Category Archives: Data Mining
Top Surveillance Technology That Makes up the US ‘Digital Border Wall’ – Business Insider
US Customs and Border Protection and Immigration and Customs Enforcement use phone hacking, license-plate scanning, iris recognition, and a host of other surveillance technology to monitor the US border, according to a report released on Thursday by immigrant-rights groups.
"The Deadly Digital Border Wall," compiled by Mijente, Just Futures Law, and the No Border Wall Coalition, doesn't identify every piece of software and hardware the agencies use. One example is Raven, short for Repository for Analytics in a Virtualized Environment, a data-mining and analytics tool ICE is developing. But it does provide an overview of some of the key technologies that ICE and CBP rely on.
Cinthya Rodriguez, a Mijente organizer, said the US border was a "testing ground" for more widespread expansions of government surveillance.
"We remain steadfast in our #NoTechForICE demand and call on the Biden administration to follow up on promises made to immigrant communities with meaningful action," she added.
Here are the top 14 border-surveillance technologies, according to the report:
This is a camera system that takes pictures of car license plates as they pass by and logs other relevant information like date, time, and place. Immigration agencies install these cameras at and near borders. CBP pays Motorola Solutions for it, while ICE pays Vigilant Solutions.
Along the US-Mexico border, CBP operates tall towers designed to spot people from almost 10 miles away. The agency has paid the Israeli military contractor Elbit Systems to install these structures.
These surveillance towers are slightly smaller and movable. General Dynamics won a $177 million contract for installing these in 2013. The project is scheduled to be completed in 2023.
This consists of a telescope, a laser light, a thermal-imaging device, and a video system that's attached to the back of a truck, which itself is equipped with geospatial analytics. Since 2015, Tactical Micro has been providing CBP with dozens of the systems, and PureTech Systems has been providing the in-vehicle geospatial analytics.
CBP uses these towers to scan the landscape for people. Anduril has been providing them since 2018. They come equipped with software designed to distinguish people from animals and store images of human faces.
CBP has used large and small drones to surveil remote areas of land, and even the sea, for evidence of migrants. General Atomics, AeroVironment, FLIR Systems, Lockheed Martin, and Anduril have all provided CBP with surveillance drones.
This software sends files of fingerprint scans, pictures of faces, and iris images captured by separate pieces of hardware to both "ICE's case management system for Enforcement and Removal Operations (ERO) and to the DHS-wide IDENT database," the report said. According to the Department Homeland Security, the automated biometric identification system stores "260 million unique identities and processes more than 350,000 biometric transactions per day."
According to the report, the Homeland Advanced Recognition Technology (HART) System is a database of biometric data such as face images, DNA profiles, iris scans, fingerprint scans, and audio files, called "voice prints," that's hosted on Amazon Web Services and being developed by Northrop Grumman. It will eventually "replace the automated biometric identification system (IDENT) currently used by DHS," the report said.
This is a face-matching tool that CBP uses at the US border and entry ports like airports. A camera takes a picture of a traveler and compares it with a passport or other form of ID. CBP says it stores comparison photos of US citizens in IDENT for 15 years.
This is a mobile app on which Border Patrol agents can collect biometric and other personal information on migrants and asylum seekers. Data that can be logged in to the app includes phone numbers, employment and family information, marital status, people traveling together, permanent address abroad, and destination in the US, as well as a photograph to be run through CBP biometric records, the report said.
Using services from the Israeli company Cellebrite, Canada's Magnet Forensics, and the US company Grayshift, CBP can search mobile phones and other devices for information about a person. Grayshift and Cellebrite can sometimes unlock phones. US border agents don't need warrants to search people's devices, according to a 2019 court ruling, and border agents searched more than 40,000 devices in 2019, Reuters reported.
These are pieces of software designed to extract personal information stored in cars, including call logs and navigation histories. CBP has paid Berla Corp., which partnered with the Swedish mobile-forensics company MSAB, for this service.
Venntel, a subsidiary of the data broker Gravy Analytics, sells licenses to CBP and other DHS entities that allow them to use consumer cellphone data to track migrants and asylum seekers. A DHS document leaked to BuzzFeed News said it was possible to "combine" the consumer location data "with other information and analysis to identify an individual user."
ICAD is a system of underground sensors and cameras that "detects the presence or movement of individuals" and sends data back to CBP. Border Patrol agents then seek out the people captured on ICAD, ask these people for their biographic data, and store this information, according to the report.
Read the rest here:
Top Surveillance Technology That Makes up the US 'Digital Border Wall' - Business Insider
CORRECTING and REPLACING OLB Group Announces Total of 600 Antminer S19j Pro Cryptocurrency Asic Miners in Operation – Yahoo Finance
Company Expects to Increase to 1,000 Antminer S19j Pro cryptocurrency mining computers by end of year
Company projects up to $1 million in additional revenue per month with 1,000 computers added alongside their existing omnicommerce offerings
NEW YORK, October 26, 2021--(BUSINESS WIRE)--Please replace the release with the following corrected version due to multiple revisions.
The updated release reads:
OLB GROUP ANNOUNCES TOTAL OF 600 ANTMINER S19J PRO CRYPTOCURRENCY ASIC MINERS IN OPERATION
Company Expects to Increase to 1,000 Antminer S19j Pro cryptocurrency mining computers by end of year
Company projects up to $1 million in additional revenue per month with 1,000 computers added alongside their existing omnicommerce offerings
The OLB Group, Inc. (NASDAQ: OLB), a diversified eCommerce merchant services provider and Bitcoin mining enterprise, announced today that DMint, Inc., a wholly-owned subsidiary of OLB ("DMint"), has expanded its Bitcoin mining operation with the addition of five hundred (500) Antminer S19j Pro cryptocurrency mining computers. DMint anticipates having a total of 1000 computers in operation at its newly completed Bradford, PA location by the end of 2021 and projects to reach 24,000 Bitcoin mining computers - in various locations - in the next 24 months.
As the U.S. overtakes China as the top destination for Bitcoin mining, OLB Group is at the forefront of institutional cryptocurrency adoption as one of the first eCommerce merchants to host Bitcoin mining data centers. By applying innovative processes to their unique merchant services expertise, OLBs entrance into the mining industry signals the next wave of mining operations in North America.
"The addition of 500 state-of-the-art Antminer S19j Pro computers is a major step towards scaling our Bitcoin Mining operation," said Ronny Yakov, Chairman and CEO of the OLB Group. "The positive price movement since the start of our mining operations makes us even more optimistic about the long-term viability of our operations. We remain fully committed to scaling our operations to 24,000 computers by the end of 2023."
Story continues
Yakov continued, "Because we are a diversified company with a robust core eCommerce business, we have a stable revenue base as our foundation as we ramp up our Bitcoin mining operations."
Once at full capacity - assuming current market price and mining network size - DMint expects to mine 15.5 Bitcoins per month, generating $1 million in increased monthly revenue.
OLB provides merchants with omnicommerce services including leading-edge crypto commerce capabilities, eCommerce, back office and kitchen operations, and payment acceptance online, in store, and on mobile devices. Merchants utilizing OLBs OmniSoft Business Management platform can transact with customers through digital wallets, cryptocurrency wallets, and traditional card-based payment. OLB expects to leverage DMint mining operations to power expanded crypto commerce services including financing, lending, and fundraising for small and medium sized businesses.
Merchants interested in implementing crypto commerce or omnicommerce services can set up an OmniSoft account at https://cardaccept.com/#contact. For more information about The OLB Group, please visit http://www.olb.com or http://www.olb.com/investors-data.
Future OLB Press Releases and UpdatesInterested investors or shareholders can be notified of future Press Releases and Industry Updates by emailing investorrelations@OLB.com.
About DMintDMint is a wholly owned subsidiary of the OLB Group engaged in Bitcoin mining. As a vertically integrated mining company, DMint utilizes proprietary energy reserves to power the latest Antminer S19j Pro mining computers, enabling them to mine Bitcoin and other cryptocurrencies at a lower cost that their competitors. DMint plans to increase mining capacity to 24,000 mining computers over the next 24 months to build out capacity to achieve 2.4 exahash per second.
About The OLB Group, Inc.The OLB Group, Inc. (NASDAQ: OLB) is a diversified Fintech eCommerce merchant services provider and Bitcoin crypto mining enterprise. The Company's eCommerce platform delivers cloud-based merchant services for web-based and bricks-and mortar companies for a seamless, comprehensive digital commerce solution that includes site creation, web hosting, customer service, outbound marketing, sales reporting, transaction processing, order fulfillment and payment facilitator offering crypto payment options. OLBit.com, a wholly owned subsidiary of OLB Group, has applied for a license to begin trading and accepting crypto currency for merchants. For more information about solutions, services, or to find a reseller, please visit http://www.olb.com. Investor information is available at http://www.olb.com/investors-data.
Safe Harbor StatementAll statements from The OLB Group, Inc. in this news release that are not based on historical fact are "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995 and the provisions of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended. These forward-looking statements include, but are not limited to, statements concerning the impact of COVID-19 on our operations and financial condition, our ability to implement our proprietary merchant boarding and CRM system and to roll out our Omni Commerce and SecurePay applications, including payment methods, to our current merchants and the integration of our secure payment gateway with our crowdfunding platform, our ability to successfully launch a cryptocurrency mining operation and our ability to earn revenue from the new operations. While the Companys management has based any forward-looking statements contained herein on its current expectations, the information on which such expectations were based may change. These forward-looking statements rely on a number of assumptions concerning future events and are subject to a number of risks, uncertainties, and other factors, many of which are outside of our control, that could cause actual results to materially differ from such statements. Such risks, uncertainties, and other factors include statements regarding the expected revenue and income for operations to be generated by The OLB Group, Inc. For other factors that may cause our actual results to differ from those that are expected, see the information under the caption "Risk Factors" in the Companys most recent Form 10-K and 10-Q filings, and amendments thereto, as well as other public filings with the SEC since such date. The Company operates in a rapidly changing and competitive environment, and new risks may arise. Accordingly, investors should not place any reliance on forward-looking statements as a prediction of actual results. The Company disclaims any intention to, and undertakes no obligation to, update or revise any forward-looking statement.
View source version on businesswire.com: https://www.businesswire.com/news/home/20211026005348/en/
Contacts
The OLB Group - Investor RelationsRick LutzInvestorRelations@olb.com (212) 278-0900 EXT: 333
See original here:
INTRUSION to Announce Third Quarter 2021 Financial Results on Thursday, November 11, 2021 – Yahoo Finance
PLANO, Texas, Oct. 28, 2021 (GLOBE NEWSWIRE) -- INTRUSION Inc. (NASDAQ: INTZ), a provider of cyberattack prevention solutions including those stemming from Zero-Days and malware free exploits, will release its third quarter 2021 financial results on Thursday, November 11, 2021 after market close. Joe Head, CTO, Franklin Byrd, CFO, and Gary Davis, CMO, will host a conference call at 4:00 p.m. Central Time to discuss the Companys financial results.
The conference call will be broadcast live in listen-only mode on the investor relations website at ir.intrusion.com.
Analysts and investors who would like to join the live call via teleconference are invited to dial in using the following information:
Date: Thursday, November 11, 2021Time: 4:00 p.m. Central TimeConference Call Number: 1-888-330-2041International Call Number: +1-646-960-0151Access Code: 6774917
A telephone replay of the conference call will be available approximately two hours after the conference call through November 18, 2021. The replay can be accessed by dialing 1-800-770-2030 and using the passcode 6774917. International callers should dial +1-647-362-9199 and enter the same passcode at the prompt.
About INTRUSION Inc.
INTRUSION, Inc. (NASDAQ: INTZ) protects any-sized company by leveraging advanced threat intelligence with real-time artificial intelligence to kill cyberattacks as they occur including zero-days. INTRUSIONs solution families include INTRUSION Shield, an advanced cyber-defense solution that kills cyberattacks in real-time using artificial intelligence (AI) and advanced threat intelligence; INTRUSION TraceCop for identity discovery and disclosure; and INTRUSION Savant for network data mining and advanced persistent threat detection. For more information, please visit http://www.intrusion.com.
Cautionary Statement Regarding Forward-Looking InformationThis release may contain certain forward-looking statements, including, without limitations, statements about the performance of protections provided by our INTRUSION Shield product, as well as any other statements which reflect managements expectations regarding future events and operating performance. These forward-looking statements speak only as of the date hereof and involve a number of risks and uncertainties, including, without limitation, the risks that our products and solutions do not perform as anticipated or do not meet with widespread market acceptance. These statements are made under the safe harbor provisions of the Private Securities Litigation Reform Act of 1995 and involve risks and uncertainties which could cause actual results to differ materially from those in the forward-looking statements, including, risks that we have detailed in the Companys most recent reports on Form 10-K and Form 10-Q, particularly under the heading Risk Factors.
Story continues
IR ContactJoel Achramowicz sheltonir@sheltongroup.comP: 415-845-9964
See the rest here:
How to Use App Privacy Report in the iOS 15.2 Beta – Mac Rumors
Apple in the iOS 15.2 beta introduced App Privacy Report, a feature that was first shown off at WWDC. App Privacy Report is designed to provide users with information on how often apps are accessing sensitive info provided to them through privacy permissions, such as location, contacts, camera, microphone, and photos.
How to Turn on App Privacy Report
App Privacy Report can be enabled in the Settings app by following these instructions.
Using App Privacy Report
Apple shows data from the last seven days, and the app is split up into several sections to make it easier to get to what you want to know.
In this section, Apple provides a list of apps that have accessed sensors and data granted to them through privacy permissions, so your most sensitive information.
App Network Activity
With App Network Activity, you can view a list of all of the different domains that your apps have contacted across the last seven days.
You can tap on any app in the list to see a rundown of all of the domains that have been contacted. If you have Instagram installed, for example, you'll see URLs for things like DoubleClock, Google Analytics, Google Tag Manager, and more, along with internal Instagram and Facebook URLs.
At the bottom of each app's data, you can also get a list of the web sites that you visited within the app.
Website Network Activity
Website Network Activity is basically identical to App Network Activity, but it shows you all of the domains contacted by the websites that you visited in Safari and other apps.
Most Contacted Domains
Most Contacted Domains is an aggregated list of the domains that apps have contacted most often, and it is usually populated by various trackers and analytics domains.
How to Turn Off App Privacy Report
If you don't want to use App Privacy Report, you can follow these steps:
Guide Feedback
Have questions about App Privacy Report, know of a feature we left out, or want to offer feedback on this guide? Send us an email here.
Article Link: How to Use App Privacy Report in the iOS 15.2 Beta
The rest is here:
How to Use App Privacy Report in the iOS 15.2 Beta - Mac Rumors
What are task and process mining in AI? – Ericsson
Machines, rather than people, will make data-intensive decisions and repetitive, manual tasks will be automated. However, the goal is not to replace human managers and the workforce. The aim is to improve their efficiency and productivity. Even when systems are operating at a high maturity, humans will still be necessary for decisions that arent made frequently, or those that require a high degree of human engagement. For other, more menial tasks, we can free up time for humans to focus on more value-based, creative or strategic thinking activities. IT processes, operational planning, marketing, sales, and accounting are all examples of areas that can be fully automated and AI:fied.
To identify the areas that automation and AI can make the largest contribution to human work in an organization, we start with what we call a discovery phase. During this phase, the technical and business requirements of a specific use case are identified. Examples of use cases include those that need encryption capabilities, for instance:
The traditional ways of working in a discovery phase is very manual and consists to a large extent of detailed interviews or workshops with subject matter experts (SMEs). One of the most significant challenges with manual process mapping is effectively extracting information from employees involved in a process. Knowledge gaps, employee validation, and human subjectivity will unavoidably arise when piecing together perceived reality to form a process map. Doing this manual work is also time consuming and takes away the SMEs time from more productive work. By automating the discovery phase, we reduce costs, remove any bias (which is more likely to be introduced through SMEs being interviewed by humans), and obtain a complete picture of processes that are otherwise hard to discover.
The discovery of use cases is done automatically with the help of technologies such as task mining, process mining and semantic search. These technologies leverage a data-driven and automated approach to a discovery, allowing the users to remain objective in their decision-making and drive improvements based on facts. These solutions take advantage of AI and machine learning (also Auto-ML) capabilities to understand more than a human ever could. Figure 1 shows the flow of events in a discovery process.
Figure 1: Automated discovery flow.
Task mining works by monitoring the actions users take. A recorder is installed on an employees computer to capture their interactions in the different applications they use, and it records data like keystrokes, clicks, data entry, copying and pasting, and other routinely performed actions to uncover how tasks are completed. Task mining focuses on tasks. Tasks are smaller components of a process or subprocess containing several steps, usually performed manually by employees at their workstations. Task mining enables organizations to discover, understand, analyze, optimize, improve, and even automate the tasks employees perform as they relate to completing larger processes. The main objective with task mining is to find ways to improve how tasks are carried out, or automate them to increase operational efficiency, reduce errors, and improve employee engagement.
Another technology that enables automated discovery is process mining. Unlike task mining, process mining focuses on processes. Process mining turns event logs from various IT systems into an instant visual model of a given flow. It depicts the as-is process based on facts with all its cases, variants, and paths. Process mining revolves around discovering, modeling, analyzing, monitoring, and optimizing end-to-end processes and their subprocesses. It allows us to identify any deviations and understand the reason for variation so we can make the necessary improvement or alignment. It can also be used to create key performance indicators (KPIs), identify root causes of variations and support the identification of process improvements.
Finally, a third technology that enables automated discovery is semantic search. In this case, a search engine is able to guess the semantic meaning of the input text using natural language processing (NLP) and other AI algorithms.
To evaluate the benefits of activity mining, we engaged on a proof of concept with an internal Ericsson team. The Ericsson Supply ECP Order and Delivery Management team used task mining to find 18 percent effort savings through automating processes and optimizing application usage. The team wanted to discover process automation and optimization opportunities and document selected processes to transform the as-is to to-be for automation. They also needed a way to understand usage patterns of the application portfolio.
The proof of concept was limited to a team consisting of 20 selected employees who worked across 10 markets. The business processes for this team are complex and are performed using a variety of applications, the majority of which do not produce application logs (for example, in Outlook, Excel, Adobe). Their requirements towards automation were:
In this manner, a task mining tool for process discovery across eight processes was deployed and the results were used to understand how the team was performing each process with minimal input required from the end users. In addition, the tool was used to generate process documentation. In a collaborative environment, SMEs and process experts can now transform the process from their discovered as-is state to the to-be state for faster and more accurate automation development.
After analyzing the interactions of the 20 users, the following insights were found: The tool identified significant savings opportunities of 8 percent through transformation, from eight business processes in scope. An additional 10 percent saving opportunity was identified associated with task effort, representing added potential automation opportunity to save efforts in tasks performed in Excel and SAP.
Processes and interactions are basics in the execution and scaling of digital transformation, new AI capabilities and new forms of automation. Activity mining enables our organization to have a complete picture of the as-is process and help identify the areas where automation and AI can make the largest contribution.
To understand the as-is process is critical to knowing whether its worth investing in improvements, where performance problems exist, and how much variation there is in the process across the organization. Activity mining allows for automation beyond a single technology, and is opening the door to the next automation and AI operating systems with hyperautomation at the core.
Read more about AI in networks
Read out blog post Democratizing AI with automated machine learning technology.
Heres how blockchain technology will pave the way to connected industries.
Excerpt from:
A glimpse into the terrifying world of social media manipulation – The Business Standard
A long shot zooms in on the face of Brittany Kaiser,a former Cambridge Analytica executive, as she writes Cambridge Analytica on a fence and ties a string - that has a whistle on its end - above it. The scene fades to black.
This is the opening scene of the Netflix documentary 'The Great Hack', which is based on the infamous Facebook-Cambridge Analytica data scandal.
As another Facebook-related controversy is circulating the news again for all the wrong reasons, this is a great documentary that reminds us to be cautious about using social media platforms.
Directed by Karim Amer and Jehane Noujaim, the documentary explores how fake news can change the outcomes of important events such as elections and political campaigns, which have a great impact on politics and businesses globally.
The film features professor David Carroll,Brittany Kaiserand British investigative journalistCarole Cadwalladr. All of them work on data literacy and advocate for data rights.
The trio tries to explain and expose the works of Cambridge Analytica under the political environment of various countries, including the UK'sBrexitcampaign and the2016 US elections.
Through archival footage, court testimonies, analyses, interviews and animations, the documentary reminds us how personal data has become an outlet to make profits and run propaganda on social media platforms.
The investigative documentary also explains topics such as data mining. It shows how voters become a target audience and how personal data became a target for advertising campaigns.
The film also focuses on the rise and fall ofCambridge Analytica. The company claimed to have 5,000 data points on every American voter during the 2016 American elections, mostly taken from Facebook.
This data was utilized by the Ted Cruz campaign and then, after Trump won the Republican nomination, it was funnelled into the Trump campaign. The company used the same tactics during Brexit.
Mark Zuckerberg, the chairman and CEO of Facebook, is not new to controversies and being accused of selling the data of millions of Facebook users for his own profit. He had sold data to Cambridge Analytica, which was a huge privacy invasion.
'The Great Hack' received Emmy nominations for the category of 'Outstanding Documentary or Nonfiction' and received several awards for its graphical work and animation.
The two hour and 19-minutes-long documentary is worth watching to get an idea about how data mining works, how to stay away from fake news and most importantly, how to be responsible while sharing personal data on social media.
View original post here:
A glimpse into the terrifying world of social media manipulation - The Business Standard
NSF Awards Grant to Study Use of AI to Improve Sustainable Energy Infrastructure Network – University of Arkansas Newswire
Photo Submitted
University of Arkansas team, left to right, top: Haitao Liao, Ed Pohl, Xiao Liu; bottom, Xintao Wu, Roy McCann and Yue Zhao.
The National Science Foundation has awarded researchers from industrial engineering, electrical engineering and computer science at the U of A $1.45 million to investigate of the potential of artificial intelligence as a driving force for changes to critical infrastructures and industries.
Their ultimate goal is to establish a collaborative research and workforce development/education program. This four-year multi-institution, multidisciplinary project, worth $6 million in total, will be led by North Dakota State University and the U of A, with other collaborators from University of Nevada-Las Vegas and Nueta Hidatsa Sahnish College in New Town, North Dakota.
"We know firsthand that vulnerabilities in our energy grid can have serious consequences for our economy and society, so I'm proud of this multidisciplinary team investigating how artificial intelligence can help improve our energy infrastructure," said Kim Needy, dean of the College of Engineering. "We're grateful to the National Science Foundation for supporting work that will help ensure our energy infrastructure is protected against various catastrophic failures."
Led by professor Haitao Liao, the Arkansas team includes Ed Pohl, professor, and Xiao Liu, assistant professor of industrial engineering; Xintao Wu, professor of computer science and computer engineering; Roy McCann, professor, and Yue Zhao, associate professor of electrical engineering.
"It has been a great experience working on this multidisciplinary team," Wu said. "We will develop new AI models such as multi-layered network embedding and neural survival analysis and integrate them in the data-driven decision-making framework for responding to disruptions in the energy systems." Wu leads the Social Awareness and Intelligent Learning (SAIL) Lab, which conducts research in areas of data privacy and security, data mining, machine learning and artificial intelligence.
McCann said the national energy infrastructure is rapidly expanding to provide a wider range of electricity sources such as from wind and solar. "As was seen from the cold weather-related blackouts and disruptions in Texas during February, it is imperative to build resilience into energy delivery systems. Because of the increasing complexity of energy networks and supply chains, developing AI into the equipment that controls energy production and delivery is a solution for meeting future reliability demands."
Zhao continued this point by saying the U of A is home to the NSF Center on GRid-connected Advanced Power Electronic Systems, also called GRAPES. "Over the past decade, extensive research and development work has been done in GRAPES to accelerate the adoption and insertion of power electronics into the electric grid in order to improve system stability, flexibility, robustness and economy. In this project, as GRAPES faculty members, professor McCann and I will contribute to the modeling and simulation for the power grid."
Read more here:
Australia plans to boost mineral discovery with new drill core research lab – MINING.COM – MINING.com
Exploration and mining companies commit large investment in drill core operations to be able to peer beneath the surface to understand ore bodies and uncover new underground resources, Rob Hough, acting director of CSIRO mineral resources, said in a media statement. This unique facility is able to maximise data from drill core samples, enabling characterisation across scales; from big picture analyses on kilometres of drill core through to the elemental composition of rock on a microscale.
Scientists and companies accessing the lab will be able to uncover geochemical and hyperspectral data to show elemental and mineralogical abundance against stratigraphic depth
In detail, scientists and companies accessing the laboratory will be able to uncover geochemical and hyperspectral data to show elemental and mineralogical abundance against stratigraphic depth, as well as spectral data to understand mineralization and alteration relationships; data to determine stratigraphic units and boundaries, for example, facies, sedimentary succession and alteration mineralogy; data to assist with seismic stratigraphy; and sediment chemistry and accumulation rates.
They will also be able to perform rapid high-resolution core photography and core quality assessment.
In Houghs view, extracting more data from drill core analyses will help unlock Australian critical minerals by providing information that drives key decisions for the discovery, mining, and processing of such resources.
The lab is also envisioned as a testbed platform where students, researchers and industry partners can connect and develop new workflows to enhance success and productivity in mineral exploration and mining.
Faster analysis of drill cores by a range of cutting-edge techniques in this facility will speed up the development and testing of new ideas about how mineral systems develop, and help our leading researchers identify new clues to recognising undiscovered ore bodies, Nicole Roocke, CEO of the Minerals Research Institute of Western Australia, said in the press brief.
Read this article:
Here are the 14 most important pieces of surveillance technology that make up the US digital border wall, according to immigrant-rights groups – News…
The US-Mexico border wall near Sasabe, Arizona.
Ross D. Franklin/Associated Press
US Customs and Border Protection and Immigration and Customs Enforcement use phone hacking, license-plate scanning, iris recognition, and a host of other surveillance technology to monitor the US border, according to a report released on Thursday by immigrant-rights groups.
The Deadly Digital Border Wall, compiled by Mijente, Just Futures Law, and the No Border Wall Coalition, doesnt identify every piece of software and hardware the agencies use. One example is Raven, short for Repository for Analytics in a Virtualized Environment, a data-mining and analytics tool ICE is developing. But it does provide an overview of some of the key technologies that ICE and CBP rely on.
Cinthya Rodriguez, a Mijente organizer, said the US border was a testing ground for more widespread expansions of government surveillance.
We remain steadfast in our #NoTechForICE demand and call on the Biden administration to follow up on promises made to immigrant communities with meaningful action, she added.
Here are the top 14 border-surveillance technologies, according to the report:
This is a camera system that takes pictures of car license plates as they pass by and logs other relevant information like date, time, and place. Immigration agencies install these cameras at and near borders. CBP pays Motorola Solutions for it, while ICE pays Vigilant Solutions.
Along the US-Mexico border, CBP operates tall towers designed to spot people from almost 10 miles away. The agency has paid the Israeli military contractor Elbit Systems to install these structures.
These surveillance towers are slightly smaller and movable. General Dynamics won a $177 million contract for installing these in 2013. The project is scheduled to be completed in 2023.
This consists of a telescope, a laser light, a thermal-imaging device, and a video system thats attached to the back of a truck, which itself is equipped with geospatial analytics. Since 2015, Tactical Micro has been providing CBP with dozens of the systems, and PureTech Systems has been providing the in-vehicle geospatial analytics.
CBP uses these towers to scan the landscape for people. Anduril has been providing them since 2018. They come equipped with software designed to distinguish people from animals and store images of human faces.
CBP has used large and small drones to surveil remote areas of land, and even the sea, for evidence of migrants. General Atomics, AeroVironment, FLIR Systems, Lockheed Martin, and Anduril have all provided CBP with surveillance drones.
This software sends files of fingerprint scans, pictures of faces, and iris images captured by separate pieces of hardware to both ICEs case management system for Enforcement and Removal Operations (ERO) and to the DHS-wide IDENT database, the report said. According to the Department Homeland Security, the automated biometric identification system stores 260 million unique identities and processes more than 350,000 biometric transactions per day.
According to the report, the Homeland Advanced Recognition Technology (HART) System is a database of biometric data such as face images, DNA profiles, iris scans, fingerprint scans, and audio files, called voice prints, thats hosted on Amazon Web Services and being developed by Northrop Grumman. It will eventually replace the automated biometric identification system (IDENT) currently used by DHS, the report said.
This is a face-matching tool that CBP uses at the US border and entry ports like airports. A camera takes a picture of a traveler and compares it with a passport or other form of ID. CBP says it stores comparison photos of US citizens in IDENT for 15 years.
This is a mobile app on which Border Patrol agents can collect biometric and other personal information on migrants and asylum seekers. Data that can be logged in to the app includes phone numbers, employment and family information, marital status, people traveling together, permanent address abroad, and destination in the US, as well as a photograph to be run through CBP biometric records, the report said.
Using services from the Israeli company Cellebrite, Canadas Magnet Forensics, and the US company Grayshift, CBP can search mobile phones and other devices for information about a person. Grayshift and Cellebrite can sometimes unlock phones. US border agents dont need warrants to search peoples devices, according to a 2019 court ruling, and border agents searched more than 40,000 devices in 2019, Reuters reported.
These are pieces of software designed to extract personal information stored in cars, including call logs and navigation histories. CBP has paid Berla Corp., which partnered with the Swedish mobile-forensics company MSAB, for this service.
Venntel, a subsidiary of the data broker Gravy Analytics, sells licenses to CBP and other DHS entities that allow them to use consumer cellphone data to track migrants and asylum seekers. A DHS document leaked to BuzzFeed News said it was possible to combine the consumer location data with other information and analysis to identify an individual user.
ICAD is a system of underground sensors and cameras that detects the presence or movement of individuals and sends data back to CBP. Border Patrol agents then seek out the people captured on ICAD, ask these people for their biographic data, and store this information, according to the report.
See the original post:
KDD 2021 Celebrates Winning Teams of 25th Annual KDD Cup – KCRG
Across Three Competition Tracks, KDD Cup 2021 Tackled Multi-Datasets in a Time Series, Large-Scale Graph Machine Learning Challenge Solutions, and Intelligent Algorithms to Strategize Vehicle Traffic Demand
Published: Oct. 19, 2021 at 10:30 AM CDT|Updated: 14 hours ago
SAN DIEGO, Oct. 19, 2021 /PRNewswire/ --The Association for Computing Machinery (ACM) Special Interest Group on Knowledge Discovery and Data Mining (SIGKDD) today recognized the winning teams of this year's KDD Cup, the annual competition held at KDD 2021, the premier interdisciplinary conference in data science. KDD Cup 2021, which took place virtually Aug. 14-18, 2021, crowdsourced participants who are helping to solve challenges within the knowledge discovery and data mining industry, providing a platform for aspiring and experienced data scientists alike to build their professional profiles and network with leading professionals in the field during KDD 2021.
KDD Cup 2021 crowdsourced participants who are helping to solve challenges within knowledge discovery and data mining.
"Every year, the KDD Cup attracts the brightest data science talent across the globe, and competitors in this year's competition did not hold back. All entries demonstrated ingenuity, impact, and impeccable teamwork. I thank all of the teams this year and congratulate those that rose to the topteams that fundamentally challenged themselves and the way the world thinks when it comes to data science," said Wei Wang, SIGKDD chair and professor in computer science at the University of California, Los Angeles.
This year's competition was supported by several companies and universities who support the data science ecosystem including Facebook AI, TU Dortmund, Intel, Shanghai Jiao Tong University, Yunqi Academy of Engineering, Stanford University, Hexagon-ML, and Tianrang. More than 1,100 teams competed in the City Brain Challenge, 193 teams in the Time Series, and 143 teams in the Open Graph Benchmark (OGB) Large Scale Challenge (LSC), with competition winners selected by an entirely automated process. KDD Cup 2021 winners include:
The 26th Annual KDD Cup will take place in conjunction with KDD 2022 on Aug. 14-18, 2022 in Washington, D.C. For additional information on this year's cup and winners, please contact kddcup2021@kdd.org.
AboutACM SIGKDD:ACM is the premier global professional organization for researchers and professionals dedicated to the advancement of science and the practice of knowledge discovery and data mining.SIGKDD is ACM's Special Interest Group on Knowledge Discovery and Data Mining.The annual KDD International Conference on Knowledge Discovery and Data Miningis thepremierinterdisciplinary conference for data mining, data science and analytics.
For more information on KDD, please visit:https://www.kdd.org/.
Follow KDD on:Facebookhttps://www.facebook.com/SIGKDDTwitterhttps://twitter.com/kdd_newsLinkedInhttps://www.linkedin.com/groups/160888/
View original content to download multimedia:
SOURCE ACM SIGKDD
The above press release was provided courtesy of PRNewswire. The views, opinions and statements in the press release are not endorsed by Gray Media Group nor do they necessarily state or reflect those of Gray Media Group, Inc.
See original here:
KDD 2021 Celebrates Winning Teams of 25th Annual KDD Cup - KCRG