Page 4,099«..1020..4,0984,0994,1004,101..4,1104,120..»

Embedded Security For Internet Of Things Market 2019 Global Analysis by Growth, Size, Share, Trend and Forecast 2025 – Eastlake Times

Anembedded systemis acomputersystemwith a dedicated function within a larger mechanical or electrical system, often withreal-time computingconstraints.It isembeddedas part of a complete device often including hardware and mechanical parts. Embedded systems control many devices in common use today.Ninety-eight percent of allmicroprocessorsare manufactured as components of embedded systems.

The controller chip segment is estimated to be valued at more than US$ 2,300 Mn in 2017, accounting for more than 80% of the global market revenue share.

The global Embedded Security For Internet Of Things market was valued at xx million US$ in 2018 and will reach xx million US$ by the end of 2025, growing at a CAGR of xx% during 2019-2025.

This report focuses on Embedded Security For Internet Of Things volume and value at global level, regional level and company level. From a global perspective, this report represents overall Embedded Security For Internet Of Things market size by analyzing historical data and future prospect.

Regionally, this report categorizes the production, apparent consumption, export and import of Embedded Security For Internet Of Things in North America, Europe, China, Japan, Southeast Asia and India.

For each manufacturer covered, this report analyzes their Embedded Security For Internet Of Things manufacturing sites, capacity, production, ex-factory price, revenue and market share in global market.

The following manufacturers are covered:

Intel

Cisco

NXP

Infineon

Gemalto

Check Point

Palo Alto

ARM

Synopsys

Inside Secure

Trend Micro

Segment by Regions

North America

Europe

China

Japan

Southeast Asia

India

Segment by Type

Software

Controller Chip

Segment by Application

Retail

Aerospace and Defence

Healthcare

Gaming

Automotive

Others

Table of Contents

Executive Summary

Chapter One: Industry Overview of Embedded Security For Internet Of Things

1.1 Definition of Embedded Security For Internet Of Things

1.2 Embedded Security For Internet Of Things Segment by Type

1.2.1 Global Embedded Security For Internet Of Things Production Growth Rate Comparison by Types (2014-2025)

1.2.2 Software

1.2.3 Controller Chip

1.3 Embedded Security For Internet Of Things Segment by Applications

1.3.1 Global Embedded Security For Internet Of Things Consumption Comparison by Applications (2014-2025)

1.3.2 Retail

1.3.3 Aerospace and Defence

1.3.4 Healthcare

1.3.5 Gaming

1.3.6 Automotive

1.3.7 Others

1.4 Global Embedded Security For Internet Of Things Overall Market

1.4.1 Global Embedded Security For Internet Of Things Revenue (2014-2025)

1.4.2 Global Embedded Security For Internet Of Things Production (2014-2025)

1.4.3 North America Embedded Security For Internet Of Things Status and Prospect (2014-2025)

1.4.4 Europe Embedded Security For Internet Of Things Status and Prospect (2014-2025)

1.4.5 China Embedded Security For Internet Of Things Status and Prospect (2014-2025)

1.4.6 Japan Embedded Security For Internet Of Things Status and Prospect (2014-2025)

1.4.7 Southeast Asia Embedded Security For Internet Of Things Status and Prospect (2014-2025)

1.4.8 India Embedded Security For Internet Of Things Status and Prospect (2014-2025)

Chapter Two: Manufacturing Cost Structure Analysis

2.1 Raw Material and Suppliers

2.2 Manufacturing Cost Structure Analysis of Embedded Security For Internet Of Things

2.3 Manufacturing Process Analysis of Embedded Security For Internet Of Things

2.4 Industry Chain Structure of Embedded Security For Internet Of Things

Chapter Three: Development and Manufacturing Plants Analysis of Embedded Security For Internet Of Things

3.1 Capacity and Commercial Production Date

3.2 Global Embedded Security For Internet Of Things Manufacturing Plants Distribution

3.3 Major Manufacturers Technology Source and Market Position of Embedded Security For Internet Of Things

3.4 Recent Development and Expansion Plans

Chapter Four: Key Figures of Major Manufacturers

4.1 Embedded Security For Internet Of Things Production and Capacity Analysis

4.2 Embedded Security For Internet Of Things Revenue Analysis

4.3 Embedded Security For Internet Of Things Price Analysis

4.4 Market Concentration Degree

Chapter Five: Embedded Security For Internet Of Things Regional Market Analysis

5.1 Embedded Security For Internet Of Things Production by Regions

5.1.1 Global Embedded Security For Internet Of Things Production by Regions

5.1.2 Global Embedded Security For Internet Of Things Revenue by Regions

5.2 Embedded Security For Internet Of Things Consumption by Regions

5.3 North America Embedded Security For Internet Of Things Market Analysis

5.3.1 North America Embedded Security For Internet Of Things Production

5.3.2 North America Embedded Security For Internet Of Things Revenue

5.3.3 Key Manufacturers in North America

5.3.4 North America Embedded Security For Internet Of Things Import and Export

5.4 Europe Embedded Security For Internet Of Things Market Analysis

5.4.1 Europe Embedded Security For Internet Of Things Production

5.4.2 Europe Embedded Security For Internet Of Things Revenue

5.4.3 Key Manufacturers in Europe

5.4.4 Europe Embedded Security For Internet Of Things Import and Export

5.5 China Embedded Security For Internet Of Things Market Analysis

5.5.1 China Embedded Security For Internet Of Things Production

5.5.2 China Embedded Security For Internet Of Things Revenue

5.5.3 Key Manufacturers in China

5.5.4 China Embedded Security For Internet Of Things Import and Export

5.6 Japan Embedded Security For Internet Of Things Market Analysis

5.6.1 Japan Embedded Security For Internet Of Things Production

5.6.2 Japan Embedded Security For Internet Of Things Revenue

5.6.3 Key Manufacturers in Japan

5.6.4 Japan Embedded Security For Internet Of Things Import and Export

Follow this link:
Embedded Security For Internet Of Things Market 2019 Global Analysis by Growth, Size, Share, Trend and Forecast 2025 - Eastlake Times

Read More..

#InfosecNA: The Benefits of Training Employees to Hack – Infosecurity Magazine

For most corporate denizens, security training is an unpleasant but necessary evil, but does it have to be? Not according to Kris Martel, CISO of Imagine IT, who uses a highly interactive approach to create an engaging, entertaining learning environment that makes security meaningful and interesting to the average employee.

Speaking at Infosecurity ISACA North America Expo and Conference in New York, Martel shared some of the things he uses in his trainings to help improve security awareness and compliance, and have employees eagerly awaiting their next session.

Cyber awareness training must change audience perception by making it [security] relevant to the organization or the individuals youre teaching, said Martel. The way to do that is to make it engaging, interactive and fun and unpredictable, he added. One of the ways he engages employees is to teach them real-world hacking skills, including how to craft effective phishing attacks, helping them learn who has their Facebook login and taking them on guided tours of the Dark Web. Whenever possible, Martel finds ways to reward participation with small but popular tokens such as preferred parking spots, movie tickets and, in some cases, internal cryptocurrency.

Martel has developed a fun, and effective way to deal with experienced cyber-workers who dont take the training seriously because they believe they are too smart to be hacked by offering them a friendly challenge. After a co-worker accepts the challenge, he begins a surveillance phase which, depending on how good his opponent is, can last anywhere from a few days to a few months. In one case, with an especially cyber-savvy individual, his usual hunt within social media, inquiries with co-workers, and other tactics failed to produce anything. Even though they had effectively hosted themselves, including paying a service to erase their profile from the internet, he did find evidence of their activity on Amazon which enabled him to craft a phishing attack that eventually proved effective in gaining his victims credentials. Although it took four months to execute, Martel felt it was worth it after the employee agreed to go to training and he got a good story out of it to share with his colleagues.

Here are a few of Martels key takeaways:

Applying these tactics helped Martel stimulate a 70% increase in reporting of phishing attacks, a 45% reduction in the success rate of phishing attacks, and a 94% positive rating on his course feedback surveys. I knew things had changed when people started asking me when the next security training session was going to be held, he concluded.

How to make security awareness training more effective and engaging

For most corporate denizens, security training is an unpleasant but necessary evil, but does it have to be? Not according to Kris Martel, CISO of Imagine IT, who uses a highly interactive approach to create an engaging, entertaining learning environment that makes security meaningful and interesting to the average employee.

Speaking at Infosecurity ISACA North America Expo and Conference in New York, Martel shared some of the things he uses in his trainings to help improve security awareness and compliance, and have employees eagerly awaiting their next session.

Cyber awareness training must change audience perception by making it [security] relevant to the organization or the individuals youre teaching, said Martel. The way to do that is to make it engaging, interactive and fun and unpredictable, he added. One of the ways he engages employees is to teach them real-world hacking skills, including how to craft effective phishing attacks, helping them learn who has their Facebook login and taking them on guided tours of the Dark Web. Whenever possible, Martel finds ways to reward participation with small but popular tokens such as preferred parking spots, movie tickets and, in some cases, internal cryptocurrency.

Martel has developed a fun, and effective way to deal with experienced cyber-workers who dont take the training seriously because they believe they are too smart to be hacked by offering them a friendly challenge. After a co-worker accepts the challenge, he begins a surveillance phase which, depending on how good his opponent is, can last anywhere from a few days to a few months. In one case, with an especially cyber-savvy individual, his usual hunt within social media, inquiries with co-workers, and other tactics failed to produce anything. Even though they had effectively hosted themselves, including paying a service to erase their profile from the internet, he did find evidence of their activity on Amazon which enabled him to craft a phishing attack that eventually proved effective in gaining his victims credentials. Although it took four months to execute, Martel felt it was worth it after the employee agreed to go to training and he got a good story out of it to share with his colleagues.

Here are a few of Martels key takeaways:

Applying these tactics helped Martel stimulate a 70% increase in reporting of phishing attacks, a 45% reduction in the success rate of phishing attacks, and a 94% positive rating on his course feedback surveys. I knew things had changed when people started asking me when the next security training session was going to be held, he concluded.

Excerpt from:
#InfosecNA: The Benefits of Training Employees to Hack - Infosecurity Magazine

Read More..

Altcoin Volatility Rising, But Alt Season Wont Arrive Until Bitcoin Volume Returns – newsBTC

The crypto market has reached a period of stagnation. Volume is at extreme lows, suggesting interest in the emerging class of Bitcoin and altcoin assets may be waning.

Volatility has begun to increase, suggesting that action could also soon be picking up. However, one crypto analyst says that an alt season wont occur until volume returns to the market, and in particular, Bitcoin.

Bitcoins meteoric rise took the world by storm, as people rushed to buy up the scarce crypto asset. The entire run-up made many millionaires along the way, which caused retail investors to try their hand in the market.

Related Reading | List of Crypto All-Time High Prices Shows How Far Market Must Recover

Since many felt they had already missed their chance to buy Bitcoin cheap, retail investors turned to altcoins. Getting in as early as possible meant that investors often looked to initial coin offerings, which were in large part built on the Ethereum protocol.

Bitcoin and Ethereum rising together caused a synergistic effect across the market, making it appear that anyone could become wildly rich just by finding the right altcoin.

Right as Bitcoin peaked, investors flocked to altcoins in droves, causing the price of the illiquid assets to explode. But those who bought in too late were left holding extremely heavy bags that are now sitting at as much as a 99% loss in some cases, and its left a bad taste in the mouths of retail investors who were burned as the bubble popped.

Now, almost two full years later, the crypto market is still stagnant, suffering from a general lack of interest. Bitcoins early 2019 rally started to bring some interest back into the market, but since then volume in Bitcoin is also drying up.

However, volatility in altcoins is starting to ramp up once again, according to one crypto analyst. The analyst claims that its either due to volume being down for Bitcoin, causing a lull in interest and general boredom in the market, or lingering effects due to the China news pump back in October.

Still, the analyst is hesitant to claim an alt season is near, and believes that will not occur until volume returns to Bitcoin in a big way. Only then will the relationship with altcoins reverse into a positive trend.

While Bitcoin has regained much-lost ground from its all-time high, other altcoins, even top altcoins like XRP and Ethereum, are down as much as 80% or more from their all-time high prices and have a lot more catching up to do.

Related Reading | Bye-Bye Bitcoin? Why the Altcoin Bottom is In

As past performance has shown, when altcoins do rebound, theyre likely to outperform Bitcoin by a large margin, suggesting that this period of stagnancy could be the buying opportunity of a lifetime.

See the original post here:
Altcoin Volatility Rising, But Alt Season Wont Arrive Until Bitcoin Volume Returns - newsBTC

Read More..

Heres How Much of Each Major Altcoin Is Owned by Whales – BeInCrypto

IntoTheBlock has documented what percent of each cryptocurrency is held in the richest addresses. What they found shouldnt surprise anyone.

Its difficult to assess the extent of inequality within cryptocurrency ecosystems. After all, they could be exchanges or custodial groupsbut, in some cases, a few whales really do own a large portion of the circulating supply of some cryptocurrencies.

IntoTheBlock (@intotheblock) decided to do some digging and find the actual numbers. Heres what they found.

Concentrations of ownership over cryptocurrencies are not surprising. In a decentralized system, some will get advantages and hold more. However, there are limits to how sustainable extreme concentrations of wealth are in a decentralized system. These are the numbers for some of the top altcoins and how concentrated they are.

The standouts in IntoTheBlocks findings are Litecoin and Tether. Both seem to have higher concentrations of wealth than the rest of the cryptocurrency industry. How this will impact the trajectory of these projects remains open to debate.

Some people may scoff at the insinuation that high concentrations of cryptocurrency assets in just a few addresses is even a problem. After all, if you are using a cryptocurrency like Bitcoin Cash, it may not even matter. This is because Bitcoin Cash and other proof-of-work currencies do not have a governance model.

Ethereum and Cardano, on the other hand,do.So, concentrations of wealth could very well end up impacting the ecosystem at largeand may even lead to decisions against the majority of Ethereum users.

So, the impact of high concentrations of assets depends on the respective cryptocurrencys ecosystem. Governance can seldom work if there is oligarchic-like control of a large portion of a decentralized system. Its an issue that developers will have to keep in mind as theyre building these governance models. We cant let cryptocurrencies fall into the same issues that currently plague traditional fiat marketplacesthese concentrations of wealth should definitely be up for discussion.

Images are courtesy of Twitter, Shutterstock.

Did you know you can trade sign-up to trade Bitcoin and many leading altcoins with a multiplier of up to 100x on a safe and secure exchange with the lowest fees with only an email address? Well, now you do!Click here to get started on StormGain!

Link:
Heres How Much of Each Major Altcoin Is Owned by Whales - BeInCrypto

Read More..

What will it take for a Litecoin bull run in 2020? – Yahoo Finance

With the new year just around the corner, cryptocurrency investors and traders are getting ready for what the markets might have in store in 2020.

Hopefully, with a brand new year comes brand new blood to fuel the next big crypto bull run.

According to key cryptocurrency analysts such as Mati Greenspan, Alessio Rastani, Trace Mayers, and PlanB, theres a high probability of a Bitcoin bull run sometime within the next 12 to 18 months.

Funnily enough, some economists are predicting an economic recession during the same period. Will that be the final catalyst for a massive cryptocurrency bull market?

If so, will altcoins such as Litecoin enjoy some huge gains?

Lets take a look.

The above price prediction is based on PlanBs BTC stock-to-flow model, discussed in this guide.

Stock-to-flow models have been used in the traditional investment field for decades. A stock-to-flow model will show the amount of a commodity held in inventories divided by the amount produced annually.

This tool can be used and the process replicated among other Proof-of-Work cryptocurrencies, as they follow similar stock-to-flow models.

The only requirements for the stock-to-flow model (or ratio) to make sense are:

If this model continues to satisfy its future predictions, this is what could happen to Bitcoin in the next couple of years:

There are a few factors that tend to help altcoins during bull markets.

Even though we could argue technical advancements are the most important detail for price, fundamentals tend to apply in the long term rather than the short term.

Looking at the overall altcoin prices above (courtesy of Messari.io), we see the majority have fallen between 80% to 90% since their all-time highs. The cycle has been repeating since 2013, when altcoins became a thing.

So what drives short-term price action then?

In essence, pure speculation. The most profitable altcoins include Ethereum, EOS, Bitcoin Cash, and Litecoin. Since the all-time highs for all these coins were in early 2018, and since then most of their value has been lost, can we argue marketing and network effects are the key drivers for short-time price?

It seems likely.

Therefore, when looking at which altcoins might pump next, I argue the key questions we should ask ourselves are:

By combining metrics, through Google Trends, blockchain explorers, wallet adoption, or social media trend waves, we can get a picture of which altcoins may experience strong positive price action.

Not to my surprise, Litecoin is a strong contender.

I argue theres an extra few ingredients the Litecoin Foundation or large LTC holders can add to the mix to promote future gains.

The first thing is to spread the message that Litecoin has a hard supply, which puts extra pressure on long-term price since fewer coins are minted every four years.

Additionally, Litecoin has a plethora of partners and merchants using LTC as a payment gateway.

As discussed in this post, the number of LTC merchants is growing at a huge pace, and key players such as the Miami Dolphins are helping to spread the Litecoin brand to new markets.

In essence, I believe for Litecoin to experience a bull run in 2020, there needs to be a Bitcoin bull run fueled by the entrance of new retail and institutional investors.

When Bitcoin breaks new all-time highs, we should expect some of the new money to spill into prominent altcoins such as LTC.

The post What will it take for a Litecoin bull run in 2020? appeared first on Coin Rivet.

See the original post here:
What will it take for a Litecoin bull run in 2020? - Yahoo Finance

Read More..

Race is on to build quantum-proof encryption – Financial Times

When Google said it had achieved quantum supremacy by eclipsing the performance of classical supercomputers, experts reacted with both excitement and concern about how next-generation computing could affect everything from medicine to financial portfolio optimisation.

In October, the tech group said its Sycamore quantum processor had, in 200 seconds, performed a task that would take the worlds best supercomputer 10,000 years to complete, although the magnitude of this claim is disputed by the likes of IBM.

Quantum computers which exploit the quirky behaviour of subatomic particles that can be in two states simultaneously may prove a useful technology for tasks requiring optimisation and comparison; that is, to find the best route or choice by examining all the options. This could range from finding the most cost-effective route for shipping goods to the most efficient way to extract natural resources.

Experts say quantum computing has the potential to transform materials science and drug development by comprehensively modelling molecules, while its ability to model interconnected dependencies could optimise financial portfolios.

However, cyber security experts and intelligence agencies worry that data security encryption systems will be blown away by the quantum tornado.

Encryption underpins everything from instant messaging services such as WhatsApp to online banking, ecommerce and secure web browsing. It uses algorithms to scramble data from the sender and gives the receiver a decryption key. These algorithms are based on mathematical functions that are easy to compute in one direction but hard to invert. Computing the product of two numbers is easy but factoring large prime numbers is difficult.

Even if the first quantum computer does not come for 20 years we are, in a sense, already late

Even with the biggest computers, factoring is hard once you are looking at numbers into, say, three or four hundred digits, says Christophe Petit, senior lecturer at Birmingham universitys School of Computer Science. There just isnt a method to efficiently solve that problem and encryption relies on that hardness.

With the extra power provided by quantum computers, problems such as factoring are easily scalable. The day a big quantum computer is built, all the cryptography we are using today is dead, warns Mr Petit.

It is uncertain when the first true quantum computer will arrive. There is also a long journey between building a computer with quantum-like properties compared with a full-scale, commercial version, partly because of the ultra-low temperature conditions required by quantum computers. However, there are fears that a malicious state could get far enough to wreak havoc.

Cracking encryption could enable a rogue actor to spy on communications and data including classified intelligence flowing between military agencies or gain backdoor access to critical infrastructures and facilities. Financial data also relies heavily on quantum-vulnerable encryption.

To crack encryption, all you need is one working quantum computer under laboratory conditions, says Andersen Cheng, chief executive of Post-Quantum, a cyber security company. Mr Cheng likens it to building an engine and gearbox compared with manufacturing an entire car. A lot of nation states are building quantum computers and they just need a working engine to start cracking encryption, he says.

In the public discourse, people are saying it will be 10 to 20 years until we have the first full commercially available quantum computer, says Mr Cheng. In the cyber security domain, they say it will be more like five to 10 years, but the intelligence community [has] become worried...over the past two years. They believe a working quantum computer will arrive much earlier than we think.

Wednesday, 20 November, 2019

Agencies including the National Security Agency and National Institute of Standards and Technology in the US, and Government Communications Headquarters in the UK, are working on post-quantum cyber security.

To build quantum-resistant encryption, cyber teams seek out categories of problems for which simultaneous processing power confers no advantage. These should be problems that are already understood but take substantial time to solve.

Lattice-based cryptography is a leading approach explored by the likes of IBM. It uses high-dimension geometric structures to hide information in ways considered impossible to solve without the key, even for quantum computers. An alternative technique, borrowed from the satellite industry, deliberately introduces random errors into the encryption process to make the output look different every time, even if the same input is being encrypted, according to Mr Cheng.

While a small network of cyber researchers has been exploring post-quantum security protocols for decades, experts say we need to raise the pace. We want to be ready not just when quantum computers come out but 20 years earlier, says Mr Petit. We should be rolling out encryption in evoting systems, medical data, and aircraft, for instance that will be secure for decades. Even if the first quantum computer does not come for 20 years we are, in a sense, already late.

See the original post:
Race is on to build quantum-proof encryption - Financial Times

Read More..

Atos partners with Zapata to deliver complete quantum computing solution to the enterprise – Quantaneo, the Quantum Computing Source

The joint solution allows organizations to engage the worlds most difficult computational problems within oil and gas, aviation, finance and pharmaceutical industries with a unique approach ready to deploy and scale to real-world challenges. In addition, Atos and Zapata will also come together to provide comprehensive consulting services to help customers become quickly up-to-speed on the capabilities of quantum computing to solve their business problems.

Orquestra combines a software platform and quantum algorithm libraries to enable the next generation of discoveries for a wide range of industries including chemistry, pharmaceuticals, logistics, finance and materials science on quantum computers.

With Orquestra, weve developed a powerful software platform that delivers real world advances in computational power for applications particularly in chemistry, machine learning, and optimization to run on Atos leading hardware solution, said Christopher Savoie, CEO of Zapata Computing. With Atos global footprint in over 70 countries, our partnership creates a complete solution for innovative enterprises developing their quantum roadmap for the future and accelerates the introduction and implementation of quantum computing to industries and markets worldwide.

Atos QLM is a stand-alone, hardware-agnostic appliance that provides access to an evolutive quantum programming environment and simulates the behavior of any kind of quantum computing technology. Atos has installed the QLM in numerous countries including Austria, France, Germany, India, the Netherlands, the United Kingdom, and the United States empowering major research programs, including Oak Ridge National Laboratory and Argonne National Laboratory.

Partnering with Zapata to pair their next-generation of accessible, high-powered quantum software with the Atos QLM allows organizations to break through their computational glass ceilings and aim for new heights in practical business applications, said Cyril Allouche, VP, Head of the Quantum R&D Program at Atos. We are also taking all necessary steps to implement quantum solutions by providing appropriate training, onboarding and consulting services to customize the platform to specific business problems.

Zapatas Orquestra software already supports several key use cases that can be deployed using the Atos QLM and benefit from its unique circuit optimization features and simulation capabilities, including:

Engineering design Orquestra provides a quantum method for solving problems related to partial differential equation (PDE) in mechanical and materials engineering. Areas of applications include engine design and optimization, aerodynamics and chemical engineering. Quantum chemistry simulation Zapatas algorithms solve physical chemistry problems, such as simulating strongly correlated electronic structure problems where traditional quantum chemistry methods typically struggle in terms of accuracy and efficiency. Quantum enhanced AI: Dimensionality reduction Many real-world problems involve large data sets with a multitude of features. Zapata has developed a novel set of quantum techniques that allows for mapping high-dimensional data onto low-dimensional latent spaces in ways that are intractable with classical techniques. Generative models Companies using the Atos QLM can leverage Orquestra to train generative models with less data (for instance in digital content creation), improve the accuracy of predictions on sparse datasets (for instance in predictive maintenance) and improve data classification algorithms.

See the rest here:
Atos partners with Zapata to deliver complete quantum computing solution to the enterprise - Quantaneo, the Quantum Computing Source

Read More..

NTT offers researchers $1 million salaries in bid to lure top talent in cryptography, quantum computing – The Japan Times

Telecom giant NTT Group is offering record pay to hire top scientists as it looks to match some of the basic research prowess of global powerhouses including Alphabet Inc. and Apple Inc.

The former Japanese telephone monopoly has set annual salaries of as much as $1 million (108.45 million) for researchers at its labs in Palo Alto, California, said Kazuhiro Gomi, president of the companys research arm. Thats more than the company pays its chief executive officer and 41-year veteran Jun Sawada, and a rare step for a traditional Japanese company like NTT.

The increased investment in basic science comes as NTT is regrouping its businesses to focus more on cloud computing services and data centers amid a dimming outlook for profit from its mainstay mobile phone carrier. Having star scientists on the labs payroll, backed by a 25 billion five-year budget, helps the group draw better technology workers and partners as it wages a global war for the top talent it needs to expand globally, Gomi said.

We are competing with companies like Google and Apple, said Gomi, explaining that the company had traditionally followed the Japanese norm of modest pay. It wouldnt be possible several years back.

Tatsuaki Okamoto, director of cryptography & information security for NTT Research, is an example of a star that has helped draw in other top researchers in encryption, where interest in cryptocurrencies has led to surging demand for expertise. Okamoto, an NTT R&D fellow since 1999, is known globally as a key researcher on block-chain technologies for cryptocurrencies.

The talent NTT is gathering is focused on cryptography, quantum computing and medical informatics in a bet that these fields can yield breakthroughs on a horizon of five years or more, said Kei Karasawa, vice president of corporate strategy for NTT Research.

The lab also needs big name scientists because for most top researchers, high pay alone isnt enough, said Karasawa. Scientists strongly prefer to work with the leaders in their field, he said.

Moreover, NTTs pay isnt at the top of the range in all fields. Oracle Corp., the software-maker racing to catch Microsoft Corp. and Amazon.com Inc. in cloud computing, offered a pay package worth $6 million to hire a single expert in artificial intelligence, Business Insider reported. And while $1 million a year dwarfs the pay of many IT professionals, its far less than what most chief executives make at global companies of NTTs scale.

That too is a contrast with Japan, where average CEO pay at top companies is less than $1 million, compared with more than 10 times that for the average U.S. boss of a big firm.

NTT is pushing for overseas growth while forecasting a 13 percent drop in net income at NTT Docomo Inc. this fiscal year, following a 16 percent decline in the previous year. NTT said it was forming a global technology and services provider by combining the capabilities of 28 of its companies including NTT Communications Corp., Dimension Data Holdings PLC and NTT Security Corp. The goal is to create a top 5 global technology and business solutions provider with $20 billion in revenue outside Japan, Sawada said at the time.

Cryptography, the science of encoding and decoding data to maintain privacy, is fundamental to the internets security and plays a role in blockchain and cryptocurrencies, two red-hot areas of research and development. Quantum computing, which uses properties of quantum mechanics to speed up processing, has the potential to help discover new drugs and improve the algorithms that shape industrial logistics and supply chains.

The third area, medical informatics, presents an opportunity to apply powerful computing technologies to mapping molecules in a way that can help scientists better understand viruses and how to combat them.

More here:
NTT offers researchers $1 million salaries in bid to lure top talent in cryptography, quantum computing - The Japan Times

Read More..

Cryptocurrency exchange that went dark with $16M in user funds only has $45k, report – The Next Web

A Canadian cryptocurrency exchange that was shut down earlier this month for allegedly misappropriating CAD$16 million ($12.1 million) in user funds only has $45,000 in hard assets, reports Global News.

As previously reported by Hard Fork, the B.C. Securities Commission (BCSC) shut down Einstein Exchange after looking into several complaints from customers unable to access their cash and cryptocurrency assets.

Grant Thornton Limited was appointed to seize the exchanges assets and return the allegedly missing funds to users. These included cryptocurrency, such as Bitcoin, the BCSC case documents said.

But, a British Columbia Supreme Court filing published yesterday reportedly says Grant Thorton has discovered that the business only has approximately $15,000 in cryptocurrency and $30,000 in cash.

The cryptocurrency exchange was incorporated by director Michael Ongun Gokturk in December 2017, during Bitcoins famous bull run.

In May this year, the BCSC launched an investigation into customer complaints.

Grant Thornton has reportedly issued notices to several banks across Canada and the US, whereGokturk and the exchange may have held investments or deposits, and seized shares in private companies.

Gokturk did not respond to Global News request for comment, nor has he replied to the allegations made in the BCSC case filings.

But, the Einstein Group has reportedly told Grant Thornton that it believes it owes clientsbetween US$8 and $10 million.

This deficit, the company says, stems from credit card and bank draft frauds. The majority of this loss is made up of cryptocurrency assets, it adds.

Einstein Exchange is believed to have served 200,000 users from all over the globe.Grant Thornton has so far heard from 200-300 people said to be affected by the exchanges collapse.

Published November 19, 2019 11:00 UTC

More:
Cryptocurrency exchange that went dark with $16M in user funds only has $45k, report - The Next Web

Read More..

Cryptocurrency market update: $5 billion wiped off as Bitcoin bears take a breather – FXStreet

The cryptocurrency market is neither bearish or bullish during the European trading hours on Wednesday. The low trading activity is a break from two days of a continued selloff, especially for the major cryptocurrencies. Meanwhile, the market has lost $5 billion in the last 24 hours from $227 billion to $222 billion.

Bitcoin has been lethargic in its trading on Wednesday. From the opening price of $8,122, the price tested the hurdle at $8,150. However, the prevailing selling pressure has seen BTC adjust 0.7% lower on the day to trade at $8,066.

Looking at the 4-hour chart, Bitcoin has sustained a downtrend in a falling wedge pattern. As long as the pattern support remains intact, Bitcoin has the potential to correct higher in the coming sessions. However, as far as the MACD is concerned, bearish dominance could last longer. To completely avert declines below $8,000, Bitcoin must rise above $8,250 in the near-term.

View post:
Cryptocurrency market update: $5 billion wiped off as Bitcoin bears take a breather - FXStreet

Read More..