Page 491«..1020..490491492493..500510..»

A look ahead to implementing AI in classroom instruction – The Daily Texan

As artificial intelligence tools such as ChatGPT become more accessible, some researchers believe the technology may soon find its way into everyday classroom instruction.

Representatives from federal agencies, including the National Science Foundation and the National Economic Council, gathered last monthat the White House for Computer Science Education Week to discuss the integration of AI into K-12 classrooms.

Among them was Carol Fletcher, director of Expanding Pathways in Computing at the Texas Advanced Computing Center at UT. Fletcher said the center runs one of the most powerful supercomputers in academia and works with the Pathways program to broaden access and participation in computing education.

The team at the White House discussed a national strategy to encourage participation in computer science in K-12 and how AI would be taught in schools, Fletcher said.

With the advent of AI becoming more pervasive in decisions that are made (like) who gets a loan (or) examining criminal histories, we need to ensure that every student understands the implications and is better able to navigate those decisions, Fletcher said.

Educators have started to use AI as a tool to grade more efficiently, such as with AI-generated rubrics, Fletcher said. For students, large language models like ChatGPT may help with generating starter code for computer programs.

Vishal Kantharaju, vice president of Engineering and Computational Learning of Artificial Intelligence in Robotics, or ECLAIR, said AI helped the club create a robot that plays and teaches chess as well as a mood detector program. The software analyzes text and generates music corresponding with the words implied vibe.

AI tools that are available to students make the learning curve so much more accessible, computer science sophomore Kantharaju said. Its important for students to make an effort to look into AI and learn more about it.

Computer science professor Justin Hart said he encourages his students in the Freshman Research Initiative program to use AI in order to help with starter code for open-ended research projects.

Students should absolutely be taking advantage of these large language models as long as there is no violation or academic misconduct, Hart said.

Hart said academic misconduct and plagiarism have important ethical implications educators and students must be aware of as AI becomes increasingly prevalent in the classroom.

As AI begins to integrate itself into the many different aspects of students lives, it is important to stay informed on its potential misuse and beneficial effects, ECLAIR co-president Angelica Sharma said.

I think everyone should be encouraged to gain a background in AI and computing, computer science sophomore Sharma said. Its important that we spend money, education and time towards computer science because thats whats going to save lives in the future.

Continue reading here:

A look ahead to implementing AI in classroom instruction - The Daily Texan

Read More..

Liang named a fellow of Asia-Pacific Artificial Intelligence Association – uta.edu

Wednesday, Jan 17, 2024 Neph Rivera : contact

The Asia-Pacific Artificial Intelligence Association (AAIA) has named Qilian Liang, a Distinguished University Professor in the Department of Electrical Engineering at The University of Texas at Arlington, as a fellow.

He is the fifth UTA faculty member to earn the honor, joining Ali Davoudi, Wei-Jen Lee and Frank Lewis, all from the Electrical Engineering Department, and Gautam Das of the Computer Science and Engineering Department.

It is a great honor to be selected as an AAIA fellow, Liang said. I hope more colleagues from UTA will join this group.

Liangs research interests include sensor networks, wireless communications, wireless networks, signal processing for communications and artificial intelligence. In 2022, he received a three-year grant worth nearly $600,000 from the National Science Foundation to make the technology used with artificial intelligence faster and more energy efficient. He also is designing deep-learning hardware accelerators through devices, circuits and algorithms to create deep generative AI models with simpler design and architecture. The research is expected to generate orders of magnitude improvements in energy use and speed.

Liang is a fellow of IEEE and has published more than 350 journal and conference papers and seven book chapters. He has six U.S. patents pending.

AAIA is a worldwide academic, nonprofit and non-governmental organization. Its mission is to enhance the development and application of artificial intelligence through academic research, academic exchanges, science education, exhibitions, academic conferences, academic publications, summer/winter camps and other activities.

- Written by Jeremy Agor, College of Engineering

See the article here:

Liang named a fellow of Asia-Pacific Artificial Intelligence Association - uta.edu

Read More..

Innovating new spaces with AI – Harvard School of Engineering and Applied Sciences

"These types of projects can open the eyes of the community to the extensive potential that lies within responsible AI," Mazzolenis said.

Isabella Bossas team worked with the Nature Conservancy to build computer vision algorithms to perform species classification and anomaly detection on images from camera traps set up in coastal ecosystems in California, training the models on approximately 100,000 images. Other conservation projects looked at species detection algorithms and mapping agricultural plastic use in California.

Its not something I wouldve envisioned if the Capstone hadnt partnered us with the Nature Conservancy. It really broadened my perspective, Bossa said. Its a very positive outlook for the future of AI research. There have been so many concerns about what AI can do, its potential downsides. But these projects show that AI can be used for good.

Frontline Negotiation is an international organization for negotiators that work to bring humanitarian aid to regions in need. Several SEAS groups worked with the organization to develop tools negotiators could use to more quickly learn all the different stakeholder groups involved in a specific situation or crisis.

Stakeholder mapping is a modular procedure used by frontline negotiators to identify all the stakeholders, and then based on all available information and contextual knowledge, a frontline negotiator will map the stakeholders into four quadrants, said Boxiang Wang. Our tools automate that process to achieve really accurate and fascinating results. That drastically reduces the time spent by the human expert, and the AI can also suggest a strategy based on the mapping. The negotiator can then utilize the tools weve created to assist in their decision-making.

Because AI research relies on accurate data sets, several teams researched data resiliency and security. New vision language models like OpenAIs GPT4, for example, can take data from images as well as text, so Frank Lis team researched how to prevent adversarial attacks from bad visual inputs. Kirsten Morehouses team looked at data security from the perspective of equity, researching guidelines to help ensure fair, representative, and private datasets, especially in healthcare.

There have been a lot of campaigns recently about data privacy, so we thought it was the right time to research it, Morehouse said. With the advent and use of so many new, powerful algorithms, ensuring that training data is both fair and private is a priority.

Norman added, At the end of the day, machine learning is really dependent on data quality. If you dont have good data quality, you cant do good machine learning research.

The data science program is a three-semester masters degree jointly led by the Computer Science and Statistics faculties. AC297R is also taken by undergraduates pursuing concurrent masters degrees, as well Ph.D. students taking a secondary concentration in computation or getting a Master of Science degree en route to the Ph.D. Some of this past semesters 297R cohort will be extending their program into the spring to continue researching these topics.

Im super proud of them, Pan said. This is really an entirely project-based course. This is a simulated internship. The students really had to work on every aspect of professional conduct, not just applying the math and computation.

See original here:

Innovating new spaces with AI - Harvard School of Engineering and Applied Sciences

Read More..

Indiana literacy overhaul bill advances to Senate chamber with concerns from education officials – The Republic

By Casey Smith | Indiana Capital Chronicle

For The Republic

INDIANAPOLIS Indiana lawmakers are moving forward with a GOP priority bill that requires earlier interventions for students struggling with literacy despite concerns from some education experts and district officials over a provision they said would require more third graders to be held back.

Senate Bill 1, authored by Sen. Linda Rogers, R-Granger, would require IREAD testing to begin a year earlier, in second grade, and allow those who pass at that stage to be exempt from taking the test again in the future. Around 60% of Hoosier schools are already testing students early.

Students who do not pass must receive targeted support during third grade to help them improve their reading skills. After a full year of remediation and three chances to take the IREAD test lawmakers want schools to retain students who do not pass the test by the end of third grade.

The bill advanced from the Senate education committee in a 9-4, party-line vote and now heads to the full chamber.

The issue drew nearly three hours of discussion and testimony at the Statehouse on Wednesday. Although many who spoke said they support other elements of the bill especially those that seek to increase reading support for the states youngest students pushback centered around language to codify a statewide third grade retention policy.

There is a 60-year body of research around retention that has shown lots of negative impacts, especially social and emotional, for those students who are involved, said Fortville Elementary School principal Vincent Edwards, who has studied Indianas retention policies in-depth. As a principal, Ive been a part of decisions to retain students before, and that is an extremely high-stakes decision for those students and those families.

Rogers maintained her Every Child Learns to Read bill is not a retention bill. Instead, she said the legislation models aggressive literacy policy enacted in Mississippi a decade ago. Mandatory science of reading curriculum and tougher third grade retention rules boosted the state being ranked the second-worst in 2013 for fourth-grade reading to 21st in 2022.

Retention is the absolute last resort after we have exhausted all other methods to help struggling readers, Rogers said. But, simply put, if a child hasnt learned basic reading skills by (third grade), they are going to struggle to learn almost any other subject.

Indiana third graders who fail the statewide reading exam can already be held back, but deciding how to implement the state policy is ultimately left up to schools.

Test data show that in 2023, 13,840 third-graders did not pass IREAD. Of those, 5,503 received an exemption and 8,337 did not. Of those without an exemption, 95% moved onto 4th grade while only 412 were retained.

Exceptions are carved out in Rogers bill for students who have been retained in third grade before, special-education students, certain English language learners, and students who pass the math portion of the statewide assessment and receive remedial reading instruction.

The measure could cause thousands more students to repeat third grade, even though its wording is almost identical to Indianas existing administrative rule, which mandates that kids who fail the third grade IREAD test should be held back.

New in Rogers proposal is an exception for students who pass the ILEARN math exam in third grade. Indiana Department of Education (IDOE) data indicates there were 583 such students in 2023.

The GOP-backed legislation additionally mandates summer school to be offered to students who are not reading proficient in third grade or are at-risk second graders behind in literacy. Language in the bill does not require students to actually attend or participate in summer school, however.

The proposal also does not currently allow parents to appeal a schools decision to retain their child, but Rogers suggested, perhaps, such a provision could be amended in later.

If we dont retain them, and they get passed on the danger is if a student cant read and they get embarrassed, theyre going to scrunch down into a shell and not participate at all, and thats a danger that we face, as well, said committee chairman Sen. Jeff Raatz, R-Richmond. When we look at this thing, there are two sides to every story, and it depends on whether or not the data supports (retention), or whether it doesnt. Totally looking at retention as a black mark the younger we do it, the better off they are. Thats proven.

Kymyona Burk, senior policy fellow at ExcelinEd and the former literacy director at the Mississippi Department of Education, told the Senate committee that her states literacy improvement plan, adopted in 2013, included a similar retention policy. But she doubled down that intervention before that time can and should keep students from repeating third grade.

When we think about a third grade policy, we know that this is not just a third grade teachers responsibility, but that begins in kindergarten for some, even as early as pre-K, Burk said. We can prevent reading difficulty in children, but we have to make sure that we are identifying them early and providing them the supports much earlier than third grade.

Edwards remained more skeptical and echoed similar concerns from other local officials.

He said Indianas current policy provides schools an ability to promote students to fourth grade with the understanding that they will receive continued instruction in third grade reading material when its the best choice for a child.

I am not surprised that the number of students being moved on (from third to fourth grade) is high, because there is currently that flexibility, Edwards said. And I believe most schools are probably saying without other factors that would prevail on a retention decision wed rather not retain.

He suggested the state should collect more data about Indianas current statewide retention practices before approving new policy. Others recommended the retention mandates effect date should be delayed until the 2025-26 school year, when all Hoosier teachers are supposed to be trained up on science of reading instruction.

Also in contention this session is a new K-12 computer science course requirement.

House Bill 1243, an omnibus measure authored by Rep. Bob Behning, R-Indianapolis, includes a provision requiring computer science coursework to be completed by students before high school graduation.

The mandate was part of Gov. Eric Holcombs 2024 legislative agenda, and Indiana Secretary of Education Katie Jenner has rallied behind the proposal, too.

She noted Wednesday that although 91% of Indianas public high schools currently offer computer science, only 7% 0f students are actually taking the class.

Its highly important that our students are ready with these skills not just in the tech industry, but in all industries, Jenner said, emphasizing the bills contribution to increased career-readiness efforts.

Even so, some lawmakers and local school officials expressed concerns about the addition of another diploma requirement.

In 2021, the General Assembly mandated a semester-long civics education class for middle schoolers. Last year, requirements for separate financial literacy and career-awareness courses were additionally adopted.

Anytime you add courses, it does make things tricky, said Tim McRoberts, associate executive director of the Indiana Association of School Principals. Honestly, under the current diploma requirements, theres just not a lot of opportunities for kids to take electives, especially if they want to be involved in music or art or something like that. They just dont have the room in the schedule.

The Indiana Department of Education is currently chipping away at a massive redesign of Hoosier high school curriculum and diploma requirements. Changes are expected to go into effect by the 2024-25 academic year.

McRoberts said he hopes the redesign will create more interest in the digital literacy field, but maintained the need for schools to have flexibility when implementing the course requirement.

Indiana Urban Schools Association executive director David Marcotte further proposed an option for some students to test-out of the required course.

We have students who are sitting in our classes that sometimes already have these skills, he said. There are ways that we can design this, for students to show that they have competency in these areas without having to sit in that class.

Jenner agreed with the call for at least some local authority and said state education officials are exploring ways for schools to offer computer science at the eighth grade level, or in lieu of a science or math course, for example.

There are a number of different ways that we can look at this and make sure its flexible, Jenner said.

Still, Karen Jung, president of Nextech, a Carmel-based nonprofit that aims to provide all Hoosiers in grades K-12 with computer science education, said requiring the course is the only way to significantly increase the number of students who enroll.

I think what we have to recognize is that theres a massive distinction between being able to use technology for entertainment purposes or for playing, and being able to actually use it to solve problems in this technology-rich environment that we live in, Jung said. I do believe that it is critical, regardless of the career path that a student chooses to go down, and whatever work theyre going to be going to.

Rep. Ed Delaney, D-Indianapolis, said he doubts the course should be required, though. He questioned what the financial impact would be on schools, and whether the state has enough qualified educators to teach computer science.

It shocks me to suggest that (students) need any more time learning the benefits of computers it completely shocks me, DeLaney said. I go to the supermarket and see two-year-olds with what look like miniature iPads in their hands. I have the feeling that what were doing is taking something that is happening organically, and were requiring it of people who are already doing it.

The Indiana Capital Chronicle covers state government and the state legislature. For more, visit IndianaCapitalChronicle.com.

Visit link:

Indiana literacy overhaul bill advances to Senate chamber with concerns from education officials - The Republic

Read More..

Giovanni Orlandi becomes second Clemson University student in two years to win a Churchill Scholarship – Clemson News

January 16, 2024January 16, 2024

Giovanni Orlandi is the second student in Clemson University history to win the Churchill Scholarship, allowing him to pursue a masters degree at the University of Cambridge, one of the worlds oldest and most distinguished institutions of higher learning.

As a student at Cambridge, Orlandi will be following in the footsteps of some of historys most towering innovators and thinkers, including Sir Isaac Newton, Stephen Hawking, Alan Turing, Charles Babbage and Lord Kelvin.

The scholarship will pay for a year of tuition and various other expenses, including travel costs and room and board. Orlandi plans to pursue a Master of Philosophy in materials science and metallurgy under Bartomeu Monserrat, a materials physics professor.

Applying for the Churchill is one of the things I really wanted to do, Orlandi said. Cambridge is one of the oldest universities in the world, and so much good work is done there. Just to go would be an honor, but being able to go with funding as a Churchill Scholar, thats really special, and Im really excited for it.

At Cambridge, Orlandi plans to join the quest to find a room-temperature superconductor, an innovation that if achieved could revolutionize fields ranging from energy to computing to medicine. His long-term goal is to earn a Ph.D. in materials science and engineering with a focus on theoretical and computational materials science.

Orlandi is an Honors student who is majoring in mechanical engineering and minoring in physics at Clemson. He would like to either become a university professor or lead a research team at a national lab, focusing on renewable energy production to address climate change.

The Churchill Scholarship is named after former United Kingdom Prime Minister Winston Churchill. He requested the scholarship in the wake of World War II to deepen the nations relationship with the United States and to advance science and technology on both sides of the Atlantic.

Only participating institutions may nominate up to two students each year. Scholars are selected on the basis of academic and research achievement.

Orlandi, a senior at Clemson, is among 16 U.S. students this year to win the scholarship, with several others coming from highly esteemed institutions, including Stanford University, Harvard University, Yale University, the University of Pennsylvania, Brown University and the Georgia Institute of Technology.

His academic credentials include multiple scholarships, honors and awards, among them a 2023 Barry M. Goldwater Scholarship.

Orlandi is now conducting research through a remote internship with Sandia National Laboratories, and three papers he has co-authored are on track for publication.

One of his most important mentors at Clemson is Enrique Martinez Saez, an associate professor with a joint appointment in mechanical engineering and materials science and engineering. Martinez Saez said that Orlandis selection as a Churchill Scholar came as no surprise.

He is that good, Martinez Saez said. He is an A student. He is very interested, a hard worker and smart. That combination is key.

This is the second consecutive year a Clemson student has received a Churchill Scholarship. Grant Wilkins, who double-majored in computer engineering and mathematics at Clemson, won in 2023 and is now at Cambridge pursuing a Master of Philosophy in advanced computer science.

Robyn Curtis, the director of the Office of Major Fellowships at Clemson, said the University became eligible in 2017 to nominate students for the Churchill Scholarship a sign of Clemsons growing academic reputation.

We have come a long way in a relatively short amount of time, she said. The competitive scholarships our students are receiving highlight the quality of undergraduate experiences we are able to offer.

Orlandi has been active in service while a Clemson student and has been particularly interested in helping fellow students with financial challenges.

Orlandi has advocated for need-based grants at the Statehouse, helped introduce middle-school students to STEM as a volunteer for PEER & WISE and served as vice chair for Clemsons student chapter of The American Society of Mechanical Engineers. As a Jansen Scholar, he has helped fellow mechanical engineering students navigate the major.

Orlandi also enjoys tutoring.

Clemson has helped me grow as a person, he said. My service is about helping people grow. I think that is what college is supposed to be.

Orlandi, the youngest of four siblings, graduated from West Ashley High School in Charleston.

Rose Orlandi said that her younger brother has always been full of energy and even as a child would come up with new inventions around the house. She remembers him starting to write a book when he was as young as 10 years old.

The Churchill Scholarship is a huge accomplishment, she said. I cant say Im super surprised. He is really an amazing kid. Hes very smart and very passionate about engineering. That has always been something he loves, and he has an amazing work ethic.

Among Orlandis most influential mentors is Fadi Abdeljawad, who was an associate professor of mechanical engineering with a joint appointment in materials science and engineering at Clemson when they first met.

Abdeljawad said a turning point for Orlandi came when he visited for office hours and asked detailed questions. Abdeljawad decided to recruit Orlandi to join his research group and was further impressed by the undergraduates work ethic.

Orlandi went on to a prestigious internship with Sandia National Laboratories, working in the same group Abdeljawad once did.

This is just the beginning for him, said Abdeljawad, now an associate professor in the Department of Materials Science and Engineering at Lehigh University. I am pretty confident there will be even greater professional achievements for him. He is one of those students who has an extremely successful and bright career ahead of him.

Students interested in the Churchill Scholarship or other nationally competitive programs should contact the Office of Major Fellowships at 864-656-9704 or fellowships@clemson.edu.

Original post:

Giovanni Orlandi becomes second Clemson University student in two years to win a Churchill Scholarship - Clemson News

Read More..

Top 10 US Universities for Computer Science in 2024 – Analytics Insight

In the ever-evolving landscape of technology, choosing the right university for pursuing a degree in computer science is crucial. As of 2024, several universities in the United States stand out for their exceptional computer science programs, providing students with cutting-edge knowledge and skills to thrive in the digital era.

1. Massachusetts Institute of Technology (MIT): MIT continues to be a powerhouse in computer science education, renowned for its innovative research and world-class faculty. The Computer Science and Artificial Intelligence Laboratory (CSAIL) at MIT leads groundbreaking projects, influencing the future of AI, machine learning, and computer systems.

2. Stanford University: Stanfords computer science department consistently ranks among the best globally. With a strong emphasis on entrepreneurship and interdisciplinary collaboration, Stanford equips students with a holistic education, preparing them for leadership roles in the tech industry.

3. Carnegie Mellon University: Carnegie Mellons School of Computer Science graduates boast a rich history of contributions to the field. The university excels in areas such as robotics, human-computer interaction, and software engineering. Students benefit from close ties with industry leaders and unparalleled research opportunities.

4. Harvard University: Harvards computer science program stands out for its commitment to fostering creativity and critical thinking. With a focus on theory and applications, Harvard prepares students to address complex challenges in the digital world. The universitys strong ties to the business and technology sectors provide valuable networking opportunities.

5. California Institute of Technology (Caltech): Caltechs small class sizes and collaborative environment make it an ideal choice for computer science enthusiasts. The universitys emphasis on research encourages students to engage in cutting-edge projects, contributing to advancements in fields like algorithms, cryptography, and quantum computing.

6. University of California, Berkeley: UC Berkeley consistently ranks among the top institutions for computer science. The universitys Electrical Engineering and Computer Sciences (EECS) department offers a comprehensive curriculum, covering areas like artificial intelligence, databases, and computer architecture. Berkeleys proximity to Silicon Valley enhances students exposure to industry trends.

7. Princeton University: Princetons computer science program emphasizes a strong theoretical foundation combined with practical applications. With a faculty composed of leading researchers, students benefit from a dynamic learning environment and opportunities to contribute to groundbreaking research in areas such as machine learning and computational biology.

8. University of Washington: The Paul G. Allen School of Computer Science & Engineering at the University of Washington is known for its commitment to diversity and inclusion. The school offers a range of undergraduate and graduate programs, and its research spans various domains, including data science, networking, and computer vision.

9. University of Illinois Urbana-Champaign: The Grainger College of Engineering at UIUC is recognized for its excellence in computer science education. With a focus on interdisciplinary collaboration, students have access to state-of-the-art research facilities and opportunities to work on projects that impact various industries.

10. University of Texas at Austin: UT Austins computer science program is gaining prominence, attracting top-tier faculty and students. The universitys research centers focus on areas like artificial intelligence, cybersecurity, and data analytics. The vibrant tech community in Austin provides students with a unique blend of academic and industry experiences.

Join our WhatsApp and Telegram Community to Get Regular Top Tech Updates

See more here:

Top 10 US Universities for Computer Science in 2024 - Analytics Insight

Read More..

Health research is changing thanks to AI, says MIT professor – Kathimerini English Edition

From the left: Manolis Kellis, Professor of Computer Science and Artificial Intelligence, MIT, Head of the MIT Computational Biology Group at MIT CSAIL; Iliana Magra, Journalist, Kathimerini & Money Review.

The way artificial intelligence affects health research was analyzed by Manolis Kellis, Professor of Computer Science and Artificial Intelligence at MIT, and head of the MIT Computational Biology Group at MIT CSAIL, at the world-renowned MIT Technology Review conference on Thursday.

In his presentation, Kellis explained that the goal is to live in the future in good health and not just to live many years.

He expressed his belief that the use of genetics will help to find the causes of diseases such as Alzheimers, cardiovascular disease, obesity and schizophrenia, and outlined the progress made in analytics thanks to artificial intelligence.

Kellis also referred to paradigm shifts in medicine, with research based on data rather than hypotheses. With systematic data sets we have the ability to see the big picture of any disease.

He also stressed that the way we analyze data is changing. Thanks to artificial intelligence and deep learning, we are building a bottom-up representation of the world where we will have learning by representation rather than just visualization.

The 1st MIT EmTech Europe conference is being held for the first time in Greece in collaboration with Kathimerini newspaper at the Athens Concert Hall and concludes on Thursday, January 18, 2024,

Visit link:

Health research is changing thanks to AI, says MIT professor - Kathimerini English Edition

Read More..

US users top list after Chinas state-of-the-art quantum computer goes global – South China Morning Post

Users from Bulgaria, Singapore, Japan, Russia and Canada were among those who logged in, but the US led the tally, it said, without providing specific numbers.

The machine had completed 33,871 quantum computing tasks for global users since it became operational on January 6, the report added.

Named after the Monkey King of Chinese mythology, Origin Wukong is Chinas first home-grown third-generation superconducting quantum computer.

It is Chinas latest and most advanced programmable and deliverable machine of its kind, according to the Science and Technology Daily.

Chinese scientists claim record smashing quantum computing breakthrough

Origin Quantum, the company behind the feat, was founded in 2017 by Guo Guoping and Guo Guangcan leading quantum physicists at the University of Science and Technology of China (USTC) in southeastern Anhui province.

US quantum computers are not open to China, Guo Guoping told the Post. But, adhering to the notion of scientific exploration without borders, we are willing to open our services to users around the world, including the US, to jointly promote the concept of quantum computing for the benefit of mankind.

Quantum computing is seen as a disruptive technology. It uses elementary particles called qubits, short for quantum bits, as its basic unit of information equivalent to the digital bits used in traditional computing.

China and the United States are among major world powers racing to be No 1 in utilising the key technology, which has the potential to transform many fields, including healthcare, finance and data security.

Origin delivered its first superconducting quantum computer to the domestic market in 2020. The countrys first practical quantum computer was also from Origin the 24-qubit Wuyuan second generation machine that was delivered to an undisclosed user in 2021.

The feat made China the third country after Canada and the US to gain the capability to deliver a complete quantum computing system.

The Wukong is powered by a 72-qubit home-made superconducting quantum chip, also called the Wukong chip.

Jia Zhilong, a director in charge of quantum chip research and development at Origin, said the launch of this locally made chip and computer was akin to an entry ticket to the field of superconducting quantum computer manufacturing.

He said it showed that China was capable of independently producing scalable quantum computer chips and systems of a certain size, local newspaper Anhui Daily reported earlier this month.

China sells quantum chips to Middle East and West in show of growing influence

Kong Weicheng, another researcher at Origin, told the paper that the companys latest powerful machine could send out and execute up to 200 quantum circuits at one time, giving it a greater speed advantage.

Despite these advances, the quantum gap between Chinese players and their Western counterparts remains wide.

In November 2022, Americas IBM launched its 433-qubit Osprey processor, the worlds fastest quantum computer at the time. In October last year, Californian start-up Atom Computing left the Osprey behind with the debut of its first quantum computer with more than 1,000 qubits. Two months later, IBM unveiled the Condor with 1,121 superconducting qubits.

Although having more qubits does not necessarily mean better performance, large numbers will be needed to build error-free quantum computers that would be more useful than todays noisy research machines, involving a certain probability of errors during the calculation process.

Chinese scientists acknowledge the gap with the West.

In late 2022, Zhang Hui, general manager of Origin Quantum, said China was at the forefront of global quantum science research but relatively behind in quantum computing.

The development of quantum computers involves many advanced engineering issues, Zhang told Chinese news outlet Guancha.cn. This includes the production of superconducting chips and traditional semiconductors both crucial hi-tech areas where China lags behind the US and the West.

He added that there was a huge gap between China and the US in the industrial applications of quantum computing.

Leading players such as IBM and Google started exploring industrial applications as early as the 1990s. But its only since the establishment of Origin Quantum in 2017 that we started exploring industrial applications, Zhang said.

However, whether featuring 72 or more than 1,000 qubits quantum computers are not about to replace conventional ones soon. At this stage, they can only perform very specific tasks for short periods of time in a protected environment.

Numerous technical challenges, such as the ability to correct errors, have led some scientists to forecast that a practical quantum computer is still years, if not decades, away.

Read the rest here:

US users top list after Chinas state-of-the-art quantum computer goes global - South China Morning Post

Read More..

How Secure Is Cloud Storage? Features, Risks, & Protection – eSecurity Planet

eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

Cloud storage is a cloud computing model that allows data storage on remote servers operated by a service provider, accessible via internet connections. Its a scalable and cost-effective storage solution for businesses offered through a subscription service. When assessing the overall security of cloud storage and choosing a solution tailored to your business, it helps to determine its features, potential risks, security measures, and other considerations.

Cloud storage utilizes remote servers accessed through the internet, while local storage saves data on physical devices directly connected to a users device. It excels in remote access, scalability, and security, with distributed storage options and privacy adherence capabilities. Local storage prioritizes direct access, potential cost savings, and reduced reliance on the internet, yet lacks the scalability and security of the cloud.

Heres the difference between cloud and local storage in terms of accessibility, distribution, security measures, and more:

Cloud storage stands out as a secure solution because of the security expertise provided by cloud security providers (CSPs), data recovery capabilities, and specific security advancements such as ransomware defense integration, business-focused cloud transformations, increased deployment at the edge, and adoption of NVMe over fabrics.

CSPs professional security expertise substantially contributes to the security capabilities and improvement of the general resilience of cloud storage. Cloud experts actively monitor and respond to potential threats, guaranteeing a continual update and alignment of security mechanisms with the latest requirements. CSP collaboration improves the security environment where theres a need to mitigate the emerging risks quickly and comprehensively.

Cloud storage makes data recovery easier in the event of an accident, deletion, or overwrite. According to Unitrends 2019 cloud storage research, 62% of respondents had successfully recovered data from the cloud. This trend is expected to increase as Gartner projects a threefold rise in unstructured data capacity by 2026. The increased scalability of cloud storage can assist effective data recovery solutions.

Cloud storage combats ransomware threats with integrated protection mechanisms and extensive methods recommended by cybersecurity experts. This integration ensures that the storage environment is capable of detecting, preventing, and recovering from ransomware assaults, which contributes to the overall resilience of stored data.

Gartner predicts that by 2025, 60% of organizations will require integrated ransomware defense strategies on storage devices, up from 10% in 2022. The significant increase in organizations requiring integrated ransomware defensive methods indicates heightened cybersecurity threat awareness. As ransomware threats get more sophisticated, businesses now recognize the importance of strengthening their security methods to protect data from malicious attempts.

Cloud transformations to accommodate the changing business needs now offer the capacity to quickly deploy and adapt. That means implementing new measures or changing it as needed. Cloud storage provides businesses with key benefits, such as flexibility, agility, business continuity, and faster deployment, all of which contribute to overall organizational responsiveness and better security.

In Fortinets 2023 cloud security survey of cybersecurity professionals, 52% selected storage as the service their firm deployed in the cloud. They cited lower risk, enhanced security, and cost savings as they go through migration.

The increased deployment of cloud storage at the edge immediately addresses security concerns over latency. Organizations shorten the time it takes to transmit and process information by storing it closer to where it is generated, reducing the window of risk and improving overall data security during transit.

The huge increase in edge computing and distributed data processing (40% by 2025, up from 15% in 2022) emphasizes the relevance of edge computing and distributed data processing. Organizations attempt to reduce latency and improve real-time data processing capabilities by storing data closer to where its generated.

The use of NVMe over fabrics improves the security of cloud storage by boosting data retrieval procedures. The improved performance and reduced latency of the technology mean that data may be accessed and recovered promptly, lowering the danger of prolonged exposure and potential security issues associated with delayed data retrieval.

The rising adoption of NVMe over fabrics in external business storage arrays (30% by 2025, up from less than 5% in 2021) suggests a trend toward high-performance storage solutions. NVMe over fabrics starts to become an important technology in cloud storage. This trend is particularly vital for core workloads, as enterprises seek faster data access and lower latency.

Despite its obvious benefits, cloud storage still faces common challenges, including misconfiguration, data breaches, insecure interface, unauthorized access, DDoS attacks, insider threats, lack of control, encryption problems, patching issues, compliance, and monitoring issues. Understanding these risks helps firms implement informed risk management and mitigation strategies.

Human errors during the configuration may expose sensitive data or services. Vulnerabilities happen when you incorrectly create permissions, leave default configurations unmodified, or mismanage security settings. Conduct regular audits of cloud configurations and create automation for configuration management. Provide ongoing training for individuals involved in setup and maintenance.

Data breaches frequently occur due to exploited vulnerabilities in cloud infrastructure or applications. Cybercriminals use various ways to acquire illegal access and exfiltrate sensitive data, such as exploiting software flaws, phishing assaults, or using compromised credentials. Anyone with sensitive data stored in the cloud is vulnerable in the event of data breach, so enforce strong encryption, authentication, and patching measures.

Attackers can use interface and API flaws to modify or circumvent security protections. It results in illegal access, data manipulation, or malicious code insertion into the cloud environment. Users connecting with cloud services via interfaces/APIs are in danger, as are enterprises relying on safe data transactions and interactions with external systems. Employ thorough API measures, regular validation of input data, and proper authorization protocols.

Unauthorized users may get access to cloud resources due to lax password regulations, inadequate authentication systems, or compromised user accounts. To address the risk, create strong access controls, enforce strict password requirements, and conduct regular access checks to identify and revoke unnecessary permissions.

DDoS attacks flood cloud services with traffic, overwhelming capacity and causing service outages. Attackers take advantage of weaknesses in the network or application layers to disrupt routine operations. Counter this by using DDoS mitigation services, establishing redundant network designs, and testing the resilience of your systems against simulated DDoS attacks on a regular basis.

Malicious insiders may purposefully abuse their access privileges, whereas reckless insiders may accidentally expose critical data or misconfigure security settings. The lack of awareness, employee dissatisfaction, or social engineering attacks targeting an employee may all cause insider threats. Perform extensive background checks during the hiring process, set stringent access controls, and provide employees with continuous cybersecurity training.

Inadequate data storage and access control may result in unintended data exposure. The lack of control comes from failing to enforce security policies, monitor user actions, or install appropriate encryption mechanisms. To protect sensitive data, evaluate and update security policies on a regular basis and use encryption solutions.

Your data is vulnerable to interception if you dont encrypt it before transferring or storing it in the cloud. Cybercriminals can listen in on communication channels or get unauthorized access to stored data, jeopardizing confidentiality. To mitigate the risk, install end-to-end encryption, encrypt data in transit and at rest, and stay updated on encryption standards and technology.

Security patches not applied promptly make systems vulnerable to exploitation. Cyber attackers target known vulnerabilities, exploiting them to obtain unauthorized access or jeopardize the cloud environments integrity. Create a solid patch management strategy, automate patch deployments when possible, and conduct vulnerability assessments on a regular basis.

Non-compliance with data residency standards and legal requirements occurs as a result of a lack of awareness or a failure to establish procedures to guarantee data is stored and handled in accordance with applicable laws. Its important that you remain updated on data residency requirements and that correct data classification and handling policies are in place.

Inadequate monitoring tools and insight into cloud systems make it difficult to spot suspicious activity in real time. Security issues can thereby go undetected, potentially resulting in extended data exposure or illegal access. Implement comprehensive monitoring solutions, detect anomalies using advanced analytics, and establish incident response protocols.

While cloud storage has many advantages, you must address its weak points to secure data. To lower the possibility of risk, consider using authentication measures, encryption, backup routine, monitoring, and other security measures.

Specifically, here are a few ways to secure your cloud storage from potential threats:

Small and midsize business (SMB) and large enterprise security professionals both prioritize preventing cloud misconfigurations, emphasizing the critical requirement for secure configurations. Securing major cloud apps emphasizes the continuous relevance of businesses application security. Its a prerequisite for all types of businesses to defend themselves against malware and maintain regulatory compliance when implementing comprehensive cloud protection.

While SMBs and large enterprises have overarching needs in cloud storage solutions, they have different limitations and requirements to prioritize.

Common SMB needs include a hybrid option, on-premise storage for regulatory compliance, scalable and cost-effective solutions. They also look for easy data migration paths, the ability to address latency and performance, and a reputable service provider.

Large enterprises often require advanced analytics, comprehensive SLAs, customization, elasticity. They also need enterprise-grade security, global accessibility, high-volume data management, and redundancy and disaster recovery:

Businesses must strike a balance between applying the inherent security features of cloud systems and actively participating in the continuous effort to tighten their security posture in order to fully realize the potential of cloud storage. Cloud storages capabilities are great assets but to achieve their full potential, combine it with active knowledge and adherence to solid organizational security practices.

Next, get deeper insights on how to secure cloud environments to experience the benefits of cloud storage while establishing data integrity and protection.

More here:
How Secure Is Cloud Storage? Features, Risks, & Protection - eSecurity Planet

Read More..

Enjoy lifetime access to 20TB of secure cloud backup for just $89.97 – Macworld

File loss, no matter the reason, isnt just inconvenient Its downright infuriating. Want to ensure that this unfortunate circumstance never happens to you? Then a lifetime subscription to the Prism Drive Secure Cloud Storage 20TB Plan may be just what you need. Get 20TB for just $89.97 (reg. $1494) through January 21st only.

Prism Drive is a popular cloud backup that keeps your files safe from things like cybercrime, hardware failure, and even accidental deletion. Simply upload the files you want to keep and then recall them whenever you want across your devices. And since you get a massive 20TB, youll likely have enough space to upload your entire file system.

What makes this deal so notable is the fact that, for one small price, you get a lifetime subscription to an enormous amount of cloud-based real estate. You wont ever have to pay another penny, so its value is just going to rise the longer you use it. When you consider that other cloud backups charge on a monthly basis, paying only once instead makes a good deal of sense.

Get a lifetime subscription to the Prism Drive Secure Cloud Storage 20TB Plan for just $89.97 (reg. $1,494), but only until 11:59 pm on January 21.

Prism Drive Secure Cloud Storage: Lifetime Subscription (20TB) $89.97

See Deal

StackSocial prices subject to change.

See the article here:
Enjoy lifetime access to 20TB of secure cloud backup for just $89.97 - Macworld

Read More..