to determine the path of the market. The data includes historic and forecast values for a well-rounded understanding. The global Encryption Software Market is expected to augment in the forecast period owing to various drivers and opportunities that lie in the ever-growing market. This report includes assessment of various drivers, government policies, technological innovations, upcoming technologies, opportunities, market risks, restrains, market barriers, challenges, trends, competitive landscape, and segments.

Global Encryption Software Market was valued at USD 3.32 billion in 2016 and is projected to reach USD 30.54 billion by 2025, growing at a CAGR of 27.96% from 2017 to 2025.

Dell, Thales E-Security, Eset, Symantec, IBM Corporation, Sophos, Ciphercloud, Pkware, Mcafee, Gemalto, Trend Micro, Microsoft Corporation

Global Encryption Software Market : Drivers and Restraints

This section of the report assess various drivers, opportunities, and restrains that lie in the market. These drivers and restraints are determined by various factors such as region, key players, innovations, and others. The report will help readers determine the key drivers and solutions for restraints. It also highlights the possible opportunities. The drivers and restraints are identified by current trends and historic milestones achieved by the market. The chapter on drivers and restraints also offers an evaluation of the investments made in production innovation through the years. The changes in environmental perspective have also been factored in to understand their impact on the growth of the global Encryption Software Market .

Analysts have also highlighted the potential restraints present in the global Encryption Software Market . With the help of market experts the report points out what changes companies can make to overcome these hurdles over the forecast years.

The research report includes segmentation of the global Encryption Software Market on the basis of application, technology, end users, and region. Each segment gives a microscopic view of the market. It delves deeper into the changing political scenario and the environmental concerns that are likely to shape the future of the market. Furthermore, the segment includes graphs to give the readers a birds eye view.

Last but not the least, the research report on global Encryption Software Market profiles some of the leading companies. It mentions their strategic initiatives and provides a brief about their structure. Analysts have also mentioned the research and development statuses of these companies and their provided complete information about their existing products and the ones in the pipeline.

Based on regions, the market is classified into North America, Europe, Asia Pacific, Middle East & Africa and Latin America. The study will provide detailed qualitative and quantitative information on the above mentioned segments for every region and country covered under the scope of the study.

Advanced analytical research solutions within one platform; Verified Market Research. Offering information enriched research studies that include primary and secondary research studies. Verified Market Research assists in understanding holistic industrial factors and trends.

Analysts with high expertise in data gathering and governance utilize industry techniques to collate and examine data at all stages. Our analysts are trained to combine modern data collection techniques, superior research methodology, subject expertise and years of collective experience to produce informative and accurate research reports.

See the original post:
Encryption Software Market 2020 Size, Growth By Top Companies, Forecast Analysis To 2027 - Citi Blog News

Read More..

WidePoint Partners with KoolSpan to Offer End-to-End Encryption for Phone Calls and Text Messages – GlobeNewswire

FAIRFAX, Va. and BETHESDA, Md., Jan. 08, 2020 (GLOBE NEWSWIRE) -- WidePoint Corporation (NYSE American: WYY), the leading provider of Trusted Mobility Management (TM2) specializing in Telecommunications Lifecycle Management, Identity Management and Digital Billing & Analytics solutions and KoolSpan, the provider of TrustCall, have entered into a partnership through which WidePoint delivers KoolSpans cross-platform, end-to-end communication solution to WidePoint customers so that they can make phone calls and send text messages securely.

WidePoint has partnered with KoolSpan to resell TrustCall, the leading secure mobile communications platform to governments and enterprises globally that secures phone calls and messages with end-to-end encryption. TrustCall is an enterprise-grade solution that delivers high performance and HD quality encrypted audio and can be flexibly deployed via the cloud, on premise, or in hybrid form.

KoolSpans TrustCall ensures that devices use end-to-end encryption for all communication paths, which is crucial to improving the security of global telecommunications networks, said Jin Kang, WidePoint President and Chief Executive Officer. By partnering with KoolSpan, we have immediately added a secure communication tool that is directly complementary to our product suite and a critical need for our federal and enterprise clients. We expect this partnership to give us an additional leg up over our competition as we continue to focus on expanding our presence as a leading provider of trusted mobility management services.

Nigel Jones, KoolSpans Chief Executive Officer, stated: WidePoint has a long history of successfully serving both federal agencies and enterprise clients, and by partnering with them, were able to leverage their reputation and relationships to serve a much broader customer base.

Global telecommunications networks are inherently insecure as has been well documented by cyber security experts in the U.S. Government and across the private sector. The threats, from surveillance of communications to theft of IP to corporate espionage, are posed by systemic vulnerabilities in the global telecommunications infrastructure that readily enable interception and monitoring of mobile communications, both voice and data, said Elad Yoran, KoolSpan Executive Chairman. The only viable solution to this problem is to use end-to-end (E2E) encryption for all communications. KoolSpan is excited to partner with WidePoint to provide TrustCall.

About WidePointWidePoint Corporation (NYSE American: WYY) is a leading provider of trusted mobility management (TM2) solutions, including telecom management, mobile management, identity management, and digital billing and analytics. For more information, visit widepoint.com.

About KoolSpanKoolSpan is a leading provider of robust, cross-platform, end-to-end communication security on smartphones globally. KoolSpan TrustCall delivers strong end-to-end (E2E) encryption for calls, text/chats on Android and iPhone devices. Customers include governments and enterprises in 60+ countries. TrustCall is FIPS 140-2 validated and has 33 issued patents with dozens pending. KoolSpan is privately held and based in Bethesda, Maryland. For more information, visitwww.koolspan.com.

Investor Relations:Gateway Investor RelationsMatt Glover or Charlie Schumacher949-574-3860, WYY@gatewayir.com

Continue reading here:
WidePoint Partners with KoolSpan to Offer End-to-End Encryption for Phone Calls and Text Messages - GlobeNewswire

Read More..

How to cope with a FileVault recovery key disappearing while you write it down – Macworld

How to cope with a FileVault recovery key disappearing while you write it down | Macworld ');consent.ads.queue.push(function(){ try { IDG.GPT.addDisplayedAd("gpt-superstitial", "true"); $('#gpt-superstitial').responsiveAd({screenSize:'971 1115', scriptTags: []}); IDG.GPT.log("Creating ad: gpt-superstitial [971 1115]"); }catch (exception) {console.log("Error with IDG.GPT: " + exception);} }); The key cant be re-displayed once its dismissed.

Today's Best Tech Deals

Picked by Macworld's Editors

Top Deals On Great Products

Picked by Techconnect's Editors

FileVault is an extraordinary bit of macOS technology. Introduced years ago, it encrypts the entire contents of your startup volume so that when the data is at restwhen your Mac is powered downthe drive is effectively full of garbage nonsense to anyone who doesnt possess either the password to an account authorized to log in via FileVault or the special recovery key set when you turn FileVault on.

When you use the Security & Privacy preference panes FileVault tab to enable this encryption, macOS prompts you with two choices:

In both cases, a recovery key is set. However, if you use iCloud to store your key, you never see it, and Apple manages the recovery process. All you need is your iCloud password and, if you turned on two-factor authentication, a trusted device or access to a trusted phone number. But this introduces risk, as someone who obtained your computer and discovered your password could potentially unlock the drive, too.

I prefer the second choice, as it provides entirely local control. No secret is stored remotely. You only face a problem if you forget the passwords to all macOS accounts approved for FileVault-based cold start (from a shutdown state) loginsand you lose your recovery key. (I have heard of cases in which account information becomes corrupted, though, and the recovery key is the only way to start up a Mac.)

What happens if, while youre trying to write down the recovery key, it disappears from the screen? While this seems unlikely it happened to one reader, who doesnt believe they clicked a button or otherwise caused the key message to dismiss. They wrote in to ask how they could recover the recovery key?

Unfortunately, theres no method to retrieve the key once its been displayed and dismissed. The recovery key is generated and passed through a strong one-way encryption process; only the result is used to further protect the keys used in FileVault encryption. The recovery key is displayed once. When you dismiss the dialog, macOS tosses this original version of it forever. (Entering the precise original recovery key, which is fed through the same one-way process, unlocks the data that it protects.)

If you werent able to write the key down before it disappeared from view, you have to disable FileVault encryption and re-enable it to generate a new recovery key:

In the Security & Privacy system preference pane, click the FileVault tab.

Click the lock icon at the lower-left corner and enter an account name and password with administrative access.

Click the Turn Off FileVault button.

Confirm you want to disable FileVault by clicking Restart & Turn Off Encryption.

Your Mac now restarts. After you log back in using an account with FileVault permission, macOS begins decrypting the entire contents of the drive. This can take quite a while.

When decryption is complete, you can return to the FileVault tab and click Turn On FileVault.

At the Recovery Key prompt, choose the Create a recovery key option and write the key down. You might even quickly take a picture of it as a backup. (But be sure to delete that photo and then permanently delete it from the Recently Deleted album to avoid any chance of someone gaining access to it.)

Restart again and FileVault begins the slow process of encrypting the startup volume once more.

This Mac 911 article is in response to a question submitted by Macworld reader Michael.

Weve compiled a list of the questions we get asked most frequently along with answers and links to columns: read our super FAQ to see if your question is covered. If not, were always looking for new problems to solve! Email yours to mac911@macworld.com including screen captures as appropriate, and whether you want your full name used. Not every question will be answered, we dont reply to email, and we cannot provide direct troubleshooting advice.

See the article here:
How to cope with a FileVault recovery key disappearing while you write it down - Macworld

Read More..

Doing these 10 things on WhatsApp may land you in jail – Gadgets Now

WhatsApp is one the most popular chatting apps in India and it is used by people from all walks of life including politicians, activists and of course criminals. Of late, WhatsApp groups have become the prime concern for law enforcement agencies in India as the platform is increasing being used to incite mob and mobilise attacks. While end-to-end encryption may safeguard users, it becomes all the more difficult for the police to track the source of messages. However, if you think that this encryption can completely protect you then you got it all wrong.

WhatsApp collects metadata about every user which Facebook, its parent, can share with law enforcement agencies when demanded. While the messages are encrypted, if the police wants then they can get your name, IP address, mobile number, location, mobile network and your mobile handset type. The cops can also get to know with whom you are chatting, for how long and at what time. Also, the police can access your contacts as well. While there are no separate laws for WhatsApp users in India, the police can arrest you with the support of WhatsApp if you do any of the following things under the Information Technology Act, 2000.

See the original post:
Doing these 10 things on WhatsApp may land you in jail - Gadgets Now

Read More..

Don’t Put Your Health in the Hands of Artificial Intelligence Just Yet – Healthline

Artificial intelligence and machine learning promises to revolutionize healthcare.

Proponents say it will help diagnose ailments more quickly and more accurately, as well as help monitor peoples health and take over a swath of doctors paperwork so they can see more patients.

At least, thats the promise.

Theres been an exponential increase in approvals from the Food and Drug Administration (FDA) for these type of health products as well as projections that artificial intelligence (AI) will become an $8 billion industry by 2022.

However, many experts are urging to pump the brakes on the AI craze.

[AI] has the potential to democratize healthcare in ways we can only dream of by allowing equal care for all. However, it is still in its infancy and it needs to mature, Jos Morey, MD, a physician, AI expert, and former associate chief health officer for IBM Watson, told Healthline.

Consumers should be wary of rushing to a new facility simply because they may be providing a new AI tool, especially if it is for diagnostics, he said. There are really just a handful of physicians across the world that are practicing that understand the strengths and benefits of what is currently available.

But what exactly is artificial intelligence in medical context?

It starts with machine learning, which are algorithms that enable a computer program to learn by incorporating increasing large and dynamic amounts of data, according to Wired magazine.

The terms machine learning and AI are often used interchangeably.

To understand machine learning, imagine a given set of data say a set of X-rays that do or do not show a broken bone and having a program try to guess which ones show breaks.

The program will likely get most of the diagnoses wrong at first, but then you give it the correct answers and the machine learns from its mistakes and starts to improve its accuracy.

Rinse and repeat this process hundreds or thousands (or millions) of times and, theoretically, the machine will be able to accurately model, select, or predict for a given goal.

So its easy to see how in healthcare a field that deals with massive amounts of patient data machine learning could be a powerful tool.

One of the key areas where AI is showing promise is in diagnostic analysis, where the AI system will collect and analyze data sets on symptoms to diagnose the potential issue and offer treatment solutions, John Bailey, director of sales for the healthcare technology company Chetu Inc., told Healthline.

This type of functionality can further assist doctors in determining the illness or condition and allow for better, more responsive care, he said. Since AIs key benefit is in pattern detection, it can also be leveraged in identifying, and assist in containing, illness outbreaks and antibiotic resistance.

That all sounds great. So whats the hitch?

The problem lies in lack of reproducibility in real-world settings, Morey said. If you dont test on large robust datasets that are being just one facility or one machine, then you potentially develop bias into the algorithm that will ultimately only work in one very specific setting but wont be compatible for large scale roll-out.

He added, The lack of reproducibility is something that affects a lot of science but AI in healthcare in particular.

For instance, a study in the journal Science found that even when AI is tested in a clinical setting, its often only tested in a single hospital and risks failing when moved to another clinic.

Then theres the issue of the data itself.

Machine learning is only as good as the data sets the machines are working with, said Ray Walsh, a digital privacy expert at ProPrivacy.

A lack of diversity in the datasets used to train up medical AI could lead to algorithms unfairly discriminating against under-represented demographics, Walsh told Healthline.

This can create AI that is prejudiced against certain people, he continued. As a result, AI could lead to prejudice against particular demographics based on things like high body mass index (BMI), race, ethnicity, or gender.

Meanwhile, the FDA has fast-tracked approval of AI-driven products, from approving just 1 in 2014 to 23 in 2018.

Many of these products havent been subjected to clinical trials since they utilize the FDAs 510(k) approval path, which allows companies to market products without clinical trials as long as they are at least as safe and effective, that is, substantially equivalent, to a legally marketed device.

This process has made many in the AI health industry happy. This includes Elad Walach the co-founder and chief executive officer of Aidoc, a startup focused on eliminating bottlenecks in medical image diagnosis.

The FDA 510(k) process has been very effective, Walach told Healthline. The key steps include clinical trials applicable to the product and a robust submission process with various types of documentation addressing the key aspects of the claim and potential risks.

The challenge the FDA is facing is dealing with the increasing pace of innovation coming from AI vendors, he added. Having said that, in the past year they progressed significantly on this topic and created new processes to deal with the increase in AI submissions.

But not everyone is convinced.

The FDA has a deeply flawed approval process for existing types of medical devices and the introduction of additional technological complexity further exposes those regulatory inadequacies. In some instances, it might also raise the level of risk, said David Pring-Mill, a consultant to tech startups and opinion columnist at TechHQ.

New AI products have a dynamic relationship with data. To borrow a medical term, they arent quarantined. The idea is that they are always learning, but perhaps its worth challenging the assumption that a change in outputs always represents an improved product, he said.

The fundamental problem, Pring-Mill told Healthline, is that the 510(k) pathway allows medical device manufacturers to leapfrog ahead without really proving the merits of their products.

One way or another, machine learning and AI integration into the medical field is here to stay.

Therefore, the implementation will be key.

Even if AI takes on the data processing role, physicians may get no relief. Well be swamped with input from these systems, queried incessantly for additional input to rule in or out possible diagnoses, and presented with varying degrees of pertinent information, Christopher Maiona, MD, SFHM, the chief medical officer at PatientKeeper Inc., which specializes in optimizing electronic health records, told Healthline.

Amidst such a barrage, the systems user interface will be critical in determining how information is prioritized and presented so as to make it clinically meaningful and practical to the physician, he added.

And AIs success in medicine both now and in the future may ultimately still rely on the experience and intuition of human beings.

A computer program cannot detect the subtle nuances that comes with years of caring for patients as a human, David Gregg, MD, chief medical officer for StayWell, a healthcare innovation company, told Healthline.

Providers can detect certain cues, connect information and tone and inflection when interacting with patients that allow them to create a relationship and provide more personalized care, he said. AI simply delivers a response to data, but cannot address the emotional aspects or react to the unknown.

See the rest here:
Don't Put Your Health in the Hands of Artificial Intelligence Just Yet - Healthline

Read More..

A digital and transformed future | Artificial intelligence supercharging other technology – Lexology

Transformative technology can be powerful not just in its own right, but where different technologies converge. Artificial intelligence, in particular, can be a technology supercharger. The second Insight in our series looking at the digital future (and adapted from an article written for the 2019 Bristol Technology Showcase) considers the transformative power of machine learning.

Artificial intelligence, in the form of machine learning or deep learning, relies on finding and mapping the patterns in data and then using more and more data to refine and deepen the accuracy of that model, without the need for human-generated linear hand-coding.

Part of the reason why this has become such a powerful tool is the speed and availability of almost limitless computing power, thanks to Moores law and the development of the cloud, respectively. By way of illustration of the current scale, availability and low cost of processing power, a group of computer scientists recently challenged themselves to break the World War II Enigma code using 21st century artificial intelligence. The point of interest is not that they succeeded, but that it took a mere 19 minutes to do so. It might have taken two weeks, but they hired 1000 servers for an hour at a cost of $7.

AI-driven generative design

A further example of the transformative power of AI is generative design. The design of pieces of kit, such as a bracket for interconnecting different parts or a structural panel in a vehicle, is being optimised using AI. Parameters concerning the structural properties of the piece can be set by the design engineers (for example, the required strength, tolerances, points of connection, areas of open space). The system will then devise numerous potential designs for the piece. To the human eye, generative design pieces often look almost other-worldly because they are so different to what a human mind might design.

The generative design tool can be configured to optimise different design characteristics. A particularly impactful application is to optimise for low weight. This is particularly significant for electric vehicle and aviation design: lower weight reduces the engine power necessary to move the vehicle or aircraft, making it more efficient.

plus additive manufacturing

Generative design is used in conjunction with additive manufacturing (a form of industrial-scale 3D printing), which makes it possible to produce these extraordinary new designs. The machines do not need physical retooling to switch to a new design, just a new digital file to drive the output. Small production runs are therefore viable, although additive manufacturing is also being used at scale. Moreover, there are material benefits from additive manufacturings ability to produce complex shapes in a single piece. Fewer joints makes the piece structurally stronger, more durable and at a lower risk of fracturing, all of which reduces the frequency of repairs.

plus image recognition-based

AI can also be used to train systems to recognise faults and errors in the layers of additive manufacturing. Normally, each layer of a 3D-printed product will be photographed as it is printed, and the photographs then subsequently reviewed for quality assurance. An AI image recognition tool, by contrast, can be trained to perform the QA checks and review for errors in real time as the printing machine builds up the layers. The printing process can be stopped if a fatal error is detected, reducing waste by not finishing a faulty product.

Letting robots find their own way

AI has also been used to boost physical robotics. Images of humanoid robots doing backflips or of headless quadruped robots opening doors are immensely impressive. These systems are hand coded, line by line, and take a great deal of time to program, which computing power does not, in itself, make faster. However, the ability of machine learning systems to meet a defined goal from scratch and without linear coding, is now being applied to robotics and is enabling machines to develop the coding needed for a particular task without human input, essentially by trial and error.

Machine learning has been used to work out how to use a robotic hand to manipulate a cube so that a particular face of the cube was selected. A digital model of the hand and cube was created, replicating in virtual form the characteristics and constraints of the physical robot hand and of the cube. The system was given definitions of success and of failure. It then tried the task repeatedly over a period of time until it succeeded in controlling the movements of the fingers and palm sufficiently to manipulate the required face of the cube into the required position.

The coding for the virtual hand was then transferred to control the physical version and the physical hand was able to manipulate the physical cube as required.

AI has been called software 2.0 for its ability to write itself in this way. Of course, considerable technical skill is needed for these types of project; machine learning typically has a PhD entry level. But increasingly, ready-made AI tools are available as a Service, including as one of the options in the portfolios of mix-and-match resources and software offered by many of the major cloud computing vendors.

A significant part of the transformative power of AI is this ability to supercharge other technologies. The development of AI tools that can be used off-the-shelf, without the need for highly specialised skills, will only amplify this effect.

See original here:
A digital and transformed future | Artificial intelligence supercharging other technology - Lexology

Read More..

Artificial Intelligence (AI) Patents Will the Patent Office Change the Rules? – JD Supra

Updated: May 25, 2018:

JD Supra is a legal publishing service that connects experts and their content with broader audiences of professionals, journalists and associations.

This Privacy Policy describes how JD Supra, LLC ("JD Supra" or "we," "us," or "our") collects, uses and shares personal data collected from visitors to our website (located at http://www.jdsupra.com) (our "Website") who view only publicly-available content as well as subscribers to our services (such as our email digests or author tools)(our "Services"). By using our Website and registering for one of our Services, you are agreeing to the terms of this Privacy Policy.

Please note that if you subscribe to one of our Services, you can make choices about how we collect, use and share your information through our Privacy Center under the "My Account" dashboard (available if you are logged into your JD Supra account).

Registration Information. When you register with JD Supra for our Website and Services, either as an author or as a subscriber, you will be asked to provide identifying information to create your JD Supra account ("Registration Data"), such as your:

Other Information: We also collect other information you may voluntarily provide. This may include content you provide for publication. We may also receive your communications with others through our Website and Services (such as contacting an author through our Website) or communications directly with us (such as through email, feedback or other forms or social media). If you are a subscribed user, we will also collect your user preferences, such as the types of articles you would like to read.

Information from third parties (such as, from your employer or LinkedIn): We may also receive information about you from third party sources. For example, your employer may provide your information to us, such as in connection with an article submitted by your employer for publication. If you choose to use LinkedIn to subscribe to our Website and Services, we also collect information related to your LinkedIn account and profile.

Your interactions with our Website and Services: As is true of most websites, we gather certain information automatically. This information includes IP addresses, browser type, Internet service provider (ISP), referring/exit pages, operating system, date/time stamp and clickstream data. We use this information to analyze trends, to administer the Website and our Services, to improve the content and performance of our Website and Services, and to track users' movements around the site. We may also link this automatically-collected data to personal information, for example, to inform authors about who has read their articles. Some of this data is collected through information sent by your web browser. We also use cookies and other tracking technologies to collect this information. To learn more about cookies and other tracking technologies that JD Supra may use on our Website and Services please see our "Cookies Guide" page.

We use the information and data we collect principally in order to provide our Website and Services. More specifically, we may use your personal information to:

JD Supra takes reasonable and appropriate precautions to insure that user information is protected from loss, misuse and unauthorized access, disclosure, alteration and destruction. We restrict access to user information to those individuals who reasonably need access to perform their job functions, such as our third party email service, customer service personnel and technical staff. You should keep in mind that no Internet transmission is ever 100% secure or error-free. Where you use log-in credentials (usernames, passwords) on our Website, please remember that it is your responsibility to safeguard them. If you believe that your log-in credentials have been compromised, please contact us at privacy@jdsupra.com.

Our Website and Services are not directed at children under the age of 16 and we do not knowingly collect personal information from children under the age of 16 through our Website and/or Services. If you have reason to believe that a child under the age of 16 has provided personal information to us, please contact us, and we will endeavor to delete that information from our databases.

Our Website and Services may contain links to other websites. The operators of such other websites may collect information about you, including through cookies or other technologies. If you are using our Website or Services and click a link to another site, you will leave our Website and this Policy will not apply to your use of and activity on those other sites. We encourage you to read the legal notices posted on those sites, including their privacy policies. We are not responsible for the data collection and use practices of such other sites. This Policy applies solely to the information collected in connection with your use of our Website and Services and does not apply to any practices conducted offline or in connection with any other websites.

JD Supra's principal place of business is in the United States. By subscribing to our website, you expressly consent to your information being processed in the United States.

You can make a request to exercise any of these rights by emailing us at privacy@jdsupra.com or by writing to us at:

You can also manage your profile and subscriptions through our Privacy Center under the "My Account" dashboard.

We will make all practical efforts to respect your wishes. There may be times, however, where we are not able to fulfill your request, for example, if applicable law prohibits our compliance. Please note that JD Supra does not use "automatic decision making" or "profiling" as those terms are defined in the GDPR.

Pursuant to Section 1798.83 of the California Civil Code, our customers who are California residents have the right to request certain information regarding our disclosure of personal information to third parties for their direct marketing purposes.

You can make a request for this information by emailing us at privacy@jdsupra.com or by writing to us at:

Some browsers have incorporated a Do Not Track (DNT) feature. These features, when turned on, send a signal that you prefer that the website you are visiting not collect and use data regarding your online searching and browsing activities. As there is not yet a common understanding on how to interpret the DNT signal, we currently do not respond to DNT signals on our site.

For non-EU/Swiss residents, if you would like to know what personal information we have about you, you can send an e-mail to privacy@jdsupra.com. We will be in contact with you (by mail or otherwise) to verify your identity and provide you the information you request. We will respond within 30 days to your request for access to your personal information. In some cases, we may not be able to remove your personal information, in which case we will let you know if we are unable to do so and why. If you would like to correct or update your personal information, you can manage your profile and subscriptions through our Privacy Center under the "My Account" dashboard. If you would like to delete your account or remove your information from our Website and Services, send an e-mail to privacy@jdsupra.com.

We reserve the right to change this Privacy Policy at any time. Please refer to the date at the top of this page to determine when this Policy was last revised. Any changes to our Privacy Policy will become effective upon posting of the revised policy on the Website. By continuing to use our Website and Services following such changes, you will be deemed to have agreed to such changes.

If you have any questions about this Privacy Policy, the practices of this site, your dealings with our Website or Services, or if you would like to change any of the information you have provided to us, please contact us at: privacy@jdsupra.com.

As with many websites, JD Supra's website (located at http://www.jdsupra.com) (our "Website") and our services (such as our email article digests)(our "Services") use a standard technology called a "cookie" and other similar technologies (such as, pixels and web beacons), which are small data files that are transferred to your computer when you use our Website and Services. These technologies automatically identify your browser whenever you interact with our Website and Services.

We use cookies and other tracking technologies to:

There are different types of cookies and other technologies used our Website, notably:

JD Supra Cookies. We place our own cookies on your computer to track certain information about you while you are using our Website and Services. For example, we place a session cookie on your computer each time you visit our Website. We use these cookies to allow you to log-in to your subscriber account. In addition, through these cookies we are able to collect information about how you use the Website, including what browser you may be using, your IP address, and the URL address you came from upon visiting our Website and the URL you next visit (even if those URLs are not on our Website). We also utilize email web beacons to monitor whether our emails are being delivered and read. We also use these tools to help deliver reader analytics to our authors to give them insight into their readership and help them to improve their content, so that it is most useful for our users.

Analytics/Performance Cookies. JD Supra also uses the following analytic tools to help us analyze the performance of our Website and Services as well as how visitors use our Website and Services:

Facebook, Twitter and other Social Network Cookies. Our content pages allow you to share content appearing on our Website and Services to your social media accounts through the "Like," "Tweet," or similar buttons displayed on such pages. To accomplish this Service, we embed code that such third party social networks provide and that we do not control. These buttons know that you are logged in to your social network account and therefore such social networks could also know that you are viewing the JD Supra Website.

If you would like to change how a browser uses cookies, including blocking or deleting cookies from the JD Supra Website and Services you can do so by changing the settings in your web browser. To control cookies, most browsers allow you to either accept or reject all cookies, only accept certain types of cookies, or prompt you every time a site wishes to save a cookie. It's also easy to delete cookies that are already saved on your device by a browser.

The processes for controlling and deleting cookies vary depending on which browser you use. To find out how to do so with a particular browser, you can use your browser's "Help" function or alternatively, you can visit http://www.aboutcookies.org which explains, step-by-step, how to control and delete cookies in most browsers.

We may update this cookie policy and our Privacy Policy from time-to-time, particularly as technology changes. You can always check this page for the latest version. We may also notify you of changes to our privacy policy by email.

If you have any questions about how we use cookies and other tracking technologies, please contact us at: privacy@jdsupra.com.

See the original post:
Artificial Intelligence (AI) Patents Will the Patent Office Change the Rules? - JD Supra

Read More..