Page 4,120«..1020..4,1194,1204,1214,122..4,1304,140..»

What Is Machine Learning? | How It Works, Techniques …

Supervised Learning

Supervised machine learning builds a model that makes predictions based on evidence in the presence of uncertainty. A supervised learning algorithm takes a known set of input data and known responses to the data (output) and trains a model to generate reasonable predictions for the response to new data. Use supervised learning if you have known data for the output you are trying to predict.

Supervised learning uses classification and regression techniques to develop predictive models.

Classification techniques predict discrete responsesfor example, whether an email is genuine or spam, or whether a tumor is cancerous or benign. Classification models classify input data into categories. Typical applications include medical imaging, speech recognition, and credit scoring.

Use classification if your data can be tagged, categorized, or separated into specific groups or classes. For example, applications for hand-writing recognition use classification to recognize letters and numbers. In image processing and computer vision, unsupervised pattern recognition techniques are used for object detection and image segmentation.

Common algorithms for performing classification include support vector machine (SVM), boosted and bagged decision trees, k-nearest neighbor, Nave Bayes, discriminant analysis, logistic regression, and neural networks.

Regression techniques predict continuous responsesfor example, changes in temperature or fluctuations in power demand. Typical applications include electricity load forecasting and algorithmic trading.

Use regression techniques if you are working with a data range or if the nature of your response is a real number, such as temperature or the time until failure for a piece of equipment.

Common regression algorithms include linear model, nonlinear model, regularization, stepwise regression, boosted and bagged decision trees, neural networks, and adaptive neuro-fuzzy learning.

Continue reading here:

What Is Machine Learning? | How It Works, Techniques ...

Read More..

Qubits and Defining the Quantum Computer | HowStuffWorks

The Turing machine, developed by Alan Turing in the 1930s, is a theoretical device that consists of tape of unlimited length that is divided into little squares. Each square can either hold a symbol (1 or 0) or be left blank. A read-write device reads these symbols and blanks, which gives the machine its instructions to perform a certain program. Does this sound familiar? Well, in a quantum Turing machine, the difference is that the tape exists in a quantum state, as does the read-write head. This means that the symbols on the tape can be either 0 or 1 or a superposition of 0 and 1; in other words the symbols are both 0 and 1 (and all points in between) at the same time. While a normal Turing machine can only perform one calculation at a time, a quantum Turing machine can perform many calculations at once.

Today's computers, like a Turing machine, work by manipulating bits that exist in one of two states: a 0 or a 1. Quantum computers aren't limited to two states; they encode information as quantum bits, or qubits, which can exist in superposition. Qubits represent atoms, ions, photons or electrons and their respective control devices that are working together to act as computer memory and a processor. Because a quantum computer can contain these multiple states simultaneously, it has the potential to be millions of times more powerful than today's most powerful supercomputers.

This superposition of qubits is what gives quantum computers their inherent parallelism. According to physicist David Deutsch, this parallelism allows a quantum computer to work on a million computations at once, while your desktop PC works on one. A 30-qubit quantum computer would equal the processing power of a conventional computer that could run at 10 teraflops (trillions of floating-point operations per second). Today's typical desktop computers run at speeds measured in gigaflops (billions of floating-point operations per second).

Quantum computers also utilize another aspect of quantum mechanics known as entanglement. One problem with the idea of quantum computers is that if you try to look at the subatomic particles, you could bump them, and thereby change their value. If you look at a qubit in superposition to determine its value, the qubit will assume the value of either 0 or 1, but not both (effectively turning your spiffy quantum computer into a mundane digital computer). To make a practical quantum computer, scientists have to devise ways of making measurements indirectly to preserve the system's integrity. Entanglement provides a potential answer. In quantum physics, if you apply an outside force to two atoms, it can cause them to become entangled, and the second atom can take on the properties of the first atom. So if left alone, an atom will spin in all directions. The instant it is disturbed it chooses one spin, or one value; and at the same time, the second entangled atom will choose an opposite spin, or value. This allows scientists to know the value of the qubits without actually looking at them.

Next, we'll look at some recent advancements in the field of quantum computing.

Excerpt from:
Qubits and Defining the Quantum Computer | HowStuffWorks

Read More..

How Encryption Works | HowStuffWorks

When we use the Internet, we're not always just clicking around and passively taking in information, such as reading news articles or blog posts -- a great deal of our time online involves sending others our own information. Ordering something over the Internet, whether it's a book, a CD or anything else from an online vendor, or signing up for an online account, requires entering in a good deal of sensitive personal information. A typical transaction might include not only our names, e-mail addresses and physical address and phone number, but also passwords and personal identification numbers (PINs).

The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live and work. It's extremely easy to buy and sell goods all over the world while sitting in front of a laptop. But security is a major concern on the Internet, especially when you're using it to send sensitive information between parties.

Let's face it, there's a whole lot of information that we don't want other people to see, such as:

Information security is provided on computers and over the Internet by a variety of methods. A simple but straightforward security method is to only keep sensitive information on removable storage media like portable flash memory drives or external hard drives. But the most popular forms of security all rely on encryption, the process of encoding information in such a way that only the person (or computer) with the key can decode it.

In this article, you will learn about encryption and authentication. You will also learn about public-key and symmetric-key systems, as well as hash algorithms.

Read more from the original source:
How Encryption Works | HowStuffWorks

Read More..

How Quantum Computers Work | HowStuffWorks

The massive amount of processing power generated by computer manufacturers has not yet been able to quench our thirst for speed and computing capacity. In 1947, American computer engineer Howard Aiken said that just six electronic digital computers would satisfy the computing needs of the United States. Others have made similar errant predictions about the amount of computing power that would support our growing technological needs. Of course, Aiken didn't count on the large amounts of data generated by scientific research, the proliferation of personal computers or the emergence of the Internet, which have only fueled our need for more, more and more computing power.

Will we ever have the amount of computing power we need or want? If, as Moore's Law states, the number of transistors on a microprocessor continues to double every 18 months, the year 2020 or 2030 will find the circuits on a microprocessor measured on an atomic scale. And the logical next step will be to create quantum computers, which will harness the power of atoms and molecules to perform memory and processing tasks. Quantum computers have the potential to perform certain calculations significantly faster than any silicon-based computer.

Scientists have already built basic quantum computers that can perform certain calculations; but a practical quantum computer is still years away. In this article, you'll learn what a quantum computer is and just what it'll be used for in the next era of computing.

You don't have to go back too far to find the origins of quantum computing. While computers have been around for the majority of the 20th century, quantum computing was first theorized less than 30 years ago, by a physicist at the Argonne National Laboratory. Paul Benioff is credited with first applying quantum theory to computers in 1981. Benioff theorized about creating a quantum Turing machine. Most digital computers, like the one you are using to read this article, are based on the Turing Theory. Learn what this is in the next section.

More:
How Quantum Computers Work | HowStuffWorks

Read More..

encryption – How secure is AES-256? – Cryptography Stack …

An interesting thing about some modern standardized ciphers, like AES, is that the government is "eating its own dogfood" by using them internally. (AES 192 and 256 are approved for top-secret data.) Back in the day (up through the 90s), U.S. government internal encryption standards was not closely aligned with public sector cryptography, and we largely had to speculate as to whether public crypto could hold up to the government standards; the NSA had a history of knowing more crypto than they let on. But now that they are willing to stake their own security on them, that seems like a decent endorsement of those algorithms.

The U.S. government has conflicting goals: they want to be able to break crypto, but at the same time, in the interest of protecting the citizen in the digital age, they want us to be protected against the crypto attacks of others. So much of our modern economy relies on crypto that we want a high security margin on it. Since the 90s, crypto knowledge in the public and foreign intelligence domains has sky rocketed, and a vulnerability that the NSA can exploit is possibly a vulnerability that someone else can exploit. So at the drafting of AES, we doubt that they were focused on choosing a candidate that could be broken and kind of suspect they wanted a candidate that could not be.

Since you only break crypto when you don't have the key, to compromise those two goals they could just allow us mathematically secure crypto, then focus on getting the keys instead. If they can recover keys, they don't care how strong our crypto is. Attacking the endpoints that generate the keys is not always as hard as it seems (consider how many user and corporate machines get infected with malware, and think about what sort of key-related backdoors could be planted in popular software), and a simple subpoena might get keys in some situations. As more user data moves toward the cloud, backdoors in public services (voluntarily provided or not) are going to make the job of key recovery even easier.

Summary of these two points:

The federal government is allowed to use AES for top-secret information.

We don't know that they would actually want AES to be mathematically breakable, so at the AES competition 11 years ago it is possible they would have avoided any algorithm they thought they could break in the near future.

None of that is proof, but we tend to assume that the NSA can't break AES.

View original post here:
encryption - How secure is AES-256? - Cryptography Stack ...

Read More..

10 Best Free Cloud Storage Services in 2019 [Updated …

Cloud Computing is a revolution in the IT world that has changed the meaning of IT resources for businesses. In simple terms, cloud computing is related to the delivery of cloud computing services storage, compute, networking, database, and more over the internet. Cloud storage is what we have adopted intentionally or unintentionally; there is a buzz all around about the free cloud storage solutions.

The cloud storages have nowadays become a prized possession for very small and large business groups. The businesses try not to rely on hardware that is costly and thereby want to switch their data to the best free cloud storage available. But there are many businesses that have a very less knowledge of cloud storage and hence are surrounded by the blind beliefs of the traditional storage devices.

Preparing to become a certified cloud professional? Check our Cloud Certifications Training Courses now!

To benefit such businesses, we have compiled this blog to help them understand what is cloud storage and what are the best cloud storage options available for their businesses. Lets get started!

The traditional methods of storing data such as hard drives and pen drives or any other storage device have a lot of advantages associated. But once the storage device gets corrupted all the data stored gets lost. Hence the virtual cloud storage is a replica of the traditional storage devices where the users can store their data and keep their backup files on hardware and USB flash drives.

The IT sectors are always stressed out when its time for them to switch over to new software or technologies as this makes them hire more employees, but with the best free cloud storage available, the investment of the IT sectors has reduced comparatively. The best free cloud storage club members have introduced many free plans for businesses to ease their search for free storage.

There are a number of free cloud storage options available these days. These cloud storage are easy to use and provide free storage space up to50GB. These storage solutions can be used for personal as well as business storage. All you need is get some basic knowledge about these free cloud storage and choose the most suitable one. Here we bring the list of the best free cloud storage, lets dive deep to know more about these cloud storage solutions.

As we know all online storage works the same way i.e. we use a file, store on the web, and sync it in our computers. But there are many standing features of Google Drive that makes it special among all the other cloud storage because it lets the users store their personal stuff in a personal way and moreover the Google free cloud storage provides with an excellent free storage of 15GB and is one of the best cloud storage.

The Google Drive offline services help its users to view all the files and photos that are saved online even when they have a bad network service. Scanning documents have now become much easier by just taking a snap of the document and the rest is done by the drive like storing them in PDF form. Google free cloud storage is considered the best which is integrated with all other Google services.

Recommended Reading:Introduction to Cloud Computing

Media Fire is easy to use and one of the best free cloud storage used for storing documents and photos online. The initial free storage that media fire provides is 10GB but their incredible feature is that the free storage can be increased up to 50 GB. This cloud storage has many features which has made handling of files easier.

Media fire has made possible uploading multiple files at once from any browser which is a unique feature and makes it different from the others. Organizing files in the file manager of Media Fire have become easier. Searching for something that gives a perfect personal document features? The Media Fire is here to ease your search as it helps the users in sending documents with a specialized and free one time link which enables the recipients to share it further.

This is also one of the other best free cloud storage available. Syn.com provides a free storage of about 5GB. It has become quite easy to back up files with Sync.com only when the users have used something better than the sync folder because exploring the sync.com web panel which offers incredible features is productive. The best feature of the Sync.com is the restoring of deleted files and thereby stops users from regretting for mysteriously lost important documents.

Get free space feature is the most excellent feature that syn.com offers. If a user wants to get a bit more space for files and photos what is to be done is tell a friend about Sync and the number of friends signs up for sync gets a free gigabyte along with the user who recommends it to others. The Sync Vault is a feature which helps the users to save files and documents in a special storage space known as Vault which is different from the Sync folder and all that is required to be done just select a file and choose the option of Copy to Vault and your important data gets a backup.

The Mega cloud storage is a great storage space which is much similar to the dropbox storage but the difference between the two is the amount of the space that both the cloud storage provides. 50GB of free space is available for the Mega cloud storage users. Mega cloud storage helps users to download multiple files in the zip file and uploading files through the mobile app is also possible.

The unbeatable storage of 50GB has made it among one of the popular free cloud storage available and has attracted a large number of users towards Mega cloud storage. The users who are searching for an excellent backup file option should definitely sign up Mega cloud storage as it only provides with the best storage but also with the many security features.

Also Read: LatestCloud Computing Trendsin 2019

This is one of the powerful and latest free cloud storage compared to all other cloud storages because of its great back up features. Any type of small and large powerpoint presentations, photos, videos or maybe even other large CAD files can be safely kept in the Dropbox. Dropbox provides the users with easy sync features that help to access the files and documents to the Dropbox from any device.

Dropbox free storage provides users with many features that are extremely helpful. One of the helpful features is that a user can protect all the files and documents in a lost device by clearing the documents from the device with the remote wipe feature that it provides. Dropbox free storage offers a good storage space (2GB) that is free but in case of users are in need of more space, there are many plans that can help them to get the desired storage of their choice.

pCloud is one of the best free cloud storage options that provides 2TB storage and its unlimited remote upload traffic feature makes it unique. It offers 10GB of free storage space to its basic accounts. Resizing pictures on the go without the help of software has now become much easier with my.pCloud, which provides with a wide range of resizing options for its users.

The archive features the pCloud offers is amazing as files can be archived with the create archive option that it provides. The pCloud drive has an option that helps the users automatically lock the crypto folders each and every time they log off from the device.

Keeping documents and files within reach has become possible with the top free cloud storage solutions such as Microsoft OneDrive. Signing up with Microsoft can help users in keeping everything in one place. It earlier provided 15GB of free space to the users but has now reduced to 10GB. It can be accessed from any device at any point of time but is pre-installed in windows. This cloud storage is considered to be the second most wanted storage among businessman after the Dropbox storage cloud.

The main disadvantage of outlook was the user frustration of saving attachments from emails because of the number of steps that involved but it has now become easier for the businesses to choose email attachments and save it directly in folders. Now it has also become easier to create excel surveys and save it in OneDrive.

Must Read:Top 5 Cloud Computing Certifications

The Apple iCloud is the best free cloud storage for Apple users. Initially, it provides the users with 5GB of free storage. All documents and files can be stored safely and it is easy to use. The users of Apple iCloud can share photos and videos with ease with their family members. Organizing files and folders has become easy with Apple iCloud. Apple iCloud helps in sending messages and automatically and saves them. Even the users can start conversations from the exact point that they have stopped earlier.

The Next cloud is another best free cloud storage which helps in protecting data and has a lot of exciting features that attracts users. It provides an excellent backup feature which helps the users to keep track of all the data even after the device is lost. The Next Cloud provides a two-factor authentication to its users which in turn, provides an extra protection towards account usage.

This is another best free cloud storage available that helps the users in saving photos and files securely. This cloud storage has many features which have made handling of files easier. Maintaining a perfect workflow i.e. sharing of photos, videos, and documents have now become easier with the powerful features of Amazon Drive. It provides 24*7 support and 5GB of free storage after signing up.

Since it is all about getting the best free cloud storage, it is very important to understand the features that make the best cloud storage. There are many cloud storage providers that not only provide you the free cloud storage but also with many other features. Some cloud storages are there in the market that not only provides the best user experience and incredible features but helps users to enjoy the free services after the signup. But the other cloud storage that is mentioned above is also worth signing up as they all come up with unique features and free storage facilities.

The importance of cloud storage is increasing with the enhanced cloud growth and latestcloud computing trends. With the enhanced growth and the adoption of cloud by businesses and enterprises, the demand for cloud professionals is increasing. And there are even more opportunities for those having a cloud certification.

So, if you are planning to build a career in cloud computing or an aspired cloud professional looking for career growth, start preparing for the cloud certification. Whizlabs Cloud Certification Training Courses will help you in your journey of becoming a certified cloud professional. We are the pioneers among online certification training providers and have helped millions of professionals in getting their career one level up.

So, take a step ahead and join us to become a certified cloud professional.

Wish you the best for your certified cloud career!

Have any query/concern regarding cloud storage solutions? Just write below in the comment section or submit your query at Whizlabs Helpdesk, well respond to you in no time.

About Neeru JainTechnology Scientist by Mind and Passionate Writer by Heart!!With an enthusiasm for technological research and learning, Neeru turned out to be a technology expert. Her Belief: Words are powerful enough to change Mind, Life, and the World; only the writer should have a real passion for Writing!!

Read more:
10 Best Free Cloud Storage Services in 2019 [Updated ...

Read More..

Trend Micro – Simply Security News, Views and Opinions from …

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how criminals can use tax deadlines for social engineering schemes and redirection URLs in spam emails to sidestep spam filters. Read on: Beware Tax Scams and

The Internet of Things (IoT) is transforming the way we live, work and play. You can find it in the fitness trackers you might be wearing to monitor step count and heart rate. Or the car you may be driving. But more than anywhere else, youll see IoT at home in an increasing array of

At Trend Micro, its our mission to secure the connected world. However, we want to go beyond the boundaries of the cybersecurity industry to support and learn from the technology innovators of tomorrow. Thats what our venture arm, Trend Forward Capital, is all about. As part of these efforts, we held a pitch-off competition this

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about vulnerabilities that can allow hackers to retrieve data from CPUs and mine cryptocurrency. Read on: Mays Patch Tuesday Include Fixes for Wormable Flaw in

Email is a mature technology, but threats targeting email are evolving and getting more sophisticated. 97%1 of ransomware attacks come from email. Thats why there are so many email security vendors and solutions in the market offering different types of technologies and coverages. Picking the best email security solution for an organization can be overwhelming.

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how credit card skimming attacks can impact businesses and how ransomware can use software installations to help hide malicious activities. Read on: Mirrorthief Group Uses Magecart

Malice Vs Greed Most discussion about security in the supply chain has been focused on detecting tampering, or preventing backdoors or sneaky things being inserted into components and software. Theres another aspect emerging and will dwarf the tampering: devices that are counterfeited for profit indirectly causing security problems. Counterfeit devices are ones that either by

Online passwords are sensitive data. When they end up in the wrong hands, your private information is at risk. Since cybercriminals are always searching out new ways to break into those online accounts, you need to watch over the passwords to your accounts as if they were your children. Since we typically access our accounts

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the prevalence and impact of BEC attacks. Also, find out how botnet malware can perform remote code execution, DDoS attacks and cryptocurrency mining. Read on:

Submitted by: Adam Boyle, Head of Product Management, Hybrid Cloud Security, Trend Micro When it comes to software container security, its important for enterprises to look at the big picture, taking into account how they see containers affecting their larger security requirements and future DevOps needs.Good practices can help security teams build a strategy that

View post:
Trend Micro - Simply Security News, Views and Opinions from ...

Read More..

Linux Cloud Servers- instantly flexible

Linux feels like home in our cloudDiscover high performance cloud servers and leave traditional Linux Virtual Private Server (VPS) hosting behind. Traditional VPS providers slice up large dedicated servers to share them between customers. Typically VPS providers use a container technology to isolate multiple users on a single server from one another whilst running a single shared instance of Linux. By contrast, our Linux KVM technology enables every user to run their own isolated copy of Linux, providing a greater choice of distributions, higher performance, deeper configurability, stronger isolation and better security guarantees.Pre-Installed Linux Cloud ServersUbuntu 14.04 LTS

We offer both server and desktop editions of Ubuntu 14.04 as instantly deployable cloud servers. Creating a new Linux cloud server is as easy as clicking on the ready distribution. Pre-installed Ubuntu servers are instantly deployed allowing you to use them immediately as part of our cloud hosting Linux packages.

We offer Fedora 21 (and previous versions) as ready server images. Creating your new Fedora cloud server is simply a matter of deploying it to your Linux cloud computing account. Your new Fedora Linux server will be ready immediately after choosing it.

We offer CentOS 7 Linux from our library of pre-installed cloud servers. Creating your new Fedora cloud server is simply a matter of deploying it to your account. Your new CentOS Linux server will be ready immediately after choosing it.

Debian 7.8 Linux deploys instantly as a new cloud server. You have the choice of with or without X and your new Linux server will appear immediately in your cloud computing Linux account.

No problem, you find most versions of most Linux distributions in our drives library. If you cant find your version, you can even upload your own ISO file or disk image.

We have over 150 Linux distribution install CDs available from the drive library plus a number of pre-installed Windows cloud servers and FreeBSD cloud servers. If you wish to create a new custom system installation yourself you can do so. Our cloud hosting Linux servers offer a true cloud computing experience.

Read more from the original source:
Linux Cloud Servers- instantly flexible

Read More..

Quantum computing could change everything, and IBM is …

In January, IBM made waves when it announced its IBM Q System One, the world's first gate model quantum computer available to businesses a system housed in a sleek, 9-cubic-foot glass case.

It's a major milestone for quantum computers, which had to date mostly been found in research labs. Already, IBM says, customers are lining up to figure out how to get their hands on this technology, which shows promise in fields as varied as chemistry, materials science, food production, aerospace, drug discovery, predicting the stock market and even fighting climate change.

The reason for excitement: a quantum computer has seemingly-magical properties that allow it to process exponentially more information than a conventional system. A quantum computer isn't just a much faster computer. Rather, it's an entirely different paradigm of computing that requires some radical rethinking.

Now, the race is on to be the first company to conquer the massive opportunity presented by this technology. IBM, Microsoft, Google, and other tech titans and startups alike are all placing big bets on the technology. Meanwhile, in December, the U.S. government passed the National Quantum Initiative Act, which proposes spending $1.2 billion over the next five years on labs, academia and companies to advance quantum computing technologies.

The rest is here:
Quantum computing could change everything, and IBM is ...

Read More..

For a Split Second, a Quantum Computer Made History Go …

The uncertainty principle, which lies at the heart of quantum mechanics, states that, at any given moment, either the location or the velocity of a subatomic particle can be specified, but not both. As a result, a particle such as an electron, or a system of them, is represented by a mathematical entity called a wave function, whose magnitude is a measure of the probability of finding a particle in a particular place or condition.

The wave function extends throughout space and time. The law describing its evolution, known as the Schrdinger equation, after Austrian physicist Erwin Schrdinger, is equally valid running forward or backward. But getting a wave function to go in reverse is no small trick.

Dr. Vinokur likened the challenge to sending a speeding billiard ball back to where it started. Seems easy: Just hit it with a cue stick. But if its a quantum ball, the uncertainty principle kicks in: You can know how hard to hit the ball, or in which direction to hit it, but not both.

Because of the uncertainty principle, the quantum ball will never return back to the point of the origin, Dr. Vinokur said.

Moreover, in quantum mechanics, the ball is actually a wave: Once its location is known, it spreads like ripples on a pond and evolves. Making it go backward takes more than a nudge with a cue stick. It requires reversing the phases of the waves, turning crests into troughs, and so forth, an operation too complex for nature to accomplish on its own.

Enter the quantum computer.

Unlike regular computers, which process a series of zeros and ones, or bits, quantum computers are made of so-called qubits, each of which can be zero and one at the same time. A quantum computer can perform thousands or millions of calculations simultaneously, so long as nobody looks to see what the answer is until the end.

Read the original post:
For a Split Second, a Quantum Computer Made History Go ...

Read More..