Page 4,266«..1020..4,2654,2664,2674,268..4,2804,290..»

Report: Cloud Computing Is Transforming Modern Manufacturing – Manufacturing Business Technology

WASHINGTONCloud computing is transforming virtually every facet of modern manufacturing from how companies operate to how they integrate into supply chains and how they design and fabricate products. This is helping manufacturers innovate, reduce costsand increase U.S. competitiveness, according to a new report from the Information Technology and Innovation Foundation (ITIF) and the American Enterprise Institute. The two think tanks urge policymakers to further bolster U.S. competitiveness by crafting a supportive policy environment to maximize adoption of the technology.

Cloud computing has permeated virtually all facets of modern manufacturing and is transforming how todays products are designed, madeand used, said Stephen Ezell, ITIFs vice president for global innovation policy and the reports lead author. This is enabling both large and small manufacturers to accelerate time to market, facilitate collaboration, support supply-chain integration, increase operational efficiencyand much more all to the benefit of U.S. economic competitiveness. We need to put in place the right policy environment for U.S. manufacturers and the economy as a whole to capture maximum possible benefit from cloud computing and ensure America doesnt fall behind in this new industrial revolution.

The report describes how cloud computing enables modern manufacturing, provides real-word case studies of this process in actionand recommends actions policymakers can take to ensure cloud computing continues to transform manufacturing and bolster U.S. competitiveness.

The report urges U.S. policymakers to take action on both domestic and international policies, including:

Read summary.

You can read the whole report here.

Read more here:
Report: Cloud Computing Is Transforming Modern Manufacturing - Manufacturing Business Technology

Read More..

Will edge computing blow away the cloud? – ITProPortal

Just about every new piece of technology is considered disruptive to the extent that they are expected to replace older technologies. Sometimes as with the cloud, old technology is simply re-branded to make it more appealing to customers and thereby to create the illusion of a new market. Lets remember that Cloud Computing had previously existed in one shape or form. At one stage it was called On Demand Computing, and then it became Application Service Provision.

Now there is Edge Computing, which some people are also calling Fog Computing and which some industry commentators feel is going to replace the Cloud as an entity. Yet the question has to be: Will it really? The same viewpoint was given when television was invented. Its invention was meant to be the death of radio. Yet people still tune into radio stations by their thousands each and every day of every year. Of course, there are some technologies that are really disruptive in that they change peoples habits and their way of thinking. Once people enjoyed listening to Sony Walkmans, but today most folk listen to their favourite tunes using smartphones thanks to iPods and the launch of the first iPhone by Steve Jobs in 2007, which put the internet in our pockets and more besides.

So why do people think the Edge Computing will blow away the cloud? This claim is made in many online articles. Clint Boulton, for example, writes about it in his Asia Cloud Forum article, Edge Computing Will Blow Away The Cloud, of 6th March 2017. He cites venture capitalist Andrew Levine, a general partner at Andreessen Horowitz, who believes that more computational and data processing resources will move towards Edge devices such as driverless cars and drones - which make up at least part of the Internet of Things. Levine prophesises that this will mean the end of the cloud as data processing will move back towards the edge of the network.

In other words the trend has been up to now to centralise computing within the datacentre, while in the past it was often decentralised or localised nearer to the point of use. Levine sees driverless cars as being a datacentre; they have more than 200 CPUs working to enable them to operate without going off the road and causing an accident. The nature of autonomous vehicles means that their computing capabilities must be self-contained, and to ensure safety they minimise any reliance they might otherwise have on the cloud. Yet they dont dispense with it.

So the two approaches may in fact end up complementing each other. Part of the argument for bringing data computation back to the Edge falls down to increasing data volumes, which lead to ever more frustratingly slow networks. Latency is the culprit. Data is becoming ever larger. So there is going to be more data per transaction, more video and sensor data. Virtual and augmented reality are going to play an increasing part in its growth too. With this growth, latency will become more challenging than it was previously. Furthermore, while it might make sense to put data close to a device such as an autonomous vehicle to eliminate latency, a remote way of storing data via the cloud remains critical.

The cloud can still be used to deliver certain services too, such as media and entertainment. It can also be used to back-up data and to share data emanating from a vehicle for analysis by a number of disparate stakeholders. From a datacentre perspective, and moving beyond autonomous vehicles to a general operational business scenario, creating a number of smaller datacentres or disaster recovery sites may reduce economies of scale and make operations more inefficient than efficient. Yes latency might be mitigated, but the data may also be held within the same circles of disruption with disastrous consequences when disaster strikes. So for the sake of business continuity some data may still have to be stored or processed elsewhere, away from the edge of a network. In the case of autonomous vehicles, and because they must operate whether a network connection exists or not, it makes sense for certain types of computation and analysis to be completed by the vehicle itself. However, much of this data is still backed up via a cloud connection whenever it is available. So, Edge and Cloud Computing are likely to follow more of a hybrid approach than a standalone one.

Saju Skaria, Senior Director at consulting firm TCS, offers several examples of where Edge Computing could prove advantageous in his Linkedin Pulse article, Edge Computing Vs. Cloud Computing: Where Does the Future Lie?. He certainly doesnt think that the cloud is going to blow away:

Edge Computing does not replace cloud computingin reality, an analytical model or rules might be created in a cloud then pushed out to Edge devicesand some [of these] are capable of doing analysis. He then goes on to talk about Fog Computing, which involves data processing from the Edge to a cloud. He is suggesting that people shouldnt forget data warehousing too, because it is used for the massive storage of data and slow analytical queries.

In spite of this argument, Gartners Thomas Bittman, seems to agree that Edge Will Eat The Cloud: Today, cloud computing is eating enterprise datacentres, as more and more workloads are born in the cloud, and some are transforming and moving to the cloud.But theres another trend that will shift workloads, data, processing and business value significantly away from the cloud. The Edge will eat the cloudand this is perhaps as important as the cloud computing trend ever was.

Later on in his blog, Bittman says: The agility of cloud computing is great but it simply isnt enough. Massive centralisation, economies of scale, self-service and full automation get us most of the way there but it doesnt overcome physics the weight of data, the speed of light. As people need to interact with their digitally-assisted realities in real-time, waiting on a datacentre miles (or many miles) away isnt going to work. Latency matters. Im here right now and Im gone in seconds. Put up the right advertising before I look away, point out the store that Ive been looking for as I driver, let me know that a colleague is heading my way, help my self-driving car to avoid other cars through a busy intersection. And do it now.

He makes some valid points, but he falls into the argument that has often been used about latency and datacentres: They have to be close together. The truth, however, is that Wide Area Networks will always be the foundation stone of both Edge and Cloud Computing. Secondly, Bittman clearly hasnt come across data acceleration tools such as PORTrockIT and WANrockIT. While physics is certainly a limiting and challenging factor that will always be at play in networks of all kinds including WANs, it is possible today to place your datacentres at a distance from each other without suffering an increase in data and network latency. Latency can be mitigated, and its impact can be significantly reduced no matter where the data processing occurs, and no matter where the data resides.

So lets not see Edge Computing as a new solution. It is but one solution, and so is the cloud. Together the two technologies can support each other. One commentator says in response to a Quora question about the difference between Edge Computing and Cloud Computing that: Edge Computing is a method of accelerating and improving the performance of cloud computing for mobile users. So the argument that Edge will replace Cloud Computing is a very foggy one. Cloud Computing may at one stage be re-named for marketing reasons, but its still here to stay.

David Trossell, CEO and CTO, Bridgeworks Image Credit: Stokkete

Read more:
Will edge computing blow away the cloud? - ITProPortal

Read More..

Intel delivers new 64-layer SSD tech for cloud computing – Computer Business Review

Add to favorites

Intel has launched a new 64-layer SSD 3D NAND technology for cloud computing to deliver scalability and density for performance boost.

Intel has developed a new 64-layer SSD, which the chip giant has pitched as the worlds first commercially available SSD tool for cloud computing.

The new 3D NAND technology is described as having a floating gate architecture that provides density and scalability for future compute tasks. It also offers the opportunity to scale to a large capacity while delivering more gigabytes per wafer.

It has an overall capacity of 512GB, with 6GB SATA interface. The 4K block read/write IOPS which are almost the same size as the existing client SSD 540s products.

Intel says that the development of the 3D NAND technology has enabled them to design the technology into SSD solutions, while also improving performance, power consumption and reliability with each generation.

One of these generations includes the new Intel SSD 545s, which will have additional capacity variants added from sizes 128GB to 2TB. This is built for the mainstream market delivering performance for both old and new value PCs.

Intel was driven by the demand for better experience between compute and data, which is what led the company to continually invest in 3D NAND and Optane technologies.

Rob Crooke, SVP and GM, Intel said: This next generation of process leadership will enable a smooth, easy migration and validation cycle for our existing data centre customers from todays 32-layer products to 64-kayer product extensions.

It also enables an expanded product portfolio that supports new business client and embedded products. We have a very strong generational synergy in our factories and expect a fast ramp of bit supply based on 64-layer, TLC, 3D NAND by mid-2018.

The SSD 545s can be paired with Intels Core-based platform, which boosts improvement levels in power consumption through the use of advanced power mode settings.

See original here:
Intel delivers new 64-layer SSD tech for cloud computing - Computer Business Review

Read More..

CloudRanger Unveils New Visual Server Management Platform for Most Secure, Economical Data Storage – Benzinga

First-of-its-kind software features graphical scheduling for Amazon Web Services server usage and automated backups

Chicago, IL (PRWEB) June 28, 2017

CloudRanger, the simple backup solution for Amazon Web Services (AWS), today announced the launch of its newest software, which simplifies users' experience and provides more control over the cloud. The new version offers users effortless scheduling and backup policies, while providing a bird's eye view of the entire server system from one easy-to-use dashboard, ultimately saving users time and money.

"As everything begins to move to the cloud, we see increasingly more cloud users, including many without a technical background. With this shift, visual server management will quickly become essential, as we will see cloud usage surge across industries," said CloudRanger Chief Executive Officer, Dave Gildea. "When we set out to design the new software, we spent a significant amount of time talking with our customers, and based on their feedback, we completely scrapped our old software and built this new version from scratch."

Key features of CloudRanger's new platform include:

"While cloud technology continues to make our lives easier and information more accessible, relying on the cloud can also leave you open to disaster, such as outages or cyber attacks. The only way to safeguard your data is with reliable backups and a disaster recovery plan," explained Dan Creviston, CloudRanger Chief Product Officer. "Not only is CloudRanger's new software easy to use, it provides the utmost security by ensuring data is consistently backed up and saved in multiple locations."

CloudRanger's proprietary scheduling and backups across an entire server system are easy to understand for even non-technical users, while the bird's eye view of the entire server system and graphical scheduling module provide a usability for AWS that's not even available from Amazon itself.

"Our goal in developing this new software was to make cloud management simple and accessible to everyone, across all industries," added Creviston. "This version is not only more streamlined and user-friendly, but ultimately gives the user more control over their cloud."

At the time of its software release, CloudRanger is one of the first companies worldwide to be included in Amazon's SaaS Contracts on the AWS Marketplace. Launched in late April 2017, AWS Marketplace SaaS Contracts offers more options and flexibility for both customers and sellers in the AWS Marketplace.

In addition to its newly designed software, CloudRanger has released CloudRanger Instance Type Availability Service (CRITAS) free of charge on Github.com. CRITAS provides a constantly updated list of all available instances in AWS across all regions, and is available as a JSON file on S3. About CloudRanger CloudRanger delivers cloud server management software for businesses, MSPs and enterprises. Its easy-to-use graphical interface offers users scheduling and backup policies to save time and money. An overall view of the entire server system gives users the most control over their cloud, while delivering enhanced disaster recovery management. CloudRanger is an Amazon Web Services (AWS) Advanced Technology Partner. Clients include HP, NASCAR and MetLife. To learn more, visit http://www.cloudranger.com.

###

For the original version on PRWeb visit: http://www.prweb.com/releases/2017/06/prweb14465973.htm

Original post:
CloudRanger Unveils New Visual Server Management Platform for Most Secure, Economical Data Storage - Benzinga

Read More..

Google deal with Nutanix shows its cloud strategy is broadening – CNBC

Google is ready to accept that some big enterprises need help getting their critical workloads to the cloud.

Its parent Alphabet on Wednesday announced a partnership with Nutanix, whose data center hardware and software provides a hybrid approach that bridges the gap between on-premise servers and machines in big cloud data centers.

The deal is another indication that Nutanix, which held its stock market debut last year, is now embracing the public cloud as a viable infrastructure choice. Simultaneously it reflects how Google is becoming more receptive to the needs of enterprises.

"With public cloud, you have to meet them where they are -- that's becoming increasingly clear," Nan Boden, Google's head of global alliances, told CNBC in an interview. She said that in recent years Google had not cut major deals with data center hardware providers.

In the public cloud, Microsoft Azure and Amazon Web Services represent Google's biggest competition. Microsoft has been working to make its public cloud and private cloud tools match, while AWS has developed hardware and even trucks to facilitate the migration of data into its cloud.

Google, to date, has been less active in supporting cloud architectures that involve companies' existing on-premises infrastructure.

Nutanix does intend to support application deployment on AWS and Azure, although at this point it's working most closely with at Google.

Nutanix CEO Dheeraj Pandey told CNBC that he's been particularly impressed with the head of Google's cloud, Diane Greene, who was previously co-founder and CEO of VMware.

Originally posted here:
Google deal with Nutanix shows its cloud strategy is broadening - CNBC

Read More..

Health systems tout Security CIS Controls in fight against cybercriminals – Healthcare IT News

In the hectic, sometimes crazed world of healthcare cybersecurity, a little guidance can be a welcome thing for CIOs and CISOs. Thats why the Center for Internet Security pieced together its CIS Controls, a framework of 20 controls with the aim of leading healthcare organizations to better, more locked down systems and data security. And some healthcare organizations are using these controls to great effect.

The CIS Controls framework is very approachable; its organized in a prioritized manner, and even the top-level controls are presented in such a way that as technologists we can communicate them intelligently in a conversation to internal stakeholders who are concerned about risk, said Roger Lutz, interim chief information officer at Butler Health System. And we can discuss things at that level, obfuscating the deeper sub-controls, of which there are many, getting interested stakeholders to understand how we are addressing cybersecurity risk.

[Also:Outsourced cybersecurity staff, one way healthcare is getting around the talent shortage]

Healthcare organizations need to select a cybersecurity framework to work from, otherwise, they will simply be reactionary to the latest threats and whatever is in the news, Lutz said.

While your own judgement may be excellent, you may be missing something, he said. To have that framework and work toward a common set of technology controls of which a great number of very intelligent people have come to unified agreement, it helps us to make a lot of real progress over time and record that progress that shows advancement in information security and keeps us on track.

[Also:Here are the dos and don'ts when hiring healthcare cybersecurity pros]

At 20, the number of controls is small enough to manage easily, and further, its easy for both technology staff and management executives to understand all of the controls, said an auditor at a large health system in Tennessee, who wished to remain anonymous due to the sensitive nature of security issues.

There are other frameworks, such as the NIST framework and the ISO 27002, he said, but the Center for Internet Security CIS Controls are just a lot easier to understand.

Lutz points to control No. 5 as an example: Controlled Use of Administrative Privileges.

We identified the need some time ago to control our administrative credentials among the various staff on the information systems team, he said. We implemented a system that does centralized privileges access control. It creates a vault, our users log into the vault to pull the privileged access credentials for other systems so we can automate long, complex passwords for all of our administrators and so forth. This control was one we nailed down pretty well.

Lutz said it is interesting and helpful the way the Center for Internet Security has constructed the controls, where one measures four different categories for each sub-control of a control. Control No. 5 has nine sub-controls, from using multi-factor authentication to logging accesses to using a dedicated machine for administrative tasks. Each of those sub-controls are then measured by policy defined, control implemented, control automated, and control reported to the business.

This is an area that really allows you to demonstrate maturity in your information security programs, Lutz said. Not only are you buying a product or implementing a technology change that provides information security to an organization, you are defining how you are going to do it through policy so you have consistency and so from a governance standpoint you paid attention to the other things and implemented it properly.

And control reported to the business is an important and valuable measurement, Lutz added.

This is about having a way to demonstrate things up the chain of command, to show them what you are doing in a way that doesnt boggle them with technology but instead shows them a measurement they can understand, which over time is important, he said.

The large health system in Tennessee has seen many positive results after working with the CIS Controls.

From our audit perspective, by determining which controls are more critical, based on the audits we can give real-time feedback, here are our findings, here is what needs to be improved, here is what we are doing well, the auditor said. That gets management attention; the auditor report goes to the board of directors. There is awareness brought to the cybersecurity program both to the technical folks and management. This is a slow process, we are not able to do 20 in a year, we are trying to get through all 20 every three years.

The results of using the CIS Controls at Butler Health System include bringing focus to the IT and security teams, bringing measurement to processes and therefore the ability to reflect progress to interested stakeholders within the organization, and bringing prioritization to security projects all of which has led to information security maturity, Lutz said.

If you think of any good process, theres focus, measurement, accountability and prioritization in the face of limited resources, he said. With unlimited resources you can do everything all at once and its less of a constraint. But with constrained resources, being able to focus over the months and years and demonstrate progress in a prioritized manner is excellent. And its great working with controls predesigned by an organization that has excellent technical engineering resources at their disposal.

Twitter:@SiwickiHealthIT Email the writer: bill.siwicki@himssmedia.com

Like Healthcare IT News on Facebook and LinkedIn

Read the original:
Health systems tout Security CIS Controls in fight against cybercriminals - Healthcare IT News

Read More..

Internet security awareness – Maryville Daily Forum

Being safe online is important every day. There may be days devoted to internet security awareness, but you need to be careful every time you go online.

Do you know what it takes to be safe online? You probably connect daily to get information, shop, socialize, or work. Every time you go online, you need to avoid the risk of theft or fraud. Here are some tips to use while visiting the Social Security website and the other websites you use.

Use Strong Passwords--Strong passwords have at least eight characters and include capital letters, numbers, and non-letter characters. These passwords make it harder for someone to hack your account.

Dont Recycle Passwords--Although it requires effort to think of new passwords constantly, it provides safety when you do. What if you use the same password for every site and you lose your password? If someone finds it, they could get access to all your accounts. Many people choose to reuse dont be one of them.

Take Advantage of Multifactor Authentication--Many websites offer the option to use a second factoror methodin addition to just a username and password to ensure that only you access your information. Using more than one factor to establish identity makes it harder for someone to get into your account and steal your personal information. Beginning June 10, 2017, Social Security requires multifactor authentication to access a my Social Security account. Customers choose whether to receive a one-time security code to either their phone or email in order to create a new account or sign into their account. Visit this link to find out more about how to secure your personal my Social Security account: http://www.socialsecurity.gov/myaccount/verifyandprotectid.html. Consider using multifactor authentication whenever its offered to protect your information.

Read Scam Alerts--For information about fraudulent activities related to Social Security, you can find information at our blog Social Security Matters under the Newsroom section at blog.socialsecurity.gov. One way to avoid identity theft is to create your own my Social Security account, if you havent already. When you have an account, no one else can set up an account using your information. Social Securitys Office of the Inspector General investigates fraud involving Social Security and they publish Fraud Advisories at oig.ssa.gov/newsroom/news-release. The Federal Trade Commission website publishes information about scams that appear in the news at http://www.consumer.ftc.gov/scam-alerts. Youll want to be aware of current scams to avoid being tricked.

Review Your Online Accounts and Credit Reports--Just as you review your earnings record with Social Security for accuracy at http://www.socialsecurity.gov/myaccount, you should review your bank and credit card accounts for accuracy. Get a free copy of your credit report available annually from the three credit reporting agencies (Experian, Equifax, and Transunion) at http://www.annualcreditreport.com/ and check it for incorrect entries.

Protecting your identity can be daunting. Guarding your personal information requires investing some time, but is worth it. Discourage theft and fraud by adopting these security practices when you use the internet.

Danny Zimmerman is the Social Security District Manager in Maryville, Missouri

View post:
Internet security awareness - Maryville Daily Forum

Read More..

Law enforcement, security experts warn Snapchat users about brand new ‘Snap Maps’ feature – WPTV.com

WEST PALM BEACH, Fla. - The popular app Snapchat app is navigating tricky - and some say dangerous - territory.

The new 'Snap Maps' shows your followers your location down to the street.

People can see where you are, WPTV internet security expert Alan Crowetz explains. It's a stalker's delight. A pedophile would be all over something like this.

It's kinda rattling the security world because it's tipping off people to where you are. A lot of people don't know this update was rolled out or what it does.

Crowetz says as tech advances, we're left with a dilemma

You have to decide - do you want the convenience or do you want the security? Rarely can you get both completely, he says.

As we continue to fight for that balance, he says education is important.

Have that talk with your children, Crowetz says. A lot of parents don't know what there is out there, and what they should be concerned about. Education is number one.

Parents we spoke to were caught on both sides of the Snap Maps argument

The minute a kid goes around the corner, and someone knows you're there and knows your kid is therethat is an opportunity, says parent Alexai Perrez.

Mother Kelly Levy wasn't as concerned.

It doesn't really bother me because there's dangers everywhere, she says.

She says ultimately it comes down to parent discretion.

Some teens might be able to use that responsibly, and some may not be able to, Levy says.

The company says the Snap Maps setting is off by default.

Although many users online have claimed otherwise.

To turn it off, click on the settings tab in the corner of the screen and select Ghost Mode.

If you would like to sign up for a free internet safety checklist from Alan Crowetzclick here.

More here:
Law enforcement, security experts warn Snapchat users about brand new 'Snap Maps' feature - WPTV.com

Read More..

The battle over encryption and what it means for our privacy – The Globe and Mail

Kenneth Roth is executive director of Human Rights Watch

It is a rare law enforcement officer or intelligence agent who doesnt want access to more information. Yet total information awareness, to use a term from the George W. Bush administration era, has never been possible. Some people whisper to avoid prying ears. Others draw the blinds to prevent looking in.

More fundamentally, the right to privacy the personal preserve where governments should not be allowed to snoop is an impediment to official surveillance. That privacy is necessary to safeguard such sensitive matters as our banking information, our medical history, our personal relationships, or our ability to explore unpopular or potentially embarrassing points of view.

Today the battle between law enforcement and privacy is being fought over encryption. One response to Edward Snowdens revelations about the extent of U.S. government surveillance has been growing popular insistence on encryption such as the end-to-end encrypted communications used in iPhones or WhatsApp to which no phone or Internet company holds an access key. Meeting this week in Ottawa, the Five Eyes intelligence sharing partnership Australia, Canada, New Zealand, the United Kingdom and the United States is considering an Australian proposal to mandate such a key, or back door, to encryption. Officials in the U.S. and U.K. have made similar proposals.

The rationale is that many terrorists and other criminals are using end-to-end encryption to hide their activities. Even if law enforcement officers or intelligence agents obtain a judicial warrant to monitor their communications, the lack of a back door key means there is no way that phone or Internet companies can let these officers in.

Yet a mandated back door essentially a built-in vulnerability is dangerous because there is no way to ensure that only the good guys will exploit it. Todays hackers, both criminal and governmental, are increasingly sophisticated. They have hacked Internet companies, sensitive infrastructure, even the National Security Agency itself. Technology companies are in a feverish race to enhance privacy and security protections. The last thing they need is to introduce a deliberate vulnerability. Few would want to return to an era when encryption was not the norm.

And to what end? A mandated back door to encryption might enable governments to catch some criminals. But criminals with any degree of sophistication would simply download encryption services that are widely available on the Internet without going through one of the brand-name companies that might be mandated to introduce a back door. Meanwhile, ordinary members of the public would be stuck with vulnerable communications.

Moreover, Western Internet and phone companies would be competitively crippled. Even if Five Eyes and other Western governments mandated a back door for devices made in their country, other countries might not follow suit. Anyone concerned with their privacy and security would flock to and try to sneak in devices produced in non-back-door countries.

The crimes that might be stopped through a back-door mandate must be weighed against the crimes that would be created. The vulnerability in our software and digital devices would mean more theft, blackmail and extortion as hackers enjoy a field day. Street crime would also be affected. The rise of strong default smartphone encryption has contributed to a plummeting in once-rampant cellphone theft. Theres no point in stealing a phone (often violently) if you cant penetrate its encryption. A mandated back door, once its vulnerability has been hacked, would once again expand the market for stolen phones.

Proponents of a back door also tend to assume that law-enforcement or intelligence access to it would require a judicial warrant or some lawful process, but it is easy to imagine circumstances in which these processes would be circumvented or subverted. In many countries where these devices are used, unscrupulous governments or officials in possession of this information would be more likely to persecute dissidents for their private criticisms.

For these reasons, a pantheon of senior security officials think a mandated back door is a bad and dangerous idea. In the United States, these include the past heads of the CIA, the NSA, and the Department of Homeland Security, as well as former president Barack Obamas Presidential Review Group on Intelligence and Communications Technologies. Europol has also warned that solutions that intentionally weaken technical-protection mechanisms to support law enforcement will intrinsically weaken the protection against criminals as well. Security officials would be better off adapting to a world of encryption than to weaken the security of our communications.

Even where end-to-end encryption is used, many types of communication already are subject to judicially-ordered surveillance. Metadata such as the data that guides a communication to the proper destination cannot do its job if it is encrypted. It remains available to government monitoring by appropriate judicial order, although care should be taken to ensure that this data, which can reveal a great deal about our personal life, is not collected excessively. Other metadata can pinpoint where a phone (and presumptively its user) has gone. Much information stored in the cloud is unencrypted.

The plethora of such unencrypted information has led some to say that today is the golden age of surveillance. Rather than press for encryption back doors, governments would be better off teaching investigators how to access important unencrypted sources of information.

Its time to abandon the quest for total information awareness. Yes, some criminals will benefit from encryption. But just as we dont outlaw whispering or drawing the shades, so we should accept that encryption is the only way to safeguard our communications in an era of increasingly sophisticated cybercrime and unauthorized surveillance.

Follow us on Twitter: @GlobeDebate

Excerpt from:
The battle over encryption and what it means for our privacy - The Globe and Mail

Read More..

The weird science of quantum computing, communications and encryption – C4ISR & Networks

Ever heard of quantum entanglement? If you havent, dont feel bad. As I have written about before, quantum theory is the abstract basis of modern physics. It explains the nature and behavior of how matter acts.

Albert Einstein discovered quantum entanglement in 1935.He said it is "spooky action at a distance."It examines how one quantum particle could affect one another, and that effect is faster than the speed of light. It is one of those advanced/emerging technologies that has been around for a while and is really beginning to show promise.

It should be noted that this is just one of a number of Chinas strategic initiatives to develop new technology that will create an extremely secure, ultrahigh-speed, quantum-based global communications network. Researchers in several countries, such as the U.S., Canada and Singapore (as well as Google), are also working on a broad spectrum of quantum theory applications including quantum encryption.

See the rest here:
The weird science of quantum computing, communications and encryption - C4ISR & Networks

Read More..