Page 881«..1020..880881882883..890900..»

Explained: How does blockchain technology work? – Times of India

Blockchain technology

is a revolutionary system that allows for secure and transparent digital transactions. It's often associated with cryptocurrencies like Bitcoin, but its applications go far beyond that. Let's break down how blockchain works in simple language.

Imagine a digital ledger or a digital notebook that records all transactions. Instead of being owned by one person or organization, this ledger is distributed across a vast network of computers, often referred to as nodes. Each node has a copy of the entire ledger, and they work together to validate and record transactions.

Blocks

Transactions are grouped together into blocks. These blocks are like pages in our digital ledger. Each block contains a set of transactions, and it has a unique identifier called a "hash." The hash is like a fingerprint for that block and is generated using a cryptographic algorithm. It's crucial for the security of the blockchain.

Decentralization

Unlike traditional systems where a central authority, like a bank, controls the ledger, blockchain is decentralized. No single entity has control over it. Instead, it's maintained by a network of computers, making it resistant to manipulation or corruption by a single party.

Consensus

To add a new block to the blockchain, all the nodes on the network must agree that the transactions in the block are valid. This process is called "consensus." Various consensus mechanisms exist, with Proof of Work (PoW) and Proof of Stake (PoS) being the most well-known. In PoW, nodes compete to solve complex mathematical puzzles, and the first one to solve it gets to add the next block. PoS, on the other hand, selects validators based on the amount of

they "stake" as collateral.

Immutability

Once a block is added to the blockchain, it's nearly impossible to alter. This is because each block contains a reference to the previous block's hash. So, if you were to change the data in one block, it would alter the block's hash. Since each block's hash is used in the next block's hash, this change would cascade through the entire chain. For someone to tamper with a block, they would need to control over 51% of the network's computing power (in the case of PoW), which is extremely challenging and costly.

Transparency

is often called a transparent technology because all transactions are recorded on the ledger, and anyone in the network can view them. While the participants in a transaction are pseudonymous (identified by cryptographic addresses rather than real names), the details of the transaction are entirely visible.

Security

The combination of decentralization, consensus, and immutability makes blockchain highly secure. It's resistant to hacking and fraud. Moreover, blockchain uses strong encryption techniques to protect data, further enhancing its security.

Smart Contracts

Blockchain can execute self-executing contracts called "smart contracts." These are programmable agreements with predefined rules. When certain conditions are met, the smart contract automatically executes without the need for intermediaries. For example, in a real estate transaction, a smart contract could transfer ownership of a property to the buyer once the payment is received.

Use Cases

While cryptocurrencies are the most famous use case, blockchain technology has applications in various industries, including supply chain management, healthcare, finance, and more. For instance, it can help trace the origin of products, securely store and share medical records, facilitate faster and cheaper cross-border payments, and provide transparent voting systems.

(The content is generated with the assistance of Artificial Intelligence)

See the original post here:

Explained: How does blockchain technology work? - Times of India

Read More..

The Growth and Adoption of the XRP Ledger – BTC Peers

The XRP Ledger is the open-source distributed ledger technology developed by Ripple that is designed for executing fast and affordable transactions. The native cryptocurrency that operates on the XRP Ledger is known as XRP. Since the creation of the XRP Ledger in 2012, there has been significant growth in activity and adoption by individuals and institutions. Understanding the network statistics can provide insight into the overall health and trajectory of the XRP ecosystem.

The total number of accounts on the XRP Ledger is one metric that demonstrates the increasing usage and popularity of the network. In January 2016, there were just over 150,000 accounts created on the ledger. As of September 2023, there are more than 7.5 million accounts, representing a growth rate of over 4,900%. The pace of new account creation accelerated in late 2017 and early 2018 as interest in digital assets expanded exponentially. However, even in recent years, the total number of accounts has continued to steadily climb.

Much of this growth can be attributed to the entrance of institutional players and companies leveraging the speed, scalability, and low transaction fees of the XRP Ledger for cross-border payments and other use cases. The diverse base of accounts, from exchanges to banks, is a positive sign for the ongoing adoption of the network. The increasing account figures point to the real-world utility that the decentralized XRP Ledger is providing.

In addition to the total accounts, the transaction volume on the XRP Ledger also provides insight into the adoption and usage of the network. In January 2017, the ledger was processing around 300,000 transactions per day. As of September 2023, it is consistently handling between 3 to 7 million transactions per day. The highest daily transaction figure reached nearly 15 million in January 2018 amidst the overall crypto market mania.

Even during more steady periods, the consistent multi-million transaction per day figures demonstrate the active baseline utilization of the network. Much of this activity comes from exchanges, market makers, and transaction batching. However, there are also real use cases like money transfers and institutional cross-border payments that rely on the XRP Ledger. As more businesses and individuals experiment with and integrate XRP for payments, the transaction volumes are likely to continue increasing.

One important element related to the ongoing maturation of the XRP Ledger is the decentralization provided by the expanding group of validators. Validators on the XRP Ledger are servers or nodes that independently verify transactions and maintain agreement on the status of the ledger. Increasing the number of validators improves the resilience and decentralization of the network.

In January 2017, there were only around 10 public validators operated by Ripple and a few others. The recommended UNL or unique node list included these validators. As of September 2023, there are over 30 active validators on the public UNL and hundreds more non-validating nodes and validators on private or testing UNLs. This demonstrates significantly improved decentralization of the ledger as more entities run validators and trust different UNLs.

Prominent companies like Coinbase now operate XRP Ledger validators. The wide distribution and lack of reliance on only Ripple-operated validation will be key for the ongoing security and decentralization of the network. Overall, the growth trends for accounts, transaction volumes, and validators all signal the increasing maturity and adoption of the XRP Ledger.

The development of the XRP Ledger over the past decade has been impressive, but it is still in the early stages of enterprise and institutional adoption. While the signs are promising, there are open questions regarding the speed and scope of further adoption.

Some of the factors that could influence future growth include regulations, interoperability with CBDCs, partnerships, and overall crypto market conditions. It is unlikely that adoption and activity will follow a linear path. However, the XRP Ledger stands well-positioned to capture a significant share of the payments market. The built-in speed, scalability, low transaction costs, and institutional-grade features give it utility advantages.

As a native digital asset, XRP has the potential to serve as a bridge currency and liquidity tool between different currencies and networks. The cross-border payment flows between banks and financial institutions are where Ripple hopes to insert XRP as a reliable intermediary asset.

Thanks to the speed and scalability of the XRP Ledger, settled payments in 3-5 seconds are possible. With more bridges and partnerships connecting fiat currencies and other crypto assets to XRP, the demand and volume could increase exponentially. XRP skeptics point to the lack of major bank adoption so far as a question mark. However, the demonstrable efficiencies of using XRP provide a compelling incentive for financial institutions.

Though the future is uncertain, the XRP Ledger appears well-equipped technically to become a leading worldwide payment rail through the leveraging of the XRP digital asset. Connectivity and liquidity will be the keys to unlocking this potential. If achieved, the usage and rate of adoption of XRP could accelerate rapidly as network effects take hold.

In summary, the growth trends for accounts, transactions, validators, and decentralization point to the increasing maturation of the XRP Ledger. There is still a long runway ahead for further adoption and when viewed in the context of other leading cryptocurrency networks, the XRP Ledger remains in the early stages. The unique capabilities and positioning of XRP make it a leading contender to become a global liquidity tool and decentralized payment rail for institutions and enterprises. But uncertainties remain around regulatory clarity, bank adoption, and competition. Overall, the long-term outlook looks bright for the XRP Ledger and XRP cryptocurrency becoming a core component of the global financial infrastructure.

See the rest here:

The Growth and Adoption of the XRP Ledger - BTC Peers

Read More..

Opinion: Edmonton must protect its river valley and drinking water – Edmonton Journal

Last Tuesday, the citys utility committee approved Epcors flood mitigation plan. On Sept. 12, the vote goes to city council.

We apologize, but this video has failed to load.

Edmonton River Valley Conservation Coalition is concerned about this plans impacts not only on the river valley, but also on the protection of our drinking water. We oppose the project and urge council to think carefully about what resilience actually means.

This advertisement has not loaded yet, but your article continues below.

We have five interrelated concerns. The first is the cutting of 577 trees, including 77 mature trees. Replanting young trees will not replace mature trees; the latter offer exponentially greater carbon sequestration, flood and drought mitigation, and habitat. Some areas will be kept cut as root-free maintenance zones with lawn-covered walls with security fencing on top. It seemed lost on Epcor and councillors that one of the main causes of the climate crisis behind extreme flooding is deforestation. Nor did Epcor consult with the energy transition climate resilience committee (the advisory group that reports to council on climate matters). Edmontonians were angry about the loss of 200 trees in Hawrelak Park, yet council now seems ready to approve a project involving the loss of nearly three times that number.

Our second concern is further impact to the wildlife corridor, in particular on pinch points that are already in desperate need of restoration. This will drive wildlife into residential areas and increase conflict. It also negates our responsibility to help ensure the safe passage of wildlife along a critical corridor from the Rockies to Hudson Bay.

This advertisement has not loaded yet, but your article continues below.

Our third concern regards the questionable wisdom of trying to hold back the river in a flood plain. As Calgary and High River learned 10 years ago, water will do what it wants. Cities around the world have learned the hard way that concrete berms and barriers are mistakes. In cities in the Netherlands and the U.K., concrete walls are now being removed along rivers. They have found that working with, rather than against, nature is far more effective in preventing floods.

The cities above are instead restoring flood plains to allow for absorption of water in the landscape. In Edmonton, this would mean re-wilding Rossdale and E.L. Smith water treatment plants so that there is minimal infrastructure and healthy soil and vegetation that can absorb water during a flood. This slow-water approach is cost-efficient, protects wildlife corridors, restores vegetation that holds up banks, prevents drought (the twin crisis to flooding), and increases habitat. Why is Epcor not proposing this nature-based solution, and why is the city not demanding it, when the concrete approach has been proven to fail?

This advertisement has not loaded yet, but your article continues below.

Our fourth concern is Epcors lack of a long-term plan to decentralize water treatment. How resilient is a water system in which over 90 communities rely on just two water treatment plants (located in flood plains)? Epcor says that decentralization involves decreasing water consumption, and admits they have no plan to encourage that. At Tuesdays meeting they said the only consumption reduction they are considering targets people who have trouble paying their bills not affluent landowners who water their lawns, even though lawn watering is apparently one of the main reasons for consumption spikes in summer. This is the problem with considering water a business.

We should be protecting our drinking water through protecting the resilience of the river valley. By further degrading the flood plain and ignoring the need for decentralization, Epcor is arguably making the water system vulnerable in Edmonton and much of the region. Yes, decentralization would cost more in the short term. But consider the cost when the concrete fails (for water always wins) and the city and 90 communities are without drinking water, and all the infrastructure including the $65 million worth for this project alone is lost because we did not respect the flood plain. Epcor says much of their infrastructure goes back to the 1940s; might now be a good time to rethink the system? And while Epcor says the $22-million grant they are receiving is tied to this project, there are also grants available for ecosystem restoration, as well as for truth and reconciliation.

This advertisement has not loaded yet, but your article continues below.

That brings us to our final main concern. How does one even put a price tag on protecting the river valley and land that has the same archaeological designation as UNESCO World Heritage sites? We do not understand how the city can say it cares about decolonization while continuing to disturb important Indigenous cultural sites, as well as disrespecting the river and the land.

Council is aware of all the concerns above. For the protection of our river valley and our water, we urge them to ask Epcor for a plan that aligns with the nature-based solutions for flood mitigation happening and working in cities around the world. The urgency of the situation means we have to get this right, now.

Kristine Kowalchuk is chair of the Edmonton River Valley Conservation Coalition.

See original here:

Opinion: Edmonton must protect its river valley and drinking water - Edmonton Journal

Read More..

At least $2m in savings prevented from being stolen in malware … – The Straits Times

SINGAPORE Scammers who took control of the phones of more than 30 OCBC Bank customers were prevented from stealing at least $2 million following the release of a security measure that blocks access to the banks Internet banking services in the presence of a suspicious app.

Since the update to the OCBC Internet banking app was released on Aug 5, no losses from malware scams had been reported by the banks customers who were using this version of the app, OCBC said in a statement on Thursday.

The security feature, which blocks access to the banking app if it detects apps from non-official platforms and flags those with risky permissions settings, was rolled out as a response to malware scams that give hackers control over a victims device.

It was released after a meeting among banks and the authorities to crack down on malware scams and roll out stronger security features to tackle them, The Straits Times understands.

OCBC received reports from more than 30 customers about their Android mobile phones being hacked by sideloaded apps from non-official sources, such as those outside Google Play Store.

The apps introduced a virus that gave fraudsters control of the victims device, but they were not able to make fund transfers through the OCBC app, said the bank.

The security measure also prevents scammers from logging on to OCBC Internet banking via a web browser to access customers bank accounts as it would require a physical hard token since the digital token has been frozen, said the bank.

OCBC added: While there was already more than $2 million in these customers savings accounts, the amount that might have been lost to scammers could have been much higher as scammers have previously redeemed fixed deposits and unit trusts early, or drawn down cash advances under customers credit cards.

The security measure drew criticism from some users, who said they were unable to concurrently use apps from non-official platforms, such as China-centric apps for business.

The Monetary Authority of Singapore has since backed the banks security feature, and said on Aug 8 that any unintended inconveniences are in the nature of new innovations, and that it will work with the banks to learn from these experiences.

It added: Security measures will come with some measure of added inconvenience for customers, but they are necessary to maintain security of and confidence in digital banking.

DBS said on Thursday in reply to ST queries that it is working with the authorities and industry partners on ways to tackle malware scams.

Its spokesman said: There is a need to take a considered approach for this.

As we work to provide a robust level of protection for our customers, we also want to keep the customer journey as frictionless aspossible.

DBS Banks active surveillance measures protected customers from various scams, including malware scams, with at least $16.5 million in losses prevented over the past three months, said the spokesman.

Malware scams have grown in numbers in past months. In August, at least 27 victims lost around $325,000 after sellers advertising moon cake sales on social media directed them to install Android Package Kit (APK) files that contained viruses.

Read this article:
At least $2m in savings prevented from being stolen in malware ... - The Straits Times

Read More..

‘The Solutions Just Clicked’ | Exceptional Results | Stories | Brandeis … – Brandeis University

Part of Exceptional Results

Mathematician Bonnie Berger 83 says her lightbulb moment came during her sophomore year.

She was sitting at a computer terminal in Ford Hall, coding in FORTRAN, one of the earliest programming languages. It just came so easily to me, she says. I thought, Aha! Ive found what I love.

Berger, the Simons Professor of Mathematics at MIT, and a member of both the National Academy of Sciences and the American Academy of Arts and Sciences, is one of the worlds foremost experts in computational biology, the application of computer science and math to biology.

Shes used code-breaking strategies to reveal protein structures, applied machine learning and big data to drug discovery, and invented a computational tool called Dig that identifies genetic mutations in cancer cells before they turn tumorous. I view biology as providing me problems as a mathematician, she says.

Her father, a Miami businessman who dreamed of being a mathematician, used to slip notes under her bedroom door that read, Good morning, Bonnie! Would you like to do math problems today?

She started Brandeis as a Russian language major, then switched to psychology during her second year. She didnt have much interest in diagnosing mental illness or analyzing graffiti on a bathroom wall (an observational experiment assigned in one class), but she did love any assignment involving programming. In her junior year, she changed her major to computer science.

I could see how to lay out a program, she says. The solutions just clicked in my brain.

She got 11 A-pluses in her math and computer science classes. One summer, she designed the universitys first online course-registration system for the registrars office.

Although there werent many female faculty or students in the computer science department at the time, Berger says she never encountered sexism.

I was appreciated for my brain, she says. There were never any issues with gender. And faculty members encouraged her to pursue an advanced degree after graduation.

Brandeis helped me find myself, she says. It finds hidden jewels.

Follow this link:

'The Solutions Just Clicked' | Exceptional Results | Stories | Brandeis ... - Brandeis University

Read More..

Top 10 Must-Read Books for Computer Science Students – Analytics Insight

Here is the list of best top 10 must-read books for computer science students

In this compilation, we present the Top 10 Must-Read Books tailored for Computer Science students. This list encompasses an eclectic range of titles, spanning from captivating biographies of industry trailblazers to profound tributes to the early days of computing, as well as practical how-to guides. Despite the vast differences in content and approach, every book featured here possesses a timeless quality, making them enduring staples in the ever-evolving realm of Computer Science.

Our top pick among computer science books is Charles Petzolds Code: The Hidden Language of Computer Hardware and Software. It offers readers, regardless of their backgrounds, a fascinating glimpse into the inner workings of computers. Petzold uses numerous illustrations and relatable analogies, like Braille and Morse Code.

Algorithms to Live By explores the practical application of computer algorithms to solve everyday decision-making problems and gain insights into how our minds operate. This interdisciplinary gem demonstrates how computer algorithms can be harnessed for various tasks, from finding a life partner to optimizing parking spot searches and email inbox organization.

Authored by MIT computer science professors, Structure and Interpretation of Computer Programs serves as a comprehensive programming text that delves into the mathematical and theoretical foundations of programming language. Though dense, its delivered with a light touch, making it particularly appealing to students with a mathematical background.

Algorithms stands as the most widely used college textbook on the subject, required reading in universities worldwide. It thoroughly covers essential algorithms and offers access to a rich online companion site packed with additional resources. The textbook and online content seamlessly integrate with a Massive Open Online Course (MOOC) for comprehensive learning.

Clean Code by Robert C. Martin is an instructive masterpiece that empowers readers to discern and craft code that functions impeccably exudes elegance, and mitigates future problems. This book imparts the essence of sound coding principles, transforming subpar code into excellence, and elucidates best practices in formatting and testing.

Code Complete, a pragmatic guide to software construction, amalgamates wisdom from academia, research, and industry. Laden with a plethora of code samples, it champions simplicity, fosters creativity, and serves as an encyclopedic compendium of coding excellence.

The Second Machine Age, a New York Times bestseller, offers insights into the transformative impact of technology on the world, foreshadowing a future where digital innovations and algorithms usurp human roles, including medical diagnosis. The authors outline a blueprint for a prosperous new era in the wake of these profound changes.

Everything You Need to Ace Computer Science and Coding in One Big Fat Notebook is a middle school-friendly reference guide brimming with comprehensible diagrams, charts, and explanations. It reads like the well-organized notes of the brightest student in class, earning praise from both young readers and adults for its accessibility and educational value.

Superintelligence by Swedish philosopher Nick Bostrom delves into the intriguing notion that if machines surpass humans in intelligence, they could potentially supplant us as the planets dominant species. The book explores various scenarios, prompting readers to reflect on our current interaction with technology and its implications for our future survival.

On the other hand, C Programming Language, authored by the creators of C, serves as a comprehensive guide to ANSI standard C programming. This textbook isnt tailored for novice computer science students, requiring a solid grasp of fundamental computer science principles before delving into the intricacies of C, known for its complexity among programming languages.

See the article here:

Top 10 Must-Read Books for Computer Science Students - Analytics Insight

Read More..

STEM students are privileged at Duke – The Chronicle – Duke Chronicle

What picture comes to mind when you think of the stereotypical STEM student? Are they stressed? Do they struggle to balance their workload? Do they procrastinate or do they work hard and play equally as hard? Regardless of what exactly you imagine, Im pretty sure that privilege was not a part of that image. Im not talking about the fact that STEM students are overwhelmingly white or Asian and male or the fact that their careers generate higher salaries. Im talking about the privilege that comes with studying STEM and how the Duke community treats students because of it.

I am not a STEM student. I never liked math. I always saw science as just another subject in school. And I never grew up with dreams of working in medicine, engineering, or a technology field. I preferred reading in English class and learning about culture in history class. I never considered this to be odd until I came to Duke. Here, it felt like everyone I met wanted to do one of three things (outside of law and consulting of course): go to medical school, become an engineer or major in computer science so that they could work at some tech company. And I wasnt wrong. A recent survey from the career center found that the top five industries Duke students enter are technology, finance, business or management consulting, healthcare and medicine and science or research. I felt like no one wanted to write books, or make movies or learn about people and culture. As a self-proclaimed anti-STEM student, I started to see the benefits of pursuing the STEM path at Duke and how my own path lacked these advantages.

Whenever I told someone I planned to major in African & African American Studies, I was always asked what I wanted to do or given a smile and a thats cool." Many Duke students dont even know what non-STEM students actually study. If you ask a Duke student to define cultural anthropology or describe what ethnic studies students are learning, they most likely cannot. But should the conversation switch to biology, chemistry or computer science, their faces light up.

How have we as a campus so easily coded STEM majors as normal while viewing the humanities and social sciences as foreign and in some cases useless? Why do we respect the rigor of labs and problem sets, but call other students lucky when they must read an assigned book in only a week or fully develop an original creative concept in just a few days? We are constantly told that there will be countless job opportunities available to us that have not been created yet, such as social media marketing. Then we as a society turn around and tell students in college to focus on building marketable skills (which is often just code for STEM skills like coding) and creating a stellar resume. How have these ideas translated into a greater push towards STEM?

STEM students are also privileged in terms of resources. Whenever the university allocates funds or comes across new resources, it seems like these departments always eat first. The history department sits in the Classroom Building on East Campus, across from Friedl which is home to the AAAS and cultural anthropology departments, while engineers quite literally have an entire quad to themselves. Even the quality of the classrooms varies. There are still chalkboards on campus used by you guessed it non-STEM professors. How are STEM buildings able to have such beautiful architecture and large glass windows, yet social science buildings are often in inconvenient locations that lead many students to avoid taking those courses? Lets be honest; traveling to Friedl, or the Classroom Building, or East Duke or Smith Warehouse when you dont live on East Campus is not the most convenient. Yet, its something that I and many other students do every week.

Even in terms of community, STEM students are privileged. Any room that they walk into they can be sure that at least one other student studies something under the STEM umbrella, and in many cases, its easy to find someone in their department. I have been in many rooms with pre-med, Pratt and computer science students where I was the odd one out. I was the one who said no to STEM. Even as a double major in AAAS and Visual & Media Studies, I struggle to find peers who are majoring in either department. Many social science departments at Duke have very few majors and finding a social science student who doesnt study public policy is also a real challenge. You have the occasional STEM and humanities double major or the STEM students with a social science minor but overall, being a non-STEM student is isolating and can be lonely. Who do you talk to about your classes when your friends are all pre-med? Who do you study with when youre surrounded by engineers? What upperclassmen can you turn to for advice when they all study computer science?

Learning to navigate this experience at Duke was an adjustment. While STEM students have no control over the resources they receive or the facilities they are given, we must acknowledge that there is some privilege there. By no means am I implying that STEM is easy. However, we must create space for non-STEM students to feel heard and let them know that whatever they choose to study is valid. STEM students are also responsible for educating themselves and using what few opportunities they have to take courses that teach them something different or challenge them in a new way. I believe that the humanities and social sciences provide useful skills that we all need to develop. Maybe then it will become clear that everything at Duke is valuable, not just STEM fields.

Sonia Green is a Trinity junior. Her column typically runs on alternate Tuesdays.

Signup for our weekly newsletter. Cancel at any time.

The rest is here:

STEM students are privileged at Duke - The Chronicle - Duke Chronicle

Read More..

Why is China banning officials and state employees from using iPhones? – Al Jazeera English

China is reportedly barring government officials and employees at state-owned enterprises from using iPhones.

The Wall Street Journal on Thursday reported that Beijing had issued a directive barring central government officials from using the Apple devices.

On Friday, Bloomberg reported that the ban also covered government-backed agencies and state companies and would be expanded to a wide range of government-controlled organisations.

Chinas moves, which have not been announced on official channels, are the latest salvo in the ongoing trade and tech war between Washington and Beijing.

While bad news for Apple and a potential omen for Western tech companies generally, the bans have not come as a total surprise to China watchers.

The United States and China have taken steps to reduce their economic reliance on each other as the two sides increasingly prioritise alleged national security concerns over investment and trade.

Beijing has ramped up efforts to lessen its dependence on foreign technology and prop up domestic companies, including Shenzhen-based Huawei, whose new $1,200 Mate 60 Pro has been described by tech analysts as giving the iPhone a run for its money.

Bank of America has noted the interesting timing of the iPhone ban given the recent launch of the Mate 60 Pro.

China and the US view each others tech companies as potential security risks that could provide backdoor access to sensitive data and government infrastructure.

In May, Montana became the first US state to ban Chinese-owned TikTok over data privacy concerns, with a number of other states mulling similar moves.

US federal agencies and many state governments have already banned the app on government-issued phones.

Washington has also banned US companies from doing business with numerous Chinese tech firms, including Huawei, and restricted US chipmakers from selling China advanced tech.

The release of the Mate 60 Pro, which is powered by the advanced Kirin 9000s processor, has raised questions about the effectiveness of these export controls.

US National Security Adviser Jake Sullivan said last week that the administration of President Joe Biden was seeking more information about the character and composition of the smartphone to determine if the law had been circumvented.

Apples stock price tumbled nearly 6 percent between Wednesday and close of business on Friday, wiping nearly $200bn off the value of the worlds most valuable company.

The ban has also sent a chill through Western companies operating in China generally, amid questions about how welcome foreign firms are in the worlds second-largest economy.

Even as some Chinese officials stress that China is back open for business post COVID-19, police raids on foreign firms, including the Mintz Group, and recently enacted anti-espionage laws have underscored the difficulty of doing business and accessing information.

The increasingly tense security environment comes on top of a host of challenges facing foreign firms, including the fallout of the pandemic, intellectual property theft, government discrimination in favour of domestic competitors and regulatory issues.

The latest restrictions on Apple could add to doubts about doing business in China, especially as the California-based tech giant, until recently, had a relatively good relationship with Beijing.

Apple, which generates about 20 percent of its global sales in China, has historically been happy to comply with Beijings demands for control, such as by removing virtual private networks (VPNs) from its Chinese iOS store to prevent users from evading internet censorship.

As recently as March, Apple CEO Tim Cook met with Chinese Premier Li Qiang in Beijing.

Bill Bishop, author of the popular newsletter Sinocism, said on Friday that the confidence many had that Apple is able to navigate US-China tensions to avoid any material blowback could be increasingly misplaced.

The ban will not prevent everyday Chinese citizens from buying the soon-to-be-released iPhone 15 and other Apple products.

But it does emphasise the growing tension between Beijings desire for control and Chinas economic future.

Companies including Apple were already shifting production and investment away from China but the ban and other recent events may accelerate that trend.

US Commerce Secretary Gina Raimondo said last month that foreign tech companies were starting to see China as uninvestable due to the increasingly hostile business environment.

The souring sentiment threatens to exacerbate the challenges facing Chinas post-pandemic recovery, which is faltering amid deflation, slowing exports, a real estate crisis and high youth unemployment.

Here is the original post:
Why is China banning officials and state employees from using iPhones? - Al Jazeera English

Read More..

Symposium to Spotlight Digital Mental Health Technology – Dartmouth News

Experts in the field of digital mental health will gather at Dartmouth on Sept. 19 to discuss opportunities and challenges in developing innovative digital tools that can transform mental health care.

President Sian Leah Beilockwill deliver opening remarks to kick off theDigital Mental Health & AI Symposiumorganized by theCenter for Technology and Behavioral Healthat the Hanover Inn.

The Center for Technology and Behavioral Health is a leader in the science of digital health as applied to health behavior, saysCTBH Director Lisa Marsch.We are excited to host this event with the Dartmouth community to highlight the opportunities for using digital health tools to promote mental health anytime and anywhere.

Marsch noted that the center, part of the Geisel School of Medicine, has been designated as a Center of Excellence by the National Institutes of Health.

The one-day event includes keynote talks, a research poster session, and panel discussions on student mental health, how AI is shaping the field, and the ways to unlock the full potential of digital therapies.

The symposium will bring together some of the leading experts in the field under the same roof to discuss the successes and roadblocks so far and share their ideas on plotting the path forward, says event co-chairAndrew Campbell, Albert Bradley 1915 Third Century Professor in the Department of Computer Science.

Digital mental health technologies encompass a wide range of data-driven or AI-powered web-based and mobile tools that are designed to impact mental health outcomes of users.

The initial impetus behind trying to use technology in the mental health space was to fill the gap caused by the general lack of adequate health care resources, says Campbell. Soon after, the smartphone and social media became something akin to petri dishes to try to understand whats going on in peoples lives around the issue of mental health.

Since then, Campbell says, there have been a number of successes, for example,in using phones to predict behaviors, using those behaviors to predict symptoms, and then engaging in interventions and therapeutic approaches based on the predicted symptoms.

The upcoming symposium will focus on advances in behavioral sensing (the use of sensors in personal devices to measure and monitor behavior), intervention (activities accessed via technology platforms that improve users mental health), and the AI revolution.

Keynote speakers include:

More:

Symposium to Spotlight Digital Mental Health Technology - Dartmouth News

Read More..

Elvis Moreno of Yonkers New York Explores the Fundamentals of … – Downbeach.com

Elvis Moreno of Yonkers, New York is an IT industry professional, and computer hobbyist. In the following article, Elvis Moreno discusses the architecture of the computer, that allows them to understand, retain, and retrieve information.

The term computer architecture is nothing more than the framework for understanding how computers work and perform tasks. A computers operation depends on hardware, software, and communication components, which include CPUs, memory, input/output devices, and storage units.

Elvis Moreno of Yonkers, New York explains that it encompasses everything from lines of text to spreadsheet digits to dots of colors to sound patterns to the systems appearance thanks to this fundamental aspect of computer science.

Without certain components, computer architecture would cease to exist. As a result, computers themselves would disappear. Each element plays a vital role in constructing a functional, workable architecture for basic and complex computing.

Todays digitally focused society has brought many unique input devices (i.e., those that connect external data sources to the computer) to the forefront VR headsets included. However, keyboards and mice remain the most common input devices, both of which have hardware drivers that sync with the architectures other components.

Elvis Moreno says that unsurprisingly, outputs are the inverse. They deliver the computers results to the user, with different output devices sending different media types. Headphones, for example, deliver sound, while printers spit out hardcopy text.

All computers have multiple memory/storage units, but they werent created equally. Instead, theyre categorized into primary and secondary storage.

Otherwise known as the main memory, its directly accessible by the CPU and used for storing instructions and information throughout program execution. Experts note the two major types are random access memory (RAM) and read-only memory (ROM).

The former, as a temporary memory, supplies relevant information directly to the CPU. The latter holds pre-installed instructions and firmware. Unlike RAM, its persistent and cant be changed due to its role in booting the machine upon startup.

Elvis Moreno of Yonkers, New York says that the CPU cant directly access secondary/external storage (i.e., solid-state drives (SSDs), hard disk drives (HDDs), and similar). Instead, information must be transferred to primary storage for CPU access.

Many industry professionals consider the central processing unit to be the brain of the machine. And just like human brains, its a complex part of computer architecture, comprising many sub-components like registers, arithmetic logic units (ALUs), and control circuits.

Elvis Moreno of Yonkers, New York notes that essentially, its job is to interpret and execute instructions, working with the other sections of the structure to make sense of the information and ensure it offers the appropriate output.

Diving deeper into the CPU unveils a world of integral sub-elements explained briefly by professionals as follows:

Located in the firmware, the bootloader is run by the processors that gets the operating system from the disc, loading it into the memory for execution. Its found on workstation and desktop computers, alongside embedded devices, making it one of the most vital components of computer architecture.

Elvis Moreno notes that the OS governs the functionality above firmware, managing memory usage and regulating input/ouput devices. As most slightly tech-savvy individuals will know, it also offers an interface that lets them launch apps and utilize stored data.

Buses, tangible bunches of signal lines, all have the same purpose (like USBs, for instance). They enable the flow of electrical impulses between components, letting information pass from one section to the next.

Elvis Moreno of Yonkers, New York says, referred to as traps or exceptions by some experts, interrupts redirect the processor from running the current task so it can deal with an occurrence, such as a peripheral malfunction or an input/output device has completed its previous job and is awaiting a new one.

Elvis Moreno of Yonkers, New York says that unbeknownst to many, computer architecture isnt entirely linear. Experts configure the above-mentioned components in various ways, depending on the system. In fact, there are five configurations often seen in the industry ISA, microarchitecture, client-server architecture, SIMD, and multicore architecture.

Post Views: 584

Read more here:

Elvis Moreno of Yonkers New York Explores the Fundamentals of ... - Downbeach.com

Read More..