Page 912«..1020..911912913914..920930..»

Security cameras with end-to-end encryption not cheap – Boing Boing

Philips has new wired indoor/outdoor security cameras outfitted with end-to-end encryption, all part of its new Hue Secure system, with the basic model costing $200, a battery-equipped model $250, and one with a floodlight costing an ooftastic $350. The Verge posted an in-person preview and found them attractive and easily-mounted, but disliked the pricing given the otherwise unremarkable specifications, inability to work with other systems, and ongoing subscription fees.

At launch, there is no compatibility with Amazon Alexa or Google Home, although George Yianni, head of technology at Philips Hue, said that they are working on an integration to view live footage on those companies' smart displays.

The cameras will not work with Apple Home until cameras are supported in Matter, he said. There are no plans to support HomeKit Secure Video. Instead, you'll need to pay a subscription fee starting at $3.99 per month / $39.99 a year, per camera to view recorded footage.

They do look great, and that's a big plus for normal folks who want more than a junky doorbell camera but don't want their home to end up covered in big, ugly plastic domes. If you're already in on the Hue system you're used to spending money, too.

Read this article:
Security cameras with end-to-end encryption not cheap - Boing Boing

Read More..

X users to get audio and video calling, but no encryption initially – SiliconRepublic.com

In response to a question under his post about new calling features on X, Musk said most of the time, encryption isnt important.

Elon Musk has said that X, formerly Twitter, is set to add audio and video calling features as part of the companys broader effort to turn the platform into an everything app.

In a post yesterday (31 August), Musk said that the new audio and video calling features will work on both iOS and Android, as well as on the web version of the app on PCs and Macs.

Describing X as a global address book, Musk said that users will not need a phone number to call other people through the platform. That set of factors is unique, he added.

This comes just days after Musk introduced a new job posting feature on X for verified organisations. It will allow companies and organisations to feature critical roles and reach millions of relevant candidates, similar to LinkedIns job posting feature.

While there is no indication of when the audio and video calling features will roll out, or who it will be available to, Musk clarified in response to a question in the replies that the functionality will not come with encryption like WhatsApp or Signal initially.

We will add the ability to turn encryption on or off dynamically. There is necessarily a slight lag for encryption, he wrote. Most of the time, encryption isnt important, and quality of call is better.

Competitors in the audio and video calling space such as WhatsApp and Signal highlight end-to-end encryption as one of their most important features. Even Messenger, Metas messaging app connected to Facebook, is getting an encryption upgrade by the end of this year.

Meanwhile, X updated its privacy policy this week, seeking permission to start collecting users biometric information and employment history.

Based on your consent, we may collect and use your biometric information for safety, security and identification purposes, the privacy policy reads, adding that X may also collect employment and educational history, skills and abilities, and even job search activity.

The controversial platform has been facing renewed competition from Metas Threads, which revealed a web version of its applast week to boostdwindlinguser uptake.

10 things you need to know direct to your inbox every weekday. Sign up for theDaily Brief, Silicon Republics digest of essential sci-tech news.

See the rest here:
X users to get audio and video calling, but no encryption initially - SiliconRepublic.com

Read More..

Encryption Software Market Size, Key Segments, Share, Trends, Growth, and Forecast 2031 – Benzinga

"The Best Report Benzinga Has Ever Produced"

Massive returns are possible within this market! For a limited time, get access to the Benzinga Insider Report, usually $47/month, for just $0.99! Discover extremely undervalued stock picks before they skyrocket! Time is running out! Act fast and secure your future wealth at this unbelievable discount! Claim Your $0.99 Offer NOW!

Advertorial

Our comprehensive research on the Global Encryption Software Market (2023-2031) provides insights for businesses. It covers trends, investments, tech advancements, and major players. The report uses qualitative and statistical data from 2017-2031, including SWOT, BCG, PESTLE analysis, and visuals. It offers a full market landscape with stakeholder insights, regional outlooks, and financial considerations.

The global encryption software market size was US$ 9.7 billion in 2021. The global encryption software market size is forecast to reach US$ 47.51 billion by 2030, growing at a compound annual growth rate (CAGR) of 19.3% during the forecast period from 2022 to 2030.

Enter your email and you'll also get Benzinga's ultimate morning update AND a free $30 gift card and more!

Request To Download Sample of This Strategic Report @https://reportocean.com/industry-verticals/sample-request?report_id=BWCC931

The primary purpose of the encryption software is to protect the confidentiality of data stored in files, folders, and disks and data traveling over wireless networks or data in transit, depending on an organizations security and compliance requirements. It involves converting a message or plain text into a coded message called an encrypted message so that only authorized parties can read it. Software encryption uses software to encrypt and decrypt resting and transiting data. Thus, by making the data unreadable by unauthorized people, encryption software ensures the security of confidential data.

Factors Influencing Market Growth

Leading Competitors

The leading prominent companies profiled in the global encryption software market are:

Click Here to Download Sample Copy of this Report @https://reportocean.com/industry-verticals/sample-request?report_id=BWCC931

The report furnishes an intricate comprehension of each segment, delivering potential estimations for principal applications and insights into emerging prospects. Every regional market is meticulously scrutinized to ascertain its potential for growth, development, and demand in the forthcoming years.

As of the end of 2022, the Encryption Software industry experienced notable growth in its workforce. Starting in January, employment within the Encryption Software sector exceeded its pre-COVID levels, resulting in an expansion of payrolls by over 15,000 employees throughout the course of the year. The global Encryption Software output demonstrated a remarkable increase of 5.2% during 2021, primarily attributed to a widespread economic upswing and a surge in demand for commodities. However, the momentum shifted in 2022, with the global industrial sectors production contracting. This reversal followed a robust expansion in 2021, fueled by altered consumer spending patterns and substantial fiscal support.

Forecasts indicate that the global Encryption Software output is set to rise by approximately 2.9% in 2023. This projection is underpinned by the gradual recovery of production in Western Europe from its previous troughs, as well as a rebound in output across the Asia/Pacific region. Maintaining its dominant position, China, accounting for nearly 45% of the global Encryption Software market, remains both its largest producer and consumer. Remarkably, Chinas market share has surged since 2010, when it stood at around 26%. This ascent has led to a substantial contribution to the nations GDP. Notably excelling as a top exporter, China leads in various sectors, including silicon, PVC, and several specific segments of the Encryption Software market.

Scope of the Report

The global encryption software market segmentation focuses on Organization Size, Component, Deployment Model, Industry Vertical, Function, and Region.

Segmentation based on Organization Size

Segmentation based on Component

Segmentation based on Deployment Model

Segmentation based on Industry Vertical

Download Sample Report, SPECIAL OFFER (Avail an Up-to 30% discount on this report ) @https://reportocean.com/industry-verticals/sample-request?report_id=BWCC931

Segmentation based on Function

Segmentation based on Region

Get The Insights You Need By Customizing Your Report To Fit Your Unique Needs And Goals:-https://reportocean.com/industry-verticals/sample-request?report_id=BWCC931

Table of Contents:

Chapter 1: Introduction to the Global Encryption Software Industry

Chapter 3: Dynamics of the Market

Chapter 4: Profiles of Leading Companies

Hidden gems are waiting to be found in this market! Don't miss the Benzinga Insider Report, typically $47/month, now ONLY $0.99! Uncover incredibly undervalued stocks before they soar! Limited time offer! Secure your financial success with this unbeatable discount! Grab your 0.99 offer TODAY!

Advertorial

Chapter 5: Competition in the Global Encryption Software Market among Players

Chapter 6: Market Size across Global Regions

Chapter 7: Application Segments in the Global Market

Chapter 8: Segment Analysis of the Global Encryption Software Industry

Chapter 9: Market Chain, Sourcing Strategies, and Downstream Buyers

Chapter 10: Strategies and Key Policies by Distributors/Suppliers/Traders

Chapter 11: In-depth Analysis of Key Marketing Strategies by Market Vendors

Chapter 12: Evaluation of Market Impact Factors

Chapter 13: Forecasted Global Encryption Software Market Size (2023-2031)

Reasons to Acquire This Report

(A) This research imparts invaluable insights tailored for senior management, policymakers, industry professionals, product innovators, sales executives, and stakeholders within the market. It equips them with the information needed to make well-informed decisions and craft effective strategies.

(B) The report delivers a comprehensive analysis of global, regional, and country-level Encryption Software market revenues, extending projections until 2030. This dataset empowers companies to gauge their market presence, recognize avenues for growth, and explore emerging markets.

(C) Through meticulous segmentation of the Encryption Software market encompassing types, applications, technologies, and end-uses, this study empowers leaders to blueprint their products and allocate resources based on the projected growth trajectories of each segment.

(D) Investors stand to gain from the market analysis by gaining insights into market scope, positioning, key drivers, challenges, limitations, expansion prospects, and potential risks. Armed with this knowledge, they can make well-considered investment choices.

(E) The report conducts an intricate analysis of competitors, unraveling their pivotal strategies and market positioning. This intelligence equips businesses with a profound understanding of the competitive landscape, enabling them to chart their own strategies accordingly.

(F) The study facilitates the assessment of Encryption Software business projections delineated by region, key countries, and prominent companies, bestowing invaluable information for investment strategizing and decision-making.

Why is our study consequential?

Our study holds paramount importance for various reasons, a few of which include:

? Assisting businesses in gauging the viability of new or existing products or services.

? Facilitating business enterprises in the identification and cultivation of novel market segments.

? Providing a preemptive understanding of consumer demand prior to introducing new products, services, or features.

? Enhancing the overall efficacy of marketing, advertising, and promotional initiatives.

? Analyzing market trends to aid businesses in devising adaptive strategies.

? Guiding businesses in the optimal placement of their products.

Access Full Report Description, TOC, Table of Figure, Chart, etc.-https://reportocean.com/industry-verticals/sample-request?report_id=BWCC931

About Report Ocean:

Report Ocean is a renowned provider of market research reports, offering high-quality insights to clients in various industries. Their goal is to assist clients in achieving their top line and bottom line objectives, thereby enhancing their market share in today's competitive environment. As a trusted source for innovative market research reports, Report Ocean serves as a comprehensive solution for individuals, organizations, and industries seeking valuable market intelligence.

Contact Information:

Email:sales@reportocean.com

Address: 500 N Michigan Ave, Suite 600, Chicago, Illinois 60611, United States

Telephone: +1 888 212 3539 (US - Toll-Free)

For more information and to explore their offerings, visit their website at:https://www.reportocean.com/

COMTEX_439360919/2796/2023-09-01T07:23:37

Massive returns are possible within this market! For a limited time, get access to the Benzinga Insider Report, usually $47/month, for just $0.99! Discover extremely undervalued stock picks before they skyrocket! Time is running out! Act fast and secure your future wealth at this unbelievable discount! Claim Your $0.99 Offer NOW!

Advertorial

2023 Benzinga.com. Benzinga does not provide investment advice. All rights reserved.

The rest is here:
Encryption Software Market Size, Key Segments, Share, Trends, Growth, and Forecast 2031 - Benzinga

Read More..

Encryption: defending businesses against modern threats – TechCentral

Delegates at a recent Altron Systems Integration and TechCentral round table

An organisations data is its most valuable asset, with publications, including the Economist, stating that it now outstrips oil as the most precious resource. Moreover, unlike in the past, data is no longer the exclusive purview of the IT department it is incorporated into every business department.

Bad actors know this and are continuously honing their tools and techniques to find ways to evade the security nets and get their hands on this data. When this happens, the consequences can be catastrophic, both financially and in terms of loss of market and customer confidence.

This is why many entities are turning to data encryption to prevent the abuse and misuse of their data. But while this may sound simple, many are finding it challenging to manage encryption on all devices, across distributed workforces, cloud providers, local folders, and of course, networks.

With this in mind, Altron Systems Integration, in conjunction with TechCentral, recently hosted a round-table event, themed Encryption: Defending the business against modern threats.

During the session, it emerged that encryption, although a well-accepted technology used to secure and protect critical data, is not at the maturity level one would expect in many of the organisations represented around the room. Although encryption was incorporated into most strategies, the overall management of the keys, as well as the classification of the data, was revealed to be a common concern among these entities.

Representatives from Altron Systems Integration (ASI) kicked off the discussion by sharing their insight on what the company has been seeing in the data encryption space. They unpacked the basics of encryption and discussed what modern encryption tools are now capable of and why they remain a critical tool.

There were several data-focused attendees, who said they have noticed that encryption is often tacked on as an afterthought instead of being implemented from the start, which can complicate the launch of systems when compliance insists upon it.

In fact, the mix of compliance versus data or technology experts at the table fuelled an interesting debate on how often the two areas are quite far apart, and how it would be worthwhile for the tech experts to incorporate compliance in their planning, and for compliance teams to better understand technology in order to close the gap between the two. It also became clear that many companies are not being proactive about compliance, and that even some of the largest corporations have too few compliance officers, which stifles innovation. This is because regulation around compliance is evolving rapidly and creeping more and more into the day-to-day running of businesses, as well as the management of business data.

While many believe encryption is a complex process, ASI shared some input on how it could simplify it. The company described encryption as a silver bullet, but not in the usual way the metaphor is understood: as an all-encompassing weapon, but rather as a highly targeted weapon for a specific task. After all, encryption is one of the many weapons that organisations should have in their arsenal.

The conversation shifted to modern, targeted threats, and how these can linger, undetected, on a companys network for months, moving laterally, performing reconnaissance and exfiltrating data. Encryption is key to preventing this, and attendees said the more complex threats become, the more complex encryption strategies need to be.

The topic of AI and quantum computing came up and was raised as a concern. Would quantum computers eventually be able to crack todays encryption. However, this doesnt negate encryption as an effective part of the security strategy, as not only are encryption tools evolving too, but having layers of encryption should provide enough complexity to ensure its effectiveness.

All agreed that encryption is a valuable and important tool that needs to be applied with care to avoid overcomplicating business practices or impacting usability. South African businesses are accustomed to having a multi-layered security approach, and encryption is a critical part of any companys security posture.

About Altron Systems IntegrationA specialist provider leveraging world-class technology and leading practices to build, implement and support sustainable ICT based business solutions which are strategically aligned, fit for purpose, cost-effective and optimised for performance. We have highly skilled, experienced professionals directed at solving business-critical customer problems through a consultative approach. We also bring our collective knowledge to every deployment engagement. From legacy integration to digital transformation, our solutions catalogue includes the full spectrum of ICT services. Few other organisations can claim the depth and breadth of the capabilities and experience we provide. For more information, visitwww.altronsystemsintegration.co.za, or follow us onFacebook,LinkedInandTwitter.

Follow this link:
Encryption: defending businesses against modern threats - TechCentral

Read More..

Ransomware Groups are Accelerating Their Attacks with Dwell Time … – HIPAA Journal

Posted By Steve Alder on Aug 28, 2023

Ransomware groups have accelerated their attacks and are now spending less time inside victims networks before triggering file encryption, according to the 2023 Active Adversary Report from Sophos. The data for the report came from the first 6 months of 2023 and was gathered and analyzed by the Sophos X-Ops team.

The median dwell time for ransomware groups fell from 9 days to 5 days in the first half of 2023, which the researchers believe is close to the limit of what is possible for hackers. They do not expect the median dwell time to fall below 5 days due to the time it typically takes for the hackers to achieve their objectives. On average, it took 16 hours from initial access for attackers to gain access to Microsoft Active Directory and escalate privileges to allow broad access to internal systems. The majority of ransomware groups do not rely on encryption alone and also exfiltrate data so they can apply pressure to get victims to pay up. Oftentimes, backups of data exist so recovery is possible without paying the ransom, but if there is a threat of data exposure, ransoms are often paid. On average, it takes around 2 days for ransomware gangs to exfiltrate data.

The reduction in dwell time is understandable. The longer hackers remain in networks, the greater the probability that their presence will be detected, especially since intrusion detection systems are getting better at detecting intrusions and malicious activity. One of the ways ransomware groups have accelerated their attacks is by opting for intermittent encryption, where only parts of files are encrypted. The encryption process is far quicker, which means there is less time to detect and stop an attack in progress, but the encryption is still sufficient to prevent access to files.

Ransomware gangs often time their attacks to reduce the risk of detection. In 81% of attacks analyzed by the researchers, the encryption process was triggered outside normal business hours such as at the weekend or during holidays when staffing levels are lower. 43% of ransomware attacks were detected on a Friday or Saturday. While the dwell time for ransomware actors has reduced, there was a slight increase in the dwell time for non-ransomware incidents, which increased from an average of 11 days to 13 days in H1 2023.

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

In many cyberattacks, a vulnerability was exploited that allowed hackers to use a remote service for initial access, such as vulnerabilities in firewalls or VPN gateways. The exploitation of vulnerabilities in public-facing applications has been the leading root cause of attacks for some time followed by external remote services; however, in H1, 2023, these were reversed and compromised credentials were the root cause in 50% of attacks, with vulnerability exploitation the root cause of 23% of attacks.

Compromised credentials make attacks easy for hackers especially when there is no multi-factor authentication. Implementing and enforcing phishing-resistant MFA should be a priority for all organizations, but the researchers found that in 39% of cases investigated, MFA was not configured. Prompt patching should also be a goal as this reduces the window of opportunity for hackers. The researchers suggest following CISAs timeline for patching in its Binding Operational Directive 19-02 of 15 days for critical vulnerabilities and 30 days for high-severity vulnerabilities as it will force attackers into a narrower set of techniques by removing the low-hanging fruit.

Previous reports have highlighted the extent to which Remote Desktop Protocol (RDP) is abused. in H1, 2023, RDP was used in 95% of attacks, up from 88% in 2022. In 77% of attacks involving RDP, the tool was used for internal access and lateral movement, up from 65% in 2022. Only 1% of attacks involved RDP for external access. Due to the extent to which RDP is abused, securing RDP should be a priority for security teams. If attackers are forced to break MFA or import their own tools for lateral movement, it will cause attackers to expend more time and effort, which provides defenders with more time to detect intrusions and increases the probability of malicious activity being detected.

See the article here:
Ransomware Groups are Accelerating Their Attacks with Dwell Time ... - HIPAA Journal

Read More..

Data Encryption Tools Market 2023: Comprehensive Study by Top … – The Knox Student

Data Encryption Tools Market research is an intelligence report with meticulous efforts undertaken to study the right and valuable information. The data which has been looked upon is done considering both, the existing top players and the upcoming competitors. Business strategies of the key players and the new entering market industries are studied in detail. Well-explained SWOT analysis, revenue share, and contact information are shared in this report analysis.

Get the PDF Sample Copy (Including FULL TOC, Graphs, and Tables) of this report @:

https://www.researchcognizance.com/sample-request/232863

Some of the Top companies Influencing this Market include:

Dell, Eset, Gemalto, IBM, Mcafee, Microsoft, Pkware, Sophos, Broadcom, Thales, Trend Micro, Cryptomathic, Stormshield

This report provides a detailed and analytical look at the various companies that are working to achieve a high market share in the global Data Encryption Tools market. Data is provided for the top and fastest-growing segments. This report implements a balanced mix of primary and secondary research methodologies for analysis. Markets are categorized according to key criteria. To this end, the report includes a section dedicated to the company profile. This report will help you identify your needs, discover problem areas, discover better opportunities, and help all your organizations primary leadership processes. You can ensure the performance of your public relations efforts and monitor customer objections to stay one step ahead and limit losses.

The report provides insights on the following pointers:

Market Penetration:Comprehensive information on the product portfolios of the top players in the Data Encryption Tools market.

Product Development/Innovation: Detailed insights on upcoming technologies, R&D activities, and product launches in the market.

Competitive Assessment: In-depth assessment of the market strategies, geographic and business segments of the leading players in the market.

Market Development:Comprehensive information about emerging markets. This report analyzes the market for various segments across geographies.

Market Diversification:Exhaustive information about new products, untapped geographies, recent developments, and investments in the Data Encryption Tools market.

Get a Special Discount of up to 30% on this Report @:

https://www.researchcognizance.com/discount/232863

The cost analysis of the Global Data Encryption Tools Market has been performed while keeping in view manufacturing expenses, labor cost, and raw materials and their market concentration rate, suppliers, and price trend. Other factors such as Supply chain, downstream buyers, and sourcing strategy have been assessed to provide a complete and in-depth view of the market. Buyers of the report will also be exposed to a study on market positioning with factors such as target client, brand strategy, and price strategy taken into consideration.

GlobalData Encryption Toolsmarket segmentation:

Market Segmentation: By Type

Cloud-BasedOn-Premises

Market Segmentation: By Application

Disk EncryptionFile/folder EncryptionDatabase EncryptionCommunication EncryptionCloud Encryption

Key questions answered in this report:

Table of Contents

Global Data Encryption Tools Market Research Report 2023-2030

Chapter 1 Data Encryption Tools Market Overview

Chapter 2 Global Economic Impact on Industry

Chapter 3 Global Market Competition by Manufacturers

Chapter 4 Global Production, Revenue (Value) by Region

Chapter 5 Global Supply (Production), Consumption, Export, Import by Regions

Chapter 6 Global Production, Revenue (Value), Price Trend by Type

Chapter 7 Global Market Analysis by Application

Chapter 8 Manufacturing Cost Analysis

Chapter 9 Industrial Chain, Sourcing Strategy, and Downstream Buyers

Chapter 10 Marketing Strategy Analysis, Distributors/Traders

Chapter 11 Market Effect Factors Analysis

Chapter 12 Global Data Encryption Tools Market Forecast

Buy Exclusive Report @:

https://www.researchcognizance.com/checkout/232863

Get in Touch with Us:

Neil Thomas

116 West 23rd Street 4th Floor New York City, New York 10011

sales@researchcognizance.com

+1 7187154714

https://researchcognizance.com

Go here to see the original:
Data Encryption Tools Market 2023: Comprehensive Study by Top ... - The Knox Student

Read More..

Managed Encryption Service Market Growing Massively by … – The Knox Student

Managed Encryption Service Market report focused on the comprehensive analysis of current and prospects of the Managed Encryption Service industry. This report is a consolidation of primary and secondary research, which provides market size, share, dynamics, and forecast for various segments and sub-segments considering the macro and micro environmental factors. An in-depth analysis of past trends, future trends, demographics, technological advancements, and regulatory requirements for the Managed Encryption Service market has been done to calculate the growth rates for each segment and sub-segments.

Get the PDF Sample Copy (Including FULL TOC, Graphs, and Tables) of this report @:

https://www.researchcognizance.com/sample-request/227986

Some of the Top companies Influencing this Market include:

BitDefender, Bloombase, Check Point Software Technologies, CipherCloud, Cisco Systems, F-Secure Corporation, International Business Machines, Kaspersky Lab, McAfee, MFG Managed Encryption, Micro Focus International, Oracle Corporation, Proofpoint, Rackspace US, Redcentric, Thoma Bravo, ,

This study provides an evaluation of aspects that are expected to impact the growth of the market in an undesired or constructive method. The Managed Encryption Service market has been consistently examined with respect to the corresponding market segments. Each year within the mentioned forecast period is concisely considered in terms of produce and worth in the regional as well as global markets respectively. Technical expansions of the Managed Encryption Service market have been examined by focusing on different technical platforms, tools, and methodologies. The notable feature of this research report is, it incorporates client demands as well as future progress of this market across the global regions.

The report provides insights into competitive samples, advantages and loss of products, and macro-economic policies of the market. It recognizes opportunities in competitive market conditions and provides information for decision-making and policies that will increase business growth. Driver and restraint for the growth of the Managed Encryption Service market are also included in this study. Production is done on the basis of area and application.

GlobalManaged Encryption Servicemarket segmentation:

Market Segmentation: By Type

Cloud Synchronized EncryptionEmail Encryption

Market Segmentation: By Application

AerospaceBanksOthers

The report provides insights on the following pointers:

Market Penetration:Comprehensive information on the product portfolios of the top players in the Managed Encryption Service market.

Product Development/Innovation: Detailed insights on upcoming technologies, R&D activities, and product launches in the market.

Competitive Assessment: In-depth assessment of the market strategies, geographic and business segments of the leading players in the market.

Market Development:Comprehensive information about emerging markets. This report analyzes the market for various segments across geographies.

Market Diversification:Exhaustive information about new products, untapped geographies, recent developments, and investments in the Managed Encryption Service market.

Get a Special Discount of up to 30% on this Report @:

https://www.researchcognizance.com/discount/227986

An assessment of the market attractiveness with regard to the competition that new players and products are likely to present to older ones has been provided in the publication. The research report also mentions the innovations, new developments, marketing strategies, branding techniques, and products of the key participants present in the global Managed Encryption Service market. To present a clear vision of the market the competitive landscape has been thoroughly analysed utilizing the value chain analysis. The opportunities and threats present in the future for the key market players have also been emphasized in the publication.

Reasons for buying this report:

Table of Contents

Global Managed Encryption Service Market Research Report 2023-2030

Chapter 1 Managed Encryption Service Market Overview

Chapter 2 Global Economic Impact on Industry

Chapter 3 Global Market Competition by Manufacturers

Chapter 4 Global Production, Revenue (Value) by Region

Chapter 5 Global Supply (Production), Consumption, Export, Import by Regions

Chapter 6 Global Production, Revenue (Value), Price Trend by Type

Chapter 7 Global Market Analysis by Application

Chapter 8 Manufacturing Cost Analysis

Chapter 9 Industrial Chain, Sourcing Strategy, and Downstream Buyers

Chapter 10 Marketing Strategy Analysis, Distributors/Traders

Chapter 11 Market Effect Factors Analysis

Chapter 12 Global Managed Encryption Service Market Forecast

Buy Exclusive Report @:

https://www.researchcognizance.com/checkout/227986

Get in Touch with Us:

Neil Thomas

116 West 23rd Street 4th Floor New York City, New York 10011

sales@researchcognizance.com

+1 7187154714

https://researchcognizance.com

Read the original here:
Managed Encryption Service Market Growing Massively by ... - The Knox Student

Read More..

NordVPN review: A full-featured VPN service that’s getting better at … – Mashable

How we tested

We put the VPNs we review through a series of hands-on stress tests for a few weeks at a time. For this latest update, I had NordVPN running for two weeks while I browsed, participated in video calls, shopped, and streamed (both domestic and international content). I performed several DNS leak tests to determine whether the VPN was actually concealing my public IP address. I also ran Ookla Speedtests to get a feel for how it affected my connection. I performed all of my testing on a Mac but will try NordVPN on other platforms for future updates.

The main purpose of this testing is to give potential users a general sense of how a VPN works as part of an everyday workflow (not in a lab). That said, our overall scores also hinge heavily on guidance from cybersecurity experts about the things consumers should look for in VPNs. Much of what separates the good from the bad, they told us in interviews, can be gleaned before anything is installed.

When you surf the internet freely without a VPN, you're being tracked online constantly by multiple third parties, including your Internet Service Provider (ISP), search engines like Google, and possibly even your employer or school. Connecting to a VPN means taking your traffic away from them and putting it in the hands of one lone entity instead, conceding exclusive, unfettered access to all of your browsing data. It's a privilege that needs to be earned, and the true caliber of a VPN ultimately comes down to whether you can wholly trust it to keep you safe.

The big issue is that the VPN industry is notorious for hyperbolic marketing, especially when it comes to privacy practices. This can "give VPN users a false sense of security if they dont realize that the protections offered are not comprehensive," according to a Consumer Reports investigation into 16 providers. (Many popular VPNs shout about offering "military-grade" encryption, for example, which isn't a thing.) It's unwise to take a provider's claims at face value.

So how do you know for sure if a VPN is trustworthy? A single Google search can be enlightening; a good provider won't have a long rap sheet for mishandling users' personal data or succumbing to server breaches, and bad headlines should raise a red flag including those about a VPN's ownership or parent company. A swift, effective response to crises and a healthy dose of corporate accountability can offset these concerns in some cases, but we tend to place a high value on a pristine reputation.

Any provider worth its salt will also be willing to open itself up to scrutiny. Propping up a strong privacy policy that specifies how user data gets handled and protected is one thing. But subjecting that policy to independent audits and making them public provides a much higher level of assurance.

Reputable VPNs will also issue regular transparency reports disclosing any requests for data they've received from government or law enforcement agencies. (These requests won't yield anything if a provider's privacy policy holds up.) Some go the extra mile by offering in-house bug bounty programs to researchers who comb their software and servers for vulnerabilities.

After trustworthiness, we base our VPN reviews on a combination of the following factors (listed in no particular order):

A DNS (domain name service) leak test is basically a lookup of your active IP (internet protocol) address. That's the unique number identifying your general location and the name of your internet service provider that's assigned to your device when it's connected to the internet. By running several DNS tests with a VPN off and on, we can determine whether it's actually encrypting our IP address. Some VPN apps have built-in DNS leak tests; otherwise, you can perform them via DNSleaktest.com.

Most premium VPNs come with similar sets of privacy tools, so we don't encounter major provider-to-provider discrepancies in this regard. Still, it's worth noting some of the important ones we look out for:

A kill switch will immediately disconnect your device from the internet if your VPN drops. (This one's non-negotiable.)

Support for multi-hop connections that route your traffic through two or more of the VPN's servers adds an extra layer of protection.

Split tunneling, a tool that sends some of your traffic through the VPN and some outside it to conserve bandwidth, can be useful for streaming and gaming.

Oftentimes, providers will also bundle their VPN with additional security features like malware/adware blockers, data breach detectors, and cloud storage. These won't make the VPN itself any better or more successful, but they're good to have alongside your go-to antivirus software and password manager. (If you have to choose between a reputable VPN and one that comes with a bunch of add-ons, always go with the former.)

A VPN's protocol is the set of instructions that determines how data gets communicated between its servers and your device(s). Many VPN providers have developed proprietary protocols within the past few years, but OpenVPN remains the most popular and widely respected option: It's stable, secure, and open-source, meaning anyone can inspect its code for vulnerabilities. WireGuard is another good pick that's newer than OpenVPN and similar but supposedly faster.

A VPN protects your data by encrypting it, or scrambling it up into unreadable "ciphertext" that can only be decoded by authorized parties with access to a secret key or password. Virtually all premium VPNs use Advanced Encryption Standard (AES) 256-bit encryption, which is pretty much uncrackable to third parties.

The No. 1 purpose of VPNs is to make it difficult for anyone other than the provider to identify and track your online activity, but they're also widely used as location-spoofing tools to skirt geo-restrictions on streaming services. (Platforms like Netflix limit their libraries abroad because of region-specific distribution rights.) While we don't put a ton of weight on their ability to succeed in this secondary use case, it's great if they do and we still test them for it.

Picking a VPN with a large server network means there's a lower likelihood of you sharing one with a bunch of other users, which is especially valuable for streaming (since there's more bandwidth to go around).

Relatedly, a VPN with a geographically diverse network of servers in many different parts of the world will make it easier for you to spoof specific locations and find one close to you to optimize speeds. (More on that below.) Most premium VPNs maintain servers throughout the Americas, Europe, Asia, and Australia; few have a big presence in Africa.

Most VPNs can be used on five to 10 devices per account (depending on the provider), which should be plenty for individual users. A handful of them support unlimited simultaneous connections to better serve bigger households.

Every premium provider we've encountered offers VPN clients for Windows, Mac, Android, and iOS at minimum, though some restrict certain features to certain platforms. Some VPNs also work on Linux, Chrome, smart TVs, and even gaming consoles (via router or hotspot).

The speed of a VPN depends on a lot of different variables, but it will almost always be slower than your regular internet connection, so it's not a huge factor in our final ratings. That said, we try to get an idea of how well a VPN performs by using it for a lengthy period of time and running it through some quick Ookla Speedtests. If a VPN is noticeably sluggish to the point where it affects usability, we'll call it out.

A general rule of thumb for any given VPN is that your speeds will be fastest when you're connected to a server geographically close to your actual location.

Users should have access to some kind of help around the clock in case an issue arises with their VPN connection or account, whether it's by phone, email, or live chat. (Online help forums and tutorials are nice, but not enough on their own.) We also give preference to VPNs that offer some kind of money-back guarantee; in most cases, it's 30 days long.

Premium VPN providers typically charge anywhere from $2 to $12 per month for access to their clients, depending on the subscription length. It's easier to justify the higher end of that spectrum if it gets you a reliable and responsible VPN with some useful extra security features.

Some VPNs are more intuitive and beginner-friendly than others.

It's important to note that many popular VPN providers posit their jurisdiction, or the location of their headquarters, as something that can have serious privacy implications based on local surveillance laws (such as the Five, Nine, and 14 Eyes alliances). Without getting too in the weeds, the experts we spoke to said the average consumer shouldn't put a big stake in these claims, and that authorities will get access to user data one way or another if the need is great enough. What's more concerning, they added to bring things full circle is whether any data is being retained by a VPN provider in the first place.

If anything, users might be better off choosing a VPN headquartered in a country with strong consumer protections against deceptive marketing (like the U.S. and many countries in the European Union). These could come in handy if a provider's privacy policy was ever questioned.

Finally, we generally don't recommend using any free VPNs. Such providers often sneakily log and sell user data, and sometimes even bundle their clients with malware. (If they're not making money off subscriptions, they have to get paid somehow it's a classic "no free lunch" situation.) The best way to get a VPN "for free" without putting yourself at risk is by signing up for a paid plan through a reputable provider, then making use of its money-back guarantee.

Sources:

Note: Ookla is owned by Mashable's publisher, Ziff Davis.

View post:
NordVPN review: A full-featured VPN service that's getting better at ... - Mashable

Read More..

Global Private Encrypted Chat Software Market Analysis By Major Manufacturers and Competitive landscape 2023-2 – openPR

Global Private Encrypted Chat Software Market: Driven factors and Restrictions factorsThe research report encompasses a comprehensive analysis of the factors that affect the growth of the market. It includes an evaluation of trends, restraints, and drivers that influence the market positively or negatively. The report also outlines the potential impact of different segments and applications on the market in the future. The information presented is based on historical milestones and current trends, providing a detailed analysis of the production volume for each type from 2018 to 2029, as well as the production volume by region during the same period.

Global Leading Market Research Publisher QYResearch announces the release of the report "Global Private Encrypted Chat Software Market Report, History and Forecast 2018-2029, Breakdown Data by Manufacturers, Key Regions, Types and Application". Based on historical analysis (2018-2022) and forecast calculations (2023-2029), this report provides a detailed analysis of the production volume for each type from 2018 to 2029, as well as production by region during the same period. It aims to help readers gain a comprehensive understanding of the global Private Encrypted Chat Software market with multiple angles, which provides sufficient supports to readers' strategy and decision making. As the market is constantly changing, the report explores competition, supply and demand trends, as well as the key factors that contribute to its changing demands across many markets.

Get a free sample PDF of this report (Including Full TOC, List of Tables & Figures, Chart) : https://www.qyresearch.com/reports/1346392/private-encrypted-chat-softwareOverall, this report will provide you with the insights and information needed to make informed business decisions and stay ahead of the competition.

Global Private Encrypted Chat Software Market report also includes a pricing analysis for each type, manufacturer, region, and global price from 2018 to 2029. This information will help stakeholders make informed decisions and develop effective strategies for growth. The report's analysis of the restraints in the market is crucial for strategic planning as it helps stakeholders understand the challenges that could hinder growth. This information will enable stakeholders to devise effective strategies to overcome these challenges and capitalize on the opportunities presented by the growing market. Furthermore, the report incorporates the opinions of market experts to provide valuable insights into the market's dynamics. This information will help stakeholders gain a better understanding of the market and make informed decisions.

The Private Encrypted Chat Software market is segmented as below:By Company DatChat Signal Telegram WhatsApp Snap MeWe Viber LINE KakaoTalk Cyber Dust Threema Wickr CoverMe Silence Pryvate Surespot Wire Enssages

Segment by Type IOS Android Windows Linux Others

Segment by Application Image Encryption Text Message Encryption Voice Message Encryption Video Message Encryption File Encryption

Each chapter of the report provides detailed information for readers to understand the Private Encrypted Chat Software market further:Chapter 1: Private Encrypted Chat Software Market Product Definition, Product Types, Volume and Revenue analysis of Each Type in North America, Europe, Asia-Pacific, Latin America, Middle East and Africa from 2018 to 2023.Chapter 2: Manufacturer Competition Status, including Sales and Revenue comparison, Manufacturers' commercial date of Private Encrypted Chat Software, product type offered by each manufacturer, Mergers & Acquisitions activities, Expansion activities occurred in the Private Encrypted Chat Software industry.Chapter 3: Private Encrypted Chat Software Market Historical (2018-2022) and forecast (2023-2029) volume and revenue analysis of Private Encrypted Chat Software in North America, Europe, Asia-Pacific, Latin America, Middle East and Africa.Chapter 4: Private Encrypted Chat Software Product Application, Volume and Revenue analysis of Each Application in North America, Europe, Asia-Pacific, Latin America, Middle East and Africa from 2018 to 2023.Chapter 5 to 9: Private Encrypted Chat Software Country Level analysis of North America, Europe, Asia-Pacific, Latin America, Middle East and Africa, including volume and revenue analysis.Chapter 10: Manufacturers' Outline, covering company's basic information like headquarter, contact information, major business, Private Encrypted Chat Software introduction, etc. Private Encrypted Chat Software Sales, Revenue, Price and Gross Margin of each company as well as Recent Development are also contained in this part.Chapter 11: Industry Chain, like raw materials, manufacturing cost, are covered. In addition, market opportunities and challenges are emphasized as well in the chapter.Chapter 12: Market Channel, Distributors and Customers are listed.Chapter 13: QYResearch's Conclusions of Private Encrypted Chat Software market based on comprehensive survey.Chapter 14: Methodology and Data Sources.

Some of the Key Questions Answered in this Report:What is the Private Encrypted Chat Software market size at the regional and country-levelWhat are the key drivers, restraints, opportunities, and challenges of the Private Encrypted Chat Software market, and how they are expected to impact the marketWhat is the global (North America, Europe, Asia-Pacific, Latin America, Middle East and Africa) sales value, production value, consumption value, import and export of Private Encrypted Chat SoftwareWho are the global key manufacturers of the Private Encrypted Chat Software Industry? How is their operating situation (capacity, production, sales, price, cost, gross, and revenue)What are the Private Encrypted Chat Software market opportunities and threats faced by the vendors in the global Private Encrypted Chat Software IndustryWhich application/end-user or product type may seek incremental growth prospects? What is the market share of each type and applicationWhat focused approach and constraints are holding the Private Encrypted Chat Software marketWhat are the different sales, marketing, and distribution channels in the global industryWhat are the upstream raw materials and of Private Encrypted Chat Software along with the manufacturing process of Private Encrypted Chat SoftwareWhat are the key market trends impacting the growth of the Private Encrypted Chat Software marketEconomic impact on the Private Encrypted Chat Software industry and development trend of the Private Encrypted Chat Software industryWhat are the Private Encrypted Chat Software market opportunities, market risk, and market overview of the Private Encrypted Chat Software market

Our Service1.Express Delivery Report Service2.More than 16 years of vast experience3.Establish offices in 6 countries4.Operation for 24 * 7 & 365 days5.Owns large database6.In-depth and comprehensive analysis7.Professional and timely after-sales service

To contact us and get this report: https://www.qyresearch.com/contact-us

About UsQYResearch founded in California, USA in 2007, which is a leading global market research and consulting company. Our primary business include market research reports, custom reports, commissioned research, IPO consultancy, business plans, etc. With over 16 years of experience and a dedicated research team, we are well placed to provide useful information and data for your business, and we have established offices in 6 countries (include United States, Germany, Japan, Korea, China and India) and business partners in over 30 countries. We have provided industrial information services to more than 60,000 companies in over the world.

Contact Us:QY Research Inc.Add: 17890 Castleton Street Suite 369 City of Industry CA 91748 United StatesEN: https://www.qyresearch.com Tel: 001-626-842-1666(US) 0086-155 2126 6108(Intl)E-mail: global@qyresearch.comJP: https://www.qyresearch.co.jp

This release was published on openPR.

More:
Global Private Encrypted Chat Software Market Analysis By Major Manufacturers and Competitive landscape 2023-2 - openPR

Read More..

Conversations in Collaboration: Cognigy’s Phillip Heltewig on … – No Jitter

Welcome to No Jitter's ongoing series, Conversations in Collaboration, in which we speak with executives and thought leaders about the key trends across the full stack of enterprise communications technologies.

For this Conversation, NJ spoke with Phillip Heltewig, CEO and Co-Founder of Cognigy. Heltewig is a German-Australian entrepreneur with profound technology experience working for companies in Europe, APAC and North America. Since 2016, Heltewig has been co-founder and CEO of Cognigy, revolutionizing the enterprise customer and employee experience through Conversational AI.

(Editors Note: Cognigy is pronounced: KOG-NUH-JEE the first g is hard, the second g is soft.)

Interviews in the series so far also include:

(Editor's Note: Artificial intelligence has a lot of specific, descriptive terms. Download our handy guide to AI vocabulary here.)

No Jitter (NJ): Can we start with a brief synopsis of Cognigy, the orchestration layer your company has developed and how it fits into the enterprise market?

Phillip Heltewig:I founded Cognigy with my cofounders, Sascha and Benjamin; we've been in business since 2016. When we founded the company, we wanted to build an end user device a speaking teddy bear because we thought speech technology was coming to a level where it really had a solid level of understanding of what humans say. So, we [decided to] build a teddy bear that kids would want to talk, play and have fun with.

We then looked at the kind of AI system we should use. We were going to use IBM Watson which [at the time] was [advertised as] the most advanced system ever invented. When we tried it, it was a very sobering experience [it was] limited, we [had to] put in keywords, etc. And, you had to code everything on your own.

That's when we [decided] this is not what we were looking for. We needed a system that non-technical users or slightly technical users could use to build conversations that the bear would have with children. We needed a graphical toolset for experts in those domains to build those kinds of conversation flows. That didn't exist.

So, we built it [ourselves]. And then we showed it around to the business community. Everyone was excited, but not about the bear -- about the system itself. That system [became] Cognigy. So, we put the bear on the shelf and started some projects with the system itself.

We come from Germany, a very manufacturing-heavy country, so we started to voice enable home devices like a smart cooking device. That was huge. We also did projects in virtual reality because you needed to be able to talk with virtual reality characters because you cant type, of course.

All those projects were cool and fun, but only one type of project was really business relevant and that was a customer service automation [we worked on].

Let's say you're Nike -- you can survive if a virtual reality advisor doesn't work. But you cannot survive if the chatbot in your contact center doesn't work. So, we started to very narrowly focus on customer service and ever since, we've been doing that with a strong focus on the enterprise.

Almost all our customers are large enterprises such as Lufthansa, Frontier Airlines and Allianz Insurance. These are multi-billion-dollar companies with large customer service volumes, so [they] can get essentially immediate ROI by deploying technology like ours which can lower the pressure on the human-led contact centers.

One of the reasons for our success is that we are never going to develop a feature unless we can field test it with a customer. We have a group of about 12 customers that have deployed Cognigy in a very big fashion we bring them together and we present them with our idea or our feature and ask, What do you think? In that way, our platform contains very relevant features and not just ones that maybe people will never use.

NJ: I see this term conversational AI used all over the place. What does it mean relative to generative AI and what Cognigy does?

Heltewig: So, anything AI is a marketing term, but what people usually understand as being conversational AI is a mixture of the following components.

First you have connectors to the channels that customers use to converse with you a WhatsApp connector, a Web chat connector, a phone connector. They receive the input from the customer and kind of normalize it, if it's audio it turns it into text, etc.

The second component is the natural language understanding [NLU] that's the AI component of conversational AI. It understands two types of data. One is intents; the other is entities.

(Editors Note: Back in 2019, Omdia analyst Brent Kelly wrote an eight-part series that focused on building intelligent bots. Part of that discussion involved intents and entities.)

So, if I say something like I need to change my flight, ABC 123, then the intent might be flight change, and the booking code [the entity] might be ABC 123. That's what traditional NLU does.

You provide the system [with all that] up front when you build it. You provide it with a number of intents anything between, say, [10 to 50] and for each intent, you provide a number of example sentences for how a customer could [express intents] so, in this case: I want to change my flight, or My flight is late, and I need to change something.

If the customer says, I need to change the flight for me and my dad, then the AI algorithm that sits underneath still knows that its a flight change even though it wasn't provided as an example [intent].

This uses true machine learning technology already under the hood to identify the intent and to extract the entities. We take this information and pass it to, in our case, what we call a flow. It's like the graphical representation.

Now that I know the intent, what do I do? This piece in conversational AI is deterministic meaning that it's the same for you and for me. There might be templates where it says Matt or Phil, but the actual flow of the conversation is deterministic which is very important [for] enterprises. If you are in a regulated industry, for example, you want to know what comes out, or you want to have some kind of control. This is important to keep in mind for the generative discussion afterwards.

In these flows, the outputs [are provided back] and then there are other components like analytics, but these three are essentially the main components: [connectors, NLU/intents/entities, and the flow].

Generative AI essentially combines two of these components into one the understanding of the language and the generation of the language. In conversational AI, the understanding was the NLU, and the generation was the flow. But, hardcoded in generative AI, the understanding and the generation is one component.

This raises a lot of interesting questions because in a conversation flow, I can [specify]: say this afterwards, then make an API request against my booking database, check if the booking code exists, [and] if it doesn't exist, say something else. I can do all this easily in the flow. Telling the generative AI to do the same is currently an unsolved challenge which the industry is starting to solve.

NJ: So how is Cognigy approaching generative AI?

Heltewig: The way that we're thinking about generative AI is slightly different.

You can use generative AI in essentially three ways. One is augmenting the editor [used to create] traditional conversational AI. [Gen AI] is useful to create intents because you don't have to write 10 example sentences anymore. You just write one and then it generates 10 for you. It can [also] create flows relatively quickly [which] is nice.

Second, [you can] augment the agent experience in the contact center by using generative AI for agent-facing tasks. One of the biggest things our customers tell us is when an end customer has a conversation with a bot that goes on for five minutes and [that] conversation is handed over to an agent, that agent has to read through the whole transcript. Nobody has time for that. You can use generative AI to summarize the transcript [into] one paragraph.

You can also listen into the call or chat and provide suggested replies, but you always have the human in the middle.

The third one is the Holy Grail everyone's working on: having generative AI power direct-to-customer conversations. In that there are also three components.

So, lets say you go to work in the Cognigy contact center. On your first day your manager says, welcome, here is your computer, you need basic knowledge about Cognigy in order to answer anything read these five PDFs, read this website, etc. [This is the first component: knowledge.]

Then the manager says you can also help customers with these things reissuing an invoice, changing an address, etc. For those, [the agent gets] standard operating procedures: To change a customer address, log into Salesforce, find the record. Enter it, reconfirm with a customer and, if it's fine, click save. This is what we call a transaction, [its the second component].

[The last component is] orchestration. You as a human can do that already you know when to change the address in Salesforce depending on what I've said and when to reissue an invoice. You're not going to reissue an invoice if I ask you to change my address. It doesn't make sense. Or maybe after you change the address because youre a human you decide to reissue the invoice. That's the orchestration piece.

(Editors note: This is similar to what Google Clouds Behzadi said in his Conversation i.e., you dont have to teach a new agent common sense. Note, too, that during his keynote at Enterprise Connect 2023, Behzadi demonstrated an entirely generative AI-powered bot speaking directly to a customer an example of the Holy Grail quest Heltewig mentioned.)

NJ Interlude: Incorporating Generative AI into a Conversation Flow

At this point in the conversation, Heltewig launched a demonstration of a product Cognigy has in the works. In the first part of the demo, Heltewig showed how those three components knowledge, transactions, and orchestration all work together within a traditional conversational AI flow within the context of an example flight booking.

As the customer, Heltewig asked the demo product a question: "I want to book a flight." Based on that, the NLU demo figured out the intent flight booking and it then asked if the customer had an existing reservation. The response was no, so the bot then asked for the flight number. This basic exchange is familiar to anyone whos interacted with one of these bots.

Next, Heltewig demonstrated how the system might act if some of those components were replaced with generative AI. First, he asked the bot if he could bring his dog on the plane. It couldnt answer.

So, he switched demo models to one that had been grounded on the airlines policies. Grounded simply means that its been told to read various documents, much like that agents first day on the job.

Heltewig asked the same question: Can I bring my dog on the plane? To which the bot answered: Yes, you can bring your dog on the plane on long haul flights as emotional support animals are still permitted.

This is an exact answer to my question, Heltewig said, and then he asked the model, Can I bring my Chihuahua on the plane?

The bot responded with: Yes, you can bring your Chihuahua on the plane; emotional support animals areallowed. This, too, is a correct response and it shows how the generative AI model can figure out that a chihuahua is a dog without explicit programming.

Overall, Heltewig characterized these exchanges as how generative AI can be used to extract the answer from the knowledge base and then to formulate a perfect answer to the exact question that I asked.

No Jitter then asked Heltewig to pose an absurd question to the model: Can I bring my giraffe on the plane?

The response was I cant find the answer, which Heltewig characterized as correct because the model didnt provide a wrong answer, nor did it make one up which is typically called a hallucination (and it is perhaps a mistake to so anthropomorphize an algorithm as Eric Krapf wrote).

Heltewig continued, saying, the way this iteration of the model works is that its performing a search and then extracting the answer using a large language model prompt. Basically, its a chatbot that uses a knowledge base to answer questions. This takes the knowledge [component] and [makes it] so much better than what it is right now. In the past when you found an article, you would just output it. That would then require the agent/customer to read through the article for the correct answer.

But what Heltewig finds even more interesting is what he, and Cognigy, call transactions. To illustrate that he launched another Cognigy research preview which is how we believe bots will be built in the future.

NJ Interlude: Cognigy and the Grail Quest

Again, this is Heltewig narrating the bot interactions as he demoed the research preview. NJ has edited the exchange to make it easier to follow.

First, you create a persona, for the bot, Heltewig said. The demo involved Coventry Clinic, a fictitious health care provider from Dusseldorf, and it has a receptionist named Bot who is professional, patient and can engage in some trivia and small talk. But, Heltewig said the bot could also be told to only stick to the task at handthe transaction.

And thats the key part, specifying what transactions it can conduct. This one can look up an appointment to check if the customer is a patient. It can then make an appointment. To do that, it needs to collect information: first name, last name, mobile number, etc. Thats essentially all you do [to create the bot]. And then you can start talking to it, Heltewig said.

Bot: Hello, this is Bot from Coventry Clinic. How can I help you today?

Patient: I was wondering if I could make an appointment.

Bot: Yes, of course. Can I have your first and last name please?

Patient: My first name is Phil. Im not going to tell you my last name.

Bot: I need your last name to make an appointment. Can you provide it please?

Many old school systems would have said Thank you, Mr. 'I'm Not Going To Tell You,' Heltewig said. This [new system] is what we all envisioned conversational AI to be like kind of like the Star Trek computer where you have a completely freeform conversation.

He continued. As far as a research preview [goes], it still has some shortcomings. You can get it off track and you can tell it information which it then believes is true even though it's not. But [this demonstration hints at] how we are going to be building these kinds of conversational AI systems in the future. And I hope this shows the difference between the rather static and deterministic but still very useful systems they are processing 10s of millions of conversations a month. But these generative AI systems don't just use AI to understand. They use AI as the name implies, to understand and generate the outputs.

Back to the Conversation

NJ: So maybe [the generative AI system] knows trivia, but it also knows your private medical records. The trivia is in one database or maybe requires an Internet search while the other is in a secure database. How is that managed to keep things secure? And to keep it from getting out, so to speak?

Heltewig: Let me start answering that by first mentioning the LLM [large language model] providers who are absolutely leading the market. Those are OpenAI, Microsoft with Azure OpenAI, Anthropic, Google and a handful of others. There are also open-source models that you can deploy yourself, but they don't come close in performance. [If] we're talking on a scale of one to 100 and let's say GPT4 is a 95, then the open-source models are a 10. You wouldn't use those.

What weve done is use the commercially available models, which is what weve also done with translation providers, feature text providers, etc.

We also allow our customers to choose we integrate with Azure, with OpenAI, Google and Anthropic and there's a couple of others coming that well also be integrating with. That means your data leaves our ecosystem, goes somewhere else and comes back.

What leaves our ecosystem is the product not your patient record, but whatever you put into the prompt. I'll give you an example. When we make this request, we send what's called grounding knowledge. This is True Knowledge so for this clinic, lets say we have five doctors and 12 nurses. [Heltewig then entered this true fact into the demo research preview. Then, as the patient, he asked it a question.]

Patient: How many doctors do you have?

Bot: We have five doctors and 12 nurses.

Patient: Actually, I think you have 33 nurses.

Bot: I apologize for the confusion. According to our records, we have five doctors and 12 nurses.

It assumes that the number of doctors and nurses I told it is true. If I had a patient record, do I want the bot to be able to talk about that? If I did, then I would inject it into this prompt dynamically before it's sent.

But [in a real deployment], you wouldnt hard code it into the prompt. It would come from a database. The key is when we inject [information] into the prompt.

For example, the customer says their credit card number is 123. Before it goes to the LLM, you might want to redact the credit card number [if only] because the LLM can't talk to a back-end system anyways.

(Editors Note: LLMs can only talk to back-end systems if they are enabled to do so via an API call and/or integration.)

So, we can dynamically compose what goes to the LLM like the patient record or credit card number. If we choose, we can also process what comes out afterwards. That is the orchestration piece and that is why you need a conversational AI platform to make use of generative AI because otherwise you have no control of what goes in and what goes out. That's why generative AI in itself is fun to play with but it's not usable in an enterprise context.

NJ: One of the buzzwords or terms we keep hearing are guardrails in place, and respect business processes. Is that what we're talking about here?

Heltewig: With generative AI algorithms with what we saw here, we didn't really know what it was going to answer. There are no true guardrails as on a bridge so that you don't fall there are a lot of holes in the guardrails still. That's not on our side; that's on Microsoft and OpenAI SamAltman said: don't use these algorithms in production because they can hallucinate things. So, we're still at that stage.

Which is why, when I mentioned the three use cases for generative AI as in helping [conversational flow] editors, helping agents and helping the customer [directly], the first two are relatively risk-free because there is a human in the loop who can filter out the hallucination. That's why I believe a lot of companies are saying, yeah, we've put guardrails around this, [but I believe] that it's just not true.

NJ: What would your advice be to an enterprise IT staffer who's tasked with evaluating these systems and potentially putting them into production?

Heltewig: I'll mention something that I think is being completely disregarded by everyone right now. Cost. The cost of these models can be tremendous. One GPT4 query can depending on the amount of tokens and context size easily cost 10 cents or more. That is essentially what a whole conversation commonly costs now. If you do five GPT4 queries in a conversation and thats just for the generative AI thats 50 cents. That's crazy.

There's a big cost difference in these models. GPT 3.5 costs 20 times less than that. Actually, lets quickly verify that. GPT 4 input costs three cents for 1000 tokens, and then for outputs, it costs six cents for 1000 tokens. So, if you have 1000 tokens going in and out, that's 9 cents total.

With GPT 3.5, we have 0.015 and 0.02 cents. If I'm correct in calculating this, this is one 1/25th of the price here it's even one thirtieth of the price. So, the ChatGPT 3.5 model is dramatically cheaper than the GPT 4 model. And, of course, the capabilities differ.

[Think of it] like this: I have a double master's degree in business and computer science, and if you want to ask me, what is 10 plus 5, using my time to get an answer will cost you $50. Or you can ask my seven-year-old son and he only costs 10 cents or an ice cream.

The point being you do not require the super intelligent model for many of the tasks that generative AI can do. Summarization in GPT 3.5 is really good; you don't need GPT 4 [for that.] You really need to think about which model you want to use because the cost difference is so stark.

Want to know more?

Check out these articles and resources:

Excerpt from:

Conversations in Collaboration: Cognigy's Phillip Heltewig on ... - No Jitter

Read More..