Page 4,332«..1020..4,3314,3324,3334,334..4,3404,350..»

Cloud Computing wins Preakness, Always Dreaming comes in 8th – ESPN

BALTIMORE -- Sometimes it pays to have a fresh horse.

Cloud Computing skipped the Kentucky Derby, while eventual winner Always Dreaming and Classic Empire mixed it up in the mud at Churchill Downs.

Two weeks later, Cloud Computing pounced on those two horses in the Preakness, pulling off an upset victory at 13-1 odds Saturday. He became the first horse to skip the Derby and win the second leg of the Triple Crown since filly Rachel Alexandra in 2009.

"Some of the reason that we won today was because we were patient and didn't throw an inexperienced horse against a 20-horse field in the Derby on a very difficult track,'' winning co-owner Seth Klarman said. ``We made a great call.''

Always Dreaming and Classic Empire dueled throughout most of the race, before Classic Empire stuck his nose in front midway on the far turn. It looked as if Classic Empire would go on to win, but Cloud Computing ran him down on the outside.

The 149th running of the Belmont Stakes will continue a grand American sporting tradition on June 10. But does no Triple Crown possibility extinguish all the excitement for Belmont Park stakeholders and revelers?

Always Dreaming faded to eighth in the 10-horse field on a cool and cloudy day at Pimlico. The crowd of 140,327 and wagering total of $94,127,434 were records, bettering the marks set last year.

Ridden by Javier Castellano, Cloud Computing ran 1 3/16 miles in 1:55.98 and paid $28.80, $8.60 and $6. It was just the dark brown colt's fourth career start, the fewest of any horse in the race, and only his second win. He didn't run as a 2-year-old because of injury.

Classic Empire returned $4.40 and $4, and 31-1 shot Senior Investment was another 4 3/4 lengths back in third and paid $10.20.

New York-based trainer Chad Brown earned his first victory in a Triple Crown race. Castellano won for the second time; he rode Bernardini to victory in the 2006 Preakness.

Castellano comes from a racing family, with a father, uncle and brother who have been jockeys.

"We've been working for a long time for this moment,'' he said. "It's great for the family.''

The 142nd Preakness Stakes had been billed as a match race between Always Dreaming and Classic Empire, and it was from the start.

They broke out of the starting gate next to each other and the fight was on. Always Dreaming took a slight lead, with Classic Empire on his flank.

Meanwhile, Cloud Computing was back in third as Castellano watched the duel unfold in front of him.

Always Dreaming was the first to throw in the towel, surrendering the lead to Classic Empire midway around the final turn.

"We didn't have an excuse,'' said Todd Pletcher, who trains Always Dreaming. "We were in a position we expected to be, and I think the turnaround was a little too quick. He ran so hard in the Derby, and today just wasn't his day.''

Always Dreaming lost for the first time in five races this year. He had won his first four by a combined 23 1/4 lengths.

Classic Empire and Julien Leparoux headed into the stretch with three-length lead, seemingly on his way to the winner's circle.

At that point, trainer Mark Casse thought he was headed there too.

"Of course,'' he said. "But I thought I was going to win a lot of times before, so it doesn't shock me.''

But Classic Empire also paid a price for putting away Always Dreaming. Classic Empire fought on to the finish line but couldn't hold off a fresh horse in Cloud Computing.

"Certainly, I'm not going to dispute the fact that I brought in a fresh horse as part of our strategy,'' Brown said. "Our horse is very talented too. Classic Empire and Always Dreaming are two outstanding horses, and our strategy was, if we are ever going to beat them, let's take them on two weeks' rest when we have six [weeks], and it worked.''

After Cloud Computing ran third in the Wood Memorial, Brown and the owners decided the colt would benefit from skipping the traffic-choked conditions in the 20-horse Kentucky Derby. He was coming into the Preakness after a six-week break.

The victory was especially sweet for co-owner Seth Klarman, who grew up a few blocks from Pimlico. He turns 60 on Sunday. He and William Lawrence have been buying and racing horses together since 2006.

Klarman, who races as Klaravich Stables, is a minority owner of the Boston Red Sox.

Lookin At Lee, the Derby runner-up, was fourth. Gunnevera was fifth, followed by Multiplier and Conquest Mo Money. Hence was ninth and Term of Art last.

Read more from the original source:
Cloud Computing wins Preakness, Always Dreaming comes in 8th - ESPN

Read More..

Watch Cloud Computing’s thrilling come-from-behind finish at the Preakness Stakes – For The Win


For The Win
Watch Cloud Computing's thrilling come-from-behind finish at the Preakness Stakes
For The Win
And with a name like Cloud Computing, there were some jokes: Of course Cloud Computing won; it was able to increase speed by allocating more power dynamically. Philip Bump (@pbump) May 20, 2017. cloud computing out here for the millennials.

Excerpt from:
Watch Cloud Computing's thrilling come-from-behind finish at the Preakness Stakes - For The Win

Read More..

IBM’s Newest Quantum Computing Processors Have Triple the Qubits of Their Last – Futurism

In BriefIBM has announced that it has built and tested its two mostpowerful platforms for quantum computing to date. Members of thepublic can request beta access to use the 16 qubit platform to runexperiments and help propel quantum computing technology forward. Quantum Computing Leaps

Due to their complexity, quantum computers are still largely inaccessible for the average person, which is why developers and programmers jumped at the chance to test out IBMs five qubit quantum computing processor when the company offered thepublic free access to it last year, running more than 300,000 experiments on the cutting-edge machine.

Now, the company is taking the tech to the next level, announcing yesterdaythat it has built and tested its two most powerful platforms for quantum computing to date: the 16 qubit Quantum Experience universal computer and a 17 qubit commercial processor prototype that will serve as the core for its IBM Q commercial system.

IBMs 16 qubit processor will make far more complex computations possible without breaking a symbolic quantum sweat. Once again, the company is hoping that developers, programmers, researchers, and anyone working in the field will make use of the platform. To that end, anyone interested in using it for experiments to help usher in the age of quantum computingis encouraged tovisit GitHubs Software Development Kit to request beta access. Otherwise, they can simply access theIBM experience libraryto play around with the technology.

Of course, IBM is far from satisfied with just 16 or 17 qubits. The company hopes to significantly ratchet up the power with a goal of achieving a 50 qubit quantum computing platform or maybe one with even more power in the next few years.

Quantum computing technology has the capacity to solving extraordinarily complex problems problems that in many cases may be difficult for us to even conceive of right now. This potential has been propelling research forward at a remarkable rate, with researchers smashing through milestone after milestone along the path toward commercial quantum computing.

In August 2016, a quantum logic gate with an amazing 99.9 percent precision was achieved, removing a critical theoretical benchmark. Meanwhile, researchers used microwave signals to encode quantum computing data, offering an alternative to optical solutions. In October 2016, researchers used silicon atoms to produce qubits that remained in stable superposition 10 times longer than any qubits before them.

However, as each technical barrier has fallen, the need for public collaboration has become more apparent. In January, Canadian quantum computing company D-Waveopen-sourced its own quantum software tool, Qbsolv, allowing programmers to work on a quantum system whether or not they had any prior experience withquantum computing. With IBM now offering an even-more-powerfulsystem for experimentation, the public now has at its disposal a tool that could lead to remarkable advancements in nearly every field imaginable. As experts have announced, we truly are now living in the age of quantum computing.

View original post here:
IBM's Newest Quantum Computing Processors Have Triple the Qubits of Their Last - Futurism

Read More..

IBM scientists demonstrate ballistic nanowire connections, a potential future key component for quantum computing – Phys.Org

May 19, 2017 by Chris Sciacca Johannes Gooth is a postdoctoral fellow in the Nanoscale Devices & Materials group of the Science & Technology department at IBM Research Zurich. His research is focused on nanoscale electronics and quantum physics. Credit: IBM Research

IBM scientists have achieved an important milestone toward creating sophisticated quantum devices that could become a key component of quantum computers. As detailed in the peer-review journal Nano Letters, the scientists have shot an electron through a III-V semiconductor nanowire integrated on silicon for the first time.

IBM scientists are driving multiple horizons in quantum computing, from the technology for the next decade based on superconducting qubits, towards novel quantum devices that could push the scaling limit of today's microwave technology down to the nanometer scale and that do not rely on superconducting components, opening a path towards room-temperature operation.

Now, IBM scientists in Zurich have made a crucial fundamental breakthrough in their paper Ballistic one-dimensional InAs nanowire cross-junction interconnects. Using their recently developed Template-Assisted-Selective-Epitaxy (TASE) technique to build ballistic cross-directional quantum communication links, they pioneered devices which can coherently link multiple functional nanowires for the reliable transfer of quantum information across nanowire networks. The nanowire acts as a perfect guide for the electrons, such that the full quantum information of the electron (energy, momentum, spin) can be transferred without losses.

By solving some major technical hurdles of controlling the size, shape, position and quality of III-V semiconductors integrated on Si, ballistic one-dimensional quantum transport has been demonstrated. While the experiments are still on a very fundamental level, such nanowire devices may pave the way towards fault-tolerant, scalable electronic quantum computing in the future.

The paper's lead author, IBM scientist Dr. Johannes Gooth, noted that the milestone has implications for the development of quantum computing. By enabling fully ballistic connections where particles are in flight at the nanoscale, the quantum system offers exponentially larger computational space.

Earlier this year, IBM launched an industry-first initiative to build commercially available universal quantum computing systems. The planned "IBM Q" quantum systems and services will be delivered via the IBM Cloud platform and will deliver solutions to important problems where patterns cannot be seen by classical computers because the data doesn't exist and the possibilities needed to explore to get to the answer are too enormous to ever be processed by classical systems.

Explore further: Five ways quantum computing will change the way we think about computing

More information: Johannes Gooth et al. Ballistic One-Dimensional InAs Nanowire Cross-Junction Interconnects, Nano Letters (2017). DOI: 10.1021/acs.nanolett.7b00400

Journal reference: Nano Letters

Provided by: IBM

While technologies that currently run on classical computers, such as Watson, can help find patterns and insights buried in vast amounts of existing data, quantum computers will deliver solutions to important problems where ...

IBM announced today it has successfully built and tested its most powerful universal quantum computing processors. The first new prototype processor will be the core for the first IBM Q early-access commercial systems. The ...

The global race towards a functioning quantum computer is on. With future quantum computers, we will be able to solve previously impossible problems and develop, for example, complex medicines, fertilizers, or artificial ...

A team of researchers from Australia and the UK have developed a new theoretical framework to identify computations that occupy the 'quantum frontier'the boundary at which problems become impossible for today's computers ...

IBM has announced its plans to begin offering the world's first commercial universal quantum-computing servicecalled IBM Q, the system will be made available to those who wish to use it for a fee sometime later this year. ...

What does the future hold for computing? Experts at the Networked Quantum Information Technologies Hub (NQIT), based at Oxford University, believe our next great technological leap lies in the development of quantum computing.

IBM scientists have achieved an important milestone toward creating sophisticated quantum devices that could become a key component of quantum computers. As detailed in the peer-review journal Nano Letters, the scientists ...

Researchers have developed the world's thinnest metallic nanowire, which could be used to miniaturise many of the electronic components we use every day.

Rice University scientists have created a rechargeable lithium metal battery with three times the capacity of commercial lithium-ion batteries by resolving something that has long stumped researchers: the dendrite problem.

In the race to produce a quantum computer, a number of projects are seeking a way to create quantum bitsor qubitsthat are stable, meaning they are not much affected by changes in their environment. This normally needs ...

Nanocrystals have diverse applications spanning biomedical imaging, light-emitting devices, and consumer electronics. Their unique optical properties result from the type of crystal from which they are composed. However, ...

Today's computers are faster and smaller than ever before. The latest generation of transistors will have structural features with dimensions of only 10 nanometers. If computers are to become even faster and at the same time ...

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Continued here:
IBM scientists demonstrate ballistic nanowire connections, a potential future key component for quantum computing - Phys.Org

Read More..

Massive Ransomware Attack Underscores Threats To Internet Security – Benzinga

This month's massive global ransomware attack is a clear sign that cybersecurity is an escalating concern for businesses and private internet users. CEO Francis Dinha of OpenVPN explains why it's essential to develop proactive policies and tools to safeguard our digital information.

Pleasanton, Calif. (PRWEB) May 19, 2017

The startling ransomware attack that began Friday has spread across 150 countries, held internet users' computer files hostage and exposed a dangerous gap in cybersecurity among businesses and individuals. Unfortunately, it is only a sign of things to come, says Francis Dinha, CEO of OpenVPN, creator of Private Tunnel.

"We will definitely see more attacks and possibly more advanced threats that might cause more damage to our society," Dinha cautions. "Society, businesses and policymakers have to be more proactive in developing policies, guidelines and security tools to prevent major attacks from having the kind of negative impact we've seen."

The ransomware assault isn't the first. Six percent of internet users around the world already have experienced ransomware, and another 11 percent know someone who has encountered a malicious program, according to a summary of the Global Survey on Internet Security and Trust.

Problematically, ransomware is just one of many security dangers facing internet users, Dinha says. More awareness of these threats is needed among the public and businesses, and more research is essential to understand the risks computers face when they logo onto public resources on the internet and the tools that can protect them.

Advanced cyber threat management tools, for example, can block communication between infected devices and ransomware command centers.

"VPN alone cannot solve this problem, but the good news is that a VPN, coupled with advanced cyber threat management tools, will definitely shield those devices against many cyber threats," Dinha explains. "VPN is a key component for tunneling all traffic and ensuring that all traffic is routed through advanced cyber threat management before it accesses any public internet resources."

To learn more about how VPNs protect businesses and other internet users from cybercriminals, read Dinha's column for the Forbes Technology Council or visit Private Tunnel.

Francis Dinha is available for interviews. For scheduling, contact nineveh(at)privatetunnel(dot)com.

About Private Tunnel OpenVPN Technologies Inc has integrated a suite of leading-edge networking and software technologies to deliver virtual network software that provides secure, reliable, and scalable communication services, not only fulfilling the requirements of the traditional virtual private network (VPN) market, but also addressing the future demands of SDN Software Defined Network, Remote Access to private Cloud/ networks, tunneling to UTM Unified Threat Management Firewall Clouds/ Gateways, tunneling to DDOS Clouds/ Gateways to protect against malicious attacks. OpenVPN, our award-winning open source VPN protocol, has emerged to establish itself as a de-facto standard in the open source networking space with over 50 million downloads since inception. OpenVPN Technologies is the provider of next-generation secure and scalable communication services.

Following the successful inception of the OpenVPN Project in 2002, Francis Dinha and James Yonan co-founded OpenVPN Technologies, Inc. to secure a solid foundation for OpenVPN and further develop its commercial potential.

About OpenVPN OpenVPN is a private company that enables consumers and businesses to leverage mobility, access, security and privacy to simplify IT. Google, Samsung, Amazon, HP, IBM, Trane, Universities, Public Schools and over 100,000 business are protected on premise, in the cloud, and in the field with OpenVPN software. They join over 3.6 million consumers who rely on our OpenVPN powered Private Tunnel service for increased security, privacy and access over the internet. We are based in Hacienda Business Park, Pleasanton California.

For the original version on PRWeb visit: http://www.prweb.com/releases/2017/05/prweb14354611.htm

Read the original here:
Massive Ransomware Attack Underscores Threats To Internet Security - Benzinga

Read More..

How One Security Setting Can Solve The Web Encryption Problem – Forbes


Forbes
How One Security Setting Can Solve The Web Encryption Problem
Forbes
As a cybersecurity professional, I've worked for more than two decades to educate business leaders on the importance of security to their companies' survival and growth. It's only become a more pressing issue as interactions between companies and their ...

Originally posted here:
How One Security Setting Can Solve The Web Encryption Problem - Forbes

Read More..

Facebook Messenger upgrades encrypted chat feature – CyberScoop

Chatting on Facebook is quietlygetting more secure.

The social media companysMessenger, used by 1.2 billionpeople around the world, just launched a significant usability upgrade to its Secret Conversations feature that enables encrypted communications between two people on multiple devices. Previously, encrypted communications were availableto one device per person, severely limiting their attractiveness in a world where people rapidly switch between mobile, tablets and desktop devices.

Messengers adoption of strong encryption and this latest feature upgrade has won plaudits in the privacy community.

The change, however, was practically whispered in a small update to a year-old blog post that had first announced the encryption features and Facebook only added the information afterusers actuallynoticed the existence of the new feature. For a company with the ability to make a splash about almost anything it does, this seems a deliberate choice to keep the encryption conversation relatively quiet at the moment.

I love this, said Alec Muffet, previously a security engineer with Facebook. Its a clear step forward in bringing the benefits of secure, robust cryptography to billions of people around the world. My sole reservation stems from Facebooks apparent lack of public pride in this amazing achievement, and I fear that such indicates a lack of commitment to E2E in the Messenger product when compared to (say) WhatsApp.

WhatsApp, which is owned by Facebook, is the most popular messenger in the world, counting approximately 1.2 billion in its user base. It has led Messenger in the encryption department in both speed WhatsApp beganwork in 2014, Messengers cryptography landed last year and implementation. WhatApps encryption is on by default, Messenger requires a user to opt-in.

Correction:Messenger and WhatsApp both have approximately 1.2 billion monthly active users. This article previously misstated Messengers active user base as 900 million per month.

Read the original:
Facebook Messenger upgrades encrypted chat feature - CyberScoop

Read More..

Researcher Open Sources WannaKey Tool That Cracks WannaCry Ransomware Encryption – Fossbytes

Its more than a week since WannaCry ransomware started causing panic among the internet community. However, as time passes, more and more security researchers across the world are coming up with fixes for the WannaCry ransomware.

Earlier, it was a researcher who accidentally created a kill switch for the ransomware. Now, another researcher namedAdrien Guinet has found a cure to fix a computer encrypted by the ransomware. He didnt land up on the method accidentally and his fix only works for machines running Windows XP, still, its a relief.

Guinet was able to crack the encryption in his lab by finding the prime numbers that constitute the RSA private key used by WannaCry ransomware.

The researcher has uploaded the tool which he calls WannaKey on his GitHub repo. There, he also explains the process he followed to gain access to the private keys.

In order to work, your computer must not have been rebooted after being infected, he writes on GitHub. Please also note that you need some luck for this to work andso it might not work in every cases!

Guinet says when the WannaCry ransomware infects a computer and encrypts it, the private keys are stored in the memory and are often left undeleted. This is where a persons luck comes into the picture, he should hope that the associated memory isnt reallocated and erased so that the prime numbers belonging to the key can be recovered.

The fact that Guinet has open sourced the tool might help other researchers to come up with a solution for other Windows versions. Wannakey as a fix for Windows XP might not be much useful. Various security researchers have noted that the worm that spread the ransomware didnt infect Windows XP machines.

If you have something to add, drop your thoughts and feedback.

Read the rest here:
Researcher Open Sources WannaKey Tool That Cracks WannaCry Ransomware Encryption - Fossbytes

Read More..

More Android phones are using encryption and lock screen security than ever before – Android Central


Android Central
More Android phones are using encryption and lock screen security than ever before
Android Central
That 80% encryption number isn't amazingly surprising when you remember that Nougat has full-device encryption turned on by default, but that number also includes devices that were upgraded from Marshmallow, which didn't have default encryption.

View post:
More Android phones are using encryption and lock screen security than ever before - Android Central

Read More..

File carving can reverse WannaCry ransomware encryption, says McAfee – SC Magazine UK

More details are available in a post from McAfee in The SC Blog.

As the dust from the worldwide outbreak of the WannaCry ransomware settles, and the hunt for patient zero begins, Raj Samani, chief scientist at McAfee, claims he and his team may have found a way to recover data from files which the WannaCry ransomware has encrypted.

Samani, Christiaan Beek and Charles McFarland have written a blog post on the experimental recovery method and warned that the technique is provided as is, we accept no responsibility if things don't go as expected.

However, if your files are all encrypted and you don't have a backup, you typically don't have much to lose.

Samani has given an early sneak peak to SC which describes how the researchers used a file recovery method named file carving to recover WannaCry encrypted data. This is possible thanks to WannaCry's file handling methods.

According to the researchers, this depends on whether WannaCry copies and then encrypts files, with their originals deleted, or if there is a different method at play.

The researchers write: In our testing we have had some cases where the recovery did an almost full recovery and others in which it was near zero. However, they caution: The number of variables are too exhaustive to list.

More details are available in a post from McAfee in The SC Blog.

Samani told SC Media UK at a press conference hosted by Barracuda Networksyesterday that his work to figure out this method of recovery was spurred on by complaints that WannaCry victims who paid the ransom didn't get a decryption key.

According to various sources, WannaCry doesn't have an automated system for processing decryption keys when victims pay, so each request has to be handled manually.

Samani, who helps run the nonprofit ransomware recovery hub NoMoreRansom.org in partnership with Barracuda Networks and a number of other security companies and law enforcement agencies, said they had a very busy weekend.

On a normal day No More Ransom, which provides free-of-charge recovery tools for victims for ransomware, sees around 400,000 HTTP connections. On 12 May when news broke of the WannaCry infection, Samani told SC that their connection numbers rose to eight million.

The website is also suffering attacks. Samani wouldn't elaborate but said the technology and infrastructure around the website collects information about these and has essentially become a honeypot. One particular IP address had orchestrated over 600,000 attacks on the website, Samani said without revealing more details.

Unfortunately, Samani said an encryption key for WannaCry has not yet been discovered. He claimed that according to vulnerability search engine Shodan, 1.4 million machines around the world are still open to the SMB vulnerability.

Samani told the Barracuda Networks press conference of both trade, specialist and national press yesterday that, Digitally speaking, we are constantly in crisis, and this has to stop. He added, Cyber-crime isn't bits and bytes, it's everyday life.

See original here:
File carving can reverse WannaCry ransomware encryption, says McAfee - SC Magazine UK

Read More..